Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The method for finding inverse element by the module is based on the stepwise addition of residue is developed in this paper. This method allows avoiding performing the complex arithmetic operations and implementing calculations on numbers much lower bit compared to the classical approach based on the Euclid's algorithm and its consequences. Analytical expressions of time complexity characteristics...
This paper proposes an algorithm that is particularly concerned with generating all possible distinct spanning trees that are based on breadth-first-search directed graph traversal. The generated trees span all edges and vertices of the original directed graph. The algorithm starts by generating an initial tree, and then generates the rest of the trees using elementary transformations. It runs in...
Empirical studies in software engineering frequently rely on correlation data in an effort to demonstrate that a process or tool affects an important or meaningful outcome, with the ultimate goal of improving software engineering practice. But all students of statistics know that "correlation does not imply causation," and so causal conclusions (using traditional methods) from observational...
Floating point operations of addition, subtraction, multiplication and division for normalization require removing the leading zeros. Algorithms to remove the leading zeroes using NOR logic for input bits along with carry, XOR logic on result of floating point operation are proposed in literature. This paper proposes leading zero count algorithm using NAND logic for adjacent bits of result of floating...
Algorithmic composition refers to the process of composing a melody automatically using algorithms. A bulk of methods have been proposed for this task. Among them, a novel idea is to utilize the correlation information between the pitches of melodies and the tones of lyrics for melody composition. Unfortunately, the existing method adopting this idea suffers from several severe shortcomings and thus...
The basic algorithm that consistently updates the switches of a Software Defined Network while preserving the update property of per-packet consistency is the two-phase update. The two-phase update is underspecified on two matters: 1) how to detect when the last packet of the old rule set has left the network and therefore exactly when to delete the old rules 2) recoverability of the update. Recoverability...
Flight planning software of unmanned aviation system is considered. The designed algorithm takes into account the terrain along the route of unmanned air vehicle and prevents some operator's mistakes.
Model-driven engineering has gained popularity in recent years offering a way to abstractly specify complex computational models and algorithms and generate both configurations and code to achieve their realisation. Often domain-specific languages are used as way to express these model structures enabling end users to better specify their target system needs. We have been applying MDE and Domain-Specific...
The paper presents a measure to improve the Tarantula spectral fault localization algorithm and solves the problems that the weight of the statements with a high-frequency coverage is significantly lower than the statements with a low-frequency coverage when Tarantula algorithm calculate the statement suspicious degrees. The improved algorithm has better discrimination when calculating the statement...
The Integrity protection (IP) of software which deals with eHealth data, addresses the problem of static or dynamic code modification of the software. An attacker with the ability to modify the execution of software which deals with eHealth data can tamper with eHealth data. The target of IP is to protect the software assets; in this case it is to protect eHealth data. By modifying the binary source...
In software quality research, software defect prediction is a key topic. The characteristics of software attributes influences the performance and effectiveness of the defect prediction model. However this issue is not well explored to the best of our knowledge. Thus we focus on the problem of attribute selection in the context of software defect prediction here and hence in this research, we propose...
An algorithm on automatic topology discovery in OpenFlow supported software defined networks is proposed. The proposed algorithm utilizing link layer discovery protocol allows to obtain the whole network topology by the network controller. We have validated the successful operation of our algorithm through simulation and real network tests seperately, and shown that it scales linearly.
The paper presents an algorithm for producing the logic conditions that result in the effects of a cause-effect graph belonging to a given software. These conditions yield the test cases of the software. The algorithm applies a three-valued Boolean algebra, and is based on the successive justification of logic values in a combinational network, where the primary inputs are the causes, and the primary...
Embedded Systems were traditionally implemented as a microprocessor surrounded by on-board peripherals, specifically assembled for a given application. Several Commercial Off-The Shelf solutions already provide a variety of on-chip custom modules, which allow a higher performance, smaller power consumption solution for a variety of applications. The advent of Field Programmable Gate Arrays (FPGA)...
Aspect mining is a growing area of research investigating the effective ways of finding crosscutting concerns in existing non-aspect oriented software. Once found, these concerns can be refactored into aspects, which in turn, reduce the system's complexity and make it easier to understand, maintain, and evolve. There are numerous studies that have defined new aspect mining techniques and used case...
Test case prioritization is an effective and practical technique of regression testing. It is helpful to increase the efficiency of regression testing by sorting and executing test cases according to their importance. Static paths on function call obtained by analyzing the source code, combined with the dynamic path after executing test cases, the correspondence is built between test cases and the...
Most of the proposed software testing approaches have concentrated on identifying faults in the implemented programs with the premise that the program may be implemented incorrectly. Although such premise is valid for many developed software systems and applications, it has been observed that many detected defects are caused by poor designed software. In this paper we present a dynamic analysis approach...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.