Paper: Fault Interaction and its Repercussions
Authors: Nicholas DiGiuseppe and James A. Jones
Seesion: Research Track 1: Faults and Regression Testing
Capping is one of the most complex phenomena in the pharmaceutical industry it is one of the mechanical defects in the tableting process in which catastrophic failure of the compact can occur. Understanding what influences tablet capping in terms of process variables, material properties, and density/stress distributions in tablets and developing specialized techniques to correlate these variables with mechanical failures are practical interests of the pharmaceutical industry. In this presentation, we describe a nondestructive ultrasonic device/methodology to predict the capping tendencies of tablet formulations based on their manufacturing performances.
The document contains data on three variables: hari (day), tanaman (plant), and produktivitas (productivity). It analyzes the productivity data using one-way ANOVA and post-hoc tests. The ANOVA shows a significant effect of day on productivity. Post-hoc tests find productivity is significantly lower on Selasa (Tuesday) than Senin (Monday) or Rabu (Wednesday).
High hydrostatic pressure between 500-4000 bar can disaggregate and refold proteins while maintaining native structure. This "PreEMT" technology enables refolding of inclusion bodies and aggregates from bacterial and mammalian expression into properly folded monomers. Studies show refolded interferon-beta and growth hormone had reduced aggregates and immunogenicity compared to commercially available versions. The technology is scalable and can improve safety and yields of protein therapeutics.
eROSE is a tool that guides programmers in Eclipse by recommending related changes based on mining associations from a software project's history. It predicts 33% of changed entities and 70% of transactions contain a changed entity within the top three recommendations. Precision averages 0.29 while recall averages 0.33 for entities and 0.44 for files. eROSE's recommendations improve over time with more data and feedback from users. It will be extended in upcoming releases to integrate annotations for risk awareness and management.
The document summarizes the key steps of genetic algorithms:
1. Genetic algorithms follow natural evolution processes to find solutions to complex problems. They initialize a population of potential solutions and use selection, crossover, and mutation over generations to evolve better solutions.
2. The initial population is randomly generated and encoded as binary strings.
3. Selection chooses the fittest solutions based on an objective function. These solutions have a higher chance of reproducing to the next generation.
4. Crossover combines parts of two parents' strings to create new offspring solutions. Mutation also introduces random changes to the strings.
5. The process repeats across generations until a satisfactory solution is found.
Antonio Mora, Antonio Fernández-Ares, Juan-J Merelo-Guervós, Pablo García-Sánchez
This work describes an evolutionary algorithm (EA) for evolving the constants, weights and probabilities of a rule-based decision engine of a bot designed to play the Planet Wars game. The evaluation of the individuals is based on the result of some non-deterministic combats, whose outcome depends on random draws as well as the enemy action, and is thus noisy. This noisy fitness is addressed in the EA and then, its effects are deeply analysed in the experimental section. The conclusions shows that reducing randomness via repeated combats and re-evaluations reduces the effect of the noisy fitness, making then the EA an effective approach for solving the problem.
The document discusses modeling decision making deficits in disorders that impact the frontostriatal system using computational models of reinforcement learning. It notes that many such disorders involve changes in motivation and some have genetic heritability. However, the effects of candidate genes are generally small. The author proposes using a theoretical model of reinforcement learning that incorporates data on dopamine prediction errors and the basal ganglia to help identify which genes, tasks, and measures are most relevant. The model aims to integrate findings on how dopamine affects striatal learning of positive and negative prediction errors. Data from a temporal decision making task is presented that the model can fit at both group and single subject levels. The model may help modulate reinforcement learning parameters based on neurogenetic and pharmacological
Evolutionary Algorithms and their Applications in Civil Engineering - 1shreymodi
The document discusses evolutionary algorithms and their application to civil engineering problems. It provides an overview of genetic algorithms, including encoding solutions, initializing a population, reproduction through crossover and mutation, and selection. The document also gives an example of using genetic algorithms to optimize the design of a cylindrical can to minimize material costs subject to a volume constraint.
Capping is one of the most complex phenomena in the pharmaceutical industry it is one of the mechanical defects in the tableting process in which catastrophic failure of the compact can occur. Understanding what influences tablet capping in terms of process variables, material properties, and density/stress distributions in tablets and developing specialized techniques to correlate these variables with mechanical failures are practical interests of the pharmaceutical industry. In this presentation, we describe a nondestructive ultrasonic device/methodology to predict the capping tendencies of tablet formulations based on their manufacturing performances.
