Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Static software metrics are increasingly used for assessing software quality, with multiple tools commercially available for measuring software metrics, non are based on research proven to have direct correlation with software quality. This study makes use of the results from [20] by building a tool for measuring software metrics on code to show possible weak links that are likely to fail. The tool...
Marking duplicate bugs from bug report data has the significance to reduce effort and costs of software development, maintenance and evolution. Prior work has used machine learning techniques to mark duplicate bugs but has employed incomplete knowledge which can be not very effective with the explosive growth in data volume and complexity. To redress this situation, in this paper we discover knowledge...
Electronic systems, like they are embedded in road vehicles, have to be compliant to functional safety standards like ISO 26262 [1], which limit the impacts of malfunctions for safety critical systems. ISO 26262, for instance, defines different safety levels for road vehicles, which require different means and measures for a safety compliant system and its development process like risk analysis and...
The Data Over Cable Service Interface Specification (DOCSIS) provides internet access via cable TV networks. The latest version 3.1 replaces the Physical Layer of previous DOCSIS versions. With DOCSIS 3.1, broadband cable network operators want to accelerate their networks to gigabit-per-second speeds. Enhancements include an increased bandwidth per downstream channel of up to 192MHz, Orthogonal Frequency-Division...
Indoor positioning technique has been attracting more and more attention in recent years. In this paper, we propose a multi-path profile fingerprinting localization system based on software defined radio (SDR) platform. The system initially calibrates the multi-path profile (MP) and received signal strength (RSS) information to construct a fingerprint database. In the online positioning phase, the...
In terms of capturing software requirements, the most appropriate elicitation technique must be selected, but what does this mean? This paper makes a comparison between what researchers and software engineers see as adequate technique for capturing relevant information to meet software requirements. A systematic mapping of constructs which researchers define as good techniques is presented and compared...
We present a new algorithm for the detection of infinite loop bugs in software. Source code is not needed. The algorithm is based on autocorrelation of a program execution's branch target address sequence. We describe the implementation of the algorithm in a dynamic binary instrumentation tool, the result is lightweight enough to be applied continuously at runtime. Functionality of the tool is evaluated...
The industrial, scientific and medical band is widely used by different wireless systems. The identification of other wireless technologies in the common environment is one of the keys for correct system coexistence. In this work, a sensing platform for the detection of IEEE 802.11g and IEEE 802.15.4 primary signals in the 2.4 GHz band is proposed. The sensing platform makes use of a combined scheme...
With an ever-increasing trend of cybercrimes and incidents due to software vulnerabilities and exposures, effective and proactive vulnerability management becomes imperative in modern organisations regardless large or small. Forecasting models leveraging rich historical vulnerability disclosure data undoubtedly provide important insights to inform the cyber community with the anticipated risks. In...
Scientific and accurate cultivated quality grade results are an important guarantee for applications. However, the phenomenon of abnormal cultivated land quality is always occurred due to the error of investigation or computation, so exploring effective method to inspect abnormal data of the grade results is an important problem to be solved. Cultivated land quality grade results of Wuhan Hannan district...
Blinking has two functions: to moisturize eyes and as a defensive response to the environment and responses caused by the by mental processes. In this paper, we investigate statistical characteristics of blinks and blink rate variability of 11 subjects. The subjects are presented with a reading/memorization session preceded and followed by resting sessions. EEG signals were recorded during these sessions...
It is assumed that stability and maintainability are relating to each other. We attempt to verify and validate this assumption in object-oriented paradigm. Two candidate metrics were chosen, one for stability and one for maintainability. CSM is used in stability due to its high accuracy and wide coverage. MI was chosen for maintainability due to its clarity, ease of use and solely based on source...
By comparing the test verification method, the testability virtual verification technique based on Modelica is proposed. This paper designs the model architecture of testability virtual verification, completes implementations of the testability virtual verification and develops a software about testability virtual verification based on OpenModelica. And through a system instance, practicality and...
In this paper it is presented the second stage analysis used to determine the signal quality coefficient for vibro-acoustic signals. After successfully determining the integrity coefficient in the “first stage analysis on determining the Signal Quality Coefficient in vibro-acoustic domain-waveform integrity analysis” paper a second and deeper analysis is presented. This is a frequency domain analysis...
Satellite signal acquisition is indispensable for signal tracking and solution, and its operating time directly determines the starting speed of the software receiver. The length of Beidou code is twice of Global Positioning System (GPS) C/A code. Therefore, the acquisition time will increase with the traditional algorithm. This paper proposed a fast acquisition algorithm which decomposed the N points...
In a software development project, project management is indispensable, and effort estimation is one of the important factors on the management. To improve estimation accuracy, outliers are often removed from dataset used for estimation. However, the influence of the outliers to the estimation accuracy is not clear. In this study, we added outliers to dataset experimentally, to analyze the influence...
We report a compact optical clock scheme based on caesium (Cs) atomic beam, which extends the application of Cs from microwave frequency standard to optical frequency standard. Considering the 1.2 MHz narrow natural-linewidth of the excited state 7P1/2 and 7P3/2, we can lock the laser frequency on the 455 nm or 459 nm transition line with the method of saturated absorption spectroscopy (SAS) to achieve...
This paper describes a case study of using developer activity logs as indicators of a program comprehension effort by analyzing temporal sequences of developer actions (e.g., navigation and edit actions). We analyze developer activity data spanning 109,065 events and 69 hours of work on a medium-sized industrial application. We examine potential correlations between different measures of developer...
Software testing is designed in various company hierarchy, such as end product/service providers and subcontractors. An end product/service providers generally has a severe responsibility for their software quality, while a subcontractor has a limited responsibility. There can be a hypothesis that there is differences in software quality between service providers and subcontractors. To examine the...
The segment of post-quantum cryptography rises its importance with increasing improvements in the quantum computing. Cryptographic post-quantum algorithms have been proposed since 1970s. However, side-channel attack vulnerabilities of these algorithms are still in focus of the recent research. In this paper, we present a differential power analysis attack on the McEliece public-key cryptosystem. We...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.