The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Neurosurgical procedures are complicated processes, providing challenges and demands ranging from medical knowledge and judgment to the neurosurgeons dexterity and perceptual capacities. Deliberate training of common neurosurgical procedures and underlying tasks is extremely important. One effective method for the training is to enhance the required surgical training tasks through the use of neurosurgical...
Multipartite table methods offer a high speed, low area implementation of commonly used functions for up to 24 bits of accuracy. Currently the parameters which dictate the configuration of these tables are chosen using a worst-case rounding approximation scheme which often generates sub-optimal results. This paper will show that it is possible to perform a full exhaustive search to find the minimum...
Visual FoxPro software is used to design and develop Li brocade pattern information management system, in order to complete operations of query, add, delete and modify, etc. to Li brocade pattern information display. The database and data table need to be establish while designing each software modules. Different tables in a database are considered as the data source in each form, and the controls...
Researchers are now considering alternatives to the von Neumann computer architecture as a way to improve performance. The current approach of simulating benchmark applications favors continued use of the von Neumann architecture, but architects can help overcome this bias.
The use of virtual devices in place of physical hardware is increasing in activities such as design, testing and debugging. Yet virtual devices are simply software applications, and like all software they are prone to faults. A full system simulator (FSS), is a class of virtual machine that includes a large set of virtual devices – enough to run the full target software stack. Defects in an FSS virtual...
Various techniques have been proposed to detect smells in spreadsheets, which are susceptible to errors. These techniques typically detect spreadsheet smells through a mechanism based on a fixed set of patterns or metric thresholds. Unlike conventional programs, tabulation styles vary greatly across spreadsheets. Smell detection based on fixed patterns or metric thresholds, which are insensitive to...
Invariant discovery is one of the central problems in software verification. This paper reports on an approach that addresses this problem in a novel way; it crowdsources logical expressions for likely invariants by turning invariant discovery into a computer game. The game, called Binary Fission, employs a classification model. In it, players compose preconditions by separating program states that...
Although static analysis tools detect potential code defects early in the development process, they do not fully support developers in resolving those defects. To accurately and efficiently resolve defects, developers must orchestrate several complex tasks, such as determining whether the defect is a false positive and updating the source code without introducing new defects. Without good defect resolution...
The chance to influence the lives of a million children does not come often. Through a partnership between the BBC and several technology companies, a small instructional computing device called the BBC micro:bit will be given to a million children in the UK in 2016. Moreover, using the micro:bit will be part of the CS curriculum. We describe how Microsoft's Touch Develop programming platform works...
We report on an approach and associated tool-support for automatically evaluating and grading exercises in Software Engineering courses, by connecting various third-party tools to the online learning platform Moodle. In the case study presented here, the tool was used in several instances of a lecture course to automatically measure the test coverage criteria wrt. the test cases defined by the students...
Background: Although most Computer Science (CS) programs offered by higher education institutions usually include a software engineering course, some works report a lack of formal training in software testing. Aim: With the aim of studying the possible impact of knowledge acquired from CS programs on software testing, this paper reports an investigation composed of four experiments. The experiments...
Mutation analysis is an effective, if computationally expensive, technique that allows practitioners to accurately evaluate the quality of their test suites.To reduce the time and cost of mutation analysis, researchers have looked at parallelizing mutation runs --- running multiple mutated versions of the program in parallel, and running through the tests in sequence on each mutated program until...
This paper reports on a pilot project of limited scopeto create a pipeline for the computer programming industry. It comes at a time when the demand for software programmers exceeds the dwindling supply of competent learners with suitable skills. This growing skills gap requires a bold intervention to turn this situation around. Preliminary results from a user questionnaire indicate a positive reaction...
This research paper identifies security issues; especially energy based security attacks and enhances security of the system. It is very essential to consider Security of the system to be developed in the initial Phases of the software Cycle of Software Development (SDLC) as many billions of bucks are drained owing to security flaws in software caused due to improper or no security process. Security...
A brief description of the software ecosystem of the electronic clinical record in the National Health System in Mexico is presented from a point of view of the organizational, business and software structure. According to the characteristics identified and considering the traits presented in Mexico, we propose actions to strengthen the ecosystem. An architecture is proposed in which the electronic...
In this talk, I'll revisit the role of Software in Software-Defined Networking and argue how not only control plane but also forwarding is becoming increasingly only a matter of software development. In short, I'll discuss how x86 is already on its way to transform the networking as we know it.
Testing of product is perform to discover or detect the errors and defects in the developed system. But testing is usually time consuming especially when complex projects are canvass. Testing of a product lead off with generation of test cases. The Test case generation are based on three parts coding, design and specification. The Specification based testing deals with generation of test cases from...
Philip Rosedale, the Willy Wonka of virtual reality, is giving me a tour of his bustling office in San Francisco in August when his blue eyes sparkle with a better idea. "Let's just go in-world instead," he suggests. I follow him to a windowless back room. Waiting there for us are a large HDTV screen, a computer, a few cardboard boxes, and two small, black infrared light-emitting beacons...
In software development process, developers often seek solutions to the technical problems they encounter by searching relevant questions on Q&A sites. When developers fail to find solutions on Q&A sites in their native language (e.g., Chinese), they could translate their query and search on the Q&A sites in another language (e.g., English). However, developers who are non-native English...
Previously, the world had an Internet, but it was an Internet without "things." There were no smart light switches or thermostats and no Fitbits or Wi-Fi cameras. We weren't as connected, and we certainly weren't quantified [1]. Back in 1990, only 3 million people had access to the Internet [2], and there were only 313,000 computers (not devices) on it [3]. Back in those days, to search,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.