The document contains data on three variables: hari (day), tanaman (plant), and produktivitas (productivity). It analyzes the productivity data using one-way ANOVA and post-hoc tests. The ANOVA shows a significant effect of day on productivity. Post-hoc tests find productivity is significantly lower on Selasa (Tuesday) than Senin (Monday) or Rabu (Wednesday).
High hydrostatic pressure between 500-4000 bar can disaggregate and refold proteins while maintaining native structure. This "PreEMT" technology enables refolding of inclusion bodies and aggregates from bacterial and mammalian expression into properly folded monomers. Studies show refolded interferon-beta and growth hormone had reduced aggregates and immunogenicity compared to commercially available versions. The technology is scalable and can improve safety and yields of protein therapeutics.
eROSE is a tool that guides programmers in Eclipse by recommending related changes based on mining associations from a software project's history. It predicts 33% of changed entities and 70% of transactions contain a changed entity within the top three recommendations. Precision averages 0.29 while recall averages 0.33 for entities and 0.44 for files. eROSE's recommendations improve over time with more data and feedback from users. It will be extended in upcoming releases to integrate annotations for risk awareness and management.
The document summarizes the key steps of genetic algorithms:
1. Genetic algorithms follow natural evolution processes to find solutions to complex problems. They initialize a population of potential solutions and use selection, crossover, and mutation over generations to evolve better solutions.
2. The initial population is randomly generated and encoded as binary strings.
3. Selection chooses the fittest solutions based on an objective function. These solutions have a higher chance of reproducing to the next generation.
4. Crossover combines parts of two parents' strings to create new offspring solutions. Mutation also introduces random changes to the strings.
5. The process repeats across generations until a satisfactory solution is found.
Antonio Mora, Antonio Fernández-Ares, Juan-J Merelo-Guervós, Pablo García-Sánchez
This work describes an evolutionary algorithm (EA) for evolving the constants, weights and probabilities of a rule-based decision engine of a bot designed to play the Planet Wars game. The evaluation of the individuals is based on the result of some non-deterministic combats, whose outcome depends on random draws as well as the enemy action, and is thus noisy. This noisy fitness is addressed in the EA and then, its effects are deeply analysed in the experimental section. The conclusions shows that reducing randomness via repeated combats and re-evaluations reduces the effect of the noisy fitness, making then the EA an effective approach for solving the problem.
The document discusses modeling decision making deficits in disorders that impact the frontostriatal system using computational models of reinforcement learning. It notes that many such disorders involve changes in motivation and some have genetic heritability. However, the effects of candidate genes are generally small. The author proposes using a theoretical model of reinforcement learning that incorporates data on dopamine prediction errors and the basal ganglia to help identify which genes, tasks, and measures are most relevant. The model aims to integrate findings on how dopamine affects striatal learning of positive and negative prediction errors. Data from a temporal decision making task is presented that the model can fit at both group and single subject levels. The model may help modulate reinforcement learning parameters based on neurogenetic and pharmacological
Evolutionary Algorithms and their Applications in Civil Engineering - 1shreymodi
The document discusses evolutionary algorithms and their application to civil engineering problems. It provides an overview of genetic algorithms, including encoding solutions, initializing a population, reproduction through crossover and mutation, and selection. The document also gives an example of using genetic algorithms to optimize the design of a cylindrical can to minimize material costs subject to a volume constraint.
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
Paper: Structural Conformance Checking with Design Tests: An Evaluation of Usability and Scalability.
Authors: João Brunet, Dalton Dario Serey Guerrero and Jorge Figueiredo.
Session: Research Track 5: Traceability
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
Paper title: Using Source Code Metrics to Predict Change-Prone Java Interfaces
Authors: Daniele Romano and Martin Pinzger
Session: Research Track Session 11: Metrics
Natural Language Analysis - Mining Java Class Naming ConventionsICSM 2011
Paper: Mining Java Class Naming Conventions
Authors: Simon Butler, Michel Wermelinger, Yijun Yu and Helen Sharp
Session: Research Track 4 - Natural Language Analysis
ERA - Measuring Maintainability of Spreadsheets in the Wild ICSM 2011
Paper: Measuring Maintainability of Spreadsheets in the Wild
Authors: José Pedro Correia and Miguel Alexandre Ferreira
Session: Early Research Achievements Track Session 2: Software Changes and Maintainability
Paper: Tracking Technical Debt- An Exploratory Case Study
Authors: Yuepu Guo, Carolyn Seaman, Rebeka Gomes, Antonio Cavalcanti, Graziela Tonin, Fabio Q. B. Da Silva, André L. M. Santos, Clauirton Siebra
Session: Early Research Achievement Track Session 3
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
Paper: Localizing Failure-Inducing Program Edits Based on Spectrum Information.
