Applications that utilize a broker-based architecture are often composed of components that need to be tested individually and in combination. Furthermore, adequacy assessment of tests of components is useful in that ...
详细信息
Applications that utilize a broker-based architecture are often composed of components that need to be tested individually and in combination. Furthermore, adequacy assessment of tests of components is useful in that it assists testers in identifying weaknesses in the tests generated so far and in offering hints on what the new tests must be. Traditional test adequacy criteria have limitations for commercial use, especially when tests for large components are to be assessed for their adequacy. This paper describes a test adequacy criterion based on interface mutation and a method, based on the criterion, to test components. This method requires the mutation of elements only from within a component's interface and not from within the code that implements the interface. The adequacy criterion based on interface mutation was evaluated empirically and compared with coverage criteria based on control flow for its relative effectiveness in revealing errors and in the cost incurred in developing test sets that satisfy the criterion. Copyright (C) 2001 John Wiley & Sons, Ltd.
Grid computing technology improves the computing experiences at organizations by effectively integrating distributed computing resources. However, just a small fraction of currently available Grid infrastructures focu...
详细信息
Grid computing technology improves the computing experiences at organizations by effectively integrating distributed computing resources. However, just a small fraction of currently available Grid infrastructures focuses on reutilization of existing commodity computing resources. This paper introduces InteGrade, a novel object-oriented middleware Grid infrastructure that focuses on leveraging the idle computing power of shared desktop machines. Its features include support for a wide range of parallel applications and mechanisms to assure that the owners of shared resources do not perceive any loss in the quality of service. A prototype implementation is under construction and the current version is available for download. Copyright (C) 2004 John Wiley Sons, Ltd.
Interface Mutation (IM) is proposed as an adequacy criterion to assess the adequacy of test sets developed to test components and systems. IM uses the description of a component's interface to generate interface m...
详细信息
ISBN:
(纸本)0769507743;0769507751
Interface Mutation (IM) is proposed as an adequacy criterion to assess the adequacy of test sets developed to test components and systems. IM uses the description of a component's interface to generate interface mutants. Tests are assessed on their ability to distinguish interface mutants. Experiments conducted to evaluate the goodness of IM are reported. Analysis of experimental data suggests that test sets adequate with respect to IM are effective in revealing errors in components. The effort required to develop the tests is lower compared to the effort required to develop test sets adequate with respect to the traditional code coverage criteria based on control flow.
作者:
Karjoth, GIBM
Div Res Zurich Res Lab Zurich Switzerland
Integration of security and object-oriented techniques is critical for the successful deployment of distributed object systems. In December of 1995, the object Management Group published a security service specificati...
详细信息
ISBN:
(纸本)3540650040
Integration of security and object-oriented techniques is critical for the successful deployment of distributed object systems. In December of 1995, the object Management Group published a security service specification called CORBA Security to handle security in objectsystems that conform to the object Management Architecture. This paper provides a rigorous definition of the authorization part of CORBA Security. Its semantics is given in terms of an access control matrix. The dependencies among the authorization elements are analyzed and possible interpretations for access control decision functions are given. The expressivity of the authorization model to define a wide range of policies, in particular mandatory access control, is discussed.
Nowadays, many distributed applications take advantage of the transparent distributed object systems provided by CORBA middlewares. While greatly reduce the design and coding effort, the distributed object systems may...
详细信息
ISBN:
(纸本)3540213147
Nowadays, many distributed applications take advantage of the transparent distributed object systems provided by CORBA middlewares. While greatly reduce the design and coding effort, the distributed object systems may also introduce subtle faults into the applications, which on the other hand, complicate the validation of the applications. In this paper, we present our work on applying SPIN to check the correctness of the designs of CORBA-based applications, taking into account those characteristics of CORBA that are essential to the correctness of the applications. In doing so, we provide adaptations to UML, so that the CORBA-based applications can be modeled with succinct yet sufficient details of the underlying middlewares. An automated translation tool is developed to generate Promela models from such UML design models. The translation tool embeds the behavioral details of the middleware automatically. In this way, the software developers can stay in their comfort zone while design faults, including those caused by the underlying distributed object systems can be pinpointed through the verification or the simulation with SPIN.
Most existing reference-based distributed object systems include some kind of acyclic garbage collection, but fail to provide acceptable collection of cyclic garbage. Those that do provide such GC currently suffer fro...
详细信息
ISBN:
(纸本)9780897919876
Most existing reference-based distributed object systems include some kind of acyclic garbage collection, but fail to provide acceptable collection of cyclic garbage. Those that do provide such GC currently suffer from one or more problems: synchronous operation, the need for expensive global consensus or termination algorithms, susceptibility to communication problems, or an algorithm that does not scale. We present a simple, complete, fault-tolerant, asynchronous extension to the (acyclic) cleanup protocol of the SSP Chains system. This extension is scalable, consumes few resources, and could easily be adapted to work in other reference-based distributed object systems---rendering them usable for very large-scale applications.
暂无评论