The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to perform efficient testing of software intensive safety-critical products, organisations often utilise hardware-in-the-loop simulation of the system under test surrounding environment. This way, the system could be invoked and its behaviour could be observed in a controlled setting rather than in the field. However, what effect simulation quality might have on the effectiveness of the testing...
Hypervisors are software more and more widespread because of the increasing usage of virtualization, especially in the Cloud. But they are not bug-free. CrashOS is developed to test them and contributes to find security vulnerabilities in hypervisors.
Existing software analysis methods for performanceand coverage are typically tied to the source code of software applications.In this work, we extend these methods to the Graphical User Interfaces (GUI) of applications, motivated by the desire to bring the user perspective into focus of software quality assurance and testing at the GUI level. We present and discuss various profiling procedures, their...
The issues of software and hardware development are considered of data logging into systems of testing complex objects. The describes the architecture of a system for testing complex scientific-technical objects. In the list of original elements of the concept of building highly reliable, fast-reconfigurable interactive test monitoring and control systems: — using of original technology of representation...
Most software systems can be modeled either fully or partially using finite state machines. For this reason, many testing criteria for finite state machine models have been proposed and discussed by the research community. Among the studied testing criteria are complete round-trip paths and transition trees that cover round-trip paths in a piece wise manner. The theoretical comparison between the...
A classical difficult isomorphism testing problem is to test isomorphism of p-groups of class 2 and exponent p in time polynomial in the group order. It is known that this problem can be reduced to solving the alternating matrix space isometry problem over a finite field in time polynomial in the underlying vector space size. We propose a venue of attack for the latter problem by viewing it as a linear...
Safety-critical systems in domains such as aviation, railway, and automotive are often subject to a formal process of safety certification. The goal of this process is to ensure that these systems will operate safely without posing risks to the user, the public, or the environment [1]. It is typically expensive and time consuming for companies to certify their software. Therefore, any attempt to automate...
Cellular networks are constantly evolving due to frequent changes in radio access and end user equipment technologies, dynamic applications and associated trafflc mixes. Network upgrades should be performed with extreme caution since millions of users heavily depend on the cellular networks for a wide range of day to day tasks, including emergency and alert notifications. Before upgrading the entire...
Mutation testing is known as an effective method for evaluating test sets in terms of their error-revealing capability. When applying mutation testing, it is necessary to identify and filter out the equivalent mutants, i.e. mutants that despite their syntactical difference have the same semantic as the original program. Due to the undecidable nature of the problem of determining whether two programs...
A new type of wear-resistant coating testing system is designed in this paper. The control system is based on the motion controller CO-TRUST C37 and the automation software CODESYS. The hardware platform is designed based on the EtherCAT bus, and the system software is developed with information display, parameter setting, manual operation, 3D parametric programming, off-line simulation and many other...
The component-based software development enables to construct applications from reusable components providing particular functionalities and simplifies application evolution. To ensure the correct functioning of a given component-based application and its preservation across evolution steps, it is necessary to test not only the functional properties of the individual components but also the correctness...
The notion of success is unsubstantial, complex and domain-specific. Software companies have been exploring its different aspects and aiming to put forward measures to capture and evaluate them. In this paper three main dimensions of success have been elicited based on previous industrial studies: project quality, project efficiency along with social factors and stakeholder's satisfaction. By investigation...
Code review is a key tool for quality assurance in software development. It is intended to find coding mistakes overlooked during development phase and lower risk of bugs in final product. In large and complex projects accurate code review is a challenging task. As code review depends on individual reviewer predisposition there is certain margin of source code changes that is not checked as it should...
This paper presents ReqCap, an implementation of a new method that articulates hierarchical requirements modeling and test generation to assist in the process of capturing requirements for PLC-based control systems. ReqCap is based on a semi-formal graphical model that supports hierarchical modeling, thus enabling compositional specifications. The tool supports automated generation of test cases according...
We present CoSTest, a tool that supports the validation of Conceptual Schemas by using testing. The tool implements techniques for transforming instantiations from a Requirements Model into test case implementations by supporting a Model-driven architecture.
The development of complex and highly safety-critical avionics systems, such as fly-by-wire, is typicaUy linked with high efforts, risks and thus costs. Especially with regard to certification the testing activities during verification are playing a major role. This paper introduces the automatization complex of the testing artifact generation by use of Abstract State Machines (ASM), which allows...
Being able to record and analyze data securely have a paramount importance to meet the needs of both military and civilian applications. Therefore, data acquisition systems are used to meet the needs of complex applications. A data acquisition system capable of data conversion, collection and transfer is described in this paper. This system is implemented on FPGA, because of high processing speed...
Testing of software is a worthwhile aspect of software development life cycle. Effective and efficient test cases must be designed to test the software which will reduce the testing cost, time and effort. Nowadays, testing an aspect-oriented program is becoming a challenge for the testers. This paper proposes a novel approach to generate test case scenarios for an aspect oriented program derived from...
The coverage of requirements is a fundamental need throughout the software life cycle. It gives project managers an indication how well the software meets expected requirements. A precondition for the process is to link requirements with project artifacts, like test cases. There are various (semi-) automated methods deriving traceable relations between requirements and test scenarios aiming to counteract...
The Kansas City National Security Campus (KCNSC) collects a large amount of test data used to accept high value and high rigor product. Data has been used historically to support root cause analysis when anomalies are detected in down-stream processes (bottom portion of Fig. 1). The opportunity to use the data for predictive failure analysis however, had never been exploited (top portion of Fig. 1)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.