Authors: Lingming Zhang, Miryung Kim, Sarfraz Khurshid.
Session: Research Track Session 1: Faults and Regression Testing
Reliability and Quality - Predicting post-release defects using pre-release f...ICSM 2011
Paper : Predicting Post-release Defects Using Pre-release Field Testing Results
Authors : Foutse Khomh, Brian Chan, Ying Zou, Anand Sinha and Dave Dietz
Session: Research Track Session 9: Reliability and Quality
Metrics - You can't control the unfamiliarICSM 2011
Paper: You Can't Control the Unfamiliar: A Study on the Relations Between Aggregation Techniques for Software Metrics
Authors: Bogdan Vasilescu, Alexander Serebrenik and Mark Van Den Brand
Session: Research Track 11 - Metrics
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
Paper : The Evolution of Information Systems. A Case Study on Document Management
Authors : Paolo Salvaneschi
Session: Industry Track Session 3: Evolution and migration
Components - Crossing the Boundaries while Analyzing Heterogeneous Component-...ICSM 2011
Paper: "Crossing the Boundaries while Analyzing Heterogeneous Component-Based Software Systems"
Authors: Amir Reza Yazdanshenas, Leon Moonen
Session: Research Track Session 7: Components
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...ICSM 2011
Paper: Expanding Identifiers to Normalize Source Code Vocabulary
Authors: Dave Binkley and Dawn Lawrie
Session: Research Track 4: Natural Language Analysis
Components - Graph Based Detection of Library API LimitationsICSM 2011
This document presents a method for detecting when client code imitates library APIs. It uses data dependency graphs (DDGs) to represent code and defines the concepts of traces, subtraces, and trace subsumption. The algorithm generates DDGs for the library and client code with different method call inlinings. It detects an imitation if the client DDG trace subsumes the library DDG trace. The method was evaluated on open source projects, achieving 82% precision for imported libraries and 75% precision for static libraries.
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...ICSM 2011
The document discusses detecting uninitialized variables in large Cobol programs with unrealizable code paths. It presents context-sensitive and context-insensitive analysis results, showing context-sensitive finds fewer uninitialized variables instances by tracking variable definitions and uses across code blocks. Heuristics like removing code smells and prioritizing by utility parameters further reduce detected instances. The technique supports maintenance by precisely locating variables causing failures and can be extended to other program analysis.
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
Paper: Estimating Software Maintenance Effort from Use Cases: an Industrial Case Study
Authors:Yan Ku, Jing Du, Ye Yang, Qing Wang
Session: Industry Tracking 5: Metrics and
Estimation
Evidence-based software process recovery uses data from software repositories to understand the actual development process used by a team. This allows comparison of the proposed process with the recovered process. Topic modeling of commits can identify developer topics like reliability, maintainability, and portability over time. Release patterns showing activity in source code, tests, builds and documentation near releases can also be recovered. Process recovery provides an objective view of the actual development process.
Industry - Relating Developers' Concepts and Artefact Vocabulary in a Financ...ICSM 2011
Paper: Relating Developers' Concepts and Artefact Vocabulary in a Financial
Software Module
Authors: Tezcan Dilshener and Michel Wermelinger
Session: Industry Track 2 - Reverse Engineering
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
Paper: Structural Conformance Checking with Design Tests: An Evaluation of Usability and Scalability.
Authors: João Brunet, Dalton Dario Serey Guerrero and Jorge Figueiredo.
