Integration and Higher Level Testing
|
|
- Eugene Wilson
- 5 years ago
- Views:
Transcription
1 Integration and Higher Level Testing Software Testing and Verification Lecture 11 Prepared by Stephen M. Thebaut, Ph.D. University of Florida
2 Context Higher-level testing begins with the integration of (already unit-tested) modules to form higher-level program entities (e.g., components). The primary objective of integration testing is to discover interface and blatant higher-level design errors associated with the elements being integrated. (Somewhat in keeping with the spirit of smoke testing.)
3 Context (cont d) Once the elements have been successfully integrated (i.e., once they are able to function together), the functional and non-functional characteristics of the higher-level element can be tested thoroughly (via component, product, or system testing).
4 Integration Testing Integration testing is carried out when integrating (i.e., combining): Units or modules to form a component Components to form a product Products to form a system The strategy employed can significantly affect the time and effort required to yield a working, higher-level element.
5 Integration Testing (cont d) Note that integration testing is sometimes defined as the level of testing between unit and system. We use a more general model of the testing process.
6 Levels of Testing More General View Popular View System Test Integration Test Unit Test System Test Integration Test Product Test Integration Test Component Test Integration Test Unit Test
7 Integration Testing Strategies The first (and usually the easiest...) issue to address is the choice between instantaneous and incremental integration testing. The former is sometimes referred to as the big bang approach. (Guess why!) Locating subtle errors can be very difficult after the bang. Integration is a process, not an event.
8 Integration Testing Strategies (cont d) Incremental integration testing results in some additional overhead, but can significantly reduce error localization and correction time. (What is the overhead?) The optimum incremental approach is inherently dependent on the individual project and the pros and cons of the various alternatives available.
9 s an aside Here s a slide from an on-line lecture that I came across recently Principles of Integration Proper policy and plans dvocacy Manpower training Realistic tasks Coordination with other sectors Proper support ccess to drugs Integration of Substance buse Disorders in National Rural Health Mission (NRHM), Centre for Community Medicine, ll India Institute of Medical Sciences, New Delhi
10 s an aside Here s a slide from an on-line lecture that I came across recently Principles of Integration Proper policy and plans dvocacy Manpower training Realistic tasks Coordination with other sectors Proper support ccess to drugs Integration of Substance buse Disorders in National Rural Health Mission (NRHM), Centre for Community Medicine, ll India Institute of Medical Sciences, New Delhi
11 Incremental Strategies Suppose we are integrating a group of modules to form a component, the control structure of which will form a calling hierarchy as shown. B C D E F G H I J K L
12 Incremental Strategies (cont d) In what order should the modules be integrated? From the top ( root ) module toward the bottom? From bottom ( leaf ) modules toward the top? By function? Critical or high-risk modules first? By availability?
13 Incremental Strategies (cont d) How many should be combined at a time? What scaffolding (i.e., s and s to exercise the modules, and oracles to interpret/inspect test results) will be required? Is scaffolding ever required outside the context of integration testing?
14 Top-Down Strategy 1. Start with the root and one or more called modules. 2. Test this group using s to take the place of missing called modules, and one (if necessary) to call the root module. 3. dd one or more other called modules, replacing and providing new s as necessary. (cont d)
15 Top-Down Strategy (cont d) 4. Continue the process until all elements have been integrated and tested.
16 Top-Down Strategy (cont d) B C D E F G H I J K L
17 Top-Down Strategy (cont d) B C D E F G H I B J K L
18 Top-Down Strategy (cont d) B C D E F G H I B C J K L
19 Top-Down Strategy (cont d) B C D E F G H I B C D J K L
20 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E
21 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E F
22 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E F G
23 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E F G H
24 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E F G H I
25 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E F G H I J
26 Top-Down Strategy (cont d) B C D E F G H I B C D J K L E F G H I J K
27 Top-Down Strategy (cont d) B C D E F G H I J K L
28 Top-Down Strategy (cont d) Potential dvantages: llows early verification of high-level behavior. One (at most) is required. Modules can be added one at a time with each step if desired. Supports both breadth first and depth first approaches.
29 Top-Down Strategy (cont d) Potential Disadvantages: Delays verification of low-level behavior. Stubs are required for missing elements. Test case inputs may be difficult to formulate. Test case outputs may be difficult to interpret. (Oracles may be needed to interpret/inspect test results.)
30 Bottom-Up Strategy 1. Start at the bottom of the hierarchy with two or more sibling leaf modules, or an only-child leaf module with its parent. 2. Test this group using a. (No s are required.) 3. dd one or more additional siblings, replacing s with modules only when all modules they call have been integrated. (cont d)
31 Bottom-Up Strategy (cont d) 4. Continue the process until all elements of the subtree have been integrated and tested. 5. Repeat the steps above for the remaining subtrees in the hierarchy (or handle in parallel). 6. Incrementally combine the sub-trees and then add the root module.
