The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Opinions are key determinants to many of the activities related to software development. The perceptions of developers about an API, and the choices they make about whether and how they should use it, may, to a considerable degree, be conditioned upon how other developers see and evaluate the API. Given the plethora of APIs available for a given development task and the advent of developer forums...
A network of 15 Timepix pixel detectors was installed within the ATLAS experiment at CERN, Geneva. The network is capable of measuring the composition and spectral characteristics of the radiation fields in real-time. Its operation is managed by a dedicated software system. The presented article describes primary software components of this system responsible for communication with detector hardware,...
Code smells are considered to be indicators of design flaws or problems in source code. Various tools and techniques have been proposed for detecting code smells. The number of code smells detected by these tools is generally large, so approaches have also been developed for prioritizing and filtering code smells. However, the lack of empirical data regarding how developers select and prioritize code...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
In a spectrally congested environment or a spectrally contested environment which often occurs in cyber security applications, multiple signals are often mixed together with significant overlap in spectrum. This makes the signal detection and parameter estimation task very challenging. In our previous work, we have demonstrated the feasibility of using a second order spectrum correlation function...
In this paper we characterize the radio frequency (RF) spectrum opportunities available in a common GSM (Global System for Mobile Communications) channel to support the operation of a cognitive radio network (CRN). In a first step, we describe the technical details involved to sample the channel using a Software Defined Radio (SDR) device. Adopting a simple Energy-based detector, we identify the two...
In this paper, we developed a software defined radio (SDR) system for implementing energy detection spectrum sensing. The SDR module can be used for a wide range of applications. The use of the SDR module is motivated by its high interoperability, availability for relatively cheaper prices and being software independent. Energy detection for cognitive radios is chosen for its simplicity and popularity...
Despite a decade of active research, there has been a marked lack in clone detection techniques that scale to large repositories for detecting near-miss clones. In this paper, we present a token-based clone detector, SourcererCC, that can detect both exact and near-miss clones from large inter-project repositories using a standard workstation. It exploits an optimized inverted-index to quickly query...
Given the availability of large source-code repositories, there has been a large number of applications for large-scale clone detection. Unfortunately, despite a decade of active research, there is a marked lack in clone detectors that scale to big software systems or large repositories, specifically for detecting near-miss (Type 3) clones where significant editing activities may take place in the...
Over the last few years, researchers proposed a multitude of automated bug-detection approaches that mine a class of bugs that we call API misuses. Evaluations on a variety of software products show both the omnipresence of such misuses and the ability of the approaches to detect them. This work presents MuBench, a dataset of 89 API misuses that we collected from 33 real-world projects and a survey...
“Code Smell” or “Bad Smell”, at the very least, is an indicator of badly for source code and is often analytical of deeper problems in software design. In layman terms, it signals flaws in the core foundation or architecture of the software that can cause any number of more serious problems — from usability and runtime performance to supportability and enhancement. These problems can mostly be prevented...
Detecting child and adult vocalizations, and computing their characteristics from audio recorded in natural home environments can be useful in many applications. The current study is interested in monitoring children with autism spectrum disorder to ultimately provide outcome measures that can track the efficacy of clinical treatments. In this paper, we show that it is possible to automate detection...
Algorithms for facial landmark detection in real-world images require manually annotated training databases. However, the task of selecting or creating the images and annotating the data is extremely time-consuming, leaving researchers with the options of investing significant amounts of time for creating annotated images optimized for the given task or resigning from creating such hand-labeled databases...
This paper considers the development of information flow analyses to support resilient design and active detection of adversaries in cyber physical systems (CPS). CPS security, though well studied, suffers from fragmentation. In this paper, we consider control systems as an abstraction of CPS. Here, we use information flow analysis, a well established set of methods developed in software security,...
As radiographic imaging is one of the most used medical imaging modalities, it has been a subject of various research in the domains of image processing and computer vision. Expert annotated databases are needed to enable easier algorithm development, validation and verification. From algorithm development standpoint, image information such as the existence and position of collimation, existence of...
This paper describes the Vikoworkstation (VW), an image processing software that has been developed by Vikomed and its partners and is available open source as freeware. This package has been implemented by ImageJ suite platform and java swing/awt for interface user. Additionally, communicated functions to peripheral devices that attach importance to develop by embedding communication protocol to...
Source code similarity measurement is a fundamental technique in software engineering research. Techniques to measure code similarity have been invented and applied to various research areas such as code clone detection, finding bug fixes, and software plagiarism detection. We perform an evaluation of 30 similarity analysers for source code. The results show that specialised tools including clone...
Code smells represent well known symptoms of problems at code level, and architectural smells can be seen as their counterpart at architecture level. If identified in a system, they are usually considered more critical than code smells, for their effect on maintainability issues. In this paper, we introduce a tool for the detection of architectural smells that could have an impact on the stability...
This paper describes an architecture for global queue management (GQM). Global refers to the set of all queues in routers present in some network flow path. The main idea of the architecture is the detection of some anomaly somewhere downstream and the propagation of the local decision to a set of upstream routers or switches. The upstream devices are free to act as they wish. GQM is useful to boost...
Accurate grid synchronization unit is essential for reliable operation of grid converters. Single-phase unit may utilize measured function and its digital derivative as the base for PLL. This paper compares some solutions of accuracy problems typical for such derivative approach: oversampling of measurements, interleaved calculation of derivative and averaged evaluation pulse signals. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.