A Constraint-Based Verification Approach for Java Bytecode Programs, Safaa Achour, Ali Chouenyib and Mohammed Benattou (pp. 1-16).(Abstract)
A Constraint-Based Verification Approach for Java Bytecode Programs
Safaa Achour, Ali Chouenyib and Mohammed Benattou
LASTID Laboratory, Ibn Tofail University, Kenitra, Morocco email@example.com, firstname.lastname@example.org, email@example.com
ABSTRACT In this paper, we propose a constraint based analysis technique to detect the inconsistencies between a Java application and its specification at the Bytecode level. The main objective of our approach is not only to exploit the information of the user specification but also the memory constraints generated from the Java Bytecode of the application. Indeed, this allows us to detect the possible non-conformance between a program and its specification and also to explore the execution paths of the application looking at which of them may contain such inconsistencies. Nevertheless, the testing application and the user specification are not in the same level of abstraction. Thereby, we propose to wrap the method under test with its specification expressed as pre/post specifications at the Bytecode level, using the Static Bytecode Instrumentation.
A Survey of the Bug Localisation Techniques, Kavya Shree N S and Pushpalatha M N (pp. 17-30).(Abstract)
A Survey of the Bug Localisation Techniques
Kavya Shree N S1 and Pushpalatha M N2
1,2Department of Information Science and Engineering, M S Ramaiah Institute of Technology, Bangalore, India firstname.lastname@example.org, email@example.com
ABSTRACT Bug localisation is the integral part of software testing and maintenance. Many bug reports are generated during the evolution of software system. The developers must consider the bug reports from various bug tracking systems like Bugzilla, Jira etc. and identify the parts of the source code that contains concerns. It will be a complex task for the developers to identify the source code causing the trouble and it is also time consuming. Many automated bug localisation techniques have been identified in recent years to smoothen the process of bug localisation. There is various static, dynamic, Information Retrieval and hybrid bug localisation techniques. These techniques mainly rely on the similarity between the bug report and the source code. The existing techniques also considers, source code structure, previous bug reports, version histories to improve the efficiency of the bug localisation. This paper aims to provide the short survey on various bug localisation techniques and compares various pros and cons of those techniques. This paper presents and classifies survey of 25 research papers in area of software bug localisation.
Mathematical Model and Algorithms for some Type of Concurrency Control Problems in Database Applications, Moukouop Nguena Ibrahim and Ngassa Kaam Cedric (pp. 31-46).(Abstract)
Mathematical Model and Algorithms for some Type of Concurrency Control Problems in Database Applications
Moukouop Nguena Ibrahim1* and Ngassa Kaam Cedric2
1The National Advanced High School of engineering, Yaounde Cameroon 2Megasoft Cameroon, Yaounde firstname.lastname@example.org, email@example.com
ABSTRACT Despite the extensive literature describing mechanisms of transactions management and concurrencies, it seems difficult for developers to apply these concepts. We analysed many open source application and we observed that the algorithms used to tackle some of these problems do not apply to concurrencies. These applications are used to treat business processes in many organisations, consequently, aforementioned issues lead to disastrous results and huge losses. It is difficult to find existing literature on algorithm addressing some classical problems of data management related applications, and mathematical models formalizing these problems at high level of abstraction. This article presents a general mathematical model to solve a group of database application related problems, which are designated as account management problems thereafter. It also presents general solutions to aforementioned problems, based on an appropriate combination of transaction isolation levels and update modes used for resolving. The proof of correctness of the algorithm and a performance analysis are done under some reasonable assumptions. The proposed solution is validated through some simulations and real implementation on number of projects.
IoT-based Software Platform for Delivering Ubiquitous Healthcare, Carlos Ramos, Subramaniam Ganesan and Regin Conejar (pp. 47-56).(Abstract)
IoT-based Software Platform for Delivering Ubiquitous Healthcare
Carlos Ramos1, Subramaniam Ganesan2 and Regin Conejar3*
1ISEP-IPP, Portugal 2Oakland University Rochester, MI, USA 3School of Information Technology, Daegu Catholic University, South Korea *firstname.lastname@example.org
ABSTRACT Eminence healthcare is one of the utmost significant dynamics in how individuals perceive their quality of life. Internet of Things (IoT) visualizes a future in which any services can be interrelated by means of appropriate information and communication technologies which will bring technological revolution in the fields of smart homes, healthcare systems, monitoring and logistics. This paper presents the application of IoT-based Software Platform and addresses some essential parameters and characteristics of each of the applications of Ubiquitous Healthcare.
A Study of a Elgg Framework for Social Networking Application Development, Sabah Mohammed, Byeongho Kang and Ronnie Caytiles (pp. 57-66).(Abstract)
A Study of a Elgg Framework for Social Networking Application Development
Sabah Mohammed1, Byeongho Kang2 and Ronnie Caytiles3*
1Lakehead University, Canada 2University of Tasmania, Australia 3Department of Multimedia, Hannam University, Korea email@example.com
ABSTRACT Nowadays, online socialization has become a regular activity for most people around the world. People don't need to meet with their friends, colleagues, families, and co-workers physically every time in order to communicate with each other. The social networking media has gained an increasing popularity that has changed every person's way of dealing with their personal social behaviors. This paper deals with the study of Elgg social networking framework for the development of a social networking application. The Elgg is an open source software development framework that can allow individuals, organization, and enterprises to share files, blogging and microblogging, and communicate through groups and networks. A case study of architecture of a social networking site will be provided in order to show the features of Elgg social networking framework.
Keywords:Elgg social networking framework, software development, social networking