Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Singapore has one of the busiest ports in the world and a vast maritime industry. This requires workforce skilled in latest marine technology to operate machinery, conduct surveillance and monitor the conditions of the water bodies. Although it is lucrative to work in the marine industry, the perception of harsh working conditions often hinders new graduates to pursue this path. Furthermore, many...
We consider a network of data streams from which an anomalous process with known target distribution is to be identified. Because in practice obtaining observations may be expensive, we assume that there is a constraint on the total number of observations based on which the decision has to be made. We derive a sufficient condition on the sampling budget such that the error probability is kept below...
We consider the problem of distributed binary hypothesis testing of two sequences that are generated by a doubly binary symmetric source. Each sequence is observed by a different terminal. The two hypotheses correspond to different levels of correlation between the two source components, i.e., the i.i.d. probability of the difference between the two sequences. The terminals communicate with a decision...
This paper considers the problem of testing for mutual independence of multiple sets of complex Gaussian vectors. This problem has classical roots in statistics and has been of recent interest in the signal processing literature in connection with multi-channel signal detection. The maximal invariant statistic for this problem is described both as a collection of subspaces of the data space (i.e.,...
The 6th edition of the Portuguese Software Engineering Doctoral Symposium (SEDES'2016), was held in September 16, 2016, in Lisboa, Portugal, co-located with the QUATIC'2016 conference. The aim of this symposium is to bring together Software Engineering PhD students supervised or co-supervised by faculty members of Portuguese Universities in a constructive environment, where they can present and discuss...
As distributed systems such as automotive, medical, manufacturing automation become larger and more complex, it is difficult to test these systems. Also, the synchronization of distributed applications make the testing more difficult. In the Software-in-the-Loop (SiL) simulation, a synchronization method among clock of applications is provided for virtual hardware devices and environment. A typical...
This talk presents results recently published in Software Testing, Verification and Reliability. In recent years, important efforts have been made for offering a dedicated language for modelling and verifying/proving security protocols. However, verifying the security protocol model does not guarantee that the actual implementation of the protocol will fulfil these properties. In this talk we present...
Support vector regression (SVR) has become one of the most promising methods for function approximation and regression estimation. However, SVR has a time complexity of O(N3) and a space complexity of O(N2). When dealing with very large sizes of training sets, SVR takes a lot computational time. To solve this problem, a method called heuristic sample reduction (HSR) is proposed for obtaining a reduced...
Behaviour-Driven Development (BDD) is an "outside-in" approach to software development built upon semi-formal mediums for specifying the behaviour of a system as it would be observed externally. Through the representation of a system as a collection of user stories and scenarios using BDD's notation, practitioners automate acceptance tests using examples of desired behaviour for the envisioned...
Issues related to verification and security are increasingly important in modern electronic systems. In particular, the huge complexity of electronic systems has led to growth in quality, reliability and security needs in several application domains as well as pressure for low cost products. There is a corresponding increasing demand for costeffective verification techniques and security solutions...
English Language Teachers were asked to voice their opinion and preferences as to the format, content matter as well as types of tasks and activities they would find most favourable in the training materials/course on the ELT and Assessment and their levels confidence regarding their competencies on the use of ICT for educational purposes. The findings reveal that the suggested formats and methods...
In this paper, a design methodology for MBIST (Memory Built In Self Test) which has a feature of executing multiple March algorithms to detect faults is proposed. SOCs have a wide range of memories. It is not possible to test different memory modules of a SOC with a single algorithm. Hence it is desirable to have a programmable MBIST controller capable of executing multiple test algorithms. The proposed...
The advantages of fault injection techniques and related methodologies like mutation testing have been gaining in attention also from industry, as is evident from the advent of standards like ISO 26262 that suggest to use corresponding approaches for verifying an automotive system's safety aspects. Aside a well-established theoretical background, the availability of tools is a key issue in order to...
After sixty or so years of development the theory of checking experiments for FSM still continues to attract a lot of attention of research community. One of the reasons is that it offers test generation techniques which under well-defined assumptions guarantee complete fault coverage for a given fault model of a specification FSM. Checking experiments have already been extended to remove assumptions...
This paper is about issues experienced along testing large-scale industrial products, with safety and security critical relevance. The challenges in testing - several thousand requirements for several product variants and various configurations - were addressed by test execution automation. However, since principal testing concepts as well as architectural concepts were ignored or poorly implemented,...
An embedded functions feature was implemented to specify functionally dependent relations among test factors. Functions embedded in a combinatorial test case generator specified test factor constraints to which the resulting test cases conformed. The functions were defined in a general-purpose programming language widely used among software engineers. Examples with and without embedded functions were...
We present an automated approach for cost model discovery in configuration spaces. Given a configuration space, a quality assurance (QA) task of interest, and a means of measuring the cost of carrying out the QA task, the proposed approach systematically sample the configuration space by using a traditional covering array, carry out the QA task in each of the selected configurations, measure the costs,...
Some scenario-based testing approaches propose to express a test suite as a regular expression (called scenario or pattern). It specifies a set of valid sequences of operations in a abstract way. When the regular expression is "unfold", test sequences are obtained. Usually, the unfolding is done in an exhaustive way, which can result in a combinatorial explosion. In this article, we explore...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.