A Template-Based Approach to Describing Metamorphic Relations

Size: px
Start display at page:

Download "A Template-Based Approach to Describing Metamorphic Relations"

Transcription

1 A -Based Approach to Describing Metamorphic Relations Sergio Segura, Amador Durán, Javier Troya, Antonio Ruiz-Cortés Applied Software Engineering Group University of Seville Buenos Aires, MET 2017 Conclusions 1

2 Conclusions Number of Metamorphic Relations (MRs) presented in research papers 2

3 Lack of standards to describe MRs Most MRs are described informally using natural language. Key information about the MRs is sometimes omitted. Great variability in the way MRs are described. Let s use tables! 3

4 D-OSE Name Online search engines Description Online search engines Version 1 License URL Input 1 Input 2 Output 1 Name Domain Description Mandatory Name Domain Description Mandatory Name Domain Description Inputs Q String Search query Yes D String Site domain filter (introduced as a part of the query) No Outputs P List List of search results Program name Program description Program version Program license Program URL Parameter name Parameter domain Parameter description Parameter optionality Naming rules for subindexes Preconditions Examples MR-MPSite Context ID D-OSE Description Test search engine s reliability when retrieving Web pages that contain an exact word or phrase. Version 1 Source test case Inputs P A Q A Outputs Follow-up test case Inputs Q B, D B Outputs P B Preconditions 1 < P A 20 and 1 < P B 20 Input relation Q B = Q A and D B =d i being d i the domain of P A [i] with 1 i P A Output relation P A [i] in P B Example For example, let us test Google by issuing the following source query: "side effect of antibiotics in babies" Conclusions 4

5 User story As a <role>, I want <goal/desire> so that <benefit> Example: As a user, I want to indicate folders not to backup so that my backup drive isn't filled up with things I don't need. Goal Question Metric (GQM) Goal: <purpose, issue, object, viewpoint>, Question: <question(s)> Metric: <metric(s)> Example: Goal: Improve the timeliness of change request processing from the project manager's viewpoint. Question: What is the current change request processing speed? Metric: Average cycle time. 5

6 Empirical experiments Analyze <Object(s) of study>, for the purpose of <Purpose> with respect to <Quality focus> from the point of view of <Perspective> in the context of <Context> Example: Analyze the practice of mindfulness, for the purpose of evaluating its effects with respect to the performance of students in conceptual modelling from the point of view of the experimenters in the context of second-year students in the Degree in SE. These templates have something in common 6

7 Simplicity Flexibility Conclusions 7

8 In the domain of <application domain>, [where <context definition>] [assuming that <constraints>] the following metamorphic relation(s) should hold <metamorphic relation name 1 >: if <relation among inputs/outputs> then <relation among inputs/outputs> <metamorphic relation name n >: if <relation among inputs/outputs> then <relation among inputs/outputs> Let s see some examples 8

9 Examples Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, and Zhi Quan Zhou., "Metamorphic Testing for Cybersecurity," in Computer Examples Z. Q. Zhou, S. Xiang and T. Y. Chen, "Metamorphic Testing for Software Quality Assessment: A Study of Search Engines," in IEEE Transactions on Software Engineering

10 Examples Mikael Lindvall, Dharmalingam Ganesan, Sigurthor Bjorgvinsson, Kristjan Jonsson, Haukur Steinn Logason, Frederik Dietrich, and Robert E. Wiegand. Agile metamorphic model-based testing. In Proceedings of the 1st International Workshop on Metamorphic Testing (MET '16). Sergio Segura, Amador Durán, Ana B. Sánchez, Daniel Le Berre, Emmanuel Lonca and Antonio Ruiz-Cortés. Automated Metamorphic Testing of Variability Analysis Tools Software Testing, Verification and Reliability Validation Year Authors Title Domain #MRs 2002 T.Y. Chen et al. Metamorphic Testing of Programs on Partial Differential Equations: a Case Study Numerical programs T.H. Tse et al. Testing Context-Sensitive Middleware-Based Software Applications Embedded systems W.K. Chan et al 2010 K.Y. Sim et al X. Xie et al F.-C. Kuo et al. Finding failures from passed test cases: improving the pattern classification approach to the testing of mesh simplification programs Detecting Faults in Technical Indicator Computations for Financial Market Analysis Testing and validating machine learning classifiers by metamorphic testing Testing Embedded Software by Metamorphic Testing: a Wireless Metering System Case Study Computer graphics 3 Financial software 2 Machine learning 2 Embedded software S. Segura et al. Automated metamorphic testing of variability analysis tools Software variability Z.Q. Zhou et al. Metamorphic Testing for Software Quality Assessment: A Study of Search Engines Search database T.Y. Chen et al. Metamorphic Testing for Cybersecurity Cybersecurity M. Lindvall et al. Agile Metamorphic Model-based Testing Search database 2 Total 17 10

