Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por HumanISE

2018

FatoXtract a suit that may be useful in rehabilitation

Autores
Vital, JPM; Fonseca Ferreira, NMF; Soares, SFSP; Valente, A; Pereira Barroso, JMP;

Publicação
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE DEVELOPMENT AND TECHNOLOGIES FOR ENHANCING ACCESSIBILITY AND FIGHTING INFO-EXCLUSION (DSAI 2018)

Abstract
Kinematic analysis of human movement is very important in several areas, such as in sports (e.g., for athletic performance analysis), health (e.g., rehabilitation of people with motor disabilities) and others. The study of the kinematics of the human body involves several methods that resort to the analysis of several parameters that come from the movement. Important parameters to take into account are the acceleration, velocity and position (linear or angular) of the various articulations of the human body, which can be measured by sensors or through the analysis of repeated images obtained by camera. In this paper will be presented a suit that acquire the different position of human joints that will be useful in rehabilitation, FatoXtract. It is through the analysis of human movement that we can analyze whether the movement in rehabilitation is adequate or not.

2018

Introduction

Autores
Hadjileontiadis, L; Barroso, J; Sandnes, FE;

Publicação
ACM International Conference Proceeding Series

Abstract

2018

Automated Scenario-Based Integration Testing of Distributed Systems

Autores
Lima, B;

Publicação
ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING

Abstract
In a growing number of domains, the provisioning of end-to-end services to the users depends on the proper interoperation of multiple systems, forming a new distributed system, often subject to timing constraints. To ensure interoperability and integrity, it is important to conduct integration tests that verify the interactions with the environment and between the system components in key scenarios. To tackle test automation challenges, we propose algorithms for decentralized conformance checking and test input generation, and for checking and enforcing the conditions (local observability and controllability) that allow decentralized test execution.

2018

Why does the orientation change mess up my Android application? From GUI failures to code faults

Autores
Amalfitano, D; Riccio, V; Paiva, ACR; Fasolino, AR;

Publicação
SOFTWARE TESTING VERIFICATION & RELIABILITY

Abstract
This paper investigates the failures exposed in mobile apps by the mobile-specific event of changing the screen orientation. We focus on GUI failures resulting in unexpected GUI states that should be avoided to improve the apps quality and to ensure better user experience. We propose a classification framework that distinguishes 3 main classes of GUI failures due to orientation changes and exploit it in 2 studies that investigate the impact of such failures in Android apps. The studies involved both open-source and apps from Google Play that were specifically tested exposing them to orientation change events. The results showed that more than 88% of these apps were affected by GUI failures, some classes of GUI failures were more common than others, and some GUI objects were more frequently involved. The app source code analysis allowed us to identify 6 classes of common faults causing specific GUI failures.

2018

Manage Software Requirements Specification Using Web Analytics Data

Autores
Garcia, JE; Paiva, ACR;

Publicação
Trends and Advances in Information Systems and Technologies - Volume 2 [WorldCIST'18, Naples, Italy, March 27-29, 2018]

Abstract
In the context of SaaS (Software as a Service) where software has to be up and running 7 days a week and 24 h a day, keeping the requirements specification up to date can be difficult. Managing requirements in this context have additional challenges that need to be taken into account, for instance, re-prioritize requirements continuously and identify/update new dependencies among them. We claim that extracting and analyzing the usage of the SaaS can help to maintain requirements updated and contribute to improve the overall quality of the services provided. This paper presents REQAnalytics, a recommendation system that collects the information about the usage of a SaaS, analyses it and generates recommendations more readable than reports generated by web analytic tools. The overall approach has been applied on several case studies with promising results. © Springer International Publishing AG, part of Springer Nature 2018.

2018

Pattern based Web Security Testing

Autores
de Araújo, PJM; Paiva, ACR;

Publicação
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2018, Funchal, Madeira - Portugal, January 22-24, 2018.

Abstract
This paper presents a Pattern Based Testing approach for testing security aspects of the applications under test (AUT). It describes the two security patterns which are the focus of this work (“Account Lockout” and “Authentication Enforcer”) and the test strategies implemented to check if the applications are vulnerable or not regarding these patterns. The PBST (Pattern Based Security Testing) overall approach has two phases: exploration (to identify the web pages of the application under test) and testing (to execute the test strategies developed in order to detect vulnerabilities). An experiment is presented to validate the approach over five public web applications. The goal is to assess the behavior of the tool when varying the upper limit of pages to visit and assess its capacity to find real vulnerabilities. The results are promising. Indeed, it was possible to check that the vulnerabilities detected corresponded to real security problems. Copyright

  • 282
  • 641