The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although there has been increasing demand for more reliable web applications, JavaScript bugs abound in web applications. In response to this issue, researchers have proposed automated fault detection tools, which statically analyze the web application code to find bugs. While useful, these tools either only target a limited set of bugs based on predefined rules, or they do not detect bugs caused...
Testing of Android apps is particularly challenging due to the fragmentation of the Android ecosystem in terms of both devices and operating system versions. Developers must in fact ensure not only that their apps behave as expected, but also that the apps' behavior is consistent across platforms. To support this task, we propose DiffDroid, a new technique that helps developers automatically find...
Action recognition is still a challenging problem. In order to catch effective compact representation of the action sequences, the discriminative dictionaries could be learned by sparse coding. But sparse coding is needed in both the training and testing phases of the classifier framework. And it is also time consuming for the adoption of 1-norm sparsity constraint on the representation coefficients...
The emergence of large-scale dynamic sets in real applications creates stringent requirements for approximate set representation structures: 1) the capacity of the set representation structures should support flexibly extending or reducing to cope with dynamically changing of set size; 2) the set representation structures should support reliable delete operation. Existing techniques for approximate...
Code review is a key tool for quality assurance in software development. It is intended to find coding mistakes overlooked during development phase and lower risk of bugs in final product. In large and complex projects accurate code review is a challenging task. As code review depends on individual reviewer predisposition there is certain margin of source code changes that is not checked as it should...
Integrating analog-to-digital converters that utilize a phase-sensitive detector (PSADCs) are frequently used in high precision instrumentation and measurement systems. As any technical object, a PSADC is subject to faults. These faults must be detected promptly and accurately by built-in low complexity hardware. In the present work, this objective is achieved by the adoption of error-control codes...
There is widening chasm between the ease of creating software and difficulty of "building security in". This paper reviews the approach, the findings and recent experiments from a seven-year effort to enable consistency across a large, diverse development organization and software portfolio via policies, guidance, automated tools and services. Experience shows that developing secure software...
The research was carried out and the Cyrillic typeface, based on the handwriting, was developed. The font-building software was investigated. Sketches of the font were drawn and converted to the vector format. Afterward, the characters and glyphs, ligatures, tracking, kerning pairs of the handwritten font were constructed. The FineReader was learned to recognize the developed font.
The existing communication technologies for IOT have become either saturated or do not meet actual needs, regarding long distances or low power consumption. We propose a study about mobility for the LoRa protocol, a new Low Power Wide Area Network technology. The paper draws upon a short overview of LoRa physical layer protocol, as well as on our testing design, some distances achieved and signal...
A calibration of various microphones that have different characteristics is very difficult. This paper presents a feature extraction method as an alternative. The method provides acoustic features that are strongly robust against various characteristic transfer functions. The proposed method applies Local Binary Patterns (LBP) and Compressive Sensing (CS) which compare spectral details with spectral...
The black box records all the important information that takes place on a flying plane. The black box is a tool used on airplanes to store all activities during flight. The black box has a Flight Data Recorder (FDR) and a Cockpit Voice Recorder. FDR and CVR function to record and record the existing in the aircraft. The black box has recordings of information that occurs during the flight. Data generated...
System-on-a-Chip (Soc) design has become more complex, because many functional components or IPs (Intellectual Property) will be integrated within a chip. The test of integration is “how to verify on-chip communication properties”. Since conventional simulation-based bus protocol monitors can validate whether bus signals obey bus protocol or not, but they often lack of efficient debugging techniques...
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style sheets. A common programming error is the use of a wrong encoder to sanitize untrusted data, leaving the application vulnerable. We present a security...
Life cycle management is an effective way to maintain software quality in safety-critical systems; however, it faces difficulties when applied on software of Programmable Logic Device (PLD). This is because: (1) traditional models on software development do not fit with design workflow of PLD; (2) adaptive models for PLD focus mainly on specific features during software implementation, ignoring high-level...
Through the lifetime, a person might stumble upon diseases many of which may be deadly. In order to save the person's life, doctors will prescribe many medicines that may help cure the person. To make stuff easier technology has introduced many new ways to facilitate the struggle that the person may undergo. One of the new ways introduced is an application that makes it easier for cancer and heart...
This paper focuses on one type of Covert Storage Channel (CSC) that uses the 6-bit TCP flag header in TCP/IP network packets to transmit secret messages between accomplices. We use relative entropy to characterize the irregularity of network flows in comparison to normal traffic. A normal profile is created by the frequency distribution of TCP flags in regular traffic packets. In detection, the TCP...
One of the challenges for using metamodels in Model Driven Engineering is to automatically generate metamodel instances. Each instance should satisfy many constraints defined by a metamodel. Such instances can then be used for verifying or validating metamodels. Recent studies have already shown that this can be tackled by using SAT/SMT solvers. However, such instance generation does not take coverage...
Technical Debt (TD) refers to the long-term consequences of shortcuts taken during different phases of software development life cycle. Lack of attention to monitoring and managing testing and development debt can contribute to unexpectedly large cost overruns and severe quality issues in software development projects. This paper describes a case study conducted with an industry partner to explore...
We prove that the solvability of systems of linear equations and related linear algebraic properties are definable in a fragment of fixed-point logic with counting that only allows polylogarithmically many iterations of the fixed-point operators. This enables us to separate the descriptive complexity of solving linear equations from full fixed-point logic with counting by logical means. As an application...
X-codes are linear maps with a special combinatorial property that generalizes superimposed codes, disjunct matrices, and cover-free families. In the context of circuit testing, a (t, n, d, x) X-code compresses n-bit output from the circuit under test into t bits while allowing for detecting the existence of up to d erroneous output bits even if up to x bits of the correct behavior are unknowable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.