The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is well recognized that effort estimation is an essential part of successful software management. Among many estimation models, the Case-Base Effort Estimation (CBEE) has been intensively used among researchers and practitioners as a promising model for better and accurate effort prediction. The common challenges with this model are: (1) finding the nearest cases to the new case, (2) selecting...
The effective integrated approach for modeling of functional devices (FD), airborne computers and embedded systems on the devices design stage is proposed. This approach can be used at the manufacturers, which have a full production cycle, especially in the following industrial systems: instruments for onboard information processing and control, space systems, aviation systems and others. In the traditional...
With the increasing role of software in every field, concern has grown over the quality of software products. One such measure of software quality is the reliability, which is the probability of failure-free operation of a computer program in a specified environment for a specified time. Prior to the release of software, failure data are obtained during testing, using which, future reliability of...
The author has organized the project activities of computer modeling in teaching physics for IT students at the Novosibirsk State Technical University. The students' teams develop soft-ware products that are virtual counterparts of experimental setups. The developed programs can be used as interactive virtual labs that enhance the physics laboratory practicum. Participation in the project activities...
The integration of mathematical modelling, proof of correctness and statistical software quality assurance lead to extremely high-quality software. The integration was named as cleanroom software engineering. It proof the correctness of the deliverables of each phase, Instead of the classic analysis, design, code, test, and debug cycle, the cleanroom approach suggests a different point of view. Due...
This article considers the basic methods of telecommunication networks modelling, along with the relevant software tools. The expediency of using UNetLab, a new software product for simulation modelling, has been proven. This software is used for the creation and analysis of virtual laboratory-oriented experimental testing benches of telecommunication networks. The article formulates general basic...
Literature evidences have demonstrated the effectiveness of the sampled t-way test suite for defect detection in software testing. The main task in implementing t-way testing strategies is constructing best possibility test case. There are several methods that have been proposed but none of them can be claimed to be the best result because t-way are considered as NP-hard problem. In this paper, the...
Machine learning techniques have been achieving significant performance improvements in various kinds of tasks, and they are getting applied in many research fields. While we benefit from such techniques in many ways, they can be a serious security threat to the Internet if malicious attackers become able to utilize them to detect software vulnerabilities. This paper introduces a new concept of self-evolving...
Electrophysiological simulations are computationally expensive tasks. These kinds of simulations are usually run on super-computers or clusters, which may be expensive or difficult to access. In this work we present DENIS@Home, a simulation platform that follows the Volunteer Computing paradigm. DENIS@Home is based on BOINC, a volunteer computer environment used worldwide, and on Cell ML, an open...
We are discussing a framework for formally modeling and analyzing the security of trusted boot processes. The presented framework is based on actor networks. It considers essential cyber-physical features of the system and how to check the authenticity of the software it is running.
To date a number of comprehensive techniques have been proposed to defend against buffer overflow attacks. While in theory these techniques aim to detect and defend against all forms of buffer overflows, in practice attackers constantly find techniques to bypass these protection mechanisms. In addition quite many of the mechanisms proposed in literature are never absorbed into a production system...
The report addresses some general causes of changes in the computer physics and the specific activity of the Laboratory of Information Technologies (LIT) that has resulted in the creation of a hardware and software environment serving to the solution of the most demanding information technology topics arising in the research activity conducted in the Joint Institute for Nuclear Research (JINR). Mathematical...
We consider the problem of verification of software implementations of linear time-invariant controllers. Commonly, different implementations use different representations of the controller’s state, for example due to optimizations in a third-party code generator. To accommodate this variation, we exploit input-output controller specification captured by the controller’s transfer function and show...
Traditional software development approaches is obsoleting day by day and the place is being taken by some new evolved approaches like. Cleanroom development approach, Agile development approach etc. due to the evolution in development methodology there is a strong need of evolution in estimation models also. In this work we have proposed an extended version of COCOMO that is E-COCOMO and based on...
Program Slicing minimizes the program to substatements, which produces the same behaviour where the subset of the program also called the program slice comprises of the chunks or statements of the program which impact the values calculated at a point of absorption called as the slicing criterion. The concept of slicing was introduced by Weiser using a data-flow diagram [1]. If you look at static slicing,...
Computer virus is a rapidly evolving threat to the computing community. These viruses fall into different categories and it is generally believed that metamorphic viruses are extremely difficult to detect. The first step to effectively combat a virus is to successfully classify it's family so that past experience can be readily applied to understand it's functionality and apply the right strategy...
Although a quantum computer is the future of computing, its practical implementation is still far off. Programming a quantum computer is also difficult. Thus, using a quantum computer simulator is a way to learn how to use a quantum computer. QCL is one of the quantum computer simulators. It can simulate the quantum environment and execute quantum computer programs. However, the quantum computer simulator...
This study reported the development of Equation Sensei -- a mobile-assisted learning application in mathematics. Equation Sensei allows students to input their own problems or to solve problems generated by the application. It is capable of providing step-by-step guide in solving linear equations. Hints are provided whenever a wrong step is encountered. However, hints concerning arithmetic and fraction...
The paper presents an analysis of directions of development of cognitive information technologies for mathematical education. Two aspects of the problem are highlighted, they are a simulation of mental processes of a student and a modeling of a subject area. The proposed concept of development of cognitive informational technologies is confirmed by a retrospective analysis of information technologies...
Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.