scispace - formally typeset
Search or ask a question

Showing papers on "Application software published in 2014"


Journal ArticleDOI
TL;DR: The study shows that the research work is greatly benefited from such an IIS, not only in data collection supported by IoT, but also in Web services and applications based on cloud computing and e-Science platforms, and the effectiveness of monitoring processes and decision-making can be obviously improved.
Abstract: Climate change and environmental monitoring and management have received much attention recently, and an integrated information system (IIS) is considered highly valuable. This paper introduces a novel IIS that combines Internet of Things (IoT), Cloud Computing, Geoinformatics [remote sensing (RS), geographical information system (GIS), and global positioning system (GPS)], and e-Science for environmental monitoring and management, with a case study on regional climate change and its ecological effects. Multi-sensors and Web services were used to collect data and other information for the perception layer; both public networks and private networks were used to access and transport mass data and other information in the network layer. The key technologies and tools include real-time operational database (RODB); extraction-transformation-loading (ETL); on-line analytical processing (OLAP) and relational OLAP (ROLAP); naming, addressing, and profile server (NAPS); application gateway (AG); application software for different platforms and tasks (APPs); IoT application infrastructure (IoT-AI); GIS and e-Science platforms; and representational state transfer/Java database connectivity (RESTful/JDBC). Application Program Interfaces (APIs) were implemented in the middleware layer of the IIS. The application layer provides the functions of storing, organizing, processing, and sharing of data and other information, as well as the functions of applications in environmental monitoring and management. The results from the case study show that there is a visible increasing trend of the air temperature in Xinjiang over the last 50 years (1962-2011) and an apparent increasing trend of the precipitation since the early 1980s. Furthermore, from the correlation between ecological indicators [gross primary production (GPP), net primary production (NPP), and leaf area index (LAI)] and meteorological elements (air temperature and precipitation), water resource availability is the decisive factor with regard to the terrestrial ecosystem in the area. The study shows that the research work is greatly benefited from such an IIS, not only in data collection supported by IoT, but also in Web services and applications based on cloud computing and e-Science platforms, and the effectiveness of monitoring processes and decision-making can be obviously improved. This paper provides a prototype IIS for environmental monitoring and management, and it also provides a new paradigm for the future research and practice; especially in the era of big data and IoT.

443 citations


Patent
24 Feb 2014
TL;DR: In this paper, the authors present a method of managing virtual network functions for a network, the method including providing a virtual network function (VNF) including a number of virtual-network function components (VNFCs) of a many different types, each VNFC comprising a virtual machine (VM) executing application software.
Abstract: A method of managing virtual network functions for a network, the method including providing a virtual network function (VNF) including a number of virtual network function components (VNFCs) of a number of different types, each VNFC comprising a virtual machine (VM) executing application software. The method further includes creating for up to all VNFC types a number of deactivated VMs having application software, monitoring at least one performance level of the VNF, and scaling-out the VNF by activating a number of deactivated VMs of a number of VNFC types when the at least one performance level reaches a scale-out threshold.

117 citations


Journal ArticleDOI
TL;DR: This paper describes two e-science infrastructures: Science and Engineering Applications Grid (SEAGrid) and molecular modeling and parametrization (ParamChem), which share a similar three-tier computational infrastructure that consists of a front-end client, a middleware web services layer, and a remote HPC computational layer.

92 citations


Journal ArticleDOI
01 Jan 2014
TL;DR: This paper presents MyPHRMachines, a cloud-based PHR system taking a radically new architectural solution to health record portability, and discusses a prototype of the system applied to two use cases, i.e., radiology image sharing and personalized medicine.
Abstract: Personal Health Records (PHRs) should remain the lifelong property of patients, who should be able to show them conveniently and securely to selected caregivers and institutions. In this paper, we present MyPHRMachines, a cloud-based PHR system taking a radically new architectural solution to health record portability. In MyPHRMachines, health-related data and the application software to view and/or analyze it are separately deployed in the PHR system. After uploading their medical data to MyPHRMachines, patients can access them again from remote virtual machines that contain the right software to visualize and analyze them without any need for conversion. Patients can share their remote virtual machine session with selected caregivers, who will need only a Web browser to access the pre-loaded fragments of their lifelong PHR. We discuss a prototype of MyPHRMachines applied to two use cases, i.e., radiology image sharing and personalized medicine.

