首页 > 最新文献

2010 IEEE 34th Annual Computer Software and Applications Conference Workshops最新文献

英文 中文
Software Fault Prediction Models for Web Applications Web应用软件故障预测模型
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.19
L. Giang, Dongwon Kang, Doo-Hwan Bae
Our daily life increasingly relies on Web applications. Web applications provide us with abundant services to support our everyday activities. As a result, quality assurance for Web applications is becoming important and has gained much attention from software engineering community. In recent years, in order to enhance software quality, many software fault prediction models have been constructed to predict which software modules are likely to be faulty during operations. Such models can be utilized to raise the effectiveness of software testing activities and reduce project risks. Although current fault prediction models can be applied to predict faulty modules of Web applications, one limitation of them is that they do not consider particular characteristics of Web applications. In this paper, we try to build fault prediction models aiming for Web applications after analyzing major characteristics which may impact on their quality. The experimental study shows that our approach achieves very promising results.
我们的日常生活越来越依赖于Web应用程序。Web应用程序为我们提供了丰富的服务来支持我们的日常活动。因此,Web应用程序的质量保证变得越来越重要,并得到了软件工程界的广泛关注。近年来,为了提高软件质量,人们建立了许多软件故障预测模型来预测哪些软件模块在运行过程中可能出现故障。这样的模型可以用来提高软件测试活动的有效性,并减少项目风险。虽然目前的故障预测模型可以用于预测Web应用程序的故障模块,但它们的一个局限性是没有考虑Web应用程序的特定特征。本文在分析了影响Web应用质量的主要特征后,尝试建立针对Web应用的故障预测模型。实验研究表明,我们的方法取得了很好的效果。
{"title":"Software Fault Prediction Models for Web Applications","authors":"L. Giang, Dongwon Kang, Doo-Hwan Bae","doi":"10.1109/COMPSACW.2010.19","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.19","url":null,"abstract":"Our daily life increasingly relies on Web applications. Web applications provide us with abundant services to support our everyday activities. As a result, quality assurance for Web applications is becoming important and has gained much attention from software engineering community. In recent years, in order to enhance software quality, many software fault prediction models have been constructed to predict which software modules are likely to be faulty during operations. Such models can be utilized to raise the effectiveness of software testing activities and reduce project risks. Although current fault prediction models can be applied to predict faulty modules of Web applications, one limitation of them is that they do not consider particular characteristics of Web applications. In this paper, we try to build fault prediction models aiming for Web applications after analyzing major characteristics which may impact on their quality. The experimental study shows that our approach achieves very promising results.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Test Sequence Generation from Combining Property Modeling and Program Slicing 结合属性建模和程序切片的测试序列生成
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.18
Hua Li, Yongge Peng, Xinming Ye, J.-.Y. Yue
Property based testing is to test the interesting property of software. It can reduce the amount of testing work and further improve the efficiency of testing. Programming slicing is a way to analyze and decompose system code. In the paper, the category of the property is given and the primitive property is informal defined. A kind of property extraction method is presented and Petri net is constructed. Property model and dynamic slicing are combined to generate test sequence. As an example, the system structure of Minix3 is introduced. Exec, one of key system callings of Minix3, is modeling, slicing and its test sequences are generated. Minix3 provides open interfaces and modular. The results of slicing can be used to improve the process of software re-use. Finally the conclusion and the research work in the future are introduced.
