Web applications have become complex and crucial in many fields. In order to assure their quality, a high demand for systematic methodologies of Web application testing is emerging. In this paper, a methodology of mod...
详细信息
Web applications have become complex and crucial in many fields. In order to assure their quality, a high demand for systematic methodologies of Web application testing is emerging. In this paper, a methodology of model-driven testing (MDT) for Web application is presented. Model is the core of this method. Web application model is built to describe the system under testing. Test case models are generated based-on the Web application model. Test deployment model and test control model are designed to describe the environment and process of test execution. the test engine executes test cases based-on the test deployment and control model automatically. After that, testing results are reflected to test case models. A framework is designed for supporting this methodology. In order to get better extensibility and flexibility, it is loose-coupled by a modeler and a tester. the modeler enables developers to design meta-models, and is responsible for creating, visualizing and saving models. the tester takes in charge of recovering the tested Web application model, generating test cases, and executing test
Security attacks continually threaten distributed systems, disrupting both individuals and organizations economically and physically. In the software lifecycle, early detection and correction of security flaws in the ...
详细信息
Security attacks continually threaten distributed systems, disrupting both individuals and organizations economically and physically. In the software lifecycle, early detection and correction of security flaws in the design phase can reduce overall costs associated with maintenance. Current software development methodologies such as the model driven architecture rely on quality Unified Modeling Language (UML) design models. Often these models are complex and consist of many structural and behavioral views. this can lead to inconsistencies between views. Existing approaches remedy many of these inconsistencies but do not address security consistency across design views. this paper presents an approach to detecting and resolving security faults in UML designs. the approach defines the notion of security inconsistency in designs, analyzes UML views for security inconsistencies, and generates a set of recommended design changes that include Object Constraint Language (OCL) expressions. the OCL can be used as a test oracle in boththe design and implementation phases of the software life-cycle
the goal of this work is analyzing each one of the phases that composes the structure of the IDEAL (Initiating, Diagnosing, Establishing, Acting and Learning) model, as well as its activities and principles, and adapt...
详细信息
the goal of this work is analyzing each one of the phases that composes the structure of the IDEAL (Initiating, Diagnosing, Establishing, Acting and Learning) model, as well as its activities and principles, and adapting for the characteristics that the software process implementation environment must have about the continuous software process improvement. this environment helps an organization in the gradual software process implementation, it is useful to supply automated support by means of an environment (ImPProS - gradual software process implementation environment) capable to support the phases that the specialized literature considers as necessary: software process definition, simulation, execution and evaluation (Oliveira et al., 2005). the ImPProS is a project of initiative the Center of Informatic at UFPE - Federal University of Pernambuco withthe partnership at UNAMA - University of Amazonia, financed by CNPq - National Advice of Scientific and Technological Development, which aims the creation of an environment of support to the implementation a software process in an organization of gradual way. the "gradual" term denotes the fact that the process implementation is performed withthe experiences learned in its previous phases. thus, it is composed of a cooperative environment, formed for nine main tools: ProDefiner; ProSimulator; ProEnacter; ProEvaluator; ProImprove; ProAnalyser; ProReuse; ProKnowledge; and ProConverter.
Computationally very expensive dynamic-program ming matching of data sequences has been directly implemented in a fully-parallel-architecture VLSI chip. the circuit operates as digital logic in the signal domain, whil...
详细信息
ISBN:
(纸本)0780384806
Computationally very expensive dynamic-program ming matching of data sequences has been directly implemented in a fully-parallel-architecture VLSI chip. the circuit operates as digital logic in the signal domain, while analog processing is carried out in the time domain based on the delay-encoding-logic scheme. As a result, a high-speed low-power best-match-sequence search has been established with a small chip area. the typical matching time of 80 ns withthe power dissipation of 2 mW has been demonstrated with fabricated prototype chips.
Computationally very expensive dynamic-program ming matching of data sequences has been directly implemented in a fully-parallel-architecture VLSI chip. the circuit operates as digital logic in the signal domain, whil...
详细信息
Computationally very expensive dynamic-program ming matching of data sequences has been directly implemented in a fully-parallel-architecture VLSI chip. the circuit operates as digital logic in the signal domain, while analog processing is carried out in the time domain based on the delay-encoding-logic scheme. As a result, a high-speed low-power best-match-sequence search has been established with a small chip area. the typical matching time of 80 ns withthe power dissipation of 2 mW has been demonstrated with fabricated prototype chips.
