The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a framework for comprehensive model-based systematic design and staged verification of Human-in-the-Loop Cyber-Physical Systems (HiLCPS) to handle their inherent complexity. HiLCPS are systems where humans are in the middle of the feedback loop between their cyber and the physical components. HiLCPS designers require modern tools and simpler model-based approaches for design and verification...
Mutation analysis is an established technique for measuring the completeness and quality of a test suite. Despite four decades of research on this technique, its use in large systems is still rare, in part due to computational requirements and high numbers of false positives. We present our experiences using mutation analysis on the Linux kernel's RCU (Read Copy Update) module, where we adapt existing...
Detection of defective items from a colossal number of items, commonly referred to as "Group Testing", has been widely studied because of its promising applications in various fields. To detect at most d defective items from N items, a subset of N items is formed into a test and tested. If the total number of tests needed is t, a set of t tests can be seen as a t × N measurement matrix,...
In recent years, it has been shown that fault prediction models could effectively guide test effort allocation in finding faults if they have a high enough fault prediction accuracy (Norm(Popt) > 0.78). However, it is often difficult to achieve such a high fault prediction accuracy in practice. As a result, fault-prediction-model-guided allocation (FPA) methods may be not applicable in real development...
While the network anomaly detection is essential in network operations and management, it becomes further challenging to perform the first line of detection against the exponentially increasing volume of network traffic. In this work, we develop a technique for the first line of online anomaly detection with two important considerations: (i) availability of traffic attributes during the monitoring...
Ensuring software security is essential for developing a reliable software. A software can suffer from security problems due to the weakness in code constructs during software development. Our goal is to relate software security with different code constructs so that developers can be aware very early of their coding weaknesses that might be related to a software vulnerability. In this study, we chose...
In this paper, we study constant-time algorithms on complex networks. In a recent work presented in ESA~2016, the author introduced a natural class of multigraphs called hierarchical-scale-free (HSF) multigraphs and showed that a very wide subclass of HSF is hyperfinite. Based on this result, a surprising result such that every property is constant-time testable for the subclass was obtained. However,...
Access control policies written in the XACML standard language tend to be complex due to the great variety of attribute types and operations for fine-grained access control. The complexity not only increases the likelihood of having authorization faults in access control policies, but also makes it challenging to find and fix these faults. This paper presents an approach for automating the process...
Multi-label classification (MLC), allowing instances to have multiple labels, has been received a surge of interests in recent years due to its wide range of applications such as image annotation and document tagging. One of simplest ways to solve MLC problems is label-power set method (LP) that regards all possible label subsets as classes. LP validates traditional multi-classification classifiers...
In this paper we propose a novel methodology of sequential change detection using the minimum description length (MDL)-change statistics. We first introduce the MDL-change statistics as the difference between the code-lengths with change and that without change. We give a theoretical justification for its use in the scenario of hypothesis testing. In it we evaluate the error probabilities for the...
To ensure the delivery of high quality and robust service-oriented applications, testing of web services composition has received much attention. These services have become more and more complex, where they have to cope with strict requirements of business processes and their dynamic evolution, and interactions among different companies. In this context, the analysis and testing of such services demands...
Credibility of science is fundamentally due to the strenuous efforts made to verify the general consistency among relevant facts, theories, applications, research methodologies, etc. and scientific method which emphasizes the significance of continuously building and testing hypotheses has withstood the test of time as a successful methodology of acquiring a body of knowledge, we can rely on, at least...
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions. It explains testing methods of open addressing and factors that affect efficient...
Preference reasoning is a central problem in decision support. There exist various ways to interpret a set of qualitative preferences. Conditional preference logics allow to deal with semantics such as optimistic, pessimistic, strong or not. In this paper, we study the complexity of the main problems in optimistic/pessimistic preference logic: undominated, consistency and dominance. We show that they...
Stroke is a growing global public health issue in low and middle income countries, where prevalence rates for cerebrovascular events now exceed those in industrialized nations. Limited access to stroke rehabilitation, which includes prevention of physical inactivity and deconditioning to better manage risk factors for recurrent vascular events, remains a major barrier to care. In the Caribbean Community,...
Quality assurance for highly-configurable systems is challenging due to the exponentially growing configuration space. Interactions among multiple options can lead to surprising behaviors, bugs, and security vulnerabilities. Analyzing all configurations systematically might be possible though if most options do not interact or interactions follow specific patterns that can be exploited by analysis...
“Transfer learning”: is the process of translating quality predictors learned in one data set to another. Transfer learning has been the subject of much recent research. In practice, that research means changing models all the time as transfer learners continually exchange new models to the current project. This paper offers a very simple “bellwether” transfer learner. Given N data sets, we find which...
This paper presents novel architectures for machine learning based classifiers using stochastic logic. Two types of classifier architectures are presented. These include: linear support vector machine (SVM) and artificial neural network (ANN). Stochastic computing systems require fewer logic gates and are inherently fault-tolerant. Thus, these structures are well suited for nanoscale CMOS technologies...
Brain-Computer Interface (BCI) is a direct communication pathway between brain and external devices bypassing the natural pathway of nerves and muscles. BCI enables an individual to send commands to a peripheral device using his brain activity. Electroencephalogram (EEG) is the most commonly used brain signal acquisition method as it is simple, economical and portable. Feasibility of detecting familiar...
A well defined testing strategy is essential for any software development project. Testing efforts need to be carefully planed and executed in order to ensure effectiveness. Programming failures can represent a high risk for business. In order to mitigate such risk, companies have been increasingly investing more resources on software testing.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.