The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel approach to improving precision and reliability of odometry of skid-steer mobile robots by means inspired by robotic terrain classification (RTC). In contrary to standard RTC approaches we do not provide human labeled discrete terrain categories but we classify the terrain directly by the values of coefficients correcting the robot's odometry. Hence these coefficients make...
Computing is now ubiquitous. Accessing the Internet is increasingly common from mobile devices through cellular networks. The Internet is now used for shopping, communicating, and for finding employment and housing. More information is readily available than at any time in human history; however, this information is often inaccessible to people with blindness or low-vision. In order to increase access...
Most Model-Driven Development projects focus onmodel-level functional testing. However, our recent study foundan average of 67% additional logic-based test requirements from the code compared to the design model. The fact that full coverage at the design model level does not guarantee full coverage at the code level indicates that there are semantic behaviors in the model that model-based tests might...
We propose a model-assisted security testing framework for developing Web applications. We devised a tool called "RailroadMap" that automatically extracts a behavior model from the code base of Ruby-on-Rails. This model provides a unified point of view for analyzing security problems by representing an application's behavior, which includes all security functions and possible attack scenarios.
This poster presents an industrial case study about test automation and test suite maintenance in the context of Web applications. The Web application under test is a Learning Content Management System (eXact learning LCMS). We analysed the costs associated with the realignment of four equivalent Selenium WebDriver test suites, implemented using the page object pattern and different methods to locate...
Access control mechanisms are defined by means of XACML policies in many application domains. Model-driven approaches: i)allow to overcome difficulties in the XACML policy definition; ii)can hide inaccuracies and weaknesses of security mechanisms. Testing is a key activity for assessing compliance of a XACML policy with the initial model. We propose a Toolchain for supporting users in testing access...
This paper explores inexperienced user performance through a usability testing of three alternative prototypes of a mobile tablet application. One key factor in inexperienced users adopting mobile technology is the ease of use of mobile devices. The interface layout one of the three prototypes was built on the basis of previous research conducted in collaboration with users. More specifically, our...
Menu navigation is the basic functionality of DTV/STB devices. This paper presents improved automatic menu navigation and integration of tools such as MaTeLo in the Black Box Testing (BBT) system for automated functional verification of DTV/STB devices. Specifically, the method for accurate determination of the source of an error in the case of failing test is given. In addition, the mechanism of...
Integrated Modular Avionics (IMA) software testing is critical for the quality of the IMA system. The software testing environment (STE) employed within the federated avionics is not suitable for the IMA software due to the increased complexity and dynamic reconfiguration in the highly integrated software architecture. It creates new challenges for the software testing and verification of the IMA...
Given the popularity of location-based services today and the advances in indoor localization, we find it curious that the systems are rarely deployed for public use. Having implemented a RF-fingerprint-based location system at the Taipei World Trade Center (TWTC), we are able to examine quantitatively the system performance. In that, the 50-percentile localization error is approximately 6.2m. This...
Exocetus Development, LLC of Anchorage Alaska has recently purchased the assets, IP, and manufacturing technology for the ANT Littoral Glider [now called the Coastal Glider] developed with ONR funding during the past 6 years. The glider technology developed under this program is now being modified to be more readily deployed in near coastal scientific applications. The glider is capable of self-ballasting...
A simulator was designed for troubleshooting the hovering AUV Mola Mola, operated by the National Institute for Undersea Science and Technology. The SeaBED class Mola Mola had suffered several failures in its last 2010 cruise and two 2011 cruises. Through simulator testing, these failures were found to be a single power system issue that manifested itself in three very different ways as it worsened...
As a result of the ubiquity and popularity of smart phones, the number of third party mobile applications is explosively growing. With the increasing demands of users for new dependable applications, novel software engineering techniques and tools geared towards the mobile platform are required to support developers in their program comprehension and analysis tasks. In this paper, we propose a reverse...
Fuzz used the concept of black-box testing, is critical to an auto vulnerability mining method, there is blindness in this method. This paper presents a semi-automation model of vulnerability mining based on local fuzz with data stream control and hidden debug technology, the practice shows us that this algorithm makes the fuzz much faster and correct.
Effective testing can develop quality software with higher productivity at a lower cost. Redundancy in the test suite increases the execution cost and consumes scarce project resources. Due to time and resource constraints in testing, test suite reduction techniques are required to remove those redundant test cases from the test suite. Since Weighted Set Covering Techniques can be used to resolve...
World Wide Web has grown-up exponentially during the last decade and subsequently web log files contain tremendous information about the user traffic and behavior. The sequence length of visitors, the depth to which a user visits a website, can be analyzed to study the behavior of visitors and it may vary depending on the entry point to the website. A statistical analysis was done to see the differences...
The main intention of this research is to evaluate the usefulness of CAPD eBook, which is an interactive multimedia application. This application is developed by integrating various multimedia elements such as text, animation, graphics, and audio. CAPD eBook is designated for renal patients who undergo CAPD as their dialysis method. This application is used to assist the patients in their CAPD training...
Automatically creating test cases from statistical models of web application usage is an effective approach to generating test cases that represent actual usage. The models are typically generated from all collected user sessions. In this paper, we consider how grouping the user sessions -- specifically by the user's privilege -- creates different statistical models and the testing implications of...
The main intention of this research is to evaluate the effectiveness of IQRA' learning by using multimedia application for children between the age of 5 to 8 years. The researchers have adapted the Principles of Persuasive Technology into this application to increase its effectiveness. Persuasive Technology refers to any interactive computing system designed to change people's attribute or behavior...
L-3 Communications Electron Technologies, Inc. (L-3 ETI) is producing flight qualified L-band linearized traveling-wave tube amplifiers (LTWTAs) for space communication and navigation systems with demonstrated efficiencies to 65%. Thermal test data for a flight set of LTWTAs generating 140 watts of output power at 1540 MHz for a narrow-band (8 MHz) application is presented. Average DC conversion efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.