Search
Now showing items 51-60 of 79
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)
Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ...
Impact of education and experience level on the effectiveness of exploratory testing: an industrial case study
(IEEE, 2017)
Exploratory Testing (ET) is a widely applied approach in practice. This approach relies on the knowledge and experience of test engineers and technicians who perform ET. Hence, we aimed at evaluating the impact of education ...
Generating runtime verification specifications based on static code analysis alerts
(ACM, 2017)
Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ...
Risk-driven model-based testing of washing machine software: an industrial case study
(IEEE, 2018-07-16)
We previously introduced an approach for risk-driven model-based testing. In that approach, test models are represented in the form of Markov chains and test case generation is steered by state transition probabilities. ...
ADVISOR: An adjustable framework for test oracle automation of visual output systems
(IEEE, 2020-09)
Test oracles differentiate between the correct and incorrect system behavior. Automation of test oracles for visual output systems mainly involves image comparison, where a snapshot of the output is compared with respect ...
On the use of evolutionary coupling for software architecture recovery
(IEEE, 2021)
Software architecture documentation can be partially obtained automatically by means of software architecture recovery tools. These tools mainly cluster software modules to provide a high level structural organization of ...
Automated defect prioritization based on defects resolved at various project periods
(Elsevier, 2021-09)
Defect prioritization is mainly a manual and error-prone task in the current state-of-the-practice. We evaluated the effectiveness of an automated approach that employs supervised machine learning. We used two alternative ...
Dynamic filtering and prioritization of static code analysis alerts
(IEEE, 2021)
We propose an approach for filtering and prioritizing static code analysis alerts while these alerts are being reviewed by the developer. We construct a Prolog knowledge base that captures the data flow information in the ...
Data model extension impact analysis
(IEEE, 2021)
Relational database schemas are subject to change. For instance, columns of a table can be modified, deleted or extended. These changes have an impact on the source code that utilizes the corresponding table. They also ...
Using artificial neural networks to provide guidance in extending PL/SQL programs
(Springer, 2022-12)
Extending legacy systems with new objects for contemporary functionality or technology can lead to architecture erosion. Misplacement of these objects gradually hampers the modular structure, of which documentation is ...
Share this page