11 specification Versioned technical report LaTeX template Conclusions 11

12 Conclusions Thanks! 12

ICSE MET 17 Keynote. Metamorphic Testing: Beyond Testing Numerical Computations

ICSE MET 17 Keynote. Metamorphic Testing: Beyond Testing Numerical Computations ICSE MET 17 Keynote Metamorphic Testing: Beyond Testing Numerical Computations Dr. Zhi Quan (George) Zhou Associate Professor University of Wollongong Australia zhiquan@uow.edu.au 1 Why this topic? Observation:

More information

SmarTest: Accelerating the detection of faults in Drupal

SmarTest: Accelerating the detection of faults in Drupal SmarTest: Accelerating the detection of faults in Drupal Ana Belén Sánchez http://www.isa.us.es/members/anabelen.sanchez Ana Belén Sánchez, Sergio Segura, Antonio Ruiz-Cortés, Gabriel Hidalgo I am a researcher

More information

Improving software testing cost-effectiveness through dynamic partitioning

Improving software testing cost-effectiveness through dynamic partitioning University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Improving software testing cost-effectiveness through dynamic partitioning

More information

Read Naturally SE Update Windows Network Installation Instructions

Read Naturally SE Update Windows Network Installation Instructions Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and

More information

Feature Model to Orthogonal Variability Model Transformation towards Interoperability between Tools

Feature Model to Orthogonal Variability Model Transformation towards Interoperability between Tools Feature Model to Orthogonal Variability Model Transformation towards Interoperability between Tools Fabricia Roos-Frantz 1, David Benavides 2 and Antonio Ruiz-Cortés 2 1 Unijuí, Departmento de Tecnologia

More information

μmt: A Data Mutation Directed Metamorphic Relation Acquisition Methodology

μmt: A Data Mutation Directed Metamorphic Relation Acquisition Methodology 1 st International Workshop on Metamorphic Testing (MET 2016) In conjunction with ICSE 2016, Austin, TX, May 16, 2016 μmt: A Data Mutation Directed Metamorphic Relation Acquisition Methodology Chang-ai

More information

WORKSHOP. Writing User Stories

WORKSHOP. Writing User Stories WORKSHOP Writing User Stories contents SECTION 1 user stories what is a user story? 4 user story template 5 examples: user stories 6 user story checklist 7 why not tasks? 8 SECTION 2 writing acceptance

More information

Architecture of models in testing how models of various abstraction levels relate to each other

Architecture of models in testing how models of various abstraction levels relate to each other 1 (10) Matti Vuori, 20.6.2013 RATA project report Architecture of models in testing how models of various abstraction levels relate to each other Contents 1. Introduction... 2 2. Generic architecture of

More information

Field Explorer: Multimedia Data Management-Sharing System For Enhancing Student s Fieldwork Activities

Field Explorer: Multimedia Data Management-Sharing System For Enhancing Student s Fieldwork Activities Field Explorer: Multimedia Data Management-Sharing System For Enhancing Student s Fieldwork Activities Yosuke TSUCHIYA 3 rd Year Ph.D course, Graduate School of Media and Governance Keio University, SFC.

More information

Experience-based Refactoring for Goal- oriented Software Quality Improvement

Experience-based Refactoring for Goal- oriented Software Quality Improvement Experience-based Refactoring for Goal- oriented Software Quality Improvement International Workshop on Software Quality (SOQUA 2004) Erfurt,, Germany, September 30, 2004 Fraunhofer IESE Institut Experimentelles

More information

Automatically Identifying and Georeferencing Street Maps on the Web

Automatically Identifying and Georeferencing Street Maps on the Web Automatically Identifying and Georeferencing Street Maps on the Web Sneha Desai, Craig A. Knoblock, Yao-Yi Yi Chiang, Ching-Chien Chien Chen and Kandarp Desai University of Southern California Department

