The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To utilize the proper test techniques that expand our test and diagnosis process we should regularly evaluate and integrate new devices and new techniques. Willingness to embrace change is the major requirement for successful technology integration. Test technology is continuously and rapidly evolving. It is an ongoing process and demands continual research and understanding. Effective integration...
There is widening chasm between the ease of creating software and difficulty of "building security in". This paper reviews the approach, the findings and recent experiments from a seven-year effort to enable consistency across a large, diverse development organization and software portfolio via policies, guidance, automated tools and services. Experience shows that developing secure software...
After changes are made to a system, developers typically perform regression testing to uncover the regression faults in previously existing functionality of the system. However, during software evolution, the program entities (i.e., classes/methods) realizing such functionality might be modified/replaced by other entities. Thus, in the new version, existing test cases containing obsolete class references...
Traditional methods of testing were based on Instrument-Centric models which included sensor and measurement capabilities inside of instruments that allowed test engineers to be able to perform measurements and collect data. Such data would then be analyzed by software to determine whether the test resulted in a pass or fail disposition. Modern technologies have significantly changed the equation...
Intrusion detection systems are used in computer networking and other applications to detect and respond to attempts to compromise computers, servers, firewalls and other network resources. As intrusion detection systems move beyond providing simple pattern recognition capabilities for known attack types, the ability to test these systems with conventional techniques (or use formal or other similar...
The article discusses the basic concepts and approaches to assessing software quality. Based on previous research in this area is formulated as recommendations for software that regulate based methods, processes and procedures used for software development.
The research was carried out and the Cyrillic typeface, based on the handwriting, was developed. The font-building software was investigated. Sketches of the font were drawn and converted to the vector format. Afterward, the characters and glyphs, ligatures, tracking, kerning pairs of the handwritten font were constructed. The FineReader was learned to recognize the developed font.
Previous studies have found that a significant number of bug reports are misclassified between bugs and nonbugs, and that manually classifying bug reports is a timeconsuming task. To address this problem, we propose a bug reports classification model with N-gram IDF, a theoretical extension of Inverse Document Frequency (IDF) for handling words and phrases of any length. N-gram IDF enables us to extract...
Most organisations now impose information security policies (ISPs) or ‘conditions of use’ agreements upon their employees. The need to ensure that employees are informed and aware of their obligations toward information security is apparent. Less apparent is the correlation between the provision of such policies and their compliance. In this paper, we report our research into the factors that determine...
In the technical support division of a large enterprise software provider, customers' technical incidents, problems, and change requests are processed as tickets. Each ticket is assigned to a support engineer for processing. Due to the limited expertise of individuals, resolving a ticket may involve routing the ticket among multiple groups of engineers. Each routing step costs time and resources....
Continuous Integration (CI) and Continuous Delivery (CD) are widespread in both industrial and open-source software (OSS) projects. Recent research characterized build failures in CI and identified factors potentially correlated to them. However, most observations and findings of previous work are exclusively based on OSS projects or data from a single industrial organization. This paper provides...
The City of Johannesburg (COJ), an economic hub of South Africa with a 17% national growth domestic product (GDP) and contributing 47% of Gauteng provincial economy, has been greatly impacted by the energy sustainability challenges that beset South Africa especially since the 2008 energy crisis. In Queensland, Australia, rooftop solar photovoltaic (PV) has demonstrated to be an impeccable renewable...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
We present the Configurable Advanced Verification of Software (CAVS), a prototype tool that automatically generates an efficient set of test cases from descriptions of required interface behavior based on Unified Modeling Language (UML) artifacts. The input to CAVS consists of enhanced UML activity diagrams that define the required behavior of a software component as observed on its interfaces. CAVS...
In this paper, an overview of a testing and simulation approach for a DTN protocol implementation (named µPCN) is provided. This implementation is intended to render low-cost world-wide satellite communication possible. It will be flighttested during the ESA OPS-SAT mission. To ensure its quality, a simulation environment has been developed used for testing its functionality in simulated LEO satellite...
Regression testing is the testing activity performed after changes occurred on software. Its aim is to increase confidence that achieved software adjustments have no negative impact on the already functional parts of the software. Test case prioritization is one technique that could be applied in regression testing with the aim to find faults early, resulting in reduced cost and shorten time of testing...
The design of new device for electromagnetic compatibility testing — environmental shielded TEM-chamber — is considered. Diagnostic algorithms and functional structure decomposition of the chamber are presented. Tasks for a monitoring service of the chamber are indicated. The possibility of the diagnostic service implementation within a real-time operating system is considered for the chamber status...
DevOps and continuous practices are attracting steadily growing attention by both practitioners and researchers in the software engineering community. The terms are often used inconsistently, interchangeably and with unclear meaning, however. Taking the position that this ambiguity and miscommunication renders the community great harm, in that it impedes our ability to critically appraise these practices,...
The number of software-driven features within a modern automotive powertrain rises significantly. With increasing number of features, also the risk of undesired interactions between those features rises drastically. This leads to new challenges with regard to efficiency in testing such automotive features. Automated Feature-Interaction-Testing significantly increases the efficiency of such feature...
Previous research in defect prediction has proposed approaches to determine which files require additional testing resources. However, practitioners typically create tests at a higher level of abstraction, which may span across many files. In this paper, we study software testing, especially test resource prioritization, from a different perspective. We use topic models to generate topics that provide...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.