Results 21 to 30 of about 253,484 (163)

Efficiency of Software Testing Techniques: A Controlled Experiment Replication and Network Meta-analysis [PDF]

open access: yese-Informatica Software Engineering Journal, 2017
Background: Common approaches to software verification include static testing techniques, such as code reading, and dynamic testing techniques, such as black-box and white-box testing. Objective: With the aim of gaining a~better understanding of software
Omar S. Gómez   +2 more
doaj   +1 more source

HSAS-MD Analyzer: A Hybrid Security Analysis System Using Model-Checking Technique and Deep Learning for Malware Detection in IoT Apps

open access: yesSensors, 2022
Established Internet of Things (IoT) platforms suffer from their inability to determine whether an IoT app is secure or not. A security analysis system (SAS) is a protective shield against any attack that breaks down data privacy and security.
Alyaa A. Hamza   +3 more
doaj   +1 more source

An Incremental Optimization Algorithm for Efficient Verification of Graph Transformation Systems

open access: yesIEEE Access, 2023
This paper proposes an incremental optimization framework for verifying graph transformation systems to overcome the state space explosion (SSE). SSE refers to the exponential growth of the number of possible states in a system during its verification ...
Faranak Nejati   +3 more
doaj   +1 more source

CSP2Turtle: Verified Turtle Robot Plans

open access: yesRobotics, 2023
Software verification is an important approach to establishing the reliability of critical systems. One important area of application is in the field of robotics, as robots take on more tasks in both day-to-day areas and highly specialised domains.
Dara MacConville   +3 more
doaj   +1 more source

Sequence-based Program Semantic Rule Mining and Violation Detection [PDF]

open access: yesJisuanji kexue
In software development,source code that violates semantic rules may compile or run normally but may have defects in performance or functionality.Therefore,accurately detecting such defects has become a challenge.Existing research usually adopts itemset ...
LI Zi, ZHOU Yu
doaj   +1 more source

FEM3DD SOFTWARE VERIFICATION

open access: yesANNALS OF THE ORADEA UNIVERSITY. Fascicle of Management and Technological Engineering., 2013
Structural optimization requires a large numberof structures to be evaluated. In simultaneous size and shapeoptimization, where only metaheuristics techniques can beused, the number of evaluations can easily ran into thousands.Renowned and widespread commercial software like ANSYSor MSC Nastran are multipurpose FEM (Finite ElementMethod) programs have ...
Sanchez-Caballero, Samuel   +3 more
openaire   +3 more sources

Unmanned Aerial Vehicle Situation Assessment Based on Cumulative Prospect Theory and Three-Way Decision

open access: yesShanghai Jiaotong Daxue xuebao, 2022
General uninhabited aerial vehicle (UAV) situation assessment methods do not consider the influence of complex external environment on the decision-maker, and usually only get the ranking results of the evaluation.
LI Weiwei, GAO Peixue, CHEN Jin, LU Yuqing
doaj   +1 more source

Prompt Learning Based Parameter-efficient Code Generation [PDF]

open access: yesJisuanji kexue
Automatic code generation is one of the effective ways to improve the efficiency of software development.Existing research often regards code generation as a sequence-to-sequence task,and the process of fine-tuning of large-scale pre-trained language ...
XU Yiran, ZHOU Yu
doaj   +1 more source

A Lightweight Verification Method Based on Metamorphic Relation for Nuclear Power Software

open access: yesFrontiers in Energy Research, 2022
The verification of nuclear design software commonly uses direct comparison methods. Benchmark questions, classical programs, experimental data, manual solutions, etc., would be used as expected results to compare with program outputs to evaluate the ...
Meng Li   +13 more
doaj   +1 more source

Software Verification Using k-Induction [PDF]

open access: yes, 2011
We present combined-case k-induction, a novel technique for verifying software programs. This technique draws on the strengths of the classical inductive-invariant method and a recent application of k-induction to program verification. In previous work, correctness of programs was established by separately proving a base case and inductive step.
Alastair F. Donaldson   +3 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy