for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Elsevier   (Total: 3042 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 3042 Journals sorted alphabetically
AASRI Procedia     Open Access   (Followers: 15)
Academic Pediatrics     Hybrid Journal   (Followers: 20, SJR: 1.402, h-index: 51)
Academic Radiology     Hybrid Journal   (Followers: 17, SJR: 1.008, h-index: 75)
Accident Analysis & Prevention     Partially Free   (Followers: 81, SJR: 1.109, h-index: 94)
Accounting Forum     Hybrid Journal   (Followers: 23, SJR: 0.612, h-index: 27)
Accounting, Organizations and Society     Hybrid Journal   (Followers: 27, SJR: 2.515, h-index: 90)
Achievements in the Life Sciences     Open Access   (Followers: 4)
Acta Anaesthesiologica Taiwanica     Open Access   (Followers: 5, SJR: 0.338, h-index: 19)
Acta Astronautica     Hybrid Journal   (Followers: 328, SJR: 0.726, h-index: 43)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 3)
Acta Biomaterialia     Hybrid Journal   (Followers: 25, SJR: 2.02, h-index: 104)
Acta Colombiana de Cuidado Intensivo     Full-text available via subscription  
Acta de Investigación Psicológica     Open Access   (Followers: 2)
Acta Ecologica Sinica     Open Access   (Followers: 8, SJR: 0.172, h-index: 29)
Acta Haematologica Polonica     Free   (SJR: 0.123, h-index: 8)
Acta Histochemica     Hybrid Journal   (Followers: 3, SJR: 0.604, h-index: 38)
Acta Materialia     Hybrid Journal   (Followers: 206, SJR: 3.683, h-index: 202)
Acta Mathematica Scientia     Full-text available via subscription   (Followers: 5, SJR: 0.615, h-index: 21)
Acta Mechanica Solida Sinica     Full-text available via subscription   (Followers: 9, SJR: 0.442, h-index: 21)
Acta Oecologica     Hybrid Journal   (Followers: 9, SJR: 0.915, h-index: 53)
Acta Otorrinolaringologica (English Edition)     Full-text available via subscription   (Followers: 1)
Acta Otorrinolaringológica Española     Full-text available via subscription   (Followers: 3, SJR: 0.311, h-index: 16)
Acta Pharmaceutica Sinica B     Open Access   (Followers: 2)
Acta Poética     Open Access   (Followers: 4)
Acta Psychologica     Hybrid Journal   (Followers: 23, SJR: 1.365, h-index: 73)
Acta Sociológica     Open Access  
Acta Tropica     Hybrid Journal   (Followers: 6, SJR: 1.059, h-index: 77)
Acta Urológica Portuguesa     Open Access  
Actas Dermo-Sifiliograficas     Full-text available via subscription   (Followers: 4)
Actas Dermo-Sifiliográficas (English Edition)     Full-text available via subscription   (Followers: 3)
Actas Urológicas Españolas     Full-text available via subscription   (Followers: 4, SJR: 0.383, h-index: 19)
Actas Urológicas Españolas (English Edition)     Full-text available via subscription   (Followers: 2)
Actualites Pharmaceutiques     Full-text available via subscription   (Followers: 5, SJR: 0.141, h-index: 3)
Actualites Pharmaceutiques Hospitalieres     Full-text available via subscription   (Followers: 4, SJR: 0.112, h-index: 2)
Acupuncture and Related Therapies     Hybrid Journal   (Followers: 3)
Ad Hoc Networks     Hybrid Journal   (Followers: 11, SJR: 0.967, h-index: 57)
Addictive Behaviors     Hybrid Journal   (Followers: 15, SJR: 1.514, h-index: 92)
Addictive Behaviors Reports     Open Access   (Followers: 5)
Additive Manufacturing     Hybrid Journal   (Followers: 7, SJR: 1.039, h-index: 5)
Additives for Polymers     Full-text available via subscription   (Followers: 20)
Advanced Drug Delivery Reviews     Hybrid Journal   (Followers: 128, SJR: 5.2, h-index: 222)
Advanced Engineering Informatics     Hybrid Journal   (Followers: 11, SJR: 1.265, h-index: 53)
Advanced Powder Technology     Hybrid Journal   (Followers: 16, SJR: 0.739, h-index: 33)
Advances in Accounting     Hybrid Journal   (Followers: 9, SJR: 0.299, h-index: 15)
Advances in Agronomy     Full-text available via subscription   (Followers: 15, SJR: 2.071, h-index: 82)
Advances in Anesthesia     Full-text available via subscription   (Followers: 25, SJR: 0.169, h-index: 4)
Advances in Antiviral Drug Design     Full-text available via subscription   (Followers: 3)
Advances in Applied Mathematics     Full-text available via subscription   (Followers: 6, SJR: 1.054, h-index: 35)
Advances in Applied Mechanics     Full-text available via subscription   (Followers: 10, SJR: 0.801, h-index: 26)
Advances in Applied Microbiology     Full-text available via subscription   (Followers: 20, SJR: 1.286, h-index: 49)
Advances In Atomic, Molecular, and Optical Physics     Full-text available via subscription   (Followers: 16, SJR: 3.31, h-index: 42)
Advances in Biological Regulation     Hybrid Journal   (Followers: 4, SJR: 2.277, h-index: 43)
Advances in Botanical Research     Full-text available via subscription   (Followers: 3, SJR: 0.619, h-index: 48)
Advances in Cancer Research     Full-text available via subscription   (Followers: 25, SJR: 2.215, h-index: 78)
Advances in Carbohydrate Chemistry and Biochemistry     Full-text available via subscription   (Followers: 9, SJR: 0.9, h-index: 30)
Advances in Catalysis     Full-text available via subscription   (Followers: 5, SJR: 2.139, h-index: 42)
Advances in Cellular and Molecular Biology of Membranes and Organelles     Full-text available via subscription   (Followers: 12)
Advances in Chemical Engineering     Full-text available via subscription   (Followers: 24, SJR: 0.183, h-index: 23)
Advances in Child Development and Behavior     Full-text available via subscription   (Followers: 10, SJR: 0.665, h-index: 29)
Advances in Chronic Kidney Disease     Full-text available via subscription   (Followers: 10, SJR: 1.268, h-index: 45)
Advances in Clinical Chemistry     Full-text available via subscription   (Followers: 28, SJR: 0.938, h-index: 33)
Advances in Colloid and Interface Science     Full-text available via subscription   (Followers: 18, SJR: 2.314, h-index: 130)
Advances in Computers     Full-text available via subscription   (Followers: 16, SJR: 0.223, h-index: 22)
Advances in Developmental Biology     Full-text available via subscription   (Followers: 11)
Advances in Digestive Medicine     Open Access   (Followers: 4)
Advances in DNA Sequence-Specific Agents     Full-text available via subscription   (Followers: 5)
Advances in Drug Research     Full-text available via subscription   (Followers: 22)
