This paper presents a selective regression testing technique and an associated tool for object-oriented software. The technique is based on the concept of Control Call Graphs, which are a reduced form of traditional C...
This paper presents a selective regression testing technique and an associated tool for object-oriented software. The technique is based on the concept of Control Call Graphs, which are a reduced form of traditional Control Flow Graphs . It uses static analysis of the source code of the program. The developed tool (1) identifies the Control Call Paths potentially impacted by changes, (2) selects, from an existing test suite, the appropriate test cases, and (3) generates new JUnit test cases for control call paths that are not covered by existing tests (new ones, or those whose structure has been modified after changes). In this way, the approach supports an incremental update of the test suite. The selected JUnit test cases, including the new ones, are automatically executed. Three concrete case studies are reported to provide evidence of the feasibility of the approach and its benefits in terms of reduction of regression testing effort.
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean s...
详细信息
While there are many aspect-oriented modeling (AOM) approaches, from requirements to low-level design, it is still difficult to compare them and know under which conditions different approaches are most applicable. Th...
详细信息
softwaresystems need to continually evolve during their life cycle. It is, therefore, important to monitor how their quality evolves so that quality assurance activities can be properly planned. In this paper, we ana...
详细信息
softwaresystems need to continually evolve during their life cycle. It is, therefore, important to monitor how their quality evolves so that quality assurance activities can be properly planned. In this paper, we analyze empirically the quality evolution of an open source software system (Apache Tomcat). We address software quality from an external perspective. We used the number of defects as a quality indicator. We wanted to investigate if the Qi (Quality Assurance Indicator) metric, which we proposed in a previous work, can be used to observe how quality, measured in terms of defects, evolves in the presence of changes. We performed an empirical analysis using historical data collected from the subject system covering a period of more than seven years (thirty-one versions). Results are reported and discussed in the paper.
This paper aims at investigating empirically the effect of aspect-oriented refactoring on testability of classes in object-oriented software. We investigate testability from the perspective of unit testing. We perform...
详细信息
This paper aims at investigating empirically the effect of aspect-oriented refactoring on testability of classes in object-oriented software. We investigate testability from the perspective of unit testing. We performed an empirical analysis using (test suites and refactoring) data collected from a well-known open source Java software system (JHotdraw). We used, in fact, two versions of JHotDraw: the Java version (before aspect-oriented refactoring) and the AspectJ version (after aspect-oriented refactoring). To capture testability of classes, we used two metrics to quantify the corresponding JUnit test cases. JUnit test cases have been generated using a tool (CodePro). We also used object-oriented metrics to measure various source code attributes (coupling, cohesion, inheritance, complexity and size). In order to investigate the effect of aspect-oriented refactoring on testability of classes (characteristics of corresponding test cases), we used statistical tests. Results provide evidence that testability of the refactored classes has been improved.
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the disciplin...
详细信息
ISBN:
(纸本)9781450316040
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the discipline;before being learned, they can block a student's progress. In this paper, we propose that in computing, skills, in addition to concepts, can sometimes be thresholds. Some students report finding skills more difficult than concepts. We discuss some computing skills that may be thresholds and compare threshold skills and threshold concepts. Copyright 2012 ACM.
We report preliminary results from an ongoing investigation of how computing professionals perceive and value selfdirected learning, based on a qualitative analysis of interviews with ten computing professionals. The ...
详细信息
ISBN:
(纸本)9781450317955
We report preliminary results from an ongoing investigation of how computing professionals perceive and value selfdirected learning, based on a qualitative analysis of interviews with ten computing professionals. The professionals expect that future colleagues will have a well-developed ability to learn on their own. They indicate that professionals use a range of resources, strategies, and collaborators to help them learn. They find their work-related self-directed learning enjoyable, expressing a sense of confidence and pride;yet they often also find it to be a stressful never-ending process. Copyright 2012 ACM.
Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instan...
详细信息
Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instances are virtual machines (VMs) available at lower prices than their standard on-demand counterparts. These VMs will run for as long as the current price is lower than the maximum bid price users are willing to pay per hour. Spot instances have been increasingly used for executing compute-intensive applications. In spite of an apparent economical advantage, due to an intermittent nature of biddable resources, application execution times may be prolonged or they may not finish at all. This paper proposes a resource allocation strategy that addresses the problem of running compute-intensive jobs on a pool of intermittent virtual machines, while also aiming to run applications in a fast and economical way. To mitigate potential unavailability periods, a multifaceted fault-aware resource provisioning policy is proposed. Our solution employs price and runtime estimation mechanisms, as well as three fault-tolerance techniques, namely check pointing, task duplication and migration. We evaluate our strategies using trace-driven simulations, which take as input real price variation traces, as well as an application trace from the Parallel Workload Archive. Our results demonstrate the effectiveness of executing applications on spot instances, respecting QoS constraints, despite occasional failures.
Many applications in federated Grids have quality-of-service (QoS) constraints such as deadline. Admission control mechanisms assure QoS constraints of the applications by limiting the number of user requests accepted...
详细信息
Many applications in federated Grids have quality-of-service (QoS) constraints such as deadline. Admission control mechanisms assure QoS constraints of the applications by limiting the number of user requests accepted by a resource provider. However, in order to maximize their profit, resource owners are interested in accepting as many requests as possible. In these circumstances, the question that arises is: what is the effective number of requests that can be accepted by a resource provider in a way that the number of accepted external requests is maximized and, at the same time, QoS violations are minimized. In this paper, we answer this question in the context of a virtualized federated Grid environment, where each Grid serves requests from external users along with its local users and requests of local users have preemptive priority over external requests. We apply analytical queuing model to address this question. Additionally, we derive a preemption-aware admission control policy based on the proposed model. Simulation results under realistic working conditions indicate that the proposed policy improves the number of completed external requests (up to 25%). In terms of QoS violations, the 95% confidence interval of the average difference with other policies is between (14.79%, 18.56%).
Biometrics authentication is one of the powerful solutions that being used broadly in the Information Security due to its high effective and accurate results. Nevertheless, most of these methods require specific devic...
Biometrics authentication is one of the powerful solutions that being used broadly in the Information Security due to its high effective and accurate results. Nevertheless, most of these methods require specific devices to gain input data. The keystroke dynamics authentication is a biometric technique that requires a common device which is a keyboard. Therefore, this biometric is a very useful technology that can be implemented on various systems over the Internet as long as those users use keyboards. Unfortunately, the defect of using the keystroke dynamics is that the authentication result is invalid when users have different tempers. Thus, the accuracy of the use of the keystroke dynamics can be increased when combining this technique with other biometrics, such as the fingerprint and the iris scan. The unsuitable for these combinations is that special devices are required in the authentication process. So, to eliminate such requirements, this paper proposes the modification of keystroke dynamics biometric by adapting it with the speed of eyes vision in order to increase the higher accuracy of identifying legitimate users. The proposed solution expects that the authentication process can be performed on a basic device such as the keyboard.
暂无评论