The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic loop-invariant generation is important in program analysis and verification. In this paper, we propose to generate loop-invariants automatically through learning and verification. Given a Hoare triple of a program containing a loop, we start with randomly testing the program, collect program states at run-time and categorize them based on whether they satisfy the invariant to be discovered...
A failure in a critical system can cause death, injury, financial loss, and environmental damage. To develop safe and trustworthy systems, we need to plan the development and assessment of system functionality in advance. Assurance Cases are a generalization of Safety Cases, and are gaining momentum as a preferred way of demonstrating assurance of critical properties in complex software-intensive...
Finite element analysis (FEA) software is utilized to simulate and evaluate a conventional steel resolver and a 3D printed resolver (material: acrylonitrile butadiene styrene). Moreover, the magnetic flux density distribution of the resolvers is presented by the FEA software. The performances of the resolvers are discussed in time domain and frequency domain. Furthermore, a test bench is set up to...
A desirable feature of a development tool for SoC design is that, given the important applications in the domain to be targeted by the SoC, a powerful hardware-software partitioning engine is available to determine which function(s) shall be mapped to hardware. However, to provide high-quality partitioning, this engine must be able to consider a rich design space of possible alternate hardware and...
With the convergence of pervasive mobile computing and social networking, interest has grown significantly in software systems and applications that are aware of users' social context to make pervasive applications more intelligent and accessible. Thus, socially-aware systems have further advanced context-aware systems taking account of human social context such as social relationships to enable the...
As autonomous features advance, it is believed that most behaviors, including safety-critical functions, of future automotive systems will be defined by software. Due to the safety-critical nature, correctness and quality of automotive software draw more and more concerns, and software certification should integrate verification, simulation, and testing results in systematic and rigorous ways to prove...
Software has been changing during its whole life cycle. Therefore, identification of source code changes becomes a key issue in software evolution analysis. However, few current change analysis research focus on dynamic language software. In this paper, we pay attention to the fine-grained source code changes of Python software. We implement an automatic tool named PyCT to extract 77 kinds of fine-grained...
To support emerging applications in autonomous and semi-autonomous driving, next-generation automotive systems will be equipped with an increasing number of heterogeneous components (sensors, actuators and computation units connected through various buses), and have to process a high volume of data to percept the environment accurately and efficiently. Challenges for such systems include system integration,...
Cyber security concerns in the automotive industry have been constantly increasing as automobiles are more computerized and networked. Recent successful hacks of modern vehicles demonstrate the big security concerns for automotive systems. However it is still very hard and even impossible to predict what kinds of security issues will happen. In this paper, we present the automotive security concerns...
Next-generation autonomous and semi-autonomous vehicles will not only precept the environment with their own sensors, but also communicate with other vehicles and surrounding infrastructures for vehicle safety and transportation efficiency. The design, analysis and validation of various vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) applications involve multiple layers, from V2V/V2I...
Many Internet of Things (IoT) technologies have been used in applications for money flow, logistics flow, people flow, interactive art design, and so on. To manage these increasing disparate devices and connectivity options, ETSI has specified end-to-end machine-to-machine (M2M) system architecture for IoT applications. Based on this architecture, we develop an IoT EasyConnect system to manage IoT...
Automatic test case execution is crucial for testdriven development (TDD) approach. It is beneficial if test cases can be automatically generated and executed. In this paper, we present UTGen, an Eclipse plugin for the generation and execution of test cases for JUnit test-platform. It is based on the idea of constraint-based testing, working for the methodlevel black-box unit testing. Test data are...
A design scheme of remote model predictive control system is presented in this paper. Combined with the asynchronous messaging framework Errai, a network application system for remote model predictive control, which is based on GWT architecture, is developed and implemented by using RIA technique. The application field of MPC product is extended and the application function is expanded effectively...
This paper proposes a Web-base Immediate Diagnosis System (WIDS), aiming at promoting students' efficiency in learning Entity-Relationship Model (ERM). When a student makes a mistake during learning process, the diagnosis feedback is delivered immediately, which is achieved by the AJAX technique. The proposed diagnosis feedback, which is based on association rules, provides a student the crucial and...
With the rapid development of information, companies in the market in order to create greater competitiveness through new information technology trickled into the new system, but with the new Goumai the server and into the new system, information center gradually space can be used to less and less from the Information Centre as the power consumption will increase significantly, increased air conditioning...
Models and simulations (M&S) will be employed to support important design decisions and verification of system requirements in the development of NASA's Orion Crew Exploration Vehicle. Most simulations are implemented in software. For developed software, NASA's software engineering procedural guideline NPR 7150.2 and safety standard NASA-STD-8719.13B apply. Recognizing the need for critical M&S...
Model-driven development is worthy of further research because of its proven capabilities in increasing productivity and ensuring correctness. However, it has not yet been explored for multi-core processor-based embedded systems, whose programming is even more complex and difficult that that for conventional uni-processor systems. We propose a new VERTAF/Multi-Core (VMC) framework to bridge this gap...
Test suite minimization techniques try to remove redundant test cases of a test suite. However, reducing the size of a test suite might reduce its ability to reveal faults. Most of prior works which address this problem affect some extent of suite size reduction. In this paper, we present a novel approach for test suite reduction that uses additional testing criterion to break the ties in the minimization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.