71 citations


Proceedings ArticleDOI
06 Mar 2014
TL;DR: A framework for evaluating the IoT platforms from the perspective of how widely they cover the potential needs of the application providers is introduced and the maturity of the available IoT platforms is evaluated, by using publicly available information about the platforms' features and supporting services.
Abstract: Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and developing the applications, as well as in deploying and operating the application software. In this paper, a framework for evaluating the IoT platforms from the perspective of how widely they cover the potential needs of the application providers is introduced. Based on the framework, the maturity of the available IoT platforms is evaluated, by using the publicly available information about the platforms' features and supporting services. As the results of this initial analysis suggest, none of the platforms today offers the comprehensive support. This can be seen as a factor contributing to a slow adaption of the IoT platforms, and therefore to the slower-than-expected takeoff of the IoT ecosystem in general.

63 citations


Patent
Ilya Firman1, Jasper S. Lin1, Mark D. Womack1, Yu-Kuan Lin1, Sheng-chi Hsieh1, Juliana Tsang1 
21 Feb 2014
TL;DR: In this paper, the authors describe a method for determining a version of a software application targeted for a computing device based on attributes associated with the computing device and identifying a particular version of the software application, from among the multiple versions on the application marketplace system.
Abstract: In one aspect, this application describes a method for determining a version of a software application targeted for a computing device. The method includes receiving, at an application marketplace system and from a user associated with a computing device that operates remotely from the application marketplace system, a request that corresponds to a software application distributed by the application marketplace system, the software application having multiple versions on the application marketplace system. The method also includes determining one or more device attributes that are associated with the computing device, and identifying a particular version of the software application, from among the multiple versions on the application marketplace system, that is targeted for the computing device based on the device attributes. The method also includes providing, for display to the user and in response to the request, information related to the particular version of the software application.

59 citations


Journal ArticleDOI
14 Jun 2014
TL;DR: This paper first performs design-space exploration to identify appropriate general-purpose architectures that uniquely fit the characteristics of a popular Web browsing engine, and proposes, synthesize, and evaluates two new domain-specific specializations, called the Style Resolution Unit and the Browser Engine Cache.
Abstract: The Web browser is undoubtedly the single most impor- tant application in the mobile ecosystem. An average user spends 72 minutes each day using the mobile Web browser. nWeb browser internal engines (e.g., WebKit) are also growing in importance because they provide a common substrate for developing various mobile Web applications. In a user-driven, interactive, and latency-sensitive environment, the browser's performance is crucial. However, the battery-constrained nature of mobile devices limits the performance that we can de- liver for mobile Web browsing. As traditional general-purpose techniques to improve performance and energy efficiency fall short, we must employ domain-specific knowledge while still maintaining general-purpose flexibilityIn this paper, we first perform design-space exploration to identify appropriate general-purpose architectures that uniquely fit the characteristics of a popular Web browsing engine. Despite our best effort, we discover sources of energy inefficiency in these customized general-purpose architectures. To mitigate these inefficiencies, we propose, synthesize, and evaluate two new domain-specific specializations, called the Style Resolution Unit and the Browser Engine Cache. Our opti- mizations boost energy efficiency and at the same time improve mobile Web browsing performance. As emerging mobile work- loads increasingly rely more on Web browser technologies, the type of optimizations we propose will become important in the future and are likely to have lasting widespread impact

