Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Even the smallest coding mistake can cause huge problems when it slips by testing. Finding it can be difficult, and retesting the fixed system can be expensive, but this certainly isn’t true for every type of problem. A defect found and fixed during coding is a fairly routine occurrence and not costlier than a defect found and fixed during design. Quite the opposite is usually true.
In the past years the Autonomous Underwater Vehicle technology has increased in complexity and expanded its role in the subsea environment. More and more, AUVs are performing critical and key activities. Therefore, Reliability of AUV systems is a topic with crescent relevance in the underwater field. When developing a complex system such as an AUV some issues might appear during the execution of hardware...
Dafny is a formal-verification system that takes a language-based approach. Its programming language includes the necessary specification and proof facilities. The idea is to provide developers with an immersive experience that feels like programming but encourages thinking about program correctness every step of the way.
The methods for assessing and predicting the reliability of software, based on a life-cycle approach to software reliability engineering (SRE), are prescribed in this recommended practice. It provides information necessary for the application of software reliability (SR) measurement to a project, lays a foundation for building consistent methods, and establishes the basic principle for collecting...
When designing dependable cyber-physical systems, software architects must plan for defects and environmentally caused failures. Determining the right degree of redundancy is a complex task which requires balancing failure potential reduction, additional coordination effort, increased costs, weight, and power consumption. An efficient fail-operational design requires software-based measures increasing...
This paper presents a generalized modeling framework of fault detection and correction processes with bivariate distributions. The presented framework includes almost all existing software reliability growth models, namely the models in which both fault detection and correction processes are described by non-homogeneous Poisson processes. In our framework, the time dependency of fault correction time...
Test Automation Platform©1 (TAP) is a software system that developers can use to test their own hardware or software (or combinations of both). Developers create TAP test plans by combining and configuring individual test steps in a GUI. Developers can also develop their own test steps with .NET to better suit their needs. Since (manual) programming is always prone to errors, TAP users need...
It is normally hard to believe in software security claim if we do not know what is meant exactly by "secure" and the reasons to support the claim are not sufficiently provided. Security cases—which document the rationale for believing that a system is adequately secure—are intended to address both these issues. However, due to lack of practical construction method...
Monitoring the results of software reliability growth models (SRGMs) helps evaluate project's situations. SRGMs are used to measure the reliability of software by analyzing the relations between the number of detected bugs and the detected time to predict the number of remaining bugs within the software. For example, development managers apply a SRGM to the number of detected bugs and the detected...
Numerical algorithms are used in many areas but they rely on approximate computations due to the finite precision computer arithmetic. As critical systems perform more and more calculations, needs for verification and validation techniques and for assisted development increase, the computer arithmetics being particularly not intuitive. It is then necessary to provide tools to the programmers, to help...
Software Reliability Classes (SRCs) have been developed in order to compare the field reliability performance of a sequence of software releases for a cluster of similar hardware products. A specific cluster is characterized by the type of market the hardware supports, and the software releases for the cluster have similar functionality, complexity, size, and customer expectations. SRCs are a normalized...
This paper offers a new approach to modelling the effect of cyber-attacks on reliability of software used in industrial control applications. The model is based on the view that successful cyber-attacks introduce failure regions, which are not present in non-compromised software. The model is then extended to cover a fault tolerant architecture, such as the 1-out-of-2 software, popular for building...
In Korea weapon system software development, there is a manual which defines the process for software development, support and management. Although this manual guides developers to perform static and dynamic testing of source code, these are not sufficient for developing reliable software. Therefore undefined activities in the manual, such as modeling software reliability and metric data collection,...
Requirements Engineering (RE) has grown from its humble beginnings to embrace a wide variety of techniques, drawn from many disciplines, and the diversity of tasks currently performed under the label of RE has grown beyond that encom-passed by software development. We briefly review how RE has evolved and observe that RE is now a collection of best practices for pragmatic, outcome-focused critical...
This paper discusses the role of safety, availability, dependability of Internet of Things (IoT) data services dedicated to the monitoring and control of objects in the physical world. These services are designed to be available to devices and users on request at any time and at any location. The Internet of Things differs from today's global Internet in a number of ways. For instance, the networks...
With Software Defined Networking (SDN) the control plane logic of forwarding devices, switches and routers, is extracted and moved to an entity called SDN controller, which acts as a broker between the network applications and physical network infrastructure. Failures of the SDN controller inhibit the network ability to respond to new application requests and react to events coming from the physical...
This paper proposes the principle of classifier construction for software reliability models and assessment techniques. The classifier is built using a facet-hierarchical approach and allows systematizing scientific publications in the field of software reliability. The available publications for more than 50 years have been analyzed and classified by use of hierarchy of software reliability attributes...
The development of knowledge-based systems (KBSs) has been an area subject to much criticism due to the general lack of structured engineering methods. Although many design and development methods have been proposed and successfully realised, such as CommonKADS, there is still a continuing concern that the reliability of KBSs is difficult to evaluate. This is partly due to the limited incorporation...
Achieving dependable software is a challenging problem, especially for industries beyond traditional safety-critical domains, such as telecommunications, consumer electronics, manufacturing, etc., where the cost of software failures is still quite high. Several factors contribute to exacerbate this problem: these industries are abruptly converting into software-driven ones; they must face time-to-market...
Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.