• 제목/요약/키워드: Developers

검색결과 1,739건 처리시간 0.028초

트라비아 온라인 게임의 퀘스트 엔진 구축 사례 (A Case Study on Quest Engine for Travia Online Game)

  • 이완복;노창현;손형률
    • 게임&엔터테인먼트 논문지
    • /
    • 제2권2호
    • /
    • pp.9-16
    • /
    • 2006
  • 본 논문에서는 RPG 게임에서 중요한 비중을 차지하는 퀘스트 엔진에 대해 트라비아 온라인 게임을 기준으로 구축한 사례에 대하여 살펴본다. 트라비아 퀘스트 엔진은 퀘스트의 클래스, 전제 조건, 수행 순서 등에 대해 효과적으로 명세할 수 있는 스크립트 언어를 정의하여 퀘스트를 모델링하고 수행할 수 있도록 지원한다. 본 연구에서 소개하는 퀘스트 시스템은 향후 유사 온라인 RPG 게임의 퀘스트 시스템을 제작할 시, 참고할 수 있는 하나의 가이드라인이 될 수 있다.

  • PDF

The ISDF Framework: Towards Secure Software Development

  • Alkussayer, Abdulaziz;Allen, William H.
    • Journal of Information Processing Systems
    • /
    • 제6권1호
    • /
    • pp.91-106
    • /
    • 2010
  • The rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

  • Park, Jaekwan;Suh, Yongsuk
    • Nuclear Engineering and Technology
    • /
    • 제46권1호
    • /
    • pp.47-54
    • /
    • 2014
  • The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

실측 데이터 기반 모션센서 에뮬레이터의 개발 (Development of Real-Data Motion Sensor Emulator)

  • 이민석
    • 대한임베디드공학회논문지
    • /
    • 제6권2호
    • /
    • pp.68-75
    • /
    • 2011
  • This paper describes the development of an open source motion sensor emulator. It helps developers to understand the motion sensor and its data better. Through this emulator, the realtime or stored motion sensor data can be applied to the applications that utilize motion sensors. The data of motion sensors which include accelerometer sensor, magnetic field sensor, gyro sensor, GPS, and so on, can be collected by using smart phones or motion sensors. We also describe a visualizer which shows various graphs, video and 3D animations based on the data sent by the emulator. It helps developers to understand motion sensors and how to use the sensors. The developed emulator is compatible with Android sensor simulator.

ePRO-OMP: OpenMP 응용 프로그램의 성능 및 에너지 분석 도구 (ePRO-OMP: A Tool for Performance/Energy PRofiler and Analyzer for OpenMP Applications)

  • 이영호;김지홍
    • 대한임베디드공학회논문지
    • /
    • 제6권5호
    • /
    • pp.287-293
    • /
    • 2011
  • As chip multiprocessors have been widely adopted in embedded systems, achieving both high performance and low power consumptions of parallel applications becomes challenging. In order to meet these requirements, it is crucial for developers to analyze the performance and energy consumption of parallel applications. In this paper, we propose a tool for profiling and optimizing the performance and energy consumption of OpenMP applications (energy PROfiler and analyzer for OpenMP: ePRO-OMP). The main advantage of ePRO-OMP is that it can analyze both the performance and energy consumption of each parallel region of an OpenMP application, which can help developers find the bottleneck of parallel applications in detail.

Spring Boot 기반의 오픈소스 소프트웨어 보안 취약점 및 패치 정보 제공 웹 어플리케이션 개발 (Spring Boot-based Web Application Development for providing information on Security Vulnerabilities and Patches for Open Source Software)

  • 심완;최웅철
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.77-83
    • /
    • 2021
  • As Open Source Software(OSS) recently invigorates, many companies actively use the OSSes in their business software. With such OSS invigoration, our web application is developed in order to provide the safety in using the OSSes, and update the information on the new vulnerabilities and the patches at all times by crawling the web pages of the relevant OSS home pages and the managing organizations of the vulnerabilities. By providing the updated information, our application helps the OSS users and developers to be aware of such security issues, and gives them to work in the safer environment from security risks. In addition, our application can be used as a security platform to greatly contribute to preventing potential security incidents not only for companies but also for individual developers.

Designing a Comet-based Open API for Establishing RCS Chat Session

  • Lee, Dongcheul;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권1호
    • /
    • pp.8-16
    • /
    • 2019
  • As smartphone users grow, mobile operators are trying to standardize and commercialize Rich Communication Suite (RCS), which is a next-generation messaging service, so that it can replace legacy messaging services. However, it is not enough to spread RCS widely to the users only by publishing an RCS app. To increase the use of RCS, a web-based open API for common RCS capabilities is needed. By using the API, Internet-based developers can create applications that make use of the RCS capabilities with less effort and time. This paper proposes a lightweight Comet-based open API to allow mobile operators to expose useful information and capabilities to application developers. The system architecture of the open API framework and call flow between relevant nodes are defined. In addition, examples of protocol translations on the framework are provided.

A Study of Software Product Line Engineering application for Data Link Software

  • Kim, Jin-Woo;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.65-72
    • /
    • 2018
  • In this paper, we have studied how to reuse common data link software by applying software product line engineering. Existing common data link software performed different stages of design, implementation, and testing without sharing the accumulated knowledge of different developers. In this situation, developers agreed that sharing the assets of each project and reusing the previously developed software would save human and time costs. Even with the initial difficulties, the common Data Link is a continually proposed project in the defense industry, so we decided to build a product line. The common data link software can be divided into two domains. Among them, the initial feature model for the GUI software was constructed, and the following procedure was studied. Through this, we propose a plan to build a product line for core assets and reuse them in newly developed projects.

Semantic Similarity-Based Contributable Task Identification for New Participating Developers

  • Kim, Jungil;Choi, Geunho;Lee, Eunjoo
    • Journal of information and communication convergence engineering
    • /
    • 제16권4호
    • /
    • pp.228-234
    • /
    • 2018
  • In software development, the quality of a product often depends on whether its developers can rapidly find and contribute to the proper tasks. Currently, the word data of projects to which newcomers have previously contributed are mainly utilized to find appropriate source files in an ongoing project. However, because of the vocabulary gap between software projects, the accuracy of source file identification based on information retrieval is not guaranteed. In this paper, we propose a novel source file identification method to reduce the vocabulary gap between software projects. The proposed method employs DBPedia Spotlight to identify proper source files based on semantic similarity between source files of software projects. In an experiment based on the Spring Framework project, we evaluate the accuracy of the proposed method in the identification of contributable source files. The experimental results show that the proposed approach can achieve better accuracy than the existing method based on comparison of word vocabularies.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.