57 citations


Proceedings ArticleDOI
01 Sep 2014
TL;DR: This work presents a new system to easily create printable foldable robots from high-level structural specifications that a user merely needs to select electromechanical components from a library of basic building blocks and pre-designed mechanisms, then connect them to define custom robot assemblies.
Abstract: Designing and fabricating new robotic systems is typically limited to experts, requiring engineering background, expensive tools, and considerable time. In contrast, to facilitate everyday users developing custom robots for personal use, this work presents a new system to easily create printable foldable robots from high-level structural specifications. A user merely needs to select electromechanical components from a library of basic building blocks and pre-designed mechanisms, then connect them to define custom robot assemblies. The system then generates complete mechanical drawings suitable for fabrication, instructions for the assembly of electronics, and software to control and drive the final robot. Several robots designed in this manner demonstrate the ability and versatility of this process. I. INTRODUCTION While robots are widely used for research and commer- cial applications, they are not yet ubiquitous in everyday life for personalized tasks. Creating a new robotic system typically involves repeated design iterations using a variety of computer-aided design tools. Domain-specific expertise is generally required to create the requisite mechanical drawings for a structural body, electronic circuits to connect sensors and actuators, and software to manage system inputs and outputs. This entire process often needs to be rerun for each new robot desired, making the design and fabrication of new robots slow and introducing a knowledge barrier for casual users. For the general public to obtain a device able to accom- plish a specified function, computational tools are required that can create robots from high-level descriptions. The long- term objective is to develop a hardware compiler that can start with functional specifications of a desired system and automatically design and fabricate a robot to accomplish those. This paper takes a step towards that vision with a system to simultaneously generate the mechanical, electrical, and software components of a robot from its structural specifications, allowing non-experts to easily design elec- tromechanical systems with custom specifications and then quickly and inexpensively fabricate the designed robot. The presented approach modularizes mechanical, electri- cal, and software components to represent them in a database suitable for hierarchical composition. These parameterized components are characterized in terms of their geometric and physical properties; while experts can directly generate new low level building blocks, casual users can simply connect existing designs to make custom electromechanical devices. The system then automatically outputs a collection of files with which the user can manufacture the specified robot: fabrication drawings get sent to a desktop cutter to generate cut-and-fold origami-inspired 3D structures, wiring instructions guide the user to assemble sensors and actuators onto that structure using plug-and-play electronic modules, and libraries and application software get loaded onto a central microcontroller. The resulting robot can be wirelessly controlled from an auto-generated user interface (UI) on a smartphone.

55 citations


Patent
17 Sep 2014
TL;DR: In this article, a testing method, a testing device and a testing system of application software on a mobile terminal is presented, which comprises the following steps of receiving an installation package of applicationsoftware to be tested, which is uploaded by a client end, and an identification of a target mobile terminal to be test; sending the installation package to the target mobile device and instructing the target device to install the application software through the installation packages, and traversing to trigger all controls in application software and obtaining a screenshot of a display interface when the controls are triggered to obtain the display interface
Abstract: The invention discloses a testing method, a testing device and a testing system of application software on a mobile terminal The method comprises the following steps of receiving an installation package of application software to be tested, which is uploaded by a client end, and an identification of a target mobile terminal to be tested; sending the installation package to the target mobile terminal and instructing the target mobile terminal to install the application software through the installation package; instructing the target mobile terminal to start the application software and traversing to trigger all controls in the application software and obtaining a screenshot of a display interface when the controls are triggered to obtain the display interface every time; returning a picture intercepted on the target mobile terminal to the client end By using the method, the application software on the mobile terminal can be efficiently tested

