The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As agile methods become more pervasive, agile practices are applied to more large-scale systems with a scope that goes beyond pure software. The expansion of agile in these contexts provides benefits, but creates new challenges. Widespread use of agile has changed the way we must think about practices both in Requirements Engineering (RE) and in System Testing (ST). Our experience shows that many...
Software developers need to address security risks and elicit security requirements in the early stages of the Software Development Life Cycle. It is important to investigate how novices can incorporate security in the early stages of the SDLC.
This tutorial provides developers with practical guidance for securely implementing Java Serialization. Java deserialization is a clear and present danger as its widely used both directly by applications and indirectly by Java subsystems such as RMI (Remote Method Invocation), JMX (Java Management Extension), JMS (Java Messaging System). Deserialization of untrusted streams can result in remote code...
After changes are made to a system, developers typically perform regression testing to uncover the regression faults in previously existing functionality of the system. However, during software evolution, the program entities (i.e., classes/methods) realizing such functionality might be modified/replaced by other entities. Thus, in the new version, existing test cases containing obsolete class references...
Code smells are considered to be indicators of design flaws or problems in source code. Various tools and techniques have been proposed for detecting code smells. The number of code smells detected by these tools is generally large, so approaches have also been developed for prioritizing and filtering code smells. However, the lack of empirical data regarding how developers select and prioritize code...
When performing feature location tasks, developers often need to explore a large number of program elements by following a variety of clues (such as program element location, dependency, and content). As there are often complex relationships among program elements, it is likely that some relevant program elements are omitted, especially when the implementations for a feature or concern scatter across...
Software assurance tools - tools that scan the source or binary code of a program to find weaknesses - are the first line of defense in assessing the security of a software project. These tools can catch flaws in a program that can affect both the correctness and safety of the code. This tutorial is relevant to anyone wanting to understand how those tools work, and learn how to use these automated...
The method for finding inverse element by the module is based on the stepwise addition of residue is developed in this paper. This method allows avoiding performing the complex arithmetic operations and implementing calculations on numbers much lower bit compared to the classical approach based on the Euclid's algorithm and its consequences. Analytical expressions of time complexity characteristics...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
Nowadays, home devices with network capabilities are widely used. The technology integration offers new and exciting opportunities to increase the device connectivity within a home for many proposals of home automation. In this paper, it has been developed a framework that allows to quickly develop new hardware and software complex systems, rapidly integrate new classes of devices in existing systems...
Using research-based teaching-learning methodologies in Computer Science programs is a challenge. Achieving the balance between the required technical knowledge and scientific rigor in young professionals is difficult in the University. The goal of this paper is to help baccalaureate level teachers and students employ a research-based teaching-learning methodology through the introduction of research...
The Costa Rican Ministry of Science, Technology and Telecommunications (MICITT) promotes The Science and Technology Month. This is a yearly celebration aimed at bringing young students closer to science and technology. In 2016, the activity included events in six rural areas around the country. Laboratorio Experimental is a group for research and outreach in computer science education hosted by Instituto...
Microarray analysis is one of the most suitable tools available for scientists concerned with DNA sequences to study and examine gene expression. Through microarray analysis, the gene expression sequence can be obtained and biological information on many diseases can be acquired. The gene expression information contained in the microarray can be extracted using image-processing techniques. Microarray...
Achieving dependable software is a challenging problem, especially for industries beyond traditional safety-critical domains, such as telecommunications, consumer electronics, manufacturing, etc., where the cost of software failures is still quite high. Several factors contribute to exacerbate this problem: these industries are abruptly converting into software-driven ones; they must face time-to-market...
The number of software-driven features within a modern automotive powertrain rises significantly. With increasing number of features, also the risk of undesired interactions between those features rises drastically. This leads to new challenges with regard to efficiency in testing such automotive features. Automated Feature-Interaction-Testing significantly increases the efficiency of such feature...
While general game playing is an active field of research, the learning of game design has tended to be either a secondary goal of such research or it has been solely the domain of humans. We propose a field of research. Automated Game Design Learning (AGDL), with the direct purpose of learning game designs directly through interaction with games in the mode that most people experience games: via...
Based on a workshop developed at INICTEL-UNI, this paper presents the methodology and considerations taken to improve the experiences in communication laboratory sessions in Peruvian universities with Software Defined Radio platforms, using a HackRF-One for transmission and a RTL-SDR for reception together with GNUradio Companion, an open source software. The use of these tools allows real communications...
We introduce Active Dependency Mapping (ADM), a method for establishing dependency relations among a set of interdependent services. The approach is to artificially degrade network performance to infer which assets on the network support a particular process. Artificial degradation of the network environment could be transparent to users; run continuously it could identify dependencies that are rare...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
Much attention has been paid to the diagonal flips in maximal planar graphs. In this paper, we firstly focus on the properties of the unflippable edges in maximal planar graphs, and propose the concept of K4-embedding. Also, we prove that for a maximal planar graph G with order n(⋝ 5), an edge e ∊ E(G) is unflippable if and only if e is either incident to a 3-degree vertex or a supporting edge of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.