Searched for: subject:"Software"
(41 - 60 of 399)

Pages

document
Dahlberg, E.A. (author), Wehner, S.D.C. (author)
We introduce a simulator of a quantum internet with the specific goal to support software development. A quantum internet consists of local quantum processors, which are interconnected by quantum communication channels that enable the transmission of qubits between the different processors. While many simulators exist for local quantum...
journal article 2018
document
Spadini, D. (author), Finavaro Aniche, M. (author), Bruntink, Magiel (author), Bacchelli, A. (author)
When testing software artifacts that have several dependencies, one has the possibility of either instantiating these dependencies or using mock objects to simulate the dependencies’ expected behavior. Even though recent quantitative studies showed that mock objects are widely used both in open source and proprietary projects, scientific...
journal article 2018
document
Abdessalem, Raja Ben (author), Panichella, A. (author), Nejati, Shiva (author), Briand, Lionel (author), Stifter, Thomas (author)
Complex systems such as autonomous cars are typically built as a composition of features that are independent units of functionality. Features tend to interact and impact one another’s behavior in unknown ways. A challenge is to detect and manage feature interactions, in particular, those that violate system requirements, hence leading to...
conference paper 2018
document
Gerasimou, Simos (author), Kechagia, M. (author), Kolovos, Dimitris (author), Paige, Richard (author), Gousios, Giorgos (author)
Software libraries, typically accessible through Application Programming
Interfaces (APIs), enhance modularity and reduce development time. Nevertheless, their use reinforces system dependency on third-party software. When libraries become obsolete or their APIs change, performing the necessary modifications to dependent systems, can be time...
conference paper 2018
document
Tamburri, Damian A. (author), Palomba, F. (author), Serebrenik, Alexander (author), Zaidman, A.E. (author)
“There can be no vulnerability without risk; there can be no community without vulnerability; there can be no peace, and ultimately no life, without community.” - [M. Scott Peck]

The open-source phenomenon has reached the point in which it is virtually impossible to find large applications that do not rely on it. Such grand adoption may...
journal article 2018
document
Sharma, Salil (author), Lussmann, Jonas (author), So, Jaehyun (author)
Floating car data present a cost-effective approach to observing the traffic state. This paper explores whether floating cars can substitute stationary detection devices (e.g., induction loops) for observers within traffic responsive control systems. A rule-based traffic control method at the local intersection level is proposed in this paper...
journal article 2018
document
Mathur, Gaurav (author)
Based on research with entrepreneurs, accountants and technology experts, a vision for the future of entrepreneur-accountant relationship is articulated. This vision is brought to life by the 'Centaur' product concept. Centaur uses Machine Learning to generate actionable financial insights. Voice commands make interaction seamless, and Dynamic...
master thesis 2017
document
Nijessen, Rik (author)
Repository mining researchers have successfully applied machine learning in a variety of
scenarios.  However, the use of deep learning in repository mining tasks is still in its infancy.
In this thesis, we describe the advantages and disadvantages of using deep learning in mining software repository research and demonstrate these by...
master thesis 2017
document
Bastiaansen, Sjoerd (author)
The study investigated a small- to medium-sized enterprise (SME) that had expressed the interest to explore the potential benefits of developing design capabilities. Previously, CM had conducted a company-wide branding exercise and saw an opportunity to explore this further. During a 6-month period, the researcher was embedded at CM as a design...
master thesis 2017
document
Bruijn, Willem (author)
A complex marine project consist of series of operations, with each operation subject to a predefined operational limit and duration, depending on the equipment being used. If actual weather conditions exceed the operational limit, then the operation cannot be executed and hence downtime occurs. It is up to contractors, such as Boskalis, to...
master thesis 2017
document
van Breemen, Jorden (author)
Agile software development has interested researchers for the last decade. Agile software development teams develop iteration sessions that often last weeks. During development, teams work on technical code and its content. Intuitively, more effort is required to implement new features in poorly constructed code with low quality. This study...
master thesis 2017
document
Falco, E. (author), Malavolta, Ivano (author), Radzimski, Adam (author), Ruberto, Stefano (author), Iovino, Ludovico (author), Gallo, Francesco (author)
Ever since the earthquake of April 6, 2009 hit the city of L’Aquila, Italy, the city has been facing major challenges in terms of social, physical, and economic reconstruction. The system of public urban mobility, the bus network, is no exception with its old bus fleet, non-user-friendly information, and poor scheduling. This paper argues that...
journal article 2017
document
van Hesteren, Patrick (author)
Software testing has been around for decades and many tools exist to aid developers in their testing process. However, little is known about the rate at which developers test their projects, the tools they use for these purposes and the impact of type systems on testing practices. Our work is the first of its kind to identify and classify...
master thesis 2017
document
Tómasdóttir, Kristín (author)
A linter is a type of static analysis tool that warns software developers about pos- sible errors in code or violations to coding standards. By using such a tool, errors can be surfaced early in the development process when they are cheaper to fix, and code can be kept more readable and maintainable. For such a tool to be successful, it is...
master thesis 2017
document
den Braber, Tom (author)
The goal of this thesis is to learn how exception handling constructs are used by PHP developers. We present an approach for detecting the exception flow of a software system, based on the work of Robillard and Murphy (2003). We show the accuracy of this approach by evaluating the tool on a corpus of three different PHP systems. The approach is...
master thesis 2017
document
Palomba, F. (author), Bavota, Gabriele (author), Di Penta, Massimiliano (author), Fasano, Fausto (author), Oliveto, Rocco (author), De Lucia, Andrea (author)
Code smells are symptoms of poor design and implementation choices that may hinder code comprehensibility and maintainability. Despite the effort devoted by the research community in studying code smells, the extent to which code smells in software systems affect software maintainability remains still unclear. In this paper we present a large...
journal article 2017
document
Oliehoek, Frans A. (author), Spaan, M.T.J. (author), Terwijn, Bas (author), Robbel, Philipp (author), Messias, João V. (author)
This article describes the MultiAgent Decision Process (MADP) toolbox, a software library to support planning and learning for intelligent agents and multiagent systems in uncertain environments. Key features are that it supports partially observable environments and stochastic transition models; has unified support for single- and multiagent...
journal article 2017
document
Castelein, Jeroen (author)
Software testing is an important, well-researched field.
With the majority of modern-day applications using relational databases to manipulate their data, it is crucial that database interactions are tested as well.
This is a complex task to perform manually, and thus researchers have been attempting to tackle this problem by means of...
master thesis 2017
document
van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi-...
journal article 2017
document
Spaapen, Michiel (author)
For many years 3D printing has been one of the most exciting promises in future technologies. One of the issues with the penetration of 3D printing technology is the required proficiency with creation software; and the lack of experience in design. This report describes the exploration into a novel means to empower users to create unique design...
master thesis 2017
Searched for: subject:"Software"
(41 - 60 of 399)

Pages