基于属性的测试是对软件感兴趣的属性进行测试。它可以减少测试工作量,进一步提高测试效率。编程切片是一种分析和分解系统代码的方法。本文给出了性质的范畴,并对基本性质进行了非正式定义。提出了一种属性提取方法,并构造了Petri网。将属性模型和动态切片相结合,生成测试序列。以Minix3为例,介绍了系统结构。Exec是Minix3的关键系统调用之一,负责建模、切片及其测试序列的生成。Minix3提供开放的接口和模块化。切片的结果可用于改进软件重用过程。最后介绍了本文的结论和今后的研究工作。
{"title":"Test Sequence Generation from Combining Property Modeling and Program Slicing","authors":"Hua Li, Yongge Peng, Xinming Ye, J.-.Y. Yue","doi":"10.1109/COMPSACW.2010.18","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.18","url":null,"abstract":"Property based testing is to test the interesting property of software. It can reduce the amount of testing work and further improve the efficiency of testing. Programming slicing is a way to analyze and decompose system code. In the paper, the category of the property is given and the primitive property is informal defined. A kind of property extraction method is presented and Petri net is constructed. Property model and dynamic slicing are combined to generate test sequence. As an example, the system structure of Minix3 is introduced. Exec, one of key system callings of Minix3, is modeling, slicing and its test sequences are generated. Minix3 provides open interfaces and modular. The results of slicing can be used to improve the process of software re-use. Finally the conclusion and the research work in the future are introduced.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"10 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Negotiating Service Requirements among Strategic Actors 战略参与者之间的服务需求谈判
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.16
Tuoye Xu, Tong Li, Lin Liu, B. Bryant
Negotiation is an important activity in both conventional requirements engineering and the new online service era. It encompasses a wide range of functional and non-functional requirements (QoS), including price, performance, security, delivery time, etc. In order to meet service requirements in the open and distributed environment, systems need to be adaptive to the changing needs. In this paper, we propose a negotiation modeling and evaluation mechanism for strategic actors, who have service requirements and capabilities. The strategic modeling approach allows actors in service environments to negotiate for service level agreements including service functionalities and multiple QoS categories; it also includes a generic service negotiation protocol that enables service requestors and providers to select an optimal alternative. Offers are generated and evaluated in accordance to actor’s preferences and best interest. We use typical service scenarios as running examples to illustrate the proposed approach and evaluate its viability.
谈判是传统需求工程和新在线服务时代的一项重要活动。它包含了广泛的功能性和非功能性需求(QoS),包括价格、性能、安全性、交付时间等。为了满足开放和分布式环境下的业务需求,系统需要适应不断变化的需求。本文提出了一种针对具有服务需求和服务能力的战略行为体的协商建模与评估机制。战略建模方法允许服务环境中的参与者协商服务水平协议,包括服务功能和多个QoS类别;它还包括一个通用的服务协商协议,使服务请求者和提供者能够选择最佳的替代方案。出价是根据参与者的偏好和最佳利益产生和评估的。我们使用典型的服务场景作为运行示例来说明所建议的方法并评估其可行性。
{"title":"Negotiating Service Requirements among Strategic Actors","authors":"Tuoye Xu, Tong Li, Lin Liu, B. Bryant","doi":"10.1109/COMPSACW.2010.16","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.16","url":null,"abstract":"Negotiation is an important activity in both conventional requirements engineering and the new online service era. It encompasses a wide range of functional and non-functional requirements (QoS), including price, performance, security, delivery time, etc. In order to meet service requirements in the open and distributed environment, systems need to be adaptive to the changing needs. In this paper, we propose a negotiation modeling and evaluation mechanism for strategic actors, who have service requirements and capabilities. The strategic modeling approach allows actors in service environments to negotiate for service level agreements including service functionalities and multiple QoS categories; it also includes a generic service negotiation protocol that enables service requestors and providers to select an optimal alternative. Offers are generated and evaluated in accordance to actor’s preferences and best interest. We use typical service scenarios as running examples to illustrate the proposed approach and evaluate its viability.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation 基于模型转换的UML2.0序列图语义分析
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.38
Meixia Zhu, Hanpin Wang, W. Jin, Zizhen Wang, Chunxiang Xu
