A Template-Based Approach to Describing Metamorphic Relations
|
|
- Ruby Long
- 5 years ago
- Views:
Transcription
1 A -Based Approach to Describing Metamorphic Relations Sergio Segura, Amador Durán, Javier Troya, Antonio Ruiz-Cortés Applied Software Engineering Group University of Seville Buenos Aires, MET 2017 Conclusions 1
2 Conclusions Number of Metamorphic Relations (MRs) presented in research papers 2
3 Lack of standards to describe MRs Most MRs are described informally using natural language. Key information about the MRs is sometimes omitted. Great variability in the way MRs are described. Let s use tables! 3
4 D-OSE Name Online search engines Description Online search engines Version 1 License URL Input 1 Input 2 Output 1 Name Domain Description Mandatory Name Domain Description Mandatory Name Domain Description Inputs Q String Search query Yes D String Site domain filter (introduced as a part of the query) No Outputs P List List of search results Program name Program description Program version Program license Program URL Parameter name Parameter domain Parameter description Parameter optionality Naming rules for subindexes Preconditions Examples MR-MPSite Context ID D-OSE Description Test search engine s reliability when retrieving Web pages that contain an exact word or phrase. Version 1 Source test case Inputs P A Q A Outputs Follow-up test case Inputs Q B, D B Outputs P B Preconditions 1 < P A 20 and 1 < P B 20 Input relation Q B = Q A and D B =d i being d i the domain of P A [i] with 1 i P A Output relation P A [i] in P B Example For example, let us test Google by issuing the following source query: "side effect of antibiotics in babies" Conclusions 4
5 User story As a <role>, I want <goal/desire> so that <benefit> Example: As a user, I want to indicate folders not to backup so that my backup drive isn't filled up with things I don't need. Goal Question Metric (GQM) Goal: <purpose, issue, object, viewpoint>, Question: <question(s)> Metric: <metric(s)> Example: Goal: Improve the timeliness of change request processing from the project manager's viewpoint. Question: What is the current change request processing speed? Metric: Average cycle time. 5
6 Empirical experiments Analyze <Object(s) of study>, for the purpose of <Purpose> with respect to <Quality focus> from the point of view of <Perspective> in the context of <Context> Example: Analyze the practice of mindfulness, for the purpose of evaluating its effects with respect to the performance of students in conceptual modelling from the point of view of the experimenters in the context of second-year students in the Degree in SE. These templates have something in common 6
7 Simplicity Flexibility Conclusions 7
8 In the domain of <application domain>, [where <context definition>] [assuming that <constraints>] the following metamorphic relation(s) should hold <metamorphic relation name 1 >: if <relation among inputs/outputs> then <relation among inputs/outputs> <metamorphic relation name n >: if <relation among inputs/outputs> then <relation among inputs/outputs> Let s see some examples 8
9 Examples Tsong Yueh Chen, Fei-Ching Kuo, Wenjuan Ma, Willy Susilo, Dave Towey, Jeffrey Voas, and Zhi Quan Zhou., "Metamorphic Testing for Cybersecurity," in Computer Examples Z. Q. Zhou, S. Xiang and T. Y. Chen, "Metamorphic Testing for Software Quality Assessment: A Study of Search Engines," in IEEE Transactions on Software Engineering
