The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The symptoms which reflect the poor design quality of code are known as code smells. Refactoring is one of the possible ways to remove code smells, but refactoring does not come for free to developer. So there is a need to have efficient refactoring strategies. For this purpose an empirical study on distribution of different code smells over different versions of projects is provided in this paper,...
Today, much more than in the past are discussed of plagiarism in the research. Conditions of the Web and Possibility of complex and smart searches in a short time, is rated to this, and as a result has arrived significant damages to the research. Tools designed to deal with plagiarism act on the text and ignore images. On the other, an inseparable part of information transfer are images that transfer...
With the current state of the art Natural language processing (NLP) technology, many researchers have proved that automatizing the requirement analysis process is possible which saves significant amount of time spent by the analysts. Numerous semi-automatic tools have been developed which assist the analyst in this process. However, a commonly used technique of using grammar in the elicited text as...
Docker containers run from Docker images, which can be distributed through so-called Docker registries. The currently available support for searching images in registries is however limited. Available registries (e.g., Docker Hub) only permit searching images "by name", i.e. by specifying a term occurring in the image name, in the image description or in the name of the user that created...
Various techniques have been proposed to detect smells in spreadsheets, which are susceptible to errors. These techniques typically detect spreadsheet smells through a mechanism based on a fixed set of patterns or metric thresholds. Unlike conventional programs, tabulation styles vary greatly across spreadsheets. Smell detection based on fixed patterns or metric thresholds, which are insensitive to...
Software developers need access to different kinds of information which is often dispersed among different documentation sources, such as API documentation or Stack Overflow. We present an approach to automatically augment API documentation with "insight sentences" from Stack Overflow -- sentences that are related to a particular API type and that provide insight not contained in the API...
Preprocessors are a common way to implement variability in software. They are used in numerous software systems, such as operating systems and databases. Due to the ability of preprocessors to enable and disable code fragments, not all parts of the program are active at the same time. Thus, programmers and tools need to handle the interactions resulting from annotations in the program. With our Eclipse-based...
Fingerprint recognition of network equipment is closely related to network security. Router equipment, as one of the critical device in network, is the key object of study on the recognition of network equipment. Due to the biggest market shares of Cisco routers, which dominate the data exchange of internet, it's significant to study the recognition of Cisco routers for safeguarding network security...
Due to the confusion of fault-prone software modules and non-fault-prone ones, and the limit of traditional mothed such as LDA and PCA, the performance of software defect prediction model is difficult to improve. In this paper, we present GMCRF, a method based on dimensionality reduction technique and conditional random field (CRF) for software defect prediction. In our proposed method, firstly, we...
High-precision spectral analysis techniques are the important means to carry out research of rotor system stability. It can be achieved feature extraction parameters about rotor system steady-state and spectrum of vibration signals during speeding-change process. For a big calculation error problem existed in commercial software come with spectral analysis in the status, It is proposed that the spectrum...
Combinatorial Testing is a test design methodology that aims to detect the interaction failures existing in the software under test. The combinatorial input space model comprises of the parameters and the values it can take. Building this input space model is a domain knowledge and experience intensive task. The objective of the paper is to assist test designer in building this test model. A rule...
This paper focuses on the content of test cases, and categorizes test cases into clusters using the similarity between test cases, their degree of similarity is obtained through a morphological analysis. If there are two similar test cases, they would test the same or similar functionalities in similar but different conditions. Thus, when one of them is run for a regression testing, the remaining...
Software companies are dealing with large number of software bugs daily. Bug triage fixes bug by properly assigning a developer to a new bug. Software companies spend heavy amount in dealing with these bugs. For reducing time and cost of bugs triaging automated approach is required which assigns new bug to a developer with relevant experience to solve the new coming report. To reduce the scale of...
Developers often rely on various online resources, such as blogs, to keep themselves up-to-date with the fast pace at which software technologies are evolving. Singer et al. found that developers tend to use channels such as Twitter to keep themselves updated and support learning, often in an undirected or serendipitous way, coming across things that they may not apply presently, but which should...
A common and simple way to create custom product variants is to copy and adapt existing software (a. k. a. the clone-and-own approach). Clone-and-own promises low initial costs for creating a new variant as existing code is easily reused. However, clone-and-own also comes with major drawbacks for maintenance and evolution since changes, such as bug fixes, need to be synchronized among several product...
Stack Overflow is one of the most popular question-and-answer sites for programmers. However, there are a great number of duplicate questions that are expected to be detected automatically in a short time. In this paper, we introduce two approaches to improve the detection accuracy: splitting body into different types of data and using word-embedding to treat word ambiguities that are not contained...
As more and more human-machine interactive applications call for higher frame rate and lower delay to get a better experience, there is an inevitable need for high frame rate and ultra-low delay image processing system. Current existing works based on vision chip target on video with simple patterns or simple shapes in order to get a higher speed, which is reasonable in the first trial of this new...
Methods for predicting issue lifetime can help software project managers to prioritize issues and allocate resources accordingly. Previous studies on issue lifetime prediction have focused on models built from static features, meaning features calculated at one snapshot of the issue's lifetime based on data associated to the issue itself. However, during its lifetime, an issue typically receives comments...
Spoofing attacks carried out using artificial replicas are a severe threat for fingerprint-based biometric systems and, thus, require the development of effective countermeasures. One possible protection method is to implement software modules that analyze fingerprint images to tell live from fake samples. Most of the static software-based approaches in the literature are based on various image features,...
In this paper, the applicability of hand tremor-based biometric recognition via leap motion device is investigated. The hypothesis is that the hand tremor is unique for humans and can be utilized as a biometric identification. In order to verify our hypothesis, spatiotemporal hand tremor signals are acquired from subjects. The objective is to establish a live and secure identification system to avoid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.