The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Basis-path coverage testing is a kind of logic-coverage testing and is based on graph theory and vector theory. Because the combination between path and business logic hasn't been considered, non-executable paths could be generated after executing the Basis-path algorithm. This generation model defines the non-executable path-segment and presents sub-model for acquisition of potential non-executable...
Legacy to Service-Oriented Architecture migration approaches have been extensively researched over the last decade, primarily to reuse the valuable business logic that resides within legacy applications. Interestingly, most of the proposed approaches fail to cover the complete process from the technological, organizational and business perspectives. This paper presents a structured six-phase process...
Assessment as a Service is described from the perspective of adaptivity features in these systems. It is a modern e-Assessment system realized on cloud, integrating available interoperability features so it can extensively communicate with other Learning Management Systems (LMS) and use scalable cloud architecture capable to cope with increased workload. Adaptive control in eAssessment systems means...
The following paper proposes a structured, natural language specification of web service behavior based on keywords in context. The advantage of this type of document is that it can be automatically analyzed in order to extract test cases for testing the web service. The test cases define not only what to test, i.e. what operations to invoke in what order, but also how to test, i.e. with what test...
Refactoring legacy code can be a major impediment for teams transforming to agile due to the high cost of manual regression testing of frequent (typically 2-week) releases. Also, attempts to implement automated tests may involve technical and cost issues. In this report we present a new and more systematic approach to refactoring we have found to be successful for refactoring legacy code that has...
Software testing is a key part of software development, so it's important that the testers be as effective as possible. Especially in fast-feedback agile teams, software testers must respond to their teammates' need for information with readily available, easy-to-understand testing materials. The novel twist of turning user experience personas inward to focus on the product team members provides deep...
Online learning has already been accepted as an alternative or improvement of the conventional learning model. This research was aimed to know whether there was an influence of learning model towards the student academic achievement in the Management Department, School of Business Management and Information System Department, School of Information System at BINUS University. Research used the experimental...
Quality of requirements is of great importance for the software development lifecycle as it influences all steps of software development. To ensure various quality attributes, suitable requirements validation techniques such as reviews or testing are essential. In this paper, we show how defect taxonomies can improve requirements reviews and testing. We point out how defect taxonomies can be seamlessly...
Today's ongoing trend towards intense usage of web service based applications in daily business and everybody's daily life poses new challenges for security testing. Additionally, such applications mostly not execute in their own runtime environment but instead are deployed in some data center, run alongside multiple other applications, and serve different purposes for sundry user domains with diverging...
The development and wide application of the internet technology produces a large amount of data, in order to storage and manage these massive data, NoSQL database technology comes into beings and develops rapidly, many manufacturers have introduced many different NoSQL storage solutions. In this context, the paper carries out the work about the testing method of the performance of NoSQL database....
With the development of computer hardware and signal processing technology, petroleum geophysical exploration requires high-resolution processing of seismic data. This article, by using synthetic data and real seismic data re-sample and resolution test in conventional seismic data processing, conducted analysis and concluded that re-sampling does no harm to the signal from two samples to one sample...
Bandung Polytechnic of Health — Ministry of Health (MoH) is an educational institution which is quite complex. To run their business process they have three supervisory auditor, namely Ministry of Health, Ministry of Education, and ISO. Each period, the health polytechnic obliged to provide a report on the achievements of vision and mission in providing good quality health care personnel. Processing...
Decisions about the release date need to balance between the degree of readiness (quality) of the product and the potential competitive advantage and added value of (early) delivery. Based on an existing optimization approach for solving the maximum value release planning problem for a fixed release time, we provide a re-optimization approach for which includes local and global re-planning exchange...
We focus on functional testing of enterprise applications with the goal of exercising an application's interesting behaviors by driving it from its user interface. The difficulty in doing this is focusing on the interesting behaviors among an unbounded number of behaviors. We present a new technique for automatically generating tests that drive a web-based application along interesting behaviors,...
Testing of Service-Oriented Architecture (SOA) implementations brings various challenges at infrastructure, service as well as orchestration level. In order to address these challenges the TASSA framework was developed for testing of web service orchestrations. The paper is focused on one of the TASSA framework tools, named TESSI (TESting of Service Implementations), providing test case generation,...
Cloud computing has become one of the most crucial part in accessing the set of resources when it comes to Information Technology (IT) domain, where it reduces the cost of their resource ownership and its services. Since cloud computing is believed to be a suitable and adaptable one for small business, the public cloud dominates in storing an organization resource with ease. However one of the most...
This paper presents Smartesting CertifyIt, a general-purpose model-based testing solution dedicated to the IT domain. In the process supported by this model-based testing solution, test generation models are developed using a subset of UML and BPMN notations. The automated test generation phase is led by several kinds of test selection criteria such as requirements coverage or scenario-based criteria...
We describe the SPaCIoS project, illustrating its main objectives, the results obtained so far and those that we expect to achieve, in particular, the development of the SPaCIoS Tool, an integrated platform that takes as input a formal description of the system under validation, the expected security goals, and a description of the capabilities of the attacker, and automatically generates and executes...
This industrial contribution describes a tool support approach to assessing the quality of relational databases. The approach combines two separate audits - an audit of the database structure as described in the schema and an audit of the database content at a given point in time. The audit of the database schema checks for design weaknesses, data rule violations and deviations from the original data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.