Advances in Ecological Research     Full-text available via subscription   (Followers: 40, SJR: 3.25, h-index: 43)
Advances in Engineering Software     Hybrid Journal   (Followers: 25, SJR: 0.486, h-index: 10)
Advances in Experimental Biology     Full-text available via subscription   (Followers: 7)
Advances in Experimental Social Psychology     Full-text available via subscription   (Followers: 40, SJR: 5.465, h-index: 64)
Advances in Exploration Geophysics     Full-text available via subscription   (Followers: 3)
Advances in Fluorine Science     Full-text available via subscription   (Followers: 8)
Advances in Food and Nutrition Research     Full-text available via subscription   (Followers: 48, SJR: 0.674, h-index: 38)
Advances in Fuel Cells     Full-text available via subscription   (Followers: 15)
Advances in Genetics     Full-text available via subscription   (Followers: 15, SJR: 2.558, h-index: 54)
Advances in Genome Biology     Full-text available via subscription   (Followers: 12)
Advances in Geophysics     Full-text available via subscription   (Followers: 6, SJR: 2.325, h-index: 20)
Advances in Heat Transfer     Full-text available via subscription   (Followers: 21, SJR: 0.906, h-index: 24)
Advances in Heterocyclic Chemistry     Full-text available via subscription   (Followers: 8, SJR: 0.497, h-index: 31)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 25)
Advances in Imaging and Electron Physics     Full-text available via subscription   (Followers: 2, SJR: 0.396, h-index: 27)
Advances in Immunology     Full-text available via subscription   (Followers: 35, SJR: 4.152, h-index: 85)
Advances in Inorganic Chemistry     Full-text available via subscription   (Followers: 9, SJR: 1.132, h-index: 42)
Advances in Insect Physiology     Full-text available via subscription   (Followers: 3, SJR: 1.274, h-index: 27)
Advances in Integrative Medicine     Hybrid Journal   (Followers: 4)
Advances in Intl. Accounting     Full-text available via subscription   (Followers: 4)
Advances in Life Course Research     Hybrid Journal   (Followers: 8, SJR: 0.764, h-index: 15)
Advances in Lipobiology     Full-text available via subscription   (Followers: 2)
Advances in Magnetic and Optical Resonance     Full-text available via subscription   (Followers: 9)
Advances in Marine Biology     Full-text available via subscription   (Followers: 16, SJR: 1.645, h-index: 45)
Advances in Mathematics     Full-text available via subscription   (Followers: 10, SJR: 3.261, h-index: 65)
Advances in Medical Sciences     Hybrid Journal   (Followers: 6, SJR: 0.489, h-index: 25)
Advances in Medicinal Chemistry     Full-text available via subscription   (Followers: 5)
Advances in Microbial Physiology     Full-text available via subscription   (Followers: 4, SJR: 1.44, h-index: 51)
Advances in Molecular and Cell Biology     Full-text available via subscription   (Followers: 22)
Advances in Molecular and Cellular Endocrinology     Full-text available via subscription   (Followers: 10)
Advances in Molecular Toxicology     Full-text available via subscription   (Followers: 7, SJR: 0.324, h-index: 8)
Advances in Nanoporous Materials     Full-text available via subscription   (Followers: 4)
Advances in Oncobiology     Full-text available via subscription   (Followers: 3)
Advances in Organometallic Chemistry     Full-text available via subscription   (Followers: 15, SJR: 2.885, h-index: 45)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7, SJR: 0.148, h-index: 11)
Advances in Parasitology     Full-text available via subscription   (Followers: 7, SJR: 2.37, h-index: 73)
Advances in Pediatrics     Full-text available via subscription   (Followers: 25, SJR: 0.4, h-index: 28)
Advances in Pharmaceutical Sciences     Full-text available via subscription   (Followers: 13)
Advances in Pharmacology     Full-text available via subscription   (Followers: 15, SJR: 1.718, h-index: 58)
Advances in Physical Organic Chemistry     Full-text available via subscription   (Followers: 7, SJR: 0.384, h-index: 26)
Advances in Phytomedicine     Full-text available via subscription  
Advances in Planar Lipid Bilayers and Liposomes     Full-text available via subscription   (Followers: 3, SJR: 0.248, h-index: 11)
Advances in Plant Biochemistry and Molecular Biology     Full-text available via subscription   (Followers: 8)
Advances in Plant Pathology     Full-text available via subscription   (Followers: 5)
Advances in Porous Media     Full-text available via subscription   (Followers: 4)
Advances in Protein Chemistry     Full-text available via subscription   (Followers: 18)
Advances in Protein Chemistry and Structural Biology     Full-text available via subscription   (Followers: 19, SJR: 1.5, h-index: 62)
Advances in Psychology     Full-text available via subscription   (Followers: 59)
Advances in Quantum Chemistry     Full-text available via subscription   (Followers: 5, SJR: 0.478, h-index: 32)
Advances in Radiation Oncology     Open Access  
Advances in Small Animal Medicine and Surgery     Hybrid Journal   (Followers: 2, SJR: 0.1, h-index: 2)
Advances in Space Research     Full-text available via subscription   (Followers: 340, SJR: 0.606, h-index: 65)
Advances in Structural Biology     Full-text available via subscription   (Followers: 8)
Advances in Surgery     Full-text available via subscription   (Followers: 6, SJR: 0.823, h-index: 27)
Advances in the Study of Behavior     Full-text available via subscription   (Followers: 30, SJR: 1.321, h-index: 56)
Advances in Veterinary Medicine     Full-text available via subscription   (Followers: 15)
Advances in Veterinary Science and Comparative Medicine     Full-text available via subscription   (Followers: 13)
Advances in Virus Research     Full-text available via subscription   (Followers: 5, SJR: 1.878, h-index: 68)
Advances in Water Resources     Hybrid Journal   (Followers: 43, SJR: 2.408, h-index: 94)
Aeolian Research     Hybrid Journal   (Followers: 5, SJR: 0.973, h-index: 22)
Aerospace Science and Technology     Hybrid Journal   (Followers: 309, SJR: 0.816, h-index: 49)
AEU - Intl. J. of Electronics and Communications     Hybrid Journal   (Followers: 8, SJR: 0.318, h-index: 36)
African J. of Emergency Medicine     Open Access   (Followers: 5, SJR: 0.344, h-index: 6)
