Automated testing is important for validating the behavior of programs with complex user interfaces, such as web applications. In the enterprise context, web applications are popular client-server programs that provid...
详细信息
ISBN:
(纸本)9783319929941;9783319929934
Automated testing is important for validating the behavior of programs with complex user interfaces, such as web applications. In the enterprise context, web applications are popular client-server programs that provide rendered web pages as a user front-end, and the business logic is typically implemented on the server-side. In this paper, we present an approach to automatically generate test cases for component-based user interfaces for web applications built on the java EE platform. We generate a sequence of user actions to navigate through the web application. For each supported user action, we gather constraints from the view template describing the web page (e.g. a button must be enabled in order to be clicked by a user), as well as constraints that are introduced while executing a server-side component. We have implemented our approach in a tool to determine its practical use in an experiment.
Contemporary enterprise software frequently makes use of web services. The control flow of the class under test (CUT) might depend on the behavior of the involved web services. In order to be able to cover the control...
详细信息
ISBN:
(纸本)9781450351911
Contemporary enterprise software frequently makes use of web services. The control flow of the class under test (CUT) might depend on the behavior of the involved web services. In order to be able to cover the control flow, the web services have to behave correspondingly. We present an approach to automatically generate test cases for the CUT and also generate web services providing a behavior which allows to cover the control flow of the CUT. Even though the actually used web services might not exhibit all this behavior, our approach is still useful, since it makes sure that the CUT will keep working even if the involved web services change over time. Our approach is based on symbolic execution and constraint solving. We have evaluated it based on a set of benchmarks that show an increase in control-flow coverage of the application under test.
In the testing process humans examine the behavior of an application under test to determine what would constitute a failure. By specifying for a given input and result-whether or not this combination leads to desired...
详细信息
ISBN:
(纸本)9781614998006;9781614997993
In the testing process humans examine the behavior of an application under test to determine what would constitute a failure. By specifying for a given input and result-whether or not this combination leads to desired behavior, they essentially constitute to what is called the test oracle. To automate oracle generation, techniques were introduced to derive the oracle from models, specification, or by reusing artifacts. In the end, to complete the oracle, a human must be involved. Automated Test Case Generation (ATCG) on the other hand, already derives all feasible test cases from the program itself - baring judgment about which cases correspond to faults. This paper introduces a tool that derives the oracle by using ATCG as input for a human oracle. By combining ATCG with human oracles, we aim to reduce costs associated with the testing process.
the main objective of this paper is to determine the impact of securely connecting and communicating with a specific implementation of a message broker called ActiveMQ. ActiveMQ is "an open sourced implementation...
详细信息
ISBN:
(纸本)9781509024704
the main objective of this paper is to determine the impact of securely connecting and communicating with a specific implementation of a message broker called ActiveMQ. ActiveMQ is "an open sourced implementation of JMS 1.1" [1]. Using the same tools on the same hardware, the same scenarios are tested with and without encryption in order to determine what kind of performance impact encrypting the traffic has. The final results can be used as a reference point for deciding if the extra encryption layer is worth any potential performance penalty based on where both endpoints, the ActiveMQ cluster and the client, are located and the business requirements of the projects involved.
The earlier performance problems are detected, the easier they can be solved. Performance evaluations during the implementation phase of software projects cause overhead for developers. Unless performance evaluations ...
详细信息
ISBN:
(纸本)9783319232676;9783319232669
The earlier performance problems are detected, the easier they can be solved. Performance evaluations during the implementation phase of software projects cause overhead for developers. Unless performance evaluations are highly automated, they are not adopted in practice. This paper presents an approach to introduce performance awareness in java enterprise edition (EE) integrated development environments (IDE) by providing automated model-based performance evaluations. The approach predicts response times of java EE component operations and provides feedback to the developer within the IDE. Response time predictions are performed based on the component implementation and the response time of required services. The source code of the component to be evaluated is parsed and represented as an abstract syntax structure. This structure is then converted into a performance model representing the control flow of component operations and calls to required services. The response time of external calls is parameterized using monitoring data acquired by application performance monitoring (APM) tools from production systems. Developers are provided with immediate feedback, if the estimated response time of a component operation exceeds a predefined threshold.
Permission management is an important part of information system which cannot be ignored. The traditional way to permission management information system is coupled to the business logic;it is difficult to adapt to ch...
详细信息
Permission management is an important part of information system which cannot be ignored. The traditional way to permission management information system is coupled to the business logic;it is difficult to adapt to changes in demand. For information on access control and rights management systems and application business logic coupling problems, because of role-based access control methods and attributes-based access control methods, proposed a rights management middleware architecture, permissions model, application interface(API) and deployment models. Application validation results show that the initial permission to address management and business logic decoupling to achieve functional level and data-level rights management, improve reusability and efficiency of software development.
This paper presents an empirical approach for the performance tuning of java EE application servers (ASs) using a multi-objective differential evolution algorithm. It features multi-objective black-box optimization of...
详细信息
ISBN:
(纸本)9781467358736
This paper presents an empirical approach for the performance tuning of java EE application servers (ASs) using a multi-objective differential evolution algorithm. It features multi-objective black-box optimization of selected AS's configuration parameters. The proposed approach is used for performance tuning of the AS GlassFish and java EE test application DayTrader. The obtained results improve the objectives' values of referenced configuration (AS's default settings) individually, as well as a whole. We also find a Pareto front approximation which entirely dominates the referenced configuration objectives' values. Comparison with existing approaches is made based on previously found relations between certain configuration parameters' values. Results from multi-objective performance tuning offer a choice of alternative configurations and thus enable the attainment of business goals even within an environment where the objectives' priorities may change.
Design patterns provide an efficient way to create more flexible, elegant and ultimately reusable object-oriented software. Thus their correct application in a system's design will significantly influence its reus...
详细信息
ISBN:
(纸本)9780769536798
Design patterns provide an efficient way to create more flexible, elegant and ultimately reusable object-oriented software. Thus their correct application in a system's design will significantly influence its reusability, flexibility, extensibility and maintainability. In this paper, we explain how design patterns are selected and implemented in a javaenterprise application naming Piloting management system based on a Model-View-Controller model and integration of open source frameworks such as Spring and Hibernate. Then we adopted several appropriate design patterns in the design process and validated the feasibility of this framework model in the implementation of Attemper subsystem.
Tato diplomová práce se zabývá vývojem pokročilé webové aplikace. Účelem této aplikace je rozšířená správa docx dokumentů zahrnující import, ...
详细信息
Tato diplomová práce se zabývá vývojem pokročilé webové aplikace. Účelem této aplikace je rozšířená správa docx dokumentů zahrnující import, editaci, uchovávání a tvorbu nových dokumentů. Vývoj zahrnuje analýzu a stanovení požadavků na aplikaci, studium technologie java enterprise edition a standardu Office Open XML pro formát docx. Dále se zabývá návrhem, implementací a testováním aplikace.
V práci je uvedené řešení pro připojení databáze Firebird k JBoss aplikačnímu ***áce se zabýva konfigurací zdrojových kódu JBoss aplikačního serveru, tak aby...
详细信息
V práci je uvedené řešení pro připojení databáze Firebird k JBoss aplikačnímu ***áce se zabýva konfigurací zdrojových kódu JBoss aplikačního serveru, tak aby pracoval s databází Firebird včetně postupu na přípravu prostředí a implementací jednoduché enterprise aplikace.V závěru práce jsou analyzovány chyby konfigurace a uveden postup pro jejich napravení.
暂无评论