This paper presents an overview of the verification framework ALICE in its current version 0.7. It is based on the generic theorem prover Isabelle [Pau03a]. Within ALICE a software or hardware component is specified a...
详细信息
This paper presents an overview of the verification framework ALICE in its current version 0.7. It is based on the generic theorem prover Isabelle [Pau03a]. Within ALICE a software or hardware component is specified as a state-full black-box with directed communication channels. Components send and receive asynchronous messages via these channels. The behavior of a component is generally described as a relation on the observations in form of streams of messages flowing over its input and output channels. Untimed and timed as well as state-based, recursive, relational, equational, assumption/guarantee, and functional styles of specification are supported. Hence, ALICE is well suited for the formalization and verification of distributed systems modeled with this stream-processing paradigm.
Personalized recommendation is an important application of context-aware system and is being used widely. However, most existed systems provide personalized information to users only based on user preferences or user ...
详细信息
Adopting new tools and technologies on a development process can be a risky endeavor. Will the project accept the new technology? What will be the impact? Far too often the project is forced to adopt the new technolog...
详细信息
The invariant using Radon transform is constructed and a new image retrieval algorithm based on the wavelet transform and Radon transform is presented. It turns to be getting multi-scale edge images by the wavelet mod...
详细信息
The use of commercial off-the-shelf (COTS) software product can potentially reduce cost and time for software system development. But this promise is often not realized in practice because COTS product does not serve ...
详细信息
The use of commercial off-the-shelf (COTS) software product can potentially reduce cost and time for software system development. But this promise is often not realized in practice because COTS product does not serve organizations' expectations. Thus, decision making on selecting COTS product becomes a critical task which should be performed in a systematic and repeatable manner. The decision analysis and resolution (DAR) process area of capability maturity model integration (CMMI) provides practices for formal evaluation process which could be applied to COTS selection. However, CMMI does not describe how to conduct the process that can achieve its defined goals. This research presents the DAR on COTS selection (DARCS) process model according to DAR process area of the CMMI. The model is consisted of three layers: core workflow layer, workflow details layer, and description layer.
Aspect-oriented programming (AOP) is a new programming paradigm that improves separation of concerns by decomposing the crosscutting concerns in aspect modules. Bad smells are metaphors to describe software patterns t...
详细信息
Aspect-oriented programming (AOP) is a new programming paradigm that improves separation of concerns by decomposing the crosscutting concerns in aspect modules. Bad smells are metaphors to describe software patterns that are generally associated with bad design and bad programming of object-oriented programming (OOP). New notions and different ways of thinking for developing aspect-oriented (AO) software inevitably introduce bad smells which are specific bad design and bad programming in AO software called AO bad smells. software metrics have been used to measure software artifact for a better understanding of its attributes and to assess its quality. Bad-smell metrics should be used as indicators for determining whether a particular fraction of AO code contains bad smells or not. Therefore, this paper proposes definition of metrics corresponding to the characteristic of each AO bad smell as a means to detecting them. The proposed bad-smell metrics are validated and the results show that the proposed bad- smell metrics can preliminarily indicate bad smells hidden in AO software.
One of the highest priorities of system requirements needed in software development industry is security requirements. However, to identify the complete and correct software security requirements are a challenging tas...
详细信息
One of the highest priorities of system requirements needed in software development industry is security requirements. However, to identify the complete and correct software security requirements are a challenging task especially creating enterprise assets security requirements. Enterprise assets security requirements are to identify security basic needs, to assess risks, to establish security approach and service, and to specify external enterprise consideration including confidentiality, integrity, availability, and accountability concerns. Moreover, these may be applied to other security requirements such as identification and authentication, access control, firewall architecture, etc. Security patterns may be used to create this security requirements but understanding, analyzing and transforming from security patterns to security requirements are difficult to accomplish. We proposed a grammar, called ESRMG (enterprise security and risk management grammar), and a prototyping tool based on security patterns in a scope of enterprise asset identification and risk managements which are the fundamental of enterprise security requirements. The proposed grammar and tool are beneficial for any organization to construct enterprise security requirements and may help reduce cost and time in overall of system development.
For integration testing processes, testers need to find test sequences of classes in order to execute interactions. One major problem of test order is the presence of cyclic dependency calls. Many researchers have pro...
详细信息
For integration testing processes, testers need to find test sequences of classes in order to execute interactions. One major problem of test order is the presence of cyclic dependency calls. Many researchers have proposed techniques to solve this problem by removing relationships to break cycles and then create test stubs. Therefore, one major purpose of integration testing is minimization of test stubs. This paper presents an approach to find test sequences by using object-oriented slicing technique to alleviate using test stubs. The main objective of using object-oriented slicing is to break cycles by slicing classes for partial testing instead of removing relationships for test stub construction. With this approach, the cost of implementing test stubs is decreased.
Bad smells are software patterns that are generally associated with bad design and bad programming. They can be removed by using the refactoring technique which improves the quality of software. Aspect-oriented (AO) s...
详细信息
Bad smells are software patterns that are generally associated with bad design and bad programming. They can be removed by using the refactoring technique which improves the quality of software. Aspect-oriented (AO) software development, which involves new notions and the different ways of thinking for developing software and solving the crosscutting problem, possibly introduces different kinds of design flaws. Defining bad smells hidden in AO software in order to point out bad design and bad programming is then necessary. This paper proposes the definition of new AO bad smells. Moreover, appropriate existing AO refactoring methods for eliminating each bad smell are presented. The proposed bad smells are validated. The results show that after removing the bad smells by using appropriate refactoring methods, the software quality is increased.
Spectrum-based fault localization shortens the test-diagnose-repair cycle by reducing the debugging effort. As a light-weight automated diagnosis technique it can easily be integrated with existing testing schemes. Ho...
详细信息
暂无评论