Search results for "Software verification"

showing 10 items of 24 documents

Reference Standards for Software Evaluation

1990

AbstractThe field of automated ECG analysis was one of the earliest topics in Medical Informatics and may be regarded as a model both for computer-assisted medical diagnosis and for evaluating medical diagnostic programs. The CSE project has set reference standards of two kinds: In a broad sense, a standard how to perform a comprehensive evaluation study, in a narrow sense, standards as specific references for evaluating computer ECG programs. The evaluation methodology used within the CSE project is described as a basis for presentation of results which are published elsewhere in this issue.

Advanced and Specialized NursingSoftware Evaluationbusiness.industrymedia_common.quotation_subjectHealth InformaticsHealth informaticsField (computer science)Set (abstract data type)PresentationHealth Information ManagementMedicineSoftware verification and validationMedical diagnosisSoftware engineeringbusinessReference standardsmedia_commonMethods of Information in Medicine
researchProduct

Asynchronous Runtime Verification of Business Processes

2015

The authors propose a runtime verification mechanism for business processes. This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly. The authors have identified the case where the use of business process runtime verification is helpful and applicable. The verification mechanism monitors the business process execution and verifies compliance with the base process description. The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated.

Business Process Model and NotationHigh-level verificationFunctional verificationbusiness.industryComputer scienceDistributed computingRuntime verificationVerificationBusiness process modelingSoftware engineeringbusinessSoftware verificationIntelligent verification2015 7th International Conference on Computational Intelligence, Communication Systems and Networks
researchProduct

An Information Systems Design Product Theory for Software Project Estimation and Measurement Systems

2009

There is relatively little research on software Project Estimation and Measurement Systems (PEMS). Commercial PEMS vary in functionality and effective- ness. Their intended users thus do not know what to ex- pect from PEMS and how to evaluate them. This paper creates an information system design product theory for the class of PEMS that prescribes the meta-requirements, the meta-design, and applicable theories for all products within the class. Meta-requirements and the meta-design are derived from the project estimation and measurement literature, experiences obtained during more than ten years of empirical work in Finnish Software Measurement Association, and a commercially available PEMS.

COSMIC software sizingComputer scienceSoftware walkthroughSoftware peer reviewSoftware development processSoftware analyticsSoftwareSoftware sizingSoftware systemSoftware verification and validationSoftware measurementSoftware design descriptionEstimationSocial software engineeringbusiness.industrySoftware developmentSoftware metricSoftware deploymentSystems development life cyclePersonal software processSoftware constructionSoftware designPackage development processSoftware engineeringbusinessSoftware project management2009 42nd Hawaii International Conference on System Sciences
researchProduct

iOS Applications Testing

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Mobile applications conquer the world, but iOS devices hold the major share of tablets market among the corporate workers. This study aims to identify the aspects (i.e. features and/ or limitations) that influence the testing of the native iOS applications. The aspects related to general mobile applications testing are identified through the systematic literature review of academic sources. iOS applications testing aspects are identified through the review of non-academic (multivocal) literature sources. The identified aspects are merged and discussed in detail using the reviewed sources and based on the author’s professional expe…

Computer sciencemedia_common.quotation_subjectMobile computingData scienceSoftware qualityiOS application; mobile application; testing; quality; verification and validation; systematic literature review;World Wide WebSystematic reviewiOS applications; mobile computing; software testing; software qualityOrder (exchange)Software testingQuality (business)Software verification and validationmedia_common
researchProduct

Applying a Data Quality Model to Experiments in Software Engineering

2014

Data collection and analysis are key artifacts in any software engineering experiment. However, these data might contain errors. We propose a Data Quality model specific to data obtained from software engineering experiments, which provides a framework for analyzing and improving these data. We apply the model to two controlled experiments, which results in the discovery of data quality problems that need to be addressed. We conclude that data quality issues have to be considered before obtaining the experimental results.

Data collectionSoftware sizingbusiness.industryComputer scienceData qualitySoftware constructionSoftware verification and validationComputer-aided engineeringbusinessSoftware engineeringSoftware verificationData modeling
researchProduct

QUALITY SYSTEM FOR PRODUCTION SOFTWARE (QSPS): AN INNOVATIVE APPROACH TO IMPROVE THE QUALITY OF PRODUCTION SOFTWARE

2013

A quality system for production software should be part of the quality management system of an organization and can be expressed as objectives in the form of processes, procedures, tools and responsibilities, designed and developed to fulfil the quality requirements. These usually are addressing the customers (external or internal), compliance with standards (effectiveness) waste reduction and better use of resources (efficiency) for continual improvement. Such systems are designed according to the requirements of the standards for quality management, software engineering and information security. Quality systems themselves could not provide all necessary means for driving the organization…

EngineeringProcess managementComputer Networks and Communicationsbusiness.industrySoftware developmentComputer Graphics and Computer-Aided DesignSoftware qualityArtificial IntelligenceSoftware sizingSoftware constructionSoftware quality analystSoftware quality managementSoftware verification and validationSoftware engineeringbusinessSoftwareSoftware quality controlInternational Journal of Software Engineering and Knowledge Engineering
researchProduct

