5,604 Hits in 4.3 sec

Testing for imperfect integration of legacy software components

D. Flater
Proceedings First Asia-Pacific Conference on Quality Software  
While the legacy components themselves are already well-tested, imperfect integration can introduce subtle faults that are outside the prime target area of generic integration and system tests.  ...  One might postulate that focused testing for integration faults could improve the yield of detected faults when used as part of a balanced integration and system test effort.  ...  We express our thanks to Hui-Min Huang and other members of the Intelligent Systems Division for providing and supporting the software that we used as a test subject.  ... 
doi:10.1109/apaq.2000.883789 dblp:conf/apaqs/Flater00 fatcat:ivrhazcls5ebphhrploatn6iee

A novel approach to entirely integrate Virtual Test into test development flow

Ping Lu, D. Glaser, G. Uygur, K. Helmreich
2009 2009 Design, Automation & Test in Europe Conference & Exhibition  
The focus of this paper is to analyze and address the major issues that still prevent the application of Virtual Test (VT) from day-to-day's practice.  ...  In this paper, we present an open architecture Virtual Test Environment (VTE) which can be easily integrated into various modularized Automatic Test Systems (ATS) compliant to Open Standard Architecture  ...  legacy ATE systems and their different data formats, chances are very small to construct a platformindependent VTE module which can be easily integrated into different test systems.  ... 
doi:10.1109/date.2009.5090772 dblp:conf/date/LuGUH09 fatcat:r2mpw4jgqbchhchzsqkpkjyike


Harmeet Kaur .
2015 International Journal of Research in Engineering and Technology  
The paper highlights various elements of legacy program complexity which further can be taken in account for further program development.  ...  problems and to improve the quality of software.  ...  Regardless of an abundance of testing tools that assert to grab bugs, the complexity of software makes security imperfections and errors unavoidable and progressively normal.  ... 
doi:10.15623/ijret.2015.0403085 fatcat:tvmh46xzjvd6fkvcwhuakqvl4a

Challenges in migrating legacy software systems to the cloud an empirical study [article]

Mahdi Fahmideh, Farhad Daneshgar, Ghassan Beydoun, Fethi Rabhi
2020 arXiv   pre-print
The main goal of this article is to identify the most important challenging activities for moving legacy systems to cloud platforms from a perspective of reengineering process.  ...  We used a Web-based survey questionnaire to collect data and analysed them using SPSS Sample T-Test.  ...  Once the assumptions of One Sample T-Test were satisfied, the test was applied for statistical analysis using SPSS software [71] . Findings.  ... 
arXiv:2004.10724v1 fatcat:3nruizwrdrf3fgslrr4jmc7mh4

Cloud Migration Process A Survey Evaluation Framework and Open Challenges [article]

Mahdi Fahmideh, Graham Low, Ghassan Beydoun, Farhad Daneshgar
2020 arXiv   pre-print
The survey distills the state of the art in cloud migration research and makes a rich inventory of important activities, recommendations, techniques, and concerns that are commonly involved in the migration  ...  To this aim, an evaluation framework is proposed and used to analyse and compare existing approaches for highlighting their features, similarities, and key differences.  ...  ACKNOWLEDGMENTS The authors would like to thank Professor Fethi Rabhi for his constructive comments and suggestions on improving this paper.  ... 
arXiv:2004.10725v1 fatcat:yfgs7opcyvcuzj47rdmoxdjwtm

Reverse engineering

Hausi A. Müller, Jens H. Jahnke, Dennis B. Smith, Margaret-Anne Storey, Scott R. Tilley, Kenny Wong
2000 Proceedings of the conference on The future of Software engineering - ICSE '00  
In this role he has integrated a number of techniques for modemizing legacy systems from both a ~-.hnical and business perspective. Dr.  ...  Investigate infrastructure, methods, and tools for continuous program understanding to support the entire evolution of a software system from the early design stages to the long-term legacy stages.  ...  While there is a relatively healthy market for unit-testing tools, code debugging utilities, and integrated development environments, the market for reverse engineering tools remains quite limited.  ... 
doi:10.1145/336512.336526 dblp:conf/icse/MullerJSSTW00 fatcat:235pls4exfesrlchloysfppwma

A schooling on their implications for software engineering [trends]

A. Miller
2001 IEEE potentials  
The classical waterfall model of systems analysis, software requirements specification, analysis, preliminary design, detailed code and unit test, integration and test, and software quality test with on-going  ...  A second type of incorporated software is a "legacy system."  ...  These included accreditation for university software engineering programs to the certification of individual software engineers similar to the Professional Engineer certification that the State of Texas  ... 
doi:10.1109/45.890083 fatcat:j5k4dswxwzguhh3eljefra2hcu

