The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Just as with any other profession, an efficient way to exchange ideas and networking in software testing are conferences, workshops and similar events. This is true for both professional testers and researchers working in the testing area. However, these two groups usually look for different kinds of events: a tester likes to attend 'industrial' (sometimes called practitioner's or user) conferences,...
Students working in teams to complete software tasks is an effective method to learn necessary skills. Previously we examined the educational effectiveness as a function of personal characteristics, but the findings were inconclusive. Because we hypothesize that team discussions impact learning and are related to educational effectiveness, this study investigates the influence of team discussions...
This paper describes the experience of developing Independent Verification and Validation (IV&V) training programby applying an Instructional Design Process(IDP). This is not complete training to become an IV&V engineer, but job training to help solve common problems encountered in IV&V work. The instructional design process featured extensive frontend analysis before the design and implementation...
Identification of an adequate invariant is valuable for reasoning about the correctness of code involving a loop, informally or formally. Almost every modern system for automated verification demands that programmers annotate their code with assertions, such as invariants to facilitate automation. But many learners struggle to grasp how to arrive at an assertion that remains an invariant and is sufficiently...
Software Engineering is definitely an important subject matter and it is taught all over the world: at Universities, at Colleges, and recently also at High Schools. There are international Software Engineering curricula, standards, and certificates, but there is no manifestation of Software Engineering (and related practices) in the course syllabi at primary and secondary schools. There are good reasons...
In-spite of the principle of good programming practice which stipulates that a commit should include only modifications belonging to one task, programmers submit tangled commits consisting of modifications related to two or several distinct tasks. Some researches show that between 11 and 39% of bug fix commits are tangled and at least 16.6% of all the commits are incorrectly associated to bug reports...
In this paper the conceptual basics of the migrating firewall are given. Being sophisticated to bypass and robust, it could serve as the multilayer platform of scalable cloud network that demand high level of the defense from different kind of harmful impact and network attacks.
Software component quality is an important parameter to improve the reliability and usability of the software. Any software development process requires utilization of components and objects for different stages of software development process. Software quality consists of many facts which measured at different levels before being used. Software component quality meets the needs of users while being...
Teaching in higher education can be rewarding, but also stressful. Different teaching approaches and paradigms may mean that teachers are constantly trying to improve the learning experience for their students — a good thing; but perhaps are not succeeding — a bad thing. This paper is essentially a story centring around a teaching experience I had over the course of a single semester. Motivated by...
Software Engineering is a primary subject in many computer science departments of universities worldwide. Its purpose is to help students understand and apply both disciplined and systematic methods to software development. Due to the ubiquity and visibility of software in the modern world, the study, education and research into software engineering and its practice have retained a high level of interest...
Abstract-Background: Successful transfer of the results of research projects into practice is of great interest to all project participants. It can be assumed that different transfer mediums fulfill technology transfer (TT) with different levels of success and that they are impaired by different kinds of barriers. Objective: The goal of this study is to gain a better understanding about the different...
Context: Current empirical research highlight the need for replications of empirical studies because replications plays an important role in the construction of scientific knowledge. Objective: Considering the importance of replications in the consolidation of the knowledge produced in the software engineering research, this study aims to update and extend the results produced in a previous mapping...
Agile methods are the fastest rising software lifecycle process methods in software engineering. Educators are converting traditional and project-base courses to agile in response, but this is a daunting task with few structured teaching resources methods available to reduce the burden on the educator. In professional practice, agile methods have been particularly effective in empowering experienced...
This paper deals with advantages of model-based software engineering approach of critical UAV onboard systems. Application of modern model-based technologies for critical onboard systems development is considered. Rules for critical software engineering at all life cycle stages are defined by functional standards. Mentioned approach implements all requirements of safety standards by automating the...
The characteristics of self-organizing, adaptive systems (SOAS) lead to a significantly higher flexibility and robustness against an ever-changing environment. This flexibility makes it hard to test these systems adequately, which is, however, inevitable in order to assure their quality. The PhD thesis faces the following key challenges for testing SOAS: state space explosion, interleaved feedback...
Enterprise Architecture Modeling (EAM) approaches all use multiple, inter-related views to describe the properties of an enterprise system and its surrounding environment -- that is, they are multi-view specification (MVS) approaches. However, there is still little consensus on how such modeling environments should be realized and on the pros and cons of the different fundamental design choices involved...
This document describes the proposal for a doctoral thesis which aims to identify the potential bottlenecks and constraints in the software development process in a learning environment. The research method is based on the empirical observation of the real activities carried out by groups of students engaged in the laboratory project, part of the assignments of a Software Engineering undergraduate...
In computer vision, object detection is one of the most researched topics. The goal of object detection is to detect all instances of objects from a known class, such as people, cars or faces in an image. Object detection uses the extracted features and learning algorithms to detect and recognize objects. In this paper, we propose a robust object detection method based on fast template matching. We...
Human activity recognition has an important role for the automatic anomaly event detection and recognition application such as surveillance system and patient monitoring system. In this paper, we propose a human activity recognition method based on graph similarity measurement technique (GSM). The basic actions with their movements for each person in the interested area are extracted and calculated...
Recommender systems provide personalized suggestions for every individual user in the system. Many recommender systems use collaborative filtering approach in which the system collects and analyzes users' past behaviors, activities or preferences to produce high quality recommendations for the users. Among various collaborative recommendation techniques, model-based approaches are more scalable than...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.