Filters








63,319 Hits in 8.2 sec

Using Constraint Programming for the Automatic Detection of Conflicts in Quality Requirements

Antonio Ruiz Cortés, Amador Durán, Rafael Corchuelo, Miguel Toro
2002 Workshop em Engenharia de Requisitos  
The main benefit of our approach is that the same conceptual model for requirements negotiation can be used during all software development process, instead of using different models in different phases  ...  Unfortunately, only a few have partial automatic support. In this paper, we revisit one of the most mature models, Boehm's Win-Win model.  ...  pressed as Ì ½¼, if a developer training cost ( Ì ) under 10% of total development Using Constraint Programming for the Automatic Detection of Conflicts 303 cost ( Figure 5 : 5 Figure 5: Graphical interpretation  ... 
dblp:conf/wer/CortesDCT02 fatcat:xpyz76ryarbn7mpboodbuyq6li

Research on Detection of Business Constraints based on AOP

Ning Chen
2015 International Journal of u- and e- Service, Science and Technology  
Furthermore, combined AOP with first-order logic language, a schema on detection of the business constraints in requirement analysis is presented, which is simple and practicable, thus making optimal designs  ...  Aiming at the deficiency of magnitude of business constraints and high complexity, a constraints detection method is proposed.  ...  This paper is a revised and expanded version of a paper entitled "Schema design on detection of business constraints based on AOP" presented at The 6th International Conference on Multimedia, Computer  ... 
doi:10.14257/ijunesst.2015.8.2.24 fatcat:o3fzwogscvcwxcpekeeeagxahe

A Systematic Framework Enabling Automatic Conflict Detection and Explanation in Cloud Service Selection for Enterprises

Chunqing Chen, Shixing Yan, Guopeng Zhao, Bu Sung Lee, Sharad Singhal
2012 2012 IEEE Fifth International Conference on Cloud Computing  
In addition, a major concern for these enterprises is ensuring compliance with their policies on the use of cloud services.  ...  In addition, a major concern for these enterprises is ensuring compliance with their policies on the use of cloud services.  ...  We remark that the SMT techniques used in Section IV have strong strengths of detecting conflicts, although they have inadequate support for finding all or optimal solutions.  ... 
doi:10.1109/cloud.2012.95 dblp:conf/IEEEcloud/ChenYZLS12 fatcat:jlqzkjralvhr7fkeqhvhuljila

Towards end-user adaptable model versioning: The By-Example Operation Recorder

Petra Broschy, Philip Langer, Martina Seidl, Manuel Wimmer
2009 2009 ICSE Workshop on Comparison and Versioning of Software Models  
For the realization of language-independent, effective, and user-friendly model versioning systems, generic and efficient conflict detection is essential for correct and complete identification of conflicts  ...  Consequently, conflicts are not found or conflicts are wrongly indicated. To improve the quality of conflict detection, language-specific features have to be added.  ...  This is especially needed when domain specific modeling languages are used. On the other hand, language-specific knowledge is required for improving the quality of conflict detection.  ... 
doi:10.1109/cvsm.2009.5071723 fatcat:dq3nwh72ybahjj2y3xjitrox2i

Semantic Streams: A Framework for Composable Semantic Interpretation of Sensor Data [chapter]

Kamin Whitehouse, Feng Zhao, Jie Liu
2006 Lecture Notes in Computer Science  
For example, instead of querying raw magnetometer data, the user queries whether vehicles are cars or trucks; the system decides which sensor data and which operations to use to infer the type of vehicle  ...  The user can also place constraints on values such as the the amount of energy consumed or the confidence with which the vehicles are classified.  ...  Acknowledgements Special thanks to Prabal Dutta and Elaine Cheong for help with the parking garage deployment, and to Nithya Ramanathan for help with the composition algorithm.  ... 
doi:10.1007/11669463_4 fatcat:ntz6ykmtxbdenannno3t3ycove

Automatic programming with semantic streams

Kamin Whitehouse, Feng Zhao, Jie Liu
2005 Proceedings of the 3rd international conference on Embedded networked sensor systems - SenSys '05  
For example, a Vehicle Detector could be described as a service that uses a magnetometer to detect vehicles and creates an event stream with the time and location in which the vehicles are detected. service  ...  This allows the query processor to automatically resolve resource conflicts such as when two applications require different sampling rates from the same sensor.  ... 
doi:10.1145/1098918.1098959 dblp:conf/sensys/WhitehouseZL05 fatcat:ngyxzyzd7ncvjhgpwyu77ga3mm

Resolving Data Mismatches in End-User Compositions [chapter]

Perla Velasco-Elizondo, Vishal Dwivedi, David Garlan, Bradley Schmerl, José Maria Fernandes
2013 Lecture Notes in Computer Science  
Specifically, it uses architectural abstractions to automatically detect different types of data mismatches, model-generation techniques to fix those mismatches, and utility theory to decide the best fix  ...  In this paper we present an approach that eliminates this effort by automating the detection and resolution of data mismatches.  ...  in development of the SWiFT tool and the integration of the engines into it respectively.  ... 
doi:10.1007/978-3-642-38706-7_10 fatcat:wzeadspglrfg3lmk5yu56574tq

Building Verifiable Sensing Applications Through Temporal Logic Specification [chapter]

