The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated test design is an approach to test design in which automata are utilized for generating test artifacts such as test cases and test data from a formal test basis, most often called test model. A test generator operates on such a test model to meet a certain test coverage goal. In the plethora of the approaches, tools and standards for model-based test design, the test design techniques to...
Model-based testing is a technique for generating test cases from a test model. Various notations and techniques have been used to express the test model and generate test cases from those models. Many use customized modelling languages and in-depth white-box static analysis for test generation. This allows for optimizing generated tests to specific paths in the model. Others use general-purpose programming...
During acceptance testing different areas of delivered software system are reviewed. Usually these are functionality, business domain logic, non-functional characteristics, user interface. Although they are related to the same particular functional area, they are verified separately. This paper presents the concept and the Requirements Driven Software Testing (ReDSeT) tool, which allows for automatic...
Logistics or supply-chain services provide enterprises and organizations with the necessary level of flexibility and efficiency in order to retain competitiveness under the increasingly turbulent e-business area. Web-Services are utilized by organizations in order to integrate high and low level applications, thus providing a collaborative environment without affecting inter- and intra-enterprise...
Service architecture of the Internet becomes more and more complex as it expands as a medium for large-scale distribution of diverse content. Dynamic growth of various content distribution systems, deployed by influential Internet companies, content distributors, aggregators and owners, has substantial impact on distribution of the network traffic and the scalability of various Internet services....
The paper presents requirements related to a heterogeneous interoperable and transportable gateway called HitGW that is designated to connect different incompatible communication systems used by First-Responders (FRs) and to make them interoperable with IP-based networks. The HitGW allows IMS type of services and applications over a broadband network composed of ordinary Public Protection and Disaster...
In this article, we propose an algorithm for the management of the structure of the tunnel connections in large, distributed nature, corporate network. Management is here understood as monitoring the availability and health of key elements and dynamic reconfiguring the system in situations of failure symptoms. It was assumed that the algorithm can be used in cases where the correct functioning of...
The paper presents an anonymization of telecommunication data sets collected through Service Delivery Platforms (SDP), and describes an example tool SDPAnonymizer to make such operation. Information from SDP are processed in form of log files, consisting data sets, which show activity of users of APIs (Application Programming Interfaces). Data sets which should be anonymized contain sensitive data,...
Over the last years websites have evolved rapidly incorporating new content types and becoming more and more dynamic. Users today are able to access a wide variety of content and services through their web browsers. As a consequence, web traffic has become increasingly complex and, from a network perspective it can be difficult to ascertain which websites are being visited by a user, let alone which...
This paper presents the methodology for the synthesis of real-time applications for the Infrastructure as a Service (IaaS) model of cloud computing. We assume that the function of the application is specified as a set of distributed echo algorithms with real-time constraints. Then our methodology schedules all tasks on available cloud infrastructure minimizing the total costs of the IaaS services,...
Cloud architecture has the ability of sharing hardware resources and services among multiple tenants. In this paper we measure the performance for the multi-VM (multiple virtual machines) cloud architecture and compare it with the single-VM architecture. Renting resources on a cloud usually comes with a variety of options, such as use of more and smaller virtual machines or use of less and bigger...
Handwritten Signature Verification (HSV) systems have been introduced to automatically verify the authenticity of a user signature. In offline systems, the handwritten signature (represented as an image) is taken from a scanned document, while in online systems, pen tablets are used to register signature dynamics (e.g., its position, pressure and velocity). In online HSV systems, signatures (including...
Portability of developed solutions is a huge challenge for both the customers and cloud providers. A typical customer would like to realize a flexible software solution which can be easily deployed on a selected infrastructure or transferred on a cloud environment. Finally, the idea of a software environment independent of a specific cloud provider enables preferable conditions for customers.
This paper presents the creation of the Pong game on an FPGA using a computer display. The game is optimized to work on both LCD and CRT displays too. The game is implemented from scratch, it has the two pads drawn, the ball is also drawn and the background is painted in white. Everything is implemented in hardware on FPGA, so this way at the end we are able to create the ASIC with the game. The goal...
The paper presents a solution to the problem of movement tracking in images acquired from video cameras monitoring outside terrain. The solution is resistant to such adverse factors as: leaves fluttering, grass waving, smoke or fog, movement of clouds etc. The presented solution is based on well known image processing methods, nevertheless the key was the use of an appropriate conduct procedure. In...
The Large Scale Computing in Grids (LaSCoG) workshop originated in 2005, and when it was created we have stated in its preamble that: “The emerging paradigm for execution of large-scale computations, whether they originate as scientific or engineering applications, or for supporting large data-intensive calculations, is to utilize multiple computers at sites distributed across the Internet. In particular,...
This paper presents a theory and an empirical evaluation of Higher-Order Quantum-Inspired Genetic Algorithms. Fundamental notions of the theory have been introduced, and a novel Order-2 Quantum-Inspired Genetic Algorithm (QIGA2) has been developed. Contrary to all QIGA algorithms which represent quantum genes as independent qubits, in higher-order QIGAs quantum registers are used to represent genes...
CSS is a FedCSIS conference area aiming at integrating and creating synergy between FedCSIS events that thematically subscribe to more technical aspects of computer science and related disciplines. The CSNS area spans themes ranging from hardware issues close to the discipline of computer engineering via software issues tackled by the theory and applications of computer science and to communications...
A concept of artificial supervisor of multi-task real-time object-oriented system is introduced. Next, a procedure for automatic creation of artificial supervisors is presented. The procedure is based on developmental genetic programming. As an input data, UML diagrams are used. A representative example of creation of a supervisor of building a house illustrates the procedure. The efficiency of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.