Ageing Research Reviews     Hybrid Journal   (Followers: 8, SJR: 3.289, h-index: 78)
Aggression and Violent Behavior     Hybrid Journal   (Followers: 400, SJR: 1.385, h-index: 72)
Agri Gene     Hybrid Journal  
Agricultural and Forest Meteorology     Hybrid Journal   (Followers: 15, SJR: 2.18, h-index: 116)
Agricultural Systems     Hybrid Journal   (Followers: 30, SJR: 1.275, h-index: 74)
Agricultural Water Management     Hybrid Journal   (Followers: 38, SJR: 1.546, h-index: 79)
Agriculture and Agricultural Science Procedia     Open Access  
Agriculture and Natural Resources     Open Access   (Followers: 1)
Agriculture, Ecosystems & Environment     Hybrid Journal   (Followers: 50, SJR: 1.879, h-index: 120)
Ain Shams Engineering J.     Open Access   (Followers: 5, SJR: 0.434, h-index: 14)
Air Medical J.     Hybrid Journal   (Followers: 5, SJR: 0.234, h-index: 18)
AKCE Intl. J. of Graphs and Combinatorics     Open Access   (SJR: 0.285, h-index: 3)
Alcohol     Hybrid Journal   (Followers: 9, SJR: 0.922, h-index: 66)
Alcoholism and Drug Addiction     Open Access   (Followers: 6)
Alergologia Polska : Polish J. of Allergology     Full-text available via subscription   (Followers: 1)
Alexandria Engineering J.     Open Access   (Followers: 1, SJR: 0.436, h-index: 12)
Alexandria J. of Medicine     Open Access  
Algal Research     Partially Free   (Followers: 8, SJR: 2.05, h-index: 20)
Alkaloids: Chemical and Biological Perspectives     Full-text available via subscription   (Followers: 3)
Allergologia et Immunopathologia     Full-text available via subscription   (Followers: 1, SJR: 0.46, h-index: 29)
Allergology Intl.     Open Access   (Followers: 4, SJR: 0.776, h-index: 35)
ALTER - European J. of Disability Research / Revue Européenne de Recherche sur le Handicap     Full-text available via subscription   (Followers: 7, SJR: 0.158, h-index: 9)
Alzheimer's & Dementia     Hybrid Journal   (Followers: 48, SJR: 4.289, h-index: 64)
Alzheimer's & Dementia: Diagnosis, Assessment & Disease Monitoring     Open Access   (Followers: 5)
Alzheimer's & Dementia: Translational Research & Clinical Interventions     Open Access   (Followers: 3)
American Heart J.     Hybrid Journal   (Followers: 48, SJR: 3.157, h-index: 153)
American J. of Cardiology     Hybrid Journal   (Followers: 44, SJR: 2.063, h-index: 186)
American J. of Emergency Medicine     Hybrid Journal   (Followers: 36, SJR: 0.574, h-index: 65)
American J. of Geriatric Pharmacotherapy     Full-text available via subscription   (Followers: 6, SJR: 1.091, h-index: 45)
American J. of Geriatric Psychiatry     Hybrid Journal   (Followers: 16, SJR: 1.653, h-index: 93)
American J. of Human Genetics     Hybrid Journal   (Followers: 30, SJR: 8.769, h-index: 256)
American J. of Infection Control     Hybrid Journal   (Followers: 24, SJR: 1.259, h-index: 81)
American J. of Kidney Diseases     Hybrid Journal   (Followers: 34, SJR: 2.313, h-index: 172)
American J. of Medicine     Hybrid Journal   (Followers: 46, SJR: 2.023, h-index: 189)
American J. of Medicine Supplements     Full-text available via subscription   (Followers: 3)
American J. of Obstetrics and Gynecology     Hybrid Journal   (Followers: 179, SJR: 2.255, h-index: 171)
American J. of Ophthalmology     Hybrid Journal   (Followers: 55, SJR: 2.803, h-index: 148)
American J. of Ophthalmology Case Reports     Open Access   (Followers: 2)
American J. of Orthodontics and Dentofacial Orthopedics     Full-text available via subscription   (Followers: 6, SJR: 1.249, h-index: 88)
American J. of Otolaryngology     Hybrid Journal   (Followers: 23, SJR: 0.59, h-index: 45)
American J. of Pathology     Hybrid Journal   (Followers: 24, SJR: 2.653, h-index: 228)
American J. of Preventive Medicine     Hybrid Journal   (Followers: 21, SJR: 2.764, h-index: 154)
American J. of Surgery     Hybrid Journal   (Followers: 33, SJR: 1.286, h-index: 125)
American J. of the Medical Sciences     Hybrid Journal   (Followers: 12, SJR: 0.653, h-index: 70)
Ampersand : An Intl. J. of General and Applied Linguistics     Open Access   (Followers: 5)
Anaerobe     Hybrid Journal   (Followers: 4, SJR: 1.066, h-index: 51)
Anaesthesia & Intensive Care Medicine     Full-text available via subscription   (Followers: 55, SJR: 0.124, h-index: 9)
Anaesthesia Critical Care & Pain Medicine     Full-text available via subscription   (Followers: 9)
Anales de Cirugia Vascular     Full-text available via subscription  
Anales de Pediatría     Full-text available via subscription   (Followers: 2, SJR: 0.209, h-index: 27)
Anales de Pediatría (English Edition)     Full-text available via subscription  
Anales de Pediatría Continuada     Full-text available via subscription   (SJR: 0.104, h-index: 3)
Analytic Methods in Accident Research     Hybrid Journal   (Followers: 2, SJR: 2.577, h-index: 7)
Analytica Chimica Acta     Hybrid Journal   (Followers: 38, SJR: 1.548, h-index: 152)
Analytical Biochemistry     Hybrid Journal   (Followers: 160, SJR: 0.725, h-index: 154)
Analytical Chemistry Research     Open Access   (Followers: 8, SJR: 0.18, h-index: 2)
Analytical Spectroscopy Library     Full-text available via subscription   (Followers: 11)
Anesthésie & Réanimation     Full-text available via subscription  
Anesthesiology Clinics     Full-text available via subscription   (Followers: 22, SJR: 0.421, h-index: 40)
Angiología     Full-text available via subscription   (SJR: 0.124, h-index: 9)
Angiologia e Cirurgia Vascular     Open Access  
Animal Behaviour     Hybrid Journal   (Followers: 153, SJR: 1.907, h-index: 126)
Animal Feed Science and Technology     Hybrid Journal   (Followers: 5, SJR: 1.151, h-index: 83)
Animal Reproduction Science     Hybrid Journal   (Followers: 5, SJR: 0.711, h-index: 78)
Annales d'Endocrinologie     Full-text available via subscription   (SJR: 0.394, h-index: 30)
Annales d'Urologie     Full-text available via subscription  
Annales de Cardiologie et d'Angéiologie     Full-text available via subscription   (SJR: 0.177, h-index: 13)
Annales de Chirurgie de la Main et du Membre Supérieur     Full-text available via subscription  
Annales de Chirurgie Plastique Esthétique     Full-text available via subscription   (Followers: 2, SJR: 0.354, h-index: 22)
Annales de Chirurgie Vasculaire     Full-text available via subscription   (Followers: 1)