Session: Research Track 5: Traceability
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
Paper title: Using Source Code Metrics to Predict Change-Prone Java Interfaces
Authors: Daniele Romano and Martin Pinzger
Session: Research Track Session 11: Metrics
Natural Language Analysis - Mining Java Class Naming ConventionsICSM 2011
Paper: Mining Java Class Naming Conventions
Authors: Simon Butler, Michel Wermelinger, Yijun Yu and Helen Sharp
Session: Research Track 4 - Natural Language Analysis
ERA - Measuring Maintainability of Spreadsheets in the Wild ICSM 2011
Paper: Measuring Maintainability of Spreadsheets in the Wild
Authors: José Pedro Correia and Miguel Alexandre Ferreira
Session: Early Research Achievements Track Session 2: Software Changes and Maintainability
Paper: Tracking Technical Debt- An Exploratory Case Study
Authors: Yuepu Guo, Carolyn Seaman, Rebeka Gomes, Antonio Cavalcanti, Graziela Tonin, Fabio Q. B. Da Silva, André L. M. Santos, Clauirton Siebra
Session: Early Research Achievement Track Session 3
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
Paper: Localizing Failure-Inducing Program Edits Based on Spectrum Information.
Authors: Lingming Zhang, Miryung Kim, Sarfraz Khurshid.
Session: Research Track Session 1: Faults and Regression Testing
Reliability and Quality - Predicting post-release defects using pre-release f...ICSM 2011
Paper : Predicting Post-release Defects Using Pre-release Field Testing Results
Authors : Foutse Khomh, Brian Chan, Ying Zou, Anand Sinha and Dave Dietz
Session: Research Track Session 9: Reliability and Quality
Metrics - You can't control the unfamiliarICSM 2011
Paper: You Can't Control the Unfamiliar: A Study on the Relations Between Aggregation Techniques for Software Metrics
Authors: Bogdan Vasilescu, Alexander Serebrenik and Mark Van Den Brand
Session: Research Track 11 - Metrics
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
Paper : The Evolution of Information Systems. A Case Study on Document Management
Authors : Paolo Salvaneschi
Session: Industry Track Session 3: Evolution and migration
Components - Crossing the Boundaries while Analyzing Heterogeneous Component-...ICSM 2011
Paper: "Crossing the Boundaries while Analyzing Heterogeneous Component-Based Software Systems"
Authors: Amir Reza Yazdanshenas, Leon Moonen
Session: Research Track Session 7: Components
Natural Language Analysis - Expanding Identifiers to Normalize Source Code Vo...ICSM 2011
Paper: Expanding Identifiers to Normalize Source Code Vocabulary
Authors: Dave Binkley and Dawn Lawrie
Session: Research Track 4: Natural Language Analysis
Components - Graph Based Detection of Library API LimitationsICSM 2011
This document presents a method for detecting when client code imitates library APIs. It uses data dependency graphs (DDGs) to represent code and defines the concepts of traces, subtraces, and trace subsumption. The algorithm generates DDGs for the library and client code with different method call inlinings. It detects an imitation if the client DDG trace subsumes the library DDG trace. The method was evaluated on open source projects, achieving 82% precision for imported libraries and 75% precision for static libraries.
Industry - Precise Detection of Un-Initialized Variables in Large, Real-life ...ICSM 2011
The document discusses detecting uninitialized variables in large Cobol programs with unrealizable code paths. It presents context-sensitive and context-insensitive analysis results, showing context-sensitive finds fewer uninitialized variables instances by tracking variable definitions and uses across code blocks. Heuristics like removing code smells and prioritizing by utility parameters further reduce detected instances. The technique supports maintenance by precisely locating variables causing failures and can be extended to other program analysis.
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
Paper: Estimating Software Maintenance Effort from Use Cases: an Industrial Case Study
Authors:Yan Ku, Jing Du, Ye Yang, Qing Wang
Session: Industry Tracking 5: Metrics and
Estimation
Evidence-based software process recovery uses data from software repositories to understand the actual development process used by a team. This allows comparison of the proposed process with the recovered process. Topic modeling of commits can identify developer topics like reliability, maintainability, and portability over time. Release patterns showing activity in source code, tests, builds and documentation near releases can also be recovered. Process recovery provides an objective view of the actual development process.
