785 Hits in 6.1 sec

Evaluation of Software Product Line Test Case Prioritization Technique

Muhammad Sahak, Shahliza Abd Halim, Dayang Norhayati Abang Jawawi, Mohd Adham Isa
2017 International Journal on Advanced Science, Engineering and Information Technology  
The discussion highlights the lack of technique for scalability issue in SPL with most of the work is on academia setting but not on industrial practices.  ...  However, due to time and space complexities, testing all products is not feasible, and SPL testing is proven to be difficult due to a combinatorial explosion of the number of products to be considered.  ...  The central element of focus is on the need of practical solutions to test a large number of SPL. 2) Content: SHP testing level is a system testing as it involves a complete test of the system and does  ... 
doi:10.18517/ijaseit.7.4-2.3403 fatcat:bvfmrkjqdjfv3gkbneb3jozkxi

Exploring variability-aware execution for testing plugin-based web applications

Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen
2014 Proceedings of the 36th International Conference on Software Engineering - ICSE 2014  
It is highly challenging to detect plugin conflicts due to the exponential explosion of the combinations of plugins (i.e., configurations).  ...  Only when encountering values that are different depending on specific configurations will the execution split to run for each of them.  ...  However, executing the test cases for plugins is challenging due to the combinatorial explosion of the number of plugin configurations, which in practice is often compensated only by manual and ad-hoc  ... 
doi:10.1145/2568225.2568300 dblp:conf/icse/NguyenKN14 fatcat:3ugdlttjzbe7fefdlgku4ybf7q

Combinatorial Interaction Testing of Software Product Lines: A Mapping Study

Mohd Zanes Sahid, Abu Bakar Md Sultan, Abdul Azim Abdul Ghani, Salmi Baharom
2016 Journal of Computer Science  
This paper reports a Systematic Mapping Study (SMS) of relevant primary studies as the evidence on the application of Combinatorial Interaction Testing (CIT) for SPL.  ...  By following the systematic mapping study guidelines, we have selected and filtered 44 primary studies for review.  ...  The authors also wish to thank Universiti Putra Malaysia (UPM) which provided the facilities and appropriate environments for carrying out this study and to the Software Engineering research group of FSKTM  ... 
doi:10.3844/jcssp.2016.379.398 fatcat:kdc2r5kkiveqho3ycwcdmmf77u

Modeling and Analyzing Wireless Sensor Networks with VeriSensor: An Integrated Workflow [chapter]

Yann Ben Maissa, Fabrice Kordon, Salma Mouline, Yann Thierry-Mieg
2013 Lecture Notes in Computer Science  
We present the language, its translation, show how they work on a simple case study, and illustrate how several metrics and properties relevant to the domain can be evaluated.  ...  Formal verification helps to obtain WSN reliability, but usually requires a high expertise, which limits its adoption in industry.  ...  Since WSNs are highly time driven and complex, we need a tool supporting a large amount of concurrency, some notion of time constraints and able to tackle combinatorial explosion.  ... 
doi:10.1007/978-3-642-40465-8_2 fatcat:uqlrfmb66vgtreppf4jpnpzesa

Command Fusion Based Mobile Robot Tracking by Distributed Vision System of Robotic Space

Taeseok Jin
2014 International Journal of Control and Automation  
In order to achieve these goals, we suggest a method for representing, tracking and human following by fusing distributed multiple vision systems in Robotic Space.  ...  The Robotic Space is able of obtaining information from the observed world where many intelligent sensing and tracking devices, such as computers and multi sensors, are distributed.  ...  because systems implementing multiple hypotheses and multiple targets suffer from a combinatorial explosion, rendering those approaches computationally very expensive for real-time object tracking [7  ... 
doi:10.14257/ijca.2014.7.5.23 fatcat:npba54roh5aj7ouym62zvhvha4

From Model Driven Engineering to Verification Driven Engineering [chapter]

Fabrice Kordon, Jérôme Hugues, Xavier Renault
2008 Lecture Notes in Computer Science  
There is a conceptual gap to fill to know "what" to do with models. We propose to switch from MDE to VDE: Verification-Driven Engineering, so that the user knows how to model a system to analyze it.  ...  The definition and construction of complex computer-based systems require not just software engineering knowledge, but also many other domainspecific techniques to ensure many system's functional and non-functional  ...  Besides, it is theoretically limited by the combinatorial explosion and can mainly address finite systems.  ... 
doi:10.1007/978-3-540-87785-1_34 fatcat:tofm3g6sq5gxvjf6bokvobar5e

Robot Tracking Using the Particle Filter and SOM in Networked Robotic Space [chapter]

TaeSeok Jin
2008 Motion Planning  
objects because systems implementing multiple hypotheses and multiple targets suffer from a combinatorial explosion, rendering those approaches computationally very expensive for real-time object tracking  ...  Introduction Detection of moving objects has been utilized in industrial robotic systems, for example, in the recognition and monitoring of unmanned systems that also require compression of moving images  ... 
doi:10.5772/6013 fatcat:ngclwowd35dbvmrozshzrtpkni

Design validation of embedded dependable systems

A. Bondavalli, A. Fantechi, D. Latella, L. Simoncini
2001 IEEE Micro  
Computer engineers need to interact with other engineers (such as mechanical or chemical), system users, and society to understand their needs.  ...  A common characteristic of such embedded systems is their increasing complexity in intrinsic terms-distribution management, redundancy, functionality layering, and so on-and of their in-the-field operation-environmental  ...  Tool support is necessary for a fully industrial-strength process, and designers need improved inte-gration of formal methods with other software engineering practices.  ... 
doi:10.1109/40.958699 fatcat:wghik64werc27lhq3tyumg2xn4