50 citations


Patent
02 Jul 2014
TL;DR: In this article, a method, device and system for medical information interaction based on a cloud service platform is described, which includes the steps that a cloud server receives a medical information access request of a terminal user, generates a corresponding medical access result according to the medical access access request, and feeds the medical data back to the user, wherein the medical information result comprises medical access data locally saved in the cloud server or medical interaction data fed back by a hospital local server.
Abstract: The invention discloses a method, device and system for medical information interaction based on a cloud service platform The method includes the steps that a cloud server receives a medical information access request of a terminal user, generates a corresponding medical access result according to the medical information access request, and feeds the medical access result back to the terminal user, wherein the medical access result comprises medical access data locally saved in the cloud server or medical interaction data fed back by a hospital local server According to the method, device and system, the problems that in correlation techniques, the development cycle is long and the development cost is high due to the fact that each hospital needs to develop different types of application software based on the characteristics of the hospital to satisfy the requirement for access operation of the medical information of the terminal user are solved, the cloud server provides access interfaces for different hospitals, the user can send the access request to multiple hospitals only by having access to the cloud server, and therefore resource cost and development cost of the hospitals are reduced, and multiple kinds of access experience can be provided for the user

48 citations


Patent
24 Mar 2014
TL;DR: A care system includes a mobile communication device, a remote server, and a patient support system that is in communication with either or both of the mobile communication devices and the remote server.
Abstract: A care system includes a mobile communication device, a remote server, and a patient support system that is in communication with either or both of the mobile communication device and the remote server. The mobile communication device may operate as a user interface for the patient support system. The remote server may provide computing power for the patient support system for resource intensive computing tasks. A system for use in a healthcare facility includes patient care devices located in a patient room. The system also includes an application server located remotely from the patient room. The application server stores application software associated with each patient care device. The system further includes a universal caregiver interface situated in the patient room and in communication with the application server. The universal caregiver interface receives application software from the application server. The universal caregiver interface is then usable to control the operation of each of the plurality of patient care devices in accordance with the application software.

Patent
08 Dec 2014
TL;DR: In this article, a computer implemented method of detecting a fault in a system comprising the steps of executing at least three virtual machines, each virtual machine executing a same application software, in separated and isolated memory segments and in a dedicated core of a multi-core processor, wherein non-faulty virtual machines provide an identical output message within a predefined time-interval.
Abstract: There is disclosed a computer implemented method of detecting a fault in a system comprising the steps of executing at least three virtual machines, each virtual machine executing a same application software, in separated and isolated memory segments and in a dedicated core of a multi-core processor; said virtual machines being synchronized and concurrently executed by a common hypervisor; wherein non-faulty virtual machines provide an identical output message within a predefined time-interval; detecting a fault in an output of a virtual machine, said fault corresponding to a different output message of said faulty virtual machine. Developments include a distributed vote mechanism, pull/push mechanisms, association of output vote messages with a safety extension comprising identification information, virtual machine recovery using data context.

Patent
03 Sep 2014
TL;DR: In this article, a parking management system based on a ground lock remotely controlled by a mobile terminal is described, and the system comprises a parking space ground lock, a server platform system, and a user mobile terminal for loading application software.
Abstract: The invention discloses a parking management system based on a ground lock remotely controlled by a mobile terminal. The system comprises a parking space ground lock, a server platform system, and a user mobile terminal for loading application software, and is characterized in that a user uses Wi-Fi and the Bluetooth technology to control the parking space ground lock through the application software in the user terminal; after the parking space ground lock is started, automatic timing is carried out, the timing data are uploaded in an encryption mode to the server automatically via the mobile terminal of the ground lock owner when the parking space ground lock is closed and automatic fee reduction is realized; after the user starts the application software in the user mobile terminal, the parking space ground lock sends a notice and advertisement information to the user mobile terminal; idle parking space near the specified position can be queried, booked and requested for rent immediately through the user terminal and the surrounding merchant advertisement information can be queried; and through the application software in the user terminal, the parking space ground lock owner can carry out remote authorization via internet to enable other mobile terminals to control the parking space ground locks of their own.