Technical assessment and evaluation of environmental models and software: Letter to the Editor

2011

International audience; This letter details the collective views of a number of independent researchers on the technical assessment and evaluation of environmental models and software. The purpose is to stimulate debate and initiate action that leads to an improved quality of model development and evaluation, so increasing the capacity for models to have positive outcomes from their use. As such, we emphasize the relationship between the model evaluation process and credibility with stakeholders (including funding agencies) with a view to ensure continued support for modelling efforts. Many journals, including EM&S, publish the results of environmental modelling studies and must judge the w…

Environmental impact analysis--Software--EvaluationEnvironmental Engineering010504 meteorology & atmospheric sciencesComputer scienceProcess (engineering)[SDV]Life Sciences [q-bio]Best practicemedia_common.quotation_subject0207 environmental engineeringEnvironmental modelling02 engineering and technology01 natural sciencesEnvironmental impact analysis--Computer simulation--EvaluationModel credibilitySoftware verificationCredibilityEnvironmental impact assessmentQuality (business)Environmental software020701 environmental engineeringModel evaluationPublication0105 earth and related environmental sciencesmedia_commonEnvironmental sciences--Computer simulation--EvaluationSettore ICAR/03 - Ingegneria Sanitaria-AmbientaleEnvironmental assessmentManagement sciencebusiness.industryEcological ModelingAction (philosophy)Risk analysis (engineering)Environmental sciences--Software--EvaluationbusinessSoftwareSoftware verificationEnvironmental Modelling & Software
researchProduct

Sequentializing Parameterized Programs

2012

We exhibit assertion-preserving (reachability preserving) transformations from parameterized concurrent shared-memory programs, under a k-round scheduling of processes, to sequential programs. The salient feature of the sequential program is that it tracks the local variables of only one thread at any point, and uses only O(k) copies of shared variables (it does not use extra counters, not even one counter to keep track of the number of threads). Sequentialization is achieved using the concept of a linear interface that captures the effect an unbounded block of processes have on the shared state in a k-round schedule. Our transformation utilizes linear interfaces to sequentialize the progra…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceScheduleComputer scienceD.2.4;F.3.1Interface (computing)Parameterized complexitymodel-checking02 engineering and technologyThread (computing)computer.software_genrelcsh:QA75.5-76.95parameterized programsComputer Science - Software Engineeringsoftware verification0202 electrical engineering electronic engineering information engineeringBlock (data storage)Programming languagelcsh:MathematicsD.2.4Local variable020207 software engineeringlcsh:QA1-939Logic in Computer Science (cs.LO)Software Engineering (cs.SE)Transformation (function)model-checking; software verification; parameterized programs020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceState (computer science)F.3.1computerElectronic Proceedings in Theoretical Computer Science
researchProduct

A platform for the development and the validation of HW IP components starting from reference software specifications

2008

Abstract Signal processing algorithms become more and more efficient as a result of the developments of new standards. It is particularly true in the field video compression. However, at each improvement in efficiency and functionality, the complexity of the algorithms is also increasing. Textual specifications, that in the past were the original form of specifications, have been substituted by reference software which became the starting point of any design flow leading to implementation. Therefore, designing an embedded application has become equivalent to port a generic software on a, possibly heterogeneous, embedded platform. Such operation is getting more and more difficult because of …

General Computer ScienceComputer sciencelcsh:TK7800-836002 engineering and technologycomputer.software_genre0202 electrical engineering electronic engineering information engineeringSoftware verification and validation[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsSoftware design descriptionComputingMilieux_MISCELLANEOUSbusiness.industrylcsh:ElectronicsACMSoftware development020202 computer hardware & architectureSoftware frameworkComputer architectureControl and Systems EngineeringEmbedded systemSoftware constructionComponent-based software engineeringSoftware designAvionics software020201 artificial intelligence & image processing[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsbusinesscomputerComputer Science(all)
researchProduct

An integrated identity verification system for mobile terminals

2005

PurposeTo report the work on the design of an integrated identity verification system architecture aimed at approaching high verification accuracy, continuous security, and user‐friendliness.Design/methodology/approachThe reported research corresponds to the building process in the design science research paradigm. The requirements to an identity verification system are defined and used in the selection of architecture components. Furthermore, various issues affecting the suitability of component distribution between a terminal and a remote server are considered.FindingsIn order to meet the stated requirements, in the proposed architecture static and dynamic identity verification is combine…

High-level verificationFunctional verificationComputer sciencebusiness.industryRuntime verificationLibrary and Information SciencesManagement Science and Operations ResearchManagement Information SystemsIntelligent verificationEmbedded systemSystems architectureIdentity (object-oriented programming)VerificationBusiness and International ManagementbusinessSoftware verificationInformation Management & Computer Security
researchProduct