Computer

Data Stream Clustering

Data Stream Clustering

Data Stream Clustering analyzes the advantages as well as limitations of data stream algorithms and suggests potential areas for future research. It faces many challenges and have to satisfy constraints such as bounded memory, single-pass, real-time response, and concept-drift detection. It is us.....

Read More »

Literate Programming

Literate Programming

Literate Programming can be regarded as an essayist, whose main concern is with exposition and excellence of style. Literate programming paradigm, the central activity of programming becomes that of conveying meaning to other intelligent beings rather than merely convincing the computer to behave.....

Read More »

Template Processor

Template Processor

This article talks about Template Processor, which is also known as a template engine or template parser. It is typically include features common to most high-level programming languages, with an emphasis on features for processing plain text. It is used in various contexts for different purposes.....

Read More »

Self Modifying Code

Self Modifying Code

This article talks about Self Modifying Code, which is a piece of software which achieves its goal by rewriting itself as it goes along. It is executing – usually to reduce the instruction path length and improve performance or simply to reduce otherwise repetitively similar code, thus simp.....

Read More »

Port Scanner

Port Scanner

Port Scanner is the name for the technique used to identify open ports and services available on a network host. It is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of […]<.....

Read More »

Ping of Death

Ping of Death

This article describe about Ping of Death, which is a type of network attack in which an attacker sends a network packet that is larger than what the target computer can handle. It is a method of using the ping command to freeze or reboot the computer by sending a packet greater than 65536 bytes......

Read More »

End-of-File

End-of-File

End-of-File is a code placed by a computer after a file’s last byte of data. It is either determined when the reader returns null as seen in Java’s BufferedReader, or sometimes people will manually insert an EOF character of their choosing to signal when the file has ended. EOF marks .....

Read More »

Buffer Overflow

Buffer Overflow

Buffer Overflow is probably the best known form of software security vulnerability. It occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. It can be triggered by inputs that are designed to execute code, or alter the wa.....

Read More »

Static Program Analysis

Static Program Analysis

This article talks about Static Program Analysis, which is the art of reasoning about the behavior of computer programs without actually running them. In most cases the analysis is performed on some version of the source code, and in the other cases, some form of the object code. In contrast, it .....

Read More »

Cohesion in Computer Programming

Cohesion in Computer Programming

Cohesion in Computer Programming refers to the level of strength and unity with which different components of a software program are inter-related with each other. Cohesion measures the strength of relationship between pieces of functionality within a given module. Cohesion of any software determ.....

Read More »

Modular Programming

Modular Programming

Modular Programming is a subset of procedural programming that enforces a logical structure on the program being written to make it more efficient and easier to understand and modify. It can often be used in a variety of applications and functions with other components of the system. It is closel.....

Read More »

Runtime Verification

Runtime Verification

Runtime Verification is an emerging research field with strong ties to Model Checking. It is a computing system analysis and execution approach based on extracting information from a running system and using it to detect and possibly react to observed behaviors satisfying or violating certain pro.....

Read More »