The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A justifiably trustworthy provisioning of cloud services can only be ensured if reliability, availability, and other dependability attributes are assessed accordingly.We present a structured approach for deriving fault injection campaigns from a failure space model of the system. Fault injection experiments are selected based on criteria of coverage, efficiency and maximality of the faultload. The...
For combination test scenarios with multilayer constraints, a hierarchical combination design method of test case is proposed. According to the different constraints, the test target is divided into different levels, which are interrelated. Each layer has a corresponding constraint. Firstly, test points are analyzed in the highest level in line with corresponding constraint. Second, test points are...
Among software reliability growth models (SRGMs), the NHPP models perform well in practice. However, the traditional NHPP models still have many problems which are mainly due to the following unreasonable assumptions: 1) fault detection rate subjects to constant or regular change, 2) the testing environment and the final field environment are the same, 3) the testing environment is a completely closed...
Many accidents occurred frequently in aerospace applications, traditional software reliability analysis methods are not enough for modern flight control software. Developing a comprehensive, effective and intelligent method for software fault diagnosis is urgent for airborne software engineering. Under this background, we constructed a fault diagnosis expert system for flight control software which...
Automation of software testing is a complex problem with multiple facets to be handled in sync to be viable. In this work we propose two novel concepts; model dressing for automated exploratory testing. Model dressing maps an application under test to a model created for the domain of the application. In its simplest form, the domain model defines the business tasks as well as the user actions that...
The increasing complexity and size of software products combined with pressure to have shorter time-to-market is making manual testing techniques too costly and unscalable. This is particularly observed in industrial systems where continuous integration and deployment are applied. Therefore, there is a growing need to automate the testing process and make it scalable with respect to the context of...
This paper proposes a knowledge creation model for graduate students and introduces a checklist of evaluation of research ability and research environment based on this model. The model is derived from three academic knowledge creation models, which were proposed with reference to a famous organizational knowledge creation model. A questionnaire survey, using the checklist at a graduate school of...
Software testing is a sub area of software engineering which is also a knowledge intensive and collaborative activity. Our previous study results revealed that knowledge in the repositories were outdated, internal documents are unstructured and varied formats, less accessing facilities and lack of targeted delivery methods, such that software testers from software companies are highly affected by...
Software Defined Networking (SDN) paradigm is introducing novel approaches for many unresolved issues of networking. These new outlooks are imperative in emerging scenarios where user requirements keep growing, the required bandwidth keeps increasing, and so does the variety of applications (e.g. Big data analytics) that suggest the network plays a more prominent role. As such, our research aims to...
Simulink is widely used for avionics and automotive systems design within model driven approach. For system verification and validation effectively, it is essential to generate test cases for Simulink models which guarantee high coverage of requirements and completeness required by safety-critical systems certification. However, for large-scale Simulink models, there is limited ability of test generation...
In the past few years, social tags and tagging systems have gained large momentum for service categorizing and indexing content on the Web. Tags are used freely, which leads a random correspondence between the tags and the services, which affects the performance of the tag in the search and applications. We propose a novel scheme for tag predicting based on graph, aiming to automatically sort the...
Researchers have done extensive work on establishing an accurate user profile, which has been verified an effective way to implement the user marketing accurately and effectively. In this paper, we will present a feature extraction method based on the fusion of Word2Vec and TF-IDF, and try to establish a user profile. The vector space model (VSM) contains the word vector calculated by Word2Vec, and...
With the increasingly application of discrete control software in automatic control field, the security and reliability of its behavior becomes even more essential. However, the traditional verification methods are of high complexity and poor flexibility, so the lightweight Runtime Verification becomes an alternative. In this paper, aiming at real-time properties in discrete control software, an improved...
Public cultural sharing service plays an important role in the public cultural platform. The recommender systems can bring users useful cultural resources and information. For safety and security reasons of the cultural resources, the external applications are not allowed to directly access the original resource data stored in the cultural databases by sending recommendation requests. The cultural...
Multi-faults contained in a program can manifest themselves as unexpected failure behaviors. Understanding the failure behaviors of multiple faults is essential for enhancing strategies of program debugging, software fault detection and software maintenance. This paper presents an empirical study of the failure behaviors of multi-faults for four industrial software systems. These four software systems...
Software testing criteria differ in their effectiveness, the numbers of test cases required, and the processes of test generation. Specific criteria often are compared to random testing, and in some cases, random testing shows a surprisingly high level of effectiveness. One reason that this is the case is that any random test set has a specific level of coverage according to any coverage criterion...
Combinatorial interaction testing (CIT) stands as one of the efficient testing techniques that have been used in different applications recently. The technique is useful when there is a need to take the interaction of input parameters into consideration for testing a system. The key insight the technique is that not every single parameter may contribute to the failure of the system and there could...
Covering arrays have been extensively used for software testing. Therefore, many covering array constructors have been developed. However, each constructor comes with its own pros and cons. That is, the best constructor to use typically depends on the specific application scenario at hand. To improve both the efficiency and effectiveness of covering arrays, we, in this work, present a classification-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.