• Title/Summary/Keyword: Library call

Search Result 52, Processing Time 0.022 seconds

A Study on Effectiveness Enhancement of Organization thru Service Quality of Service Desk (Service Desk의 서비스 품질이 조직의 업무 효율성 증대에 미치는 영향에 관한 연구)

  • Kim, Dong-Chul;Gim, Gwang-Yong;Rim, Seong-Taek
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.17-40
    • /
    • 2009
  • This study is to guide to estimate service quality on ITSM operation based on ITIL(IT Infrastructure Library). ITIL v2 and v3 provide how to integrate framework of IT service and business process. It is widely used as ITSM operation base. As a latest IT trend, ITSM covers Hardware, Software, SaaS, Network, Call center, Helpdesk, ASP portal and IT operation. Servicedesk is selected as target area where valid sampling is addressable and service change is rapid. Traditional Helpdesk was focusing on technical support to solve internal IT issues passively. But it was evolved into Service Desk which focus in process and provide integrated service from customer's business view point preventively and proactively. Accordingly outsourcing types business are normally performed by group of professional capability. Service quality is measured under the SLA(Service Level Agreement). This study utilized SERVQUAL model as service quality measuring tool developed by Parasuraman, Zeitaml and Berry to find critical factors to satisfy customer. And test was processed regarding effectiveness of IT organization and customer view point thru sampling. Though valid parameters can be changed by ITSM areas under the SERVQUAL models, they naturally can be accepted as a index of service quality measurement after sampling test with acceptable significance. And I recommend to follow this study as a preparation before official SLA.

Virus Detection Method based on Behavior Resource Tree

  • Zou, Mengsong;Han, Lansheng;Liu, Ming;Liu, Qiwen
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.173-186
    • /
    • 2011
  • Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper divides virus behaviors into separate function modules by introducing DLLs into detection. APIs in different modules have different importance. DLLs and APIs are both considered program calling resources. Based on the calling relationships between DLLs and APIs, program calling resources can be pictured as a tree named program behavior resource tree. Important block structures are selected from the tree as program behavior features. Finally, a virus detection model based on behavior the resource tree is proposed and verified by experiment which provides a helpful reference to virus detection.

Detecting Android Emulators for Mobile Games (Focusing on Detecting Nox and LD Player) (모바일 게임용 안드로이드 에뮬레이터 탐지 기법 (Nox와 LD Player 탐지 기법 중심으로))

  • Kim, Nam-su;Kim, Seong-ho;Pack, Min-su;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Many game and financial apps have emulator detection functionality to defend against dynamic reverse engineering attacks. However, existing Android emulator detection methods have limitations in detecting the latest mobile game emulators that are similar to actual devices. Therefore, in this paper, we propose a method to effectively detect Android emulators for mobile games based on Houdini module and strings of a library. The proposed method detects the two emulators, Nox and LD Player through specific strings included in libc.so of bionic, and an analysis of the system call execution process and memory mapping associated with the Houdini module.

Big Deal, Open Access, Google Scholar and the Subscription of Electronic Scholarly Contents at University Libraries (빅딜, 오픈액세스, 구글학술검색과 대학도서관의 전자학술정보구독)

  • Shim, Wonsik
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.4
    • /
    • pp.143-163
    • /
    • 2012
  • The dominant model of acquiring scholarly contents at academic libraries is so called big deal where libraries subscribe to a bundle of hundreds, if not thousands of journals in a multi-year contract with fixed annual rate increase. The bid deal, started in the mid-1990s, offered a number of advantages for academic libraries and their users. However, escalating prices for these packages have become a serious issue casting doubts about the sustainability of the subscription-based model. At the moment, it appears there is no viable alternative other than pay-per-view method that is being tested at some libraries. Libraries' budget situation will remain a key factor that might change the situation. Open access started in the 2000s as a vehicle to eliminate barriers to publishing and distributing peer-reviewed scholarly journal articles. Open access publishing is witnessing two-digit growth annually. Open access articles now occupy close to 20% of two major citation databases: Scopus and Web of Science. Google Scholar service, debuted in late 2004, is now a popular tool for discovering and accessing scholarly articles from a vast selection of journals around the world. There is a call for taking Google Scholar seriously as a potential replacement of library databases amid concerns regarding the quality of journals indexed, limited search capabilities vis-$\grave{a}$-vis library databases, and monopoly of public goods. Escalating budget problems, rapid growth of open access publishing and the emergence of powerful free tool, such as Google Scholar, need to be taken seriously as these forces might bring disruptive changes to the existing subscription-based model of scholarly contents at academic libraries.

A Study on the Medium Designator In Non-book Materials (비도서자료의 매체표시에 관한 연구)

