The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The society is in a state where learning has no limits and starts to overlap with technological developments. The recent advent of a connectivistic learning theory promises to shed light on how we learn in environments of interconnected knowledge and how the connectivity of concepts can guide the learning and conceptualization. This paper will have a look at a domain ontology-based approach to learning...
This paper tackles the problem of testing production systems, i.e. systems that run in industrial environments, and that are distributed over several devices and sensors. Usually, such systems lack of models, or are expressed with models that are not up to date. Without any model, the testing process is often done by hand, and tends to be an heavy and tedious task. This paper contributes to this...
The development of context-aware applications is a difficult and error-prone task. The dynamics of the environmental context combined with the complexity of the applications poses a vast number of possibilities for mistakes during the creation of new applications. Therefore it is important to test applications before they are deployed in a life system. For this reason, this paper proposes a testing...
Machine and plant automation (M&PA) is becoming more and more complex, especially, as additional functionality is realized by a rising amount of software. In order to meet high requirements regarding the quality of these machines and plants, sophisticated methods for quality assurance (QA) are needed. Interaction diagrams have been established throughout different domains for specifying use cases,...
Simulation-based approaches that require to drive the design under verification (DUV) to specific conditions, like for example, scenario-based testing and dynamic assertion-based verification (ABV), cannot rely on generic coverage-driven stimuli generators. On the contrary, constraint-based generation must be adopted. In this context, among several solutions, the Universal Verification Methodology...
Creating fine tuned and stable systems is very important and requires use of a list of testing tools that analyze various resources (like GC logs, heap dumps, native memory, etc). Due to the nature of those tools, this kind of analysis can only be performed by a small group of expert users that have high technical skills. In this paper we present an approach for expert tool development in the field...
The current development of interactive systems is shifting its focus into adding new features and capabilities, encompassing for example, new input devices and ways of interacting. Some applications make use of different modalities for both input and output, which adds great complexity to such systems. Due to a possible high number of input modalities and devices available, the task of combining all...
Web services are the element based in SOA (i.e., Service Oriented Architecture) applications that are commonly used in software systems. However the validation problem on quality of web services via testing has to be improved. This paper presents two tools for conformance testing of web services. One tool for unit testing that is implemented by an on-line approach. This tool can be used to test a...
Complex Event Processing (CEP) is a powerful technology for implementing real time applications. It offers efficient processing of occurring information pieces, so called events, based on an architecture that provides strong decoupling of its components: event producer, event processors and event consumer [4]. For this CEP is seen as an important contribution in future information systems. CEP applications...
In the product development process, test planning can be a time-consuming task, in particular, the test methods for product reliability are usually selected manually because many documents must be referred to when selecting suitable test methods. To make this process more efficient, we have been researched methods to support test planning. In this paper a new automatic selection method for test plans...
Symbolic techniques have been shown to be very effective in path-based test generation, however, they fail to scale to large programs due to the exponential number of paths to be explored. In this paper, we focus on tackling this path explosion problem and propose search strategies to achieve quick branch coverage under symbolic execution, while exploring only a fraction of paths in the program. We...
Model-based software engineering is an increasingly applied method in producing software artifacts that is driven by model transformation. For example, Model-Driven Architecture (MDA) is an approach to develop software based on different models. Source code is generated automatically from these models. This makes model transformations the heart of MDA and other model-based software engineering approaches...
The Oracle database enables use of bulk operation in order to reduce time needed for commands execution over a large amount of data. Operations are called using PL/SQL programming language. Advantage of these operations is that they transfer a large amount of data in a single step to SQL engine where they are executed. Bulk operation may also be used with a limitation to maximal number of lines transferred...
In Chinese language the key words error correction in searching engine is an important assisting function in improving the search efficiency. An information statistical method completely through analyzing the context is put forward. According to the features of Chinese language, based on the establishment of N-gram Statistics Model, analysis and comparison, through calculating the weightiness of TF/IDF,...
This paper presents a methodology to perform passive testing of behavioural conformance for the web services based on the security rule. The proposed methodology can be used either to check a trace (offline checking) or to runtime verification (online checking) with timing constraints, including future and past time. In order to perform this: firstly, we use the Nomad language to define the security...
In this paper, a framework for test data generation from business specification is presented. This framework separates data definition from their implementation and enables user to define logic and manage test data in a structural way. Data generation logic can be maintained and reused in different test scenarios. Test data with different format will be generated to integrate with other test automation...
Most current approaches to Web service discovery exploit description logic-based matchmaking algorithms. Until now, these Semantic Web Service technologies have not substituted for traditional search methods, because higher modeling costs, such as representing service annotation ontologies and domain ontologies, are required. In this paper, we present an automatic testing-based approach to the discovery...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.