10 Examples Mikael Lindvall, Dharmalingam Ganesan, Sigurthor Bjorgvinsson, Kristjan Jonsson, Haukur Steinn Logason, Frederik Dietrich, and Robert E. Wiegand. Agile metamorphic model-based testing. In Proceedings of the 1st International Workshop on Metamorphic Testing (MET '16). Sergio Segura, Amador Durán, Ana B. Sánchez, Daniel Le Berre, Emmanuel Lonca and Antonio Ruiz-Cortés. Automated Metamorphic Testing of Variability Analysis Tools Software Testing, Verification and Reliability Validation Year Authors Title Domain #MRs 2002 T.Y. Chen et al. Metamorphic Testing of Programs on Partial Differential Equations: a Case Study Numerical programs T.H. Tse et al. Testing Context-Sensitive Middleware-Based Software Applications Embedded systems W.K. Chan et al 2010 K.Y. Sim et al X. Xie et al F.-C. Kuo et al. Finding failures from passed test cases: improving the pattern classification approach to the testing of mesh simplification programs Detecting Faults in Technical Indicator Computations for Financial Market Analysis Testing and validating machine learning classifiers by metamorphic testing Testing Embedded Software by Metamorphic Testing: a Wireless Metering System Case Study Computer graphics 3 Financial software 2 Machine learning 2 Embedded software S. Segura et al. Automated metamorphic testing of variability analysis tools Software variability Z.Q. Zhou et al. Metamorphic Testing for Software Quality Assessment: A Study of Search Engines Search database T.Y. Chen et al. Metamorphic Testing for Cybersecurity Cybersecurity M. Lindvall et al. Agile Metamorphic Model-based Testing Search database 2 Total 17 10
11 specification Versioned technical report LaTeX template Conclusions 11
12 Conclusions Thanks! 12
ICSE MET 17 Keynote. Metamorphic Testing: Beyond Testing Numerical Computations
ICSE MET 17 Keynote Metamorphic Testing: Beyond Testing Numerical Computations Dr. Zhi Quan (George) Zhou Associate Professor University of Wollongong Australia zhiquan@uow.edu.au 1 Why this topic? Observation:
More informationSmarTest: Accelerating the detection of faults in Drupal
SmarTest: Accelerating the detection of faults in Drupal Ana Belén Sánchez http://www.isa.us.es/members/anabelen.sanchez Ana Belén Sánchez, Sergio Segura, Antonio Ruiz-Cortés, Gabriel Hidalgo I am a researcher
More informationImproving software testing cost-effectiveness through dynamic partitioning
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2009 Improving software testing cost-effectiveness through dynamic partitioning
More informationRead Naturally SE Update Windows Network Installation Instructions
Windows Network This document explains how to apply the Read Naturally Software Edition 2.0.3 update to existing installations of SE version 2.0, 2.0.1, or 2.0.2. First update the SE server software, and
More informationFeature Model to Orthogonal Variability Model Transformation towards Interoperability between Tools
Feature Model to Orthogonal Variability Model Transformation towards Interoperability between Tools Fabricia Roos-Frantz 1, David Benavides 2 and Antonio Ruiz-Cortés 2 1 Unijuí, Departmento de Tecnologia
More informationμmt: A Data Mutation Directed Metamorphic Relation Acquisition Methodology
1 st International Workshop on Metamorphic Testing (MET 2016) In conjunction with ICSE 2016, Austin, TX, May 16, 2016 μmt: A Data Mutation Directed Metamorphic Relation Acquisition Methodology Chang-ai
More informationWORKSHOP. Writing User Stories
WORKSHOP Writing User Stories contents SECTION 1 user stories what is a user story? 4 user story template 5 examples: user stories 6 user story checklist 7 why not tasks? 8 SECTION 2 writing acceptance
More informationArchitecture of models in testing how models of various abstraction levels relate to each other
1 (10) Matti Vuori, 20.6.2013 RATA project report Architecture of models in testing how models of various abstraction levels relate to each other Contents 1. Introduction... 2 2. Generic architecture of
More informationField Explorer: Multimedia Data Management-Sharing System For Enhancing Student s Fieldwork Activities
Field Explorer: Multimedia Data Management-Sharing System For Enhancing Student s Fieldwork Activities Yosuke TSUCHIYA 3 rd Year Ph.D course, Graduate School of Media and Governance Keio University, SFC.
