Unit testing is a common practice where developers write test cases together with regular code. Automation frameworks such as JUnit for java have popularised this approach, allowing frequent and automatic execution of...
详细信息
ISBN:
(纸本)9781479960323
Unit testing is a common practice where developers write test cases together with regular code. Automation frameworks such as JUnit for java have popularised this approach, allowing frequent and automatic execution of unit test suites. Despite the appraisals of unit testing in practice, software engineering researchers see potential for improvement and investigate advanced techniques such as automated unit test generation. To align such research with the needs of practitioners, we conducted a survey amongst 225 software developers, covering different programminglanguages and 29 countries, using a global online marketing research platform. The survey responses confirm that unit testing is an important factor in software development, and suggest that there is indeed potential and need for research on automation of unit testing. The results help us to identify areas of importance on which further research will be necessary (e.g., maintenance of unit tests), and also provide insights into the suitability of online marketing research platforms for software engineering surveys.
A coarse representation of pictures and images can be created with sound. A series of such audio sounds can be used to represent an animation or a motion picture. In this project, images are divided into a 4x4 array o...
详细信息
ISBN:
(纸本)9781479959228
A coarse representation of pictures and images can be created with sound. A series of such audio sounds can be used to represent an animation or a motion picture. In this project, images are divided into a 4x4 array of "sound elements". The position of each sound element is assigned an audio sound, and the contents of each sound element is used to compute an audio intensity. The audio for each sound element is the audio sound for its position played at the computed audio intensity. The result of combining the audios for all sound elements is an audio representing the entire image. Algorithms for creating sounds and intensities will be described. Generating sounds for motion pictures using this technique will be discussed.
Since the conception of the java Modeling language (JML), many tools, applications and implementations have been done for its support. In this context, the users or developers who want to use JML seem surrounded by ma...
详细信息
ISBN:
(纸本)9781479942695
Since the conception of the java Modeling language (JML), many tools, applications and implementations have been done for its support. In this context, the users or developers who want to use JML seem surrounded by many of these tools, applications and so on. Looking for a common infrastructure and an independent language to provide a bridge between these tools and JML, it was developed an approach to embedded contracts in the eXtensible Markup language (XML) for java: XJML. XJML claims to offer you the ability to separate preconditions, posconditions and class invariants using JML and XML, and then execute Runtime Assertion Checking (RAC), Extended Static Checking (ESC) and/ or Full Static Program Verification (FSPV). In this work, we present some experiments and results with XJML and Runtime Assertion Checking, using one java class.
It is common knowledge that program comprehension takes up a substantial part of software development. This "urban legend" is based on work that dates back decades, which throws up the question whether the a...
详细信息
ISBN:
(纸本)9781479971978
It is common knowledge that program comprehension takes up a substantial part of software development. This "urban legend" is based on work that dates back decades, which throws up the question whether the advances in software development tools, techniques, and methodologies that have emerged since then may invalidate or confirm the claim. We present an empirical investigation which goal is to confirm or reject the claim, based on interaction data which captures the user interface activities of developers. We use interaction data to empirically quantify the distribution of different developer activities during software development: In particular, we focus on estimating the role of program comprehension. In addition, we investigate if and how different developers and session types influence the duration of such activities. We analyze interaction data from two different contexts: One comes from the ECLIPSE IDE on java source code development, while the other comes from the PHARO IDE on Smalltalk source code development. We found evidence that code navigation and editing occupies only a small fraction of the time of developers, while the vast majority of the time is spent on reading & understanding source code. In essence, the importance of program comprehension was significantly underestimated by previous research.
Automated testing is a hot topic in computing testing society. The automated test management is an important component in this domain. Workflow Management System(WfMS) is a powerful tool to support software testing pr...
详细信息
ISBN:
(纸本)9781479932795
Automated testing is a hot topic in computing testing society. The automated test management is an important component in this domain. Workflow Management System(WfMS) is a powerful tool to support software testing process management and automation. java Business Process Management (jBPM) is a flexible and extensible framework combing the convenience of workflow capabilities and the outstanding scalability of application Integration. In this paper, we explore the automated testing management for enterprise level software development and present the design and implementation based on jBPM and J2EE framework technologies.
Most work in semantic search has thus far focused upon either manually building language-specific taxonomies/ontologies or upon automatic techniques such as clustering or dimensionality reduction to discover latent se...
