Search results for "verification"

showing 10 items of 104 documents

Verification of Symbolic Distributed Protocols for Networked Embedded Devices

2020

The availability of versatile and interconnected embedded devices makes it possible to build low-cost networks with a large number of nodes running even complex applications and protocols in a distributed manner. Common tools used for modeling and verification, such as simulators, present some limitations as application correctness is checked off-board and only focuses on source code. Execution in the real network is thus excluded from the early stages of design and verification. In this paper, a system for modeling and verification of symbolic distributed protocols running on embedded devices is introduced. The underlying methodology is rooted in a symbolic programming paradigm that makes …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingExecutable Code ExchangeSource codeCorrectnessbusiness.industryComputer scienceDistributed protocolSymbolic programmingmedia_common.quotation_subject020208 electrical & electronic engineering02 engineering and technologyResource (project management)Embedded system0202 electrical engineering electronic engineering information engineeringResource-constrained Device020201 artificial intelligence & image processingEmbedded SystemModeling and verificationDistributed applicationbusinessProtocol (object-oriented programming)media_commonAbstraction (linguistics)
researchProduct

ACCERTAMENTO E VERIFICHE DELL'HANDICAP

2013

Questo studio indaga il tema dell’accertamento e delle verifiche dell’handicap nel quadro delle novelle legislative che affidano all’Istituto Nazionale della Previdenza Sociale (Inps) la regia dell’intero sistema di accertamento. Uno spazio significativo è, inoltre, dedicato all’istituto dell’accertamento tecnico preven- tivo obbligatorio, importante strumento di deflazionamento del contenzioso previdenziale. This study explores the theme of assessment and verification of handicap in the contest of the legislative novels that make National Social Security Institute (Inps) run the entire system of assessment. A significant space is also dedicated to the institute of technical appraisal requi…

Settore IUS/01 - Diritto PrivatoHANDICAP ACCERTAMENTO E VERIFICHE DEL INPSHANDICAP ASSESSMENT AND VERIFICATION OF INPS
researchProduct

Radiation Hardness Assurance Through System-Level Testing: Risk Acceptance, Facility Requirements, Test Methodology, and Data Exploitation

2021

International audience; Functional verification schemes at a level different from component-level testing are emerging as a cost-effective tool for those space systems for which the risk associated with a lower level of assurance can be accepted. Despite the promising potential, system-level radiation testing can be applied to the functional verification of systems under restricted intrinsic boundaries. Most of them are related to the use of hadrons as opposed to heavy ions. Hadrons are preferred for the irradiation of any bulky system, in general, because of their deeper penetration capabilities. General guidelines about the test preparation and procedure for a high-level radiation test ar…

Small satelllitessmall satellitesComputer scienceRadiation effects02 engineering and technologytest methodology01 natural sciencesSpace missionsSpace explorationsystem-level testing0202 electrical engineering electronic engineering information engineeringRadiation hardeningTechnik [600]Reliability (statistics)avaruustekniikka[PHYS]Physics [physics]protonselektroniikkalaitteetrisk acceptance[PHYS.PHYS.PHYS-SPACE-PH]Physics [physics]/Physics [physics]/Space Physics [physics.space-ph]Commercial off-the-shelf (COTS)Test (assessment)facilitiesPerformance evaluationTotal ionizing doseSystem verificationtestmethodologyNuclear and High Energy Physicstotal ionizing dose (TID)0103 physical scienceselektroniikkaRadiation hardening (electronics)Electrical and Electronic Engineeringsingle-event effect (SEE)Functional verification010308 nuclear & particles physics600: Technikneutrons020206 networking & telecommunicationsTest methodSystem level testingReliability engineering[SPI.TRON]Engineering Sciences [physics]/ElectronicsNuclear Energy and EngineeringtestausmenetelmätsäteilyfysiikkaOrbit (dynamics)radiation hardness assurancejärjestelmätddc:600
researchProduct

Industrial Application and Evaluation of a Software Evolution Decision Model

2007

Social software engineeringEngineeringbusiness.industrySoftware deploymentLegacy systemSoftware constructionSoftware developmentSystems engineeringSoftware verification and validationbusinessDecision modelSoftware evolution
researchProduct

A modest but practical software process modeling technique for software process improvement

2002

One of the main problems with software engineering is due to the difficulties in evaluating and improving our software processes, especially in the light of the fact that reuse depends on a process which supports it. Generally used approaches to the evaluation and improvement of software processes are based on the CMM, for example. In this paper we present a technique to improve software processes through modeling and evaluation. The presented technique is fairly easy to use, provides reasonably good results and requires only a fraction of resources required by CMM appraisals. Copyright © 2002 John Wiley & Sons, Ltd.