The Sequence Diagram(SD) of UML2.0 enriches those of previous versions by two new operators, assert and negate, for specifying required and forbidden behaviors. The semantics of SD, however, being based on pairs of valid and invalid sets of traces, is inadequate, and prevents the new operators from being used effectively. The semantic confusions between assert and negate operators in UML SD are significant, since they pose great difficulty to the confirmation of the security of the system they designed. A new Petri-net model named LPNforSD is designed in this paper. Transformation rules from SD to LPNforSD are given out. We take fragment that described by assert or negate operator as independent part and transform it into LPNforSDs. An algorithm is also designed to check whether the SD is safe by comparing its traces with the traces getting from negate and assert fragments. By this way, we cannot only eliminate the semantic confusions between assert and negate operators, but also reduce the numbers of contingent traces. Thus, we can ensure the system more reliable
UML2.0的序列图(SD)通过assert和negate两个新的操作符来指定需要和禁止的行为,从而丰富了以前版本的序列图。然而,SD的语义是基于有效和无效的跟踪集对的,这是不充分的,并且妨碍了新操作符的有效使用。UML SD中断言和否定操作符之间的语义混淆是很重要的,因为它们给确认它们所设计的系统的安全性带来了很大的困难。本文设计了一种新的petri网模型LPNforSD。给出了从SD到LPNforSD的转换规则。我们将由断言或否定运算符描述的片段作为独立部分,并将其转换为lpnfords。还设计了一种算法,通过将SD的迹线与从否定和断言片段中获得的迹线进行比较,来检查SD是否安全。通过这种方式,我们不仅消除了断言和否定操作符之间的语义混淆,而且还减少了偶然跟踪的数量。从而保证系统的可靠性
{"title":"Semantic Analysis of UML2.0 Sequence Diagram Based on Model Transformation","authors":"Meixia Zhu, Hanpin Wang, W. Jin, Zizhen Wang, Chunxiang Xu","doi":"10.1109/COMPSACW.2010.38","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.38","url":null,"abstract":"The Sequence Diagram(SD) of UML2.0 enriches those of previous versions by two new operators, assert and negate, for specifying required and forbidden behaviors. The semantics of SD, however, being based on pairs of valid and invalid sets of traces, is inadequate, and prevents the new operators from being used effectively. The semantic confusions between assert and negate operators in UML SD are significant, since they pose great difficulty to the confirmation of the security of the system they designed. A new Petri-net model named LPNforSD is designed in this paper. Transformation rules from SD to LPNforSD are given out. We take fragment that described by assert or negate operator as independent part and transform it into LPNforSDs. An algorithm is also designed to check whether the SD is safe by comparing its traces with the traces getting from negate and assert fragments. By this way, we cannot only eliminate the semantic confusions between assert and negate operators, but also reduce the numbers of contingent traces. Thus, we can ensure the system more reliable","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures LAYSI:自管理云基础设施中sla违反传播的分层方法
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.70
I. Brandić, Vincent C. Emeakaroha, M. Maurer, S. Dustdar, S. Ács, A. Kertész, G. Kecskeméti
Cloud computing represents a promising computing paradigm where computing resources have to be allocated to software for their execution. Self-manageable Cloud infrastructures are required to achieve that level of flexibility on one hand, and to comply to users' requirements specified by means of Service Level Agreements (SLAs) on the other. Such infrastructures should automatically respond to changing component, workload, and environmental conditions minimizing user interactions with the system and preventing violations of agreed SLAs. However, identification of sources responsible for the possible SLA violation and the decision about the reactive actions necessary to prevent SLA violation is far from trivial. First, in this paper we present a novel approach for mapping low-level resource metrics to SLA parameters necessary for the identification of failure sources. Second, we devise a layered Cloud architecture for the bottom-up propagation of failures to the layer, which can react to sensed SLA violation threats. Moreover, we present a communication model for the propagation of SLA violation threats to the appropriate layer of the Cloud infrastructure, which includes negotiators, brokers, and automatic service deployer.
云计算代表了一种很有前途的计算范式,其中计算资源必须分配给软件才能执行。自我管理的云基础设施一方面需要实现这种级别的灵活性,另一方面需要遵守通过服务水平协议(sla)指定的用户需求。这样的基础设施应该自动响应不断变化的组件、工作负载和环境条件,最大限度地减少用户与系统的交互,并防止违反商定的sla。然而,识别导致可能的SLA违反的来源和决定防止SLA违反所必需的反应性操作远非微不足道。首先,在本文中,我们提出了一种将低级资源度量映射到识别故障源所需的SLA参数的新方法。其次,我们设计了一个分层的云架构,用于自底向上的故障传播到该层,该层可以对感知到的SLA违反威胁做出反应。此外,我们提出了一个通信模型,用于将SLA违反威胁传播到云基础设施的适当层,包括谈判者、代理和自动服务部署者。