Journal ArticleDOI
TL;DR: A method to test the reliability of the created software application as well as the wireless xComfort system under different conditions which stimulate different implementation methods applicable to a real building/apartment unit is proposed.
Abstract: This article describes the development of a visualization application software used to control operational and technical functions in the Smart Home system or Smart Home Care system via the wireless xComfort control system. Graphic visualization of a home electrical control system gives the user unprecedented comfort when controlling home systems. The user is able to obtain the information necessary to optimise the management of operational and technical functions in the building as well as information about energy consumption. Selected definitions of requirements for the visualization system, online access via the Internet, control via USB interface, and control requirements executed via mobile phone are the reasons why these technical elements were selected. This article describes their mutual relations, functions and connections within the system. At the end of this article we propose a method to test the reliability of the created software application as well as the wireless xComfort system under different conditions which stimulate different implementation methods applicable to a real building/apartment unit. Measurement results can be used for the actual installation process and for optimal implementation of the active elements of the wireless system.

Patent
24 Feb 2014
TL;DR: The concept of smart proxy as discussed by the authors allows integration of desktop software in a distributed enterprise system, as a service, without requiring non-trivial modifications to the application code or to alter its workflows in any material way.
Abstract: A resource manager service, system, apparatus and method manages resources for a user group of at least one user by utilizing a resource adapter. The resource adapter serves as a smart proxy to mimic the user of a desktop software application preserving the interaction model with the application. Embodiments of the invention allow integration of desktop software in a distributed enterprise system, as a service, without requiring non-trivial modifications to the application code or to alter its workflows in any material way. A resource manager service, system, apparatus and method treat instances of the resource adapters, smart proxies, as finite but reusable resources that can be allocated and “bound” to a given user for an unspecified duration.

Patent
10 Jun 2014
TL;DR: In this paper, a system of system (SOS) comprises at least two systems, one consisting of a multi-core processing cluster, multi-tasking operating system with application software stacks, and the second consisting of identical or non-identical multicore processing clusters, real time operating systems with real time software stacks in communication with a network interface card, PCI-e and software instructions.
Abstract: A “systems of system” and method for virtualization and cloud computing system are disclosed. According to one embodiment FIG. 1 , a “systems of system” comprises at least two systems. The first system includes multi-core processing cluster, multi-tasking operating system with application software stacks, and the second system includes identical or non-identical multi-core processing cluster, real time operating system with real time software stacks in communication with a network interface card, PCI-e and software instructions. When the software instructions are sent from first system to the second system and executed by the second system they cause the second system to receive a request for a service, create a new or invoke an existing software or virtual machine to service the request, and return a desired result indicative of successful completion of the service to the first system. The second system, within or external to the first system, can be expanded into multiple identical or non-identical systems. Each system within can invoke its own applications and has its own software stack with the software applications running concurrently in the software stacks of first system. By expanding both hardware infrastructure and software infrastructure, the second system can expanded into multiple systems, virtualized or non-virtualized, the resources of overall “systems of system” can be dynamically expanded based on the type of applications, loading of applications and users' requirements into on-demand cloud computing system.

Patent
22 Apr 2014
TL;DR: In this article, a method for searching for software applications (or apps) is provided, where one or more software applications are scheduled for execution according to a scheduling policy, and the collected application data is stored.
Abstract: A method for searching for software applications (or apps) is provided. In the method, one or more software applications are scheduled for execution according to a scheduling policy. The software applications are executed according to the scheduling policy. Application data of the software applications is collected. The collected application data is stored. A query is received. The stored application data is searched. Information regarding software applications whose corresponding stored application data relevant to the query is transmitted.

Journal ArticleDOI
TL;DR: In this study, an attempt is made to review the research in this field of cloud computing and the results are categorized on the basis of type of approach and the type of validation used to validate the approach.
Abstract: Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters i.e, cloud, which is remotely located, at which user does not have any control and the management of data may not be completely secure. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. One of the most important and leading is security issue that needs to be addressed. Data Security concerns arising because both user data and program are located in provider premises. In this study, an attempt is made to review the research in this field. The results of review are categorized on the basis of type of approach and the type of validation used to validate the approach.

