The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes the aspect-oriented software architecture and the finite automaton based specification model for building customizable code inspection tools. Through the development of a production quality code inspection tool, five crosscutting concerns are identified: internal data model, language processing, data traverse, inspection logic, and decoupling control. We constructed an aspect-oriented...
The safety properties of Cyber-Physical Systems have characteristics of both time and spatial attributes. Although various hybrid logic languages have been proposed to represent and reason both time and spatial attribute, most of them are not concerned on the quantitative problem which is important for mission-critical CPSs to specify and verify safety properties. In this paper, we propose a language...
Software Product Line Engineering is an approach to management of diversity in software families. Although several SPLE approaches exist in the domains of industrial software applications, product lines of data-intensive software systems have gained less attention. We use an incremental, delta-oriented technique to handle variability by specifying changes to be made to a core data model to define...
JavaScript libraries, such as JQuery, are widely used in web applications. In these libraries' event delegation models, a DOM element's event handler is usually bound to its parent nodes. This makes it difficult for developers to figure out the user-defined event handlers of a specified DOM element. In this paper, we propose an approach that identifies the user-defined event handlers of DOM elements...
State models are widely used as specification or design artifacts and form the basis of various analysis techniques. In this paper, we make use of the advances in the area of random test generation to propose a novel approach to infer state models of black-box components from their executions. We also present an implementation and the results of applying our approach on a number of examples.
Researchers have found that approximately 70% of information systems development projects in Japan have failed, thus increasing the demand for solutions that will raise expected project success rates. It is said that to improve success rates, it is essential that risk management should be conducted at an early stage. Although risk management is an important process that a project focuses on, it is...
In railway electronic interlocking system, the automatic signalling equipment is programmed with the configuration data derived manually from the yard layout. This step is prone to human errors and any error can be a severe threat to signalling safety. The yard-layout data and the configured system both need to be verified to satisfy the desired safety requirements. The configured signalling system...
The paper relooks at one of the classical problems in distributed computing: Given a labelled transition system (LTS), how to synthesize a distributed labelled transition system (DLTS) such that the global behaviour of the DLTS is equivalent to that of the given LTS. This problem has been addressed for various notions of behavioral equivalences, viz., isomorphism, language equivalence, bisimulation,...
Today's turbulent business environment is compelling software development providers to face several challenges. As a response to this case, adoption of Scrum methods is increasing. COBIT, on the other side, has domination in information technology (IT) and is a de-facto standard providing an IT governance model with international set of generally accepted IT control objectives. Considered the coverage...
Dynamic metrics are known to assess the actual behavior of software systems as they are extracted from runtime data obtained during program execution. However, recent literature indicates that dealing with dynamic information remains a formidable challenge due to the huge size of execution data at hand, resulting in long processing delays. We present an efficient and scalable technique to extract...
In this paper, we present a conversion algorithm to translate a linear temporal logic (LTL) formula to a Büchi automaton (BA) directly. A label, acceptance degree (AD), is presented to record acceptance conditions satisfied in each state or transition of an automaton. The AD for an automaton is a set of {U, F, R, G}-subformula of the given LTL formula. According to ADs attached to states and transitions,...
In Free/Libre and Open-Source Software (FLOSS) project teams, different roles make different types of contributions to the projects, and it has been demonstrated that keeping a rational role distribution is of great significance to the potential growth and expansion of the projects. To identify the underlying patterns of team structures and role transformations, we perform an empirical study on 89...
Aadhaar, India's Unique Identity Project, has become the largest biometric identity system in the world, already covering more than 920 million people. Building such a massive system required significant design thinking, aligning to the core strategy, and building a technology platform that is scalable to meet the project's objective. Entire technology architecture behind Aadhaar is based on principles...
Model checking is a mainstream method for formal verification of communicating sequential processes (CSP). Existing CSP Model Checkers are incapable of verifying multiple properties concurrently in one run of a model checker. In addition, the properties to be verified are described with CSP in most model checkers, which is good for refinement checking, but leads to limited description power and weak...
Real-time control systems software running in a chemical, refinery, steel plant or in electric power grid is complex. The system has to run reliability for several years without interruptions with availability close to 100%, deterministic response time in milliseconds, sometimes in microseconds, and be secure against increasing cyber threats. Increasing connectivity, evolving concepts like Industrial...
Software extension is a fundamental challenge in software engineering which involves extending the functionalities of a software module without modifying it. Many modern software developers choose to adapt third-party extension platform to further improve customizability. As the project evolves, the requirements may change to include third-party extension support. However to design and to implement...
Software building is recurring and time-consuming. Based on the finding that a significant portion of compilations in incremental build is unnecessary, we propose bypath compilation, an efficient build technique that avoids unnecessary recompilation with automated detection of redundant dependencies and unessential changes in source files. The technique is lightweight and transparent to software developers,...
MARTE (Modeling and Analysis of Real-Time and Embedded Systems) is a profile of UML (United Modeling Language). MARTE provides support for specification, design and verification of real-time and embedded systems. Even though MARTE time model offers a support to describe multiform clocks, it lacks the ability to model both discrete and continuous behaviors of a hybrid system. To address the problem...
EAST-ADL is an architectural description language dedicated to safety-critical automotive embedded system design. We have previously developed a translator, called A-BeTA, transforming timed behavioral constraints in EAST-ADL into the analyzable UPPAAL models. In this paper, we extend the previous work by including support for Stateflow, which is used to design event-driven systems via hierarchical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.