More informationExperience-based Refactoring for Goal- oriented Software Quality Improvement
Experience-based Refactoring for Goal- oriented Software Quality Improvement International Workshop on Software Quality (SOQUA 2004) Erfurt,, Germany, September 30, 2004 Fraunhofer IESE Institut Experimentelles
More informationAutomatically Identifying and Georeferencing Street Maps on the Web
Automatically Identifying and Georeferencing Street Maps on the Web Sneha Desai, Craig A. Knoblock, Yao-Yi Yi Chiang, Ching-Chien Chien Chen and Kandarp Desai University of Southern California Department
More informationImplementation of Metamorphic Testing on Spreadsheet Applications
Vol.3, Issue.2, March-April. 2013 pp-990-995 ISSN: 2249-6645 Implementation of Metamorphic Testing on Spreadsheet Applications Balinder Singh Abstract: End-user programmers do not have broad knowledge
More informationAutomatic Query Type Identification Based on Click Through Information
Automatic Query Type Identification Based on Click Through Information Yiqun Liu 1,MinZhang 1,LiyunRu 2, and Shaoping Ma 1 1 State Key Lab of Intelligent Tech. & Sys., Tsinghua University, Beijing, China
More informationCaseComplete Roadmap
CaseComplete Roadmap Copyright 2004-2014 Serlio Software Development Corporation Contents Get started... 1 Create a project... 1 Set the vision and scope... 1 Brainstorm for primary actors and their goals...
More informationDatabase Systems: Design, Implementation, and Management Tenth Edition. Chapter 4 Entity Relationship (ER) Modeling
Database Systems: Design, Implementation, and Management Tenth Edition Chapter 4 Entity Relationship (ER) Modeling Objectives In this chapter, students will learn: The main characteristics of entity relationship
More informationMetamorphic Testing and Beyond
Postprint of article in Proceedings of the International Workshop on Software Technology and Engineering Practice (STEP 03), IEEE Computer Society, Los Alamitos, CA, pp. pp. 94 100 (2004) Metamorphic Testing
More informationModel-Based Systems Engineering: Documentation and Analysis
Week 1: What Is MBSE? Project Name Jane Doe 1 Instructions Before you begin, you should save your Project Portfolio on your local drive. We recommend the following format: Lastname_Firstname_Course3_Week1
More informationDatabase Principles: Fundamentals of Design, Implementation, and Management Tenth Edition. Chapter 7 Data Modeling with Entity Relationship Diagrams
Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition Chapter 7 Data Modeling with Entity Relationship Diagrams Objectives In this chapter, students will learn: The
More informationConfiguration Testing of Flight Software
Configuration Testing of Flight Software Charles Song Dharmalingam Ganesan Mikael Lindvall Fraunhofer USA Center for Experimental Software Engineering David McComas Nicholas Yanchik Alan Cudmore Steve
More informationSetting up Flickr. Open a web browser such as Internet Explorer and type this url in the address bar.
Workshop 15 th July 2008 Page 1 http://blog.larkin.net.au/ Setting up Flickr Flickr is a photo sharing tool that has rich functionality and allows the public to share their photographs with others., It
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationHow do archivists identify and capture records?
QUESTION How do archivists identify and capture records? AUTOMATED SYSTEMS MEETING THE CHALLENGE Critical Skill Set: Information System Analysis and Design Skills Being able to create conceptual models
More informationNetworking technologies Unit number: 15 Level: 4 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/0472.
Unit title: Networking technologies Unit number: 15 Level: 4 Credit value: 15 Guided learning hours: 60 Unit reference number: M/601/0472 UNIT AIM AND PURPOSE This unit will enable learners to understand
More informationSynwaySMS SMS Center. User Manual
SynwaySMS SMS Center User Manual Version: 1.0.0.0 Synway Information Engineering Co., Ltd Content Content... 1 1 Brief Introduction... 2 2 SynwaySMS Installation... 3 3 SynwaySMS Management... 7 3.1 Login...