The road to trustworthy systems

Gernot Heiser, June Andronick, Kevin Elphinstone, Gerwin Klein, Ihor Kuz, Leonid Ryzhyk
2010 Proceedings of the fifth ACM workshop on Scalable trusted computing - STC '10  
In this paper we describe NICTA's research agenda for achieving true trustworthiness in systems. We report on what has been achieved to date, and what our plans are for the next 3-5 years.  ...  of Excellence program.  ...  Government is authorised to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1145/1867635.1867638 fatcat:2c4qtcehivb7jgi3aj5s2k2v7a

LTE Spectrum Sharing Research Testbed

Vuk Marojevic, Randall Nealy, Jeffrey H. Reed
2017 Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization - WiNTECH '17  
The modular testbed integrates general-purpose software-defined radio hardware, LTE-specific test equipment, RF components, free open-source and commercial LTE software, a configurable RF network and recorded  ...  Our testbed provides an integrated research tool for investigating these and other research problems; it allows analyzing the severity of the problem, designing and rapidly prototyping solutions, and assessing  ...  Our testbed is unique in its components and how they are integrated.  ... 
doi:10.1145/3131473.3131484 dblp:conf/mobicom/MarojevicNR17 fatcat:ctu4mqtysff3bcmufbxgqvmh6q

Assisted Emulation for Legacy Executables

Kam Woods, Geoffrey Brown
2010 International Journal of Digital Curation  
Emulation is frequently discussed as a failsafe preservation strategy for born-digital documents that depend on contemporaneous software for access (Rothenberg, 2000).  ...  We describe software designed to minimize dependence on this knowledge by offering automated configuration and execution of emulated environments.  ...  By automating both the process of configuring the virtual machine and of installing legacy software, we remove basic impediments to access that current and future users might face when browsing these types  ... 
doi:10.2218/ijdc.v5i1.150 fatcat:lopsfxqf5jfvtnxaaxqivx7xqm

Utilization of synergetic human-machine clouds: a big data cleaning case

Deniz Iren, Gokhan Kul, Semih Bilgen
2014 Proceedings of the 1st International Workshop on CrowdSourcing in Software Engineering - CSI-SE 2014  
In this paper we present a case in which we developed a hybrid, throw-away prototype software system to solve a big data cleaning problem in which we corrected and normalized a data set of 53,822 academic  ...  The first step in our solution consists of utilization of external DOI query web services to label the records with matching DOIs.  ...  This research was funded by METU Research Project Funding Office (METU BAP) and conducted by Integrated Information Systems (IIS) project personnel of METU Computer Center.  ... 
doi:10.1145/2593728.2593733 dblp:conf/icse/IrenKB14 fatcat:yd4zclelwneipj7np5sq5itghy

Game theory for cyber security

Sajjan Shiva, Sankardas Roy, Dipankar Dasgupta
2010 Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research - CSIIRW '10  
We focus on one of our recently proposed game models, namely imperfect information stochastic game.  ...  While they are effective in solving the particular problems they are designed for, they generally fail to respond well in a dynamically changing scenario.  ...  As an example, we can envision wrapping a self-testing software module over individual components of the system with a tradeoff among the cost, security, and performance.  ... 
doi:10.1145/1852666.1852704 dblp:conf/csiirw/ShivaRD10 fatcat:actm76risvap3akyrzcac3ftq4

A Model-Driven Approach to Reengineering Processes in Cloud Computing [article]

Mahdi Fahmideh, John Grundy, Ghassan Beydoun, Didar Zowghi, Willy Susilo, Davoud Mougouei
2021 arXiv   pre-print
The reengineering process of large data-intensive legacy software applications to cloud platforms involves different interrelated activities.  ...  As such, the effective interoperability and tailoring of these methods become problematic due to the lack of integrated and consistent standard models.  ...  Finally, the work of Professor John Grundy was supported by the ARC Laureate Fellowship under Grant FL190100035.  ... 
arXiv:2109.11896v2 fatcat:entkxipsgfalfabkw4koikogmy

On migration to Perpetual Enterprise System [article]

Manuel Tomas Carrasco Benitez
2022 arXiv   pre-print
This document describes a pragmatic approach on how to migrate an organisation computer system towards a new system that could evolve forever, addresses the whole organisation and it is integrated.  ...  Governance aspects are as important, if not more, than purely technical IT aspects: human resources, call for tenders, and similar. Migration implies that one is not starting from a green field.  ...  Machines require software interfaces to integrate. Integration smoothness depends on interface refinements.  ... 
arXiv:2104.04844v3 fatcat:n3jfu5qk6fej7hkhz5twjax6ti

Advanced steps with standardized languages in the re-engineering process

Anna Medve
2008 Computer Standards & Interfaces  
Formal methods can be used at all stages of a software development project.  ...  The new components can be very well documented and integrated into the existing system in a manner that even the stakeholders get involved in it.  ...  Katalin Tarnay, for their inspiring research work and for their comments  ... 
doi:10.1016/j.csi.2007.09.004 fatcat:jrxtefn6vvgcbmg2pkzrrvle2m
« Previous Showing results 1 — 15 out of 5,604 results