The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data stored in relational databases plays a vital role in many aspects of society. When this data is incorrect, the services that depend on it may be compromised. The database schema is the artefact responsible for maintaining the integrity of stored data. Because of its critical function, the proper testing of the database schema is a task of great importance. Employing a search-based approach to...
The paper is devoted to the mutation testing technique that is widely used when testing different software tools. This paper presents a comparative analysis of two mutation testing tools for Java programs, namely Pitest and /Java. They both allow automatically introducing faults into a software code. The analysis has revealed their pros and cons, as well as specific features of their launch and application...
Software testing is an important step in the life cycle of agile development, it represents an efficient way to ensure the good functioning of the product. In previous work, we implemented an algorithm that takes as input user stories, and automatically generate UML sequence diagrams. In this work, these UML sequence diagrams are automatically transformed using model to model transformation then model...
In this paper an analysis of multithread approach to speaker recognition is presented. Two cases have been investigated — the use of multithreading first, to reduce the total time of training and testing (when processing the speaker database) and second, to reduce the time of a single speaker recognition (e.g. in voice-based access systems). We have investigated the processing time in function of...
In this paper, we have tested several open source web applications against common security vulnerabilities. These vulnerabilities spans from unnecessary data member declaration to leaving gaps for SQL injection. The static security vulnerabilities testing was done in three categories (1) Dodgy code vulnerabilities (2) Malicious code vulnerabilities (3) Security code vulnerabilities on seven (7) different...
The work presented in this paper extends an existing constraint model defined to automatically generate test inputs for java Bytecode programs. We propose to consider also BML specifications for generating valid test data. The main objective is to apply constraint based testing on java bytecode program annotated with BML for detecting the valid execution paths, to check the validity of the returned...
Service-Oriented Architecture (SOA) is a widely accepted paradigm for development of distributed applications using interoperable and flexible software components. Still the preferred technology for SOA implementation is provided by the web services. Their interface as well as complex interactions are described with XML-based standards, such as Web Service Description Language (WSDL) and Business...
With the ever-increasing dependence of our civil and social infrastructures to the correct functioning of software systems, the need for approaches to engineer reliable and validated software systems grows rapidly. Traceability is the ability to trace the influence of one software artifact on another by linking dependencies. Test-to-code traceability (relationships between test and system code) plays...
Recently, Java has been educated in many universities and professional schools due to reliability, portability, and scalability. However, because of its limited time in Java programming courses, coding rules are rarely educated. As a result, codes made by students become far from readable codes. In this paper, we propose a coding rule learning function using static code analyzers in Java Programming...
Model Driven Engineering (MDE) aims to expedite the software development process by providing support for transforming models to running systems. Many modeling tools provide forward engineering features, which automatically translate a model into a skeletal program that developers must complete. Inconsistencies between a design model and its implementation, however, can arise, particularly when a...
Some scenario-based testing approaches propose to express a test suite as a regular expression (called scenario or pattern). It specifies a set of valid sequences of operations in a abstract way. When the regular expression is "unfold", test sequences are obtained. Usually, the unfolding is done in an exhaustive way, which can result in a combinatorial explosion. In this article, we explore...
While modern web development technologies enhancethe capabilities of web applications, they introduce challengesfor testers. This paper introduces, evaluates, and refinesweb mutation operators that target interaction faults in web applications. An experimental study is conducted on 11 subject webapplications using 15 web mutation operators. The effectivenessof 12 independently developed test sets...
This article deals with the issue of how to semi-automatically validate novice programmers' UML class diagrams which document their software assignments. This problem is rather serious given the large numbers of students in the introductory programming courses. The article discusses a self-contained tool which makes it easy to prepare very detailed automated tests (hundreds of them) of UML class diagrams...
For the purpose of security of the computer systems, organizations now a days plan a lot of things like firewalls, network scanning tools, secure sockets layer (SSL) etc. However security bugs present at the application layer (code level) caused by unawareness or mistakes of the developers are usually ignored. Such security bugs can lead to unauthorized privileges on a computer system. For example...
Dynamic software updating (DSU) is a technique that can update running software systems without stopping them. Most existing approaches require programmer participation to guarantee the correctness of dynamic updating. However, manually preparing dynamic updating is error-prone and time-consuming. Therefore, other approaches prefer to aggressively perform updating without programmer intervention,...
While a substantial body of prior research has investigated the form and nature of production code, comparatively little attention has examined characteristics of test code, and, in particular, test smells in that code. In this paper, we explore the relationship between production code properties (at the class level) and a set of test smells, in five open source systems. Specifically, we examine whether...
Code review is an essential activity to ensure the quality of code being developed, and there have been static code checkers for aiding an effective code review. However, such tools have not been actively utilized in the world of programmers due to a lot of coding violations (warning) produced by tools and their false-positiveness. In order to analyze the automatically pointed violations and the actual...
Oral carcinogenesis, a multistep phenomenon often precedes by oral pre-cancers like leukoplakia (OLK). Differentially expressed (DE) gene analysis of microarray data followed by functional classification provides an idea of alteration of biological functions associated with disease progression. In this context, microRNA (miRNA) microarray data analysis for functional classification is still a challenge,...
Stored SQL injection (SQLI) and Stored Cross Site Scripting (XSS) are the top most critical web application vulnerabilities in present time. Previous researches have shown that black-box scanners have relatively poor performance in detecting these two vulnerabilities. In this paper, we analyze the performance and detection capabilities of latest black-box web application security scanners against...
Programs often contain branches to break off from their main execution. These branches contribute to the total cost of testing, because they also need to be tested. The paper presents a new approach to improve the testing of such branches by annotating them. Our tool automatically generates test-sequences. Then, invariants in the form of pre-and post-condition over the executions passing each annotated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.