Time filter

Source Type

Novikov E.M.,Institute for System Programming
Programming and Computer Software

This paper describes an approach to implementation of aspect-oriented programming (AOP) frameworks for C, outlines traditional AOP facilities for different programming languages, and shows how specific features of C and a build process of C programs affect AOP implementations. Next, we consider additional requirements imposed by a practical application of AOP implementations for C programs. Existing solutions are described and possibility of their use is analyzed. The paper describes a new AOP tool for C that implements the proposed approach and demonstrates its capabilities. © 2013 Pleiades Publishing, Ltd. Source

Nedumov Y.R.,Institute for System Programming | Turdakov D.Y.,Institute for System Programming | Maiorov V.D.,Institute for System Programming | Ovchinnikov P.E.,Moscow Institute of Physics and Technology
Programming and Computer Software

Data normalization is a laborious and costly process taking place in master data management soft-ware development in enterprises. We analyze the subtasks of the normalization and propose an approach to automating the most laborious of these subtasks. Also, we describe a software system implementing the proposed approach and automatically learning the expert skills. © 2013 Pleiades Publishing, Ltd. Source

Astrakhantsev N.A.,Institute for System Programming | Turdakov D.Y.,Institute for System Programming
Programming and Computer Software

The conceptualization of knowledge required for an efficient processing of textual data is usually represented as ontologies. Depending on the knowledge domain and tasks, different types of ontologies are constructed: formal ontologies, which involve axioms and detailed relations between concepts; taxonomies, which are hierarchically organized concepts; and informal ontologies, such as Internet encyclopedias created and maintained by user communities. Manual construction of ontologies is a time-consuming and costly process requiring the participation of experts; therefore, in recent years, there have appeared many systems that automate this process in a greater or lesser degree. This paper provides an overview of methods for automatic construction and enrichment of ontologies, with the focus being placed on informal ontologies. © Pleiades Publishing, Ltd., 2013. Source

Efremov D.,Institute for System Programming | Pakulin N.,Institute for System Programming
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography

This project is an attempt to combine the advantages of software flexibility and security of hardware firewalls. It aims at the implementation of these advantages in the hypervisor source code for the purpose of creating user data confidentiality protection against its leakage from the personal computer through the network. The hypervisor implementation is based on the hardware virtualization extensions of both processors and motherboards. This constitutes a key feature, which enables hypervisor to combine the following advantages: the advantages of access to the OS environment and hardware protection against various intruders' methods of compromise, including those capable of exploiting OS kernel resources for performing the malicious actions. Source

Discover hidden collaborations