The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic and semi-automatic approaches supporting program comprehension are sought by researchers and practitioners to facilitate software engineering tasks, such as development, maintenance, extension and so on. Using topic modeling is a promising way to automatically discover feature and structure from textual software assets. However, there are gaps between knowing and doing when applying topic...
Component-based software platforms likeOSGi facilitate the development of complex software. As software systems become more complicated, tool supportis often a necessity for assuring the conformance betweendesigned and implemented architectures. We present ARTOS, an architecture toolkit to facilitate the design and conformanceanalysis of the software running on the OSGi platform. Thetoolkit consists...
Modern software systems are becoming increasingly complex, relying on a lot of third-party library support. Library behaviors are hence an integral part of software behaviors. Analyzing them is as important as analyzing the software itself. However, analyzing libraries is highly challenging due to the lack of source code, implementation in different languages, and complex optimizations. We observe...
Simulation models are expensive to design and run. Commercial modeling software made for specific industries are costly and do not allow for compatibility across languages. Free and open source languages allow for more control in model creation. However, models written using these languages require more time to develop and interpret. We present a platform compatible with open source languages that...
Detecting lock-related defects has long been a hot research topic in software engineering. Many efforts have been spent on detecting such deadlocks in concurrent software systems. However, latent locks may be hidden in application programming interface (API) methods whose source code may not be accessible to developers. Many APIs have latent locks. For example, our study has shown that J2SE alone...
This paper presents AnModeler, a tool for generating analysis models from software requirements specified using use cases. The tool uses the Stanford natural language parser to extract type dependencies (TDs) and parts of speech tags (POS-tags) of sentences from input Use Case Specification (UCS). Then, it identifies sentence structures using a set of rules framed based on Hornby's verb patterns....
Through three Internet software company 40 people were Behavioral Event Interview (BEI), the establishment of a discriminative Competency Model Java software engineers that companies need innovation and strong emphasis on interpersonal communication, customer service-oriented software developer, interpersonal communication, customer service orientation and innovation will become the core of Internet...
The interface between human operators and industrial control systems (HMI, Human Machine Interface) is a key component for operating and configuring industrial machines and facilities, which have grown in terms of functionality and complexity. However, HMI software in industrial operation tends to have a longer lifespan than desktop or office software. Besides growing maintenance cost over time, it...
Software security is becoming highly important for universal acceptance of applications for many kinds of transactions. Automated code analyzers can be utilized to detect security vulnerabilities during the development phase. This paper is aimed to provide a survey on Static code analysis and how it can be used to detect security vulnerabilities. The most recent findings and publications are summarized...
Assessing the quality of a test suite is an important step of the testing process. Indeed, it is necessary to ensure that the different test cases target all the critical parts of the system. Model-based testing is a famous technique to perform testing. It uses a model of the system under test. Most of these models include logic formulas. Such formulas encompasses constraints to be satisfied within...
This paper describes an analysis of emissions of carbon monoxide (CO) using a discrete event simulator of open source. A simulation model was built to evaluate gas emissions emitted by a fleet of trucks during transportation of raw materials in a typical supply system of sugarcane in producer mills of ethanol. The simulation model was implemented in the open source simulator and a traditional simulator...
This paper provides a retrospective examination of GUI Ripping — reverse engineering a workflow model of the graphical user interface of a software application — born a decade ago out of recognition of the severe need for improving the then largely manual state-of-the-practice of functional GUI testing. In these last 10 years, GUI ripping has turned out to be an enabler for much research, both within...
We propose a new modularity vision to integrate design modeling with programming. A system consists of not only program code but also design models. However, design models such as UML diagrams have been treated as not modules but complementary documents. This paper provides a novel idea that treats a design model as a first-class software module termed design module. A system cannot be complied without...
Spectrum-based fault localization (SFL) and dynamic code coverage (DCC) are two statistics-based fault localization techniques used in software fault diagnosis. Due to their nature (statistical analysis of the coverage information), the best technique of the two depends greatly on the system under test code structure and size. We propose a lightweight, topology-based analysis to quickly estimate the...
The ever increasing number of platforms and languages available to software developers means that the software industry is reaching high levels of complexity. Model Driven Architecture (MDA) presents a solution to the problem of improving software development processes in this changing and complex environment. MDA driven development is based on models definition and transformation. Design patterns...
We combine static analysis techniques with model- based deductive verification using SMT solvers to provide a framework that, given an analysis aspect of the source code, automatically generates an analyzer capable of inferring information about that aspect. The analyzer is generated by translating the collecting semantics of a program to a "marked" formula in first order logic over multiple...
It is difficult to sufficiently specify software security requirements because they depend on a software architecture that has not yet been designed. Although the Twin Peaks model is a reference model to elicit a sufficient amount of software requirements in conjunction with the architectural requirements, it is still unclear how the security requirements can be elicited while taking the architecture...
In this paper we briefly describe a case study, i.e. the Mobile eHealth (MeH), developed in the context of the IST PLASTIC project aimed at supporting self-adapting and context-aware services. The goal of the case study is to show how to model a service-based application and to demonstrate that model-based solutions are suitable to generate Quality of Service (QoS) models and adaptable code from service...
We report here on our on-going work that addresses the automated analysis and test case generation for software systems modeled using multiple State chart formalisms.
The objective of vulnerability analysis is to find out the unknown security holes in a system. Many software bugs, such as SQL injection, come from careless check of the input string. Finding these bugs out is very difficult without source code inspect. This paper gives a novel method to check the bugs in Java byte code based on points-to dataflow analysis, which is different to the common analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.