Last 7 days     Results 61-80 of 5036.   1 2 3 4 5 6 7 8 9   An Investigation of Compression Techniques to Speed up Mutation TestingZhu; Panichella, Annibale ; Zaidman, Andyin 11th IEEE Conference on Software Testing, Validation and Verification, 2018 (in press)Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of ... [more ▼]Mutation testing is widely considered as a high-end test coverage criterion due to the vast number of mutants it generates. Although many efforts have been made to reduce the computational cost of mutation testing, in practice, the scalability issue remains. In this paper, we explore whether we can use compression techniques to improve the efficiency of strong mutation based on weak mutation information. Our investigation is centred around six mutation compression strategies that we have devised. More specifically, we adopt overlapped grouping and Formal Concept Analysis (FCA) to cluster mutants and test cases based on the reachability (code covergae) and necessity (weak mutation) conditions. Moreover, we leverage mutation knowledge (mutation locations and mutation operator types) during compression. To evaluate our method, we conducted a study on 20 open source Java projects using manually written tests. We also compare our method with pure random sampling and weak mutation. The overall results show that mutant compression techniques are a better choice than random sampling and weak mutation in practice: they can effectively speed up strong mutation 6.3 to 94.3 times with an accuracy of >90%. [less ▲]Detailed reference viewed: 39 (13 UL) A generalization of the concept of distance based on the simplex inequalityKiss, Gergely ; Marichal, Jean-Luc ; Teheux, Bruno in Beiträge zur Algebra und Geometrie / Contributions to Algebra and Geometry (in press)We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex ... [more ▼]We introduce and discuss the concept of \emph{$n$-distance}, a generalization to $n$ elements of the classical notion of distance obtained by replacing the triangle inequality with the so-called simplex inequality $d(x_1, \ldots, x_n)~\leq~K\, \sum_{i=1}^n d(x_1, \ldots, x_n)_i^z{\,}, \qquad x_1, \ldots, x_n, z \in X,$ where $K=1$. Here $d(x_1,\ldots,x_n)_i^z$ is obtained from the function $d(x_1,\ldots,x_n)$ by setting its $i$th variable to $z$. We provide several examples of $n$-distances, and for each of them we investigate the infimum of the set of real numbers $K\in\left]0,1\right]$ for which the inequality above holds. We also introduce a generalization of the concept of $n$-distance obtained by replacing in the simplex inequality the sum function with an arbitrary symmetric function. [less ▲]Detailed reference viewed: 48 (14 UL) Partizipation in Großschutzgebieten - untersucht am Beispiel der Beteiligung an den Workshops zur Erstellung des Rahmenkonzeptes des Biosphärenreservates Bliesgau 2014Nienaber, Birte in Weber, Friedericke; Weber, Florian; Jenal, Corinna (Eds.) Wohin des Weges? Regionalentwicklung in Großschutzgebieten (in press)In 2014 a process of public participation was initiated in order to produce a framework concept for the future configuration of the “Biosphere Bliesgau”. This paper presents characteristics of ... [more ▼]In 2014 a process of public participation was initiated in order to produce a framework concept for the future configuration of the “Biosphere Bliesgau”. This paper presents characteristics of participation, both in general and in large-scale protected areas in particular, and discusses what various forms of participation (ranging from pure information as non-participation to bottom-up partnerships as the strongest form of participation) are possible. The empirical-analytical section of the paper investigates the 2014 process of participation in Biosphere Bliesgau, using publically available protocols and interviews. It can be seen that the top-down process – e. g. involving concrete agreements between individuals or groups – involves the selection of participants – intended or otherwise – and that the highest level of participation could therefore not be achieved. [less ▲]Detailed reference viewed: 18 (1 UL) Security of Distance−Bounding: A SurveyGildas, Avoine; Muhammed, Ali Bingöl; Ioana, Boureanu et alin ACM Computing Surveys (in press)Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e ... [more ▼]Distance bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, which are vulnerable to distance-based frauds. This survey analyzes and compares in a unified manner many existing distance bounding protocols with respect to several key security and complexity features. [less ▲]Detailed reference viewed: 29 (0 UL) New Directions in Attack Tree Research: Catching up with Industrial NeedsGadyatskaya, Olga ; Trujillo Rasua, Rolando in Mauw, Sjouke (Ed.) Proceedings of the 4th International Workshop on Graphical Models for Security (in press)Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal ... [more ▼]Attack trees provide a systematic way of characterizing diverse system threats. Their strengths arise from the combination of an intuitive representation of possible attacks and availability of formal mathematical frameworks for analyzing them in a qualitative or a quantitative manner. Indeed, the mathematical frameworks have become a large focus of attack tree research. However, practical applications of attack trees in industry largely remain a tedious and error-prone exercise. Recent research directions in attack trees, such as attack tree generation, attempt to close this gap and to improve the attack tree state-of-thepractice. In this position paper we outline the recurrent challenges in manual tree design within industry, and we overview the recent research results in attack trees that help the practitioners. For the challenges that have not yet been addressed by the community, we propose new promising research directions. [less ▲]Detailed reference viewed: 44 (2 UL) Pointwise regularity of parameterized affine zipper fractal curves fractal curvesBárány, Balázs; Kiss, Gergely ; Kolossváry, Istvánin Nonlinearity (in press)We study the pointwise regularity of zipper fractal curves generated by affine mappings. Under the assumption of dominated splitting of index-1, we calculate the Hausdorff dimension of the level sets of ... [more ▼]We study the pointwise regularity of zipper fractal curves generated by affine mappings. Under the assumption of dominated splitting of index-1, we calculate the Hausdorff dimension of the level sets of the pointwise Hölder exponent for a subinterval of the spectrum. We give an equivalent characterization for the existence of regular pointwise Hölder exponent for Lebesgue almost every point. In this case, we extend the multifractal analysis to the full spectrum. In particular, we apply our results for de Rham’s curve. [less ▲]Detailed reference viewed: 17 (2 UL) Intertemporal material deprivation: a proposal and an application to EU countriesD'Ambrosio, Conchita ; Bossert, Walterin Dasgupta, Indraneel; Mitra, Manipushpak (Eds.) Deprivation, Inequality and Polarization: Essays in Honour of Satya Ranjan Chakravarty (in press)This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio ... [more ▼]This paper analyzes the effects of the inclusion of past experiences in measuring current material deprivation. The method followed generalizes the proposal of Bossert, Ceriani, Chakravarty and D'Ambrosio (2014) by adapting the class of indices on the measurement of poverty over time of Dutta, Roope and Zank (2013). An application to the analysis of material deprivation within EU countries is then provided. Following the path of material deprivation experienced by each individual over time yields a picture which differs from that in the annual results. Since the measurement of material deprivation is used by the EU member states and the European Commission to monitor national and EU progress in the fight against poverty and social exclusion, the results suggest that time cannot be neglected. Countries should not only be compared based on their year-by-year results, but additional information is gained by following individuals over time and producing an aggregate measure once dynamic considerations are taken into consideration. [less ▲]Detailed reference viewed: 36 (1 UL) On Koszul-Tate resolutions and Sullivan modelsPistalo, Damjan ; Poncin, Norbert in Dissertationes Mathematicae (in press)Detailed reference viewed: 70 (13 UL) The Scent of a Smell: An Extensive Comparison between Textual and Structural SmellsPalomba, Fabio; Panichella, Annibale ; Zaidman, Andy et alin IEEE Transactions on Software Engineering (in press)Code smells are symptoms of poor design or implementation