Finding a short path between two given points lying on the polyhedron is an actual problem arising in various applications in science and technology;polyhedron faces without any restrictions can be considered triangul...
详细信息
Reputation and competitiveness of both mobile applications and mobile operating systems depend on their quality. Developers are using various techniques to ensure high quality. Recently, exploratory testing approaches...
详细信息
Reputation and competitiveness of both mobile applications and mobile operating systems depend on their quality. Developers are using various techniques to ensure high quality. Recently, exploratory testing approaches have been gaining significant attention in this context. However, these approaches mostly do not consider one major non-functional requirement that affects quality – performance issues. Performance issues, such as sluggish UI or extensive battery consumption, are tightly connected to inefficient use of device resources. Detecting these issues is a non-trivial task. In this paper we present a novel approach to detect anomalous device resource usage and hence potential performance issues. Our approach is integrated with exploratory testing framework and uses information about previously executed test runs to build the expected resource usage model. The underlying model represents resource usage data as a multidimensional time series and is able to detect anomalous time intervals. We integrate our approach with exploratory testing tool for Android and empirically evaluate it on a set of real-world applications with injected performance issues. Our results show that suggested approach can be successfully applied to detect anomalous device resource usage and potential performance regressions.
We present novel empirical assessments of prominent finite state machine (FSM) conformance test derivation methods against their coverage of code faults. We consider a number of realistic extended FSM examples with th...
详细信息
This paper presents a method for build interception of Go projects and utilizing the intercepted information for building an intermediate representation used in a static analyzer. The paper discusses two approaches: h...
This paper presents a method for build interception of Go projects and utilizing the intercepted information for building an intermediate representation used in a static analyzer. The paper discusses two approaches: handling invocations of the higher-level go build command and handling invocations of the lower-level compile tool. The second solution is applicable not only to the built-in Go build system but also to other build systems that directly utilize the low-level compile tool, such as Bazel, Please, Pants. It also covers compilations involving CGO.
A numerical and experimental study has been conducted to explore the influence of vertical wall on the wake of the non/ducted propeller. The numerical simulation is achieved using a structured and transient sliding me...
详细信息
Approaches based on state machines are widely used to obtain guaranteed error coverage tests for discrete event systems. Many modern systems have time-dependent components, and thus, state machines are extended with c...
Approaches based on state machines are widely used to obtain guaranteed error coverage tests for discrete event systems. Many modern systems have time-dependent components, and thus, state machines are extended with clock variables and various time aspects, i.e. test synthesis methods must be adapted to new timed models. In this article, we consider Finite State Machines (FSM) with timeouts, input and output timed guards and show, how a test suite with guaranteed error coverage can be derived based on this model. The fault model and test derivation methods are based on the abstraction of the timed machine, i.e., on the FSM that describes the relevant aspects of the timed behavior. We consider two strategies for obtaining complete test suites under the assumption that the specification can be non-deterministic.
This paper focuses on investigation of confidential documents leaks in the form of screen photographs. Proposed approach does not try to prevent leak in the first place but rather aims to determine source of the leak....
详细信息
We develop the document analysis system, which is able to extract text and text metadata (such as font size and style), and restore the document structure. Some parts of the pipeline are based on machine learning thus...
详细信息
Crash report analysis is a necessary step before developers begin fixing errors. Fuzzing or hybrid (with dynamic symbolic execution) fuzzing is often used in the secure Development lifecycle. Modern fuzzers could prod...
详细信息
We propose a two-stage approach for TOC generation from financial documents. This work connected with participation in FinTOC-2021 Shared Task: "Financial Document Structure Extraction". The competition cont...
详细信息
暂无评论