The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used...
Current manual techniques of static reverse engineering are inefficient at providing semantic program understanding. We have developed an automated method to categorize applications in order to quickly determine pertinent characteristics. Prior work in this area has had some success, but a major strength of our approach is that it produces heuristics that can be reused for quick analysis of new data...
Software development in free and open source (FOSS) projects is a collective human activity. Software developers in these projects collaborate via FOSS informalisms, i.e. mailing list, bug repository and code repository. Analysing the human collaborative work of these software developers over a time period, e.g. five years, sheds light on the underlying structure and dynamics of how the software is...
This paper proposes a method to optimize the Nonorthogonal Space Distance (NoSD) based on the Particle Swarm Optimization (PSO) algorithm so as to increase estimation accuracy in analogy-based software cost estimation. NoSD is a measure of projects similarity that uses a matrix defined based on mutual information to take both feature redundancies and feature weights into distance computation. We assumes...
Bug fixing is an essential activity in the software maintenance, because most of the software systems have unavoidable defects. When new bugs are submitted, triagers have to find and assign appropriate developers to fix the bugs. However, if the bugs are at first assigned to inappropriate developers, they may later have to be reassigned to other developers. That increases the time and cost for fixing...
Applications with a Graphical User Interface (GUI) front-end are ubiquitous, thus it is of great importance to assure the quality of such systems. Model-based GUI testing provides an effective mechanism for automated testing of applications with a GUI. However, most existing model-based GUI test generation techniques produce many infeasible (i.e., Broken) event sequences which are used as test cases...
During the last three decades, there has been great progress in the field of risk management. Risk management is particularly significant when it comes to software projects. This is because software projects are exposed to various serious risks, including interaction with humans, need for continuous development and occasional lack of proper evaluation procedures. These factors, combined with the extensive...
Software build system (e.g., Make) plays an important role in compiling human-readable source code into an executable program. One feature of build system such as make-based system is that it would use a build configuration file (e.g., Make file) to record the dependencies among different target and source code files. However, sometimes important dependencies would be missed in a build configuration...
A low-cost and portable three-dimensional scanner system is designed in this paper, including hardware and software systems. A common camera and a linear laser emitter are used to detect the distance of the object by using triangulation algorithm. Meanwhile, 3D point cloud data is generated. Then by using QuickHull algorithm or MeshLab software, the object's surface can be recovered. To verify the...
An application of using time of flight (TOF) to measure distance between two wireless sensor network (WSN) nodes is explained. Both nodes are identical smart phones. Results show a large accuracy error (106m) but with several avenues for improvement. A discussion of the results and future work follows.
Hardware errors are on the rise with reducing feature sizes, however tolerating them in hardware is expensive. Researchers have explored software-based techniques for building error resilient applications. Many of these techniques leverage application-specific resilience characteristics to keep overheads low. Understanding application-specific resilience characteristics requires software fault-injection...
The results of development, tests and application of the GPR for measurement of the road asphalt layers thickness are presented in the paper. Main necessary improvements providing the possibility of use the GPR as a measuring device are described as well as some results of application of the GPR for inspection of the road structure after reparation the road. It was achieved accuracy of layers thickness...
As technology scales, the hardware reliability challenge affects a broad computing market, rendering traditional redundancy based solutions too expensive. Software anomaly based hardware error detection has emerged as a low cost reliability solution, but suffers from Silent Data Corruptions (SDCs). It is crucial to accurately evaluate SDC rates and identify SDC producing software locations to develop...
Vehicle classification is a vital measure used to ensure appropriate roadway design as it affects both capacity and pavement endurance. Given that, departments of transportation across the US collect vehicle miles travelled (VMT) for their highways using automatic vehicle classifiers (AVC), and then use these figures for future highway design. Accuracy assessment of AVCs is thus important to ensure...
The reliability and security of software are affected by its constant changes. For that reason, developers use change-impact analysis early to identify the potential consequences of changing a program location. Dynamic impact analysis, in particular, identifies potential impacts on concrete, typical executions. However, the accuracy (precision and recall) of dynamic impact analyses for predicting...
Clone detection has been an active area for decades and many tools have been proposed. Existing researches show that in traditional software clones achieve to 13%–20%, and the clone rate in Web Application area may be higher. In this paper, we propose an improved method for code clone detection. Our approach is based on the randomized kd-trees with dimensionality reduction to cluster the characteristic...
An adaptive slicing algorithm based on stereo lithography (STL) model was proposed. The main principle is, firstly, reestablishing the topological information of STL model. Then the intersection points were calculated and sequenced by using intersection points' tracking method and marking method. The slicing thickness was automatically controlled according to the area deviation ratio between two adjacent...
Although object-based image analysis (OBIA) has been used for detailed classification of urban areas, its attribute selection and knowledge discovery have been time consuming and subjective to analysts' performance. In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. This algorithm provides a decision tree output to represent...
The goal of any automated requirement prioritization process is to reduce the difference between the true and estimated ranking. It is arguable that to what extent, using stakeholders' feedback will reduce that difference. Moreover, incorporating requirement ranking functions such as value, cost, risk, etc. along with the feedback is another concern. This paper proposes a scheme for requirement prioritization...
In software quality research, software defect prediction is a key topic. The characteristics of software attributes influences the performance and effectiveness of the defect prediction model. However this issue is not well explored to the best of our knowledge. Thus we focus on the problem of attribute selection in the context of software defect prediction here and hence in this research, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.