Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Renzo Degiovanni"'
Publikováno v:
Electronic Proceedings in Theoretical Computer Science, Vol 139, Iss Proc. LAFM 2013, Pp 71-76 (2014)
Tabular notations, in particular SCR specifications, have proved to be a useful means for formally describing complex requirements. The SCR method offers a powerful family of analysis tools, known as the SCR Toolset, but its availability is restricte
Externí odkaz:
https://doaj.org/article/a0f46c36a4404046a4346ab5bedc2af5
Autor:
Luiz Carvalho, Renzo Degiovanni, Matías Brizzio, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis
Publikováno v:
Fundamental Approaches to Software Engineering ISBN: 9783031308253
System goals are the statements that, in the context of software requirements specification, capture how the software should behave. Many times, the understanding of stakeholders on what the system should do, as captured in the goals, can lead to dif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8fe8d8cc3db872f683691eb13c38f03d
https://doi.org/10.1007/978-3-031-30826-0_1
https://doi.org/10.1007/978-3-031-30826-0_1
Context: When software evolves, opportunities for introducing faults appear. Therefore, it is important to test the evolved program behaviors during each evolution cycle. However, while software evolves, its complexity is also evolving, introducing c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a5e83a3906321fb7b6977e54ff4630a
http://arxiv.org/abs/2112.14566
http://arxiv.org/abs/2112.14566
Autor:
Facundo Molina, César Cornejo, Renzo Degiovanni, Germán Regis, Pablo F. Castro, Nazareno Aguirre, Marcelo F. Frias
Publikováno v:
Science of Computer Programming. 181:47-63
Various tools for program analysis, including run-time assertion checkers and static analyzers such as verification and test generation tools, require formal specifications of the programs being analyzed. Moreover, many of these tools and techniques
Fault seeding is typically used in controlled studies to evaluate and compare test techniques. Central to these techniques lies the hypothesis that artificially seeded faults involve some form of realistic properties and thus provide realistic experi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e5aeb26ccd5279fccc1231caf725e1f0
Autor:
Aayush Garg, Milos Ojdanic, Renzo Degiovanni, Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon
Mutation testing research has indicated that a major part of its application cost is due to the large number of low utility mutants that it introduces. Although previous research has identified this issue, no previous study has proposed any effective
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0283e5c8181e5db7a052709263e2f215
Vulnerability prediction refers to the problem of identifying system components that are most likely to be vulnerable. Typically, this problem is tackled by training binary classifiers on historical data. Unfortunately, recent research has shown that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d14e699d0152de438bee3e1bba382cfb
Autor:
Nazareno Aguirre, Renzo Degiovanni, Pablo Ponzio, Marcelo F. Frias, Germán Regis, Facundo Molina
Publikováno v:
ICSE
We present a technique that enables us to distinguish valid from invalid data structure objects. The technique is based on building an artificial neural network, more precisely a binary classifier, and training it to identify valid and invalid instan
In this paper, we present an approach to automatically syn- thesize synchronization code for distributed programs assuming a multi- thread shared-variables model of computation, common in object-oriented programming languages like JAVA. Our method co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cb848973d605030882c6a8e58bdd3cee
Publikováno v:
ASE
Goal-conflict analysis has been widely used as an abstraction for risk analysis in goal-oriented requirements engineering approaches. In this context, where the expected behaviour of the system-to-be is captured in terms of domain properties and goal