{"title":"LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures","authors":"I. Brandić, Vincent C. Emeakaroha, M. Maurer, S. Dustdar, S. Ács, A. Kertész, G. Kecskeméti","doi":"10.1109/COMPSACW.2010.70","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.70","url":null,"abstract":"Cloud computing represents a promising computing paradigm where computing resources have to be allocated to software for their execution. Self-manageable Cloud infrastructures are required to achieve that level of flexibility on one hand, and to comply to users' requirements specified by means of Service Level Agreements (SLAs) on the other. Such infrastructures should automatically respond to changing component, workload, and environmental conditions minimizing user interactions with the system and preventing violations of agreed SLAs. However, identification of sources responsible for the possible SLA violation and the decision about the reactive actions necessary to prevent SLA violation is far from trivial. First, in this paper we present a novel approach for mapping low-level resource metrics to SLA parameters necessary for the identification of failure sources. Second, we devise a layered Cloud architecture for the bottom-up propagation of failures to the layer, which can react to sensed SLA violation threats. Moreover, we present a communication model for the propagation of SLA violation threats to the appropriate layer of the Cloud infrastructure, which includes negotiators, brokers, and automatic service deployer.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131043792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to Clouds ULMS:通过将写日志从本地磁盘转移到云,为应用程序提供加速器
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.28
Li Zhou, Yong Zhang, Chunxiao Xing
Log data is critical to applications and the management and analysis of log data is a hot research topic. Existing log managements are normally tightly integrated with applications themselves, which may lead to problems including performance, local storage efficiency, security and non real-time functionality. To solve these problems, we present a SaaS method which shifts writing log data from local disk to clouds, at the same time the log management and analysis functionalities are also done by a cloud. We analyze two architectures to implement this method which are Web Service and Shift-LogActive MQ Initial experiments show the efficiency of later one. In the future, we can apply this tool to application systems which are based on web and database systems to improve their performances
测井数据是应用的关键,测井数据的管理与分析是一个研究热点。现有的日志管理通常与应用程序本身紧密集成,这可能会导致性能、本地存储效率、安全性和非实时功能等问题。为了解决这些问题,我们提出了一种SaaS方法,将日志数据写入从本地磁盘转移到云,同时日志管理和分析功能也由云来完成。我们分析了Web Service和Shift-LogActive MQ两种架构来实现该方法,初步实验证明了后一种架构的有效性。在未来,我们可以将该工具应用到基于web和数据库系统的应用系统中,以提高其性能
{"title":"ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to Clouds","authors":"Li Zhou, Yong Zhang, Chunxiao Xing","doi":"10.1109/COMPSACW.2010.28","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.28","url":null,"abstract":"Log data is critical to applications and the management and analysis of log data is a hot research topic. Existing log managements are normally tightly integrated with applications themselves, which may lead to problems including performance, local storage efficiency, security and non real-time functionality. To solve these problems, we present a SaaS method which shifts writing log data from local disk to clouds, at the same time the log management and analysis functionalities are also done by a cloud. We analyze two architectures to implement this method which are Web Service and Shift-LogActive MQ Initial experiments show the efficiency of later one. In the future, we can apply this tool to application systems which are based on web and database systems to improve their performances","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124337276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natural Language Processing Based Detection of Duplicate Defect Patterns 基于自然语言处理的重复缺陷模式检测
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.45
Qian Wu, Qianxiang Wang
A Defect pattern repository collects different kinds of defect patterns, which are general descriptions of the characteristics of commonly occurring software code defects. Defect patterns can be widely used by programmers, static defect analysis tools, and even runtime verification. Following the idea of web 2.0, defect pattern repositories allow these users to submit defect patterns they found. However, submission of duplicate patterns would lead to a redundancy in the repository. This paper introduces an approach to suggest potential duplicates based on natural language processing. Our approach first computes field similarities based on Vector Space Model, and then employs Information Entropy to determine the field importance, and next combines the field similarities to form the final defect pattern similarity. Two strategies are introduced to make our approach adaptive to special situations. Finally, groups of duplicates are obtained by adopting Hierarchical Clustering. Evaluation indicates that our approach could detect most of the actual duplicates (72% in our experiment) in the repository.
