In the regression testing of analyzing the impact of changes, it will give a great help to software testers to choose and optimize test cases for function call path coverage testing, while knowing the global static fu...
详细信息
In the regression testing of analyzing the impact of changes, it will give a great help to software testers to choose and optimize test cases for function call path coverage testing, while knowing the global static function call path. In this article, according to the structure of C program, a new method of generating the global static function call path and getting the function call graph as well was presented through analyzing control flow and data flow. We empirically show that this algorithm has high accuracy and efficiency and can help to improve coverage rate of function call path coverage testing and software stability.
The test method oriented function call path acquires function call paths through static analysis, but the uncertainty between definitions and call forms of function template in static analysis produces many redundant ...
详细信息
The test method oriented function call path acquires function call paths through static analysis, but the uncertainty between definitions and call forms of function template in static analysis produces many redundant paths, which makes test workload increase exponentially, so determining uniqueness of function template call relation is an important part of improving test efficiency. Through analyzing definitions and call forms of function template, we set rules and create symbol table to store the information, use PCM (Priority Call Matching) algorithm to statically determine the uniqueness of function template call relation. The experiment's result shows that, the algorithm can determine the uniqueness of function template call relation, effectively eliminate redundant function call paths, and improve the efficiency of regression testing.
In the process of software development, the frequent modification makes the software testing much more difficult, the source code management and control is an important complement to the white-box testing process. We ...
详细信息
ISBN:
(纸本)9781424463886;9780769539874
In the process of software development, the frequent modification makes the software testing much more difficult, the source code management and control is an important complement to the white-box testing process. We propose modificatory identification algorithm for source code oriented which applies the combination of LCS algorithm and Divide and Conquer thinking. The experiment's result shows that the result of its implementation is not only accurate but also efficient, efficiency of the algorithm is more significant especially when the amount of code is larger.
Function call path testing is based on static analysis of source code. The relationship between the definitions of the overloaded function and the call points is uncertain in the static analysis, which will produce a ...
详细信息
Function call path testing is based on static analysis of source code. The relationship between the definitions of the overloaded function and the call points is uncertain in the static analysis, which will produce a great deal of redundant paths and increase the cost of the testing. In order to determine the paths of the actual process and get function call relation, firstly, we need to determine the uniqueness of the overloaded function. We analyze the form of the overloaded function call from several aspects, design the algorithm of DUOF(determining the uniqueness of the overloaded function), ultimately determine its unique, by analyzing the realization mechanism of overloaded functions and applying the theory of compile and object-oriented. The experiment's result shows that the result of its implementation is not only accurate but also can improve the efficiency of regression testing, efficiency of the algorithm is more significant especially when the amount of code is larger.
On the base of analyzing how to develop file enc/decryption system based on VFS of Solaris with the technology of redirection of system call and how to make it work with OS seamlessly, the author make progress on the ...
详细信息
On the base of analyzing how to develop file enc/decryption system based on VFS of Solaris with the technology of redirection of system call and how to make it work with OS seamlessly, the author make progress on the simple model of file enc/decryption system and gives the improved model of file enc/decryption system. The result shows that the improved model has better efficiency and reduces the impact to the OS on performance effectively.
The openness of Internet offers great convenience of information sharing and exchange, accompanied with crucial challenges to Information Security. As a kind of active measure of Information Assurance, Intrusion Detec...
详细信息
The openness of Internet offers great convenience of information sharing and exchange, accompanied with crucial challenges to Information Security. As a kind of active measure of Information Assurance, Intrusion Detection acts as the effective complement to traditional protection techniques. On the base of analyzing KMP algorithm and BM algorithm, which are fashionable pattern matching algorithms in intrusion detection system at present, the author gives an new pattern matching algorithm in place of the BM algorithm. The results show that the improved pattern matching algorithm has better efficiency and is helpful to reduce systematical missing package rate.
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ...
详细信息
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance.
A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect-they allow some users to cheat the system with malicious behavior, o...
详细信息
A number of solutions have been proposed to address the free-riding problem in peer-to-peer file sharing systems. The solutions are either imperfect-they allow some users to cheat the system with malicious behavior, or expensive-they require human intervention, require servers, or incur high mental transaction costs. The authors proposed a method to address these weaknesses. Specifically, a utility function was introduced to capture contributions made by a user and an auditing scheme to ensure the integrity of a utility function's values. The method enabled to reduce cheating by a malicious peer: it is shown that this approach can efficiently detect malicious peers with a probability over 98%.
This paper presents a hybrid checkpointing protocol-an asynchronous checkpointing protocol using a message sending/receiving state change for reducing the overhead of failure-free operation combined with a selective s...
详细信息
ISBN:
(纸本)0818682272
This paper presents a hybrid checkpointing protocol-an asynchronous checkpointing protocol using a message sending/receiving state change for reducing the overhead of failure-free operation combined with a selective sender-based message logging protocol for reducing the cascade rollback of asynchronous checkpointing protocol. The selective sender-based message logging protocol records only potential orphan messages when taking a checkpoint. And this paper presents a message dependency tree recording the inter-process message sending/receiving information on a volatile storage for reducing the search time of inter-process information during the failure recovery.
暂无评论