The test case generation from design specifications is an important work in testing phase. In this paper, we use UML activity diagrams as design specifications, and present an automatic test case generation approach. ...
详细信息
ISBN:
(纸本)1595934081
The test case generation from design specifications is an important work in testing phase. In this paper, we use UML activity diagrams as design specifications, and present an automatic test case generation approach. The approach first randomly generates abundant test cases for a JAVA program under testing. Then, by running the program with the generated test cases, we can get the corresponding program execution traces. Last, by comparing these traces with the given activity diagram according to the specific coverage criteria, we can get a reduced test case set which meets the test adequacy criteria. The approachcan also be used to check the consistency between the program execution traces and the behavior of UML activity diagrams. Copyright 2006 ACM.
This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimi...
详细信息
This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering.
While grid computing receives more and more attentions, it is not widely used partly due to requirement of sophisticated development. This paper discusses a code generation framework for grid computing. We firstly int...
详细信息
While grid computing receives more and more attentions, it is not widely used partly due to requirement of sophisticated development. This paper discusses a code generation framework for grid computing. We firstly introduce GBuilder as a rapid development tool for building grid computing applications, then present the details of the code generation framework. We then discuss a case study to show the advantages of the whole processing of code generation framework, which including saved development time and less intricacy burden on the grid application developers.
Shape matching is one of the crucial problems in 3D model retrieval system. A usual approach is to exhaustively search through the database comparing each database model with the query model. This approach is ineffici...
详细信息
In this paper, we solve the consistency checking problems of concurrent and real-time system designs modelled by time Petri nets for the scenario-based specifications expressed by message sequence charts (MSCs). The a...
详细信息
Problem cognition is often the first step to problem solving. Complex problem solving is often promoted by cooperative cognition. Our research work presented in this paper is initialed by a motivated example. Then met...
详细信息
With the popularization of digital museum, effective retrieval in huge image databases of special domain has attracted much research attention. As an effect approach, corresponding semantic information is adopted in m...
详细信息
Heterogeneous clustered sensor networks (HCSNs) help meet the cost, lifetime, and scalability requirements of real applications. However, the security solution should be reconsidered for their unique properties, such ...
详细信息
Formal description and verification of interaction protocols is an important field of MAS. In this paper a calculus for describing interaction protocols of MAS is defined. The calculus is based on process algebra and ...
详细信息
In this paper, we address the problem of MAC address assignment in wireless sensor networks. A novel scheme for MAC address assignment is proposed to reduce the overhead. We model the problem from the game theoretical...
详细信息
暂无评论