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Journal Cover Advances in Computers
  [SJR: 0.223]   [H-I: 22]   [16 followers]  Follow
    
   Full-text available via subscription Subscription journal
   ISSN (Print) 0065-2458
   Published by Elsevier Homepage  [3042 journals]
  • Adaptation and Evaluation of the Simplex Algorithm for a Data-Flow
           Architecture
    • Authors: Jurij
      Abstract: Publication date: Available online 13 June 2017
      Source:Advances in Computers
      Author(s): Uroš Čibej, Jurij Mihelič
      The main goal of this chapter is to present a novel adaptation of the classical simplex algorithm for a data-flow architecture. Due to the recent reemergence of the data-flow paradigm, most of the algorithms need to be reengineered in order to use the features of the new platform. By exploring various possibilities of implementations and by extensive empirical testing we manage to show the suitability of the data-flow paradigm for the simplex algorithm, as well as pinpoint the strengths and some of the weaknesses of the used architecture.

      PubDate: 2017-06-14T13:22:13Z
       
  • A Novel Infrastructure for Synergistic Dataflow Research, Development,
           Education, and Deployment: The Maxeler AppGallery Project
    • Authors: Nemanja Trifunovic; Boris Perovic; Petar Trifunovic; Zoran Babovic; Ali Hurson
      Abstract: Publication date: Available online 10 June 2017
      Source:Advances in Computers
      Author(s): Nemanja Trifunovic, Boris Perovic, Petar Trifunovic, Zoran Babovic, Ali Hurson
      This chapter presents the essence and the details of a novel infrastructure that synergizes research, development, education, and deployment in the context of dataflow research. To make it clearer to fundamental scientists, the essence of the approach is explained by referencing the results of the work of four different Nobel laureates. To make it clearer to research community, crucial details are presented in the form of a manual. Till this point, the development of dataflow applications was based on tools inherited from the controlflow environment. We here describe a set of tools developed from scratch with dataflow specifics in mind. These tools are not only tuned to the dataflow environment, but they are also tuned to synergize with each other, for the best possible performance in minimal time, counting from the moment when new researchers enter the dataflow arena, until the moment when they are able to deliver a quality code for maximal speed performance and minimal energy consumption. The effectiveness of the presented synergetic approach was measured empirically, using a group of students in a dataflow course. The measured results clearly indicate the superiority of the proposed approach in the following five domains: time to design, time to program, time to build, time to test, and speedup ratio.

      PubDate: 2017-06-14T13:22:13Z
      DOI: 10.1016/bs.adcom.2017.04.005
       
  • Simple Operations in Memory to Reduce Data Movement
    • Authors: Vivek Seshadri; Onur Mutlu
      Abstract: Publication date: Available online 10 June 2017
      Source:Advances in Computers
      Author(s): Vivek Seshadri, Onur Mutlu
      In existing systems, the off-chip memory interface allows the memory controller to perform only read or write operations. Therefore, to perform any operation, the processor must first read the source data and then write the result back to memory after performing the operation. This approach consumes high latency, bandwidth, and energy for operations that work on a large amount of data. Several works have proposed techniques to process data near memory by adding a small amount of compute logic closer to the main memory chips. In this chapter, we describe two techniques proposed by recent works that take this approach of processing in memory further by exploiting the underlying operation of the main memory technology to perform more complex tasks. First, we describe RowClone, a mechanism that exploits DRAM technology to perform bulk copy and initialization operations completely inside main memory. We then describe a complementary work that uses DRAM to perform bulk bitwise AND and OR operations inside main memory. These two techniques significantly improve the performance and energy efficiency of the respective operations.

      PubDate: 2017-06-14T13:22:13Z
      DOI: 10.1016/bs.adcom.2017.04.004
       
  • Advances in Dataflow Systems
    • Authors: Thomas Chau; Pavel Burovskiy; Michael Flynn; Wayne Luk
      Abstract: Publication date: Available online 7 June 2017
      Source:Advances in Computers
      Author(s): Thomas Chau, Pavel Burovskiy, Michael Flynn, Wayne Luk
      Research on processors based on dataflow principles has been active for over 40 years, but such processors have not become mainstream general-purpose computing. Recently, advances in field-programmable technology spark renewed interest in dataflow systems. This chapter first provides an overview of parallel processor design and dataflow systems. Then the use of reconfigurable chip such as field-programmable gate array to implement dataflow machines is discussed, followed by an introduction of software design flow for dataflow hardware. After that, several high-performance computing applications developed using dataflow machines are explored.

      PubDate: 2017-06-10T12:03:57Z
      DOI: 10.1016/bs.adcom.2017.04.002
       
  • A New Course on R&D Project Management in Computer Science and
           Engineering: Subjects Taught, Rationales Behind, and Lessons Learned
    • Authors: Veljko Milutinovic; Stasa Vujicic Stankovic Aleksandar Jovic Drazen Draskovic Marko
      Abstract: Publication date: Available online 1 June 2017
      Source:Advances in Computers
      Author(s): Veljko Milutinovic, Stasa Vujicic Stankovic, Aleksandar Jovic, Drazen Draskovic, Marko Misic, Danilo Furundzic
      This chapter describes the essence of a course for senior level undergraduate students and for master students of computer science and engineering, and analyzes its effects. The course prepares students for their professional life after graduation, and especially, it prepares them for the challenges related to efforts to bring new paradigm-shifting ideas into the commercial world. This course was developed to complement a DataFlow course and to teach DataFlow researchers about issues of importance for promotion of their results with a commercial potential. Consequently, course examples and homework assignments were chosen to reflect issues of importance in the commercialization of the DataFlow concept. The course includes the following subjects (presented with DataFlow-related issues in mind): (a) Writing proposals for Research and Development in industry and academia, (b) Understanding the essence of the MBA/PhD degrees and preparing the GMAT/GRE analytical exam, (c) Understanding Capability Maturity Model Integration and learning how to write holistic strategic project plans, (d) Understanding Project Management and learning how to write detailed tactical project plans, (e) Writing business plans for venture capital or business angels, (f) Writing patent applications, (g) Writing survey papers for SCI (Science Citation Index) journals, (h) Writing research papers for SCI journals, (i) Making an Internet shop, (j) Making a MindGenomics campaign for the Internet shop, (k) DataMining from project history and project experiments, and (l) Preservation of project heritage and skills related to brand making. Each subject matter is covered by a homework assignment to help deepen the practical knowledge of the subject matter covered. In addition to the above described, which is accompanied with homework, the following four subjects are also covered and accompanied with in-class discussions (oriented to DataFlow research): (m) Inventivity, (n) Creativity, (o) Effectiveness, and (p) Efficiency. Consequently, the analysis part concentrates on the following issues: (a) Inventivity: How different majors react to the subject matters, (b) Creativity: How efficiently the initial knowledge gaps get bridged, (c) Effectiveness: How the experience of the teacher helps, and (d) Efficiency: How the previous experiences of students help.

