The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently modeling techniques are introduced to support safety assessment. Goal Structural Notation is one of these modeling techniques, which can be used to facilitate the development of safety argumentation and create reusable safety argumentation models. Consequently, GSN-based safety cases are widely used to demonstrate the safety of systems in safety-critical domains. Due to the amount of manual...
The application of Information Retrieval (IR) techniquesto software traceability link recovery has been the focusof many studies. These studies have formulated the task ofestablishing valid trace links between two types of softwareartifacts as a retrieval problem, where one type of artifacts isselected as the set of queries and the other as the corpus. Previouswork selected the sets of queries and...
Typing is a well known concept to prepare services for data processing for instance by choosing the correct service to a mime type for processing. But a lot more metadata elements, like availability and access conditions, provenance, processing preconditions or integrity parameters, are useful to be known in advance for preprocessing data services. In order to expose such metadata independently from...
Design pattern is the most common form of object oriented software reuse. In object oriented domain driven design, a number of high-level patterns have been identified and applied for over a decade. However, no concrete design patterns for domain modeling in this method have been published in the literature. A primary challenge in defining these design patterns is how to express their form in a way...
Robots are being increasingly used in safety-critical contexts, such as transportation and health. The need for flexible behavior in these contexts, due to human interaction factors or unstructured operating environments, led to a transition from hardware- to software-based safety mechanisms in robotic systems, whose reliability and quality is imperative to guarantee. Source code static analysis is...
Relatively little research has addressed the role of LI in the perception of English speech contrasts by Chinese learners of English as L3. The present study investigates the role of LI in the perception of the English alveolar-velar nasal coda contrast (/n/ vs. /η/) after the vowels /i Λ æ/ by bilingual Changsha Chinese speakers, whose LI is Changsha Chinese and L2 is Standard Mandarin. Changsha...
In a context where software is more and more pervasive in all systems, and where it is sometimes advocated that software complexity and size seem to provide some relevance to a probabilistic view of software behaviour, several initiatives suggest to change the way to address software in the global system safety assessment. The authors argue that whereas there are many links between safety assessment...
The proposed patterns for a specific domain were widely used for the concept of reusing of the resolved problems to similar ones. The verification criteria for proposed patterns evaluation are one of the important factors that affect the patterns quality. This research proposed patterns verification method and criteria based on quality attributes in order to improve patterns validity. The method was...
Problem Based Learning (PBL) is proposed as one of the most well-known alternatives to traditional lectures in modeling engineering graduates to become independent workers, critical thinkers, problem solver, lifelong learners, and team worker. In the past decades much has been reported about how to support online PBL, but much less attention has been given to support assessment in an online PBL. Recently,...
System integrators for commercial aircraft reason about the subsystems they must integrate using Interface Control Documents (ICDs). Although ICD format standards exist in this specific domain, avionics suppliers express their ICDs in different ways, making the integrator's work challenging. As software engineering researchers, we are trying to define a common vocabulary for ICDs in the context of...
In spite of an Enterprise Systems Implementation Methodology's (ESIM's) potential and significance for Enterprise Systems implementation, little attention has been paid to its evolution in ES literature. Moreover, current studies reveal contradictory findings and provide a fragmented understanding. The purpose of this paper is to provide a framework underpinned by a morphogenetic approach for explaining...
EU Member States are currently implementing the Infrastructure for Spatial Information for Europe (INSPIRE) Directive (2007/2/EC) that is helping to create a Spatial Data Infrastructure (SDI) for the environment and related policy areas. This will facilitate the exchange of spatial data between Member States, with an aim to overcome related technical and organisational challenges. To support this...
Verification methods can be classified according to two kinds of criteria: static or not - i.e. dynamic - and formal or not. This paper follows a work about verification of temporal properties using dynamic analysis. The approach proposes to transform an LTL property into a Büchi automaton and to run the automaton on an execution trace to be verified. Because traces are finite, the end of trace problem...
The paper presents an event driven approach for building interactive environments with sensory effects (such as RGB color light, wind and vibration) described through MPEGV standard. The most important differences of this work from previous ones are: (1) it divides the design process into well defined stages, showing the behavior of the system under a new perspective and their interactions, (2) it...
The Modeling & Simulation (M&S) of modern cyber-physical systems is presenting new challenges. New M&S techniques, methods and tools are emerging that take advantage of distributed simulation environments. One of the most mature and popular standard for distributed simulation is the IEEE 1516-2010 - High Level Architecture (HLA) that, although originally developed for military applications,...
Programs that process data that reside in files are widely used in varied domains, such as banking, healthcare, and web-traffic analysis. Precise static analysis of these programs in the context of software transformation and verification tasks is a challenging problem. Our key insight is that static analysis of file-processing programs can be made more useful if knowledge of the input file formats...
A person's context data can be used for a multitude of applications, such as energy management or health care. Common context recognition approaches rely on several factors, such as the sensor set, features, or the context modeling algorithm. Discovering the recognition performances of different parameter setting combinations is a complex, time-consuming, and error-prone task. To support the context...
Software bug localization aiming to determine the locations needed to be fixed for a bug report is one of the most tedious and effort consuming activities in software debugging. Learning-to-rank (LR) is the state-of-the-art approach proposed by Ye et al. to recommending relevant files for bug localization. Ye et al.'s experimental results show that the LR approach significantly outperforms previous...
Frequently requirements are written in natural language which may cause communication problems-misunderstandings. Misunderstandings are sources of risk that can severely impact the whole software development project. Since patterns and templates are tools for improving the quality of requirements, the question arises whether they can be treated as risk guards. In the paper we propose a method based...
User's new requirements on a system are critical factors for driving software service evolution. New requirements usually arise when users are not satisfied with the existing system as often reflected in users' divergent behaviors that can be detected through comparison with the known behavior patterns. In this paper, we propose a methodology that applies Conditional Random Fields (CRF) as the mathematical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.