More informationPaceamker Basic Math. Correlated to. Alaska Math Grade Level Expectations For Eighth Grade
Paceamker Basic Math Alaska Math Grade Level Expectations 1 Numeration Performance Standards M1.3.1 Read, write, model, and order real numbers, explaining scientific notation, exponents, and percents.
More informationThe Human Factors of Security Misconfigurations
CONSTANZE DIETRICH LEXTA Consultants Group [@WeddingTrash // constanze.dietrich@lexta.com] 77th RIPE Meeting, Plenary Session, 16 October 2018 The Human Factors of Security Misconfigurations Let s Fix
More informationUsing Google Forms: A Tool for Gathering Information Susanna James David Thompson Secondary School February 19, 2015
Using Google Forms: A Tool for Gathering Information Susanna James David Thompson Secondary School February 19, 2015 What is Google Forms? Tool to collect and manage information Easy to use Collaborative
More informationUsing a Goal-Driven Approach to Structure User Story Sets
Using a Goal-Driven Approach to Structure User Story Sets UU/SIKS Symposium on Natural Language in Requirements Engineering Yves Wautelet KU Leuven Background: User Stories as Artefacts for Requirements
More informationImplementing a security metrics dashboard in Telefónica España
Implementing a security metrics dashboard in Telefónica España Vicente Segura (vsg@tid.es) Date: 1/14/2009 4th ETSI Security Workshop 14 January 2009 - ETSI, Sophia Antipolis, France Index 01 Introduction
More informationBasic Troubleshooting Process for Operating Systems
Basic Troubleshooting Process for Operating Systems Applying the Troubleshooting Process to Operating Systems OS problems can result from a combination of hardware, software, and network issues. Computer
More informationAbductive Reasoning and Automated Analysis of Feature Models: How are they connected?
Abductive Reasoning and Automated Analysis of Feature Models: How are they connected? Pablo Trinidad, Antonio Ruiz Cortés Dpto. Lenguajes y Sistemas Informáticos University of Seville {ptrinidad,aruiz}
More informationThe entity is an object of interest to the end user. entity correspond to the table not to a row- in the relational environment.
THE ENTITY RELATIONSHIP MODEL(ERM)ENTITIES The entity is an object of interest to the end user. entity correspond to the table not to a row- in the relational environment. ATTRIBUTES Attributes are characteristics
More informationAn Environment for Training Computer Science Students on Software Testing
An Environment for Training Computer Science Students on Software Testing Jim Collofello and Kalpana Vehathiri Department of Computer Science and Engineering, Arizona State University Tempe, Arizona 85287
More informationInternational Journal of Advanced Research in. Computer Science and Engineering
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Design and Architecture
More informationImporting Career Standards Benchmark Scores
Importing Career Standards Benchmark Scores The Career Standards Benchmark assessments that are reported on the PIMS Student Fact Template for Career Standards Benchmarks can be imported en masse using
More informationIntroduction to REM 1.2.2
9/29/2015 Introduction to REM 1.2.2 Software Engineering and Databases Group Department of Computer Languages and Systems University of Seville La traducción de este material docente ha sido financiada
More informationBeTTy: Benchmarking and Testing on the Automated Analysis of Feature Models
BeTTy: Benchmarking and Testing on the Automated Analysis of Feature Models Sergio Segura, José A. Galindo, David Benavides, José A. Parejo and Antonio Ruiz-Cortés Department of Computer Languages and
More informationAP Computer Science Principles: Problem Set 1
AP Computer Science Principles: Problem Set 1 Due date: Friday, September 8, 2017 Instructor: Mr. Alwin Tareen Task Overview Setting up the KeePass password manager for Windows and Mac OS. Linux users
More informationSemi-proving: An integrated method for program proving, testing, and debugging
