The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
5G does not only aim at higher capacity and lower latency than current 4G in mobile broadband networks, but also to increase the level of programmability, control and flexibility to meet the requirements from innovative use cases such as IoT, smart manufacturing, and immersive media. However, several difficulties still need to be overcome for a better technological adoption. To reduce the time-to-market...
Given today's fast growing automotive semiconductor industry, this tutorial will discuss the implications of automotive test, reliability and functional safety requirements on all aspects of the SOC lifecycle: design, silicon bring-up, volume production, and particularly in-system functional safety. Today's automotive safety critical chips need multiple insystem self-test modes, such as power-on self-test...
Automation of software testing is a complex problem with multiple facets to be handled in sync to be viable. In this work we propose two novel concepts; model dressing for automated exploratory testing. Model dressing maps an application under test to a model created for the domain of the application. In its simplest form, the domain model defines the business tasks as well as the user actions that...
Testing of web service orchestrations brings new challenges to developers of Service-Oriented Applications (SOA) due to their dynamic nature and missing control over underlying infrastructure. The current testing approaches and tools cover single testing activities such as test path analysis, test case generation, web service emulation, fault injection, etc. There is still a lack of solutions that...
Causal inference from observational data rely on similar treatment and control groups to isolate for variation, in addition to adjustments in estimates to account for the remaining uncontrollable variation. Propensity score matching and statistical inference are established tools to achieve for these two requirements respectively. Network structures in the underlying data of the experiment challenge...
Service oriented architectures (SOAs) allow for interesting and flexible software designs for complex problems. Such complex designs, however, require us to pay special attention to ensuring their quality. Extending earlier work on a testing and diagnosis concept for SOAs, we report in this paper on our first experience regarding an experimental setup with a test case generation algorithm based on...
Service-Oriented Architecture (SOA) supports loose-coupling and interoperability, where services communicate with each-other through message exchanging protocol and interfaces. SOA supports vendor diversity. In order to full-fill the vendor need, service composition is considered as a key process. Regression testing is inevitable to assure the quality of SOA based applications during their evolution...
In this paper we present the results of a two day workshop - a set of functional roles performed by software engineers during their first year and the knowledge and skill requirements that enable them in playing these roles. An effective curriculum that is aligned with needs of our business units is designed (for our entry level training program) based on the results of the workshop.
Web service based business process has become the backbone of enterprise information system, and it is evolving all the time. Therefore, the process has to be tested thoroughly and repeatedly whenever it is changed. This paper proposes a model driven approach toward generating executable test case from the given business process. The approach is composite of three stages: defining a process under...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
This paper addresses the questions, "Why is a test process necessary?" and "How can a "one size process "fit all lifecycles?" In answer to the first question, the paper will demonstrate that a test process based on the systems lifecycle, which is clearly understood by all stakeholders, will enable successful testing in all projects. The paper will then look at three common...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
This paper describes a benchmarking workload model for business process execution language (BPEL) engines for Web services. The proposed model is based on simulation of real world traffic conditions by defining a set of requirements which best characterize the end-users. The performance characteristics are evaluated on top of collected measurements such as success/fail rate, response times or round-trip...
A generic test process should support all approaches "formal to informal" and mixed approaches within, and across, all test levels. But widely-accepted formal approaches, from current standards, certification syllabi and tools, have explicitly-defined test cases as the key underlying entity: not all real-life approaches use explicit test cases. Also, testing is maturing beyond merely "finding...
Due to the continuously growing possibilities provided by technology and its wider application, today's IT products are becoming more and more complex both from technical and managerial standpoints. Very often, multiple parties are involved in their development. Consequently, the organization of the integration and testing of these products gets increasingly complex. Organisations already encounter...
Too often projects deliver software of which the quality is difficult to predict. Sometimes the project completion is delayed due to the continuous change of requirements while the software is still being built. The quality level must align with the company needs. It is extremely important that the planned benefits of an IT system are reached. When the benefits are not achieved it will cause much...
For the past 20 years, Seattle University's Master of Software Engineering program has incorporated industry sponsored projects into its capstone course sequence. Starting in 2005 the program was expanded to leverage projects that would cut across the themes presented in various courses to enable students to experience continuity and a common pedagogical application in various topics. The projects...
Management of testing provides high level control on testing and monitoring of testing provides both high level and detailed insight in the testing activities. The combination of management and monitoring gives a strong grip on test processes and test projects. This is required to manage risk, to increase efficiency and to provide transparency into development and test processes for various stakeholders...
Choosing the right test cases is an important task in software development due to high costs of software testing as well as the significance of software failures. Therefore, evaluating the quality of test techniques and test suites may help improving test results. Benchmarking has been successfully applied to various domains such as database performance. However, the difficulty in benchmarking test...
This position paper proposes a research agenda for the field of security testing. It gives a critical account of the state of the art as seen by a practitioner and identifies questions that research failed to answer so far, or failed to answer in such a way that it would have had an impact in the real world. Three categories of research problems are proposed: theory of vulnerabilities, theory of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.