Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A large amount of risk evaluation formulas have been proposed for spectrum-based fault localization (SBFL) in prior studies. A recent study by Xie et al. developed an innovative framework to theoretically analyze the effectiveness of those risk evaluation formulas in SBFL. Xie et al.'s study was based on the assumption that program has only one fault. In other words, they investigated SBFL in the...
Software build integrates modules developed and maintained by different developers in parallel, tests the result of integration, and serves as a crucial step in cooperatiive software development. Predicting the result of build has drawn the interest of academia and industry. In spite of many previous researches, the generalizability of build failure prediction over a wide range of open-source projects...
Adaptive random testing, which is an enhanced random testing technique, has been studied for over 10 years. This paper aims to research the influence of the distance problems on the performance of adaptive random testing, where we focus on its efficiency of fault detecting. Experimental results suggest that, the fault detecting ability of adaptive random testing is influenced by the distance calculation...
As an effective software testing technique, combinatorial testing has been gradually applied in various types of test practice. In this case, it is necessary to provide useful combinatorial testing tools to support the application of combinatorial testing technique on industrial scenarios, as well as the academic research for combinatorial testing technique. To this end, on the basis of the research...
Software development for Cyber-Physical Systems (CPS), e.g., autonomous vehicles, requires both functional and non-functional quality assurance to guarantee that the CPS operates safely and effectively. EAST-ADL is a domain specific architectural language dedicated to safety-critical automotive embedded system design. We have previously modified EAST-ADL to include energy constraints and transformed...
Increasing interest in cyber-physical systems with integrated computational and physical capabilities that can interact with humans can be identified in research and practice. Since these systems can be classified as safety- and security-critical systems the need for safety and security assurance and certification will grow. Moreover, these systems are typically characterized by fragmentation, interconnectedness,...
An experiment was conducted to investigate network jamming attacks on an Industrial Control Systems. The Secure Water Treatment (SWaT) system was chosen to perform the experiments. Jamming attacks were launched on SWaT using software defined radio. Attacks were designed to meet attacker objectives selected from a Cyber Physical Systems specific attacker model. Attacks exposed vulnerabilities associated...
For runtime verification techniques, the most important part that limits its usage is how to reduce the influence of monitors. An important indicator is the amount of software codes after monitor instrumentation. The application of RV is hindered from the size-explosion problem of monitor construction. Namely, the state number of the monitor obtained is doubly exponential in the size of the input...
With the increasingly application of discrete control software in automatic control field, the security and reliability of its behavior becomes even more essential. However, the traditional verification methods are of high complexity and poor flexibility, so the lightweight Runtime Verification becomes an alternative. In this paper, aiming at real-time properties in discrete control software, an improved...
Simulink is widely used for avionics and automotive systems design within model driven approach. For system verification and validation effectively, it is essential to generate test cases for Simulink models which guarantee high coverage of requirements and completeness required by safety-critical systems certification. However, for large-scale Simulink models, there is limited ability of test generation...
Complex Cyber-Physical System (CPS) integrating computation, software, network and physic process is suited to be designed by multi-view models to describe different aspect respectively. Ensuring consistency relationships between multi-view models and system-level properties remains to be a main challenge to such methodology. This paper proposes a comprehensive and formal description and verification...
fault injection is an effective technique in software testing. By introducing faults to software under test, fault injection can improve the coverage of a test, as the same time, the fault injected in software contributes significantly to find true fault related to fault injected. In this paper we propose a software testing method based on fault injection. In this method, we first use neural network...
In this paper, the adaptive synchronization transmission of target signal within the nonlinearly unidirectional-coupled neural network is proposed, in which individual neuron is described by the FitzHugh-Nagumo (FHN) model in external electrical noisy environment. We design a network architecture of the unidirectional-coupled FHN system and propose an adaptive coupling strategy to synchronize the...
In the past few years, social tags and tagging systems have gained large momentum for service categorizing and indexing content on the Web. Tags are used freely, which leads a random correspondence between the tags and the services, which affects the performance of the tag in the search and applications. We propose a novel scheme for tag predicting based on graph, aiming to automatically sort the...
In the enterprise marketing process, on-line data plays more and more important role. As a type of data, spam (or fake) reviews of the products, however, have been seriously affecting the reliability of both decision making and data analysis of the enterprise. To detect spam reviews, the paper presents a set of opinion spam detection's identification indicators based on behavior features of the spammer...
Public cultural sharing service plays an important role in the public cultural platform. The recommender systems can bring users useful cultural resources and information. For safety and security reasons of the cultural resources, the external applications are not allowed to directly access the original resource data stored in the cultural databases by sending recommendation requests. The cultural...
Researchers have done extensive work on establishing an accurate user profile, which has been verified an effective way to implement the user marketing accurately and effectively. In this paper, we will present a feature extraction method based on the fusion of Word2Vec and TF-IDF, and try to establish a user profile. The vector space model (VSM) contains the word vector calculated by Word2Vec, and...
Phishing emails have affected users seriously due to the enormous increasing in numbers and exquisite camouflage. Users spend much more effort on distinguishing the email properties, therefore current phishing email detection system demands more creativity and consideration in filtering for users. The proposed research tries to adopt creative computing in detecting phishing emails for users through...
In tourism industry, a challenge is how to handle emergency situations during a journey. Although most of the tourism travel agencies focus on generating travel plans, an important part that has been ignored is to provide a creative emergency travel plan when a user meets an unforeseen situation during the journey. Thus, in order to address problems like this, the study to build a system that can...
Software Defined Networking (SDN) paradigm is introducing novel approaches for many unresolved issues of networking. These new outlooks are imperative in emerging scenarios where user requirements keep growing, the required bandwidth keeps increasing, and so does the variety of applications (e.g. Big data analytics) that suggest the network plays a more prominent role. As such, our research aims to...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.