An efficient lightweight forward static slicing tool is presented. The tool is implemented on top of srcML, an XML representation of source code. The approach does not compute the full program dependence graph but ins...
详细信息
ISBN:
(纸本)9781450342056
An efficient lightweight forward static slicing tool is presented. The tool is implemented on top of srcML, an XML representation of source code. The approach does not compute the full program dependence graph but instead dependency information is computed as needed while computing the slice on a variable. The result is a list of line numbers, dependent variables, aliases, and function calls that are part of the slice for a given variable. The tool produces the slice for all variables in a system. The approach is highly scalable and can generate the slices for all variables of the Linux kernel in less than 15 minutes.
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the number of processors hit by the fault. Ge...
详细信息
ISBN:
(纸本)3540240586
A self-stabilizing distributed protocol can recover from any state-corrupting fault. A self-stabilizing protocol is called adaptive if its recovery time is proportional to the number of processors hit by the fault. General adaptive protocols are known for the special case of function computations: these are tasks that map static distributed inputs to static distributed outputs. In reactive distributed systems, input values at each node change on-line, and dynamic distributed outputs are to be generated in response in an on-line fashion. To date, only some specific reactive tasks have had an adaptive implementation. In this paper we outline the first proof that all reactive tasks admit adaptive protocols. The key ingredient of the proof is an algorithm for distributing input values in an adaptive fashion. Our algorithm is optimal, up to a constant factor, in its fault resilience, response time, and recovery time.
VLSI circuits design allows today to consider new modes of implementation for electrical controls. However, design techniques require an adaptation effort that few designers, too accustomed to the software approach, p...
详细信息
ISBN:
(纸本)9781424410200
VLSI circuits design allows today to consider new modes of implementation for electrical controls. However, design techniques require an adaptation effort that few designers, too accustomed to the software approach, provide. The authors of this article propose to develop a methodology to guide the electrical designers towards optimal performances of control algorithms implementation. Thus, they were based on two concepts: modular design and algorithm architecture "adequation". An example of DTC control implemented in an ASIC circuit is presented and the results of the integration performances validate our methodology.
software reliability models are mostly used at the test phased there are only a few models that are employed at early phase of software development. Early prediction, however, is very important for better prognosis an...
详细信息
ISBN:
(纸本)9783540899846
software reliability models are mostly used at the test phased there are only a few models that are employed at early phase of software development. Early prediction, however, is very important for better prognosis and management of risks. In this paper we propose an approach for early software reliability prediction, based on software behavioral requirements. The major difference between our approach and those of others is the fact that we use a formal method, called Viewcharts. to specify the behavior of softwaresystems.
Recent evidences indicate that most faults in softwaresystems are found in only a few of a system's components [1]. The early identification of these components allows an organization to focus on defect detection...
详细信息
ISBN:
(纸本)076951877X
Recent evidences indicate that most faults in softwaresystems are found in only a few of a system's components [1]. The early identification of these components allows an organization to focus on defect detection activities on high risk components, for example by optimally allocating testing resources [2], or redesigning components that are likely to cause field failures. This paper presents a prototype tool called Architecture-level Risk Assessment Tool (ARAT) based on the risk assessment methodology presented in [3]. The ARAT provides risk assessment based on measures obtained from Unified Modeling Language (UHL) artifacts [4]. This tool can be used in the design phase of the software development process. It estimates dynamic metrics [5] and automatically analyzes the quality of the architecture to produce architectural-level software risk assessment [3].
The importance of candidate software requirements can vary by orders of magnitude, yet most software providers do not have accurate and efficient means for selecting among them. This papers describes a case study at E...
详细信息
ISBN:
(纸本)0818672528
The importance of candidate software requirements can vary by orders of magnitude, yet most software providers do not have accurate and efficient means for selecting among them. This papers describes a case study at Ericson Radio systems AB of two techniques for software requirements prioritizing as a means for determining the importance of candidate requirements, a pair-wise comparison technique and a numerical assignment technique. The results from the case study indicate that the pair-wise comparison technique is an efficient, informative and accurate means for finding the candidate requirements importance. We therefore recommend the pair-wise comparison technique for software requirements prioritizing. At Ericson we have extended its use in other development projects.
The authors argue that only by formulating and validating software metrics in a more rigorous way can one understand and measure important software attributes and find predictions of the development process. They disc...
详细信息
The authors argue that only by formulating and validating software metrics in a more rigorous way can one understand and measure important software attributes and find predictions of the development process. They discuss global structures, the flowgraph model, the Fenton-Whitty theory of flowgraph metrication, the application of metrics to the Kindra software design tool and the modelling of Kindra as a flowgraph.
The product/process duality of software Quality is highlighted and problems of providing computing students, whether on undergraduate or postgraduate courses, with experiences analogous to those found in industry are ...
详细信息
ISBN:
(纸本)0769508251
The product/process duality of software Quality is highlighted and problems of providing computing students, whether on undergraduate or postgraduate courses, with experiences analogous to those found in industry are outlined. Details are presented of the MSc in computer Based information systems;a "conversion" course offered world-wide by the University of Sunderland. The systemsengineering module within the described and details are given of the pedagogical approaches adopted within it. The mechanisms used with regard to teaching concepts related to software Quality Assurance are described with particular emphasis on practical work, which the students undertake. Finally an overall evaluation is presented.
This paper briefly describes our initial experiences in applied research of formal approaches to the generation and maintenance of softwaresystems supporting structural engineering tasks. We describe the business con...
详细信息
This paper briefly describes our initial experiences in applied research of formal approaches to the generation and maintenance of softwaresystems supporting structural engineering tasks. We describe the business context giving rise to this activity, and give an example of the type of engineering problem we have focused on. We briefly describe our approach to software generation and maintenance, and point out the challenges that we appear to face in transferring this technology into actual practice.
Reverse engineering is an important process in CAD systems today. Yet several open problems lead to a bottleneck in the reverse engineering process. First, because the topology of the object to be reconstructed is unk...
详细信息
ISBN:
(纸本)0769512275
Reverse engineering is an important process in CAD systems today. Yet several open problems lead to a bottleneck in the reverse engineering process. First, because the topology of the object to be reconstructed is unknown, point connectivity relations are undefined. Second, the fitted surface must satisfy global and local shape preservation criteria that are undefined explicitly. In reverse engineering, object reconstruction is based both on parameterization and on fitting. Nevertheless, the above problems are influenced mainly by parameterization. In order to overcome the above problems, this paper proposes a neural network Self Organizing Map (SOM) method for creating a 3D parametric grid. The main advantage of the proposed SOM method is that it detects both the orientation of the grid and the position of the sub-boundaries. The neural network grid converges to the sampled shape through an adaptive learning process. The SOM method is applied directly on 3D sampled data and avoids the projection anomalies common to other methods, The paper also presents boundary correction and growing grid extensions to the SOM method. In the surface fitting stage, an RSEC (Random Surface Error Correction) fitting method based on the SOM method was developed and implemented.
暂无评论