The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software requirements specifications (SRS) serve as a source of communication and information for a variety of roles involved in development activities. From the viewpoint of these SRS consumers, which includes testers as one of the key customers, the analysis of requirements specifications is often frustrating as it is time consuming and often requiring a lot of cognitive effort due to the increasing...
We present the results of a survey of tool use in software modeling education conducted from December 2016 to March 2017. The survey was conducted among 150 professors who taught modeling in 30 countries from all regions of the world. Professors reported using 32 modeling tools. Top motivations for choosing tools are simplicity of learning and installing, as well as the tools being free and supporting...
The purpose of this research study is to investigate the problems of design and requirements to diagnostic automated systems based on image processing. To realize the research purpose, the authors designed a conceptual model, a use case diagram, and a prototype of automated system object model.
The developed rules and method of forming the logical conclusion about sufficiency of information for software metric analysis provide: the conclusion about the SRS information sufficiency for metric analysis; the conclusion about necessary of the addition of indicators in the SRS; the prioritization of addition of all missing indicators in the SRS; the evaluation of the veracity of software metric...
The size of a software artifact influences the software quality and impacts the development process. In industry, when software size exceeds certain thresholds, memory errors accumulate and development tools might not be able to cope anymore, resulting in a lengthy program start up times, failing builds, or memory problems at unpredictable times. Thus, foreseeing critical growth in software modules...
This paper outlines the effects of educational and casual software applications on young children, and defines a framework for monitoring, assessing, and improving their knowledge and skills. It shows how the use of such applications improves children skills in the main learning domains and increases their familiarity with the world. After analyzing specific abilities developed by different categories...
Merge conflicts occur when software practitioners need to work in parallel and are inevitable in software development. Tool builders and researchers have focused on the prevention and resolution of merge conflicts, but there is little empirical knowledge about how practitioners actually approach and perform merge conflict resolution. Without such knowledge, tool builders might be building on wrong...
In this paper a log-MAP turbo decoding algorithm which incorporates reliability threshold based trellis branch elimination together with mean based early iteration termination has been proposed. The proposed algorithm reduces computational complexity by eliminating branches in trellis. Since the minimum Log Likelihood Ratio (LLR) obtained for each iteration varies with channel conditions, an early...
Bad smells are the surface indication of deeper problem into source code; therefore, they need to be identified as early as possible without compromising on the quality of the software. This lead towards the requirement of refactoring that is the process used in improving the internal attributes like maintainability of the software without affecting its external attributes. Hence, to enhance quality...
Developers frequently rely on free static analysis tools to automatically detect vulnerabilities in the source code of their applications, but it is well-known that the performance of such tools is limited and varies from one software development scenario to another, both in terms of coverage and false positives. Diversity is an obvi-ous direction to take to improve coverage, as different tools usual-ly...
In order to cope with the rising complexity of today's systems, model-based development of software-intensive embedded systems has become a de-facto standard in recent years. Such a development approach enables a variety of frontloading methods. Design space exploration is one of those techniques. However, in order to properly perform a valid exploration, a system model has to have a certain quality...
Use case analysis has been widely adopted in modern software engineering due to its strength in capturing the functional requirements of a system. It is often done with a UML use case model that formalizes the interactions between actors and a system in the requirements elicitation iteration, and with architectural alternatives explored and user interface details specified in the following analysis...
Good planning and managing software test process require accurate estimation of software test effort. This becomes particularly significant when validation and verification activities are to be performed by an independent organization. This study presents a systematic literature review and a follow up industrial survey, which was performed to investigate the state of the art on software test effort...
Technical Debt (TD) is a metaphor used to explain the negative impacts that sub-optimal design decisions have in the long-term perspective of a software project. Although TD is acknowledged by both researchers and practitioners to have strong negative impact on Software development, its study on Testware has so far been very limited. A gap in knowledge that is important to address due to the growing...
Organizations enhance the velocity of simple operations that read and write a small amount of data from big data by extending a SQL system with a key-value store (KVS). The resulting system is suitable for workloads that issue simple operations and exhibit a high read to write ratio, e.g., interactive social networking actions. A popular distributed in-memory KVS is memcached in use by organizations...
With the rapid development of educational information, the market demand for early childhood education software is increasing. But the evaluations of early childhood education softwares have fallen behind the development of software products. In this paper, we take the United States Haugland / Shade as evaluation criteria to evaluate those Apps with great download amount and with better feedbacks...
The aim of the article is to present the concept of multi-dimensional and multi-criteria measurement of IT projects performance. This concept takes into account the characteristics of IT projects, recommendations on how to manage them, and the fact that project stakeholders have different needs/expectations for information from project evaluation.
This paper describes a full system-on-chip to automatically detect sleep spindle events from scalp EEG signals. These events, which are known to play an important role on memory consolidation during sleep, are also characteristic of a number of neurological diseases. The operation of the system is based on a previously reported algorithm, which used the Teager energy operator, together with the Spectral...
Drug polypharmacology or “drug promiscuity” refers to the ability of a drug to bind multiple proteins. Such studies have huge impact to the pharmaceutical industry, but in the same time require large investments on wet-lab experiments. The respective in-silico experiments have a significantly smaller cost and minimize the expenses for the subsequent lab experiments. However, the process of finding...
Due to the increasing complexity of web and client application's structure, security problem has become more and more critical. Among all the threats reported, SQL Injection Attacks (SQLIAs) have always been top-ranked in recent years, and network logs, which are very important for the detection of SQLIA, are often utilized to analyze the user's attacking behaviors. However, the collection of network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.