The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software systems can be found in almost every aspect of our lives, as can be seen in social media, online banking and shopping, as well as electronic health monitoring. This widespread involvement in our lives has led to the need to protect privacy, as the use of the software often requires us to input our personal information. Software systems can also hold sensitive data (e.g., a trade secret) that...
An axiomtic approach to the problem of Pareto set reduction is considered. A decision maker is asked questions in order to elicit information on his/her fuzzy binary preference relation. A program is described that uses the obtained fuzzy information to reduce the Pareto set and thereby to facilitate a final choice.
During the past years, overload at work leading to psychological diseases, such as burnouts, have drawn more public attention. This paper is a preliminary step toward an analysis of the work patterns and possible indicators of overload and time pressure on software developers with mining software repositories approach. We explore the working pattern of developers in the context of Mozilla Firefox,...
The article deals with the determination of MLC (Military Load Classification) of vehicles. The two loading sets (tracked vehicle and the semi-trailer with the vehicle) are compared to the bending moment imposed to structure. The loads are applied to various spans from 10 to 100 meters, loading classes are calculated according to the STANAG 2021, Ed. 8. The aim of the article is to evaluate the MLC...
Information technology has been advancing in many countries. In their daily lives, people encounter computerized systems in many situations and often take their operation for granted. If a system failure occurs temporarily, it is disadvantageous for the system operator and the user. The use of distributed and parallel processing systems has increased the prevalence of software failures due to resource...
Mutation testing is a technique to evaluate the quality of test cases by assessing their ability to detect faults. Mutants are modified versions of the original program that are generated automatically and should contain faults similar to those caused by developers' mistakes. For configurable systems, existing approaches propose mutation operators to produce faults that may only exist in some configurations...
Feature-oriented software development (FOSD) has recently emerged as a promising approach for developing a collection of similar software products from a shared set of software assets. A well-recognized issue in FOSD is the analysis of feature interactions: cases where the integration of multiple features would alter the behavior of one or several of them. Existing approaches to detecting feature...
A Massive Open Online Course (MOOC) is a popular way for universities to deliver quality course content to a global audience. Furthermore, a MOOC specialization offers a series of related such courses with a capstone component. Typical software engineering capstone projects in campus courses involve teamwork and creating software. Within such a context, students experience the software development...
Open-source projects rely on attracting new and retaining old contributors for achieving sustainable success. One may suspect that adopting new development practices like Continuous Integration (CI) should improve the attractiveness of a project. However, little is known about the impact that adoption of CI has on developer attraction and retention. To bridge this gap, we study how the introduction...
Version information plays an important role in spreadsheet understanding, maintaining and quality improving. However, end users rarely use version control tools to document spreadsheets' version information. Thus, the spreadsheets' version information is missing, and different versions of a spreadsheet coexist as individual and similar spreadsheets. Existing approaches try to recover spreadsheet version...
New technologies involve in health domain as in every field of our entire life. This paper presents a study on the surgical instruments which are an indispensable part of health institutions. In the study, an application-based software approach is introduced to track the surgical instruments on which square barcodes were placed via laser printers. Either in the literature or in the industrial sense,...
Software-Defined Storage (SDS) concept has recently emerged as a new technology inside data centers. It can provide high availability, manageability, performance and cost benefits to both data center owners, application developers and subscribers including Mobile Network Operators (MNO) or Mobile Virtual Network Operators (MVNO). In this paper, based on the assumption that MNOs are competing to access...
The classic vehicle routing problem (VRP) is generally concerned with the optimal design of routes by a fleet of vehicles to service a set of customers by minimizing the overall cost, usually the travel distance for the whole set of routes. Although the problem has been extensively studied in the context of operations research and optimization, there is little research on solving the VRP, where distributed...
This paper presents a three-year participant observation in which the author acted as CTO of a software startup, spanning more than 9,000 hours of direct experience. The author's emails and diary reflections were analyzed and synthesized into a set of nine claims about software engineering work. These claims help shape software engineering research, practice, and education by provoking new questions...
Automated sentiment analysis in software engineering textual artifacts has long been suffering from inaccuracies in those few tools available for the purpose. We conduct an in-depth qualitative study to identify the difficulties responsible for such low accuracy. Majority of the exposed difficulties are then carefully addressed in developing SentiStrength-SE, a tool for improved sentiment analysis...
The continuous increase in data traffic, heterogeneous access networks, and the diversity in the Quality of Service (QoS) requirements of the applications is expected to significantly increase the management complexity of 5G networks. Software Defined Networking provides an effective management architecture enabling more efficient utilization of 5G network resources. In this paper, a novel failure...
Task-parallelism has been exposed as an efficient approach for the solution of dense and sparse linear algebra problems. Hierarchical matrices lie in-between the dense and sparse scenarios and, therefore, it is natural to target this niche of problems via a runtime-based solution that has reported successful results in the recent past for related linear algebra problems. Concretely, in this paper...
Hardware-Assisted Flow Integrity extension (HAFIX) was proposed as a defense against code-reuse attacks that exploit backward edges (returns). HAFIX provides finegrained protection by confining return addresses to only target call sites in functions active on the call stack. We study whether the backward-edge policy in HAFIX is sufficient to prevent code-reuse exploits on real-world programs. In this...
With the constant increase of multimedia internet penetration as well as rapid spread and sharing of various information, people pay more and more attention to the information related to daily power utilization. In order to realize the interaction between power companies and power utilization information of users, the power companies apply and register their public accounts to establish their own...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.