Search results for "Executable"

showing 10 items of 35 documents

FlexibleSUSY - a meta spectrum generator for supersymmetric models

2016

FlexibleSUSY is a software package that takes as input descriptions of (non-)minimal supersymmetric models written in Wolfram/Mathematica and generates a set of spectrum generator libraries and executables, with the aid of SARAH. The design goals are precision, reliability, modularity, speed, and readability of the code. The boundary conditions are independent C++ objects that are plugged into the boundary value problem solver together with the model objects. This clean separation makes it easy to adapt the generated code for individual projects. The current status of the interface and implementation is sketched.

PhysicsNuclear and High Energy PhysicsParticle physicsModularity (networks)010308 nuclear & particles physicsInterface (Java)renormalization group equationsFOS: Physical sciencescomputer.file_formatSolver01 natural sciencesSet (abstract data type)High Energy Physics - PhenomenologyHigh Energy Physics - Phenomenology (hep-ph)0103 physical sciencesCode (cryptography)Boundary value problemExecutablesupersymmetry010306 general physicscomputersparticleGenerator (mathematics)Higgs
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct

An Approach to Data Quality Evaluation

2018

This research proposes a new approach to data quality evaluation comprising 3 aspects: (1) data object definition, which quality will be analyzed, (2) quality requirements specification for the data object using Domain Specific Language (DSL), (3) implementation of an executable data quality model that would enable scanning of data object and detect its shortages. Like the Model Driven Architecture (MDA) the data quality modelling is divided into platform independent (PIM) and platform-specific (PSM) models. PIM comprises informal specifications of data quality, PSM describes implementation of data quality model, thus making the data quality model executable. The approbation of the proposed…

SQLbusiness.industryComputer sciencemedia_common.quotation_subjectSoftware requirements specificationcomputer.file_formatLinked dataData modelingData integrityData qualityQuality (business)ExecutableSoftware engineeringbusinesscomputermedia_commoncomputer.programming_language2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)
researchProduct

PMG-pro: A model-driven method for the development of service-based applications in a heterogenous services environment

2010

This paper presents PMG-pro (present, model, generate and provide), a development method of service-based applications. With PMG-pro, the composition of heterogeneous pre-made services is done at model levels and thereby different executable software systems for different target platforms can be generated automatically. To illustrate the method, we present a case study of developing a service-based application in a smart home environment.

Service (systems architecture)Javabusiness.industryService delivery frameworkComputer scienceDistributed computingcomputer.file_formatcomputer.software_genreUnified Modeling LanguageHome automationEmbedded systemExecutableSoftware systemWeb servicebusinesscomputercomputer.programming_language2010 IEEE International Conference on Software Engineering and Service Sciences
researchProduct

Programming distributed applications with symbolic reasoning on WSNs

2015

Programming Wireless Sensor Networks (WSNs) is a complex task for which existing approaches adopt rigid architectures that are only suitable for specific application fields. In previous papers we introduced a programming methodology and a lightweight middleware based on high-level programming and executable code exchange for distributed processing on WSNs. In this paper, we show how high-level programming can be effectively used on WSNs to implement symbolic reasoning. In order to prove the feasibility of our approach, we present a Fuzzy Logic system where the value updates and the rule evaluations are performed in a distributed way. Through the proposed methodology, we discuss the developm…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEvent-driven programmingEngineeringAmbient intelligenceWireless Sensor Networks (WSN)business.industryDistributed computingcomputer.file_formatcomputer.software_genreSoftware development processKey distribution in wireless sensor networksMiddleware (distributed applications)HVACExecutableDistributed ComputingbusinessSymbolic ReasoningcomputerWireless sensor network2015 International Conference on Computing, Networking and Communications (ICNC)
researchProduct

High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

2015

While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteractive programmingSIMPLE (military communications protocol)MultimediaKnowledge representation and reasoningComputer Networks and CommunicationsComputer scienceDistributed computingcomputer.file_formatKnowledge Representationcomputer.software_genreFuzzy logiclcsh:TelecommunicationSoftware development processResource constrained devicesFuzzy LogicHigh-level programming languageMiddleware (distributed applications)Fuzzy Logic.lcsh:TK5101-6720ExecutableResource constrained devicecomputerHigh-level programmingEAI Endorsed Transactions on Cognitive Communications
researchProduct