32 Bottom-Up Strategy (cont d) B C D E F G H I J K L
33 Bottom-Up Strategy (cont d) B C D E F G H I J K L F J
34 Bottom-Up Strategy (cont d) B C D E F G H I J K L E F J
35 Bottom-Up Strategy (cont d) B C D E F G H I B J K L E F J
36 Bottom-Up Strategy (cont d) B C D E F G H I B J K L E F J K L
37 Bottom-Up Strategy (cont d) B C D E F G H I B J K L E F H J K L
38 Bottom-Up Strategy (cont d) B C D E F G H I B J K L E F H I J K L
39 Bottom-Up Strategy (cont d) B C D E F G H I B D J K L E F H I J K L
40 Bottom-Up Strategy (cont d) B C D E F G H I B D J K L E F G H I J K L
41 Bottom-Up Strategy (cont d) B C D E F G H I B C D J K L E F G H I J K L
42 Bottom-Up Strategy (cont d) B C D E F G H I B C D J K L E F G H I J K L
43 Bottom-Up Strategy (cont d) B C D E F G H I B C D J K L E F G H I J K L
44 Bottom-Up Strategy (cont d) B C D E F G H I B C D J K L E F G H I J K L
45 Bottom-Up Strategy (cont d) B C D E F G H I B C D J K L E F G H I J K L
46 Bottom-Up Strategy (cont d) B C D E F G H I J K L
47 Bottom-Up Strategy (cont d) Potential dvantages: llows early verification of low-level behavior. No s are required. Easier to formulate input data for some subtrees. Easier to interpret output data for others.
48 Bottom-Up Strategy (cont d) Potential Disadvantages: Delays verification of high-level behavior. Drivers are required for missing elements. s subtrees are combined, a large number of elements may be integrated at one time.
49 Hybrid Incremental Integration pproaches Risk Driven Start by integrating the most critical or complex modules together with modules they call or are called by. Schedule Driven To the extent possible, integrate modules as they become available. (cont d)
50 Hybrid Incremental Integration pproaches (cont d) Function or Thread Driven Integrate the modules associated with a key function (thread); continue the process by selecting another function, etc. B C D E F G H I J K L
51 Hybrid Incremental Integration pproaches (cont d) Function or Thread Driven Integrate the modules associated with a key function (thread); continue the process by selecting another function, etc. B C D E F G H I J K L
52 How about Object-Oriented Systems? Just as a calling hierarchy allows design of an integration strategy for imperative software, use/include relations serve this purpose for object-oriented software. Since there may be no single root class, testing usually proceeds cluster by cluster in a bottom-up fashion, starting with leaf classes that depend on no others. We will come back to this in Lecture 12.
53 Higher-Level Testing Higher-level tests focus on the core functionality specified for higher level elements, and on certain emergent properties that become more observable as testing progresses toward the system level. The black-box testing strategies already considered (e.g., partition and combinatorial approaches) apply to functional testing at any level.
54 Higher-Level Testing (cont d) Higher-level testing typically includes: Usability test Installability test Serviceability test Performance test Stress test Security test Software compatibility test Device and configuration test Recovery test Reliability test brief overview of each follows.
55 Usability Test Focus is on factors which influence the ease with which potential end-users are able to utilize the system to accomplish their goals. Specialized and sophisticated: HCI experts conduct experiments in simulated work environments. Protocol analysis is utilized to identify usability bottlenecks. pplication-specific metrics related to understandability, learnability, and operability may be employed.
56 Installability Test Focus is functional and non-functional requirements related to the installation of the product/system. Coverage includes: Media correctness and fidelity, Relevant documentation (including examples), and Installation processes and supporting system functions. (cont d)
57 Installability Test (cont d) Functions, procedures, documentation, etc., associated with product/system decommissioning must also be tested.
58 Serviceability Test Focus is requirements related to upgrading or fixing problems after installation. Coverage includes: Change procedures (adaptive, perfective, and corrective service scenarios), Supporting documentation, and System diagnostic tools.
59 Performance Test Focus is requirements related to throughput, response time, memory utilization, input/ output rates, etc. lso very specialized in some organizations; sophisticated test-beds and instrumentation are the norm. Statistical testing based on an operational profile is often employed. Requirements must be stated in quantifiable terms.
60 Stress Test Focus is system behavior at or near overload conditions (i.e., pushing the system to failure ). Often undertaken with performance testing. In general, products are required to exhibit graceful failures and non-abrupt performance degradation.
61 Security Test Focus is vulnerability of resources to unauthorized access or manipulation. Issues include: Physical security of computer resources, media, etc., Login and password procedures/policies, Levels of authorization for data or procedural access, etc.
62 Software Compatibility Test Focus is compatibility with other products/systems in the environment and/or with interoperability standards. May also concern source- or object-code compatibility with different operating environment versions. K compatibility/conversion testing when conversion procedures or processes are involved.
63 Device and Configuration Test Focus is configurability for, and/or compatibility with, all supported hardware configurations. Particularly taxing for client/serverbased applications Tests are usually limited to combinations of representative devices for each supported protocol.
64 Recovery Test Focus is ability to recover from exceptional conditions associated with hardware, software, or people. This can involve: detecting exceptional conditions, switch-overs to standby systems, recovery of data, maintaining audit trails, etc. May also involve external procedures such as storing backup tapes, etc.
65 Reliability Test Requirements may be expressed as: the probability of no failure in a specified time interval, or as the expected mean time to failure. ppropriate interpretations for failure and time are critical. Utilizes Statistical testing based on an operational profile.
66 Integration and Higher Level Testing Software Testing and Verification Lecture 11 Prepared by Stephen M. Thebaut, Ph.D. University of Florida
Black-Box Testing Techniques III
Black-Box Testing Techniques III Software Testing and Verification Lecture 6 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Another Cause-Effect Example: Symbol Table Storage Specification
More informationWindchill Quality Solutions 2011 (formerly Relex 2011) Curriculum Guide
Windchill Quality Solutions 2011 (formerly Relex 2011) Curriculum Guide Web Based Curriculum Guide Update to Windchill Quality Solutions (Formerly Relex 2011) Windchill Quality Solutions (Formerly Relex
More informationInformation System Design IT60105
Information System Design IT60105 Lecture 19 Project Planning Lecture #19 ISD Project Planning SPMP Documentation System Design Models 2 Why Planning Information System Design? Program vs. Software Size
More informationMixed Criticality in Safety-Critical Systems. LS 12, TU Dortmund
Mixed Criticality in Safety-Critical Systems Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 18, July, 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 25 Motivation today s embedded systems use complex
More informationChe-Wei Chang Department of Computer Science and Information Engineering, Chang Gung University
Che-Wei Chang chewei@mail.cgu.edu.tw Department of Computer Science and Information Engineering, Chang Gung University } 2017/11/15 Midterm } 2017/11/22 Final Project Announcement 2 1. Introduction 2.
More informationThe conceptual view. by Gerrit Muller University of Southeast Norway-NISE
by Gerrit Muller University of Southeast Norway-NISE e-mail: gaudisite@gmail.com www.gaudisite.nl Abstract The purpose of the conceptual view is described. A number of methods or models is given to use
More informationLeveraging Randomness in Structure to Enable Efficient Distributed Data Analytics
Leveraging Randomness in Structure to Enable Efficient Distributed Data Analytics Jaideep Vaidya (jsvaidya@rbs.rutgers.edu) Joint work with Basit Shafiq, Wei Fan, Danish Mehmood, and David Lorenzi Distributed
More informationDECISION SUPPORT SYSTEMS FOR PARTICIPATORY FLOOD RISK AND DISASTER MANAGEMENT
DECISION SUPPORT SYSTEMS FOR PARTICIPATORY FLOOD RISK AND DISASTER MANAGEMENT PhD Thesis Panayiotis Sophronides, Dipl.-Ing., MSc & DIC, PhD Candidate Advisory committee: Prof. Maria Giaoutzi (Supervisor),
More informationSIMATIC Ident Industrial Identification Systems
Related catalogs SIMATIC Ident Industrial Identification Systems Catalog ID 10 2012 Introduction System overview SIMATIC Ident 1 RFID systems for the HF frequency range SIMATIC RF200 SIMATIC RF300 MOBY
More informationArcGIS Deployment Pattern. Azlina Mahad
ArcGIS Deployment Pattern Azlina Mahad Agenda Deployment Options Cloud Portal ArcGIS Server Data Publication Mobile System Management Desktop Web Device ArcGIS An Integrated Web GIS Platform Portal Providing
More informationEVALUATING RISK FACTORS OF BEING OBESE, BY USING ID3 ALGORITHM IN WEKA SOFTWARE
EVALUATING RISK FACTORS OF BEING OBESE, BY USING ID3 ALGORITHM IN WEKA SOFTWARE Msc. Daniela Qendraj (Halidini) Msc. Evgjeni Xhafaj Department of Mathematics, Faculty of Information Technology, University
More informationStandardization of Quantum Cryptography in China
Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography
More informationTDDI04, K. Arvidsson, IDA, Linköpings universitet CPU Scheduling. Overview: CPU Scheduling. [SGG7] Chapter 5. Basic Concepts.
TDDI4 Concurrent Programming, Operating Systems, and Real-time Operating Systems CPU Scheduling Overview: CPU Scheduling CPU bursts and I/O bursts Scheduling Criteria Scheduling Algorithms Multiprocessor
More informationINTRODUCTION. In March 1998, the tender for project CT.98.EP.04 was awarded to the Department of Medicines Management, Keele University, UK.
INTRODUCTION In many areas of Europe patterns of drug use are changing. The mechanisms of diffusion are diverse: introduction of new practices by new users, tourism and migration, cross-border contact,
More informationR E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.
