Skip to main content

Questions tagged [software-engineering]

Research on methods and techniques to ensure the utility and quality of software systems through design and development processes.

Filter by
Sorted by
Tagged with
2 votes
0 answers
20 views

Is this approach to generating points for the graph of a function that attempts to avoid discontinuities appropriate?

I'm not sure where to ask this question, I'd appreciate being redirected accordingly if need be. Context Let's say I have a program that might plot the graph of functions supplied by a user, for ...
Foxy's user avatar
  • 275
0 votes
0 answers
23 views

can we decide during compile time whether something on heap becomes unreachable in Java?

As I know (I don't know exactly) the main idea of Rust memory safety is based on the fact that it is compiled into a code that as an additional part has a code that detects unreachable objects and ...
math boy's user avatar
  • 381
0 votes
1 answer
22 views

Smart Boot: a kernel function to SAVE / LOAD ALL the needed working RAM from the disk

Boot process is wonderful, but quite tedious to wait the kernel reload every needed objects on the RAM again. One day, I was wondering if it was possible the kernel to "take a snapshot" of ...
Sergio Abreu's user avatar
0 votes
2 answers
54 views

How can software developers ensure the security of their softwares, so that consumers don't mess with it?

The question is as it is. As a software developer, how can you ensure that when consumers/customers/users download your softwares, they cannot edit it to create a different version of it ? Some ways ...
user1514263's user avatar
0 votes
0 answers
44 views

What is the difference between software development and software engineering?

What is the difference between software development and software engineering? And What are the foundations of each one of them?
Abdelrahman S. Eltyar's user avatar
1 vote
0 answers
83 views

An approach to discover parameterised patterns in arbitrary strings

Expanding on Question 79182 I am sure there must be an active area of research for deriving parameterised patterns. What I am looking for is something like - given the input ...
Konchog's user avatar
  • 33
5 votes
4 answers
2k views

What's role of software verification in modern software engineering

There are standard courses in computer science faculties that teach software verification, yet modern software products (Operating Systems especially) require periodic updates and bugs are constantly ...
math boy's user avatar
  • 381
0 votes
0 answers
29 views

Algorithmic Information Approximation As Software Surface Minimization

Can putting information systems through a "functional bottleneck" to approximate their Algorithmic Information reduce their attack and argument surfaces substantially? Software surface may ...
James Bowery's user avatar
2 votes
1 answer
110 views

Applications of ω-automaton in engineering

Finite automaton is a well-known topic which finds applications in software engineering (e.g. pattern matching or regular expressions in general). ω-automaton are another kind of automaton, defined ...
Weier's user avatar
  • 241
1 vote
2 answers
33 views

Name of class of errors where the real state differs from the recorded state?

Is there a name for the class of software errors that arise from the fact that the software believes something wrong about the state of the world? (Allow me a bit of anthropomorphization of software, ...
gioele's user avatar
  • 131
-1 votes
1 answer
84 views

Question Regarding Design Constraints in Software Engineering Exam

I recently had a software engineering exam, and there's a particular question that's causing some confusion between my professor and me. I'd like to get some insights from the community to better ...
Drilon Aliu's user avatar
0 votes
1 answer
68 views

Could there be a computer or components based on a non-classical logic?

Since circuits and processors are heavily influenced and designed based upon boolean logic, which is itself a subset of propositional logic, could there be different interpretations of hardware or ...
Jonas's user avatar
  • 103
2 votes
1 answer
110 views

What is the closest theory to "The theory of code refactoring"?

We refactor code lots of times as developers. Metaphorically, our program space is an infinite-dimensional Rubik's cube. Things can be rearranged, preserving the code's action, so a "symmetry ...
Daniel Donnelly's user avatar
0 votes
1 answer
38 views

Is there an algorithm for mapping two ambiguous and unrelated data sets?

I was curious to see whether or not there was a common algorithm for mapping two unrelated data sets. So for example let's say I wanted to give you a spirit animal based on your name, birthday, zodiac ...
Jerry's user avatar
  • 101
4 votes
2 answers
2k views

what are all the domains of computer sciences?

Im trying to build my own learning track Currently I am working on becoming a unity developer to make game or whatever is needed. I use C# within the system. I don't feel satisfied just working ...
Bryan's user avatar
  • 41
0 votes
2 answers
106 views

Best starter resources for learning about Reverse Engineering?

I would want to start learning reverse engineering (Software and Hardware Projects), but I don't know from where to start. Will be grateful for online resources and/or books. Thanks.
Deduce Uptight's user avatar
1 vote
3 answers
113 views

Do modern computers prevent instructions being executed by audio? If so, how?

