Code Snippets Recommendation Based on Sequence to Sequence Model
In the process of software development, developers often reuse code so as to improve the efficiency of software development. Existing researches usually leverage information retrieval technologies to implement the performance of code recommendation ...
YAN Xin, ZHOU Yu, HUANG Zhiqiu
doaj +1 more source
Regression Testing of Database Applications Under an Incremental Software Development Setting
Software regression testing verifies previous features on a software product when it is modified or new features are added to it. Because of the nature of regression testing it is a costly process.
Raul H. Rosero +2 more
doaj +1 more source
An initial study of quality assurance techniques for automated water level control systems [PDF]
This study aims to formulate requirements for models and programs of cyber-physical systems through an investigation of existing approaches to dynamic verification of control programs.
Kartbayev Amandyk
doaj +1 more source
Improving the Safety and Security of Software Systems by Mediating SAP Verification
Security and performance (SAP) are two critical NFRs that affect the successful completion of software projects. Organizations need to follow the practices that are vital to SAP verification.
Maram Fahaad Almufareh, Mamoona Humayun
doaj +1 more source
Lessons Learned From Microkernel Verification — Specification is the New Bottleneck [PDF]
Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software systems is
Thorsten Bormer +3 more
doaj +1 more source
Hardware Verification Using Software Analyzers [PDF]
Program analysis is a highly active area of research, and the capacity and precision of software analyzers is improving rapidly. We investigate the use of modern software verification tools for formal property checking of hardware given in Verilog at register-transfer level.
Rajdeep Mukherjee +2 more
openaire +1 more source
Human-Error Prevention for Autonomous Edge Software Using Minimalistic Modern C++
In science and engineering using edge-embedded software, it is necessary to demonstrate the validity of results; therefore, the software responsible for operating an edge system is required to guarantee its own validity.
Ryo Fukano, Masato Ishikawa
doaj +1 more source
From software verification to ‘everyware’ verification
Ubiquitous computing is a vision of computing in which the computer disappears from view and becomes embedded in our environment, in the equipment we use, in our clothes, and even in our body. Everyday objects--called `everyware' by Adam Greenfield--are now endowed with sensing, controlled by software, and often wirelessly connected and Internet ...
openaire +1 more source
Configuration-based realization method for verification evaluation in shafting design of ships
Objective The verification evaluation module of traditional shafting design software for ships has several problems which need to be solved, such as a long modification and adjustment period, and poor expansibility of verification rules.
Hanjiang SONG, Ling SUN, Feng SUN
doaj +1 more source
PROMELA based formal verification for safety-critical software
聚焦安全关键软件, 研究基于PROMELA形式模型验证C程序中违反断言、数组越界、空指针解引用、死锁及饥饿等5类故障技术。建立C程序抽象语法树节点到PROMELA模型, 验证属性相关函数到PROMELA模型的2类映射规则; 根据映射规则提出由C程序自动生成PROMELA形式模型的算法, 并对算法进行理论分析; 针对C程序中5种故障类型, 分别给出基于PROMELA模型的形式化验证方法, 并分析验证的范围; 覆盖各类故障的验证范围, 为每类故障类型选取12个C程序案例进行实证研究 ...
XING Liang +3 more
doaj +1 more source