Title Semi-proving: An integrated method for program proving, testing, and debugging Author(s) Chen, TY; Tse, TH; Zhou, ZQ Citation Ieee Transactions On Software Engineering, 2011, v. 37 n. 1, p. 109-125
More informationApplication in a Systems Design Environment. EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering
Application in a Systems Design Environment EE 498/499 Capstone Design Classes Klipsch School of Electrical & Computer Engineering Purpose The formal design process in the other notes can be applied to
More informationWriting Bug Reports & utest Etiquette
Writing Bug Reports & utest Etiquette Presented by Nicola Sedgwick June 20, 2012 Agenda 1. What makes a good bug report? 2. Bug Titles 3. Reproduction steps 4. Bug attachments 5. utest etiquette 6. A bug
More informationData, Information, and Databases
Data, Information, and Databases BDIS 6.1 Topics Covered Information types: transactional vsanalytical Five characteristics of information quality Database versus a DBMS RDBMS: advantages and terminology
More informationMetamorphic Testing and Its Applications
To appear in Proceedings of the 8th International Symposium on Future Software Technology (ISFST 2004), Software Engineers Association, Japan (2004) Metamorphic Testing and Its Applications Zhi Quan Zhou,
More informationKernels and Clustering
Kernels and Clustering Robert Platt Northeastern University All slides in this file are adapted from CS188 UC Berkeley Case-Based Learning Non-Separable Data Case-Based Reasoning Classification from similarity
More informationLecture 6: Requirements Engineering
Lecture 6: Requirements Engineering Software System Design and Implementation ITCS/ITIS 6112/8112 001 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte
More informationFault Class Prioritization in Boolean Expressions
Fault Class Prioritization in Boolean Expressions Ziyuan Wang 1,2 Zhenyu Chen 1 Tsong-Yueh Chen 3 Baowen Xu 1,2 1 State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093,
More informationAchieving Right Automation Balance in Agile Projects
Achieving Right Automation Balance in Agile Projects Vijayagopal Narayanan Vijayagopal.n@cognizant.com Abstract When is testing complete and How much testing is sufficient is a fundamental questions that
More informationBackup Manual Joomla 2.5 Extension Development
Backup Manual Joomla 2.5 Extension Development The following are step by step instructions to migrate your 2.5.x site to Joomla! You are encouraged to contact the developers of third-party extensions in
More informationDistributed Scheduling of Recording Tasks with Interconnected Servers
Distributed Scheduling of Recording Tasks with Interconnected Servers Sergios Soursos 1, George D. Stamoulis 1 and Theodoros Bozios 2 1 Department of Informatics, Athens University of Economics and Business
More informationCase studies of metamorphic tesing
University of Wollongong Research Online University of Wollongong Thesis Collection 2017+ University of Wollongong Thesis Collections 2017 Case studies of metamorphic tesing Wenjuan Ma University of Wollongong
More informationAn empirical study of user-perceived interoperability of Bluetooth devices
Master s Thesis Defense An empirical study of user-perceived interoperability of Bluetooth devices Manivannan Elangovan University of Kansas 6 th May 2005 Committee: Prof. Daniel Deavours Prof. Gary Minden
More informationAutomatic Identification of User Goals in Web Search [WWW 05]
Automatic Identification of User Goals in Web Search [WWW 05] UichinLee @ UCLA ZhenyuLiu @ UCLA JunghooCho @ UCLA Presenter: Emiran Curtmola@ UC San Diego CSE 291 4/29/2008 Need to improve the quality
More informationUNIGLOBE ProFILER Express
UNIGLOBE ProFILER Express UNIGLOBE Travel Electronic Traveller Profile System Version last updated 25 November 2016 UNIGLOBE Travel (UNIGLOBE) is pleased to provide eligible travellers with a very efficient
More informationRestricting Unauthorized Access Using Biometrics In Mobile
Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering
More informationBOCES Phase 1 Overview
ClassLink ClassMate 2012-13 BOCES Phase 1 Overview An Overview of How ClassMate Software will help your school to comply with NYSED s New SIRS Requirements Our technical staff will be working closely with