Most know that early phones and modems, and still, fax machines, sent information through the use of tones. This got me thinking - could audio be a viable vector for executing instructions by a bad ...
Devin Rowan's user avatar
2 votes
4 answers
1k views

Why was the fast inverse square root algorithm so ingenious?

In 2005 ID software open source the game Quake 3 Arena. When they did it was discovered was an algorithm that was so ingenious and all it did was calculate the inverse of a square root. The easy way ...
Neil Meyer's user avatar
1 vote
1 answer
148 views

What are the minimum functions, services, or features of a software to be called as an operating system?

When can we say that a software is an operating system and not a firmware, in terms of what it can do? I know that firmware is usually stored in ROM and OS is stored on HDD/SSD, but technically you ...
Noob_Guy's user avatar
  • 123
-2 votes
1 answer
24 views

Could an application capture and log a user's actions on another 3rd party software. If yes, how?

Could an application be built such that it could track a user's actions on a particular software and log them? For example, could an application track a user's actions on MS Word, noting down when the ...
Akshay Vasudeva Rao 's user avatar
1 vote
0 answers
15 views

Asking for references on errors, testing, system failures etc

I am looking for references that talk about the following subject: Software programs are in general complex systems. That is, if we decompose them into components and we make sure that each component ...
user135507's user avatar
1 vote
2 answers
126 views

Practice of setting parallelism as the default behaviour

This is a soft, and probably also an opinion based question. Suppose I am writing a library in C++ for the purposes of working with financial data. My goals are: Since I work with big data, I want to ...
qarabala's user avatar
  • 113
0 votes
0 answers
20 views

How come code re-usability is a benefit of Bottom-Up software development?

Re-usability of code is one of the main benefits of the bottom-up approach (Wikipedia) I can't quite figure out how bottom-up approach enables code re-usability. I am aware that Object Oriented ...
Midhunraj R Pillai's user avatar
0 votes
0 answers
12 views

Estimating memory footprint of a C program (and programs in a scripting language using bindings to a C library)

I wanted to test the feasibility of an idea that might be part of a small project, and I'm trying to set up a quick prototype using Python (with bindings to a C library). If any of this is sufficient ...
Alvinary's user avatar
2 votes
1 answer
45 views

Subclass specification

From http://web.mit.edu/6.031/www/fa19/classes/12-interfaces-enums/#implementing_generic_interfaces "That means B is only a subtype of A if B’s specification is at least as strong as A’s ...
Ray's user avatar
  • 137
-1 votes
3 answers
54 views

Which topics of mathematics should I need to learn to be a good app developer?

I'm 29 years old. I couldn't continue my studies after grade 10 due to some financial issues and I didn't have time to practice mathematics. It's been more than 11 years since I left studies. Now I ...
Ansar Ali Akash's user avatar
0 votes
0 answers
28 views

Can coded information be copied?

Could a large quantity of coded information (let's say 10,000 GB) be copied from one storage device to another without first being decoded? If so, how long would something like that take?
Bridgebot101's user avatar
-4 votes
2 answers
193 views

Is computer science pointless

For example, in real life, you're working with real time data that is constantly appended to. Computer science assumes a static problem, like traveling salesman. In reality you would start with a set ...
user avatar
0 votes
0 answers
22 views

Can I show that project scheduling is a type of programming or something similar?

Project schedules are made of activities, durations associated with each activity, and relationships between activities (SS, SF, FS, FF) with a lag (can be positive, negative, or 0). Let's say I have ...
Omar's user avatar
  • 1
1 vote
1 answer
411 views

How does computer memory store the file name?

I have this doubt for long time. When i save a notepad file, it takes the memory for the information in the file. let's say, I type 'ABC' in notepad and saved the filename as stack, it shows that the ...
Shane Studio's user avatar
0 votes
2 answers
119 views

A question regarding the Layered Architecture

Consider the following general form of a layered architecture : I need to check my understanding about the second layer from top . More specifically I need to check my understanding the regarding ...
John adams's user avatar
0 votes
1 answer
265 views

How a Data Compression Software Reads a File as pure Binary File and makes Output?

I have an hybrid compression technique I want to implement, my implementation is (so far): I can encode a string into a encoded compressed string. These are binary strings. For example, I read texts ...
Michael's user avatar
  • 291
0 votes
0 answers
61 views

In what sense the computer program (Turing machine) can be considered as the complex system and its IIT Phi can be measured and improved?