choices that have a negative effect on several aspects of software maintenance and evolution, such as program comprehension or change- and fault ... [more ▼]Code smells are symptoms of poor design or implementation choices that have a negative effect on several aspects of software maintenance and evolution, such as program comprehension or change- and fault-proneness. This is why researchers have spent a lot of effort on devising methods that help developers to automatically detect them in source code. Almost all the techniques presented in literature are based on the analysis of structural properties extracted from source code, although alternative sources of information (e.g., textual analysis) for code smell detection have also been recently investigated. Nevertheless, some studies have indicated that code smells detected by existing tools based on the analysis of structural properties are generally ignored (and thus not refactored) by the developers. In this paper, we aim at understanding whether code smells detected using textual analysis are perceived and refactored by developers in the same or different way than code smells detected through structural analysis. To this aim, we set up two different experiments. We have first carried out a software repository mining study to analyze how developers act on textually or structurally detected code smells. Subsequently, we have conducted a user study with industrial developers and quality experts in order to qualitatively analyze how they perceive code smells identified using the two different sources of information. Results indicate that textually detected code smells are easier to identify and for this reason they are considered easier to refactor with respect to code smells detected using structural properties. On the other hand, the latter are often perceived as more severe, but more difficult to exactly identify and remove. [less ▲]Detailed reference viewed: 45 (5 UL) A Machine Learning-Driven Evolutionary Approach for Testing Web Application FirewallsAppelt, Dennis; Nguyen, Cu D.; Panichella, Annibale et alin IEEE Transactions on Reliability (in press)Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs ... [more ▼]Web application firewalls (WAF) are an essential protection mechanism for online software systems. Because of the relentless flow of new kinds of attacks as well as their increased sophistication, WAFs have to be updated and tested regularly to prevent attackers from easily circumventing them. In this paper, we focus on testing WAFs for SQL injection attacks, but the general principles and strategy we propose can be adapted to other contexts. We present ML-Driven, an approach based on machine learning and an evolutionary algorithm to automatically detect holes in WAFs that let SQL injection attacks bypass them. Initially, ML-Driven automatically generates a diverse set of attacks and submit them to the system being protected by the target WAF. Then, ML-Driven selects attacks that exhibit patterns (substrings) associated with bypassing the WAF and evolve them to generate new successful bypassing attacks. Machine learning is used to incrementally learn attack patterns from previously generated attacks according to their testing results, i.e., if they are blocked or bypass the WAF. We implemented ML-Driven in a tool and evaluated it on ModSecurity, a widely used open-source WAF, and a proprietary WAF protecting a financial institution. Our empirical results indicate that ML-Driven is effective and efficient at generating SQL injection attacks bypassing WAFs and identifying attack patterns. [less ▲]Detailed reference viewed: 99 (7 UL) Gute Kindheit. Wohlbefinden, Kindeswohl und UngleichheitBetz, Tanja; Bollig, Sabine; Joos, Magdalena et alBook published by Beltz Juventa (in press)Detailed reference viewed: 38 (3 UL) Communautés de vie et fiscalité individuelle au Grand-Duché de LuxembourgChaouche, Fatima in Revue européenne et internationale de droit fiscal (in press)Detailed reference viewed: 34 (6 UL) Bildung für nachhaltige Entwicklung in der Grundschule: Praxisrelevante Ergebnisse einer international-vergleichenden Studie in Deutschland und LuxemburgAndersen, Katja Natalie in Peschel, Markus; Carla, Ursula (Eds.) Dimensionen des Sachunterrichts: Kinder - Sachen - Welten (in press)Detailed reference viewed: 21 (3 