More information

Implementation of Metamorphic Testing on Spreadsheet Applications

Implementation of Metamorphic Testing on Spreadsheet Applications Vol.3, Issue.2, March-April. 2013 pp-990-995 ISSN: 2249-6645 Implementation of Metamorphic Testing on Spreadsheet Applications Balinder Singh Abstract: End-user programmers do not have broad knowledge

More information

Automatic Query Type Identification Based on Click Through Information

Automatic Query Type Identification Based on Click Through Information Automatic Query Type Identification Based on Click Through Information Yiqun Liu 1,MinZhang 1,LiyunRu 2, and Shaoping Ma 1 1 State Key Lab of Intelligent Tech. & Sys., Tsinghua University, Beijing, China

More information

CaseComplete Roadmap

CaseComplete Roadmap CaseComplete Roadmap Copyright 2004-2014 Serlio Software Development Corporation Contents Get started... 1 Create a project... 1 Set the vision and scope... 1 Brainstorm for primary actors and their goals...

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 4 Entity Relationship (ER) Modeling

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 4 Entity Relationship (ER) Modeling Database Systems: Design, Implementation, and Management Tenth Edition Chapter 4 Entity Relationship (ER) Modeling Objectives In this chapter, students will learn: The main characteristics of entity relationship

More information

Metamorphic Testing and Beyond

Metamorphic Testing and Beyond Postprint of article in Proceedings of the International Workshop on Software Technology and Engineering Practice (STEP 03), IEEE Computer Society, Los Alamitos, CA, pp. pp. 94 100 (2004) Metamorphic Testing

More information

Model-Based Systems Engineering: Documentation and Analysis

Model-Based Systems Engineering: Documentation and Analysis Week 1: What Is MBSE? Project Name Jane Doe 1 Instructions Before you begin, you should save your Project Portfolio on your local drive. We recommend the following format: Lastname_Firstname_Course3_Week1

More information

Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition. Chapter 7 Data Modeling with Entity Relationship Diagrams

Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition. Chapter 7 Data Modeling with Entity Relationship Diagrams Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition Chapter 7 Data Modeling with Entity Relationship Diagrams Objectives In this chapter, students will learn: The

More information

Configuration Testing of Flight Software

Configuration Testing of Flight Software Configuration Testing of Flight Software Charles Song Dharmalingam Ganesan Mikael Lindvall Fraunhofer USA Center for Experimental Software Engineering David McComas Nicholas Yanchik Alan Cudmore Steve

More information

Setting up Flickr. Open a web browser such as Internet Explorer and type this url in the address bar.

Setting up Flickr. Open a web browser such as Internet Explorer and type this url in the address bar. Workshop 15 th July 2008 Page 1 http://blog.larkin.net.au/ Setting up Flickr Flickr is a photo sharing tool that has rich functionality and allows the public to share their photographs with others., It

More information

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, 2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered

More information

How do archivists identify and capture records?

How do archivists identify and capture records? QUESTION How do archivists identify and capture records? AUTOMATED SYSTEMS MEETING THE CHALLENGE Critical Skill Set: Information System Analysis and Design Skills Being able to create conceptual models

More information

Networking technologies Unit number: 15 Level: 4 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/0472.

Networking technologies Unit number: 15 Level: 4 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/0472. Unit title: Networking technologies Unit number: 15 Level: 4 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/0472 UNIT AIM AND PURPOSE This unit will enable learners to understand

More information

SynwaySMS SMS Center. User Manual

SynwaySMS SMS Center. User Manual SynwaySMS SMS Center User Manual Version: 1.0.0.0 Synway Information Engineering Co., Ltd Content Content... 1 1 Brief Introduction... 2 2 SynwaySMS Installation... 3 3 SynwaySMS Management... 7 3.1 Login...

More information

Paceamker Basic Math. Correlated to. Alaska Math Grade Level Expectations For Eighth Grade

Paceamker Basic Math. Correlated to. Alaska Math Grade Level Expectations For Eighth Grade Paceamker Basic Math Alaska Math Grade Level Expectations 1 Numeration Performance Standards M1.3.1 Read, write, model, and order real numbers, explaining scientific notation, exponents, and percents.