I am reading https://global.oup.com/academic/product/a-world-beyond-physics-9780190871338?cc=us&lang=en& about one approach of complex systems' theory for the emergence of the life. It is ...
TomR's user avatar
  • 1,401
4 votes
0 answers
140 views

Is there a OSI model equivalent for describing the abstract layers present in performing a computation for an operating system?

In describing where a system vulnerability exists, I often find a need for a model that partitions a operating system and its components into abstraction layers. Similar to how the Open Systems ...
Gabriel Fair's user avatar
0 votes
0 answers
16 views

Can specific programs or software be ascertained from the hardware?

I having been thinking about software and hardware and their relationship. I am a layman and do not have specialized knowledge on the subject. I wondered whether if studying a particular hardware a ...
user113495's user avatar
2 votes
1 answer
638 views

How to translate automatons (Turing machines) into programs of high level programming language?

Every program in high level ("industrial") programming language can be expressed as some Turing machine. I guess, that there exists universal algorithm for doing that (e.g. one can take the ...
TomR's user avatar
  • 1,401
2 votes
1 answer
38 views

Names of power-of-two bit operations on bitsets that would not assume any number interpretation

Three commonly used functions when it comes to bit manipulation are : is_pow2: Checking that an integer is a power-of-two (only one bit is set): $00010000 \...
Vincent's user avatar
  • 221
0 votes
1 answer
145 views

How to Get Started in Computer Science [closed]

I am wondering how to get started in studying theoretical computer science and how to apply it to my programming. I am fairly comfortable with basic programming, having been programming in mainly C++ ...
Jacob Singer's user avatar
0 votes
2 answers
57 views

Why do errors occur in programming? [closed]

I like to reduce the number of exceptions raised in my code, and I thought it might help to consider why these exception are raised in the first place, and whether they are a really a fundamental part ...
joel's user avatar
  • 123
2 votes
0 answers
99 views

How realistic of a concern is data corruption?

Similar to this question, but I wanted to be more specific to my real-world situation. I am a college software engineer currently working on a project that involves a large number of read cycles. ...
Sciborg's user avatar
  • 121
0 votes
1 answer
163 views

How does this example violate Liskov substitution principle, which then causes violation of the open-closed principle?

From Agile Principles, Patterns, and Practices in C# by Robert Martin, Listing 10-1. A violation of LSP causing a violation of OCP ...
Tim's user avatar
  • 5,015
0 votes
1 answer
74 views

Introduction to computer science for ML [closed]

I have learned python syntax (from books like fluent python or python cookbook etc.) and I want to learn the underlying concepts of computer science (in an abtract way), do you have some books/courses ...
user avatar
3 votes
2 answers
50 views

Reliability of a service

Assume that I need to determine the reliability of a service. The service includes component a (software reliability=0.95) and component b (software reliability=0.98). I have 2 computers: Computer A (...
Shayne's user avatar
  • 33
1 vote
0 answers
45 views

Route to Software Engineering [closed]

wondering if anyone can give me some advice. I’m 17 and just about to leave high school and Morgan Stanley have offered me a job as an analyst and said they’d pay for me to get a BSc degree in ...
Ewan__'s user avatar
  • 11
2 votes
0 answers
116 views

Why irreducibility is an important concept in Flow Graphs?

Here is a definition of reducible flow graphs : A flow graph is reducible if every retreating edge in any DFST for that flow graph is a back edge. And the reasons why we care about ...
Yushan's user avatar
  • 141
1 vote
0 answers
53 views

How much of the x86 instruction set does blender use? [closed]

I'm trying to better understand benchmarks that are commonly used for computer hardware. I've been unable to find an answer to this question. Extra credit if you can provide a breakdown in ...
Michael Smith's user avatar
1 vote
0 answers
36 views

Software and hardware communications [closed]

When you install an OS on a piece of hardware such as a Macbook, what is happening logically? In other words, how does the software "talk" to the hardware? Is it the same logical process with every OS ...
Cody Rutscher's user avatar
0 votes
1 answer
105 views

Storing a playlist as plain text file

What are the disadvantages of storing a playlist as plain text in a text file? This is what I thought: The main disadvantage of storing the play list as plain text is its simplicity. The basic ...
Anony's user avatar
  • 1
1 vote
0 answers
75 views

Best way to make the jump from programming to computer science

I have decent enough experience with programming to be able to tackle most things but I want to know how you recommend making the jump from just programming to computer science. I still have a couple ...
Pagaley 12's user avatar
2 votes
1 answer
121 views

Single Input Single Output Sequential Circuit Explanation Required

I'm a student of Formal Methods in Software Engineering, I'm trying to study this question for two days but still haven't figured it out, I couldn't even find a similar solution or explanation, so ...
JJ.'s user avatar
  • 39