Asad Awan, Ahmed Sameh, Suresh Jagannathan, Ananth Grama
2007 Lecture Notes in Computer Science  
Unfortunately, programmers are often forced to understand the mechanisms used by these implementations in order to optimize resource utilization and performance, and to ensure application requirements  ...  To address these issues, we propose a novel and high-level programming model that directly exposes control over sensor network behavior using temporal logic specifications, in conjunction with a set of  ...  For the entire application only 27 invariants are used, in all. The interactions of the components of the generated program are illustrated in Figure 1 .  ... 
doi:10.1007/978-3-540-72584-8_157 fatcat:bzu4fxllvbhmngy3sg6zdxngmy

Barriers to systematic model transformation testing

Benoit Baudry, Sudipto Ghosh, Franck Fleurey, Robert France, Yves Le Traon, Jean-Marie Mottu
2010 Communications of the ACM  
These conflicts can in turn be used to track the error back to its source.  ...  Versioning of models can greatly benefit testing. It can be used to define an oracle that compares models and detects conflicts.  ...  Yves Le Traon is a professor at the University of Luxembourg in the CSC Research Unit and in the Security Reliability and Trust Research Center.  ... 
doi:10.1145/1743546.1743583 fatcat:24xfi65xqjccfjhj6lc4ztapey

A Local Search Approach for Binary Programming: Feasibility Search [chapter]

Samuel Souza Brito, Haroldo Gambini Santos, Bruno Henrique Miranda Santos
2014 Lecture Notes in Computer Science  
The method explicitly considers the structure of the problem as a conflict graph and uses a systematic neighbor generation procedure to jump from one feasible solution to another using chains of movements  ...  In this paper we propose a Local Search approach for NP-Hard problems expressed as binary programs. Our search method focuses on the fast production of feasible solutions.  ...  Since the construction of a full conflict graph may require the execution expensive techniques such as probing [17] , we opted for a simpler procedure: conflicts are detect by processing each constraint  ... 
doi:10.1007/978-3-319-07644-7_4 fatcat:ipxrzgpk2rawpkwhxn7hpslf2a

An Automatic Generation of Textual Pattern Rules for Digital Content Filters Proposal, Using Grammatical Evolution Genetic Programming

Vitor Basto-Fernandes, Iryna Yevseyeva, Rafael Z. Frantz, Carlos Grilo, Noemí Pérez Díaz, Michael Emmerich
2014 Procedia Technology - Elsevier  
The problem of cumbersome and continuous maintenance required to keep anti-spam filtering systems updated and running in an efficient way, is addressed in this work by the means of genetic programming  ...  grammatical evolution techniques, for automatic rules generation, having SpamAssassin anti-spam system and SpamAssassin public corpus as the references for the automatic filtering customization.  ...  Some research has been done in the area of automatic generation of regular expressions from examples [10] , including for spam detection purposes [11] .  ... 
doi:10.1016/j.protcy.2014.10.030 fatcat:jrulnrhfcbf35izot6dofzptfq

Rehabilitating equivalent mutants as static anomaly detectors in software artifacts

Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene, Paolo Vavassori
2015 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)  
In mutation analysis a mutant is said equivalent if it leaves the semantics of the program or the model unchanged.  ...  Equivalent mutants are usually seen as an inconvenience; for example, in software testing they cannot be detected by a test and, therefore, they fictitiously reduce the mutation score of a test suite.  ...  For instance, in [2] we used mutation analysis in order to assess the quality of a static quality process for specifications of the NuSMV model checker.  ... 
doi:10.1109/icstw.2015.7107452 dblp:conf/icst/ArcainiGRV15 fatcat:6gz5qoiz7rdyzbkfauylg37nvu

Real-time control of laboratory information system based on nonlinear programming

Fei Lv, Junfang Yu
2022 Nonlinear Engineering  
In order to study the real-time control research of laboratory information system based on nonlinear programming, by analyzing the role played by the laboratory information management system (LIMS) in  ...  quality management, and the relationship with quality control, put forward the functions that LIMS should set up and possess in the management of controlled documents, processing of inspection data, etc  ...  Treatment of lower detection limit Intermediate or final results of detection are often reported as the lower limit of detection, and the system can automatically process it according to the set limit.  ... 
doi:10.1515/nleng-2022-0035 fatcat:gqersmqxwvchvhd6azpfqw4gd4

Generic vs. Language-Specific Model Versioning

Petra Brosch, Philip Langer, Martina Seidl, Manuel Wimmer, Gerti Kappel
2012 Softwaretechnik-Trends  
In particular, we recap some lessons learned during the AMOR project and outline some open challenges for adaptable model versioning systems.  ...  In this paper, we discuss how to make a generic model versioning system language-specific by using various adaptation techniques.  ...  For instance, it seems to be more convenient to describe the reasons for language-specific conflicts for adapting a conflict detection mechanism in contrast to specifying an implementation for detecting  ... 
doi:10.1007/bf03323517 fatcat:du4szdkucjcu7fri26ig4l72ba

Approximately Propagation Complete and Conflict Propagating Constraint Encodings [chapter]

Rüdiger Ehlers, Francisco Palau Romero
2018 Lecture Notes in Computer Science  
The effective use of satisfiability (SAT) solvers requires problem encodings that make good use of the reasoning techniques employed in such solvers, such as unit propagation and clause learning.  ...  Propagation completeness has been proposed as a useful property for constraint encodings as it maximizes the utility of unit propagation.  ...  The authors want to thank Armin Biere for early feedback on the propagation quality notions defined in this work and Erika Abraham for proposing MaxSAT solvers as reasoning backend.  ... 
doi:10.1007/978-3-319-94144-8_2 fatcat:rsok4ehtgzgubj2kfqyeer34ni
« Previous Showing results 1 — 15 out of 63,319 results