The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Real software, the kind working programmers produce by the kLOC to solve real-world problems, tends to be “natural”, like speech or natural language; it tends to be highly repetitive and predictable. Researchers have captured this naturalness of software through statistical models and used them to good effect in suggestion engines, porting tools, coding standards checkers, and idiom miners. This suggests...
Despite a decade of active research, there has been a marked lack in clone detection techniques that scale to large repositories for detecting near-miss clones. In this paper, we present a token-based clone detector, SourcererCC, that can detect both exact and near-miss clones from large inter-project repositories using a standard workstation. It exploits an optimized inverted-index to quickly query...
Agile methods are now a mainstream production process and its proponents are no longer considered hackers or cowboy coders. Still, in embedded and safety critical domains there is somehow the expectation that the approach be “more” plan-based; at least, many of the current normatives seem to lean toward such approach. A definite change in attitude has emerged with the latest DoD standards in the United...
Given the availability of large source-code repositories, there has been a large number of applications for large-scale clone detection. Unfortunately, despite a decade of active research, there is a marked lack in clone detectors that scale to big software systems or large repositories, specifically for detecting near-miss (Type 3) clones where significant editing activities may take place in the...
Kanban is a workflow management method especially suitable for managing continuous software engineering work. We attempted to teach Kanban and lean thinking in a software project management course in Aalto University with a collaborative Kanban board game. Our goal was to measure if the learning goals of the class were reached and to study the student's perceptions of the game. Data was collected...
Scalable High efficiency Video Coding (SHVC) is the scalable extension of the latest video coding standard High Efficiency Video Coding (HEVC). One of the key novelties introduced by SHVC is that it enables hybrid codec scalability. This basically means that the video layers can be encoded with different video standards providing backward compatibility between codecs. In this paper, we propose a software...
Unit testing is an essential practice in Extreme Programming (XP) and Test-driven Development (TDD) and used in many software lifecycle models. Additionally, a lot of literature deals with this topic. Therefore, it can be expected that it is widely used among developers. Despite its importance, there is no empirical study which investigates, whether unit tests are used by developers in real life projects...
With the increasing adoption of embedded systems in critical automotive applications, the verification of hardware designs reliability is becoming a strictly regulated process where the ISO26262 standard plays a key role. Today crucial verification activities such as failure analysis and FMEA are still relying heavily on reliability engineer expertise, as automatic methods supporting them are still...
A track circuit is a critical component of a modern railway system. The circuit is used to detect the absence of a train on rail tracks and produce corresponding control signals. A railway track has many block sections, each of which has a separate track circuit device. A track circuit receiver analyzes signals sent from a track circuit sender and produces a signal to control a relay. When the train...
Over the previous years, many service-oriented (SO) solutions have been proposed by European research projects for the technological advancement of industrial systems. These projects typically include a software reference architecture (RA) based on the concepts of service-oriented architectures (SOA) and, often-times, an accompanying technology stack to guarantee system-wide interoperability. In this...
this software demonstration presents work of the Laser & Light Lab at the Institute of Computer Science 4 of the University of Bonn on proposed standardization work of the International Laser Display Association (ILDA). The ILDA Digital Network (IDN) Stream Specification [5] has been published in 2015 as the first of a “family” of ILDA technical standards dealing with digital transmission of laser...
This paper studies the current evaluation methods for Machine Translation (MT), and reveals their core evaluation techniques. Through the comparative analysis on the differences of MT evaluation methods, this paper points out the present MT research difficulties and hotspots, and makes a qualitative review on the future MT evaluation research direction. In general, there are still some shortcomings...
Open source projects rely on collaboration of members from all around the world using web technologies like GitHub and Gerrit. This mixture of people with a wide range of backgrounds including minorities like women, ethnic minorities, and people with disabilities may increase the risk of offensive and destroying behaviours in the community, potentially leading affected project members to leave towards...
Processes constrain developer freedom and impact software development cost. They can increase costs from only a few cents to almost 1000 USD per line of code. But they can also benefit the maintainability, dependability and safety of critical software. If failure risk costs are high, then the application of more expensive processes can actually reduce costs. Therefore it is important to understand...
Modern automotive systems consist of hundreds of functionalities implemented in software. Moreover, these functionalities are constantly evolving with increasing demand for automation, industry competition and changing sensor and actuator capabilities. Correspondingly, it is important to adapt the engineering and software development processes for such systems to consider fast management of this evolution...
Advances in computing steadily erode computer security at its foundation, calling for fundamental innovations to strengthen the weakening cryptographic primitives and security protocols. At the same time, the emergence of new computing paradigms, such as Cloud Computing and Internet of Everything, demand that innovations in security extend beyond their foundational aspects, to the actual design and...
Clock synchronization is an important issue in wired and wireless networks as a common time basis is essential for coordinated activities of nodes in distributed systems. Typical applications demanding precise synchronization are Industrial Internet scenarios having real-time constraints, Wireless Sensor Networks (WSNs) where the nodes communicate only for a short period and can sleep the remaining...
The Internet of Things (IoT) is being applied in a wide variety of applications, which demand a range of networking support. This includes wide area communication networks. Novel long range network technologies such as LoRa and Sigfox are emerging, but they remain difficult to deploy and configure for end-users who are not specialists in embedded systems. This paper addresses this problem by introducing...
With the continuous emergence of all kinds of complex systems and the increasing complexity of complex systems, standards architecture becomes more and more important for its guidance and support in the life cycle of complex systems. First, this paper makes a comparative study on several architectures and architecture frameworks, and the comparative study shows that Standards Viewpoint is a better...
In architecture, in special tasks of industrial robotics applications, in navigation and control systems of military technology, in solution for manipulation problems of space exploration in many cases we have to deal with definition, measurement of specified points of space. From measurement technology point of view, it is regarded as a classical solution to solve a problem by application of calculation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.