The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To improve software reliability, many rule-based techniques have been proposed to infer programming rules and detect violations of these rules as bugs. These rule-based approaches often rely on the highly frequent appearances of certain patterns in a project to infer rules. It is known that if a pattern does not appear frequently enough, rules are not learned, thus missing many bugs. In this paper,...
Synchronous embedded systems are becoming more and more complicated and are usually implemented with integrated hardware/software solutions. This implementation manner brings new challenges to the traditional model-driven design environments such as SCADE and STATEMATE, that supports pure hardware or software design. In this paper, we propose a co-design tool Tsmart-Edola to facilitate the system...
Consider a question and its answers in Stack Overflow as a knowledge unit. Knowledge units often contain semantically relevant knowledge, and thus linkable for different purposes, such as duplicate questions, directly linkable for problem solving, indirectly linkable for related information. Recognising different classes of linkable knowledge would support more targeted information needs when users...
Cascading Style Sheets (CSS) is the standard language for styling web documents and is extensively used in the industry. However, CSS lacks constructs that would allow code reuse (e.g., functions). Consequently, maintaining CSS code is often a cumbersome and error-prone task. Preprocessors (e.g., Less and Sass) have been introduced to fill this gap, by extending CSS with the missing constructs. Despite...
Dynamic Software Updating (DSU) provides mechanisms to update a program without stopping its execution. An indiscriminate update, that does not consider the current state of the computation, potentially undermines the stability of the running application. To automatically determine a safe moment when to update the running system is still an open problem often neglected from the existing DSU systems...
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
The emergence of Systems of Systems (SoS) arrangements, with their high level of complexity, mainly due to the different characteristics of the individual systems and their integration into the respective SoS, has brought about new challenges in terms of Configuration Management (CM) in general, and change management in particular. Novel change management frameworks are needed to appropriately address...
An important property of software repositories is their level of cross-project redundancy. For instance, much has been done to assess how much code cloning happens across software corpora. In this paper we study a much less targeted type of replication: Interface Redundancy (IR). IR refers to the level of repetition of whole method interfaces - return type, method name, and parameters types - across...
The traditional duplicate bug reports detection approaches are usually based on vector space model. However, the experimental result is rarely satisfying since this method cannot distinguish semantic correlation among bug reports which written by natural languages. Topic model, as a method to model underlying topics of texts, can solve the problem of document similarity calculation methods used in...
The paper deals with semantic modeling a mental imagery caused by processing a new project task in real-time designing a system with the software. In the processing of the new task, the designer applies a framework “model of precedent” and its iterative filling by content with using a feedback caused with a stepwise refinement of the task statement. For understanding the current conditions of the...
Reproducibility of research is an area of growing concern in computer vision. Scientific workflows provide a structured methodology for standardized replication and testing of state-of-the-art models, open publication of datasets and software together, and ease of analysis by re-using pre-existing components. In this paper, we present initial work in developing a framework that will allow reuse and...
OntoSoft is a distributed semantic registry for scientific software. This paper describes three major novel contributions of OntoSoft: 1) a software metadata registry designed for scientists, 2) a distributed approach to software registries that targets communities of interest, and 3) metadata crowdsourcing through access control. Software metadata is organized using the OntoSoft ontology along six...
Precise reasoning for floating-point arithmetic (FPA) is as critical for accurate software analysis as it is hard to achieve. Several recent approaches reduce solving an FPA formula f to reasoning over a related but easier-to-solve proxy theory. The rationale is that a satisfying proxy assignment may directly correspond to a model for f. But what if it doesn't? Prior work deals with this case somewhat...
Many software applications in e-Government have been developed. To build an application, a good requirements specifications is needed to have a good quality software at the end. Poor quality requirements may cause failures in many software development projects. Typical software developments may not be written by an expert in requirements specification. Therefore they were often ambiguous or may exhibit...
In the development of a new software solution, users and developers spend the majority of their effort on modeling the functional requirements. The Non-Functional Requirements (NFR) are treated as a second class requirement, ignored until the end of the development cycle. They are often hidden, overshadowed and therefore, frequently neglected or forgotten. They are neglected because NFRs are often...
Predictive models for software projects' characteristics have been traditionally based on project-level metrics, employing only little developer-level information, or none at all. In this work we suggest novel metrics that capture temporal and semantic developer-level information collected on a per developer basis. To address the scalability challenges involved in computing these metrics for each...
There are many illegal value use defects in C programs, for example, illegal computing, use of uninitialized variables and array out of bounds. When C programs are running, these defects may cause software failure, and may lead to serious consequences. For fully detecting these illegal value use defects, we apply abstract regions simulate memory blocks that allocated to memory objects at the runtime,...
The utilization of modular and reusable resources would reduce complexity and lead-time for the design of cyber-physical systems. Even if different theories have been proposed, there is not a general definition and metamodel applicable for reusable resources. Energetic approaches constitute the state of the art for modeling the dynamics of physical systems. Within this work, Power-Oriented Graphs...
In this work we present an abstract interpretation based static value set analysis method tailored for Sequential Function Charts (SFCs). Translation based approaches that transform SFCs into different presentations - and thus loosing the structure - have shown to be imprecise for this language. Our approach thus keeps the SFC structure and additionally provides value sets as entry-and exit information...
Engineering and computer science have come up with a variety of techniques to increase the confidence in systems, increase reliability, facilitate certification, improve reuse and maintainability, improve interoperability and portability. Among them are various techniques based on formal models to enhance testing, validation and verification. In this paper, we are concentrating on formal verification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.