Adaptive key frame extraction using unsupervised clustering

Y Zhuang, Y Rui, TS Huang… - … conference on image …, 1998 - ieeexplore.ieee.org
Key frame extraction has been recognized as one of the important research issues in video
information retrieval. Although progress has been made in key frame extraction, the existing …

State-of-the-art and New challenges in 5G networks with Blockchain Technology

S Onopa, Z Kotulski - Electronics, 2024 - mdpi.com
As mobile communications transform, 5G technology can potentially change many industries
and businesses. The change will have a great influence across many fields, such as the …

SBOM. EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java

A Sharma, M Wittlinger, B Baudry… - arXiv preprint arXiv …, 2024 - arxiv.org
Software supply chain attacks have become a significant threat as software development
increasingly relies on contributions from multiple, often unverified sources. The code from …

Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager

PC Amusuo, KA Robinson, S Torres-Arias… - arXiv preprint arXiv …, 2023 - arxiv.org
Integrating third-party packages accelerates modern software engineering, but introduces
the risk of software supply chain vulnerabilities. Vulnerabilities in applications' …

Scapegoat: an Adaptive monitoring framework for Component-based systems

I Gonzalez-Herrera, J Bourcier… - 2014 IEEE/IFIP …, 2014 - ieeexplore.ieee.org
Modern component frameworks support continuous deployment and simultaneous
execution of multiple software components on top of the same virtual machine. However …

ScapeGoat: Spotting abnormal resource usage in component-based reconfigurable software systems

I Gonzalez-Herrera, J Bourcier, E Daubert… - Journal of Systems and …, 2016 - Elsevier
Modern component frameworks support continuous deployment and simultaneous
execution of multiple software components on top of the same virtual machine. However …

Adaptive monitoring of end-user osgi-based home boxes

Y Maurel, A Bottaro, R Kopetz, K Attouchi - Proceedings of the 15th ACM …, 2012 - dl.acm.org
In-production performance monitoring is required for dynamic and modular systems open to
third-party applications such as the OSGi-based smart home box that home actors envision …

Application policy security mechanisms of Android system

L Sun, ST Huang, YW Wang… - 2012 IEEE 14th …, 2012 - ieeexplore.ieee.org
This article describes the basic structure of the Android and mobile devices on the
application environment. A preliminary analysis of the Android security control structure and …

[PDF][PDF] Linking sensor data to a cloud-based storage server using a smartphone bridge

D Rowlands, J Ride, M McCarthy, L Laakso… - … 2012, The Sixth …, 2012 - academia.edu
There is a need for systems that unify the processes of collecting, storing and analysing long-
term sensor data in multi-user contexts. The ubiquity and communication features of …

[PDF][PDF] Secure Use of Open-Source Software–A Systematic Study and Techniques for Java

AP Dann - 2023 - digital.ub.uni-paderborn.de
An established practice in modern software development is the use of open-source libraries
and frameworks. Even for commercial applications, up to 75% of the application's codebase …