Computer Science: Recent submissions
Now showing items 441-460 of 549
-
Streaming multicast video over software-defined networks
(IEEE, 2014)Many of the video streaming applications in today's Internet involve the distribution of content from a CDN source to a large population of interested clients. However, widespread support of IP multicast is unavailable due ... -
Alto sunuculu, eş görevli ağlarda dosya paylaşımı
(IEEE, 2012)In current Internet, the most significant and the growing promotion rate of the network resources usage is due to the Peer to Peer(P2P) applications. These studies show us that the main traffic type, that Internet Service ... -
Analysis of energy harvesting for green cognitive radio networks
(IEEE, 2014)This paper develops a Markov Chain analysis framework for an RF energy harvesting cognitive radio network where the secondary system users are furnished with finite-sized batteries. We consider a network where the only ... -
Hierarchically constrained 3D hand pose estimation using regression forests from single frame depth data
(Elsevier, 2014-12-01)The emergence of inexpensive 2.5D depth cameras has enabled the extraction of the articulated human body pose. However, human hand skeleton extraction still stays as a challenging problem since the hand contains as many ... -
Variability viewpoint for introducing variability in software architecture viewpoints
(ACM, 2012)Variability is the ability of a software system to be changed for a specific context, in a preplanned manner. As such, to facilitate the instantiation of a software architecture the variability concern needs to be explicitly ... -
Utilizing clone detection for domain analysis of simulation systems
(IEEE, 2012)This paper presents a case study on utilizing a clone detection technique for deriving commonalities among four different industrial simulation software systems. We have examined cloning both within each system and across ... -
Integrated static code analysis and runtime verification
(Wiley, 2015-10)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, these tools usually generate a very large number of alerts, some of which are subject to false ... -
Trust-based fusion of classifiers for static code analysis
(IEEE, 2014)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ... -
Effort estimation for architectural refactoring to introduce module isolation
(Springer, 2014)The decomposition of software architecture into modular units is driven by both functional and quality concerns. Dependability and security are among quality concerns that require a software to be decomposed into separate ... -
Rumadai: A plug-in to record and replay client-side events of web sites with dynamic content
(IEEE, 2012)Reproducing user events when testing web pages is challenging because of the dynamic nature of the web content and potential dependency on third party content providers. We present Rumadai, a Visual Studio plug-in, that ... -
Guiding architects in selecting architectural evolution alternatives
(Springer Science+Business Media, 2011)Although there exist methods and tools to support architecture evolution, the derivation and evaluation of alternative evolution paths are realized manually. In this paper, we introduce an approach, where architecture ... -
Spectrum-based fault localization for diagnosing concurrency faults
(Springer Science+Business Media, 2013)Concurrency faults are activated by specific thread interleavings at runtime. Traditional fault localization techniques and static analysis fall short to diagnose these faults efficiently. Existing dynamic fault-localization ... -
Improving models for model-based testing based on exploratory testing
(IEEE, 2014)Model-based testing facilitates automatic generation of test cases by means of models of the system under test. Correctness and completeness of these models determine the effectiveness of the generated test cases. Critical ... -
Runtime verification of component-based embedded software
(Springer, 2011)To deal with increasing size and complexity, component-based software development has been employed in embedded systems. Due to several faults, components can make wrong assumptions about the working mode of the system and ... -
Combining model-based and risk-based testing for effective test case generation
(IEEE, 2015)Model-based testing employs models of the system under test to automatically generate test cases. In this paper, we propose an iterative approach, in which these models are refined based on the principles of risk-based ... -
Defining architectural viewpoints for quality concerns
(Springer Science+Business Media, 2011)A common practice in software architecture design is to apply architectural views to model the design decisions for the various stakeholder concerns. When dealing with quality concerns, however, it is more difficult to ... -
DAPNA: an architectural framework for data processing networks
(Springer Science+Business Media, 2013)A data processing network is as a set of (software) components connected through communication channels to apply a series of operations on data. Realization and maintenance of large-scale data processing networks necessitate ... -
Automated classification of static code analysis alerts: a case study
(IEEE, 2013)Static code analysis tools automatically generate alerts for potential software faults that can lead to failures. However, developers are usually exposed to a large number of alerts. Moreover, some of these alerts are ... -
An approach for detecting inconsistencies between behavioral models of the software architecture and the code
(IEEE, 2012)In practice, inconsistencies between architectural documentation and the code might arise due to improper implementation of the architecture or the separate, uncontrolled evolution of the code. Several approaches have been ... -
Adaptive domain-specific service monitoring
(Springer Science+Business Media, 2014)We propose an adaptive and domain-specific service monitoring approach to detect partner service errors in a cost-effective manner. Hereby, we not only consider generic errors such as file not found or connection timed ...
Share this page