More information

The Human Factors of Security Misconfigurations

The Human Factors of Security Misconfigurations CONSTANZE DIETRICH LEXTA Consultants Group [@WeddingTrash // constanze.dietrich@lexta.com] 77th RIPE Meeting, Plenary Session, 16 October 2018 The Human Factors of Security Misconfigurations Let s Fix

More information

Using Google Forms: A Tool for Gathering Information Susanna James David Thompson Secondary School February 19, 2015

Using Google Forms: A Tool for Gathering Information Susanna James David Thompson Secondary School February 19, 2015 Using Google Forms: A Tool for Gathering Information Susanna James David Thompson Secondary School February 19, 2015 What is Google Forms? Tool to collect and manage information Easy to use Collaborative

More information

Using a Goal-Driven Approach to Structure User Story Sets

Using a Goal-Driven Approach to Structure User Story Sets Using a Goal-Driven Approach to Structure User Story Sets UU/SIKS Symposium on Natural Language in Requirements Engineering Yves Wautelet KU Leuven Background: User Stories as Artefacts for Requirements

More information

Implementing a security metrics dashboard in Telefónica España

Implementing a security metrics dashboard in Telefónica España Implementing a security metrics dashboard in Telefónica España Vicente Segura (vsg@tid.es) Date: 1/14/2009 4th ETSI Security Workshop 14 January 2009 - ETSI, Sophia Antipolis, France Index 01 Introduction

More information

Basic Troubleshooting Process for Operating Systems

Basic Troubleshooting Process for Operating Systems Basic Troubleshooting Process for Operating Systems Applying the Troubleshooting Process to Operating Systems OS problems can result from a combination of hardware, software, and network issues. Computer

More information

Abductive Reasoning and Automated Analysis of Feature Models: How are they connected?

Abductive Reasoning and Automated Analysis of Feature Models: How are they connected? Abductive Reasoning and Automated Analysis of Feature Models: How are they connected? Pablo Trinidad, Antonio Ruiz Cortés Dpto. Lenguajes y Sistemas Informáticos University of Seville {ptrinidad,aruiz}

More information

The entity is an object of interest to the end user. entity correspond to the table not to a row- in the relational environment.

The entity is an object of interest to the end user. entity correspond to the table not to a row- in the relational environment. THE ENTITY RELATIONSHIP MODEL(ERM)ENTITIES The entity is an object of interest to the end user. entity correspond to the table not to a row- in the relational environment. ATTRIBUTES Attributes are characteristics

More information

An Environment for Training Computer Science Students on Software Testing

An Environment for Training Computer Science Students on Software Testing An Environment for Training Computer Science Students on Software Testing Jim Collofello and Kalpana Vehathiri Department of Computer Science and Engineering, Arizona State University Tempe, Arizona 85287

More information

International Journal of Advanced Research in. Computer Science and Engineering

International Journal of Advanced Research in. Computer Science and Engineering Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design and Architecture

More information

Importing Career Standards Benchmark Scores

Importing Career Standards Benchmark Scores Importing Career Standards Benchmark Scores The Career Standards Benchmark assessments that are reported on the PIMS Student Fact Template for Career Standards Benchmarks can be imported en masse using

More information

Introduction to REM 1.2.2

Introduction to REM 1.2.2 9/29/2015 Introduction to REM 1.2.2 Software Engineering and Databases Group Department of Computer Languages and Systems University of Seville La traducción de este material docente ha sido financiada

More information

BeTTy: Benchmarking and Testing on the Automated Analysis of Feature Models

BeTTy: Benchmarking and Testing on the Automated Analysis of Feature Models BeTTy: Benchmarking and Testing on the Automated Analysis of Feature Models Sergio Segura, José A. Galindo, David Benavides, José A. Parejo and Antonio Ruiz-Cortés Department of Computer Languages and

More information

AP Computer Science Principles: Problem Set 1

AP Computer Science Principles: Problem Set 1 AP Computer Science Principles: Problem Set 1 Due date: Friday, September 8, 2017 Instructor: Mr. Alwin Tareen Task Overview Setting up the KeePass password manager for Windows and Mac OS. Linux users

More information

Semi-proving: An integrated method for program proving, testing, and debugging

Semi-proving: An integrated method for program proving, testing, and debugging Title Semi-proving: An integrated method for program proving, testing, and debugging Author(s) Chen, TY; Tse, TH; Zhou, ZQ Citation Ieee Transactions On Software Engineering, 2011, v. 37 n. 1, p. 109-125

More information

Application in a Systems Design Environment. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering

Application in a Systems Design Environment. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Application in a Systems Design Environment EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Purpose The formal design process in the other notes can be applied to

