127 research outputs found

    Debugging Memory Issues In Embedded Linux: A Case Study

    Full text link
    Debugging denotes the process of detecting root causes of unexpected observable behaviors in programs, such as a program crash, an unexpected output value being produced or an assertion violation. Debugging of program errors is a difficult task and often takes a significant amount of time in the software development life cycle. In the context of embedded software, the probability of bugs is quite high. Due to requirements of low code size and less resource consumption, embedded softwares typically do away with a lot of sanity checks during development time. This leads to high chance of errors being uncovered in the production code at run time. In this paper we propose a methodology for debugging errors in BusyBox, a de-facto standard for Linux in embedded systems. Our methodology works on top of Valgrind, a popular memory error detector and Daikon, an invariant analyzer. We have experimented with two published errors in BusyBox and report our findings in this paper.Comment: In proceedings of IEEE TechSym 2011, 14-16 January, 2011, IIT kharagpur, Indi

    Ray's Scheme: Graphical Password Based Hybrid Authentication System for Smart Hand Held Devices

    Get PDF
    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. One promising alternatives of textual passwords is a graphical based password. According to human psychology, human can easily remember pictures. In this paper, I have proposed a new hybrid graphical password based system. The system is a combination of recognition and pure recall based techniques and that offers many advantages over the existing systems and may be more convenient for the user. My approach is resistant to shoulder surfing attack and many other attacks on graphical passwords. This scheme is proposed for smart hand held devices (like smart phones i.e. PDAs, ipod, iphone, etc) which are more handy and convenient to use than traditional desktop computer systems. Keywords: smart phones, graphical passwords, authentication, network securit

    Physical verification as administrative and collection evaluation tool: A study ofInstitute of Agriculture Library; Visva-Bharati

    Get PDF
    This article is the result of an intensive stock verification of more than 50000 documents of an academic library(Institute of Agriculture; Visva-Bharati) established in 1957. The physical verification process includes physical noting of all accession number of books on and out of stack and use of LibSys software to generate reports. The paper highlights that physical verification of collection can help in identifying major areas of loss and thereby can help in framing administrative guideline for collection evaluation and management policy. The paper also urges for review of existing government rules regarding the loss of books and weed-out policy

    Publication of Tagore’s song offerings, the Gitanjali : A Study

    Get PDF
    Before establishment of Visva Bharati Granthan Vibhaga (VBGV) in 1923, Rabindranath Tagore’s writings werepublished by his friends and family members and Adi Brahmasamaj Jantra (Press of Brahmasamaj, Calcutta). Rabindranath(1861-1941) received the Nobel Prize for Gitanjali (Song Offerings) in 1913 which is a collection of poems from differentkavyagrantha (book of poems). Copyright of Rabindranath Tagore’s works given to Visva-Bharati expired in December2001. Private publishers have been free to publish the writings of Rabindranath Tagore since then. The present paper is anattempt to assess the quality of publication of Gitanjali published by private publishers before establishment of VBGV andafter expiry of copyright. It is observed that a small portion of Bengali publishers are publishing Gitanjali at a lower pricebut with good number of mistakes. Pre-VBGV publications also have mistakes
    • …
    corecore