Although program faults are widely studied, there are many aspects of faults that we still do not understand, particularly about 00 software. In addition to the simple fact that one important goal during testing is to...
详细信息
ISBN:
(纸本)0769517579
Although program faults are widely studied, there are many aspects of faults that we still do not understand, particularly about 00 software. In addition to the simple fact that one important goal during testing is to cause failures and thereby detect faults, a full understanding of the characteristics of faults is crucial to several research areas. the power that inheritance and polymorphism brings to the expressiveness of programming languages also brings a number of new anomalies and fault types. In prior work we presented a fault model for the appearance and realization of 00 faults that are specific to the use of inheritance and polymorphism. Many of these faults cannot appear unless certain syntactic patterns are used. the patterns are based on language constructs, such as overriding methods that directly define inherited state variables and non-inherited methods that call inherited methods. If one of these syntactic patterns is used, then we say the software contains an anomaly and possibly a fault. this paper describes the syntactic patterns for each 00 fault type. these syntactic patterns can potentially be found with an automatic tool. thus, faults can be uncovered and removed early in development.
Network traffic logs play an important role in incident analysis. Withthe increasing throughput of network links, maintaining a complete log of all network activity has become a task that requires an enormous amount ...
详细信息
ISBN:
(纸本)0769517579
Network traffic logs play an important role in incident analysis. Withthe increasing throughput of network links, maintaining a complete log of all network activity has become a task that requires an enormous amount of resources. We propose an approach to network monitoring that mitigates the resource consumption problem while still providing effective support to evidence collection and incident analysis: the approach relies on a tool, called MNEMOSYNE, that maintains a sliding window containing the traffic that has been recently seen on a network link. MNEMOSYNE provides improved logging features, such as multiple streams, support for cross-stream queries, and dynamic remote reconfiguration. By integrating MNEMOSYNE with real-time intrusion detection capability, it is possible to provide incident analysis functionality and effective evidence collection, without having to maintain complete traffic logs. this paper describes the MNEMOSYNE tool;its architecture, and presents the results of the quantitative evaluation of its performance.
the proceedings contain 26 papers. the topics discussed include: validating run-time interactions in distributed java applications;reasoning about asynchronous behavior in distributed systems;a framework for performab...
ISBN:
(纸本)0769517579
the proceedings contain 26 papers. the topics discussed include: validating run-time interactions in distributed java applications;reasoning about asynchronous behavior in distributed systems;a framework for performability modeling of messaging services in distributed systems;efficient reachability testing of asynchronous message-passing programs;capturing complete and accurate requirements by refinement;mechanization of a proof of string-preprocessing in Boyer-Moore's pattern matching algorithm;composability for software components: an approach based on the whole-part theory;using aspects to design a secure system;a light-weight process for capturing and evolving defect reduction experience;interclass testing of object oriented software;and Mars Polar Lander fault identification using model-based testing.
the proceedings contain 24 papers. the topics discussed include: fast computation of 2-type network parameters for stability analysis of power electronics converter systems;design of a digital PID regulator based on l...
ISBN:
(纸本)0780375548
the proceedings contain 24 papers. the topics discussed include: fast computation of 2-type network parameters for stability analysis of power electronics converter systems;design of a digital PID regulator based on look-up tables for control of high-frequency DC-DC converters;a computer-based system for validation of thermal models for multichip power modules;nominal and tolerance design of feedback compensators for switching regulators;accurate prediction of ferrite core loss with nonsinusoidal waveforms using only Steinmetz parameters;resistive losses of conductors carrying SMPS current waveforms;multi-cell circuit model for thyristor-type devices using quasi 2-dimensional lumped-charge method;small signal modeling of sensorless current mode controlled DC-DC converters;simulation of power losses with MATLAB/SIMULINK using advanced power device models;implementing dataflow-based control software for power electronics systems;and an array-based study of increased system lifetime probability.
Model integrated computing (MIC) is an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific software applications for computer-based systems (CBSs). On a higher level, ...
详细信息
ISBN:
(纸本)0769510868
Model integrated computing (MIC) is an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific software applications for computer-based systems (CBSs). On a higher level, it is possible to use MIC to develop, maintain, and evolve the meta-level tools (metamodeling environments) themselves, by modeling the metamodeling environment (meta-metamodeling). this paper documents the evolution of one metamodeling environment into another: specifically the design choices of the newer metamodeling environment with regard to the old one, and the solutions to problems that were introduced withthe change.
Manufacturing environments are currently largely isolated from the wider community of general purpose networking and software technologies. this paper explores strategies for developing distributed computing solutions...
详细信息
ISBN:
(纸本)0769510868
Manufacturing environments are currently largely isolated from the wider community of general purpose networking and software technologies. this paper explores strategies for developing distributed computing solutions for industrial environments. It offers a case study which introduces emerging cooperating technologies and demonstrates how they can be engineered to bridge between proprietary industrially based networks and component based software technologies such as Active X.
the developments on Formal specifications of computer-based systems (FC CBS) were reported. the IFPI TC10 group met in year 1999 in order to organize and implement a joint workshop focusing on FC CBS. In the year 2000...
详细信息
ISBN:
(纸本)0769510868
the developments on Formal specifications of computer-based systems (FC CBS) were reported. the IFPI TC10 group met in year 1999 in order to organize and implement a joint workshop focusing on FC CBS. In the year 2000 ieee/IFPI organized a joint workshop to create a forum for researchers and practitioners from industry and academia to focus on completed works and development related to FC CBS. In year 2001 ieee ECBS organized a joint workshop to focus on completed works and work-in-progress for FC CBS regarding the software and hardware applications.
One of the great challenges within software testing is to know if a test suite covers a program sufficiently. Mutation analysis is presented as an approach to address that challenge. Faulty versions, or mutants, are c...
详细信息
ISBN:
(纸本)0769510868
One of the great challenges within software testing is to know if a test suite covers a program sufficiently. Mutation analysis is presented as an approach to address that challenge. Faulty versions, or mutants, are created and it is investigated if the test suite is able to discover the defects. the technique is mostly applied to the unit level testing of software programs. In this paper mutation analysis is applied to integration and system level testing in addition to unit level testing. A state based specification and description language, SDL, is used. the specific structural information is used to employ mutation analysis at different abstraction levels.
We introduce a new approach to performance analysis of DSP-kernel software, based on high-level abstractions, called Implicit Cache Simulation. the method can take into account any kind of instruction cache as well as...
详细信息
ISBN:
(纸本)0769510868
We introduce a new approach to performance analysis of DSP-kernel software, based on high-level abstractions, called Implicit Cache Simulation. the method can take into account any kind of instruction cache as well as code allocation effects. We show that no loss of estimation accuracy is implied by the proposed abstractions. Moreover the speed of the method is such that it can be efficiently used as a system-level design tool. We compare implicit cache simulation withthe trace-driven simulation approach, commonly used in industry. Experimental results show that our method is 4 times faster in the average and up to 11 times faster than trace-driven simulation.
this paper presents the emerging STEP standard AP-233 with focus on the non-functional requirements that have guided the development process. the purpose of the paper is to present and motivate the modelling assumptio...
详细信息
ISBN:
(纸本)0769510868
this paper presents the emerging STEP standard AP-233 with focus on the non-functional requirements that have guided the development process. the purpose of the paper is to present and motivate the modelling assumptions and approach selected for the AP-233 information model, and to present how the EXPRESS information modelling language have been used. Although the paper is focused on AP-233 and the constraints imposed by the STEP framework it is believed the structures and requirements presented are general and applicable to other systemsengineering information-modelling projects.
暂无评论