      PubDate: 2017-06-05T10:07:18Z
       
  • Contents of Volumes in this Series
    • Abstract: Publication date: 2017
      Source:Advances in Computers, Volume 105


      PubDate: 2017-03-18T07:45:43Z
       
  • Fault Localization Using Hybrid Static/Dynamic Analysis
    • Authors: Elsaka
      Abstract: Publication date: Available online 8 February 2017
      Source:Advances in Computers
      Author(s): E. Elsaka
      With the increasing complexity of today's software, the software development process is becoming highly time and resource consuming. The increasing number of software configurations, input parameters, usage scenarios, supporting platforms, external dependencies, and versions plays an important role in expanding the costs of maintaining and repairing unforeseeable software faults. To repair software faults, developers spend considerable time in identifying the scenarios leading to those faults and root causing the problems. While software debugging remains largely manual, it is not the case with software testing and verification. The goal of this research is to improve the software development process in general, and software debugging process in particular, by devising techniques and methods for automated software debugging, which leverage the advances in automatic test case generation and replay. In this research, novel algorithms are devised to discover faulty execution paths in programs by utilizing already existing software test cases, which can be either automatically or manually generated. The execution traces or, alternatively, the sequence covers of the failing test cases are extracted. Afterward, commonalities between these test case sequence covers are extracted, processed, analyzed, and then presented to the developers in the form of subsequences that may be causing the fault. The hypothesis is that code sequences that are shared between a number of faulty test cases for the same reason resemble the faulty execution path, and hence, the search space for the faulty execution path can be narrowed down by using a large number of test cases. To achieve this goal, an efficient algorithm is implemented for finding common subsequences among a set of code sequence covers. Optimization techniques are devised to generate shorter and more logical sequence covers, and to select subsequences with high likelihood of containing the root cause among the set of all possible common subsequences. A hybrid static/dynamic analysis approach is designed to trace back the common subsequences from the end to the root cause.

      PubDate: 2017-02-13T03:24:05Z
       
  • Web-Based Behavioral Modeling for Continuous User Authentication (CUA)
    • Authors: L.C. Leonard
      Abstract: Publication date: Available online 26 January 2017
      Source:Advances in Computers
      Author(s): L.C. Leonard
      Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. For example, in recent years, more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to “continuously authenticate users” while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and subsequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from “normal behavior” can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and nonintrusive. For these experiments, we use two classification techniques; binary and multiclass classification.

      PubDate: 2017-01-30T07:05:36Z
      DOI: 10.1016/bs.adcom.2016.12.001
       
  • Characterizing Software Test Case Behavior With Regression Models
    • Authors: Robbins
      Abstract: Publication date: Available online 23 January 2017
      Source:Advances in Computers
      Author(s): B. Robbins
      Testing modern software applications, such as those built on an event-driven paradigm, requires effective consideration of context. Model-based testing (MBT) approaches have been presented as an effective way to consider context, but effective MBT requires a high level of automation. Fully automated approaches too often lead to issues that threaten the very claims that MBT offers, such as generating test cases which are not fully executable and generating very large suites of test cases. In this chapter, I describe a new class of models for automated MBT workflows: predictive regression models. I compare these models with those in a state-of-the-art automated MBT workflow. I also describe a modern infrastructure to execute large MBT suites, to counter the seed suite required to construct predictive regression models, and to further enable effective MBT approaches in general. I conclude with a summary of recent research that effectively applied a regression model for test case feasibility as a filter for automatically generated test cases.

      PubDate: 2017-01-30T07:05:36Z
       
  • Advances in Model-Based Testing of GUI-Based Software
    • Authors: Banerjee
      Abstract: Publication date: Available online 19 January 2017
      Source:Advances in Computers
      Author(s): I. Banerjee
      The Graphical User Interface (GUI) is an integral component of contemporary computer software. A stable and reliable GUI is necessary for correct functioning of software applications. Comprehensive verification of the GUI is a routine part of most software development life cycles. The input space of a GUI is typically large, making exhaustive verification difficult. GUI defects are often revealed by exercising parts of the GUI that interact with each other. In recent years, model-based methods, which target specific GUI interactions, have been developed. These methods create a formal model of the GUI's input space from specification of the GUI, visible GUI behaviors and static analysis of the GUI's program code, and dynamic analysis of interactions between the GUI and its program code. This chapter discusses recent advances in testing GUI-based software. It describes techniques that generate testcases for GUI-based applications. Some popular methods are described, specifically ones that create a model of the GUI and generate testcases based on the GUI model.

      PubDate: 2017-01-23T13:07:38Z
       
  • Contents of Volumes in this Series
    • Abstract: Publication date: 2017
      Source:Advances in Computers, Volume 104


      PubDate: 2017-01-23T13:07:38Z
       
  • Data Flow Computing in Geoscience Applications
    • Authors: L. Gan; H. Fu; O. Mencer; W. Luk; G. Yang
      Abstract: Publication date: Available online 21 October 2016
      Source:Advances in Computers
      Author(s): L. Gan, H. Fu, O. Mencer, W. Luk, G. Yang
      Geoscience research is one of the major fields that calls for the support of high-performance computers (HPC). With the algorithms of geoscience application becoming more complex, and the ever-increasing demands for better performance and finer resolutions, technical innovations from both algorithmic and architectural perspectives are highly desired. In recent years, data flow computing engines based on reconfigurable computing systems such as FPGAs have been introduced into HPC area, and start to show some inspiringly good results in many important applications. In this chapter, we summarize our initial efforts and experiences of using Maxeler Data Flow Engines as high-performance platforms, and target at eliminating the main bottlenecks and obtaining higher efficiencies for solving geoscience problems. Choosing three computing kernels from two popular geoscience application domains (climate modeling and exploration geophysics), we present a set of customization and optimization techniques based on the reconfigurable hardware platforms. Through building highly efficient computing pipelines that fit well to both the algorithm and the architecture, we manage to achieve better results in both the performance and power efficiency over traditional multi-core and many-core architectures. Our work demonstrates that data flow computing engines are promising candidates to make contributions to the development of geoscience applications.

      PubDate: 2016-10-25T17:35:32Z
      DOI: 10.1016/bs.adcom.2016.09.005
       
  • Exploring Future Many-Core Architectures: The TERAFLUX Evaluation
           Framework
    • Authors: Giorgi
      Abstract: Publication date: Available online 13 October 2016
      Source:Advances in Computers
      Author(s): R. Giorgi
      The design of new computer systems always requires a strong simulation effort in order to evaluate different design options. This is especially true if the system is to be produced at a date far in the future, such as in the case of TERAFLUX, a system aimed at containing something like 1012 (1 TERA) transistors in a single package or a (multilayer) chip by 2020. At the basis of a TERAFLUX system, a dataflow execution model supports the execution of threads. In order to explore the design space, TERAFLUX provides an appropriate evaluation framework, at the scale of at least 1000 general purpose cores on a single chip. Predicting the performance of such a next-generation platform is not a trivial task. Today, no software-based tool exists that can provide cycle-level full-system simulation and faithfully predict the behavior of 1000 general-purpose cores, in an acceptable amount of time and with reasonable accuracy, while providing the flexibility of changing the execution model at the architectural level. A solid evaluation framework represents an important base for exploring future many cores. In this chapter, different options for simulating a 1000 general-purpose-core system are explored. Finally, we show the setup that successfully allowed us to evaluate our 1000 core target while running a full-system Linux operating system.