Patent
12 Feb 2014
TL;DR: In this article, the signature information carried by an installation program is used to identify tampered installation programs and to prevent them from being installed in an operation system, so that the application software which is maliciously modified is effectively avoided from beinginstalled in the operation system.
Abstract: The invention discloses a method for installing application software. The method includes acquiring signature information carried by an installation program; utilizing prestored original signature information of an installation program of the application software to verify the signature information carried by the installation program, and if a verification result is unsuccessful, exiting installation of the application software; if the verification result is successful, executing an executable code of the installation program. The invention further discloses a device for installing the application software. By the method and the system, a tampered installation program can be effectively recognized, so that the application software which is maliciously modified is effectively avoided from being installed in an operation system.

Patent
Chen Siwen, Huang Yong, Xu Bo, Ni Haiou, Wang Huaijia 
02 Apr 2014
TL;DR: In this paper, a two-dimensional code card is arranged outside the wireless router, and the WIFI (wireless fidelity) function of the intelligent mobile phone is opened for connecting the router.
Abstract: The invention provides a method for managing a wireless router through an intelligent mobile phone. According to the method, a two-dimension code card is arranged outside the wireless router, and the WIFI (wireless fidelity) function of the intelligent mobile phone is opened for connecting the wireless router; the intelligent mobile phone scans the two-dimension code card, and can go to a router configuration guide page through a browser according to link information contained by two-dimension codes; the router can automatically detect the route type of users and can guide the users to input necessary Internet surfing information, then, the Internet connection detection is completed by the router, and after the operation succeeds, the wireless router skips the intelligent mobile phone of the users to an application software APP downloading page of the management router; after the users download and install the application software APP, the application software APP runs to carry out management operation on the router. The method has the advantages that the management on the wireless router can be realized through the mobile phone, convenience is brought to the users, and the operation is fast and convenient, the configuration threshold of the router is also lowered, so the users unfamiliar with special terminologies can easily master the router.

Patent
07 Feb 2014
TL;DR: In this paper, a browser-based application interface portal provides users a single, unified portal for accessing software applications running on different operating systems, hosted servers, and third party servers, as well as web applications.
Abstract: Systems and methods are provided for managing multiple software applications. A browser-based application interface portal provides users a single, unified portal for accessing software applications running on different operating systems, hosted servers, and third party servers, as well as web applications. The executed applications may then be integrated into the portal. The data retrieved from external web applications may be filtered, reformatted, and restyled to provide only the information of interest to the user and to provide a more consistent interface for the information.

Patent
26 Mar 2014
TL;DR: In this paper, a method and a system for authenticating application software of an Android platform on the mobile internet is presented, which comprises receiving by an authentication server a signature request of the application software, generating a key pair and sending a public key and an application identifier to a certificate authority center, receiving a signature certificate, signing a digital signature on the application code by using a private key, downloading by a terminal the signed application software and inquiring the installation information of the signed code according to a process identifier, acquiring a user identifier from installation information, judging whether a corresponding relation
Abstract: The invention discloses a method and a system for authenticating application software of an Android platform on the mobile internet. The authenticating method comprises receiving by an authentication server a signature request of the application software, generating a key pair and sending a public key and an application identifier to a certificate authority center, receiving a signature certificate, signing a digital signature on the application software by using a private key, downloading by a terminal the signed application software, inquiring the installation information of the application software according to a process identifier, acquiring a user identifier from the installation information, judging whether a corresponding relation of the application identifier, the process identifier and the user identifier of the application software is stored, if not, then verifying the signature certificate and using the public key to check, establishing and storing the corresponding relation of the application identifier, the process identifier and the user identifier of the application software when the checking is successful, processing the business request and returning the business processing result. When the technical scheme of the invention is implemented, the authenticity, the integrality and the anti-counterfeit property of the source of the application software are guaranteed.

