The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Numerical software is used in a wide variety of applications including safety-critical systems, which have stringent correctness requirements, and whose failures have catastrophic consequences that endanger human life. Numerical bugs are known to be particularly difficult to diagnose and fix, largely due to the use of approximate representations of numbers such as floating point. Understanding the...
Domain-specific languages (DSLs) are frequently used in software engineering. In contrast to general-purpose languages, DSLs are designed for a special purpose in a particular domain. Due to volatile user requirements and new technologies DSLs, similar to the software systems they describe or produce, are subject to continuous evolution. This work explores existing research on DSL evolution to summarize,...
Change is a routine in software development. Like any system, libraries also evolve over time. As a consequence, clients are compelled to update and, thus, benefit from the available API improvements. However, some of these API changes may break contracts previously established, resulting in compilation errors and behavioral changes. In this paper, we study a set of questions regarding API breaking...
Many IFES (Federal Higher Education Institutions) in Brazil use integrated management systems, which are well known as ERP (Enterprise Resource Planning) systems. These systems usually are quite comprehensive, expensive and they still in use for a long time until be replaced. So, their costs shall be evaluated, not only acquisition costs, but mainly maintenance and support costs. Therefore, in order...
The design and development of product service systems (PSS) is a complex process that brings together product, software and service engineering. A fully integrated PSS calls for significant collaboration among the different engineering disciplines along the entire design and development process which can pose several challenges to the development team. Therefore, when developing a PSS, companies should...
As a software project evolves, so does its build system. Significant effort is necessary to maintain the build system to cope with this evolution, in part because changes to source code often require parallel changes in the build system. Our tool, Formiga, is a build maintenance and dependency discovery tool for the Ant build system. Formiga's primary uses are to automate build changes as the source...
Refactoring source code requires preserving a certain level of semantic behaviors, which are difficult to be checked by IDEs. Therefore, IDEs generally check syntactic pre-conditions instead before applying refactoring, which are often too restrictive than checking semantic behaviors. On the other hand, there are pure functions in the source code that do not have observable side-effects, of which...
As a software project ages, its source code is modified to add new features, restructure existing ones, and fix defects. These source code changes often induce changes in the build system, i.e., the system that specifies how source code is translated into deliverables. However, since developers are often not familiar with the complex and occasionally archaic technologies used to specify build systems,...
A complete browser-based software is need to develop a separate complicated script or some scripts with existing automation testing tools. The paper proposed a regression test automation framework to implement automation test without script development during the test development. The form, data and control spreadsheet should be defined by test developer. The test automation framework provided a series...
Software product line engineering aims at increasing software quality and development productivity by mastering the variability of large software systems. Models are frequently used to define the reusable assets and the restrictions regarding asset composition in different products. However, product line engineering is challenged by evolution. Reusable assets such as software components need to be...
According to development requirements, a standardized management system is mainly used in basic information management files, file statistics and query management, file lending management. Development files for standardized management system that school personnel more efficient file management functions within the scope of work documents, files, archiving and management, promoting the school to improve...
A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software remotely. While giving full super user permissions eases the installation and use of a customer's software, it may lead to security issues. Providers usually delegate the task of keeping virtual machines up to date to the customer, while the customer...
In practice, many factors must be considered and balanced when making software reuse decisions. However, few empirical studies exist that leverage practical techniques to support decision-making in software reuse. This paper reports a case study that applied SMART (Simple Multi-Attribute Rating Technique) to a company that considered reuse as an option of reengineering its web site. The company's...
The build system of a software project is responsible for transforming source code and other development artifacts into executable programs and deliverables. Similar to source code, build system specifications require maintenance to cope with newly implemented features, changes to imported Application Program Interfaces (APIs), and source code restructuring. In this paper, we mine the version histories...
When carrying out knowledge representation, Ontology of information in an abstract manner similar to semantic networks, can be used with a labeled directed graph to sign, but the Ontology is more focused on specific areas that the overall content. Ontology development and application of this paper gave a brief overview of research: first introduced predicate logic-based ontology representation language...
This paper addresses specific concerns in the problems existing in IT infrastructure and application systems in Chinese garment enterprises by introducing service management and IT Infrastructure Library (ITIL) into IT management in enterprises. Total Cost of Ownership (TCO) of IT departments in enterprises can be reduced and all business be carried out effectively and efficiently by reengineering...
Applying domain engineering, the equipment maintenance support system is analyzed and the essential entities are abstracted. Using the executable specification tool-ExSpect, a domain library is constructed, including maintenance organization module, distribution stock module, transport unit module and management department module. By constructing the simulation Object Model (SOM) and the Interface...
A recent study on how inheritance is used in open source Java software revealed a surprising number of interfaces that were neither implemented nor extended. While innocent explanations for this exist (the interfaces are part of frameworks that only clients of the frameworks implement), it does raise the question of how much "dead code'' exists in applications. Dead code usually refers to code...
Usually, a new exploit for a single vulnerability can readily be turned into worms which compromise hundreds of thousands of machines within only a few minutes. In order to protect the host from malicious attacks, we propose a new approach for automatic defense mechanism: dataflow analysis for known vulnerability prevention system (shortly for DA-VPS), which has properties with easy deployment, accurate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.