The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates two metrics related to the traceability relationships that exist between requirements and architectural design. In particular, we look into cross-cutting requirements, i.e., requirements that are implemented by several components, and, conversely, into overloaded components, i.e., components that implement several requirements. The intuition is that intricate dependencies between...
The template matching is an important technique used in pattern recognition. It aims at finding a given pattern within a frame sequence. Pearson's Correlation Coefficient (PCC) is widely used to evaluate the similarity of two images. This coefficient is computed for each image pixel, which entails a computationally very expensive process. This paper proposes an implementation of the template matching...
Software testing is designed in various company hierarchy, such as end product/service providers and subcontractors. An end product/service providers generally has a severe responsibility for their software quality, while a subcontractor has a limited responsibility. There can be a hypothesis that there is differences in software quality between service providers and subcontractors. To examine the...
Applying encapsulation techniques lead to software systems in which the majority of changes are localized, which reduces maintenance and testing effort. In the evaluation of implemented software architectures, metrics can be used to provide an indication of the degree of encapsulation within a system and to serve as a basis for an informed discussion about how well-suited the system is for expected...
This case study combines known software structure and revision history analysis techniques, in known and new ways, to predict bug-related change frequency, and uncover architecture-related risks in an agile industrial software development project. We applied a suite of structure and history measures and statistically analyzed the correlations between them. We detected architecture issues by identifying...
Software organizations are moving to a process oriented approach to develop its products. Many improvement technologies have emerged as a response in a multimodel environment. The term improvement technology is used to refer in general to the long list of reference models, standards, best practices, regulatory policies and other types of practices that an organization may use simultaneously (i.e....
With the widespread use of information, variety of security logs have increased greatly, which due need for security log management. Organizations requirements have imposed to collect, store, and analyze tremendous volumes of log data across entire infrastructure for extended durations and at increasingly granular levels. It is the process of generating, transmitting, storing, analyzing, and disposing...
Aspect-oriented programming (AOP) aims to improve software modularity, although developers can unwittingly intro-duce code smells in their programs. A code smell is any symptom in the source code that possibly indicates a deeper modularity problem. Several works have been concerned about code smell occurrences in aspect-oriented systems. However, there is little knowledge about their actual damage...
Over the past years, software development practices include open source code reuse. Since documentation gives little or no information about the system architecture, a prohibitive amount of effort is required to comprehend the source code and the overall system architecture. In this paper, we investigate how design metrics can reveal architectural information about a software system and more specifically,...
Service-Oriented Computing is known as a new computing paradigm that utilizes existing services as fundamental elements for developing distributed applications based on the so-called "use, not own" manner. In this paper, services are classified into three levels in accordance with different business requirements. Services are assembled by choosing lower-level services or other services at...
To ensure a consistent correlation between the requirements model and the architecture representation of Software Product Lines (SPL), this paper proposes an integration between goal models (described in PL-AOV-Graph) and architectural specification (described in PL-AspectualACME). We define the mapping process between these models and transformation rules between their elements. We also present a...
Refactoring tends to avoid the early deviation of a program from its intended architecture design. However, there is little knowledge about whether the manifestation of code smells in evolving software is indicator of architectural deviations. A fundamental difficulty in this process is that developers are only equipped with static analysis techniques for the source code, which do not exploit traceable...
Previous distributed anomaly detection efforts have operated on summary statistics gathered from each node. This has the advantage that the audit trail is limited in size since event sets can be succinctly represented. While this minimizes the bandwidth consumed and helps scale the detection to a large number of nodes, it limits the infrastructure's ability to identify the source of anomalies. We...
A concern is any consideration that can impact the software architecture and other artefacts. Sustaining stability of concerns realised in architectural designs is essential to obtain long-lasting software products. It is often assumed that concern assessment mechanisms are effective to predict architecture stability. They ought to exert a positive or detrimental effect on software stability. In fact,...
The software product line (PL) architecture (PLA) is one of the most important PL core assets as it is the abstraction of the products that can be generated, and it represents similarities and variabilities of a PL. Its quality attributes analysis and evaluation can serve as a basis for analyzing the managerial and economical values of a PL. We proposed metrics for PLA complexity and extensibility...
Analogical reasoning systems can be used to increase the efficiency of planning, infer missing structure in test cases, and classify cases across domains. However, analogical reasoning can be computationally expensive. We describe an approach for implementing the SAGE?? analogical reasoning system on a parallel recirculating computer architecture.
The paper provides an insight to implementation framework and a test-bed of multi-channel correlation on high-performance CPU+FPGA hybrid platform. Solution based on commodity PC, PCIe Altera Stratix II GX board, and C-to-HDL tool has been demonstrated.
We present a practical, systematical method for the evaluation of the soft error rate (SER) of microelectronic devices. Existing methodologies, practices and tools are integrated in a common approach while highlighting the need for specific data or tools. The showcased method is particularly adapted for evaluating the SER of very complex microelectronic devices by engineers confronted to increasingly...
We assessed the effects of the addition of dynamic visual elements and sounds to a levee patroller training game on the appraisal of the environment and weather conditions, the engagement of the users and their performance. Results show that the combination of visual dynamics and sounds best conveys the impression of severe weather conditions and most strongly influences the appraisal of the environment...
The challenges of deriving early-adopter competitive advantage, even with fabless access to process technology, through leveraging features offered by the advanced, and possibly disruptive, process technologies in real SoC products, are outlined. A structured methodology for addressing these challenges, and bridging the gap between process and design, sufficiently early in the development cycle to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.