More information

Writing Bug Reports & utest Etiquette

Writing Bug Reports & utest Etiquette Writing Bug Reports & utest Etiquette Presented by Nicola Sedgwick June 20, 2012 Agenda 1. What makes a good bug report? 2. Bug Titles 3. Reproduction steps 4. Bug attachments 5. utest etiquette 6. A bug

More information

Data, Information, and Databases

Data, Information, and Databases Data, Information, and Databases BDIS 6.1 Topics Covered Information types: transactional vsanalytical Five characteristics of information quality Database versus a DBMS RDBMS: advantages and terminology

More information

Metamorphic Testing and Its Applications

Metamorphic Testing and Its Applications To appear in Proceedings of the 8th International Symposium on Future Software Technology (ISFST 2004), Software Engineers Association, Japan (2004) Metamorphic Testing and Its Applications Zhi Quan Zhou,

More information

Kernels and Clustering

Kernels and Clustering Kernels and Clustering Robert Platt Northeastern University All slides in this file are adapted from CS188 UC Berkeley Case-Based Learning Non-Separable Data Case-Based Reasoning Classification from similarity

More information

Lecture 6: Requirements Engineering

Lecture 6: Requirements Engineering Lecture 6: Requirements Engineering Software System Design and Implementation ITCS/ITIS 6112/8112 001 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte

More information

Fault Class Prioritization in Boolean Expressions

Fault Class Prioritization in Boolean Expressions Fault Class Prioritization in Boolean Expressions Ziyuan Wang 1,2 Zhenyu Chen 1 Tsong-Yueh Chen 3 Baowen Xu 1,2 1 State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093,

More information

Achieving Right Automation Balance in Agile Projects

Achieving Right Automation Balance in Agile Projects Achieving Right Automation Balance in Agile Projects Vijayagopal Narayanan Vijayagopal.n@cognizant.com Abstract When is testing complete and How much testing is sufficient is a fundamental questions that

More information

Backup Manual Joomla 2.5 Extension Development

Backup Manual Joomla 2.5 Extension Development Backup Manual Joomla 2.5 Extension Development The following are step by step instructions to migrate your 2.5.x site to Joomla! You are encouraged to contact the developers of third-party extensions in

More information

Distributed Scheduling of Recording Tasks with Interconnected Servers

Distributed Scheduling of Recording Tasks with Interconnected Servers Distributed Scheduling of Recording Tasks with Interconnected Servers Sergios Soursos 1, George D. Stamoulis 1 and Theodoros Bozios 2 1 Department of Informatics, Athens University of Economics and Business

More information

Case studies of metamorphic tesing

Case studies of metamorphic tesing University of Wollongong Research Online University of Wollongong Thesis Collection 2017+ University of Wollongong Thesis Collections 2017 Case studies of metamorphic tesing Wenjuan Ma University of Wollongong

More information

An empirical study of user-perceived interoperability of Bluetooth devices

An empirical study of user-perceived interoperability of Bluetooth devices Master s Thesis Defense An empirical study of user-perceived interoperability of Bluetooth devices Manivannan Elangovan University of Kansas 6 th May 2005 Committee: Prof. Daniel Deavours Prof. Gary Minden

More information

Automatic Identification of User Goals in Web Search [WWW 05]

Automatic Identification of User Goals in Web Search [WWW 05] Automatic Identification of User Goals in Web Search [WWW 05] UichinLee @ UCLA ZhenyuLiu @ UCLA JunghooCho @ UCLA Presenter: Emiran Curtmola@ UC San Diego CSE 291 4/29/2008 Need to improve the quality

More information

UNIGLOBE ProFILER Express

UNIGLOBE ProFILER Express UNIGLOBE ProFILER Express UNIGLOBE Travel Electronic Traveller Profile System Version last updated 25 November 2016 UNIGLOBE Travel (UNIGLOBE) is pleased to provide eligible travellers with a very efficient

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

BOCES Phase 1 Overview

BOCES Phase 1 Overview ClassLink ClassMate 2012-13 BOCES Phase 1 Overview An Overview of How ClassMate Software will help your school to comply with NYSED s New SIRS Requirements Our technical staff will be working closely with

More information

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning

Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,

More information

Using the Functional Information Processing Model (FIPM) to Learn how a Library Catalog Works. Daniel A. Sabol Teachers College, Columbia University