详细信息
ISBN:
(纸本)9781479956661
Most work in semantic search has thus far focused upon either manually building language-specific taxonomies/ontologies or upon automatic techniques such as clustering or dimensionality reduction to discover latent semantic links within the content that is being searched. The former is very labor intensive and is hard to maintain, while the latter is prone to noise and may be hard for a human to understand or to interact with directly. We believe that the links between similar user's queries represent a largely untapped source for discovering latent semantic relationships between search terms. The proposed system is capable of mining user search logs to discover semantic relationships between key phrases in a manner that is language agnostic, human understandable, and virtually noise-free.
Android, being an open source smartphone operating system, enjoys a large community of developers who create new mobile services and applications. However, it also attracts malware writers to exploit Android devices i...
详细信息
ISBN:
(纸本)9781479909599
Android, being an open source smartphone operating system, enjoys a large community of developers who create new mobile services and applications. However, it also attracts malware writers to exploit Android devices in order to distribute malicious apps in the wild. In fact, Android malware are becoming more sophisticated and they use advanced "dynamic loading" techniques like java reflection or native code execution to bypass security detection. To detect dynamic loading, one has to use dynamic analysis. Currently, there are only a handful of Android dynamic analysis tools available, and they all have shortcomings in detecting dynamic loading. The aim of this paper is to design and implement a dynamic analysis system which allows analysts to perform systematic analysis of dynamic payloads with malicious behaviors. We propose "DroidTrace", a ptrace based dynamic analysis system with forward execution capability. Our system uses ptrace to monitor selected system calls of the target process which is running the dynamic payloads, and classifies the payloads behaviors through the system call sequence, e.g., behaviors such as file access, network connection, inter-process communication and even privilege escalation. Also, DroidTrace performs "physical modification" to trigger different dynamic loading behaviors within an app. Using DroidTrace, we carry out a large scale analysis on 36,170 dynamic payloads in 50,000 apps and 294 malware in 10 families (four of them are zero-day) with various dynamic loading behaviors.
This paper proposes a graph building algorithm that transforms geo-location data into a network graph, which could be useful for applications involving navigation aids or robotics. At first, our new method takes data ...
详细信息
ISBN:
(纸本)9781479953370
This paper proposes a graph building algorithm that transforms geo-location data into a network graph, which could be useful for applications involving navigation aids or robotics. At first, our new method takes data from source Keynote Markup language 2.2 format (KML 2.2) files such as extracted from Google Maps. Then, our algorithm creates a directed, acyclical graph which is displayed and overlayed afterwards in Google Earth. A java application has been built to implement and test the system based on the graph building algorithm for the analysis of ski piste maps. Testing of the graph, in context of ski resorts, demonstrates that the algorithm is accurate and suitable for use in Geographical Information Systems (GIS). Moreover, the performance of the algorithm has been analysed. It shows that, with the size of the network graphs produced and the available hardware, our algorithm is computationally efficient.
Upcoming telecommunication networks are expected to lower energy requirements of current infrastructures, especially at the network edge. That necessarily entails cutting off energy wasted when devices are active, yet...
详细信息
ISBN:
(纸本)9780983628392
Upcoming telecommunication networks are expected to lower energy requirements of current infrastructures, especially at the network edge. That necessarily entails cutting off energy wasted when devices are active, yet idle, just to maintain their presence on the network. To this purpose, the concept of delegating network activity has been introduced to allow devices to enter low power states without breaking their connectivity. This paper addresses the client-side architecture for delegating routine network tasks to the proper service. It depicts the logical framework for this purpose and identifies its main logical elements and their function;further, it discusses their integration with power management capability today available in most computing devices.
The great diversity in the architecture of biomedical devices, coupled with their different communication protocols, has hindered the implementation of systems that need access to these devices. Given these difference...
详细信息
ISBN:
(纸本)9781467363624
The great diversity in the architecture of biomedical devices, coupled with their different communication protocols, has hindered the implementation of systems that need access to these devices. Given these differences, arises the need to provide access to such devices in a transparent way. In this sense, this paper proposes an service-oriented architecture to access biomedical devices as a way to abstract the mechanism for writing and reading data on these devices, thus contributing to the increase in quality and productivity of biomedical systems in order to enable that the focus of the development team of biomedical software is almost exclusively intended for its functional requirements, i.e. business rules relevant to the problem domain. For the development of this work, technologies such as the XML language and the java programming language were used and concepts of Software Engineering as Design Patterns. After the proposition of the architecture, tests in order to validate the proposed architecture were performed.
暂无评论