Software Engineering Process GroupComputer sciencebusiness.industrySoftware developmentReliability engineeringSoftware sizingSoftware constructionPersonal software processGoal-Driven Software Development ProcessPackage development processSoftware verification and validationbusinessSoftware engineeringSoftwareSoftware Process: Improvement and Practice
researchProduct

Use of Non-IT Testers in Software Development

2007

Because of a shortage of IT specialists, many companies which are not involved in software development business are forced to use employees who have minimal or no any knowledge about software development and IT as testers (let's call them non-IT testers). The author of this paper has used years of experience in working with such testers to provide a description of them, looking also at their most typical testing styles and the problems which occur for testers, their colleagues and bosses, and the overall software development processes. Non-IT testers often feel like second-class employees, because they are forced to work in an environment in which they do not have sufficient skills. This pa…

Software development processTest strategyEngineeringWork (electrical)business.industrySoftware constructionSoftware developmentPackage development processSoftware verification and validationPair testingSoftware engineeringbusiness
researchProduct

A metrics suite for evaluating agent-oriented architectures

2010

The Multi-agent Systems (MASs) paradigm continues to consolidate itself as a new branch of software engineering. Traditional software engineering strongly recommends to apply metrics in software developments. However, several research groups of experts in agent-oriented software engineering agree that classical software metrics and object-oriented metrics cannot directly measure the quality of MAS architectures. For this reason, this work proposes a suite of metrics to measure certain quality attributes of MAS architectures, considering agents and their organization. Most of these metrics are inspired by object-oriented metrics but they are adapted to agent-oriented concepts. Proposed metri…

Software visualizationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSocial software engineeringSoftware Engineering Process GroupResource-oriented architectureComputer sciencebusiness.industrySoftware developmentSoftware peer reviewAgent-oriented software engineeringSoftware qualitySoftware metricSoftwareSoftware sizingSoftware deploymentSoftware constructionComponent-based software engineeringmetric agentSoftware requirementsSoftware systemSoftware verification and validationbusinessSoftware engineeringHalstead complexity measures
researchProduct

Graph grammar engineering: A software specification method

1987

Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like manner. This is achieved by an extension of the known programmed, attributed graph grammars. Node-set operators are introduced to facilitate graph queries. Concepts like abstraction, decomposition, refinement, parameterization, and integration have been adopted from software engineering to yield a compr…

Software visualizationbusiness.industryComputer scienceProgramming languageSearch-based software engineeringSoftware developmentSoftware requirements specificationcomputer.software_genreSoftware sizingSoftware constructionSoftware designbusinesscomputerSoftware verification
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Using privacy-transformed speech in the automatic speech recognition acoustic model training

2020

Automatic Speech Recognition (ASR) requires huge amounts of real user speech data to reach state-of-the-art performance. However, speech data conveys sensitive speaker attributes like identity that can be inferred and exploited for malicious purposes. Therefore, there is an interest in the collection of anonymized speech data that is processed by some voice conversion method. In this paper, we evaluate one of the voice conversion methods on Latvian speech data and also investigate if privacy-transformed data can be used to improve ASR acoustic models. Results show the effectiveness of voice conversion against state-of-the-art speaker verification models on Latvian speech and the effectivene…

Speaker verificationevaluationvoice conversionComputer scienceSpeech recognitionautomatic speech recognitionLatvianAcoustic model[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG]privacylanguage.human_language[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]anonymization[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG][INFO.INFO-CL] Computer Science [cs]/Computation and Language [cs.CL]Identity (object-oriented programming)languageConversion methodautomatic speaker verification
researchProduct