  • Nam Tae Woo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.15
    • /
    • pp.119-140
    • /
    • 1988
  • This paper is the study on the Medium Designator in Non-book materials. Main contents of this study were as follows; 1. The medium designator serves to indicate the class of material to which an item belongs. This is used to give an 'early warning' ;to the catalogue user. 2. This medium designator may be further divided into two elements ; a general material designation (GMD), for example video-recording, and a specific material designation (SMD), for example, videodisc. 3. GMD: In cataloging, a term indicating the broad class of material to which a bibliographic item belongs, such as 'motion picture', and SMD : In descriptive cataloging, a term indicating the special class of material (usually the class of physical object) to which a biblographic item belongs, such as videocassette. 4. Locating the medium designator after the title proper was not prescribed until ISBD(G) and AACR2. In pre-ISBD(G) codes, the ,early, warning type of medium designator was placed after all title information. But in AACR2, the medium designator is placed after the title proper, but before parellel title and other title information. 5. In Terminology, Two separate lists of designations are given in AACR2, l.1C1, one for British and one for North American use. The British list contains fewer terms, and uses generic categories to group together some of the North American list. 6. The problem of where to place the medium designator might be circumvented by using some kind of early alerting device other than a formal element of biblliographic description. Various alternatives have been suggested. A more popular device is the provision of symbols or 'media code' which are part of the call number and indicate the porticular medium type. 'Colour-coding' the use of used by some libraries but is now longly discouraged. 7. According to Frost. The medium designatorhas been generally reeognized as serving three functions; 1) as a statement of the nature or basic format of the item cataloged and thus as a meant of informing the user as to the type of material at hand; 2) as a description of the physical charaetistics of medium and as a means of alerting the user to equipment needed to make use of the item. 3) as a device to distinguish different physical formats which share the same title. 8. AACR2 raises some problems which decision makers have neet had to face preriously It provides a GMD for every item in the collection including books and it makes the application of any or all GMD's optional.

  • PDF

MSCTest: An Automated Testing Tool for Embedded Software (MSCTest: 내장 소프트웨어 테스트를 위한 자동화 도구)

  • Lee, Nam-Hee;Seo, Sun-Ae;Kim, Tae-Hyo;Cha, Sung-Deok;Lee, Jae-Won;Park, Ki-Woong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.187-195
    • /
    • 2000
  • Embedded software generates its outputs using current states of the system as well as external inputs. When a module in embedded software is tested, we need an automated testing tool, which generates possible sequences to reach the module as well as input data of the module, to reduce the testing time and to improve the quality of software. In this paper, we use decision table to specify the functionality of the module and data-annotated MSC (Message Sequence Charts) to describe scenarios, and implement a tool, which we call MSCTest, to automate the testing process. MSCTest consists of MSC graphic editor, test sequence and data generator, and test driver generator. MSCTest is effectively applied to test EsWin which is a kind of window library used in embedded systems.

  • PDF

A Performance Analysis Framework Considering the Hierarchy of Embedded Linux Systems Software Architecture (임베디드 리눅스 시스템의 소프트웨어 계층구조를 고려한 성능 분석 프레임워크)

  • Kwak, Sang-Heon;Lee, Nam-Seung;Lee, Ho-Rim;Lim, Sung-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.637-647
    • /
    • 2010
  • Recent embedded systems are being more complicated due to their hierarchical software architecture including operating systems. The performance of such complicated software architecture could not be well analyzed through separate analysis of each software layer; the combined effect and the interactions among the whole software layers should be considered. In this paper, we show the design and implementation of a performance analysis framework that enables hierarchical analysis of performance of Linux-based embedded systems considering interactions among the software layers. By using the proposed framework, we can obtain useful run-time information about a hierarchical software structure which usually consists of user-defined function layer, library function layer, system call layer, and kernel events layer. Experimental results reveal that the proposed framework could accurately identify the performance bottlenecks with the corresponding software layers during executions of target applications through the accompanying sub-steps of the analysis: the actual execution paths, the execution time of each observed event in each software layer, and the control flows across the software layers.

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

A Remote Debugging Scheme for Multi-process Applications in Linux Environments (리눅스 환경에서의 다중 프로세스 응용에 대한 원격 디버깅 기법)

  • 심현철;강용혁;엄영익
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.630-638
    • /
    • 2002
  • Debugging for application Programs running in embedded Linux systems has mostly been done remotely due to the limited resources of the target systems. The gdb, which is one of the most famous debugger in Linux systems, does not support the debugging of the child processes which is created by the fork system call in local and remote environments. Therefore, by using gdb, developers can debug the application programs that have single-process structure in local and remote environments, but they cannot debug the application programs that have multi-process structures by using gdb in remote environments. Also, although developers can debug the application programs that have multi-process structures by using gdb in local environments, it needs additional and unnecessary codings. In this paper, we presents the remote debugging scheme that can be used for debugging multi-process structured applications. The proposed scheme is implemented by using the library wrapping scheme, and also uses the conventional system components such as gdb and gdbserver.

Online Catalog Use Study in a University Library (대학도서관의 온라인목록 이용특성에 관한 연구 -덕성여자대학교를 중심으로-)

  • Yoo Jae-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.289-318
    • /
    • 1997
  • The purpose of this study is to identify users behavioral characteristics for using the online catalog opened in May 1996 at Duksung Women's University Library. 278 student users were surveyed from October 4th to 8th in 1996. Major findings are as follows. 1. Most users$(87.4\%)$ prefer the online catalog to the card catalog and regard the online catalog easy to use$(89.6\%)$ 2. $(65.8\%)$ of users are active users who frequently use the online catalog at least 10 times or more per semester. 3. $10.4\%$ of users feel the online catalog difficult because they do not know how to use it. 4. Most users prefer the menu search mode among menu, command and fill-in-blank search modes offered by DISCOVER. The most preferred access points are the title for known-item search and subject headings for subject search. 5. User's attitude toward the online catalog is very favorable$(83.5\%)$, however, the search success rate is rather low $(77.0\%)$ compared to that of the card catalog $(87.0\%)$ 6. The title and author are regarded easy to use among access points offered by DISCOVER. Classification numbers and call numbers are the least easy access points to use. 7. Since users show lack of knowledge of how to use the online catalog, education and training programs on the online catalog use for users are needed. 8. Users showed different search patterns for pursuing different search goals. The most preferred access points are the title for known-item search and subject headings for subject search. These search behaviors are different from those in using the card for both the known-item search and subject search was the title.

  • PDF