The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional methods of system verification call for the repeated exercise of that system in its intended environment to give confidence that it will operate as designed. Autonomous systems, however, are systems designed for sophisticated operation in stochastic environments that specifically handle the unexpected; testing all possible operational scenarios for such systems is intractably complex....
Developing high quality software is a major industry concern, since programs that "just work" may not be suitable to contemporary technological challenges. Agile practices, such as Test-First development (TFD), may help in this direction. However, in our experience this technique is introduced late (if ever), when programmers' habits are already set and difficult to change. Early exposure...
The practitioner interested in reducing software verification effort may found herself lost in the many alternative definitions of Graphical User Interface (GUI) testing that exist and their relation to the notion of system testing. One result of these many definitions is that one may end up testing the same parts of the Software Under Test (SUT), specifically the application logic, twice. To clarify...
Code portability is a desirable non-functional requirement. The most established metric evaluating it consists of counting the number of instructions that use platform specific APIs. Generally, instructions using APIs are preceded or followed by related code that e.g. prepares some input for a call or analyses the return value. This paper proposes a taint analysis approach to identify code portions...
Exception handling allows developers to deal with abnormal situations that disrupt the execution flow of a program. There are mainly three types of exceptions: standard exceptions provided by the programming language itself, custom exceptions defined by the project developers, and third-party exceptions defined in external libraries. We conjecture that there are multiple factors that affect the use...
Open-source projects rely on attracting new and retaining old contributors for achieving sustainable success. One may suspect that adopting new development practices like Continuous Integration (CI) should improve the attractiveness of a project. However, little is known about the impact that adoption of CI has on developer attraction and retention. To bridge this gap, we study how the introduction...
With the increasing adoption of embedded systems in critical automotive applications, the verification of hardware designs reliability is becoming a strictly regulated process where the ISO26262 standard plays a key role. Today crucial verification activities such as failure analysis and FMEA are still relying heavily on reliability engineer expertise, as automatic methods supporting them are still...
Robots are being increasingly used in safety-critical contexts, such as transportation and health. The need for flexible behavior in these contexts, due to human interaction factors or unstructured operating environments, led to a transition from hardware- to software-based safety mechanisms in robotic systems, whose reliability and quality is imperative to guarantee. Source code static analysis is...
In order to estimate the security of the Web apps, there has been proposed the design and built of a model for evaluating security on Virtual Learning Environments (VLE), starting from the identification of security criteria proposed in handbooks, rules and standards, and there were established objectives and activities that gave patterns for carrying out such process, making emphasis on three criteria:...
Software Complexity Metrics play a major role of determining the complexity of a given software quantitatively with respective to one or more software complexity attributes in which the metric is willing to compute with. Among the continuation of the possible ways of computing the complexity of a software, the Cognitive Complexity calculation can be considered as a prominent factor since it indicates...
We introduce Polinode, an online tool for performing network analysis. Polinode is aimed at commercial and non-commercial users alike and supports both research-related use cases as well as teaching network analysis to students. One of its primary advantages is that it is web-based. It therefore doesn't require any software downloads and opens up new avenues for collaboration and the incorporation...
Maintenance is a very expensive activity in the software systems' lifecycle. The ISO 25010 standard considers it as one of its main eight characteristics. In this paper, we propose an approach to assess the maintainability characteristic by its own subcharacteristics as defined by ISO 25010, using several object oriented metrics. A set of rules is defined to capture the influence of the metrics values...
To support a decision-maker using supply chain simulation tool in more applicable circumstances. There are huge literatures argued on how to structure supply chain modelling based on the standard framework as SCOR. However, there are a missing link between a technical tools through a standard process using for making a decision for practitioners. Thus this paper aims to propose the framework and simulation...
Traceability has been an important subject in the research world to be investigated. In software engineering, traceability has been crucial for software development processes. In food domain, traceability has also been seen as an important topic for tracing food content of various food products and operations. In this paper, we present a software product line (SPL) based traceability model for food...
This paper presents an approach for managing alarms and diagnoses in an integrated IT and automation environment. In order to face the challenges of the integration of IT services with automation systems, an approach based on WBEM/CIM is presented. The provided solution is mostly not bound to specific vendors or fieldbus technologies and can easily be extended towards other requirements and scenarios.
In industry, inspections, reviews, and refactoring are considered as necessary software engineering activities for enhancing quality of code. In academia, such activities are rarely taught and practiced at Undergraduate level due to various reasons like limited skill set, limited knowledge of the available tools, time constraints, project setting, project client availability, flexibility with Syllabus,...
Software bug localization aiming to determine the locations needed to be fixed for a bug report is one of the most tedious and effort consuming activities in software debugging. Learning-to-rank (LR) is the state-of-the-art approach proposed by Ye et al. to recommending relevant files for bug localization. Ye et al.'s experimental results show that the LR approach significantly outperforms previous...
It is important for project stakeholders to identify the states of projects and quality of products. Although metrics are useful for identifying them, it is difficult for project stakeholders to select appropriate metrics and determine the purpose of measuring metrics. We propose an approach that defines the measured metrics by GQM method, and supports identifying tendency in projects and products...
Network management systems (NMS) need to support a wide range of application requirements while ensuring an efficient use of networking resources. Application control of Software Defined Networking (SDN) promises to drastically reduce OPEX and increase flexibility of NMS by automatically translating application requirements into network policies and subsequently into network behavior. The current...
The study of malware often involves some form of grouping or clustering in order to indicate malware samples that are closely related. There are many ways that this can be performed, depending on the type of data that is recorded to represent the malware and the eventual goal of the grouping. While the concept of a malware family has been explored in depth, we introduce the concept of the malware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.