395 research outputs found
Debugging Memory Issues In Embedded Linux: A Case Study
Debugging denotes the process of detecting root causes of unexpected
observable behaviors in programs, such as a program crash, an unexpected output
value being produced or an assertion violation. Debugging of program errors is
a difficult task and often takes a significant amount of time in the software
development life cycle. In the context of embedded software, the probability of
bugs is quite high. Due to requirements of low code size and less resource
consumption, embedded softwares typically do away with a lot of sanity checks
during development time. This leads to high chance of errors being uncovered in
the production code at run time. In this paper we propose a methodology for
debugging errors in BusyBox, a de-facto standard for Linux in embedded systems.
Our methodology works on top of Valgrind, a popular memory error detector and
Daikon, an invariant analyzer. We have experimented with two published errors
in BusyBox and report our findings in this paper.Comment: In proceedings of IEEE TechSym 2011, 14-16 January, 2011, IIT
kharagpur, Indi
Basel II and bank lending behavior: some likely implications for monetary policy
The new Basel accord is slated to come into effect in India around 2007 raising the question of how the revised standards will influence bank behaviour. Using a simple theoretical model, it is shown that the revised accord will result in asymmetric differences in the efficacy of monetary policy in influencing bank lending. This will, however, depend on a number of factors, including whether banks are constrained by the risk-based capital standards, the credit quality of bank assets and the relative liquidity of banksā balance sheets. The basic model is empirically explored using data on Indian commercial banks for the period 1996-2004. The analysis indicates that the effect of a contractionary monetary policy will be significantly mitigated provided the proportion of unconstrained to constrained banks in the system is significantly high.banking; monetary policy; India
Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices
Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, I have proposed a new hybrid graphical password based system. The system is a combination of recognition and pure recall based techniques and that offers many advantages over the existing systems and may be more convenient for the user. My approach is resistant to shoulder surfing attack and many other attacks on graphical passwords. This scheme is proposed for smart hand held devices (like smart phones i.e. PDAs, ipod, iphone, etc) which are more handy and convenient to use than traditional desktop computer systems. Keywords: smart phones, graphical passwords, authentication, network securit
Publication of Tagoreās song offerings, the Gitanjali : A Study
oai:ojs.localhost:article/278Before establishment of Visva Bharati Granthan Vibhaga (VBGV) in 1923, Rabindranath Tagoreās writings werepublished by his friends and family members and Adi Brahmasamaj Jantra (Press of Brahmasamaj, Calcutta). Rabindranath(1861-1941) received the Nobel Prize for Gitanjali (Song Offerings) in 1913 which is a collection of poems from differentkavyagrantha (book of poems). Copyright of Rabindranath Tagoreās works given to Visva-Bharati expired in December2001. Private publishers have been free to publish the writings of Rabindranath Tagore since then. The present paper is anattempt to assess the quality of publication of Gitanjali published by private publishers before establishment of VBGV andafter expiry of copyright. It is observed that a small portion of Bengali publishers are publishing Gitanjali at a lower pricebut with good number of mistakes. Pre-VBGV publications also have mistakes
- ā¦