Search results for "verification"
showing 10 items of 104 documents
Verification of Symbolic Distributed Protocols for Networked Embedded Devices
2020
The availability of versatile and interconnected embedded devices makes it possible to build low-cost networks with a large number of nodes running even complex applications and protocols in a distributed manner. Common tools used for modeling and verification, such as simulators, present some limitations as application correctness is checked off-board and only focuses on source code. Execution in the real network is thus excluded from the early stages of design and verification. In this paper, a system for modeling and verification of symbolic distributed protocols running on embedded devices is introduced. The underlying methodology is rooted in a symbolic programming paradigm that makes …
ACCERTAMENTO E VERIFICHE DELL'HANDICAP
2013
Questo studio indaga il tema dell’accertamento e delle verifiche dell’handicap nel quadro delle novelle legislative che affidano all’Istituto Nazionale della Previdenza Sociale (Inps) la regia dell’intero sistema di accertamento. Uno spazio significativo è, inoltre, dedicato all’istituto dell’accertamento tecnico preven- tivo obbligatorio, importante strumento di deflazionamento del contenzioso previdenziale. This study explores the theme of assessment and verification of handicap in the contest of the legislative novels that make National Social Security Institute (Inps) run the entire system of assessment. A significant space is also dedicated to the institute of technical appraisal requi…
Radiation Hardness Assurance Through System-Level Testing: Risk Acceptance, Facility Requirements, Test Methodology, and Data Exploitation
2021
International audience; Functional verification schemes at a level different from component-level testing are emerging as a cost-effective tool for those space systems for which the risk associated with a lower level of assurance can be accepted. Despite the promising potential, system-level radiation testing can be applied to the functional verification of systems under restricted intrinsic boundaries. Most of them are related to the use of hadrons as opposed to heavy ions. Hadrons are preferred for the irradiation of any bulky system, in general, because of their deeper penetration capabilities. General guidelines about the test preparation and procedure for a high-level radiation test ar…
Industrial Application and Evaluation of a Software Evolution Decision Model
2007
A modest but practical software process modeling technique for software process improvement
2002
One of the main problems with software engineering is due to the difficulties in evaluating and improving our software processes, especially in the light of the fact that reuse depends on a process which supports it. Generally used approaches to the evaluation and improvement of software processes are based on the CMM, for example. In this paper we present a technique to improve software processes through modeling and evaluation. The presented technique is fairly easy to use, provides reasonably good results and requires only a fraction of resources required by CMM appraisals. Copyright © 2002 John Wiley & Sons, Ltd.
Use of Non-IT Testers in Software Development
2007
Because of a shortage of IT specialists, many companies which are not involved in software development business are forced to use employees who have minimal or no any knowledge about software development and IT as testers (let's call them non-IT testers). The author of this paper has used years of experience in working with such testers to provide a description of them, looking also at their most typical testing styles and the problems which occur for testers, their colleagues and bosses, and the overall software development processes. Non-IT testers often feel like second-class employees, because they are forced to work in an environment in which they do not have sufficient skills. This pa…
A metrics suite for evaluating agent-oriented architectures
2010
The Multi-agent Systems (MASs) paradigm continues to consolidate itself as a new branch of software engineering. Traditional software engineering strongly recommends to apply metrics in software developments. However, several research groups of experts in agent-oriented software engineering agree that classical software metrics and object-oriented metrics cannot directly measure the quality of MAS architectures. For this reason, this work proposes a suite of metrics to measure certain quality attributes of MAS architectures, considering agents and their organization. Most of these metrics are inspired by object-oriented metrics but they are adapted to agent-oriented concepts. Proposed metri…
Graph grammar engineering: A software specification method
1987
Graphs as conceptual data models are accepted and used in a wide range of different problem areas. Giving some examples we outline common aspects for modeling complex structures by graphs. We present a formal frame-work based on graph grammars to specify graph classes and the corresponding graph manipulations. We show that such a specification can be written in a systematic, engineering-like manner. This is achieved by an extension of the known programmed, attributed graph grammars. Node-set operators are introduced to facilitate graph queries. Concepts like abstraction, decomposition, refinement, parameterization, and integration have been adopted from software engineering to yield a compr…
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Using privacy-transformed speech in the automatic speech recognition acoustic model training
2020
Automatic Speech Recognition (ASR) requires huge amounts of real user speech data to reach state-of-the-art performance. However, speech data conveys sensitive speaker attributes like identity that can be inferred and exploited for malicious purposes. Therefore, there is an interest in the collection of anonymized speech data that is processed by some voice conversion method. In this paper, we evaluate one of the voice conversion methods on Latvian speech data and also investigate if privacy-transformed data can be used to improve ASR acoustic models. Results show the effectiveness of voice conversion against state-of-the-art speaker verification models on Latvian speech and the effectivene…