Results 21 to 30 of about 253,484 (163)
Efficiency of Software Testing Techniques: A Controlled Experiment Replication and Network Meta-analysis [PDF]
Background: Common approaches to software verification include static testing techniques, such as code reading, and dynamic testing techniques, such as black-box and white-box testing. Objective: With the aim of gaining a~better understanding of software
Omar S. Gómez +2 more
doaj +1 more source
Established Internet of Things (IoT) platforms suffer from their inability to determine whether an IoT app is secure or not. A security analysis system (SAS) is a protective shield against any attack that breaks down data privacy and security.
Alyaa A. Hamza +3 more
doaj +1 more source
An Incremental Optimization Algorithm for Efficient Verification of Graph Transformation Systems
This paper proposes an incremental optimization framework for verifying graph transformation systems to overcome the state space explosion (SSE). SSE refers to the exponential growth of the number of possible states in a system during its verification ...
Faranak Nejati +3 more
doaj +1 more source
CSP2Turtle: Verified Turtle Robot Plans
Software verification is an important approach to establishing the reliability of critical systems. One important area of application is in the field of robotics, as robots take on more tasks in both day-to-day areas and highly specialised domains.
Dara MacConville +3 more
doaj +1 more source
Sequence-based Program Semantic Rule Mining and Violation Detection [PDF]
In software development,source code that violates semantic rules may compile or run normally but may have defects in performance or functionality.Therefore,accurately detecting such defects has become a challenge.Existing research usually adopts itemset ...
LI Zi, ZHOU Yu
doaj +1 more source
Structural optimization requires a large numberof structures to be evaluated. In simultaneous size and shapeoptimization, where only metaheuristics techniques can beused, the number of evaluations can easily ran into thousands.Renowned and widespread commercial software like ANSYSor MSC Nastran are multipurpose FEM (Finite ElementMethod) programs have ...
Sanchez-Caballero, Samuel +3 more
openaire +3 more sources
General uninhabited aerial vehicle (UAV) situation assessment methods do not consider the influence of complex external environment on the decision-maker, and usually only get the ranking results of the evaluation.
LI Weiwei, GAO Peixue, CHEN Jin, LU Yuqing
doaj +1 more source
Prompt Learning Based Parameter-efficient Code Generation [PDF]
Automatic code generation is one of the effective ways to improve the efficiency of software development.Existing research often regards code generation as a sequence-to-sequence task,and the process of fine-tuning of large-scale pre-trained language ...
XU Yiran, ZHOU Yu
doaj +1 more source
A Lightweight Verification Method Based on Metamorphic Relation for Nuclear Power Software
The verification of nuclear design software commonly uses direct comparison methods. Benchmark questions, classical programs, experimental data, manual solutions, etc., would be used as expected results to compare with program outputs to evaluate the ...
Meng Li +13 more
doaj +1 more source
Software Verification Using k-Induction [PDF]
We present combined-case k-induction, a novel technique for verifying software programs. This technique draws on the strengths of the classical inductive-invariant method and a recent application of k-induction to program verification. In previous work, correctness of programs was established by separately proving a base case and inductive step.
Alastair F. Donaldson +3 more
openaire +4 more sources