More informationImproved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning
Improved Classification of Known and Unknown Network Traffic Flows using Semi-Supervised Machine Learning Timothy Glennan, Christopher Leckie, Sarah M. Erfani Department of Computing and Information Systems,
More informationUsing the Functional Information Processing Model (FIPM) to Learn how a Library Catalog Works. Daniel A. Sabol Teachers College, Columbia University
Running head: Using the Functional Information Processing Model (FIPM) Using the Functional Information Processing Model (FIPM) to Learn how a Library Catalog Works. Daniel A. Sabol Teachers College, Columbia
More informationMining Frequent Itemsets for data streams over Weighted Sliding Windows
Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology
More informationApproach Research of Keyword Extraction Based on Web Pages Document
2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 Approach Research Keyword Extraction Based on Web Pages Document Yangxin
More informationFaMa-OVM: A Tool for the Automated Analysis of OVMs
FaMa-OVM: A Tool for the Automated Analysis of OVMs Fabricia Roos-Frantz, José A. Galindo, David Benavides and Antonio Ruiz-Cortés University of Seville 41012 Seville, Spain {fabriciaroos,jagalindo,benavides,aruiz}@us.es
More informationDIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY
DIRA : A FRAMEWORK OF DATA INTEGRATION USING DATA QUALITY Reham I. Abdel Monem 1, Ali H. El-Bastawissy 2 and Mohamed M. Elwakil 3 1 Information Systems Department, Faculty of computers and information,
More informationA Taxonomy of Variability in Web Service Flows
A Taxonomy of Variability in Web Service Flows Sergio Segura, David Benavides, Antonio Ruiz-Cortés and Pablo Trinidad Department of Computer Languages and Systems University of Seville email:{segura, benavides,
More informationPlus Your Business - Google+ Posts, Events and Photos Google+ Posts, Events and Photos
Google+ Posts, Events and Photos www.plusyourbusiness.com Page 1 Google+ Posts, Events and Photos Your Content and your Profile Google+ Posts Adding text to an image Other features from the Google Post
More informationISSUES IN INFORMATION RETRIEVAL Brian Vickery. Presentation at ISKO meeting on June 26, 2008 At University College, London
ISSUES IN INFORMATION RETRIEVAL Brian Vickery Presentation at ISKO meeting on June 26, 2008 At University College, London NEEDLE IN HAYSTACK MY BACKGROUND Plant chemist, then reports librarian Librarian,
More informationAS Computer Science. Induction task 1: Definitions Induction task 2: System & Application software Induction task 3: Past paper questions
AS Computer Science Induction task 1: Definitions Induction task 2: System & Application software Induction task 3: Past paper questions We are pleased you have chosen to study Computer Science AS level.
More informationSoftware reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment.
SOFTWARE ENGINEERING SOFTWARE RELIABILITY Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. LEARNING OBJECTIVES
More informationWith IBM BPM 8.5.5, the features needed to express both BPM solutions and case management oriented solutions comes together in one offering.
Case Management With the release of IBM BPM 8.5.5, case management capabilities were added to the product. It must be noted that these functions are only available with IBM BPM Advanced and the Basic Case
More informationEfficient Case Based Feature Construction
Efficient Case Based Feature Construction Ingo Mierswa and Michael Wurst Artificial Intelligence Unit,Department of Computer Science, University of Dortmund, Germany {mierswa, wurst}@ls8.cs.uni-dortmund.de
More informationSaving Internet Searches and Resources
Saving Internet Searches and Resources You and your students will find many resources on the Internet. Sometimes there is a graphic that is perfect for a presentation or project. Or, there may be some
More informationHello, welcome to creating a widget in MyUW. We only have 300 seconds, so let s get going.