Using the Functional Information Processing Model (FIPM) to Learn how a Library Catalog Works. Daniel A. Sabol Teachers College, Columbia University Running head: Using the Functional Information Processing Model (FIPM) Using the Functional Information Processing Model (FIPM) to Learn how a Library Catalog Works. Daniel A. Sabol Teachers College, Columbia

More information

Mining Frequent Itemsets for data streams over Weighted Sliding Windows

Mining Frequent Itemsets for data streams over Weighted Sliding Windows Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology

More information

Approach Research of Keyword Extraction Based on Web Pages Document

Approach Research of Keyword Extraction Based on Web Pages Document 2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 Approach Research Keyword Extraction Based on Web Pages Document Yangxin

More information

FaMa-OVM: A Tool for the Automated Analysis of OVMs

FaMa-OVM: A Tool for the Automated Analysis of OVMs FaMa-OVM: A Tool for the Automated Analysis of OVMs Fabricia Roos-Frantz, José A. Galindo, David Benavides and Antonio Ruiz-Cortés University of Seville 41012 Seville, Spain {fabriciaroos,jagalindo,benavides,aruiz}@us.es

More information

DIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY

DIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY DIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY Reham I. Abdel Monem 1, Ali H. El-Bastawissy 2 and Mohamed M. Elwakil 3 1 Information Systems Department, Faculty of computers and information,

More information

A Taxonomy of Variability in Web Service Flows

A Taxonomy of Variability in Web Service Flows A Taxonomy of Variability in Web Service Flows Sergio Segura, David Benavides, Antonio Ruiz-Cortés and Pablo Trinidad Department of Computer Languages and Systems University of Seville email:{segura, benavides,

More information

Plus Your Business - Google+ Posts, Events and Photos Google+ Posts, Events and Photos

Plus Your Business - Google+ Posts, Events and Photos Google+ Posts, Events and Photos Google+ Posts, Events and Photos www.plusyourbusiness.com Page 1 Google+ Posts, Events and Photos Your Content and your Profile Google+ Posts Adding text to an image Other features from the Google Post

More information

ISSUES IN INFORMATION RETRIEVAL Brian Vickery. Presentation at ISKO meeting on June 26, 2008 At University College, London

ISSUES IN INFORMATION RETRIEVAL Brian Vickery. Presentation at ISKO meeting on June 26, 2008 At University College, London ISSUES IN INFORMATION RETRIEVAL Brian Vickery Presentation at ISKO meeting on June 26, 2008 At University College, London NEEDLE IN HAYSTACK MY BACKGROUND Plant chemist, then reports librarian Librarian,

More information

AS Computer Science. Induction task 1: Definitions Induction task 2: System & Application software Induction task 3: Past paper questions

AS Computer Science. Induction task 1: Definitions Induction task 2: System & Application software Induction task 3: Past paper questions AS Computer Science Induction task 1: Definitions Induction task 2: System & Application software Induction task 3: Past paper questions We are pleased you have chosen to study Computer Science AS level.

More information

Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment.

Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. SOFTWARE ENGINEERING SOFTWARE RELIABILITY Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. LEARNING OBJECTIVES

More information

With IBM BPM 8.5.5, the features needed to express both BPM solutions and case management oriented solutions comes together in one offering.

With IBM BPM 8.5.5, the features needed to express both BPM solutions and case management oriented solutions comes together in one offering. Case Management With the release of IBM BPM 8.5.5, case management capabilities were added to the product. It must be noted that these functions are only available with IBM BPM Advanced and the Basic Case

More information

Efficient Case Based Feature Construction

Efficient Case Based Feature Construction Efficient Case Based Feature Construction Ingo Mierswa and Michael Wurst Artificial Intelligence Unit,Department of Computer Science, University of Dortmund, Germany {mierswa, wurst}@ls8.cs.uni-dortmund.de

More information

Saving Internet Searches and Resources

Saving Internet Searches and Resources Saving Internet Searches and Resources You and your students will find many resources on the Internet. Sometimes there is a graphic that is perfect for a presentation or project. Or, there may be some

More information

Hello, welcome to creating a widget in MyUW. We only have 300 seconds, so let s get going.