缺陷模式存储库收集了不同种类的缺陷模式,这些缺陷模式是对常见软件代码缺陷特征的一般描述。缺陷模式可以被程序员、静态缺陷分析工具甚至运行时验证广泛使用。遵循web 2.0的思想,缺陷模式存储库允许这些用户提交他们发现的缺陷模式。但是,提交重复的模式会导致存储库中的冗余。本文介绍了一种基于自然语言处理的潜在重复提示方法。该方法首先基于向量空间模型计算域的相似度,然后利用信息熵确定域的重要度,最后将域的相似度组合形成最终的缺陷模式相似度。引入了两种策略,使我们的方法适应特殊情况。最后,采用层次聚类方法得到重复组。评估表明,我们的方法可以检测到存储库中的大多数实际重复(在我们的实验中为72%)。
{"title":"Natural Language Processing Based Detection of Duplicate Defect Patterns","authors":"Qian Wu, Qianxiang Wang","doi":"10.1109/COMPSACW.2010.45","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.45","url":null,"abstract":"A Defect pattern repository collects different kinds of defect patterns, which are general descriptions of the characteristics of commonly occurring software code defects. Defect patterns can be widely used by programmers, static defect analysis tools, and even runtime verification. Following the idea of web 2.0, defect pattern repositories allow these users to submit defect patterns they found. However, submission of duplicate patterns would lead to a redundancy in the repository. This paper introduces an approach to suggest potential duplicates based on natural language processing. Our approach first computes field similarities based on Vector Space Model, and then employs Information Entropy to determine the field importance, and next combines the field similarities to form the final defect pattern similarity. Two strategies are introduced to make our approach adaptive to special situations. Finally, groups of duplicates are obtained by adopting Hierarchical Clustering. Evaluation indicates that our approach could detect most of the actual duplicates (72% in our experiment) in the repository.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Level of Decomposition Impact on Component Fault Tolerance 分解程度对组件容错的影响
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.20
Atef Mohamed, Mohammad Zulkernine
In fault tolerant software systems, the Level of Decomposition (LoD) where design diversity is applied has a major impact on software system reliability. By disregarding this impact, current fault tolerance techniques are prone to reliability decrease due to the inappropriate application level of design diversity. In this paper, we quantify the effect of the LoD on system reliability during software recomposition when the functionalities of the system are redistributed across its components. We discuss the LoD in fault tolerant software architectures according to three component failure transitions: component failure occurrence, component failure propagation, and component failure impact. We illustrate the component aspects that relate the LoD to each of these failure transitions. Finally, we quantify the effect of the LoD on system reliability according to a series of decomposition and/or merge operations that may occur during software recomposition.
在容错软件系统中,应用设计多样性的分解水平(LoD)对软件系统的可靠性有重要影响。由于忽视了这种影响,现有的容错技术容易由于设计多样性的应用水平不合理而导致可靠性降低。在本文中,我们量化了当系统的功能在其组件之间重新分布时,软件重组期间LoD对系统可靠性的影响。本文从组件故障发生、组件故障传播和组件故障影响三个方面讨论了容错软件体系结构中的负载耦合器件。我们将说明将LoD与每个故障转换关联起来的组件方面。最后,我们根据在软件重组期间可能发生的一系列分解和/或合并操作,量化LoD对系统可靠性的影响。
{"title":"The Level of Decomposition Impact on Component Fault Tolerance","authors":"Atef Mohamed, Mohammad Zulkernine","doi":"10.1109/COMPSACW.2010.20","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.20","url":null,"abstract":"In fault tolerant software systems, the Level of Decomposition (LoD) where design diversity is applied has a major impact on software system reliability. By disregarding this impact, current fault tolerance techniques are prone to reliability decrease due to the inappropriate application level of design diversity. In this paper, we quantify the effect of the LoD on system reliability during software recomposition when the functionalities of the system are redistributed across its components. We discuss the LoD in fault tolerant software architectures according to three component failure transitions: component failure occurrence, component failure propagation, and component failure impact. We illustrate the component aspects that relate the LoD to each of these failure transitions. Finally, we quantify the effect of the LoD on system reliability according to a series of decomposition and/or merge operations that may occur during software recomposition.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128553734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy-Based Measures of Heterogeneity of Software Structural Profile 基于熵的软件结构轮廓异构度量
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.41
Beibei Yin, Ling-Zan Zhu, K. Cai
Following the growing research interests in complex networks, in recent years many researchers treated software static structures as complex networks and revealed that most of these networks follow a scale-free degree distribution. Different from the perspectives adopted in these works, our previous work found that the networks of software dynamic execution processes may also be scale-free. Scale-free degree distribution demonstrates that during the execution process the methods being invoked only a few times are far more abundant than those being frequently invoked, i.e. the software structural profile is heterogeneous. Software structural profile describes the probabilities of software modules or states being invoked. Since many unique properties of complex networks are due to the heterogeneity, the quantitative measure of it is important and desirable. This paper proposes two quantitative measures of heterogeneity of software structural profile based on entropy. Three case studies are presented to show the effectiveness of the proposed measures.
