The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
This paper proposes a new objective assessment method for image quality based on content complexity and color similarity. Considering that human visual perception is sensitive to color distortion in compressed images due to different content complexity, we analyze the effects of image complexity and color similarity to images quality. Based on above analysis, we propose a method to establish the relationship...
Satellite formation flying has higher performance, higher reliability and lower costs comparing to the traditional single satellite. So it becomes a research hotspot in the field of aerospace in China and abroad over the past decade. This paper put thoughts of Agent-based modeling and simulation into satellite formation flying. It meets the autonomy demands of collaborative simulation of satellite...
The compensation for software infringement is a challenge that the development of information technology and the Internet has been posing to the software management field. In the process of determining the software damages, network externalities should not be ignored. This paper focused on the ways in which software was licensed, the characteristics of software infringement, the principles behind...
Based on K-Means algorithm and agglomerative hierarchical clustering algorithm, improvement was made regarding the use of clustering algorithm in the application of text mining. It was verified that the accuracy and efficiency of hot topic detection had been enhanced via vector representation of the text, text similarity calculation, and implementation of clustering algorithm.
This paper deals with the problem of achieving consistency between a UML use case model and its corresponding set of textual descriptions. One solution that has been proposed is a format for textual use case descriptions that provides the conceptual background for textual use case descriptions while integrating them into the UML metamodel. The paper suggests that problems related to UML diagrams (multiplicity...
Service Oriented Architectures (SOA) are widely being adopted by organizations and businesses because of: the flexibility in the technical implementation of solutions by leveraging the plethora of available web services, minimal lock-in into specific platforms and application environments, cost-savings associated with offloading implementation costs to service providers. Web services are one of the...
With the acceleration of industrialization and urbanization, environmental protection in developing countries such as China is under ever-increasing pressure. The establishment and improvement of environment protection management tools, particularly the digital systems, with properties of fast and efficient for environment problems disposal occur as an urgent task for scientific and government organizations...
Software systems are faced with serious dependability crisis. It brings out a series of software dependability related research areas and the trusted software testing process is one of the core issues. In order to conduct the trusted software testing research, a high priority issue to be solved is how to create a formal model of software testing describing the nature of software testing and then to...
Metamorphic testing has been achieved great application breakthrough in many different domains in the last decades and great deals of valuable metamorphic relations (Mrs.) were generated for different software and programs. When one tries to reuse these Mrs. in different domain at different abstraction levels, textual descriptions are not informative and expressive enough. Based on these observations,...
The Software defect management has become a critical issue with its increasing importance in sensor networks area. In this paper, it focuses on black box approach. Software defects can be found through model based testing. A state diagram is a good dynamic model that can test such a logical error of execution. However, the state diagram has a problem of complexity on the existing states and transitions...
A fundamental problem software testing faces is the so called "test oracle problem", which restricts the development of software testing techniques significantly. Metamorphic Testing (MT) can provide a way to determine the correctness of testing outputs with metamorphic relations between a series of outputs that correspond to a series of inputs, which is regarded as one of the most effective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.