The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software quality is one of the important aspects of the reliable software. For this reason, software practitioners are interested in the methods that enable to predict defect with software metrics. Most studies focus on what kind of techniques would be fit for the prediction model; however, the research about what is the appropriate number of software metrics for building effective defect prediction...
Present day software engineering concept gives emphasis on the use of design patterns for developing software which are recurring in nature. Detection of design pattern is one of the emerging field of Software Reverse Engineering. In this work, an attempt has been made to present an approach for design pattern detection with the help of Graph Isomorphism and Normalized Cross Correlation techniques...
Electronic devices can be seen everywhere in our lives along with the popularization and application of computer technology, meanwhile more and more digital traces are found in criminal activities, so we can take these digital evidences to prove case. But digital evidences usually have been questioned in the courts because of their reliability. There is no valid method to prove the reliability of...
Side-channel attacks have been a real threat against many embedded cryptographic systems. A commonly used algorithmic countermeasure, random masking, incurs large execution delay and resource overhead. The other countermeasure, operation shuffling or permutation, can mitigate side-channel leakage effectively with minimal overhead. In this paper, we target automatically implementing operation shuffling...
Noises are inevitable when mining software archives for software fault prediction. Although some researchers have investigated the noise tolerance of existing feature selection methods, few studies focus on proposing new feature selection methods with a certain noise tolerance. To solve this issue, we propose a novel method FECS (FEature Clustering with Selection strategies). This method includes...
Test case prioritization for regression testing is an approach that schedules test cases to improve the efficiency of service-oriented workflow application testing. Most of existing prioritization approaches range test cases according to various metrics (e.g., Statement coverage, path coverage) in different application context. Service-oriented workflow applications orchestrate web services to provide...
Previous studies have reported that the performance of a developer can greatly impact the quality of the software he/she has worked on. Such performance can be measured using two developer risk metrics during a particular development period. One is the ratio of the number of bug-introduce commits to the total number of commits made by a developer (i.e., the DQ metric). The other is the proportion...
The paper investigates the impact of different sampling strategies of car-following and lane-changing model parameters on traffic simulation results. The investigation considered seven possible sampling strategies including sampling parameters from independent normal distributions, which is customarily in commercial simulation software. Study results revealed that model performances in case of sampling...
In this paper, we investigate the problem of detecting correlations among datasets containing malicious data concerned with various types of network attacks and related events of the infections taken from a numerous sources and organizations. We propose a graph based technique to depict relationships between malicious data based on values of attributes related both to attackers and victims, and referred...
The adoption and success of serious games for educational purposes partially depend on instructor related factors. This study proposes a simple hypothetical model on the factors that influence the instructor's acceptance of the utilization of games (whether serious or not) in undergraduate software engineering education. The suggested model is tested by means of a pilot questionnaire conducted in...
The objective of the work described is to accurately predict, as early as possible in the software lifecycle, how reliably a new software release will behave in the field. The initiative is based on a set of innovative mathematical models that have consistently shown a high correlation between key in-process metrics and our primary customer experience metric, SWDPMH (Software Defects per Million Hours...
Risk assessment plays crucial role in the software project management. The critical examination of different risk assessment methods help researchers and practitioners to evaluate the impact of various project related risks. The existing Fuzzy Ex-COM (Fuzzy Expert COCOMO) model is a combination of fuzzy technique and Expert COCOMO. It takes help of expertise and information from earlier activities...
This paper presents a method to accurately estimate the required decoding energy for a given HEVC software decoding solution. We show that the decoder's processing time as returned by common C++ and UNIX functions is a highly suitable parameter to obtain valid estimations for the actual decoding energy. We verify this hypothesis by performing an exhaustive measurement series using different decoder...
The demand for parallel I/O performance continues to grow. However, modelling and generating parallel I/O work-loads are challenging for several reasons including the large number of processes, I/O request dependencies and workload scalability. In this paper, we propose the PIONEER, a complete solution to Parallel I/O workload characterization and gEnERation. The core of PIONEER is a proposed generic...
As developers face ever-increasing pressure to engineer secure software, researchers are building an understanding of security-sensitive bugs (i.e. Vulnerabilities). Research into mining software repositories has greatly increased our understanding of software quality via empirical study of bugs. However, conceptually vulnerabilities are different from bugs: they represent abusive functionality as...
Many research studies have been conducted to help simultaneous code changes on multiple code fragments. Code clones and logical couplings are often utilized in such research studies. However, most of them have been evaluated on only open source projects or students' software. In this paper, we report our academic-industrial collaboration with a software company. The collaboration is intended to suggest...
In a traditional sense, ownership determines rights and duties in regard to an object, for example a property. The owner of source code usually refers to the person that invented the code. However, larger code artifacts, such as files, are usually composed by multiple engineers contributing to the entity over time through a series of changes. Frequently, the person with the highest contribution, e...
Stack Overflow's primary goal is to serve as a platform for users to solicit answers regarding programming questions, though its archives are often used by other users who face similar issues and thus it serves a secondary purpose of documenting common problems. The two driving mechanisms for filtering out low quality posts and highlighting the best answers are community votes and the mark of acceptance...
A creation of an image mosaic from a sequence of overlapped views is a powerful mean of obtaining a larger view of a scene than the available within a single view. It has been a subject of research for many years, and it has been used in wide range of applications such as satellite imaging and medical imaging. In this paper a general framework for creating a mosaiced image is illustrated, and through...
Now a day's software development is growing rapidly. Due to this, there is also a rapid growth in the number of occurrences of defects. In this paper, defect density had been predicted using the Linear Regression Method and had been applied to Static Metrics. It helps to determine that to which module more reliability techniques should be applied. Static metric is used for prediction of defects which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.