The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software architecting is about making decisions that have system-wide impact and that shape software product and process alike. While researchers and practitioners have tried to define and scope the role of the architect, social and organizational impacts on the architect and the architecting process are often neglected. The SODA workshop focuses on the social and organizational dimensions in which...
The Internet of Things (IoT) involves intelligent, heterogeneous, autonomous and often distributed things which interact and collaborate to achieve common goals. A useful concept for supporting this effort is Emergent Configuration (EC), which consists of a dynamic set of things, with their functionalities and services, that cooperate temporarily to achieve a goal. In this paper we introduce a commitment-based...
This paper describes a program organized by the INCOSE Academic Council to determine future directions in systems engineering (SE) research. This program uses a framework coupling societal need to systems challenges, then to gaps in the capabilities of SE, which inform the direction of future SE research. The results of the first workshop are presented including a description of the grand challenges...
We argue that verbose queries used for software retrieval contain many terms that follow specific discourse rules, yet hinder retrieval. We report the results of an empirical study on the effect of removing such terms from verbose queries in the context of Text Retrieval-based concept location. In the study, we remove terms from 424 queries, generated from bug reports of nine open source systems....
Cyber-physical-human systems find new applications in various areas of human lives. The paper proposes usage of a system of this class to achieve a synergy between the connected car and e-tourism ideas. The developed approach is presented with more attention paid to the situational awareness and behavioral awareness. The approach is illustrated via a case study aimed to organization of infomobile...
Human-robot teams can incorporate advanced technology such as distributed mobile sensor networks, integrated communications, visualization technology, and other means to acquire and assess information. These factors can greatly affect mission effectiveness, safety, and survivability, by providing critical information and suggesting courses of action. However, information overload can result. Tactical...
Pedestrians globally comprise 22 % of all road traffic deaths in 2013. Various approaches for reducing accident numbers have already been introduced and are still being researched. Most of these approaches have specific limitations, like requiring line of sight. To overcome these limitations, we propose the Wireless Seat Belt (WSB), a smartphone-based collision avoidance system for pedestrians. Unlike...
The notion of composition in the context of combinatorial test design naturally arises in situations where the output of one module is used as an input to another module. Composability of tests plans has several important benefits as it facilitates both test and model reuse in such sequential scenarios. In this paper we describe a method for an automatic construction of composable tests plans, one...
The Internet of Things (IoT) connects smart objects so they can share information in a network to provide context-sensitive services. The amount of shared information will increase, likely dramatically, as more and more smart objects join the network and disseminate their contextual information. In this paper, we explain how smart IoT devices can share a large amount of context information using much...
This paper recognizes the relevance of self-tracking as a growing trend within the general public. As this develops further, pervasive computing has an opportunity to embrace user-feedback from this broader user group than the previously emphasized ‘quantified self:ers’. To this end, the paper takes an empirically driven approach to understand engagement issues by reviewing three popular self-tracking...
Context is a fundamental tool humans use for understanding their environment, and it must be modelled in a way that accounts for the complexity faced in the real world. Current context modelling approaches mostly focus on a priori defined environments, while the majority of human life is in open, and hence complex and unpredictable, environments. We propose a context model where the context is organized...
Annotation of multimodal data sets is often a time consuming and a challenging task as many approaches require an accurate labeling. This includes in particular video recordings as often labeling exact to a frame is required. For that purpose, we created an annotation tool that enables to annotate data sets of video and inertial sensor data. However, in contrast to the most existing approaches, we...
Pervasive computing envisions environments where computers are blended into everyday objects in order to provide added-value services to people. Already today, there is a growing number of advanced embedded systems around us, extended with computing and communication capabilities. However, pervasive applications raise major challenges in term of software engineering and remain hard to develop, deploy,...
Fault localization is known to be tedious and expensive. To help practitioners reduce the needed effort, researchers have proposed many automated fault localization techniques over recent years. Spectrum-based fault localization techniques utilize the coverage data of test cases to localize faults. Although evaluations of these techniques show promising results, they are not being applied in practice...
This paper presents a method of using wearable accelerometers and microphones to detect instances of ad-hoc physical collaborations between members of a group. 4 people are instructed to construct a large video wall and must cooperate to complete the task. The task is loosely structured with minimal outside assistance to better reflect the ad-hoc nature of many real world construction scenarios. Audio...
Mutation testing changes a program by applying mutation operators, which generate many slightly different versions of the original program (i.e., mutants). Identifying which mutants are equivalent to the original program is one of the major barriers to a wider adoption of mutation testing. Recent studies suggest that an effective approach to mitigating this problem is to use only a subset of all mutation...
Testing of product is perform to discover or detect the errors and defects in the developed system. But testing is usually time consuming especially when complex projects are canvass. Testing of a product lead off with generation of test cases. The Test case generation are based on three parts coding, design and specification. The Specification based testing deals with generation of test cases from...
Metamorphic testing uses domain-specific properties about a program’s intended behaviour to alleviate the oracle problem. From a given set of source test inputs, a set of follow- up test inputs are generated which have some relation to the source inputs, and their outputs are compared to outputs from the source tests, using metamorphic relations. We evaluate the use of an automated test input generation...
Component-Based Software Engineering (CBSE) provides a solution for the development of complex and evolved systems. When creating and maintaining these systems, repeat the task of selecting components. This paper focuses on a variety of formal software component selection techniques, both manual and automated. The main objective of this research paper is to evaluate the shortcomings of different prior...
In these days, a large amount of popular peer-to-peer (also commonly known as P2P) applications, especially in the live streaming domain, are operating in Internet. One of the keys to success of such an application is the mutual cooperation among the participants (i.e., peers) in that application. However, presence of selfish peers (also commonly known as free riders) affects the performance of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.