Industry - Relating Developers' Concepts and Artefact Vocabulary in a Financ...ICSM 2011
Paper: Relating Developers' Concepts and Artefact Vocabulary in a Financial
Software Module
Authors: Tezcan Dilshener and Michel Wermelinger
Session: Industry Track 2 - Reverse Engineering
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
6. We Need More Fault Understanding
Conferences:
ASE, FSE, ICSE, ICSM, ICST, ISSTA
Years: 2008–2009
27 Fault Localization = 2.25 per conference per year
4 Fault Behavior = 0.333 per conference per year
7. Motivating Example
X = input [0] - 2
Y = input [0] - 2
If (X == Y)
print 1
else
print 0
Expected Actual Pass/Fail
Results Results Status
Test Case 1: input [0,0] 1 1 Pass
Test Case 2: input [2,0] 0 1 Fail
8. Motivating Example
X = input [0] - 2
Y = input [1] / 2
If (X == Y)
print 1
else
print 0
Expected Actual Pass/Fail
Results Results Status
Test Case 1: input [0,0] 1 0 Fail
Test Case 2: input [2,0] 0 1 Fail
9. Motivating Example
X = input [0] * 2
Y = input [1] / 2
If (X == Y)
print 1
else
print 0
Expected Actual Pass/Fail
Results Results Status
Test Case 1: input [0,0] 1 1 Pass
Test Case 2: input [2,0] 0 0 Pass
11. Our Experiment
Flex Gzip Replace Schedule Sed Space Total
1 Fault 21 20 25 20 20 33 139
2 Faults 189 182 185 165 188 200 1109
3 Faults 502 505 598 500 660 200 2965
4 Faults 1000 1000 700 500 950 200 4350
5 Faults 1000 1000 700 500 950 200 4350
17 Faults 1000 1000 700 500 950 200 4350
Total Versions
Total Versions
14,712 14,707 10,608 65,113
7,68514,168 3,233 65,113
Size of Test Suite 527 214 5,542 2,650 363 13,527 22,733
Number of Executions 138,239,433
Number of
Executions
7,753,224 3,147,298 58,798,536 17,673,600 6,253,984 43,732,791 138,239,433
12. a Results
1.0
1.0
Obfuscation Multi Type 1.0
0.8
0.8 0.8
Percentage of Interaction
Percentage of Interaction
Percentage of Interaction
0.6
0.6 Synergy Independence 0.6
0.4
0.4 0.4
0.2
0.2 0.2
0.0
0.0 0.0
00 11 22 33 44 55 66 77 88 99 10 11 12 13 14 15 16 17
10 11 12 13 14 15 16 17 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
The Quantity of Faults
The Quantity of Faults The Quantity of Faults
1.0 1.0
0.8 0.8
Percentage of Interaction
Percentage of Interaction
0.6 0.6
0.4 0.4
0.2 0.2
0.0 0.0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
The Quantity of Faults The Quantity of Faults
1.0 1.0
0.8 0.8
Percentage of Interaction
Percentage of Interaction
0.6 0.6
0.4 0.4
0.2 0.2
0.0 0.0
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
The Quantity of Faults The Quantity of Faults
13. Impact of Fault Interaction
Regression Testing
Fault Localization Two Faults Fix a Fault One Fault
Test 1 Pass Fail
Test 2 Pass Pass
Test 3 Fail Pass
Time
Failure Clustering
Run Test Fix Faults
Suite in Clusters
Cluster Assign Clusters
Failures to Developers
14. Results Continued
Gzip Flex Replace Schedule Sed Space
LoEC 2013 4020 242 150 2253 3651
Branches 1727 2680 182 66 2554 1190
Methods 514 1261 63 41 416 717
Data Dep 45,291 143,075 2005 1327 94,614 29,883
Control Dep 26,766 61,279 1444 1074 21,991 25,047
Total Dep 72,057 204,354 3449 2401 116,605 54,930
LoEC: 1.165 1.5 3.818 2.273 1.893 3.068
Branches
LoEC: Methods 3.916 3.188 3.841 3.659 5.416 5.092
LoEC: Data 0.044 0.028 0.121 0.113 0.024 0.122
Dep
LoEC: Control 0.075 0.066 0.168 0.140 0.103 0.146
Dep
LoEC: Total 0.028 0.020 0.070 0.062 0.019 0.067
Dep
15. Conclusions
Defined Fault Interaction
Demonstrated that Fault Interaction is prominent (primarily
fault obfuscation)
Demonstrated that Fault Interaction can have a real
impact on practice and research
Demonstrated that the size of a program affects Fault
Interaction
16. Conclusions
Take Home Message
Fault Interaction is prevalent
Fault Obfuscation is prevalent
We need to adapt our techniques