Hello, welcome to creating a widget in MyUW. We only have 300 seconds, so let s get going. Hello, welcome to creating a widget in MyUW. We only have 300 seconds, so let s get going. And I ve included a slide about me. You might wonder why, since I only have five minutes, but don t worry. Widgets

More information

ITSS Model Curriculum. - To get level 3 -

ITSS Model Curriculum. - To get level 3 - ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company

More information

UNDERGRADUATE PROJECT REVIEW REPORT

UNDERGRADUATE PROJECT REVIEW REPORT NAPIER UNIVERSITY SCHOOL OF COMPUTING UNDERGRADUATE PROJECT REVIEW REPORT 1. Student details Name: COLAS Bertrand Matriculation no: 00279226 Programme: Beng CNDS Email Address: bertrand_colas@hotmail.com

More information

security mindfulness dwayne.

security mindfulness dwayne. security mindfulness dwayne. foley@eagledream.com security mindfulness defined - the quality or state of being aware that you need to build security into your daily practice -the secure state achieved

More information

System Process Document Process SAP. Department Responsibility/Role File Name Revision Document Generation Date Date Modified. Process SAP Trigger:

System Process Document Process SAP. Department Responsibility/Role File Name Revision Document Generation Date Date Modified. Process SAP Trigger: Department Responsibility/Role File Name Revision Document Generation Date Date Modified 2/11/2015 1:20:00 PM Last Changed by aswade, 11/18 Status Sent for Review 11/27 _SPD_20141118151927 11/18/2014 3:19:00

More information

Design A Database Schema For A Hospital

Design A Database Schema For A Hospital Design A Database Schema For A Hospital Information System Databases for Clinical Information Systems are difficult to design and implement, but how to query the data and use it for healthcare (documentation,

More information

Tip: +SmartHand Configuration Trouble Shooting Guide Date:

Tip: +SmartHand Configuration Trouble Shooting Guide Date: Hi All, I decided to document this trouble shooting guide for the +Smarthand Mobile as I had three problems to solve before I could get the +Smarthand to work on different computers that I have. I also

More information

Introduction C H A P T E R1. Exercises

Introduction C H A P T E R1. Exercises C H A P T E R1 Introduction Chapter 1 provides a general overview of the nature and purpose of database systems. The most important concept in this chapter is that database systems allow data to be treated

More information

Model Transformation Testing Challenges

Model Transformation Testing Challenges Model Transformation Testing Challenges Benoit Baudry 1, Trung Dinh-Trong 2, Jean-Marie Mottu 1, Devon Simmonds 2, Robert France 2, Sudipto Ghosh 2, Franck Fleurey 1, Yves Le Traon 3 1 IRISA, Campus Beaulieu,

More information

Fault Localization for Firewall Policies

Fault Localization for Firewall Policies Fault Localization for Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen Alex X. Liu 1 Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86 Department of Computer Science

More information

Design Verification. Review of PSP Levels Overview Selecting Verification Methods Design Standards Verification Methods

Design Verification. Review of PSP Levels Overview Selecting Verification Methods Design Standards Verification Methods Design Verification Humphrey Ch. 12 - slide 1 Outline Review of PSP Levels Overview Selecting Verification Methods Design Standards Verification Methods Approaches State Machines Program Tracing Program

More information

[Product] MTM Program Product Software Requirements Specification

[Product] MTM Program Product Software Requirements Specification [Product] Software Requirements Specification [Version Number] [Version Date] [Product] MTM Program Product Software Requirements Specification [SRS Version Number] [SRS Version Date] [Applying MTM SRS

More information

Security Research for Software Defined Network

Security Research for Software Defined Network , pp.87-93 http://dx.doi.org/10.14257/astl.2016.134.15 Security Research for Software Defined Network 1 Jianfei Zhou, 2 Na Liu 1 Admission and Employment Office, Chongqing Industry Polytechnic College

More information

Application Testability for Fault Detection Using Dependency Structure Algorithm

Application Testability for Fault Detection Using Dependency Structure Algorithm Application Testability for Fault Detection Using Dependency Structure Algorithm 1 Shah Ubaid Nisar, 2 T. S. Shiny. Angel 1 M.Tech Student, 2 Assistant Professor (O.G) Department of Software Engineering,

More information

Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query

Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query Takuya Funahashi and Hayato Yamana Computer Science and Engineering Div., Waseda University, 3-4-1

More information

A Review on Identifying the Main Content From Web Pages

A Review on Identifying the Main Content From Web Pages A Review on Identifying the Main Content From Web Pages Madhura R. Kaddu 1, Dr. R. B. Kulkarni 2 1, 2 Department of Computer Scienece and Engineering, Walchand Institute of Technology, Solapur University,