R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E
More informationCPU SCHEDULING RONG ZHENG
CPU SCHEDULING RONG ZHENG OVERVIEW Why scheduling? Non-preemptive vs Preemptive policies FCFS, SJF, Round robin, multilevel queues with feedback, guaranteed scheduling 2 SHORT-TERM, MID-TERM, LONG- TERM
More informationSimulation of Process Scheduling Algorithms
Simulation of Process Scheduling Algorithms Project Report Instructor: Dr. Raimund Ege Submitted by: Sonal Sood Pramod Barthwal Index 1. Introduction 2. Proposal 3. Background 3.1 What is a Process 4.
More information1 Introduction. Station Type No. Synoptic/GTS 17 Principal 172 Ordinary 546 Precipitation
Use of Automatic Weather Stations in Ethiopia Dula Shanko National Meteorological Agency(NMA), Addis Ababa, Ethiopia Phone: +251116639662, Mob +251911208024 Fax +251116625292, Email: Du_shanko@yahoo.com
More informationDP Project Development Pvt. Ltd.
Dear Sir/Madam, Greetings!!! Thanks for contacting DP Project Development for your training requirement. DP Project Development is leading professional training provider in GIS technologies and GIS application
More informationDeveloping a Community Geographical Information System (GIS) in Rural India
Developing a Community Geographical Information System (GIS) in Rural India Before rushing off and describing the unique challenges of developing a small scale GIS system India I better first describe
More informationUniversity of Lusaka
University of Lusaka BSPH 315 Health Mapping & GIS Topic: Background of GIS Content: 1. Aim of the course 2. What do you know about GIS? 3. Difference between geographic data and geographic information
More informationAstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis
AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of
More informationAREP GAW. AQ Forecasting
AQ Forecasting What Are We Forecasting Averaging Time (3 of 3) PM10 Daily Maximum Values, 2001 Santiago, Chile (MACAM stations) 300 Level 2 Pre-Emergency Level 1 Alert 200 Air Quality Standard 150 100
More informationClock-driven scheduling
Clock-driven scheduling Also known as static or off-line scheduling Michal Sojka Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Control Engineering November 8, 2017
More informationCSE 380 Computer Operating Systems
CSE 380 Computer Operating Systems Instructor: Insup Lee & Dianna Xu University of Pennsylvania, Fall 2003 Lecture Note 3: CPU Scheduling 1 CPU SCHEDULING q How can OS schedule the allocation of CPU cycles
More informationGIS implementation in BESCOM
GIS implementation in BESCOM Muthulakshmi K B DGM-ICT&MIS, BESCOM Slide No 1 Contents Introduction Implementation Challenges Solution Status Way forward Slide No 2 Introduction GIS Geographical Information
More informationSpatial Data Infrastructure Concepts and Components. Douglas Nebert U.S. Federal Geographic Data Committee Secretariat
Spatial Data Infrastructure Concepts and Components Douglas Nebert U.S. Federal Geographic Data Committee Secretariat August 2009 What is a Spatial Data Infrastructure (SDI)? The SDI provides a basis for
More informationScalable Failure Recovery for Tree-based Overlay Networks
Scalable Failure Recovery for Tree-based Overlay Networks Dorian C. Arnold University of Wisconsin Paradyn/Condor Week April 30 May 3, 2007 Madison, WI Overview Motivation Address the likely frequent failures
More informationThe AMGI project: A Brief Overview
The AMGI project: A Brief Overview World Bank Group (Energy & Extractives Global Practice) GEEDR Francisco Igualada (figualada@worldbank.org) Presented by Ash Johnson, Geosoft Inc. The AMGI Project: Vision
More informationThe Geo Web: Enabling GIS on the Internet IT4GIS Keith T. Weber, GISP GIS Director ISU GIS Training and Research Center.
The Geo Web: Enabling GIS on the Internet IT4GIS Keith T. Weber, GISP GIS Director ISU GIS Training and Research Center In the Beginning GIS was independent The GIS analyst or manager was typically a oneperson
More informationBY: Daniel Kwame Ladzagla (Bsc Eng.,Msc I.T) The Energy Centre, KNUST-Kumasi. July 27 Dakar, Senegal
1 BY: Daniel Kwame Ladzagla (Bsc Eng.,Msc I.T) The Energy Centre, KNUST-Kumasi July 27 2016 @ Dakar, Senegal Presentation Outline 2 The Energy Center Work Package(WP) WP Implementation IntiGIS Model Methodology
More informationEveryday NMR. Innovation with Integrity. Why infer when you can be sure? NMR
Everyday NMR Why infer when you can be sure? Innovation with Integrity NMR Only NMR gives you definitive answers, on your terms. Over the past half-century, scientists have used nuclear magnetic resonance
More informationMermaid. The most sophisticated marine operations planning software available.