Software-Enabled Investigation in Metaheuristic Power Grid Optimization

Stephan Hutterer, Andreas Beham, Michael Affenzeller, Franz Auinger, Stefan Wagner
2014 IEEE Transactions on Industrial Informatics  
Further, interprocess-communication is discussed that enables the interaction of optimization algorithms and simulation problems, and a practical show case demonstrates the framework's application to real  ...  HeuristicLab is demonstrated as a framework for optimization, which facilitates usage and development of optimization algorithms in a way that is attractive not only to computer scientists.  ...  ACKNOWLEDGMENT This project was supported by the program Regionale Wettbewerbsfähigkeit OÖ 2010-2013, which is financed by the European Regional Development Fund and the Government of Upper Austria.  ... 
doi:10.1109/tii.2013.2276525 fatcat:bqgz62f7zjetta325b2rzuxm2u

Closed-loop system modeling, validation, and verification

Sebastian Preuse, Hans-Christian Lapp, Hans-Michael Hanisch
2012 Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012)  
Because of this, there are high customer demands concerning safety and correctness of software.  ...  This contribution therfore approaches this problem and encourages the application of closed-loop modeling, validation, and verification methods.  ...  The synthesis algorithms need correct models of system and specification, which is not easy to capture in industrial context [7, 26] .  ... 
doi:10.1109/etfa.2012.6489679 dblp:conf/etfa/PreusseLH12 fatcat:rbujlk2mvzd3tlxwatallaauc4

Estimating the number of remaining links in traceability recovery

Davide Falessi, Massimiliano Di Penta, Gerardo Canfora, Giovanni Cantone
2016 Empirical Software Engineering  
and Technology, China; University of Texas at Dallas, 1 3 4 5 6 29 41 64 76 98 xv Combinatorial Explosion: A Study of Industrial Needs and Practices for Analyzing Highly Configurable  ...  . . . . . . . 17 AutoConfig: Automatic Configuration Tuning for Distributed Message Systems Liang Bao, Xin Liu, Ziheng Xu, and Baoyin Fang -Xidian University, China; University of California at Davis,  ... 
doi:10.1007/s10664-016-9460-6 fatcat:zwg7g4zphrb5tfro767hu2oc5m

Estimation-based metaheuristics for stochastic combinatorial optimization

Prasanna Balaprakash
2010 ACM SIGEVOlution  
Mauro Birattari, who played a crucial role for helping me tackle a challenging research that lies behind this thesis. He has been a very supportive mentor.  ...  What I learned from him is probably just a drop-he has an ocean to offer. For that matter, working under him for a period of five years is too short and I guess even a life time is not sufficient!  ...  Due to the enormous significance of combinatorial optimization problems for the academic as well as the industrial world, the field of the design, implementation, and study of metaheuristics is a very  ... 
doi:10.1145/1811155.1811157 fatcat:c2yh7m2hpfh6pajj3n7izjlpwy

Recent advances in high-throughput superconductivity research

Jie Yuan, Valentin Stanev, Chen Gao, Ichiro Takeuchi, Kui Jin
2019 Superconductors Science and Technology  
High-throughput methods for rapid screening and optimization of materials have demonstrated their utility for accelerating research in bioinformatics and pharmaceutical industry, yet remain rare in quantum  ...  Superconducting materials find applications in a rapidly growing number of technological areas, and searching for novel superconductors continues to be a major scientific task.  ...  Acknowledgments The authors would like to thank M Y Qin, X Zhang, X Y Jiang, G He, Z P Feng, D Li, R Z Zhang, and J S Zhang for the help during the manuscript preparation.  ... 
doi:10.1088/1361-6668/ab51b1 fatcat:bl4qeg2vzzgn3byi44f5dqiiqa

Networking of Internet of UAVs: Challenges and Intelligent Approaches [article]

Peng Yang, Xianbin Cao, Tony Q. S. Quek, Dapeng Oliver Wu
2021 arXiv   pre-print
This article elaborately analyzes these challenges and expounds on the corresponding intelligent approaches to tackle the I-UAV networking issue.  ...  Each category of networking poses emerging challenges which have severe effects on the safe and efficient accomplishment of I-UAV missions.  ...  In practical application scenarios, UAVs can flexibly fly in 3D airspace; thus, increasing attention has been paid to study the case of I-UAV networking in 3D airspace.  ... 
arXiv:2111.07078v1 fatcat:yqnuhkoxxrcn3czqeurbht7cqy

Leveraging Machine-Learning for D2D Communications in 5G/Beyond 5G Networks

Sherief Hashima, Basem M. ElHalawany, Kohei Hatano, Kaishun Wu, Ehab Mahmoud Mohamed
2021 Electronics  
This case study will put emphasis on the high potency of using ML solutions over using the conventional non-ML based methods for highly improving the average throughput performance of mmWave NDS.  ...  Device-to-device (D2D) communication is a promising paradigm for the fifth generation (5G) and beyond 5G (B5G) networks.  ...  All authors have read and agreed to the published version of the manuscript. Funding: This research was funded and supported by JSPS KAKENHI Grant Numbers JP19H04174, Japan.  ... 
doi:10.3390/electronics10020169 fatcat:2l764bczknhf7ctlmbsyllllme
« Previous Showing results 1 — 15 out of 785 results