The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
CH-AVATAR is a context-aware platform for tourists and visitors of Cultural Heritage sites. Cultural Heritage objects (CH objects) become “alive” within the platform. They tell their stories and interact with tourists. The platform employs BLE beacons and the visitor's smartphone or tablet to create an interactive and adaptive Cultural Heritage experience for its end users. The paper makes a generic...
The application of Information Retrieval (IR) techniquesto software traceability link recovery has been the focusof many studies. These studies have formulated the task ofestablishing valid trace links between two types of softwareartifacts as a retrieval problem, where one type of artifacts isselected as the set of queries and the other as the corpus. Previouswork selected the sets of queries and...
This industrial research paper outlines an outcome of a machine leaning approach to dynamically generate context sensitive Application User Interfaces (Adaptive UI) on top of a monolithic enterprise software product.
Service chaining is one of the challenges in network function virtualization (NFV), where a sequence of middleboxes apply their service to particular traffic. The challenge of service chaining is that a middlebox may alter the content of packet headers; thus, the context of service chaining for particular traffic gets lost. This paper proposes Segmented Proactive Flow Rule Injection (SPFRI) using...
Software design patterns provide well-known solutions to recurring problems faced by developers. However, not all developers are proficient with the use of design patterns. To facilitate developers in this regard, we propose a design pattern usage examples retrieval system. The retrieval is based on analyzing the developer's development context to provide design pattern usage examples from projects...
We present an automated compositional program verification technique for safety properties based on conditional inductive invariants. For a given program part (e.g., a single loop) and a postcondition ϕ, we show how to, using a Max-SMT solver, an inductive invariant together with a precondition can be synthesized so that the precondition ensures the validity of the invariant and that the invariant...
The Entity-Component-System (ECS) pattern has become a major design pattern used in modern architectures for Real-Time Interactive System (RIS) frameworks. The pattern decouples different aspects of a simulation like graphics, physics, or AI vertically. Its main purpose is to separate algorithms, provided by high-level tailored simulation modules or engines, from the object structure of the low-level...
Home-based rehabilitation has evolved in recent years as a cost-effective and convenient alternative to traditional clinical rehabilitation. This has consequently created the need to design reliable assessment and adaptation mechanisms that are able to measure and analyze the patient’s performance and to accordingly make proper adjustments that conform to the abilities of the patient during the training...
Given the inability of application developers to foresee the changes as well as the heterogeneity on the underlying networking and computational infrastructure, it is considerable crucial the design and development of novel software paradigms that facilitate application developers to take advantage of the emerging programmability of the underlying infrastructure and therefore develop reconfigurable...
This article analyses the tasks of presenting and evaluating relevant scientific research in the field of Real-time Interactive Systems (RIS), i.e., in areas such as Virtual, Mixed, and Augmented Reality (VR, MR, and AR) and advanced Human-Computer Interaction. It identifies different methods for a structured approach to the description and evaluation of systems and their properties, including commonly...
Reusing software processes from a Software Process Line (SPL, i.e., a set of software processes that captures their commonalities and variabilities) and automating their execution is a way to reduce development costs. However, to our best knowledge no approach integrates both aspects. The difficulty is to automate the execution of a process whose variability is only partially resolved (i.e., a value...
The software of automotive equipment grows its scale and complexity. That increases risks to inject defects in its development and find them after shipping. Low cost solutions for software fault removal after shipping of the product are needed by manufacturers. This paper proposes a software update scheme by airwaves that enables automotive equipment to be updated without maintenance work at the factory...
We report in this case-study paper our experience and success story with a practical approach and tool for unit regression testing of a SCADA (Supervisory Control and Data Acquisition) software. The tool uses a black-box specification of the units under test to automatically generate NUnit test code. We then improved the test suite by white-box and mutation testing. The approach and tool were developed...
A complex system's requirements almost always remain uncertain late into its software development. In gas turbine engine control systems at Rolls-Royce, for a traditional project (non-product line) typically 50% of requirements will change between Critical Design Review and Entry into Service. Requirements uncertainty is particularly relevant when defining the scope of a Software Product Line. If...
Complex Event Processing (CEP) is a powerful technology for implementing real time applications. It offers efficient processing of occurring information pieces, so called events, based on an architecture that provides strong decoupling of its components: event producer, event processors and event consumer [4]. For this CEP is seen as an important contribution in future information systems. CEP applications...
Finite State Machine (FSM) is the most common used technique to create intelligent character behaviors in video games. But conventional FSM technique has many limitations in game development. The main innovation of this paper is the introduction of software component technology to the implementation of FSMs in game development, which modularizes the states and transitions of FSMs completely. Compared...
Nowadays applications are increasingly developed based on remote Web services and service composition has become a powerful novel development paradigm. Due to the fact that such applications in the context of Internet are deployed and executed in an open and dynamic environment, adaptability is one of the crucial requirements for developing such applications. In our previous work, we presented a variability-based...
Symbolic techniques have been shown to be very effective in path-based test generation, however, they fail to scale to large programs due to the exponential number of paths to be explored. In this paper, we focus on tackling this path explosion problem and propose search strategies to achieve quick branch coverage under symbolic execution, while exploring only a fraction of paths in the program. We...
Feature modeling is a key technique for capturing and explicit documenting the software product line variability. Object Oriented (00) concepts have been frequently used to encapsulate and reuse software resources in large scale systems. To improve the possibilities of combination and derivation between distinct feature models, this paper defines the Object Oriented Feature Modeling (OOFM) approach...
Ubiquitous computing environments are becoming more heterogeneous and highly dynamic. Systems need to dynamically self-adapt in order to accommodate dynamically changing resources, needs of different users and failure events. This paper focuses on the runtime adaptation mechanisms that need to be dealt with the distributed nature of systems and the heterogeneity of the environment. We tackle the problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.