The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Termination analysis has been studied for many years. The size-change termination principle proposed by Lee, Jones and Ben-Amram in 2001 is an effective method for automatic termination analysis. The principle ignores the condition and return values for function call. In this paper, we devise a new method for termination analysis over the integer domain by reconsidering the ignoring features. The...
This university has published the “MMDAgent” voice interaction system toolkit as opensource software. MMDAgent enables users to develop voice interaction system easily by editing the voice interaction scenario based on Finite State Transducer (FST) format. However, having numerous people edit it simultaneously is difficult. For that reason, tremendous labor costs are necessary to describe an abundant...
Recently, embedded assembly programs have properties dependent on hardware (direct operation of address spaces, memory mapped I/O, interruption, etc.) in the process of development. Thus, demands about the established method of formal verifications corresponding to those properties are increasing from the point of view of shorter development and high reliability. Our work aims at enabling formal verification...
Knowledge management (KM) is essential for success in global software development. Software organizations are now managing knowledge in innovative ways to increase productivity. In agile software development, collaboration and coordination depend on the communication, which is the key to success. To maintain effective collaboration and coordination in distributed agile projects, practitioners need...
Automation testing framework enables the complete automation of the entire testing process in a software development life cycle. This research paper will mainly focus on a new hybrid automation testing framework called GRAFT - Generic & Reusable Automation Framework which supports cross browser testing.
This paper introduces a design principle for automatic cloth car wireless communication control system of mechanical equipment in metallurgy and mine. The system includes vehicle control system and a ground control system, installed on-board radar material level meter in cloth car bottom, photoelectric rotary encoder and the cloth wheel is coaxially connected, in cloth car body control device installed...
This paper presents the review of literatures that shows the contribution of the agile methodology towards teaching and learning environment at university level. Teaching and learning at university has since migrated from traditional learning to active learning methodology where students are expected to learn by doing rather than listening passively to lectures alone. The agile methodology naturally...
This paper presents experiences in embedded education through implementation of vehicle toys. An overview of toy categories is given. Some of the ideas for toys as learning tools are explored. Two case studies are presented - a Summer School and Robot Contest. Specific problems are emphasized and further development ideas are pointed-out.
Wireless Sensor Networks (WSN) and related technologies have the important impact nowadays. These technologies have variety of applications, and they are key enabling technologies of IoT (Internet of Things). ZigBee standard is the most common WSN technology. Its importance and expansion, as a widely used technology in many different areas, influence the importance of including ZigBee technology in...
This paper presents a survey on the activities carried out to improve the learning experience of electrical engineering undergraduate students in power system protection unit in Cur-tin University, Australia. The unit was conducted initially based on lectures and tutorials where only two sessions on computer simulation and one session of laboratory demonstration were conducted. In academic year of...
Although spreadsheets are often faulty, end-users like them for their flexibility. Most existing approaches to spreadsheet diagnosis are fully automated and use static analysis techniques to find anomalies in formulas or methods to derive test cases without user interaction. The few more interactive approaches are based on values already present in spreadsheets as well. In our work, we advance the...
Since increasing complexity and scale of modern software products imposes tight scheduling and resource allocations on software development projects, a project manager must carefully triage bugs to determine which bug should be necessarily fixed before shipping. Although in the field of Mining Software Repositories (MSR) there are many promising approaches to predicting, localizing, and triaging bugs,...
This paper presents a practical experience of using a large, publically available dataset for a purpose that it was not originally collected The process is examined from discovery to analysis with reference to the vaunted but seldom seen ideal of data digital libraries.
This paper proposes the design of specific programme dedicated for students who want to specialize in software testing at postgraduate level. The motivation behind this proposal is to encourage more higher learning institutions to offer variety of software engineering related programme, in particular software testing so that this area is recognized as another key contributor for developing competent...
The path constraints are leaked by conditional jump instructions which are the binary form of software's internal logic. Based on the problem of above, reverse engineering using path-sensitive techniques such as symbolic execution and theorem proving poses a new threat to software intellectual property protection. In order to mitigate path information leaking problem, we propose a novel obfuscation...
Predicting the time required to address an issue (i.e., a feature, bug fix, or enhancement) has long been the goal of many software engineering researchers. However, after an issue has been addressed, it must be integrated into an official release to become visible to users. In theory, issues should be integrated into releases soon after they are addressed. Yet in practice, the integration of an addressed...
A computer program's dynamic instruction trace is the sequence of instructions it generates during run-time. This article presents a method for analysing dynamic instruction traces, with an application in malware detection. Instruction traces can be modelled as piecewise homogeneous Markov chains and an exact linear time method is used for detecting change points in the transition probability matrix...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
Prevalence of Agile methods in software companies is increasing. Software companies need to employ these methods to overcome the inherent challenges of traditional methods. However, transitioning to Agile approach is a topic of debate and needs to be supported by appropriate facilitators. Conducting a large-scale research study, revealed the most important Agile transition facilitators. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.