The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Testing large complex distributed applications in cloud environments is a complex task. Developing tests to assess these kind of applications is time-consuming, and requires adapting and integrating many different tools for different purposes. The main objective of this demonstration is two-folded. First, it introduces ElasTest, a flexible open source testing platform aimed at simplifying end-to-end...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
Object-branch coverage (OBC) is often used as a measure of the thoroughness of tests suites, augmenting or substituting source-code based structural criteria such as branch coverage and modified condition/decision coverage (MC/DC). In addition, with the increasing use of third-party components for which source-code access may be unavailable, robust object-code coverage criteria are essential to assess...
Understanding the extent to which computational results can change across platforms, compilers, and compiler flags can go a long way toward supporting reproducible experiments. In this work, we offer the first automated testing aid called FLiT (Floating-point Litmus Tester) that can show how much these results can vary for any user-given collection of computational kernels. Our approach is to take...
Deep Convolutional Neural Networks (CNNs) achieve substantial improvements in face detection in the wild. Classical CNN-based face detection methods simply stack successive layers of filters where an input sample should pass through all layers before reaching a face/non-face decision. Inspired by the fact that for face detection, filters in deeper layers can discriminate between difficult face/non-face...
The work describes a flexible framework built to generate various (parallel) software versions and to benchmark them. The framework is written with the use of the Python language with some support of the gnuplot plotting program. An example of the use of this tool shows the tuning of a matrix factorization on different architectures (Intel Haswell and Intel Knights Corner) with various parameters...
With recent advances and demands for data storage, new architectures for data controller chips are picking pace. Accordingly, the test methodologies for such chips are also becoming crucial since the large shipping volumes of those chips demand very few field returns. Along with the advances there is a need for a robust test strategy with some novel techniques which can be enabled to test the SOC...
The market share of portable and loT (Internet of Things) devices has been rapidly growing over the last decade. In parallel the amount of non-volatile memories, especially flash memories, used in such devices has also increased significantly due to their low power consumption and capability of in-field programmability. Therefore, for achieving high production yield the reliability and testability...
Extreme Learning Machine (ELM) is a neural network architecture with Single Layer Feed-forward Neural Network (SLFN). For meaningful results, the structure of ELM has to be optimized through the inclusion of regularization and the ℓ2 — norm based regularization is mostly used. ℓ2-norm based regularization achieves better performance than the traditional ELM. The estimate of the regularization parameter...
We present the Configurable Advanced Verification of Software (CAVS), a prototype tool that automatically generates an efficient set of test cases from descriptions of required interface behavior based on Unified Modeling Language (UML) artifacts. The input to CAVS consists of enhanced UML activity diagrams that define the required behavior of a software component as observed on its interfaces. CAVS...
This work reports an effective test design for memory. It realizes March algorithm employing a periodic boundary cellular automata (PBCA) structure. The irreversible single length cycle attractor cellular automata (CA), selected for the design, returns correct decision on the fault in memory even if the test logic is defective. It avoids the bit by bit comparison of memory words, practiced in the...
Innovation and optimization in software systems can occur from pre-development to post-deployment stages. Companies are increasingly reporting the use of experiments with customers in their systems in the post-deployment stage. Experiments with customers and users are can lead to a significant learning and return-on-investment. Experiments are used for both validation of manual hypothesis testing...
Technical Debt (TD) is a metaphor used to explain the negative impacts that sub-optimal design decisions have in the long-term perspective of a software project. Although TD is acknowledged by both researchers and practitioners to have strong negative impact on Software development, its study on Testware has so far been very limited. A gap in knowledge that is important to address due to the growing...
In this paper, we outline the challenges we have encountered in mission critical system development projects based on public tendering processes and list reasons why the challenges we have faced are difficult to tackle. Furthermore, based on our experienc-es in the mission critical system provision domain, we see that the software-as-a-service (SaaS) model saves us from many of the shortcomings of...
As wireless and telecommunicaton infrastructure communications have been integrated into modern vehicle systems (i.e., infotainment systems and vehicle to vehicle systems), the security implications on the relatively unchanged underlying network protocols inside the vehicles are investigated by researchers and industrial experts in the corresponding domain. Some researchers have achieved the investigation...
This paper proposes an automated test framework for eNodeB's physical layer development, comprising procedures for checking data integrity, stability and performance. The proposed framework is based on a simplified LTE MAC layer, which operates as a software element that communicates directly with the physical layer and performs mapping procedures between logical and physical channels, reception and...
In this work we consider the problem of developing algorithms that automatically identify small-scale solar photovoltaic arrays in high resolution aerial imagery. Such algorithms potentially offer a faster and cheaper solution to collecting small-scale photovoltaic (PV) information, such as their location, capacity, and the energy they produce. Here we build on previous algorithmic work by employing...
In this paper, the authors propose a new data flow based unit testing method. The authors involved the coverage selection approach with a decision inheritance tree, which can achieve high structural coverage to design test cases. The authors evaluate the effectiveness of the methods and conducted two sets of tests by using a series of mutation operators. The evaluation results show that the new method...
In contrast to applications relying on specialized and expensive highly-available infrastructure, the basic approach of microservice architectures to achieve fault tolerance – and finally high availability – is to modularize the software system into small, self-contained services that are connected via implementation-independent interfaces. Microservices and all dependencies are deployed into self-contained...
It is the aim of IoT-Testware to supply a rich set of TTCN-3 test suites and test cases for IoT technologies to enable developers in setting up a comprehensive test environment of their own, if needed from the beginning of a project. Initially, IoT-Testware will focus on protocols like CoAP and MQTT. To ensure test and implementation technology independence, the test suites will be realized in TTCN-3...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.