Mermaid The most sophisticated marine operations planning software available. Mojo Maritime / Marine economic risk management aid Mermaid : marine economic risk management aid The most sophisticated marine
More informationLecture 6 September 21, 2016
ICS 643: Advanced Parallel Algorithms Fall 2016 Lecture 6 September 21, 2016 Prof. Nodari Sitchinava Scribe: Tiffany Eulalio 1 Overview In the last lecture, we wrote a non-recursive summation program and
More informationPerformance Metrics for Computer Systems. CASS 2018 Lavanya Ramapantulu
Performance Metrics for Computer Systems CASS 2018 Lavanya Ramapantulu Eight Great Ideas in Computer Architecture Design for Moore s Law Use abstraction to simplify design Make the common case fast Performance
More informationIntroducing a Bioinformatics Similarity Search Solution
Introducing a Bioinformatics Similarity Search Solution 1 Page About the APU 3 The APU as a Driver of Similarity Search 3 Similarity Search in Bioinformatics 3 POC: GSI Joins Forces with the Weizmann Institute
More informationUrban Spatial Scenario Design Modelling (USSDM) in Dar es Salaam: Background Information
Urban Spatial Scenario Design Modelling (USSDM) in Dar es Salaam: Background Information Modelling urban settlement dynamics in Dar es Salaam Revision: 2 (July 2013) Prepared by: Katja Buchta TUM team
More informationStorage, Handling & Safe Use of Chemicals and Hazardous Materials
Training Title Storage, Handling & Safe Use of Chemicals and Hazardous Materials Training Duration 5 days Training Venue and Dates Storage, Handling and Safe Use of Chemical Handling and Hazardous Materials
More informationLearning Decision Trees
Learning Decision Trees Machine Learning Fall 2018 Some slides from Tom Mitchell, Dan Roth and others 1 Key issues in machine learning Modeling How to formulate your problem as a machine learning problem?
More informationIntroduction to Portal for ArcGIS
Introduction to Portal for ArcGIS Derek Law Product Management March 10 th, 2015 Esri Developer Summit 2015 Agenda Web GIS pattern Product overview Installation and deployment Security and groups Configuration
More informationSTORAGE, HANDLING & SAFE USE OF CHEMICALS AND HAZARDOUS MATERIALS
Training Title STORAGE, HANDLING & SAFE USE OF CHEMICALS AND HAZARDOUS MATERIALS Training Duration 5 days Training Venue and Dates Storage, Handling and Safe Use of Chemicals and Hazardous Materials In
More informationCLICK HERE TO KNOW MORE
CLICK HERE TO KNOW MORE Geoinformatics Applications in Land Resources Management G.P. Obi Reddy National Bureau of Soil Survey & Land Use Planning Indian Council of Agricultural Research Amravati Road,
More informationReliable Computing I
Instructor: Mehdi Tahoori Reliable Computing I Lecture 5: Reliability Evaluation INSTITUTE OF COMPUTER ENGINEERING (ITEC) CHAIR FOR DEPENDABLE NANO COMPUTING (CDNC) National Research Center of the Helmholtz
More informationApplications of GIS in Electrical Power System
Applications of GIS in Electrical Power System Abdulrahman M. AL-Sakkaf 201102310 CRP 514 May 2013 Dr. Baqer M. AL-Ramadan Abstract GIS has been widely used in various areas and disciplines. This paper
More informationEvaluating GIS for Disaster Management
Evaluating GIS for Disaster Management Bruce Kinner GEOG 596B 1 Outline Problem Area Project Goals Background Methodology System Case Study Significance & Limitations 2 Problem Area Problem Rationale -
More informationSPATIAL DATA MINING. Ms. S. Malathi, Lecturer in Computer Applications, KGiSL - IIM
SPATIAL DATA MINING Ms. S. Malathi, Lecturer in Computer Applications, KGiSL - IIM INTRODUCTION The main difference between data mining in relational DBS and in spatial DBS is that attributes of the neighbors
More informationAssessment and management of at risk populations using a novel GIS based UK population database tool
Safety and Security Engineering 203 Assessment and management of at risk populations using a novel GIS based UK population database tool H. Balmforth 1, H. McManus 1 & A. Fowler 2 1 Health and Safety Laboratory,
More informationClimate Services for Health Open Geospatial Consortium (OGC) Health Summit Dublin, June 21, 2016
Climate Services for Health Open Geospatial Consortium (OGC) Health Summit Dublin, June 21, 2016 Dr. Joy Shumake-Guillemot WMO/WHO Climate and Health Office Current and Future Climate Related Health Risks
More informationGeo-identification and pedestrian navigation with geo-mobile applications: how do users proceed?