A Middleware to Develop and Test Vehicular Sensor Network Applications

2019

The Smart city ecosystem is composed of several networked devices that provide services to citizens and improve their quality of life. Basic services, which must be exposed by the underlying software infrastructure, require efficient networking and communication protocols to coordinate and manage all the system components. In particular, Vehicular Sensor Networks (VSNs) are envisioned as key components of smart cities. Verification is crucial in such a highly dynamic scenario to ensure operation correctness and to reduce the development cost of smart applications. However, the rigidity of existing middlewares makes development, reconfiguration, and testing rather difficult. In this work, we…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIterative and incremental developmentSoftware VerificationCorrectnessComputer science020209 energyDistributed computing020208 electrical & electronic engineeringControl reconfiguration02 engineering and technologycomputer.file_formatcomputer.software_genreSmart CitieVehicular Sensor NetworkDistributed ApplicationSmart cityMiddleware (distributed applications)0202 electrical engineering electronic engineering information engineeringSymbolic processingSoftware Development and TestingExecutableCommunications protocolcomputerWireless sensor network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

Verification of Symbolic Distributed Protocols for Networked Embedded Devices

2020

The availability of versatile and interconnected embedded devices makes it possible to build low-cost networks with a large number of nodes running even complex applications and protocols in a distributed manner. Common tools used for modeling and verification, such as simulators, present some limitations as application correctness is checked off-board and only focuses on source code. Execution in the real network is thus excluded from the early stages of design and verification. In this paper, a system for modeling and verification of symbolic distributed protocols running on embedded devices is introduced. The underlying methodology is rooted in a symbolic programming paradigm that makes …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingExecutable Code ExchangeSource codeCorrectnessbusiness.industryComputer scienceDistributed protocolSymbolic programmingmedia_common.quotation_subject020208 electrical & electronic engineering02 engineering and technologyResource (project management)Embedded system0202 electrical engineering electronic engineering information engineeringResource-constrained Device020201 artificial intelligence & image processingEmbedded SystemModeling and verificationDistributed applicationbusinessProtocol (object-oriented programming)media_commonAbstraction (linguistics)
researchProduct

JEM–X science analysis software

2003

The science analysis of the data from JEM-X on INTEGRAL is performed through a number of levels including corrections, good time selection, imaging and source finding, spectrum and light-curve extraction. These levels consist of individual executables and the running of the complete analysis is controlled by a script where parameters for detailed settings are introduced. The end products are FITS files with a format compatible with standard analysis packages such as XSPEC. Martinez Nuñez, Silvia, Silvia.Martinez@uv.es

Software ; X-ray data analysis ; INTEGRAL ; Satellite ; JEM-X010504 meteorology & atmospheric sciencesAstrophysicsUNESCO::ASTRONOMÍA Y ASTROFÍSICA01 natural sciencesSoftware0103 physical sciencesAnalysis software010303 astronomy & astrophysicsSelection (genetic algorithm)0105 earth and related environmental sciencesPhysicsX-ray data analysisINTEGRALbusiness.industryAstronomy and Astrophysicscomputer.file_format:ASTRONOMÍA Y ASTROFÍSICA::Cosmología y cosmogonia [UNESCO]Computer engineeringSatelliteSpace and Planetary ScienceJEM-XSatelliteExecutableUNESCO::ASTRONOMÍA Y ASTROFÍSICA::Cosmología y cosmogoniabusinesscomputerSoftware:ASTRONOMÍA Y ASTROFÍSICA [UNESCO]Astronomy & Astrophysics
researchProduct

A Lightweight Network Discovery Algorithm for Resource-constrained IoT Devices

2019

Although quite simple, existing protocols for the IoT suffer from the inflexibility of centralized infrastructures and require several configuration stages. The implementation of these protocols is often prohibitive on resource-constrained devices. In this work, we propose a distributed lightweight implementation of network discovery for simple IoT devices. Our approach is based on the exchange of symbolic executable code among nodes. Based on this abstraction, we propose an algorithm that makes even IoT resource-constrained nodes able to construct the network topology graph incrementally and without any a priori information about device positioning and presence. The minimal set of executab…

Topology constructionSIMPLE (military communications protocol)Computer scienceExecutable code exchangeResource-constrained devicecomputer.file_formatConstruct (python library)Network topologyDistributed processingSet (abstract data type)Computer Networks and CommunicationHardware and ArchitectureA priori and a posterioriGraph (abstract data type)Symbolic processingExecutableInternet of ThingAlgorithmcomputerSoftwareAbstraction (linguistics)2019 International Conference on Computing, Networking and Communications (ICNC)
researchProduct