      PubDate: 2016-10-16T10:01:58Z
       
  • A Systematic Approach to Generation of New Ideas for PhD Research in
           Computing
    • Authors: V. Blagojević; D. Bojić; M. Bojović; M. Cvetanović; J. Đorđević; Đ. Đurđević; B. Furlan; S. Gajin; Z. Jovanović; D. Milićev; V. Milutinović; B. Nikolić; J. Protić; M. Punt; Z. Radivojević; Ž. Stanisavljević; S. Stojanović; I. Tartalja; M. Tomašević; P. Vuletić
      Abstract: Publication date: Available online 8 October 2016
      Source:Advances in Computers
      Author(s): V. Blagojević, D. Bojić, M. Bojović, M. Cvetanović, J. Đorđević, Đ. Đurđević, B. Furlan, S. Gajin, Z. Jovanović, D. Milićev, V. Milutinović, B. Nikolić, J. Protić, M. Punt, Z. Radivojević, Ž. Stanisavljević, S. Stojanović, I. Tartalja, M. Tomašević, P. Vuletić
      This article represents an effort to help PhD students in computer science and engineering to generate good original ideas for their PhD research. Our effort is motivated by the fact that most PhD programs nowadays include several courses, as well as the research component, that should result in journal publications and the PhD thesis, all in a timeframe of 3–6 years. In order to help PhD students in computing disciplines to get focused on generating ideas and finding appropriate subject for their PhD research, we have analyzed some state-of-the-art inventions in the area of computing, as well as the PhD thesis research of faculty members of our department, and came up with a proposal of 10 methods that could be implemented to derive new ideas, based on the existing body of knowledge in the research field. This systematic approach provides guidance for PhD students, in order to improve their efficiency and reduce the dropout rate, especially in the area of computing.

      PubDate: 2016-10-12T07:45:55Z
      DOI: 10.1016/bs.adcom.2016.09.001
       
  • A Streaming Dataflow Implementation of Parallel
           Cocke–Younger–Kasami Parser
    • Abstract: Publication date: Available online 7 October 2016
      Source:Advances in Computers
      Author(s): D. Bojić, M. Bojović
      Parsing is the task of analyzing grammatical structures of an input sentence and deriving its parse tree. Efficient solutions for parsing are needed in many applications such as natural language processing, bioinformatics, and pattern recognition. The Cocke–Younger–Kasami (CYK) algorithm is a well-known parsing algorithm that operates on context-free grammars in Chomsky normal form and has been extensively studied for execution on parallel machines. In this chapter, we analyze the parallelizing opportunities for the CYK algorithm and give an overview of existing implementations on different hardware architectures. We propose a novel, efficient streaming dataflow implementation of the CYK algorithm on reconfigurable hardware (Maxeler dataflow engines), which achieves 18–76× speedup over an optimized sequential implementation for real-life grammars for natural language processing, depending on the length of the input string.

      PubDate: 2016-10-12T07:45:55Z
       
  • Dataflow-Based Parallelization of Control-Flow Algorithms
    • Authors: Korolija
      Abstract: Publication date: Available online 6 October 2016
      Source:Advances in Computers
      Author(s): N. Korolija, J. Popović, M. Cvetanović, M. Bojović
      Compared to control-flow architectures, dataflow architectures usually offer better performances in high performance computing. Moreover, dataflow architectures consume less electrical power. However, only since recently, the technology enables the development of dataflow architectures that are competitive with control-flow architectures. From a programming perspective, there are a relatively small number of experienced dataflow programmers. As a result, there is a need of translating control-flow algorithms into the dataflow environment. This chapter focuses on extracting methods from various fields, which could be applied on translating control-flow algorithms to dataflow environment, comparing available programming tools for dataflow architectures with respect to the previously established methods, and finally, evaluating speedups and reductions in power consumption on a dataflow implementation of the Lattice–Boltzmann method, implemented using a specific tool and method. Results show a remarkable speedup (one to two orders of magnitude), and, at the same time, a considerable reduction in power consumption.

      PubDate: 2016-10-12T07:45:55Z
       
  • Contents of Volumes in this Series
    • Abstract: Publication date: 2016
      Source:Advances in Computers, Volume 103


      PubDate: 2016-08-25T16:00:47Z
       
  • Contents of Volumes in this Series
    • Abstract: Publication date: 2016
      Source:Advances in Computers, Volume 102


      PubDate: 2016-07-06T05:32:12Z
       
  • Coverage-Based Software Testing: Beyond Basic Test Requirements
    • Authors: Masri F.A.; Zaraket
      Abstract: Publication date: Available online 10 May 2016
      Source:Advances in Computers
      Author(s): W. Masri, F.A. Zaraket
      Code coverage is one of the core quality metrics adopted by software testing practitioners nowadays. Researchers have devised several coverage criteria that testers use to assess the quality of test suites. A coverage criterion operates by: (1) defining a set of test requirements that need to be satisfied by the given test suite and (2) computing the percentage of the satisfied requirements, thus yielding a quality metric that quantifies the potential adequacy of the test suite at revealing program defects. What differentiates one coverage criterion from another is the set of test requirements involved. For example, function coverage is concerned with whether every function in the program has been called, and statement coverage is concerned with whether every statement in the program has executed. The use of code coverage in testing is not restricted to assessing the quality of test suites. For example, researchers have devised test suite minimization and test case generation techniques that also leverage coverage. Early coverage-based software testing techniques involved basic test requirements such as functions, statements, branches, and predicates, whereas recent techniques involved (1) test requirements that are complex code constructs such as paths, program dependences, and information flows or (2) test requirements that are not necessarily code constructs such as program properties and user-defined test requirements. The focus of this chapter is to compare these two generations of techniques in regard to their effectiveness at revealing defects. The chapter will first present preliminary background and definitions and then describe impactful early coverage techniques followed by selected recent work.

      PubDate: 2016-05-14T05:19:11Z
       
  • Recent Advances in Regression Testing Techniques
    • Abstract: Publication date: Available online 10 May 2016
      Source:Advances in Computers
      Author(s): H. Do
      Software systems and their environment change are continuous. They are enhanced, corrected, and ported to new platforms. These changes can affect a system adversely, thus software engineers perform regression testing to ensure the quality of the modified systems. Regression testing is an integral part of most major software projects, but as projects grow larger and the number of tests increases, performing regression testing becomes more costly. To address this problem, many researchers and practitioners have proposed and empirically evaluated various regression testing techniques, such as regression test selection, test case prioritization, and test suite minimization. Recent surveys on these techniques indicate that this research area continues to grow, heuristics and the types of data utilized become diverse, and wider application domains have been considered. This chapter presents the current status and the trends of three regression testing techniques and discusses recent advances of each technique.

