The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software crowdsourcing is an emerging approach that involves delegating varieties of tasks to a decentralized, multi-scale and unknown workforce. Preparing a complex development job for crowdsourcing markets requires careful attention to workflow design, the process of decomposing job into multiple subtasks. This paper presents a general-purpose approach to verify the complex task's decomposition...
The evaluation method of factors affecting software reliability is based on the effect factors related to software reliability in each stage of software life cycle, by this method, an early prediction about the software reliability can be made. The selection of factors and its weights allocation are the keys to make the result reasonable. There are a lot of weighting methods, such as expert investigation...
The current software testing in the aspects of industrial benefits gradually causes the attention of the domestic financial bank. The innovation of software technology, the increase of software scale and the shortened developing period make the traditional manual testing meeting enormous challenges, while the development of automated testing technology has promoted the progress of the software testing...
Integer overflow vulnerability is very difficult to locate and patch. From experience speaking the more complicate the integer operation the more error-prone the program. So in this paper, we come up with a new method to leverage static integer operation attributes to predict integer overflows based on machine learning technique. The static integer operation attributes consist of sink, integer operation...
Interest in crowdsourcing is increasing because of its high efficiency and low cost. In the existing platforms of software crowdsourcing, most requesters tend to post decomposed simple subtasks rather than a complex task directly for easier matching workers. However, current platforms of software crowdsourcing can't guarantee the consistency of the complex task and decomposed subtasks. In this paper,...
Against the problems existing in the collective running projects, such as not-reasonable-enough monitoring means, not-scientific-enough assessment tools, and so on, an overseeing and evaluating system of running training was designed and implemented based on the radio frequency identification(RFID), which has the advantages of high precision, comprehensive and real-time positioning. The system provides...
In access-network-chip testing and verification, problems occur mostly on I2C control interface because of its complicated protocol and high requirement on reliability, using an automated testing tool with simple operation and high testing coverage could ensure the quality of chip as well as shorten the chip development cycle. The paper designs an automated system based on 5SGXEA7N2F45C2 FPGA chip...
seL4 is formally verified for its functional correctness and its kernel modules provide strong support to achieve interprocess communication mechanism. In recent years, some scholars designed Interprocess Communication Systems with library-based architecture. This design abandons Message-Passing technique that most of microkernels adhere to. The present research still insists on the Message-Passing...
Automatic fault localization techniques are developed to assist software developers in program debugging. However, it is difficult to apply such techniques in practical usage. To bridge the gap between theory and practice, this paper introduces our work UnitFL, which integrates dynamic fault localization approaches with unit tests. Moreover, program slicing and dynamic program instrumentation techniques...
Current network protocol binary software testing methods cannot discover serious vulnerabilities in deep states. This article introduces a novel method based on multi-packet symbolic execution, which can drive the software to deep states, to test the whole network protocol binary software stacks. This article also presents a prototype system, S2EProtocol-multi, upon Selective Symbolic Execution (S2E)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.