The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When using formal verification on critical software, an important question involves whether we have we specified enough properties for a given implementation model. To address this question, coverage metrics for property-based formal verification have been proposed. Existing metrics are usually based on mutation, where the implementation model is repeatedly modified and re-analyzed to determine whether...
A classical difficult isomorphism testing problem is to test isomorphism of p-groups of class 2 and exponent p in time polynomial in the group order. It is known that this problem can be reduced to solving the alternating matrix space isometry problem over a finite field in time polynomial in the underlying vector space size. We propose a venue of attack for the latter problem by viewing it as a linear...
We present CoSTest, a tool that supports the validation of Conceptual Schemas by using testing. The tool implements techniques for transforming instantiations from a Requirements Model into test case implementations by supporting a Model-driven architecture.
Statistical testing based on a Markov chain usage model, as a rigorous testing method, has been around for more than two decades. Through the comprehensive application of statistical science to the testing of software, it provides audit trails of evidence to support correctness arguments for a software-intensive system as well as a decision that the system is of requisite quality for its intended...
NoC-based designs provide a scalable and flexible communication solution for the rising number of processing cores on a single chip. To master the complexity of the software design in such a NoC-based multi-core architecture, advanced incremental integration testing solutions are required. This work presents a virtual platform based software testing and debugging approach for a synchronous application...
The User Requirements Notation is a standard published by the International Telecommunication Union that contains two complementary notations for goal and scenario/workflow modeling. Use Case Maps (UCM) – the workflow notation – focuses on the causal relationships of the steps in a workflow without requiring the specification of detailed message exchanges and data. A UCM model captures the interactions...
In today's modern computing environment we are surrounded by a vast sea of electronic computing systems and devices. These systems are now closely integrated into our everyday lives and provide us with a wealth of computing power. While these systems provide us with great computational values, these very systems we have come to rely upon now also face issues regarding their own long term longevity...
Model-based mutation analysis is a powerful but expensive testing technique. We tackle its high computation cost by proposing an optimization technique that drastically speeds up the mutant execution process. Central to this approach is the Featured Mutant Model, a modelling framework for mutation analysis inspired by the software product line paradigm. It uses behavioural variability models, viz...
In this paper we assess and evaluate the quality of t-way combinatorial test-suites using three different test-suite quality assessment methods. As t-way combinatorial test-suites reduce the input space of a program under test, we investigate how an increasing t affects the quality of the test-suite. There are some limitations of existing test-suite quality assessment methods e.g. the number of mutants...
We present a framework for comprehensive model-based systematic design and staged verification of Human-in-the-Loop Cyber-Physical Systems (HiLCPS) to handle their inherent complexity. HiLCPS are systems where humans are in the middle of the feedback loop between their cyber and the physical components. HiLCPS designers require modern tools and simpler model-based approaches for design and verification...
Embedded software, such as railway, aviation, and medical devices, must provide users with safety and reliability software called safety-critical software. It is required to thoroughly analysis requirements, and to provide users with software with high quality attributes of reliability and safety as a result of clear requirement analysis. To analysis the requirements, we mainly use the white box view...
The effective integrated approach for modeling of functional devices (FD), airborne computers and embedded systems on the devices design stage is proposed. This approach can be used at the manufacturers, which have a full production cycle, especially in the following industrial systems: instruments for onboard information processing and control, space systems, aviation systems and others. In the traditional...
Security is often treated as secondary or a non- functional feature of software which influences the approach of vendors and developers when describing their products often in terms of what it can do (Use Cases) or offer customers. However, tides are beginning to change as more experienced customers are beginning to demand for more secure and reliable software giving priority to confidentiality, integrity...
Recent years have seen a proliferation of complex Advanced Driver Assistance Systems (ADAS), in particular, for use in autonomous cars. These systems consist of sensors and cameras as well as image processing and decision support software components. They are meant to help drivers by providing proper warnings or by preventing dangerous situations. In this paper, we focus on the problem of design time...
Today's highly increasing product diversity and decreasing product life cycles, also in the automotive industry lead to fast changing production systems with a high ratio of mechatronic components and (control) software. That again leads to ever increasing use of Virtual Commissioning during the development process of automated manufacturing plants. Paired with the still increasing request towards...
The behavior of virtual characters in computer games is usually determined solely by decision trees or finite state machines, which is detrimental to the characters' believability. It has been argued that enhancing the virtual characters with emotions, personalities, and moods, may make their behavior more diverse and thus more believable. Most research in this direction is based on existing (socio-)psychological...
Computer interlocking software is a real-time and safety-critical software, which can ensure the traveling safety and improve the transportation efficiency in the railway signal computer control systems. It is of great significance to evaluate the reliability of the interlocking software before putting them into operation. Most of the existing Non-Homogeneous Poisson Process (NHPP) models did not...
Due to the still increasing interconnectedness of systems it is very much important to further strengthen activities towards assuring security requirements of those systems. Quality assurance methods like coding guidelines with a focus on security related issues, and static analysis tools are necessary but not sufficient because of the fact that security is a system property. Therefore, it is important...
Application of neural networks for direct prediction of lateral-directional force and moments coefficients from the measured flight data of the research aircraft is proposed in this paper. Proposed model of neural networks appears to be a suitable practical approach to develop relationship between flight variables. This relationship eliminates the need of aerodynamic model as well as thrust model...
In Embedded Software, the early-stage testing of source code is important since it may reduce the future development cost. However, at the automotive domain, the conventional software testing methods depend on actual system and hardware such as Hardware-in-the-Loop simulator and vehicle, then the early-stage testing method of automotive software is still in immature status. Therefore the testing of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.