TU Vienna presentation 17 th July 2008 Geo-identification and pedestrian navigation with geo-mobile applications: how do users proceed? Ioannis Delikostidis Corné van Elzakker INTERNATIONAL INSTITUTE FOR
More informationWALKUP LC/MS FOR PHARMACEUTICAL R&D
Pharmaceutical Workflow Solutions WALKUP LC/MS FOR PHARMACEUTICAL R&D Chemists, Peptide/Protein Chemists, Biologists, and Beyond MASSHUNTER WALKUP A Single User Interface for Robust and Reliable LC/MS
More informationOverview of Geospatial Open Source Software which is Robust, Feature Rich and Standards Compliant
Overview of Geospatial Open Source Software which is Robust, Feature Rich and Standards Compliant Cameron SHORTER, Australia Key words: Open Source Geospatial Foundation, OSGeo, Open Standards, Open Geospatial
More informationTrajectory Sensitivity Analysis as a Means of Performing Dynamic Load Sensitivity Studies in Power System Planning
21, rue d Artois, F-75008 PARIS CIGRE US National Committee http : //www.cigre.org 2014 Grid of the Future Symposium Trajectory Sensitivity Analysis as a Means of Performing Dynamic Load Sensitivity Studies
More informationMetConsole AWOS. (Automated Weather Observation System) Make the most of your energy SM
MetConsole AWOS (Automated Weather Observation System) Meets your aviation weather needs with inherent flexibility, proven reliability Make the most of your energy SM Automated Weather Observation System
More informationGeosciences Data Digitize and Materialize, Standardization Based on Logical Inter- Domain Relationships GeoDMS
Geosciences Data Digitize and Materialize, Standardization Based on Logical Inter- Domain Relationships GeoDMS Somayeh Veiseh Iran, Corresponding author: Geological Survey of Iran, Azadi Sq, Meraj St,
More informationSIFT-MS SELECTED ION FLOW TUBE MASS SPECTROMETRY TECHNOLOGY OVERVIEW \ SYFT TECHNOLOGIES
SIFT-MS SELECTED ION FLOW TUBE MASS SPECTROMETRY TECHNOLOGY OVERVIEW \ SYFT TECHNOLOGIES CONTENTS 1. An overview of SIFT-MS 2. Principles of SIFT-MS a. Why chemical ionization? b. Why multiple reagent
More informationThe World Bank IN Maharashtra Rural Water Supply and Sanitation Program (P126325)
Public Disclosure Authorized SOUTH ASIA India Water Global Practice IBRD/IDA Program-for-Results FY 2014 Seq No: 5 ARCHIVED on 23-Jun-2016 ISR24264 Implementing Agencies: Public Disclosure Authorized Program
More informationEssentials of Large Volume Data Management - from Practical Experience. George Purvis MASS Data Manager Met Office
Essentials of Large Volume Data Management - from Practical Experience George Purvis MASS Data Manager Met Office There lies trouble ahead Once upon a time a Project Manager was tasked to go forth and
More informationCBE495 LECTURE IV MODEL PREDICTIVE CONTROL
What is Model Predictive Control (MPC)? CBE495 LECTURE IV MODEL PREDICTIVE CONTROL Professor Dae Ryook Yang Fall 2013 Dept. of Chemical and Biological Engineering Korea University * Some parts are from
More informationInfrastructure Automation with Salt
Infrastructure Automation with Salt Sean McGrath 10th November 2016 About Research IT Where I work as a systems administrator http://www.tchpc.tcd.ie/ Ireland s premier High Performance Computing Centre
More informationCompiling Techniques
Lecture 11: Introduction to 13 November 2015 Table of contents 1 Introduction Overview The Backend The Big Picture 2 Code Shape Overview Introduction Overview The Backend The Big Picture Source code FrontEnd
More informationMTAT Software Engineering
MTAT.03.094 Software Engineering Lecture 14: Measurement Dietmar Pfahl Fall 2015 email: dietmar.pfahl@ut.ee Schedule of Lectures Week 01: Introduction to SE Week 02: Requirements Engineering I Week 03:
More informationSummary of Hyperion Research's First QC Expert Panel Survey Questions/Answers. Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton
Summary of Hyperion Research's First QC Expert Panel Survey Questions/Answers Bob Sorensen, Earl Joseph, Steve Conway, and Alex Norton Hyperion s Quantum Computing Program Global Coverage of R&D Efforts
More informationHampsonRussell. A comprehensive suite of reservoir characterization tools. cgg.com/geosoftware
HampsonRussell A comprehensive suite of reservoir characterization tools cgg.com/geosoftware HampsonRussell Software World-class geophysical interpretation HampsonRussell Software is a comprehensive suite
More informationSTORAGE, HANDLING & SAFE USE OF CHEMICALS AND HAZARDOUS MATERIALS
Training Title STORAGE, HANDLING & SAFE USE OF CHEMICALS AND HAZARDOUS MATERIALS Training Duration 5 days Training Venue and Dates REF Storage, Handling and Safe Use of Chemicals HS041 and Hazardous Materials
More informationECE 407 Computer Aided Design for Electronic Systems. Simulation. Instructor: Maria K. Michael. Overview
407 Computer Aided Design for Electronic Systems Simulation Instructor: Maria K. Michael Overview What is simulation? Design verification Modeling Levels Modeling circuits for simulation True-value simulation
More informationGEOGRAPHIC INFORMATION SYSTEMS Session 8
GEOGRAPHIC INFORMATION SYSTEMS Session 8 Introduction Geography underpins all activities associated with a census Census geography is essential to plan and manage fieldwork as well as to report results
More informationOECD QSAR Toolbox v.4.1. Tutorial on how to predict Skin sensitization potential taking into account alert performance
OECD QSAR Toolbox v.4.1 Tutorial on how to predict Skin sensitization potential taking into account alert performance Outlook Background Objectives Specific Aims Read across and analogue approach The exercise
More informationFunction Manual SINAMICS SERVCOUP SERVO COUPLING. Siemens Spares.
