The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider properties of edge-colored vertex-ordered graphs} – graphs with a totally ordered vertex set and a finite set of possible edge colors – showing that any hereditary property of such graphs is strongly testable, i.e., testable with a constant number of queries. We also explain how the proof can be adapted to show that any hereditary property of two-dimensional matrices...
Several cases are known where faults in spreadsheets have caused severe losses of money for companies. Besides other factors, the non-existence of advanced testing and debugging mechanisms in environments like MS Excel causes faults in spreadsheets to remain undetected. In this paper we describe the main functionality of the EXQUISITE tool, a software system and add-in to MS Excel that was developed...
We provide a combinatorial characterization of all testable properties of k-graphs (i.e. k-uniform hypergraphs). Here, a k-graph property P is testable if there is a randomized algorithm which makes a bounded number of edge queries and distinguishes with probability 2/3 between k-graphs that satisfy P and those that are far from satisfying P. For the 2-graph case, such a combinatorial characterization...
Ramsey theory assures us that in any graph there is a clique or independent set of a certain size, roughly logarithmic in the graph size. But how difficult is it to find the clique or independent set? If the graph is given explicitly, then it is possible to do so while examining a linear number of edges. If the graph is given by a black-box, where to figure out whether a certain edge exists the box...
Spreadsheets serve as a basis for decision-making processes in many companies and bugs in spreadsheets can therefore represent a considerable risk to businesses. Systematic tests can help to locate such bugs, but providing test cases can be cumbersome and complex for large real-world spreadsheets. To make the specification of test cases easier, we propose to split spreadsheets into smaller logically...
In this work, we revisit the problem of uniformity testing of discrete probability distributions. A fundamental problem in distribution testing, testing uniformity over a known domain has been addressed over a significant line of works, and is by now fully understood. The complexity of deciding whether an unknown distribution is uniform over its unknown (and arbitrary) support, however, is much less...
A Probabilistic Conditional Preference network (PCP-net) provides a compact representation of preferences characterized with uncertainty. We propose to enrich the expressive power of the PCP-net by adding constraints between some of the variables. We call this new model, the Constrained PCP-net (CPCP-net). We study the key preference reasoning task with the proposed CPCP-net which consists in finding...
Although Deep Convolutional Neural Networks (CNNs) have liberated their power in various computer vision tasks, the most important components of CNN, convolutional layers and fully connected layers, are still limited to linear transformations. In this paper, we propose a novel Factorized Bilinear (FB) layer to model the pairwise feature interactions by considering the quadratic terms in the transformations...
The notion of success is unsubstantial, complex and domain-specific. Software companies have been exploring its different aspects and aiming to put forward measures to capture and evaluate them. In this paper three main dimensions of success have been elicited based on previous industrial studies: project quality, project efficiency along with social factors and stakeholder's satisfaction. By investigation...
There are several security requirements identification methods proposed by researchers in up-front requirements engineering (RE). However, in open source software (OSS) projects, developers use lightweight representation and refine requirements frequently by writing comments. They also tend to discuss security aspect in comments by providing code snippets, attachments, and external resource links...
Testing of software is a worthwhile aspect of software development life cycle. Effective and efficient test cases must be designed to test the software which will reduce the testing cost, time and effort. Nowadays, testing an aspect-oriented program is becoming a challenge for the testers. This paper proposes a novel approach to generate test case scenarios for an aspect oriented program derived from...
Although physical work is becoming increasingly automated, many tasks in manufacturing, assembly or quality assurance still require human expertise, skills and subjective evaluation. Therefore, digitization offers the possibility to support such physical tasks by smart assistant systems. Being part of a larger research project, the aim of this short paper is to present requirement patterns that have...
The paper presents a Finite State Machine (FSM) based approach for deriving tests with reduced complexity, under the White Box testing assumption where all the faulty implementations are explicitly enumerated. The specification and implementation FSMs are assumed to be initialized, i.e., each possibly partial and (non-observable) nondeterministic FSM has a reliable reset. The proposed technique is...
The paper presents a framework for model-based testing of automotive distributed system and a method of automatic assignment of testing priorities used within the framework. The proposed method utilizes classifiers for automatic assignment of testing priorities to specific parts of the tested system. The paper also introduces a set of extraneous data accompanying the modeling language that are exploited...
Good planning and managing software test process require accurate estimation of software test effort. This becomes particularly significant when validation and verification activities are to be performed by an independent organization. This study presents a systematic literature review and a follow up industrial survey, which was performed to investigate the state of the art on software test effort...
Technical Debt (TD) is a metaphor used to explain the negative impacts that sub-optimal design decisions have in the long-term perspective of a software project. Although TD is acknowledged by both researchers and practitioners to have strong negative impact on Software development, its study on Testware has so far been very limited. A gap in knowledge that is important to address due to the growing...
Lattice-based cryptography has recently produced several time-efficient cryptosystems that are provably secure under assumptions that are not known to be more easily solvable by quantum computers. An interesting research direction is improving their storage complexity, as current solutions are far from practical with respect to this metric. In this paper we show that program obfuscators for point...
This paper presents an effective method for solving imbalanced learning. Imbalanced learning is a recognition problem with data with imbalanced distributions. Many practical applications, e.g., fraud identification and intrusion detection, face the critical problem of imbalanced data. Most traditional methods use accuracy to evaluate the classifier's performance such that it is difficult to improve...
Log files are used in many big data applications. If the log is meant for a different purpose, the analysis and finding the best log analyzer can be very complex. Our solution is to create a generic test case framework to model and create representative log data. Related work model the behavior as state machines, but our model uses a composition of elementary acyclic graphs, thus addressing the log...
In order to improve the efficiency of policy evaluation, the paper proposes a scheme of evaluation optimization. The scheme adopts policy reordering and clustering strategies to optimize policy procession. During evaluation, the scheme proposes to merge algorithm combined with policy priority assessment, preferably selects the satisfied policies and rules to improve the matching speed. The experimental...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.