Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Models are commonly used in software testing to select test suites. Application of mutation testing at a model level can contribute to reliable and early assessment of the quality of the test suites. It can also support selection of test suites achieving high fault detection rates. The main issue related to using mutation testing at the early development stage is to determine how reliably the quality...
OntoUML is an ontologically well-founded conceptual modelling language that distinguishes various types of classifiers and relations providing precise meaning to the modelled entities. Efforts arise to incorporate OntoUML into the Model-Driven Development approach as a conceptual modelling language for the PIM of application data. In a prequel paper, we have introduced and outlined our approach for...
The ontological change, understood as the process that allows to represent, implement, maintain and propagate the update of an ontology, it is managed mainly from two perspectives: version control and ontological evolution. Among the alternatives proposed management is supported management in conceptual models, where abstraction implementation language used in the construction and deployment of ontology...
This paper presents a master algorithm for co-simulation of hybrid systems using the Functional Mock-up Interface (FMI) standard. Our algorithm introduces step revision to achieve an accurate and precise handling of mixtures of continuous-time and discrete-event signals, particularly in the situation where components are unable to accurately extrapolate their input. Step revision provides an efficient...
Modern software are object-oriented program systems. Almost all software has a database. Some databases are object-oriented. In this case, object-oriented software and databases shall be designed in a consistent manner. In this article, we describe a UML profile for the programming environment. It is an environment for support of object-oriented databases. The UML profile allows describing an application...
Verification and validation of UML/OCL models is a crucial task in the design of complex software/hardware systems. The behavior in those models is expressed in terms of operations with pre- and postconditions. These, however, are often not precise enough to describe what may or may not be modified in a transition between two system states. This frame problem is commonly addressed by providing additional...
The increase in productivity implied by model-driven software product line engineering is weakened by the complexity exposed to the user having to manage a multi-variant model. Recently, a new paradigm has emerged: filtered software product line engineering transfers the established check-out/modify/commit workflow from version control to variability management, allowing to iteratively develop the...
Traceability is an important concern for numerous software engineering activities. Establishing traceability links is a challenging and cost-intensive task, which is uneconomical without suitable strategies for maintaining high link quality. Current approaches to Traceability Management (TM), however, often make important assumptions and choices without ensuring that the consequences and implications...
Domain-Specific Languages (DSLs) are central to Model-Driven Engineering, where they are used for creating models for particular domains. However, current research and tools for building DSLs focus on the design and implementation aspects of the DSL, while the requirements analysis phase, and its automated transition to design is largely neglected. In order to alleviate this situation, we propose...
Nowadays, many approaches have been proposed to design and develop Data Warehouse (DW). However, there are neither standard method that addresses the design of all DW layers nor a software process prescribed for this kind of engineering domain. Generally, most of those approaches are interested in a particular aspect of DW (Storage, ETL processing, OLAP analysis, reporting, etc.) and don't cover its...
Cloud computing that is based on Infrastructure as a Services model, allows the system administrators to identify resources or services to deploy their applications. Selection of the most appropriate provider for a particular application is a difficult task as there are huge numbers of services offered by considerable number of providers that are not directly comparable and have similar functionality...
This paper introduces the individualized interdisciplinary learning resources based on scientific software, that usually serves for solving domain problems (optimization, simulation etc.). Integrating this type of software in learning process is a problem that we are solving by suggesting a new way to describe this software and introduce a framework that helps to form learning resource from it. We...
Model Transformations is the core of Model Driven Architecture; several works have been focused on transformations between the different models that compose the MDA approach: the Computation Independent Model (CIM), the Platform Independent Model (PIM) and the Platform Specific Model (PSM). In this paper, we propose a new method of transformations between CIM and PIM levels; this approach aims to...
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this...
The use of virtual patching tools to prevent attackers exploiting vulnerabilities of a web application is a widely adopted defensive approach. The constant evolution of applications, and thereby of attack techniques, requires a big maintenance and tuning effort to ensure that the remediation patches are working correctly. We put forward in this paper a tool supported process here security requirements...
Product Families are gaining interest because ofthe increasing demand for customizable products. However, testing a Product Family is a difficult task, in special, fordependable products, in which the exception handling mustalso be well tested. Model-based testing (MBT) can be usefulfor testing Product Families, in which a behavior model can beobtained from the requirements, this model being used...
In system design, an architecture specification or model serves, among other purposes, as a repository to share knowledge about the system being designed. Such a repository enables automatic generation of analytical models for different aspects relevant to system design (timing, reliability, security, etc.). The Architecture Analysis and Design Language (AADL) is a standard proposed by SAE to express...
Critical infrastructures like smart grid and smart transportations are large-scale distributed CPSs and cyber-physical security is pivotal to their safety and security. Efficient security assessment can help administrators to protect CINs effectively and we propose a universal quantitative cyber-physical security assessment methodology which is based on cyber-physical dependence analyses. For given...
Computer performance is determined by the amount of useful work accomplished by system or network with the time and resources used. A general methodology is proposed to describe how service demands are calculated from different types of data using queuing network (QN) model using different configuration. A model is constructed to answer several scenarios, like the addition of multiple disks and multiple...
Existing data modeling notations and methods of database development are dedicated to technicians. At the same time, there is a tendency to involve the end-user in the development process. This requires the creation of new modeling notations and development methods for databases area. These tools should be understandable both to end-users and to developers. Because of unified understanding, it is...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.