This paper presents an efficient context-sensitive, field-based Andersen-style points-to analysis algorithm for Java programs. This algorithm first summarizes methods of the program under analysis using directed graph...
详细信息
In services and cloud computing, processes need to be continually adapted to changing environments and requirements. Undisciplined process adaptation could easily lead to data flow anomalies, e.g., input missing for s...
详细信息
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. computers provide numbers with limited precision;when confronted with a real wh...
详细信息
ISBN:
(纸本)9781605588230
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. computers provide numbers with limited precision;when confronted with a real whose precision exceeds that limit, they introduce approximation and error. Numerical analysts have developed sophisticated mathematical techniques for performing error and stability analysis of numerical algorithms. However, these are generally not accessible to application programmers or scientists who often do not have in-depth training in numerical analysis and who thus need more automated techniques to analyze their code. In this paper, we develop a novel, practical technique to help application programmers (or even numerical experts) obtain high-level information regarding the numerical stability and accuracy of their code. Our main insight is that by systematically altering (or perturbing) the underlying numerical calculation, we can uncover potential pitfalls in the numerical code. We propose two complementary perturbations to statistically measure numerical stability: value perturbation and expression perturbation. Value perturbation dynamically replaces the least significant bits of each floating-point value, including intermediate values, with random bits to statistically induce numerical error in the code. Expression perturbation statically changes the numerical expressions in the user program to mathematically equivalent (in the reals, likely not in floating-point numbers), but syntactically different forms. We then compare the executions of these "equivalent" forms to help discover and remedy potential instabilities. Value perturbation can overstate error, while expression perturbation is relatively conservative, so we use value perturbation to generate candidates for expression perturbation. We have implemented our technique, and evaluation results on various programs from the literature and the GNU Scientific Library (GSL) show that our te
Since Wireless Sensor Networks (WSNs) are increasingly used in many industrial and civilian application areas, the correctness of their low level protocol such as the Flooding Time Synchronization Protocol (FTSP) is c...
详细信息
ISBN:
(纸本)9781450306942
Since Wireless Sensor Networks (WSNs) are increasingly used in many industrial and civilian application areas, the correctness of their low level protocol such as the Flooding Time Synchronization Protocol (FTSP) is critical. However ensuring such correctness is difficult because of the complexity of the runtime environment. Model checking is an effective method for this problem, since it is a formal verification approach which has an advantage in exploring all behaviors of the system and discovering subtle errors. In this paper, we present a novel timed automaton model for FTSP. The main insight of our method is that by using timed automata, we can introduce the transmission delay and node failures that exist in real WSNs into our model and check whether FTSP is robust to node failures under a more realistic environment. We generate the timed automata models of FTSP and verify them by the model checking tool UPPAAL. Our evaluation result depicts an error of FTSP when the algorithm runs in the scenario that two root nodes fail continuously.
Data grids provide the data-intensive applications with a large virtual stroage framework. We use a reputation-based trust aggregation approach for data providers to quantitatively predict and calculate whether or not...
详细信息
To facilitate designers to create and or modify 3D shapes rapidly during prototype modeling, this paper presents an online interactive approach which can easily generate 3D composite surface of various shapes. The app...
详细信息
To facilitate designers to create and or modify 3D shapes rapidly during prototype modeling, this paper presents an online interactive approach which can easily generate 3D composite surface of various shapes. The approach incorporates the sketch-based interface into the construction of variational implicit surface. It infers 3D surface constraint points from 2D drawing strokes (including contour stroke, cross-section stroke and skeleton stroke) using inflation transformation, cross transformation and bend transformation respectively, users can then control the shapes of 3D surfaces with freehand sketches. A technique of localization of variational implicit function is adopted for real time surface blending. Experiment results show that the proposed method supports the "divide-and-conquer" construction process of composite surface efficiently.
Under different language contexts, people choose different terms or phrases to express their feelings and opinions. When a user is writing a paper or chatting with a friend, he/she applies a specific language model co...
详细信息
Spectrum-based fault localization (SBFL) is one of the most promising fault localization approaches, which normally uses the failed and passed program spectrum to evaluate the risks for all program entities. However, ...
详细信息
Virtual users with high quality are the preconditions to ensure the effect of load testing for Web applications. The existed tools for load testing usually generate virtual users with randomly choosing user sessions, ...
详细信息
In this work, we present a monitor and rescue system utilizing hybrid networks which is a integration of stationary sensor networks and mobile sensor networks: stationary sensor networks comprised of large numbers of ...
详细信息
ISBN:
(纸本)9781424459889
In this work, we present a monitor and rescue system utilizing hybrid networks which is a integration of stationary sensor networks and mobile sensor networks: stationary sensor networks comprised of large numbers of small, simple, and inexpensive wireless sensors, and the mobile sensor network contains a set of mobile sensors (robots). The static sensors in our network have "monitoring" ability, i.e., any activated static sensor can detect the event as long as its sensing range intersects the event region. And the mobile sensors have "moving" and "rescuing" ability, e.g., they can move toward the event region with limited speed and further perform certain rescuing/processing operations on the event. We can consider the event as a hazard, e.g., wild fire, and the mobile sensors as fireman robots. As soon as the fire is detected by the static sensors, the fireman robots are expected to move from its initial location to the hazard region within minimum latency. We define the reaction delay of the system as the delay from the occurrence of event till at least one mobile sensor reaches the event. In order to satisfy certain reaction delay requirement while minimizing the total cost, we propose a number of deployment strategies for the stationary sensor network and mobile sensor network respectively. We further design a random wake-up scheduling for the static sensors for the sake of energy efficiency. Finally, we propose a pure distributed motion strategy for mobile sensors without reliance on localization services such as GPS, focusing on simple algorithms for distributed decision making and information propagation. We demonstrate the efficacy of our system in simulation, providing empirical results. keywords-Sensor networks, mobility, detection, delay.
暂无评论