      PubDate: 2016-05-14T05:19:11Z
       
  • Contents of Volumes in this Series
    • Abstract: Publication date: 2016
      Source:Advances in Computers, Volume 101


      PubDate: 2016-03-06T17:41:01Z
       
  • Advances in Software Engineering and Software Assurance
    • Authors: D. Shoemaker; C. Woody; N.R. Mead
      Pages: 1 - 46
      Abstract: Publication date: Available online 13 June 2016
      Source:Advances in Computers
      Author(s): D. Shoemaker, C. Woody, N.R. Mead
      In this chapter, the authors describe the evolution of software engineering (SE) and software assurance (SwA) from the days of punch cards until today. The authors create the backdrop for this development by describing the environment over the last 50 years. Technological advances during that period include the creation of programming languages, personal computers, the intranet, organized incident management, structured programming, and complex software applications. Impacts of these advances, including the massive growth of the Internet and software-intensive products, transformed everyday lives. While these changes were happening, cyberattacks were also growing. Dating back to the late 1960s when phone systems were attacked, society has been affected by the “dark side” of computer technology. Computer viruses and malware are a common aspect of today's landscape. To protect us and our data, laws that govern the protection of computer data were created and developed. Likewise, organizations and approaches for finding and addressing cyberattacks were established and grown. Education has supported this radically changing environment through the development of educational programs in industry and academia, including bachelor's and master's degree programs. SE education responded to the advancing technology, resulting in a new profession. SwA education responded to the failures of industry to develop quality software, including security challenges that arose as technology was used and exploited.

      PubDate: 2016-06-16T19:07:38Z
      DOI: 10.1016/bs.adcom.2016.05.001
       
  • How Elasticity Property Plays an Important Role in the Cloud: A Survey
    • Authors: M.A.N. Bikas; A. Alourani; M. Grechanik
      Pages: 1 - 30
      Abstract: Publication date: Available online 4 May 2016
      Source:Advances in Computers
      Author(s): M.A.N. Bikas, A. Alourani, M. Grechanik
      In a cloud environment, consumers can deploy and run their software applications on a sophisticated infrastructure that is owned and managed by a cloud provider (eg, Amazon Web Services, Microsoft Azure, and Google Cloud Platform). Cloud users can acquire resources for their applications on demand, and they have to pay only for the consumed resources. In order to take this advantage of cloud computing, it is vital for a consumer to determine if the cloud infrastructure can rapidly change the type and quantity of resources allocated to an application in the cloud according to the application's demand. This property of the cloud is known as elasticity. Ideally, a cloud platform should be perfectly elastic; ie, the resources allocated to an application exactly match the demand. This allocation should occur as the load to the application increases, with no degradation of application's response time, and a consumer should pay only for the resources used by the application. However, in reality, clouds are not perfectly elastic. One reason for that is it is difficult to predict the elasticity requirements of a given application and its workload in advance, and optimally match resources with the applications’ needs. In this chapter, we investigate the elasticity problem in the cloud. We explain why it is still a challenging problem to solve and consider what services current cloud service providers are offering to maintain the elasticity in the cloud. Finally, we discuss the existing research that can be used to improve elasticity in the cloud.

      PubDate: 2016-05-06T22:33:30Z
      DOI: 10.1016/bs.adcom.2016.04.001
       
  • Input-Sensitive Profiling: A Survey
    • Authors: A. Alourani; M.A.N. Bikas; M. Grechanik
      Pages: 31 - 52
      Abstract: Publication date: Available online 2 May 2016
      Source:Advances in Computers
      Author(s): A. Alourani, M.A.N. Bikas, M. Grechanik
      Input-sensitive profiling is an automated analysis technique that calculates the resource usages (eg, the memory and the CPU usage) by methods during program execution for different combinations of input values. In addition to enabling developers to estimate the time and space complexities of a program, input-sensitive profiling also allows developers to automatically detect bottlenecks during performance testing, where the performance of a program suddenly worsens for a particular combination of input parameter values. One of the important advantages of this profiling technique is to identify what methods consume more resources (eg, CPU and memory usages) for specific combinations of input values and pinpoint why these methods are responsible for intensive execution time. Hence, developers can understand and optimize performance problems in a program, and they can predict how likely that a program might not scale with increasing the size of the input (eg, adding more users or a larger set of values for a given input parameter). Unfortunately, it is very difficult to identify specific input values from a large number of combinations that lead to performance degradation of programs. The aim of this survey is to explore the input-sensitive profiling problem and discuss its challenges. Some recent contributions of input-sensitive profiling algorithms that were developed to detect performance bottlenecks of a program are investigated and summarized.

      PubDate: 2016-05-06T22:33:30Z
      DOI: 10.1016/bs.adcom.2016.04.002
       
  • Privacy Challenges and Goals in mHealth Systems
    • Authors: F. Rahman; I.D. Addo; S.I. Ahamed; J.-J. Yang; Q. Wang
      Pages: 47 - 62
      Abstract: Publication date: Available online 22 June 2016
      Source:Advances in Computers
      Author(s): F. Rahman, I.D. Addo, S.I. Ahamed, J.-J. Yang, Q. Wang
      The global phenomena of mobile technology have encouraged collaborations between national governments and diverse international stakeholders in applying mobile-based health (mHealth) solutions as a powerful opportunity for improving health and development in rural and remote areas. A significant impact offered by modern mHealth technologies includes the potential to transform various aspects of healthcare, improving accessibility, quality, and affordability. Over the years, mHealth has become important in the field of healthcare information technology as patients begin to use mobile-based medical sensors to record their daily activities and vital signs. The rapid expansion of mobile information and communications technologies within health service delivery and public health systems has created a range of new opportunities to deliver new forms of interactive health services to patients, clinicians, and caregivers alike. The scope and scale of mHealth interventions range from simple direct-to-individual consumer and interactive patient-provider communications to more complex computer-based systems facilitating coordinated patient care and management.

      PubDate: 2016-06-26T23:55:56Z
      DOI: 10.1016/bs.adcom.2016.05.004
       
  • Recent Advances in Model-Based Testing
    • Authors: Mark Utting; Bruno Legeard; Fabrice Bouquet; Elizabeta Fourneret; Fabien Peureux; Alexandre Vernotte
      Pages: 53 - 120
      Abstract: Publication date: Available online 12 January 2016
      Source:Advances in Computers
      Author(s): Mark Utting, Bruno Legeard, Fabrice Bouquet, Elizabeta Fourneret, Fabien Peureux, Alexandre Vernotte
      This chapter gives an overview of the field of model-based testing (MBT), particularly the recent advances in the last decade. It gives a summary of the MBT process, the modeling languages that are currently used by the various communities who practice MBT, the technologies used to generate tests from models, and discusses best practices, such as traceability between models and tests. It also briefly describes several findings from a recent survey of MBT users in industry, outlines the increasingly popular use of MBT for security testing, and discusses future challenges for MBT.

      PubDate: 2016-01-13T11:43:20Z
      DOI: 10.1016/bs.adcom.2015.11.004
       
  • A Survey of Data Cleansing Techniques for Cyber-Physical Critical
           Infrastructure Systems
    • Authors: M. Woodard; M. Wisely; S. Sedigh Sarvestani
      Pages: 63 - 110
      Abstract: Publication date: Available online 16 June 2016
      Source:Advances in Computers
      Author(s): M. Woodard, M. Wisely, S.S. Sarvestani
      Critical infrastructure cyber-physical systems heavily depend on accurate data in order to facilitate intelligent control and improve performance. Corruption of data in these systems is unavoidable, resulting from both intentional and unintentional means. The consequence of making control decisions based on erroneous or corrupted data can be severe including financial loss, injury, or death. This makes employing a mechanism to detect and mitigate corrupted data crucial. Many techniques have been developed to detect and mitigate corrupted data. However, these techniques vary greatly in their capability to detect certain anomalies and required computing resources. This chapter presents a survey of data cleansing techniques and their applicability to various control levels in a critical infrastructure cyber-physical systems.

