Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Acoustic scene classification (ASC) has attracted growing research interest in recent years. Whereas the previous work has investigated closed-set classification scenarios, the predominant ASC application is open-set in nature. The contributions of the paper are (i) the first investigation of ASC in an open-set scenario, (ii) the formulation of open-set ASC as a detection problem, (iii) a classifier...
Serious Games (SGs) have been widely adopted in cultural settings and museums, especially the last five years. It is expected that SG can link directly the museum content with target user groups and can fulfill their educational needs. This paper aims to present a systematic mapping study on modern museum gaming technologies and applications. More specifically, focus is given on the use of Serious...
The presented application aims to ease the testing process performed over the diagnostic services on CAN. With the help of automated tests, diagnostic service requests can be generated and, through the feedback from the ECU, one can determine the correlation between customer requirements and the current implementation. Using this application, the necessary time can be reduced from three days to half...
This paper addresses conformance testing of communication protocols. The Session Initiation Protocol (SIP) is often considered "the standard protocol" for deploying VoIP (Voice over IP) solutions. We implemented a popular SIP distributed scenario on an industrial test bed. Active testing of SIP maintains our attention, while we kept on experimenting with the test cases dependencies architecture...
Protocol conformance testing can be used to detect whether protocol implementations are conform to the protocol specification. 6LoWPAN neighbor discovery protocol is designed for neighbor discovery and address registration in low-power WPAN. In order to accomplish the conformance testing for this protocol, formal methods are introduced to model the entities in the protocol and an enhanced algorithm...
Many test selection criteria are considered for the derivation of functional tests for reactive systems and protocols modeled using formal techniques such as Extended Finite State Machines (EFSMs). In this paper, we consider three known EFSM specifications and analytically compare the effectiveness of many EFSM test suites. The assessment is conducted using EFSM mutants of these specifications, namely,...
Current researches on model-based testing mainly focus on the single component model, such as FSM (Finite State Machine) and EFSM (Extended FSM). To model and test parallelism and concurrency among different protocol components, traditional CFSM (Communicating FSMs) models communication as asynchronous message exchange, which is not suitable for the scenario that parallel protocol components read...
MMT (Mont image Monitoring Tool) is a monitoring solution that combines: data capture, filtering and storage, events extraction, statistics collection, traffic analysis and reporting. In the context of the PIMI and DIAMONDS projects, Mont image is developing MMT-Security: a security analysis solution (part of MMT) that inspects network traffic against a set of security properties denoting both security...
Variable length messages have been in use for a long time for efficient delivery of information. As there are many different ways, with varying complexity, to utilize message length variability, it is crucial to thoroughly test the capability of the parsers of such messages to ensure that they correctly handle the variability. However, testing techniques for message length variability were developed...
In recent years Web-based systems have become extremely popular and, nowadays, they are used in critical environments such as financial, medical, and military systems. As the use of Web applications for security-critical services has increased, the number and sophistication of attacks against these applications have grown as well. For this reason it is essential to be able to prove that the target...
Service applications are applicable to provide services for requests of users from network. Due to the fact that they have to endure a big number of concurrent requests, the performance of service applications running under specific arrival rate of requests should be assessed. To measure the performance of a service application, multi-party testing context is needed to simulate a number of concurrent...
In this paper we define simulation relations for distributed systems. Taking as starting point our previous work on the distributed testing architecture, we introduce novel simulation relations that can be used to define, given a specification, what a good implementation is. We approach the problem from two different perspectives. First, we consider that different ports of the system cannot share...
The existence of predicate and conditional statements of the protocol transition specified in EFSM model results in the generation of infeasible State Identification Sequence using traditional methods. Thus, how to automatically generate executable State Identification Sequences, in an efficient and effective way, becomes the critical issue for protocol conformance testing. In this paper, we present...
Latent semantic analysis (LSA) is a vector space technique for representing word meaning. Traditionally, LSA consists of two steps, the formation of a word by document matrix followed by singular value decomposition of that matrix. However, the formation of the matrix according to the dimensions of words and documents is somewhat arbitrary. This paper attempts to reconceptualize LSA in more general...
This paper studies model-based input-output conformance testing in the presence of queues. Normally, it is assumed that a test case communicates synchronously with an implementation under test. This causes some challenges in practice, since testing is often conducted asynchronously. In an asynchronous environment messages between a tester and the implementation are queued. This may lead to incorrect...
Testing network-based security tools such as intrusion detection and prevention systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to issues like traffic composition, contents,...
Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP services, an inter-domain authentication mechanism is defined in RFC 4474. However, this mechanism introduces another vulnerability: a timing attack which can be used for effectively revealing the calling history of a group...
This paper presents a simple and improved technique of interface fault insertion for conducting component integration testing through the use of aspect-oriented software development (AOSD). Taking the advantage of aspect's cross-cutting features, this technique only requires additional codes written in AspectJ rather than having a separate tool to perform this operation. These aspect codes act as...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.