Function Manual SINAMICS SERVCOUP SERVO COUPLING Edition 06/2017 Siemens Spares www.siemens.com/drives s Preface Fundamental safety instructions 1 SINAMICS SERVCOUP SERVO COUPLING Function Manual Field
More informationWelcome to GST 101: Introduction to Geospatial Technology. This course will introduce you to Geographic Information Systems (GIS), cartography,
Welcome to GST 101: Introduction to Geospatial Technology. This course will introduce you to Geographic Information Systems (GIS), cartography, remote sensing, and spatial analysis through a series of
More informationAstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis
AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of
More information3.7 MYWXMAP: A NEW APPRAOCH TO WEB-BASED METEOROLOGICAL AND OCEANOGRAPHIC (METOC) CHART DISPLAY
3.7 MYWXMAP: A NEW APPRAOCH TO WEB-BASED METEOROLOGICAL AND OCEANOGRAPHIC (METOC) CHART DISPLAY Carl D. Thormeyer* and Earl V. Ravid Fleet Numerical Meteorology and Oceanography Center (FNMOC) Monterey,
More informationNEC PerforCache. Influence on M-Series Disk Array Behavior and Performance. Version 1.0
NEC PerforCache Influence on M-Series Disk Array Behavior and Performance. Version 1.0 Preface This document describes L2 (Level 2) Cache Technology which is a feature of NEC M-Series Disk Array implemented
More informationLC Commissioning, Operations and Availability
International Technology Recommendation Panel X-Band Linear Collider Path to the Future LC Commissioning, Operations and Availability Tom Himel Stanford Linear Accelerator Center April 26-27, 2004 Integrating
More informationEECS 579: Logic and Fault Simulation. Simulation
EECS 579: Logic and Fault Simulation Simulation: Use of computer software models to verify correctness Fault Simulation: Use of simulation for fault analysis and ATPG Circuit description Input data for
More informationReference: 4880(DOP.ADA)1136 Subject: Survey on the integration of geographic information systems into postal address development
International Bureau Weltpoststrasse 4 P.O. Box 312 3000 BERNE 15 SWITZERLAND To: Union member countries Regulators Designated operators T +41 31 350 31 11 F +41 31 350 31 10 www.upu.int For information
More informationSTS41-D Solar Array Flight Experiment
The Space Congress Proceedings 1984 (21st) New Opportunities In Space Apr 1st, 8:00 AM STS41-D Solar Array Flight Experiment Gary F. Turner Manager, Solar Array Programs Lockheed Missiles & Space Co.,
More informationSIFT-MS. technology overview
SIFT-MS SELECTED ION FLOW TUBE MASS SPECTROMETRY technology overview contents 1. An overview of SIFT-MS 2. Principles of SIFT-MS a. Why chemical ionization? b. Why three reagent ions? c. How does SIFT-MS
More informationThe Role of Uncertainty Quantification in Model Verification and Validation. Part 2 Model Verification and Validation Plan and Process
The Role of Uncertainty Quantification in Model Verification and Validation Part 2 Model Verification and Validation Plan and Process 1 Case Study: Ni Superalloy Yield Strength Model 2 3 What is to be
More informationReal-Time Scheduling and Resource Management
ARTIST2 Summer School 2008 in Europe Autrans (near Grenoble), France September 8-12, 2008 Real-Time Scheduling and Resource Management Lecturer: Giorgio Buttazzo Full Professor Scuola Superiore Sant Anna
More informationRainfall data analysis and storm prediction system
Rainfall data analysis and storm prediction system SHABARIRAM, M. E. Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/15778/ This document is the author deposited
More informationStatus of IASI FM2 on METOP-A. Carole Larigauderie (CNES), Laurence Buffet (CNES), Dominique Montero (Eumetsat), Patrick Astruc (TAS)
Status of IASI FM2 on METOP-A Carole Larigauderie (CNES), Laurence Buffet (CNES), Dominique Montero (Eumetsat), Patrick Astruc (TAS) Introduction This presentation is based on a common CNES/EUMETSAT work
More informationCS 160: Lecture 16. Quantitative Studies. Outline. Random variables and trials. Random variables. Qualitative vs. Quantitative Studies
Qualitative vs. Quantitative Studies CS 160: Lecture 16 Professor John Canny Qualitative: What we ve been doing so far: * Contextual Inquiry: trying to understand user s tasks and their conceptual model.
More informationCPU Scheduling. CPU Scheduler
CPU Scheduling These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and print a single copy of each
More informationFirst-Order DPA Attack Against AES in Counter Mode w/ Unknown Counter. DPA Attack, typical structure
Josh Jaffe CHES 2007 Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued and/or pending US
More informationMass Asset Additions. Overview. Effective mm/dd/yy Page 1 of 47 Rev 1. Copyright Oracle, All rights reserved.
