Search
Now showing items 21-30 of 43
Automated refinement of models for model-based testing using exploratory testing
(Springer International Publishing, 2017-09)
Model-based testing relies on models of the system under test to automatically generate test cases. Consequently, the effectiveness of the generated test cases depends on models. In general, these models are created manually, ...
Sequential decision making based on emergent emotion for a humanoid robot
(IEEE, 2017)
Certain emotions and moods can be manifestations of complex and costly neural computations that our brain wants to avoid. Instead of reaching an optimal decision based on the facts, we find it often easier and sometimes ...
Location attestation and access control for mobile devices using GeoXACML
(Elsevier, 2017-02)
Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)
Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ...
Impact of education and experience level on the effectiveness of exploratory testing: an industrial case study
(IEEE, 2017)
Exploratory Testing (ET) is a widely applied approach in practice. This approach relies on the knowledge and experience of test engineers and technicians who perform ET. Hence, we aimed at evaluating the impact of education ...
Generating runtime verification specifications based on static code analysis alerts
(ACM, 2017)
Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ...
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)
With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ...
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
An introduction to the pocket negotiator: a general purpose negotiation support system
(Springer International Publishing, 2017)
The Pocket Negotiator (PN) is a negotiation support system developed at TU Delft as a tool for supporting people in bilateral negotiations over multi-issue negotiation problems in arbitrary domains. Users are supported in ...
FPGA implementation of a dense optical flow algorithm using altera openCL SDK
(Springer International Publishing, 2017)
FPGA acceleration of compute-intensive algorithms is usually not regarded feasible because of the long Verilog or VHDL RTL design efforts they require. Data-parallel algorithms have an alternative platform for acceleration, ...
Share this page