The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software testing happens to be an inescapable, big-budget and protracted software engineering activity. It is well established that software testing cannot be accomplished in totality even for small input programs. The researchers have been trying to find alternatives like test case selection, minimization, and prioritization. Along with many other approaches, recent research has witnessed the emergence...
In the process of multi axis machine tool, sometimes it is necessary to switch between the rotating spindle and the rotary feed shaft. In order to satisfy the request mentioned above, this article makes a brief introduction to the upper software and analyzes the control principle of spindle by using PMAC, combined with that, a method to deliver the automatic switching function between spindle mode...
The authoring tools are software applications, for the construction of educational resources that incorporate the possibility of including multimedia elements, that allow to carry and use the resources created in various environments or devices types. Edutools is an authoring tool conceived for the creation of Learning Objects (OA) in HTML format (Hyper Text Markup Language), moreover the tool provides...
Nowadays there is a worldwide interest in introducing notions of programming in basic schooling. In line with this, different training programs have been proposed to allow the appropriation of these novel contents. This paper presents a proposal for interdisciplinary training in computer programming for primary school teachers, carried out in Argentina. Taking a socio-technical approach and from a...
To improve software quality, researchers and practitioners have proposed static analysis tools for various purposes (e.g., detecting bugs, anomalies, and vulnerabilities). Although many such tools are powerful, they typically need complete programs where all the code names (e.g., class names, method names) are resolved. In many scenarios, researchers have to analyze partial programs in bug fixes (the...
This work is motivated by the pervasive use of method invocations in object-oriented (OO) programs, and indeed their prevalence in patches of OO-program bugs. We propose a generate-and-validate repair technique, called ELIXIR designed to be able to generate such patches. ELIXIR aggressively uses method calls, on par with local variables, fields, or constants, to construct more expressive repair-expressions,...
Binary lifting, which is to translate a binary executable to a high-level intermediate representation, is a primary step in binary analysis. Despite its importance, there are only few existing approaches to testing the correctness of binary lifters. Furthermore, the existing approaches suffer from low test coverage, because they largely depend on random test case generation. In this paper, we present...
In the paper, principles of constructing systems and functional abilities of information support of human-operators (IOSS) of power units of nuclear power plants (NPP) and their place within the system of upper unit-level of automated process control systems (APCS) of NPP. The purpose of implementation of the NPP IOSS is preventing or decreasing the frequency and heaviness of operator errors appearing...
Science is conducted collaboratively, often requiring knowledge sharing about computational experiments. When experiments include only datasets, they can be shared using Uniform Resource Identifiers (URIs) or Digital Object Identifiers (DOIs). An experiment, however, seldom includes only datasets, but more often includes software, its past execution, provenance, and associated documentation. The Research...
Finite state machines being intuitively understandable and suitable for modeling in many domains, they are adopted by many software designers. Therefore, testing systems that are modeled with state machines has received genuine attention. Among the studied testing strategies are complete round-trip paths and transition trees that cover round-trip paths in a piece wise manner. We present an empirical...
When testing a program without a test oracle, it is impossible to know whether a test case will lead to a failure or not. The infeasibility to identify a failed test case severely restricts the applicability of many testing, debugging and fault localization techniques. However, with the help of Metamorphic Testing (MT) which was proposed to alleviate the test oracle problem, we are able to estimate...
Code changes are often reviewed before they are deployed. Popular source control systems aid code review by presenting textual differences between old and new versions of the code, leaving developers with the difficult task of determining whether the differences actually produced the desired behavior. Fortunately, we can mine such information from code repositories. We propose aiding code review with...
Software specifications are useful for software validation, model checking, runtime verification, debugging, monitoring, etc. In context of safety-critical real-time systems, temporal properties play an important role. However, temporal properties are rarely present due to the complexity and evolutionary nature of software systems. We propose Timed Regular Expression Mining (TREM) a hosted tool for...
Hypervisors are software more and more widespread because of the increasing usage of virtualization, especially in the Cloud. But they are not bug-free. CrashOS is developed to test them and contributes to find security vulnerabilities in hypervisors.
Defect prediction has been the subject of a great deal of research over the last two decades. Despite this research it is increasingly clear that defect prediction has not transferred into industrial practice. One of the reasons defect prediction remains a largely academic activity is that there are no defect prediction tools that developers can use during their day-to-day development activities....
Now that it is becoming straight forward that industrial environments are a target for threats, hints will be provided here to face this issue with a focus on architecture and design. This approach is not treated by traditional means in detection of security vulnerabilities, like the static code analysis. Our approach explains how the quality of the code architecture against security attacks can be...
Runtime Verification consists in studying a system at runtime, looking for input and output events to discover, check or enforce behavioral properties. Interactive debugging consists in studying a system at runtime in order to discover and understand its bugs and fix them, inspecting interactively its internal state.Interactive Runtime Verification (i-RV) combines runtime verification and interactive...
Most software systems can be modeled either fully or partially using finite state machines. For this reason, many testing criteria for finite state machine models have been proposed and discussed by the research community. Among the studied testing criteria are complete round-trip paths and transition trees that cover round-trip paths in a piece wise manner. The theoretical comparison between the...
One of the biggest benefits of virtual education is the ability to easily explain complex processes and principles using animations and interactive 3D models. The purpose of this study is to determine which 3D software product should be used for the display of interactive graphic engineering documents, so that the visualization and manipulation of 3D models provide useful support to students of industrial...
Safety-critical systems in domains such as aviation, railway, and automotive are often subject to a formal process of safety certification. The goal of this process is to ensure that these systems will operate safely without posing risks to the user, the public, or the environment [1]. It is typically expensive and time consuming for companies to certify their software. Therefore, any attempt to automate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.