The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mutation testing is known as an effective method for evaluating test sets in terms of their error-revealing capability. When applying mutation testing, it is necessary to identify and filter out the equivalent mutants, i.e. mutants that despite their syntactical difference have the same semantic as the original program. Due to the undecidable nature of the problem of determining whether two programs...
Requirements reusability within agile development improves software quality and team productivity. One method to implement requirements reusability is traceability, in which relations and dependencies between requirements and artifacts are identified and linked. In this paper, we propose a semiautomated methodology to implement traceability in the agile development process in order to achieve requirements...
Aphasia is a common adult language disorder acquired after a stroke, head injury, tumor, etc. Accurate diagnosis influences the prognosis of any speech and language disorder including aphasia. Therefore, in this paper we have proposed a semi-automated Aphasia diagnosis and classification framework employing feature extraction and pattern matching techniques of the digital signal processing (DSP)....
The continuous development of trustworthy software promotes the in-depth study of formal methods. This paper focuses on the formal derivation of algorithm based on recurrence relations. We show two examples of automated transformation processes by combining Isabelle theorem prover with Dijkstra weakest precondition method, that can avoid the error-prone and long-winded problems in manual verification...
A hazard of ongoing Network Function Virtualization (NFV) realizations is the lack of a common understanding in support of development, deployment and operation tasks related to Virtual Function Networks (VNFs), NFV components and interfaces. In the current state of affairs, NFV stakeholders commonly create their own terminology to define and describe NFV components, following going the specifications...
The motivation behind introducing Aspect Oriented Programming (AOP) has been to increase the modularity of software by allowing a clear separation of core and cross-cutting concerns in software. AspectJ is a common AO programming technique used by programmers with excellent support from the Eclipse community. In AspectJ, complex interactions between the base code and aspects can make the code very...
Malware polymorphic and metamorphic obfuscation techniques combined with so-called "sandboxing evasion techniques" continue to erode the effectiveness of both static detection (signature matching), and dynamic detection (sandboxing). Specifically, signature based techniques are overwhelmed by the sheer number of samples generated from a single seminal binary through the use of polymorphic...
Online content has been recently subjected to ethical filtering in conformance to regional set of norms. Normative judgments are often difficult to determine the limits to dispersion and free-flow of information by state and society. Filtering unethical website content requires keyword analysis, a challenge in current manual IP filtering technologies. Due to sparse representation of objectionable...
The activities of copy and paste fragments of code from a source code into the other source code, with or without modification, are known as the code cloning. The process is often done by software developers because it's easier than generate code manually. In the other hand, this behavior leads to the increasing of effort to maintenance the code. Research on detecting the presence of cloning has been...
In this paper, we present a distributed way to automatically map users' requirements to reference process models. In a prior paper [9], we presented a tool called Process Model Requirements Gap Analyzer (ProcGap), which combines natural language processing, information retrieval, and semantic reasoning to automatically match and map textual requirements to domain-specific process models. Although...
i* is goal-oriented requirement modeling framework with an increasing use in industry and academy. One of the main challenges in adopting this framework, is the diversity of variants/dialects of the i* modeling language. These variants were created by different research groups to address their particular purposes and are supported by specific CASE tools. Considering them, it is possible to identify...
A raw object is partially initialized, with only some fields set to legal values. It may violate its object invariants, such as that a given field is non-null. Programs often manipulate partially-initialized objects, but they must do so with care. Furthermore, analyses must be aware of field initialization. For instance, proving the absence of null pointer dereferences or of division by zero, or proving...
A case-based approach allows reuse without the usual and significant effort for making software explicitly reusable. We even support such reuse for only partially developed requirements, since it allows reuse already without the need to develop a “complete” specification first. The solution information (models and code) of (one of) the most similar problems can then be taken for reuse and adapted...
The ability of automatic web service composition to create a new composite web service is one of the key enabling features for the future for the semantic web. There are some successful methods for automatic web service composition, but the lack of standard, open, and scalable test environment makes the comparison and evaluation of these composition methods impossible. In this paper we propose a light...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.