The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To keep password users from creating simple and common passwords, major websites and applications provide a password-strength measure, namely a password checker. While critical requirements for a password checker to be stringent have prevailed in the study of password security, we show that regardless of the stringency, such static checkers can leak information and actually help the adversary enhance...
Regression testing is the way to ensure the current version of the program is up and running. Continuous testing throughout the development cycle leads to detecting bugs as early as possible; however, it imposes huge overhead if the entire test suite has to be run. In this paper, powered by the goal of early detection of bugs, a regression test selection technique is proposed. The proposed technique...
In this work, we describe a novel method based on waveform morphology for detecting artifacts in photoplethysmography (PPG) signals and, thus, improve reliability of PPG. By considering inter-individual and measure condition variability, specific parameters are estimated for each record. We introduce a novel metric for comparing pulses, which is the derivative of the correlation coefficient. Then,...
Image Structure Similarity (SSIM) and its extended versions have been successfully used in image quality assessment. In this paper, we propose a similarity metric to evaluate image quality by extracting image sparse structure from natural scene image. A sparse dictionary trained on the data contains the basic elements for representing sparse structures, and it is insensitive to different databases...
We are currently witnessing an explosion of advances in database technology, that cover all phases of database application design: non-functional requirements, conceptual modeling, logical modeling, deployment, physical design and exploitation. Researchers and engineers cooperate to integrate these advances in the database design. Their proposed solutions have to be confronted with similar studies...
Teaching programming is an activity that becomes more and more popular. Assessment of students that attend introductory courses in programming can partly be done by presenting simple source code fragments. Students should be able to provide answer to the question: "What is the output of the given code?" When preparing the code segments, teachers should be aware of the complexity ('weight')...
Software testing is an essential activity in software development process that has been widely used as a means of achieving software reliability and quality. Software practitioners rely on test coverage to decide whether software under test has achieved an acceptable level of reliability and can be released. The researchers in the field of software testing focus on defining meaningful test coverage...
Performance evaluation of fingerprinting using simplified statistical matching algorithm with two similarity metrics is presented. The collection of RF information can be automatically accomplished with the minimization of drive testing (MDT) in long term evolution (LTE) networks. In the case of non-ideal cell detection, the proposed algorithm greatly decreases the calculation of RF information and...
Cloud service testing ensures that services run properly and meet the Service Level Agreement (SLA) requirements. However, performance problems of a cloud service, such as the availability and reliability, are difficult to diagnose because these issues might be caused from different system components. To solve these problems, this study proposes an architecture for testing environment configuration...
This paper presents the influence of perceived texture regularity on the visual quality of textures that are synthesized through parametric and non-parametric approaches. It is shown through subjective testing that textures with different degrees of perceived regularity exhibit different degrees of vulnerability to texture synthesis artifacts. The paper also proposes a method for adaptively selecting...
Various hand-crafted features and metric learning methods prevail in the field of person re-identification. Compared to these methods, this paper proposes a more general way that can learn a similarity metric from image pixels directly. By using a "siamese" deep neural network, the proposed method can jointly learn the color feature, texture feature and metric in a unified framework. The...
Testing is an important activity on the project life-cycle. Test suites are generated from system models and can be explicit or not. This generation can follow a hand-crafted approach or an automated one, using strategies such as model-based testing (MBT). The literature acknowledges MBT advantages, but to the best of our knowledge most successful reported experiences are case studies. There are few...
Keystroke Dynamics can be used to strengthen the user-name/password authentication system because it will not only consider the value of the password, but also how the password was typed. Keystroke Dynamics systems so far only accept passwords that are typed completely correct, i.e. without any corrections during the typing. The reason for this is that corrections during the typing result in missing...
SMS messaging is a popular media of communication. Because of its popularity and privacy, it could be used for many illegal purposes. Additionally, since they are part of the day to day life, SMSes can be used as evidence for many legal disputes. Since a cellular phone might be accessible to people close to the owner, it is important to establish the fact that the sender of the message is indeed the...
To train and evaluate various face recognition algorithms, quite many databases have been created. But most of them have been created under controlled conditions to study the specific variations of the face recognition problem. These variations include position, pose, lighting, background, camera quality and gender. But in real environment, there are also many applications in which there is little...
Numerous studies have identified measures that relate to the fault-proneness of software components. An issue practitioners face in implementing these measures is that the measures tend to provide predictions at a very high level, for instance the per-module level, so it is difficult to provide specific recommendations based on those predictions. We examine a more specific measure, called software...
Open Source Software (OSS) represents an extremely valuable resource that is reused systematically almost in every software project. The reuse of OSS components however is restricted to ready-made components and developers who want to reuse code that exists in OSS projects but is not offered as a black-box component often resort to copying existing code and adapting it in their projects. OPEN-SME...
This paper presents the result of a recent large-scale subjective study of image retargeting quality on a collection of images generated by several representative image retargeting methods. Owning to many approaches to image retargeting that are developed, there is a need for a diverse independent public database of the retargeted images and the corresponding subjective scores that is freely available...
There is a lack of published studies providing empirical support for the assumption at the heart of product line development, namely, that through structured reuse later products will be less fault-prone. This paper presents results from an empirical study of pre-release fault and change proneness from four products in an industrial software product line. The objectives of the study are (1) to determine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.