Time filter

Source Type


Chen X.,University of Waterloo | McCool M.,University of Waterloo | Kitamoto A.,NII | Mann S.,University of Waterloo
Proceedings - Graphics Interface | Year: 2012

Embroidery is a traditional non-photorealistic art form in which threads of different colours stitched into a base material are used to create an image. We explore techniques for automatically producing embroidery layouts from line drawings and for rendering those layouts in real time on potentially deformable 3D objects with hardware acceleration. Layout of stitches is based on automatic extraction of contours from line drawings followed by a set of stitch-placement procedures based on traditional embroidery techniques. Rendering first captures the lighting environment on the surface of the target object and renders the embroidery as an image in texture space. Stitches are rendered in texture space using a lighting model suitable for threads at a resolution that avoids geometric and high-light aliasing, and with alpha-mapped per-stitch boundary antialiasing. Stitches are also rendered in layers to capture the 2.5D nature of embroidery. A filtered texture pyramid is constructed from the resulting texture and applied to the 3D object, using hardware accelerated scale-dependent antialiasing. Aliasing of fine stitch structure and highlights is avoided by this process. The result is a realistic embroidered image that properly responds to lighting in real time. Source

Liu S.,Hosei University | Nakajima S.,NII
SSIRI 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement | Year: 2010

Automatic functional testing is a potentially effective technique for software reliability, but it has been a challenge due to the difficulties in automatically deriving adequate test cases and test oracle from informal or semi-formal specifications that are often used in practice. This paper puts forward a new decompositional approach to automatic test case generation on the basis of model-based formal specifications. The approach offers a functional scenario-based test strategy, a set of test case generation criteria, a set of automatic test case generation algorithms, and a well-defined test oracle for automatic test result analysis. A small experiment on the application of the approach is presented, and the result shows that the approach can achieve a higher statement coverage of programs than random testing. © 2010 IEEE. Source

Liu S.,Hosei University | Nakajima S.,NII
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

Specification-based testing is limited in detecting program errors; correctness proof based on Hoare logic is difficult to perform in practice; and inspection is heavily dependent on human decisions. Each of these three is difficult to do a satisfactory job alone, but they complement each other when they come together in an appropriate manner. This paper puts forward a new method that makes good use of Hoare logic and inspection to improve the effectiveness of specification-based testing in detecting errors. The underlying principle of the method is first to use specification-based testing to discover traversed program paths and then to use Hoare logic to prove their correctness, but when proof is impossible to conduct, a special inspection is applied. During the proof or inspection process, all faults on the paths are expected to be detected. A case study is conducted to show its feasibility; an example taken from the case study is used to illustrate how the proposed method is applied; and a discussion on the important issues to be addressed in the future is presented. © 2014 Springer International Publishing Switzerland. Source

Chitpranee R.,Grenoble Institute of Technology | Fukuda K.,NII
Asian Internet Engineeering Conference, AINTEC 2013 | Year: 2013

This paper presents an alternative fingerprinting technique to identify DNS software running on caching resolvers in passively collected traffic traces. With this method, it is not required to send additional queries during the measurement, unlike existing techniques that rely on probing and may not be effective due to firewall filtering or refused responses. We first carefully examine DNS query patterns upon specific emulation and extract 15 heuristic rules from the experiment to identify typical software (i.e., BIND, Unbound and Windows Server). We next demonstrate the effectiveness of the rules using real backbone traffic traces with ground truth data. The results show 99% accuracy compared to the ground truth. Furthermore, 78% of unknown hosts in the ground truth can be identified. Copyright © 2013 ACM. Source

Liu S.,Hosei University | Nakajima S.,NII
Proceedings - International Conference on Software Engineering | Year: 2011

This paper describes a framework for automatic functional testing based on formal specifications. The framework is intended to expose all of the issues that must be addressed in automatic testing, to provide solutions for some of the major challenges, and to serve as a foundation for developing tool support in the future. © 2011 Authors. Source

Discover hidden collaborations