Hello, welcome to creating a widget in MyUW. We only have 300 seconds, so let s get going. And I ve included a slide about me. You might wonder why, since I only have five minutes, but don t worry. Widgets
More informationITSS Model Curriculum. - To get level 3 -
ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company
More informationUNDERGRADUATE PROJECT REVIEW REPORT
NAPIER UNIVERSITY SCHOOL OF COMPUTING UNDERGRADUATE PROJECT REVIEW REPORT 1. Student details Name: COLAS Bertrand Matriculation no: 00279226 Programme: Beng CNDS Email Address: bertrand_colas@hotmail.com
More informationsecurity mindfulness dwayne.
security mindfulness dwayne. foley@eagledream.com security mindfulness defined - the quality or state of being aware that you need to build security into your daily practice -the secure state achieved
More informationSystem Process Document Process SAP. Department Responsibility/Role File Name Revision Document Generation Date Date Modified. Process SAP Trigger:
Department Responsibility/Role File Name Revision Document Generation Date Date Modified 2/11/2015 1:20:00 PM Last Changed by aswade, 11/18 Status Sent for Review 11/27 _SPD_20141118151927 11/18/2014 3:19:00
More informationDesign A Database Schema For A Hospital
Design A Database Schema For A Hospital Information System Databases for Clinical Information Systems are difficult to design and implement, but how to query the data and use it for healthcare (documentation,
More informationTip: +SmartHand Configuration Trouble Shooting Guide Date:
Hi All, I decided to document this trouble shooting guide for the +Smarthand Mobile as I had three problems to solve before I could get the +Smarthand to work on different computers that I have. I also
More informationIntroduction C H A P T E R1. Exercises
C H A P T E R1 Introduction Chapter 1 provides a general overview of the nature and purpose of database systems. The most important concept in this chapter is that database systems allow data to be treated
More informationModel Transformation Testing Challenges
Model Transformation Testing Challenges Benoit Baudry 1, Trung Dinh-Trong 2, Jean-Marie Mottu 1, Devon Simmonds 2, Robert France 2, Sudipto Ghosh 2, Franck Fleurey 1, Yves Le Traon 3 1 IRISA, Campus Beaulieu,
More informationFault Localization for Firewall Policies
Fault Localization for Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen Alex X. Liu 1 Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86 Department of Computer Science
More informationDesign Verification. Review of PSP Levels Overview Selecting Verification Methods Design Standards Verification Methods
Design Verification Humphrey Ch. 12 - slide 1 Outline Review of PSP Levels Overview Selecting Verification Methods Design Standards Verification Methods Approaches State Machines Program Tracing Program
More information[Product] MTM Program Product Software Requirements Specification
[Product] Software Requirements Specification [Version Number] [Version Date] [Product] MTM Program Product Software Requirements Specification [SRS Version Number] [SRS Version Date] [Applying MTM SRS
More informationSecurity Research for Software Defined Network
, pp.87-93 http://dx.doi.org/10.14257/astl.2016.134.15 Security Research for Software Defined Network 1 Jianfei Zhou, 2 Na Liu 1 Admission and Employment Office, Chongqing Industry Polytechnic College
More informationApplication Testability for Fault Detection Using Dependency Structure Algorithm
Application Testability for Fault Detection Using Dependency Structure Algorithm 1 Shah Ubaid Nisar, 2 T. S. Shiny. Angel 1 M.Tech Student, 2 Assistant Professor (O.G) Department of Software Engineering,
More informationReliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query
Reliability Verification of Search Engines Hit Counts: How to Select a Reliable Hit Count for a Query Takuya Funahashi and Hayato Yamana Computer Science and Engineering Div., Waseda University, 3-4-1
More informationA Review on Identifying the Main Content From Web Pages
A Review on Identifying the Main Content From Web Pages Madhura R. Kaddu 1, Dr. R. B. Kulkarni 2 1, 2 Department of Computer Scienece and Engineering, Walchand Institute of Technology, Solapur University,
More informationA METHOD FOR CONTENT-BASED SEARCHING OF 3D MODEL DATABASES
A METHOD FOR CONTENT-BASED SEARCHING OF 3D MODEL DATABASES Jiale Wang *, Hongming Cai 2 and Yuanjun He * Department of Computer Science & Technology, Shanghai Jiaotong University, China Email: wjl8026@yahoo.com.cn
More informationBuild a Company List
Build a Company List Build a Company List Let s look at how to build a list of companies associated with renewable energy using the Conceptual Search How would you perform this search? Consider who you
More informationForeScout CounterACT. Plugin. Configuration Guide. Version 2.1
ForeScout CounterACT Core Extensions Module: DHCP Classifier Plugin Version 2.1 Table of Contents About the DHCP Classifier Plugin... 3 What to Do... 3 Requirements... 3 Verify That the Plugin Is Running...