More information

A METHOD FOR CONTENT-BASED SEARCHING OF 3D MODEL DATABASES

A METHOD FOR CONTENT-BASED SEARCHING OF 3D MODEL DATABASES A METHOD FOR CONTENT-BASED SEARCHING OF 3D MODEL DATABASES Jiale Wang *, Hongming Cai 2 and Yuanjun He * Department of Computer Science & Technology, Shanghai Jiaotong University, China Email: wjl8026@yahoo.com.cn

More information

Build a Company List

Build a Company List Build a Company List Build a Company List Let s look at how to build a list of companies associated with renewable energy using the Conceptual Search How would you perform this search? Consider who you

More information

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1 ForeScout CounterACT Core Extensions Module: DHCP Classifier Plugin Version 2.1 Table of Contents About the DHCP Classifier Plugin... 3 What to Do... 3 Requirements... 3 Verify That the Plugin Is Running...

More information

GUI Development in TDD Model Case Study

GUI Development in TDD Model Case Study GUI Development in TDD Model Case Study Sowmya Dhandapani* Broadcom Limited, Bangalore, India. * Corresponding author. Email: sowmya.dhandapani.1979@ieee.org Manuscript submitted May 17, 2016; accepted

More information

Lecture 8 Requirements Engineering

Lecture 8 Requirements Engineering Lecture 8 Requirements Engineering Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 18, 2008 Lecture Overview

More information

Instructions for Completing a Key Leadership Position Joint Qualification Board Application

Instructions for Completing a Key Leadership Position Joint Qualification Board Application Instructions for Completing a Key Leadership Position Joint Qualification Board Application This guide provides instructions for completing the Key Leadership Position (KLP) Joint Qualification Board Application.

More information

Writing Valuable Requirements: From Personas to Use Cases and User Stories

Writing Valuable Requirements: From Personas to Use Cases and User Stories Writing Valuable Requirements: From Personas to Use Cases and User Stories Mattias Arvola SICS East Swedish ICT Department of Computer and Information Science mattias.arvola@liu.se 3 Value in Use The

More information

2. An implementation-ready data model needn't necessarily contain enforceable rules to guarantee the integrity of the data.

2. An implementation-ready data model needn't necessarily contain enforceable rules to guarantee the integrity of the data. Test bank for Database Systems Design Implementation and Management 11th Edition by Carlos Coronel,Steven Morris Link full download test bank: http://testbankcollection.com/download/test-bank-for-database-systemsdesign-implementation-and-management-11th-edition-by-coronelmorris/

More information

Requirements Engineering for Enterprise Systems

Requirements Engineering for Enterprise Systems Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Requirements Engineering for Enterprise Systems

More information

Three-Dimensional Feature Diagrams Visualization

Three-Dimensional Feature Diagrams Visualization Three-Dimensional Feature Diagrams Visualization Pablo Trinidad, Antonio Ruiz Cortés, David Benavides, Sergio Segura Dpto. Lenguajes y Sistemas Informáticos University of Seville {ptrinidad,aruiz,benavides,sergiosegura}

More information

Predicting Metamorphic Relations for Testing Scientific Software: A Machine Learning Approach Using Graph Kernels

Predicting Metamorphic Relations for Testing Scientific Software: A Machine Learning Approach Using Graph Kernels SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2014; 00:1 25 Published online in Wiley InterScience (www.interscience.wiley.com). Predicting Metamorphic Relations for Testing

More information

Case Studies on the Selection of Useful Relations in Metamorphic Testing

Case Studies on the Selection of Useful Relations in Metamorphic Testing Case Studies on the Selection of Useful Relations in Metamorphic Testing T. Y. Chen 1, D. H. Huang 1, T. H. Tse 2, and Zhi Quan Zhou 1 1 School of Information Technology, Swinburne University of Technology,

More information

Applying the Semantic Web Layers to Access Control

Applying the Semantic Web Layers to Access Control J. Lopez, A. Mana, J. maria troya, and M. Yague, Applying the Semantic Web Layers to Access Control, IEEE International Workshop on Web Semantics (WebS03), pp. 622-626, 2003. NICS Lab. Publications: https://www.nics.uma.es/publications

More information

Integrating Software Lifecycle Models into a uniform Software Engineering Model

Integrating Software Lifecycle Models into a uniform Software Engineering Model Integrating Software Lifecycle Models into a uniform Software Engineering Model Jonas Helming Technische Universitaet Muenchen Department of Computer Science Chair for Applied Software Engineering Bolzmannstraße

More information