The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the growing complexity of software, the number of test cases needed for effective validation is extremely large. Executing these large test suites is expensive, both in terms of time and energy. Cache misses are known to be one of the main factors contributing to execution time of a software. Cache misses are reduced by increasing the locality of memory references. For a single program run, compiler...
Software requirement selection is to find a subset of requirements (so-called optimal set) that gives the highest customer value for a release of software while keeping the cost within the budget. Several industrial studies however, have demonstrated that requirements of software projects are intricately interdependent and these interdependencies impact the values of requirements. Furthermore, the...
“Transfer learning”: is the process of translating quality predictors learned in one data set to another. Transfer learning has been the subject of much recent research. In practice, that research means changing models all the time as transfer learners continually exchange new models to the current project. This paper offers a very simple “bellwether” transfer learner. Given N data sets, we find which...
Obfuscation techniques are a general category of software protections widely adopted to prevent malicious tampering of the code by making applications more difficult to understand and thus harder to modify. Obfuscation techniques are divided in code and data obfuscation, depending on the protected asset. While preliminary empirical studies have been conducted to determine the impact of code obfuscation,...
For over two decades, software engineering (SE) researchers have been importing tools and techniques from information retrieval (IR). Initial results have been quite positive. For example, when applied to problems such as feature location or re-establishing traceability links, IR techniques work well on their own, and often even better in combination with more traditional source code analysis techniques...
A distributed system is considered that carries out computational tasks according to the master-worker paradigm. A master has a set of computational tasks to resolve. She assigns each task to a set of workers over the Internet, instead of computing the task locally. For each task each worker reply to the master with the task result. Since the task was not computed locally, the master can not trust...
Teaching agile software development by pairing lectures with hands-on projects has become the norm. This approach poses the problem of grading and evaluating practical project work as well as process conformance during development. Yet, few best practices exist for measuring the success of students in implementing agile practices. Most university courses rely on observations during the course or final...
Software testing and debugging of modern embedded computer systems become increasingly a challenging task due to growing hardware and software complexity, increased integration and miniaturization, and ever tightening time-to-market. To find software bugs faster, developers often rely on on-chip trace and debug resources. However, these resources offer limited visibility of the system, increase the...
Networked activity trackers have become an important tool for assessing physical activity, as part of behavior change interventions, within epidemiological studies, or driven by personal interest. However the use of activity trackers is often abandoned after a few months, and their effect on health behavior is unclear. We conducted a longitudinal study observing the use of activity trackers by 34...
We describe a security visualization tool for finding algorithmic complexity attacks in Java bytecode. Our tool, which we call J-Viz, visualizes connected directed graphs derived from Java bytecode according to a canonical node ordering, which we call the sibling-first recursive (SFR) numbering. The particular graphs we consider are derived from applying Shiver's k-CFA framework to Java bytecode,...
Knowledge Management portal is a system to support Knowledge Management process, in order to create, capture, develop, share, reuse and optimize the knowledge and particularly in Bina Nusantara University which has implemented Knowledge Management System (KMS) since 2002. However, this KMS need to be measured in order to know how better this KMS in term of the software size. The BINUS KMS will be...
Quantitative description and complexity understanding of software architecture are difficult questions of software development. Taking The complexity evolution of VTK software version as an example, this paper proposes a model for predicting the complexity of software evolution based on logistic equation and quantitative validation of Lehman's law. Its basic idea is that the software architecture...
The biggest concern is the cost incurred for test automation. Also, often software test automation requires skilled personnel and authentic test automation tools. Purchasing license of such tools is a costly affair.
The renewable electric power generation in low voltage distribution grids is continuously increasing, which can lead to overload of power transformers. Battery storages can help reducing the load of the transformer and increase the percentage of self sufficiency of distribution grids. In this paper applications of the Viable System Model proposed by Stafford Beer in different fields of research are...
Software Complexity Metrics play a major role of determining the complexity of a given software quantitatively with respective to one or more software complexity attributes in which the metric is willing to compute with. Among the continuation of the possible ways of computing the complexity of a software, the Cognitive Complexity calculation can be considered as a prominent factor since it indicates...
A well defined testing strategy is essential for any software development project. Testing efforts need to be carefully planed and executed in order to ensure effectiveness. Programming failures can represent a high risk for business. In order to mitigate such risk, companies have been increasingly investing more resources on software testing.
It is a fact that a lot of software is written by people without a formal education in software engineering. As an example, material scientists often capture their knowledge in the form of simulation software that contains sophisticated algorithms representing complex physical concepts. Since software engineering is typically not a core skill of these scientists, there is a risk that their software...
We present a case study of feature location in industry. We study two off-the-shelf feature location algorithms for use as input to a software cost estimator. The feature location algorithms that we studied map program requirements to one or more function points. The cost estimator product, which is the industrial context in which we study feature location, transforms the list of function points into...
Software trustworthiness is an important area of software reliability. How to measure it is a challenging. This paper aims at developing a new measurement model of software trustworthiness. For this propose, we first define the trusted evidence as a program unit or element which causes the untrustworthy. Then, we classify them and propose a measurement model to measure the degree of software trustworthiness...
The development of distributed and fault tolerant avionics systems from the first drafts to the finalization of the certification process is complex, resource intensive (financial and man power) and involves high risks. Therefore, implementations like fly-by-wire systems are usually limited to the FAR25 (CS25) domain. Previous research at the Institute of Aircraft Systems at University of Stuttgart...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.