ACMI is a decision support system for the checking of medical invoices in a German health insurance company. We present a brief overview of the system and its implementation in DLV.
ISBN:
(纸本)3540285385
ACMI is a decision support system for the checking of medical invoices in a German health insurance company. We present a brief overview of the system and its implementation in DLV.
We consider automated reasoning about recursive partial functions with decidable domain, i.e. functions computed by incompletely defined but terminating functional programs. Incomplete definitions provide an elegant a...
详细信息
ISBN:
(纸本)354030553X
We consider automated reasoning about recursive partial functions with decidable domain, i.e. functions computed by incompletely defined but terminating functional programs. Incomplete definitions provide an elegant and easy way to write and to reason about programs which may halt with a run time error by throwing an exception or printing an error message, e.g. when attempting to divide by zero. We investigate the semantics of incompletely defined programs, define an interpreter for those programs and discuss the termination of incompletely defined procedures. We then analyze which problems need to be solved if a theorem prover designed for verification of completely defined programs is modified to work for incompletely defined programs as well. We also discuss how to reason about stuck computations which arise when calling incompletely defined procedures with invalid arguments. Our method of automated reasoning about incompletely defined programs has been implemented in the verification tool VeriFun. We conclude by discussing experiences obtained in several case studies withthis implementation and also compare and relate our proposal to other work.
this paper describes a system named "Glue logic", which is a infrastructural system designed for factory automation control system, and a sample implementation of a layer structured control system architectu...
详细信息
ISBN:
(纸本)0387238514
this paper describes a system named "Glue logic", which is a infrastructural system designed for factory automation control system, and a sample implementation of a layer structured control system architecture, which is named "Scalable Intelligent Control Architecture" reported in the DIISM2000. the "Glue logic" supports the real-time controlling and monitoring system, by means of realizing communication and synchronizing among multiple agents. Using the active database technique, this system includes event notification message sending and condition monitoring features to eliminate data polling. this system also supports efficient programming environment, by increasing modularity and reusability of the software assets. Using the Glue logic, we are now designing a real-time data gathering system in practical manufacturing lines according to the Scalable Intelligent Control Architecture, which permits expansion of control systems not only in spatial dimension but also in intelligence.
the proceedings contain 33 papers. the special focus in this conference is on Graph-theoretic Concepts in Computer Science. the topics include: Lexicographic breadth first search – a survey;wireless networking: graph...
ISBN:
(纸本)9783540241324
the proceedings contain 33 papers. the special focus in this conference is on Graph-theoretic Concepts in Computer Science. the topics include: Lexicographic breadth first search – a survey;wireless networking: graph theory unplugged;constant time generation of trees with specified diameter;elegant distance constrained labelings of trees;collective tree spanners and routing in AT-free related graphs;on the maximum cardinality search lower bound for treewidth;fully-dynamic recognition algorithm and certificate for directed cographs;recognizing HHD-free and welsh-powell opposition graphs;bimodular decomposition of bipartite graphs;coloring a graph using split decomposition;decremental clique problem;a symbolic approach to the all-pairs shortest-paths problem;minimal de bruijn sequence in a language with forbidden substrings;a graph-theoretic generalization of the least common subsumer and the most specific concept in the description logic EL;the computational complexity of the minimum weight processor assignment problem;a stochastic location problem with applications to tele-diagnostic;a robust PTAS for maximum weight independent sets in unit disk graphs;tolerance based algorithms for the ATSP;exact (exponential) algorithms for the dominating set problem;linear kernels in linear time, planar graphs, via well-orderly maps and trees;computing bounded-degree phylogenetic roots of disconnected graphs;octagonal drawings of plane graphs with prescribed face areas;crossing reduction in circular layouts;characterization and recognition of generalized clique-helly graphs;edge-connectivity augmentation and network matrices;partitioning a weighted graph to connected subgraphs of almost uniform size;core stability of minimum coloring games.
In this paper, we propose a Markov movement model for mobile terminals in wireless personal communication service networks and study the location registration problem. We formulate the location registration as a Marko...
详细信息
In this paper, we propose a Markov movement model for mobile terminals in wireless personal communication service networks and study the location registration problem. We formulate the location registration as a Markov decision process and prove that the optimal strategies have threshold structures. To avoid solving the Bellman dynamical programming equations, we propose a single sample path-based algorithm to tune thresholds of the strategies. Since the proposed algorithm uses only one sample path of the system, it can be implemented online
暂无评论