Overview Effective mm/dd/yy Page 1 of 47 Rev 1 System References None Distribution Oracle Assets Job Title * Ownership The Job Title [list@yourcompany.com?subject=eduxxxxx] is responsible for ensuring
More informationUNCLASSIFIED Exhibit R-2, RDT&E Budget Item Justification Date: February 2008
Exhibit R-2, RDT&E Budget Item Justification : February 2008 APPROPRIATION/BUDGET ACTIVITY R-1 ITEM NOMENCLATURE: Joint/Allied Coalition Information Sharing/PE 0301144K ($ in millions) FY 2007 FY 2008
More informationIntegrated Cheminformatics to Guide Drug Discovery
Integrated Cheminformatics to Guide Drug Discovery Matthew Segall, Ed Champness, Peter Hunt, Tamsin Mansley CINF Drug Discovery Cheminformatics Approaches August 23 rd 2017 Optibrium, StarDrop, Auto-Modeller,
More informationFailure prognostics in a particle filtering framework Application to a PEMFC stack
Failure prognostics in a particle filtering framework Application to a PEMFC stack Marine Jouin Rafael Gouriveau, Daniel Hissel, Noureddine Zerhouni, Marie-Cécile Péra FEMTO-ST Institute, UMR CNRS 6174,
More informationCompensation Planning Application
Compensation Planning Application Why Physician Compensation? More and more organizations are formally aligning with physicians. These organizations require large support structures to effectively manage
More information416 Distributed Systems
416 Distributed Systems RAID, Feb 26 2018 Thanks to Greg Ganger and Remzi Arapaci-Dusseau for slides Outline Using multiple disks Why have multiple disks? problem and approaches RAID levels and performance
More informationPredictive Analytics on Accident Data Using Rule Based and Discriminative Classifiers
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 3 (2017) pp. 461-469 Research India Publications http://www.ripublication.com Predictive Analytics on Accident Data Using
More informationPeriodic Inspection and Testing of Electrical Installations Sample Test ( ) Version 1.3 July 2018
Periodic Inspection and Testing of Electrical Installations Sample Test (2391-051) Version 1.3 July 2018 Sample Questions Version and date Change detail Section 1.3 July 2018 Modified questions/answers
More informationThis case study also provides recommendations for future lightning protection design for existing (brownfield) substation.
A Case Study for Substation Lightning Strike Risk Evaluation Stephen Chuang 111 Dunsmuir Street #400, Vancouver, BC V6B 5W3 604-6644123 Stephen.chuang@amecfw.com Abstract Shielding of substations from
More informationChemical Storage Guide
1 P a g e Chemical Storage Guide It is the responsibility of every occupant, owner, tenant, contractor, employee & visitor and ALL users of this facility to ensure they take all reasonably practical steps
More informationSearch Trees. EECS 2011 Prof. J. Elder Last Updated: 24 March 2015
Search Trees < 6 2 > 1 4 = 8 9-1 - Outline Ø Binary Search Trees Ø AVL Trees Ø Splay Trees - 2 - Learning Outcomes Ø From this lecture, you should be able to: q Define the properties of a binary search
More informationARGUS.net IS THREE SOLUTIONS IN ONE
OVERVIEW H i g h l y c o n f i g u r a b l e s o f t w a r e a c c o m m o d a t e s a w i d e r a n g e o f c o l l e c t i o n s T h r e e s o l u t i o n s c o v e r P o r t a l s, C o l l e c t i o
More informationImagery and the Location-enabled Platform in State and Local Government
Imagery and the Location-enabled Platform in State and Local Government Fred Limp, Director, CAST Jim Farley, Vice President, Leica Geosystems Oracle Spatial Users Group Denver, March 10, 2005 TM TM Discussion
More informationProtein structure prediction. CS/CME/BioE/Biophys/BMI 279 Oct. 10 and 12, 2017 Ron Dror
Protein structure prediction CS/CME/BioE/Biophys/BMI 279 Oct. 10 and 12, 2017 Ron Dror 1 Outline Why predict protein structure? Can we use (pure) physics-based methods? Knowledge-based methods Two major
More informationThe World Bank BiH Floods Emergency Recovery Project (P151157)
EUROPE AND CENTRAL ASIA Bosnia and Herzegovina Social, Urban, Rural and Resilience Global Practice Global Practice IBRD/IDA Investment Project Financing FY 2014 Seq No: 4 ARCHIVED on 22-Jun-2016 ISR22737
More informationMETHODS FOR CERTIFYING MEASUREMENT EQUIPMENT. Scott Crone
METHODS FOR CERTIFYING MEASUREMENT EQUIPMENT Scott Crone North American Sales Manager AMETEK Calibration Instruments 8600 Somerset Drive Largo, Florida 33773 USA INTRODUCTION Like any other piece of equipment,
More information