More informationGUI Development in TDD Model Case Study
GUI Development in TDD Model Case Study Sowmya Dhandapani* Broadcom Limited, Bangalore, India. * Corresponding author. Email: sowmya.dhandapani.1979@ieee.org Manuscript submitted May 17, 2016; accepted
More informationLecture 8 Requirements Engineering
Lecture 8 Requirements Engineering Software Engineering ITCS 3155 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte September 18, 2008 Lecture Overview
More informationInstructions for Completing a Key Leadership Position Joint Qualification Board Application
Instructions for Completing a Key Leadership Position Joint Qualification Board Application This guide provides instructions for completing the Key Leadership Position (KLP) Joint Qualification Board Application.
More informationWriting Valuable Requirements: From Personas to Use Cases and User Stories
Writing Valuable Requirements: From Personas to Use Cases and User Stories Mattias Arvola SICS East Swedish ICT Department of Computer and Information Science mattias.arvola@liu.se 3 Value in Use The
More information2. An implementation-ready data model needn't necessarily contain enforceable rules to guarantee the integrity of the data.
Test bank for Database Systems Design Implementation and Management 11th Edition by Carlos Coronel,Steven Morris Link full download test bank: http://testbankcollection.com/download/test-bank-for-database-systemsdesign-implementation-and-management-11th-edition-by-coronelmorris/
More informationRequirements Engineering for Enterprise Systems
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2001 Proceedings Americas Conference on Information Systems (AMCIS) December 2001 Requirements Engineering for Enterprise Systems
More informationThree-Dimensional Feature Diagrams Visualization
Three-Dimensional Feature Diagrams Visualization Pablo Trinidad, Antonio Ruiz Cortés, David Benavides, Sergio Segura Dpto. Lenguajes y Sistemas Informáticos University of Seville {ptrinidad,aruiz,benavides,sergiosegura}
More informationPredicting Metamorphic Relations for Testing Scientific Software: A Machine Learning Approach Using Graph Kernels
SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2014; 00:1 25 Published online in Wiley InterScience (www.interscience.wiley.com). Predicting Metamorphic Relations for Testing
More informationCase Studies on the Selection of Useful Relations in Metamorphic Testing
Case Studies on the Selection of Useful Relations in Metamorphic Testing T. Y. Chen 1, D. H. Huang 1, T. H. Tse 2, and Zhi Quan Zhou 1 1 School of Information Technology, Swinburne University of Technology,
More informationApplying the Semantic Web Layers to Access Control
J. Lopez, A. Mana, J. maria troya, and M. Yague, Applying the Semantic Web Layers to Access Control, IEEE International Workshop on Web Semantics (WebS03), pp. 622-626, 2003. NICS Lab. Publications: https://www.nics.uma.es/publications
More informationIntegrating Software Lifecycle Models into a uniform Software Engineering Model
Integrating Software Lifecycle Models into a uniform Software Engineering Model Jonas Helming Technische Universitaet Muenchen Department of Computer Science Chair for Applied Software Engineering Bolzmannstraße
More information