Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Thomas Weigert"'
Publikováno v:
IDT
Data flow-oriented coverage criteria are widely used in software testing. This paper proposes three novel def-use coverage criteria. The main objective of these criteria is to improve the specificity of test goals, to obtain more easily understood te
Autor:
Alexander Kolchin, Oleg Gurenko, Aswin van den Berg, Thomas Weigert, Stepan Potiyenko, Vlad Volkov, Roman Chetvertak, Roman Yagodka, Valentyn Banas
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030306892
SAM
SAM
Testing of modernized legacy systems is difficult due to that typically requirements specifications do not exist and that detailed knowledge of the architecture and design of the system may have been lost. In this paper we present an approach which d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::995d0ae2a1b8fef15a9e743f4e88e4da
https://doi.org/10.1007/978-3-030-30690-8_1
https://doi.org/10.1007/978-3-030-30690-8_1
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030302740
ICIST
ICIST
This paper focuses on challenges to automatic test suite generation from formal models of software systems. Popular tools and methods and their limitations are discussed. Data cohesion, meaningfulness of derived behavior, usefulness for debugging, co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::36c06380982a9ae0e5ee577c614d01f8
https://doi.org/10.1007/978-3-030-30275-7_15
https://doi.org/10.1007/978-3-030-30275-7_15
Autor:
Oleksandr Letychevskyy, Stepan Potiyenko, Alexander A. Letichevsky, Alexander Kolchin, V. A. Volkov, Thomas Weigert
Publikováno v:
WING@ETAPS/IJCAR
We present system VRS (Verification of Requirements Specifications) designed for develop- ment of formal specification and verification. This system has been developed by VRS Kiev group during last 10 years to support requirements capturing in Motoro
Publikováno v:
Automated Software Engineering. 21:3-40
Many large programs operate on collection types. Extensive libraries are available in many programming languages, such as the C++ Standard Template Library, which make programming with collections convenient. Extending programming languages to provid
Publikováno v:
Journal of Systems and Software. 84:821-834
As multicore processors are becoming more wide-spread, leveraging of parallelism is once again becoming an important concern during the software development process. Substantial refactoring is required to parallelize legacy sequential software in ord
Publikováno v:
Journal of Power Sources. 196:4061-4066
The state-of-charge (SOC) of batteries and battery–supercapacitor hybrid systems is predicted using artificial neural networks (ANNs). Our technique is able to predict the SOC of energy storage devices based on a short initial segment (less than 4%
Publikováno v:
ACM Transactions on Autonomous and Adaptive Systems. 3:1-25
An intrusion detection system (IDS) is a security layer to detect ongoing intrusive activities in computer systems and networks. Current IDS have two main problems: The first problem is that typically so many alarms are generated as to overwhelm the
Publikováno v:
IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics). 37:373-384
An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with
Publikováno v:
SDL 2015: Model-Driven Engineering for Smart Cities ISBN: 9783319249117
SDL Forum
SDL Forum
Insertion modeling has been developed over the last decade as an approach to a general theory of interaction between agents and an environment in complex distributed multiagent systems. The original work in this direction proposed a model of interact
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::441f8b301257af25b2fab586518dbee5
https://doi.org/10.1007/978-3-319-24912-4_1
https://doi.org/10.1007/978-3-319-24912-4_1