Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In a high movement environment, handover occurs frequently in a mobile network and degrades the quality of mobile communication and service. The shorter the handover delay is, the better the communication quality can be obtained. To shorten the handover delay for a bunch of UEs moving in the same direction, mobile relays (MR), an intermediate role between a UE and an eNodeB (eNB), have been introduced...
Nowadays, more and more systems are coordinated and controlled to compose globally-distributed, highly-complex systems of systems (SoS). Existing testing methods focus on single devices and on performance characteristics from the network architecture upwards, but ignore the innate complexity caused by the spatial and temporal separation of these systems over vastly differing scales. As a result, quality...
Signal software for high-speed railways is safetycritical, controlling communications between trains, tracks, stations, and signals. It is necessary to test railway signal software rigorously. However, ad-hoc approaches still dominate in practice. We proposed a hybrid approach that uses combinatorial testing (CT) and model-based testing (MBT). We applied this systematic approach to testing track circuit...
The increasing complexity and size of software products combined with pressure to have shorter time-to-market is making manual testing techniques too costly and unscalable. This is particularly observed in industrial systems where continuous integration and deployment are applied. Therefore, there is a growing need to automate the testing process and make it scalable with respect to the context of...
Software Fault Tolerance (SFT) techniques are most frequently used in various safety-critical applications, such as aerospace, vehicles and electric power systems, where software often play as central controllers. One of such SFT techniques is Triple Modular Redundancy (TMR), which is the most commonly adopted scheme for its simplicity and efficiency. Traditional TMR method mainly focuses on replication...
Automation of software testing is a complex problem with multiple facets to be handled in sync to be viable. In this work we propose two novel concepts; model dressing for automated exploratory testing. Model dressing maps an application under test to a model created for the domain of the application. In its simplest form, the domain model defines the business tasks as well as the user actions that...
A number of research efforts have focused in the area of programming style. However, to the best of our knowledge, there is little sound and solid evidence of how and to what extent can stylistic inconsistency impact the readability and maintainability of the source code. To bridge the research gap, we design an empirical experiment in which eye tracking technology is introduced to quantitatively...
In order to support large volume of transactions and number of users, as estimated by the load demand modeling, a system needs to scale in order to continue to satisfy required quality attributes. In particular, for systems exposed to the Internet, scaling up may increase the attack surface susceptible to malicious intrusions. The new proactive approach based on the concept of Moving Target Defense...
Field Programmable Gate Array (FPGA) system is widely used in deep learning application and cloud system for acceleration. Quality and reliability of IP block is essential to the successful development of today's complex hardware acceleration design. In this paper, we discuss the important issues of quality and reliability of digital soft IP, and propose a qualification measurement system that can...
Not only in computer security, dealing with malware also presents one of vital challenges in computer forensics. Attempting to get away from their criminal activities, a suspect usually uses malware defense where they can claim that they did nothing wrong but malware did. Therefore, the burden of proof for the prosecution in pinning down the criminals is often extremely heavy due to the complex behavior...
Computer security has been a subject of serious study for at least 40 years, and a steady stream of innovations has improved our ability to protect networks and applications. But attackers have adapted and changed methods over the years as well. Where do we stand today in the battle between attackers and defenders? Are attackers gaining ground, as it often seems when reading press accounts of the...
Testing software-intensive systems, for us, has traditionally focused on verifying and validating compliance and conformance to specification, as well as some general non-functional requirements such as performance of different components. In recent years, we have seen a strong move towards more data intensive systems. We have found that these types of systems require a different approach for testing...
Test automation is essential in fast-paced agile de-velopment environments. The main goal is to speed up test execu-tion cycles and to reduce the effort involved in running tests manually. We took test automation one step further and applied test generation to a GUI-based application developed in a large industry project. The paper describes the transition from manual exploratory testing to automated...
In this article we present the results of a case study that identifies test effectiveness as a major business driver in firmware development and consequently outline five core areas of the firmware testing process as critical issues to be addressed within a use-inspired research effort.
This paper proposes a conceptual, performance-based ranking framework that prioritises the output of multiple Static Analysis Tools, to improve the tool effectiveness and usefulness. The framework weights the performance of Static Analysis Tools per defect type and cross-validates the findings between different Static Analysis Tools' reports. An initial validation shows the potential benefits of the...
Here we describe an approach for the dynamic selection of test cases in continuous integration test environments. By correlating historical test case results with product source code changes, we are able to construct a simple model that enables us to dynamically and automatically create test suites that are customized for each individual product software delivery. Using this technique, we are able...
A new generation of medical devices emerges to supportincreasingly more complex medical decisions and procedures.These Medical Devices (MD) combine data fromnovel sensors and existing modalities like scanners withelaborate software processing to assist caregivers in the sameway Flight Management Systems help a pilot flying planes.For instance, Blue Ortho’s MD allows performing TotalKnee Arthroplasty...
This paper discusses a security approach for IoT fingerprinting. We start with revisiting the general security challenges related with the using of IoT, then discuss how IoT fingerprinting can overcome several of these challenges. We also discuss a proposed approach for the establishment of IoT fingerprinting and to maintain a secure communication between IoT devices. The proposed approach is lightweight...
To enable fast and reliable delivery of mobile text messages (SMS), special bidirectional protocols are often used. Measuring the achieved throughput and involved latency is however non-trivial, due to the complexity of these protocols. Modifying an existing system would incur too much of a risk, so instead a new tool was created to analyse the log files containing information about this traffic in...
This paper discusses the reality of the state-of-theartof existing information security systems that often providesenseless functions based on “buzz-words”. It points out real-liferequirements that these systems tend to ignore. It proposes thatdynamically changing understandable use cases should becreated in collaboration with corporate management to addressobjectives that are essential for the businesses...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.