      PubDate: 2016-06-16T19:07:38Z
      DOI: 10.1016/bs.adcom.2016.05.002
       
  • Indexing and Querying Techniques for Moving Objects in Both Euclidean
           Space and Road Network
    • Authors: L. Heendaliya; M. Wisely; D. Lin; S. Sedigh Sarvestani; A. Hurson
      Pages: 111 - 170
      Abstract: Publication date: Available online 17 June 2016
      Source:Advances in Computers
      Author(s): L. Heendaliya, M. Wisely, D. Lin, S.S. Sarvestani, A. Hurson
      Location-dependent query is a service that enables users to acquire real-time location-dependent information on mobile objects. This type of service is challenged by the size and volatility of the underlying data. This challenge has created the need for new methods that allow users to efficiently access, retrieve, and update volatile mobile object data. Motivated by this necessity, this chapter explores and discusses research challenges and issues regarding indexing and querying mobile data. The support for predictive queries on road-network constrained mobile objects is a major deficiency in the existing research. This chapter also presents performance evaluation on some solutions of indexing mobile objects as well as their supported predictive queries under the road-network constraints.

      PubDate: 2016-06-18T16:36:26Z
      DOI: 10.1016/bs.adcom.2016.05.003
       
  • On Testing Embedded Software
    • Authors: Abhijeet Banerjee; Sudipta Chattopadhyay; Abhik Roychoudhury
      Pages: 121 - 153
      Abstract: Publication date: Available online 6 January 2016
      Source:Advances in Computers
      Author(s): Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury
      For the last few decades, embedded systems have expanded their reach into major aspects of human lives. Starting from small handheld devices (such as smartphones) to advanced automotive systems (such as anti-lock braking systems), usage of embedded systems has increased at a dramatic pace. Embedded software are specialized software that are intended to operate on embedded devices. In this chapter, we shall describe the unique challenges associated with testing embedded software. In particular, embedded software are required to satisfy several non-functional constraints, in addition to functionality-related constraints. Such non-functional constraints may include (but not limited to), timing/energy-consumption related constrains or reliability requirements, etc. Additionally, embedded systems are often required to operate in interaction with the physical environment, obtaining their inputs from environmental factors (such as temperature or air pressure). The need to interact with a dynamic, often non-deterministic physical environment, further increases the challenges associated with testing, and validation of embedded software. In the past, testing and validation methodologies have been studied extensively. This chapter, however, explores the advances in software testing methodologies, specifically in the context of embedded software. This chapter introduces the reader to key challenges in testing non-functional properties of software by means of realistic examples. It also presents an easy-to-follow, classification of existing research work on this topic. Finally, the chapter is concluded with a review of promising future directions in the area of embedded software testing.

      PubDate: 2016-01-09T07:28:40Z
      DOI: 10.1016/bs.adcom.2015.11.005
       
  • Advances in Web Application Testing, 2010–2014
    • Authors: Sreedevi Sampath; Sara Sprenkle
      Pages: 155 - 191
      Abstract: Publication date: Available online 12 January 2016
      Source:Advances in Computers
      Author(s): Sreedevi Sampath, Sara Sprenkle
      As web applications increase in popularity, complexity, and size, approaches and tools to automate testing the correctness of web applications must continually evolve. In this chapter, we provide a broad background on web applications and the challenges in testing these distributed, dynamic applications made up of heterogeneous components. We then focus on the recent advances in web application testing that were published between 2010 and 2014, including work on test-case generation, oracles, testing evaluation, and regression testing. Through this targeted survey, we identify trends in web application testing and open problems that still need to be addressed.

      PubDate: 2016-01-13T11:43:20Z
      DOI: 10.1016/bs.adcom.2015.11.006
       
  • Approaches and Tools for Automated End-to-End Web Testing
    • Authors: Maurizio Leotta; Diego Clerissi; Filippo Ricca; Paolo Tonella
      Pages: 193 - 237
      Abstract: Publication date: Available online 13 January 2016
      Source:Advances in Computers
      Author(s): Maurizio Leotta, Diego Clerissi, Filippo Ricca, Paolo Tonella
      The importance of test automation in web engineering comes from the widespread use of web applications and the associated demand for code quality. Test automation is considered crucial for delivering the quality levels expected by users, since it can save a lot of time in testing and it helps developers to release web applications with fewer defects. The main advantage of test automation comes from fast, unattended execution of a set of tests after some changes have been made to a web application. Moreover, modern web applications adopt a multitier architecture where the implementation is scattered across different layers and run on different machines. For this reason, end-to-end testing techniques are required to test the overall behavior of web applications. In the last years, several approaches have been proposed for automated end-to-end web testing and the choice among them depends on a number of factors, including the tools used for web testing and the costs associated with their adoption. They can be classified using two main criteria: the first concerns how test cases are developed (ie, Capture-Replay and Programmable approaches), while, the second concerns how test cases localize the web elements to interact with (ie, Coordinates-based, DOM-based, and Visual approaches), that is what kind of locators are used for selecting the target GUI components. For developers and project managers it is not easy to select the most suitable automated end-to-end web testing approach for their needs among the existing ones. This chapter provides a comprehensive overview of the automated end-to-end web testing approaches and summarizes the findings of a long term research project aimed at empirically investigating their strengths and weaknesses.

      PubDate: 2016-01-18T15:11:11Z
      DOI: 10.1016/bs.adcom.2015.11.007
       
  • Security Testing: A Survey
    • Authors: Michael Felderer; Matthias Martin Johns Achim Brucker Ruth Breu Alexander
      Abstract: Publication date: Available online 29 December 2015
      Source:Advances in Computers
      Author(s): Michael Felderer, Matthias Büchler, Martin Johns, Achim D. Brucker, Ruth Breu, Alexander Pretschner
      Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software. Due to the openness of modern software-based systems, applying appropriate security testing techniques is of growing importance and essential to perform effective and efficient security testing. Therefore, an overview of actual security testing techniques is of high value both for researchers to evaluate and refine the techniques and for practitioners to apply and disseminate them. This chapter fulfills this need and provides an overview of recent security testing techniques. For this purpose, it first summarize the required background of testing and security engineering. Then, basics and recent developments of security testing techniques applied during the secure software development life cycle, ie, model-based security testing, code-based testing and static analysis, penetration testing and dynamic analysis, as well as security regression testing are discussed. Finally, the security testing techniques are illustrated by adopting them for an example three-tiered web-based business application.

      PubDate: 2015-12-31T21:32:19Z
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2016