The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Refactoring is a key activity for any software system, as it ensures that the system is easily maintainable and extensible. However, complex refactorings (restructurings) are largely performed by hand, as there are no automated means of chaining existent basic refactorings. In addition, developers cannot quickly and safely evaluate the effects of a restructuring solution over another. In this context,...
Feature location is a program comprehension activity in which a developer inspects source code to locate the classes or methods that implement a feature of interest. Many feature location techniques (FLTs) are based on text retrieval models, and in such FLTs it is typical for the models to be trained on source code snapshots. However, source code evolution leads to model obsolescence and thus to the...
Earned Value Management (EVM) is the most recognized tool for monitoring and controlling project performance. Its ultimate goal is to provide reliable early warning signals about the cost and schedule performance of a project. However, EVM has its limitations in monitoring and controlling software project activities. The lack of quality performance indicator and the inadequacy in incorporating the...
Clustering is an important phase in data mining. A number of different clustering methods are used to perform cluster analysis: Partitioning Clustering, hierarchical clustering, grid-based clustering, model-based, graph based clustering and density based clustering and so on. Hierarchical method helps us to cluster the data objects in the form of a tree known as hierarchy. And each node in hierarchy...
Dynamic graph software watermarking has become the focus of attention both in the academia and industries. In this paper we improve the IPPCT structure (Improved Planted Plane Cubic Trees) which is based on the Radix-k circular linked list structure and PPCT structure. This further improvement takes advantage of all nodes in PPCT tree to encode so as to enhance the data rate at the same time. In order...
In this paper, an adaptive weighted prediction is proposed to improve the coding efficiency. Conventional weighted prediction methods are optimized for specific sequences with global brightness variations (GBVs) such as fade-in and fade-out. However, if there is uncovered background by motion between current picture and reference picture, weighted prediction parameter (WPP) could not be derived accurately...
In recent years, the inductive, incremental verification algorithm IC3 had a major impact on hardware model checking. Also with respect to software model checking, a number of adaptations of Boolean IC3 and combinations with CEGAR and ART-based techniques have been developed. However, most of them exploit the peculiarities of software programs, such as the explicit representation of control flow,...
We present a compositional SMT-based algorithm for safety of procedural C programs that takes the heap into consideration as well. Existing SMT-based approaches are either largely restricted to handling linear arithmetic operations and properties, or are non-compositional. We use Constrained Horn Clauses (CHCs) to represent the verification conditions where the memory operations are modeled using...
Software bugs contribute to the cost of ownership for consumers in a software-driven society and can potentially lead to devastating failures. Software testing, including functional testing and structural testing, remains a common method for uncovering faults and assessing dependability of software systems. To enhance testing effectiveness, the developed artifacts (requirements, code) must be designed...
This paper selected 12 evaluating index affecting customer satisfaction in the Taobao's third-party logistics service providers, used the principal component analysis (PCA), to find the main factors that affect customer satisfaction in the Taobao's third-party logistics service providers. The study has shown the main factors including the brand, the quality of the staff and reputation. This paper...
Software evolution has been extensively studied in the past decade for various properties and interesting patterns. In this work, we study the effect of evolution on branch prediction techniques. Typically for any program, at the hardware level, all dynamic branch prediction strategies learn the branch behaviors at run time and later re-use them to predict the direction of future branches. The duration...
Evaluating the accuracy of vulnerability security risk metrics is important because incorrectly assessing a vulnerability to be more critical could lead to a waste of limited resources available and ignoring a vulnerability incorrectly assessed as not critical could lead to a breach with a high impact. In this paper, we compare and evaluate the performance of the CVSS Base metrics and Microsoft Rating...
As C program compilers do not check the array bounds during compiling, array index out of bounds attacks cause serious security problems. Array bound checking is becoming more and more important, however, original array bound checking, which needs programmers manual working, wastes too much time. In this paper, we propose a strategy to address this issue for C code. In this strategy, we use predicate...
Based on the DEA (Data Envelopment Analysis) traditional model, an improved evaluation model is introduced for the fuzzy index value and fuzzy preference weight information. The improved model is applied in evaluation of automatic testing software programs. Firstly, the subjective index values are transformed into fuzzy numbers. Secondly, the subjective preference weights are constructed as a constrain...
Agricultural products wholesale market is a key node in agricultural logistics. Beijing-Tianjin-Hebei region is a significant economic region in China in the future and it'll be very important to analyze the efficiency of agricultural products wholesale markets in this region in order to improve the agriculture. This paper uses the Data Envelopment Analysis (DEA) within software “deap 2.1” to analyze...
Test cases are considered an important asset in the software testing process since they are used to detect defects in the software. In order to produce quality software covering all of the requirements, the test case designer requires much time and effort in designing test cases to cover all requirements and conditions according to the test case structure. This research proposes a method for storing...
Hot deployment is a typical feature in mainstream application servers. But current application servers treat each module as a standalone application and may fail if a module with dependencies against other ones is partially updated with hot deploying. The reason lies in that those module dependencies are not respected in current application servers. Direct countermeasures that manage dependencies...
This paper presents a Voice Activity Detector (VAD) for multi-room domestic scenarios. A multi-room VAD (mVAD) simultaneously detects the time boundaries of a speech segment and determines the room where it was generated. The proposed approach is fully data-driven and is based on a Deep Neural Network (DNN) pre-trained as a Deep Belief Network (DBN) and fine-tuned by a standard error back-propagation...
In android ecosystem, the Apps marketplace vendor faces huge number of Apps with irregular quality. Besides bug finding, coverage index is neglected for the current Android testing services. However it is also a challenge to measure the testing coverage without source code. In this paper, we provide a systematic approach to measure the App testing coverage for black-box testing and implement CovDroid,...
S-NPP VIIRS EDR data have been processed and 10-days composite NDVI images are generated. In the image processing procedure maximum value composite method has been applied for the each pixel of the images. The composite images are produced for every 10-days from S-NPP EDR data. The resulting NDVI composite images cover Asian and Australian land area. The image products of S-NPP 375 m resolution composite...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.