Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Software testing has become an essential activity to guarantee software quality. To reduce the overall cost of software testing, model-based testing has been widely studied in the past two decades and Finite State Machine (FSM) is used to build the model of software behaviors. However, due to the inadequacy of the modeling ability of FSM, FSM-based testing cannot be taken as a test oracle to solve...
Using Clustering algorithm to improve the effectiveness of test case prioritization has been well recognized by many researchers. Software fault prediction has been one of the active parts of software engineering, but to date, there are few test cases prioritization technique using fault prediction. We conjecture that if the code has a fault-proneness, the test cases covering the code will find fault...
This paper was primarily conducted to develop an Online Booking System where users can search for different varieties of hotels and are able to sort them according to their price, number of stars or their location distance to any particular place in the city. Once the hotel is selected, Users are able to guess the fastest routes to all the tourist attraction places and restaurants nearby each hotel...
a large number of design or decision making problems, in engineering and management, require simultaneous optimization of multiple and often conflicting objectives. Although the current state-of-the-art algorithms (NSGA II and SPEA2) have been proved quite efficient for solving two- and three-objective problems, the performance of these algorithms is unacceptable for solving many-objective problems...
Modular polynomial multiplication is the most computationally intensive operation in many homomorphic encryption schemes. In order to accelerate homomorphic computations, we propose a software/hardware (SW/HW) co-designed accelerator integrating fast software algorithms with a configurable hardware polynomial multiplier. The hardware accelerator is implemented through a High-Level Synthesis (HLS)...
Random numbers find their usefulness and utility in domains which have a significant role, sometimes even critical or obtaining some unpredictable results: Simulations based on Monte Carlo methods, simulations from mathematical modeling simulations, statistics, prime numbers generation, cryptography, spreaded spectrum communication, games, etc. In cryptography, the property of being random is fundamental...
Modern intelligent systems often consist of devices based on various platforms. When the reprogramming of some devices is required, every type of a device has its own reprogramming mechanism. These mechanisms are usually platform specific, as they are based on a compiler and linker used. This paper presents a GUI based software tool for an easy generation and management of firmware updates for low-power...
Scalability is a major challenge for existing behavioral log analysis algorithms, which extract finite-state automaton models or temporal properties from logs generated by running systems. In this paper we present statistical log analysis, which addresses scalability using statistical tools. The key to our approach is to consider behavioral log analysis as a statistical experiment.Rather than analyzing...
Software engineering involves a lot of change as code artifacts are not only created once but maintained over time. In the last 25 years, major paradigms of program development have arisen – agile development with refactorings, software product lines, moving sequential code to multicore or cloud, etc. Each is centered on particular kinds of change; their conceptual foundations rely on transformations...
Since the 70s, the C preprocessor is still widely used in practice in a numbers of projects, including Apache, Linux, and Libssh, to tailor systems to different platforms. To better understand the C preprocessor challenges, we conducted 40 interviews and a survey among 202 developers. We found that developers deal with three common problems: configuration- related bugs, combinatorial testing, and...
We propose an instantaneous technique to detect performance bugs in the IDE. It tracks program changes in the background, detects performance bugs, and displays and invalidates bug warnings and fixes, all happening in a blink. We develop a novel change-aware static race perf-bug detection algorithm that leverages a change-aware on-the-fly points-to analysis to compute only change-related information...
Software defect localization is an important step in the process of fixing defects and is a necessary means to improve software quality. In the process of fixing defects, it is also the most time-consuming and laborious task to accurately locate the files where the defects should be fixed. In order to clarify the research progress in the field of defect localization, we introduce the key technologies...
The continuous development of trustworthy software promotes the in-depth study of formal methods. This paper focuses on the formal derivation of algorithm based on recurrence relations. We show two examples of automated transformation processes by combining Isabelle theorem prover with Dijkstra weakest precondition method, that can avoid the error-prone and long-winded problems in manual verification...
The present-day fighter pilot is desired to have maximum awareness of his surroundings despite the excessive workload in a highly dynamic environment. So, it is necessary to provide him decision aiding tools that can help him perform the tasks without compromising on his mission. In-flight Route Replanning under High threat Air defence system is one such aid as part of the Decision Support System...
Many modern systems cannot adapt themselves to changing requirements. Maintenance of these systems require a lot of expertise and cost. In recent years focusing on systems with the ability to dynamic adapt with runtime environment. One kind of these systems, are self-adaptive websites. One of the main objectives in achieving to self-adaptive is planning for choose the structure or appropriate behavior...
The structure of community represents the latent social context of user activities and has important implementations in the field of collaborative filtering in recommendation systems, in particular; when the recommended items can be inferred based on all users' interests within a community. The important issue when there are some social networks which have no ability to division due to high connectivity...
We propose a technique based on symbolic execution for analyzing the algorithmic complexity of programs. The technique uses an efficient guided analysis to compute bounds on the worst-case complexity (for increasing input sizes) and to generate test values that trigger the worst-case behaviors. The resulting bounds are fitted to a function to obtain a prediction of the worst-case program behavior...
In recent years, significant interest has emerged in the problem of fully automating the design of microfluidic very large scale integration (mVLSI) chips, a popular class of Lab-on-a-Chip (LoC) devices that can automatically execute a wide variety of biological assays. To date, this work has been carried out with little to no input from LoC designers. We conducted interviews with approximately 100...
Reducing the noise content in an image is the important factor in image processing and its applications. Some of the noises which cause a serious degradation in the image quality are multiplicative noise, salt and pepper noise, impulse noise, gaussian noise, additive noise etc. Among these, salt and pepper noise can be eliminated using median filtering techniques. Sorting techniques have been beneficial...
Floating point operations of addition, subtraction, multiplication and division for normalization require removing the leading zeros. Algorithms to remove the leading zeroes using NOR logic for input bits along with carry, XOR logic on result of floating point operation are proposed in literature. This paper proposes leading zero count algorithm using NAND logic for adjacent bits of result of floating...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.