The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a unified constraint-based test case generator for white-box method-level unit testing. The derivation of a suite of test cases can be defined as a constraint satisfaction problem. Each test case consists of a test input and an expected output. The program is automatically transformed into a constraint model called constraint logic graph. The constraint logic graph is a succinct...
Some high level algorithmic steps require more than one statement to implement, but are not large enough to be a method on their own. Specifically, many algorithmic steps (e.g., count, compare pairs of elements, find the maximum) are implemented as loop structures, which lack the higher level abstraction of the action being performed, and can negatively affect both human readers and automatic tools...
In software testing, most attention is given to verify the functionality of produced software. However, the quality of services (such as time to response or amount of produced data) is also important, especially in world of mobile or embedded devices. These properties are often estimated by using models of components, instead of testing the components from real applications. We have developed a simulation-based,...
The frequent non-availability of an automated oracle means that, in practice, checking software behaviour is frequently a painstakingly manual task. Despite the high cost of human oracle involvement, there has been little research investigating how to make the role easier and less time-consuming. One source of human oracle cost is the inherent unread ability of machine-generated test inputs. In particular,...
The paper analyzes the impact of duration and probability of generating a pause in the nodes movement on the performance of AODV routing protocol in an urban environment. Mobility in the urban environment is generated by applying Manhattan Grid mobility model. In addition, we have performed a comparative analysis of results obtained using two mobility generators, BonnMotion and SUMO. Experimental...
Software process models formalize the way a group of agents (e.g. developers, testers, managers etc) interact in order to produce a desired outcome (e.g. a product, an artifact etc). In this context, a "deviation" is a mismatch between the process executed by the agents and the process model. Existing approaches for deviation detection and handling force the agents to either pursue a deviation-free...
Applications like stock markets, embedded systems and telecommunications are becoming more demanding real-time database management systems. Research in the area of real-time databases leads to the development of sophisticated control algorithms and for testing these in different configurations we need a simulator framework that allows us to see how they behave for different transaction workloads....
In order to handle the large volume of events in large-scale distributed systems such as supply chain management systems, composite event detection is recently used as an effective means to identify the occurrence of complex patterns of events, which is an attractive but also a challenging task. This paper introduces a composite event processing framework and its models, and then describes an intelligent...
In a grid application, some requirements may change while the execution is in progress. This paper presents in-vivo enhancement--updating running grid applications to facilitate their perfective maintenance. Because applications in this domain are not only typically long-running, but also time-consuming to deploy, we propose a in-vivo enhancement can change a running application flexibly and efficiently...
An approach to the modeling of Critical Infrastructure can be the integration of already implemented and heterogeneous simulators. In this way the model builder can concentrate more on the modeling of interdependencies between heterogeneus infrastructure than on the developing of a huge and unique simulator. The HLA standard is probably one of the more common technique to reach such goal. We present...
Summary form only given. This paper presents a successful case of utilising DSM in software product line development: DSML and code generator for creating repository-based Eclipse plug-ins.
The quality and representativeness of simulation results heavily depend on the sequence of numbers used in the experiments. When dealing with simulations of critical systems, it might be necessary to increase the representativeness of such results by running experiments with different sequences and to investigate the system behaviour in specific situations. In large models, however, managing sequence...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
In the current environment of accelerating technological change, software development continues to be difficult, unpredictable, expensive, and error-prone model driven architecture (MDA), sometimes known as Executable UML, offers a possible solution. MDA provides design notations with precisely defined semantics. Using these notations, developers can create a design model that is detailed and complete...
This paper describes a benchmarking workload model for business process execution language (BPEL) engines for Web services. The proposed model is based on simulation of real world traffic conditions by defining a set of requirements which best characterize the end-users. The performance characteristics are evaluated on top of collected measurements such as success/fail rate, response times or round-trip...
The size of unified modeling language (UML) models used in practice is very large and ranges up to hundreds and thousands of classes. Querying of these models is used to support their quality assessment by information filtering and aggregating. For both, human cognition and automated analysis, there is a need for fast querying. In this context performance of model queries becomes an important issue...
In line with market demands and the need for technological innovations, designing and implementing software and hardware components for computing systems is growing in complexity. In order to cope with such complexity whilst meeting market needs, engineers often rely on design integration with commercial-of-the-shelf-components (COTs). In the case where lives and fortunes are at stake, there is a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.