随着对复杂网络的研究兴趣日益浓厚,近年来许多研究者将软件静态结构视为复杂网络,并发现这些网络大多遵循无标度分布。与这些作品采用的视角不同,我们之前的工作发现软件动态执行过程的网络也可能是无标度的。无标度分布表明,在执行过程中,只被调用几次的方法远远多于被频繁调用的方法,即软件结构轮廓是异构的。软件结构概要描述被调用的软件模块或状态的概率。由于复杂网络的许多独特性质都是由异质性引起的,因此对其进行定量测量是非常重要和必要的。本文提出了两种基于熵的软件结构轮廓异质性的定量度量方法。通过三个案例分析,证明了所提出措施的有效性。
{"title":"Entropy-Based Measures of Heterogeneity of Software Structural Profile","authors":"Beibei Yin, Ling-Zan Zhu, K. Cai","doi":"10.1109/COMPSACW.2010.41","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.41","url":null,"abstract":"Following the growing research interests in complex networks, in recent years many researchers treated software static structures as complex networks and revealed that most of these networks follow a scale-free degree distribution. Different from the perspectives adopted in these works, our previous work found that the networks of software dynamic execution processes may also be scale-free. Scale-free degree distribution demonstrates that during the execution process the methods being invoked only a few times are far more abundant than those being frequently invoked, i.e. the software structural profile is heterogeneous. Software structural profile describes the probabilities of software modules or states being invoked. Since many unique properties of complex networks are due to the heterogeneity, the quantitative measure of it is important and desirable. This paper proposes two quantitative measures of heterogeneity of software structural profile based on entropy. Three case studies are presented to show the effectiveness of the proposed measures.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applied MDA for Embedded Devices: Software Design and Code Generation for a Low-Cost Mobile Phone MDA在嵌入式设备中的应用:低成本移动电话的软件设计和代码生成
Pub Date : 2010-07-19 DOI: 10.1109/COMPSACW.2010.21
M. Lettner, Michael Tschernuth
When it comes to embedded devices, producing highly dependable, fail-safe and efficient software solutions is indispensable. Such devices usually ship in large numbers, should run 24/7, have real-time constraints and work autonomously most of the time, which is why a very high software quality is required. At the same time, as companies are always looking for ways to cut costs, it is not easy to provide reliability and guarantee a high level of product quality all at the same time. Changing requirements and the fast pace of innovation in terms of ever new hardware capabilities, combined with the need for frequent software updates, demand an easy mechanism to change software quickly and enable reuse. Applying smart software solutions is a way of addressing above issues. Formal approaches such as model driven architecture (MDA) have been proposed, but often lack realizability due to various problems in practice. The proposed solution addresses these issues and focuses on what it takes to fully take advantage of MDA by pointing out methodologies and tool chains that have been applied in a real world project to enable high quality code generation for software of a low-cost mobile phone.
当涉及到嵌入式设备时,生产高度可靠、故障安全且高效的软件解决方案是必不可少的。这类设备通常大量出货,应该全天候运行,有实时限制,并且大多数时间都是自主工作,这就是为什么需要非常高的软件质量。与此同时,由于公司总是在寻找降低成本的方法,因此同时提供可靠性和保证高水平的产品质量并不容易。不断变化的需求和新硬件功能方面的快速创新,加上对频繁软件更新的需求,需要一种简单的机制来快速更改软件并启用重用。应用智能软件解决方案是解决上述问题的一种方式。模型驱动体系结构(MDA)等正式方法已经被提出,但由于在实践中存在各种问题,往往缺乏可实现性。建议的解决方案解决了这些问题,并通过指出已经在实际项目中应用的方法和工具链来关注如何充分利用MDA,从而为低成本的移动电话软件实现高质量的代码生成。
{"title":"Applied MDA for Embedded Devices: Software Design and Code Generation for a Low-Cost Mobile Phone","authors":"M. Lettner, Michael Tschernuth","doi":"10.1109/COMPSACW.2010.21","DOIUrl":"https://doi.org/10.1109/COMPSACW.2010.21","url":null,"abstract":"When it comes to embedded devices, producing highly dependable, fail-safe and efficient software solutions is indispensable. Such devices usually ship in large numbers, should run 24/7, have real-time constraints and work autonomously most of the time, which is why a very high software quality is required. At the same time, as companies are always looking for ways to cut costs, it is not easy to provide reliability and guarantee a high level of product quality all at the same time. Changing requirements and the fast pace of innovation in terms of ever new hardware capabilities, combined with the need for frequent software updates, demand an easy mechanism to change software quickly and enable reuse. Applying smart software solutions is a way of addressing above issues. Formal approaches such as model driven architecture (MDA) have been proposed, but often lack realizability due to various problems in practice. The proposed solution addresses these issues and focuses on what it takes to fully take advantage of MDA by pointing out methodologies and tool chains that have been applied in a real world project to enable high quality code generation for software of a low-cost mobile phone.","PeriodicalId":121135,"journal":{"name":"2010 IEEE 34th Annual Computer Software and Applications Conference Workshops","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121683020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1