279 research outputs found

    Towards an Efficient Context-Aware System: Problems and Suggestions to Reduce Energy Consumption in Mobile Devices

    Get PDF
    Looking for optimizing the battery consumption is an open issue, and we think it is feasible if we analyze the battery consumption behavior of a typical context-aware application to reduce context-aware operations at runtime. This analysis is based on different context sensors configurations. Actually existing context-aware approaches are mainly based on collecting and sending context data to external components, without taking into account how expensive are these operations in terms of energy consumption. As a first result of our work in progress, we are proposing a way for reducing the context data publishing. We have designed a testing battery consumption architecture supported by Nokia Energy Profiler tool to verify consumption in different scenarios

    Exploiting code mobility for dynamic binary obfuscation

    Get PDF
    Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to analyze and tamper with the application code. To address this research problem, we propose a novel binary obfuscation approach based on the deployment of an incomplete application whose code arrives from a trusted network entity as a flow of mobile code blocks which are arranged in memory with a different customized memory layout. This paper presents our approach to contrast reverse engineering by defeating static and dynamic analysis, and discusses its effectivenes

    A CPL to Java compiler for dynamic service personalization in JAIN-SIP server

    Get PDF
    Service personalization is a key feature of next generation networks: different standards and technologies have been proposed to meet this requirement in an easier and more flexible way. Among these, using standard APIs to abstract behavior of different network protocols and defining service behavior with scripting language can drive to a more flexible way to realize userpersonalization of call-handling policies. To reach this goal, this paper presents an efficient architecture and implementation of personalization policies, using standards like CPL (Call Processing Language) and JAIN-SIP. The novelty of this approach is the improvement of performances, enhancing a JAIN-SIP compliant proxy server with advanced Java features, like the dynamic remote class loading of profile objects. These are asynchronously generated by a CPL to Java compiler, in order to reduce overhead due to CPL interpretation and remote calls

    Service Composition Quality Evaluation in SPICE Platform

    Get PDF
    The goal of the SPICE project is to develop an extendable overlay architecture and framework to support easy and quick creation, and deployment of Telecommunication and Information Services. The SPICE Service Creation Environment (SCE) is used by developers to create both basic services and complex service compositions, which are then deployed in the SPICE Service Execution Environment (SEE), which hide the complexity of the communication environment. Along with its functional interface, each service exposes its own nonfunctional properties (like Response Time, Cost, Availability, etc...) by means of the SPATEL service description language. These properties are defined in an ontology and this chapter will discuss how the SCE helps developers in evaluating a service composition by calculating the aggregated values of such properties

    A large study on the effect of code obfuscation on the quality of java code

    Get PDF
    Context: Obfuscation is a common technique used to protect software against malicious reverse engineering. Obfuscators manipulate the source code to make it harder to analyze and more difficult to understand for the attacker. Although different obfuscation algorithms and implementations are available, they have never been directly compared in a large scale study. Aim: This paper aims at evaluating and quantifying the effect of several different obfuscation implementations (both open source and commercial), to help developers and project managers to decide which algorithms to use. Method: In this study we applied 44 obfuscations to 18 subject applications covering a total of 4 millions lines of code. The effectiveness of these source code obfuscations has been measured using 10 code metrics, considering modularity, size and complexity of code. Results: Results show that some of the considered obfuscations are effective in making code metrics change substantially from original to obfuscated code, although this change (called potency of the obfuscation) is different on different metrics. In the paper we recommend which obfuscations to select, given the security requirements of the software to be protected

    Rule-based monitoring and error detecting for converged telecommunication processes

    Get PDF
    Convergent process may be defined as a composition of services which integrates functionalities from Web and Telecommunication domains. However, during execution of convergent processes some services may fail; in such cases a reconfiguration process must be triggered to recover normal behaviour of composite process. Previous works have developed mechanisms for reducing reconfiguration time while initial restrictions are maintained; this is achieved by replacing regions of services instead of individual services. The present work presents an approach for monitoring and error detecting in convergent processes using rule production systems based on ITIL model. The approach was tested in the monitoring module of the AUTO framework, whose architecture and performance are discussed to show that this approach can efficiently detect errors and repair convergent processes in telecom environments

    A visual semantic service browser supporting user-centric service composition

    Get PDF
    Follow the promising Web 2.0 paradigm, the telecommunications world also wants to implement the Telco 2.0 vision by inviting its users to actively participate in the creating and sharing of services accessible using handheld devices. The EU-IST research project OPUCE (Open Platform for User-Centric Service Creation and Execution) aims at providing end users with an innovative platform which allows an easy creation and delivery of personalized communication and information services. This paper introduces a novel visual semantic service browser built on top of the OPUCE service repository which enables intuitive visualized service exploring and discovery while requires no technical semantic Web knowledge from the user

    UML requirements for Distributed Software Architectures

    Get PDF
    The use in various projects of UML as the modeling notation for representing software systems, revealed the need for additional constructs and architectural views, especially in the field of distributed software architectures. This article identifies a list of requirements toward UML, which we find appropriate especially in its current standardization stage

    First International Workshop on Telecom Service Oriented Architectures (TSOA-07)

    Get PDF
    Telecommunication services and network features are often tightly coupled, separate, and vertically integrated. This vertical approach has an extremely weakening effect on service provider’s ability to develop more complex services that could span over heterogeneous telecom networks and IT services

    Automated Reasoning on Aspects Interactions

    Get PDF
    The aspect-oriented paradigm allows weaving aspects in different join points of a program. Aspects can modify object fields and method control flow, thus possibly introducing subtle and undesired interactions (conflicts) among aspects and objects, which are not easily detectable. In this paper we propose a fully automated approach to discover conflicts among classes and aspects directly from Java bytecode. The novelty of this work is the usage of a rule engine for identifying possible conflicts among advices, methods, and fields. The knowledge base is obtained through static analysis of classes and aspects bytecode. The possible conflicts are represented by means of rules that can be easily extended and customized
    • 

    corecore