Patent
26 Mar 2014
TL;DR: In this article, an application software cloud testing system consisting of a task submission subsystem, a task scheduling subsystem, and a task execution subsystem is presented, based on the characteristics of the application software of a mobile terminal, testing content of four different types can be supported simultaneously, and therefore the comprehensiveness of the cloud testing result of application software is guaranteed.
Abstract: The invention belongs to the technical field of information, and provides an application software cloud testing system The application software cloud testing system comprises a task submission subsystem, a task scheduling subsystem and a task execution subsystem The task submission subsystem is used for testing test tasks submitted by testing personnel, the test tasks indicate the types of the test tasks, and the types of the testing tasks comprise compatibility testing, performance testing, and function testing or quality testing of application software The task scheduling subsystem is used for conducting task scheduling according to the test tasks submitted by the task submission subsystem The task execution subsystem is used for executing the test tasks according to the task scheduling condition of the task scheduling subsystem and collecting and generating corresponding testing reports according to the types of the testing tasks According to the application software cloud testing system, based on the characteristics of the application software of a mobile terminal, testing content of four different types can be supported simultaneously, and therefore the comprehensiveness of the cloud testing result of the application software is guaranteed

Book ChapterDOI
03 Nov 2014
TL;DR: This paper presents two approaches to information extraction from online vulnerability databases: a machine learning based solution and a solution that exploits linguistic patterns elucidated by part-of-speech tagging.
Abstract: Online vulnerability databases provide a wealth of information pertaining to vulnerabilities that are present in computer application software, operating systems, and firmware. Extracting useful information from these databases that can subsequently be utilized by applications such as vulnerability scanners and security monitoring tools can be a challenging task. This paper presents two approaches to information extraction from online vulnerability databases: a machine learning based solution and a solution that exploits linguistic patterns elucidated by part-of-speech tagging. These two systems are evaluated to compare accuracy in recognizing security concepts in previously unseen vulnerability description texts. We discuss design considerations that should be taken into account in implementing information retrieval systems for security domain.

Journal ArticleDOI
11 Jun 2014
TL;DR: The CernVM File System (CernVM-FS) as discussed by the authors decouples the distribution from the experiment software from the building and distribution of the VM hard disk images, which can also be used to host and boot a Linux operating system.
Abstract: The traditional virtual machine (VM) building and and deployment process is centered around the virtual machine hard disk image. The packages comprising the VM operating system are carefully selected, hard disk images are built for a variety of different hypervisors, and images have to be distributed and decompressed in order to instantiate a virtual machine. Within the HEP community, the CernVM File System (CernVM-FS) has been established in order to decouple the distribution from the experiment software from the building and distribution of the VM hard disk images. We show how to get rid of such pre-built hard disk images altogether. Due to the high requirements on POSIX compliance imposed by HEP application software, CernVM-FS can also be used to host and boot a Linux operating system. This allows the use of a tiny bootable CD image that comprises only a Linux kernel while the rest of the operating system is provided on demand by CernVM-FS. This approach speeds up the initial instantiation time and reduces virtual machine image sizes by an order of magnitude. Furthermore, security updates can be distributed instantaneously through CernVM-FS. By leveraging the fact that CernVM-FS is a versioning file system, a historic analysis environment can be easily re-spawned by selecting the corresponding CernVM-FS file system snapshot.

Book ChapterDOI
22 Jun 2014
TL;DR: The conceptual model and the software-hardware architecture with levels and components of the universal assistive technology are described and several multimodal systems and interfaces to the people with disabilities are proposed.
Abstract: In this paper, we present a universal assistive technology with multimodal input and multimedia output interfaces. The conceptual model and the software-hardware architecture with levels and components of the universal assistive technology are described. The architecture includes five main interconnected levels: computer hardware, system software, application software of digital signal processing, application software of human-computer interfaces, software of assistive information technologies. The universal assistive technology proposes several multimodal systems and interfaces to the people with disabilities: audio-visual Russian speech recognition system (AVSR), “Talking head” synthesis system (text-to-audiovisual speech), “Signing avatar” synthesis system (sign language visual synthesis), ICANDO multimodal system (hands-free PC control system), and the control system of an assistive smart space.