UL) Erloubet mir die selben vart. Episodisches Erzählen hoch zu Ross und in der Luft. Mittelalterliche und moderne Helden auf Aventiure-FahrtBendheim, Amelie ; Schuh, Dominikin Sieber, Andrea; Müller, Carla (Eds.) âventiure/Abenteuer − Literarisches Lernen mit mittelalterlichen und modernen Medienverbünden (in press)Detailed reference viewed: 19 (0 UL) Fiscalité personelle et droits sociaux des demandeurs de protection internationale au GDLChaouche, Fatima Book published by Pasicrisie Luxembourg - 1st (in press)Detailed reference viewed: 40 (6 UL) On the performance of an overlapping-domain parallelization strategy for Eulerian-Lagrangian Multiphysics softwarePozzetti, Gabriele ; Besseron, Xavier ; Rousset, Alban et alin AIP Conference Proceedings ICNAAM 2017 (in press)In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce ... [more ▼]In this work, a strategy for the parallelization of a two-way CFD-DEM coupling is investigated. It consists on adopting balanced overlapping partitions for the CFD and the DEM domains, that aims to reduce the memory consumption and inter-process communication between CFD and DEM. Two benchmarks are proposed to assess the consistency and scalability of this approach, coupled execution on 252 cores shows that less than 1\% of time is used to perform inter-physics data exchange. [less ▲]Detailed reference viewed: 75 (28 UL) Theater International IIIBloch, Natalie ; Heimböckel, Dieter Book published by Hydre Edition (in press)Detailed reference viewed: 32 (1 UL) Caring for the elderly: Effects on Family and Adolescents.Schumacher, Anette ; Willems, Helmut in Boll, Thomas; Ferring, Dieter; Valsiner, Jaan (Eds.) Cultures of care in aging (in press)Detailed reference viewed: 19 (2 UL) Reductions of algebraic integers IIPerucca, Antonella in Proceedings of WINE2 (in press)Detailed reference viewed: 23 (2 UL) Kommunale Selbstinszenierung im vorstädtischen Raum. Ein neuer Blick auf Leprosorien des Spätmittelalters und der frühen NeuzeitUhrmacher, Martin in Hesse, Christian; Schulte, Daniela; Stercken, Martina (Eds.) Kommunale Selbstinszenierung (in press)Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical ... [more ▼]Abstract zur Tagung „Kommunale Selbstinszenierung“ der Internationalen Kommission für Stadtgeschichte, des Schweizerischen Arbeitskreises für Stadtgeschichte und des NCCR 'Mediality. Historical Perspectives' Universität Zürich, 3./4./5. September 2015 Martin Uhrmacher (Universität Luxemburg) „Leprosorien als kommunale Repräsentationsbauten im vorstädtischen Raum. Ein neuer Blick auf eine bisher wenig beachtete städtische Baugattung“ Die vor den Mauern mittelalterlicher und frühneuzeitlicher Städte gelegenen Leprosorien werden heute zumeist noch immer als abgelegene und verborgene Orte der Exklusion angesehen, durch Zäune und Mauern von der Außenwelt getrennt. Dementsprechend wird auch der Baugattung „Leprosorium“ nur wenig architektonischer Wert zugebilligt, wie bspw. im Ausstellungskatalog „Aussatz – Lepra – Hansen-Krankheit: Demnach hatten sie „keinerlei repräsentative Bedeutung, im Gegenteil: eher unauffällig sollten sie sein, verborgen vor dem Blick der Stadtbewohner und Reisenden“. Im 2005 von Monika Escher und Frank G. Hirschmann publizierten Syntheseband „Die urbanen Zentren des hohen und späten Mittelalters“ zur Geschichte mittelalterlicher Städte zwischen Rhein und Maas werden Leprosorien zudem als „nicht wertungsrelevantes“ Urbanitäts- und Zentralitätskriterium“ bezeichnet; begründet mit der angeblichen „Tatsache, daß in der Regel der topographische Bezug zur Stadt gering war“. In der jüngeren Forschung hat sich diese Einschätzung nun grundlegend gewandelt. Leprosorien gelten aufgrund ihrer besonders prominent und exponiert ausgewählten Standorte an Kreuzungen, Brücken und Hauptausfallstraßen als präsente und das städtische Umland prägende kommunale Einrichtungen, die ein fester Bestandteil der städtischen Lebenswelt waren. Sie dienten nicht dazu, ihre Bewohner zu verstecken, sondern waren vielmehr mit Stiftungen und Spenden versehene städtische Einrichtungen, die vom Rat und den Bürgern auch als Prestigeobjekte betrachtet wurden. Anhand ausgewählter Beispiele wird aufgezeigt, wie Leprosorien als Repräsentationsobjekte der Stadtgemeinden auch dem bürgerlichen Selbstverständnis Ausdruck verliehen. [less ▲]Detailed reference viewed: 13 (1 UL)