Patent
18 Dec 2014
TL;DR: In this article, the authors proposed a scheme to cooperate a peripheral device with a plurality of application software by using a command transmitter-receiver 111 transmitting/receiving a command to/from a peripheral devices D via a device driver 150 of the peripheral device D in place of the application software 130.
Abstract: PROBLEM TO BE SOLVED: To cooperate a peripheral device with a plurality of application software.SOLUTION: An information processing apparatus includes: a command transmitter-receiver 111 transmitting/receiving a command to/from a peripheral device D via a device driver 150 of the peripheral device D in place of application software 130; an application software identifying unit 112 identifying the application software 130 that needs the command received by the command receiver-transmitter 111 among a plurality of application software 130; and a command transmission unit 113 transmitting the command to the application software 130 identified by the application software identifying unit 112.

Patent
23 Apr 2014
TL;DR: In this paper, an intelligent interactive robot system based on cloud computing and an interactive method is presented. The system comprises a cloud service platform, at least a robot body and IT robots.
Abstract: The invention discloses an intelligent interactive robot system based on cloud computing and an interactive method. The system comprises a cloud service platform, at least a robot body and IT robots. The robot body and the IT robots are respectively communicated with the cloud service platform. The robot body comprises a far-end control module and a universal?transducer?interface which are connected with each other. The robot body is in information interaction or service interaction with the IT robots through network communication. The IT robots comprise other robots or equipment in a same surrounding space or different remote spaces except the robot body. The cloud service platform is provided with a shared service storage area used for realizing information sharing with the robot body or among the other robots. Application software and data information of the service robot can be independent of the robot body and are provided by the cloud service platform. High-speed big data service based on cloud computing is provided to meet diversity requirements of users.

Patent
26 Mar 2014
TL;DR: In this article, a wireless network based access control system is described in which users open and close the automatic gates and the automatic barriers through application software in the user mobile terminals by using a Wi-Fi (Wireless Fidelity) or Bluetooth technology.
Abstract: The invention discloses a wireless network based access control system. The access control system comprises automatic gates, automatic barriers, a server platform system, access control application software loaded user mobile terminals, a community gateway and an administrator terminal and is characterized in that users open and close the automatic gates and the automatic barriers through application software in the user mobile terminals by using a Wi-Fi (Wireless Fidelity) or Bluetooth technology; during the process of starting up the application software in the user mobile terminals by the users, the community gateway can send notice and advertising information to the user mobile terminals, and the users view the content of the information through the application software; idle parking spaces of designated parking lots and the advertising information of surrounding dealers can be inquired and reserved through the user mobile terminals; by using a Wi-Fi or Bluetooth ranging technology, after the users leave the predetermined distance of the community gateway, the community gateway automatically sends commands to close the automatic gates and the automatic barriers.

Patent
26 Mar 2014
TL;DR: In this article, a method and device for starting application software is presented, which includes a naming space icon corresponding to the application software and a preloading configuration table of application software.
Abstract: The invention provides a method and device for starting application software. The method includes that a naming space icon corresponding to the application software is generated for the application software, and a preloading configuration table of the application software is set; a shortcut of the naming space icon is configured to be in the mode that when an operation system is started or a desktop of the operation system is refreshed, a module of the application software and / or a resource file of the application software are / is loaded into a memory of the operation system according to the preloading configuration table; when the application software is started, the preloaded module of the application software and / or the resource file in the memory are / or called. According to the method and device, time used for loading the assembly and / or the resource file when the software is started can be saved, the starting speed of the application software is improved, and the method and device are suitable for all application software and can improve user experience.