首页 > 最新文献

Third International Conference on Quality Software, 2003. Proceedings.最新文献

英文 中文
Scenario-based object-oriented testing framework 基于场景的面向对象测试框架
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319129
W. Tsai, A. Saimi, Lian Yu, R. Paul
This paper presents a scenario-based object-oriented test framework (SOOTF) for adaptive and rapid testing. The framework takes test scenario specification as input, prepares data for test execution, performs test execution, and evaluates test results with a database support. The framework also has several built-in regression testing strategies that can be used to test the modified software. The framework is implemented in Java using many OO design patterns such as template method, strategy, and composite. The framework is implemented using a 3-tiered architecture with GUI front end, and test management in the middle, and a database at the backend. Whenever there is a change to the system/application under test, SOOTF identifies all the potentially affected scenarios, and perform regression testing using existing test cases stored in the database. A tester may also reuse the existing test scripts to perform stress testing. This paper uses a banking system example to illustrate the framework.
本文提出了一种基于场景的面向对象测试框架(SOOTF),用于自适应和快速测试。框架将测试场景规范作为输入,为测试执行准备数据,执行测试执行,并使用数据库支持评估测试结果。该框架还具有几个内置的回归测试策略,可用于测试修改后的软件。该框架在Java中使用许多OO设计模式(如模板方法、策略和组合)实现。该框架采用三层架构实现,前端为GUI,中间为测试管理,后端为数据库。每当测试中的系统/应用程序发生更改时,SOOTF识别所有可能受影响的场景,并使用存储在数据库中的现有测试用例执行回归测试。测试人员也可以重用现有的测试脚本来执行压力测试。本文以一个银行系统为例对该框架进行了说明。
{"title":"Scenario-based object-oriented testing framework","authors":"W. Tsai, A. Saimi, Lian Yu, R. Paul","doi":"10.1109/QSIC.2003.1319129","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319129","url":null,"abstract":"This paper presents a scenario-based object-oriented test framework (SOOTF) for adaptive and rapid testing. The framework takes test scenario specification as input, prepares data for test execution, performs test execution, and evaluates test results with a database support. The framework also has several built-in regression testing strategies that can be used to test the modified software. The framework is implemented in Java using many OO design patterns such as template method, strategy, and composite. The framework is implemented using a 3-tiered architecture with GUI front end, and test management in the middle, and a database at the backend. Whenever there is a change to the system/application under test, SOOTF identifies all the potentially affected scenarios, and perform regression testing using existing test cases stored in the database. A tester may also reuse the existing test scripts to perform stress testing. This paper uses a banking system example to illustrate the framework.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121823754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Verifying Haskell programs by combining testing and proving 通过结合测试和证明来验证Haskell程序
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319111
P. Dybjer, Qiao Haiyan, M. Takeyama
We propose a method for improving confidence in the correctness of Haskell programs by combining testing and proving. Testing is used for debugging programs and specification before a costly proof attempt. During a proof development, testing also quickly eliminates wrong conjectures. Proving helps us to decompose a testing task in a way that is guaranteed to be correct. To demonstrate the method, we have extended the Agda/Alfa proof assistant for dependent type theory with a tool for random testing. As an example, we show how the correctness of a BDD-algorithm written in Haskell is verified by testing properties of component functions. We also discuss faithful translations from Haskell to type theory.
我们提出了一种将测试和证明相结合的方法来提高对Haskell程序正确性的信心。测试用于在昂贵的验证尝试之前调试程序和规范。在证明开发过程中,测试还可以快速消除错误的猜测。证明可以帮助我们以一种保证正确的方式分解测试任务。为了演示该方法,我们将Agda/Alfa证明助手扩展为随机测试工具。作为一个例子,我们展示了如何通过测试组件函数的属性来验证用Haskell编写的bdd算法的正确性。我们还讨论了从Haskell到类型理论的忠实翻译。
{"title":"Verifying Haskell programs by combining testing and proving","authors":"P. Dybjer, Qiao Haiyan, M. Takeyama","doi":"10.1109/QSIC.2003.1319111","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319111","url":null,"abstract":"We propose a method for improving confidence in the correctness of Haskell programs by combining testing and proving. Testing is used for debugging programs and specification before a costly proof attempt. During a proof development, testing also quickly eliminates wrong conjectures. Proving helps us to decompose a testing task in a way that is guaranteed to be correct. To demonstrate the method, we have extended the Agda/Alfa proof assistant for dependent type theory with a tool for random testing. As an example, we show how the correctness of a BDD-algorithm written in Haskell is verified by testing properties of component functions. We also discuss faithful translations from Haskell to type theory.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Diversifying and improving business process management systems by service cooperation middleware 通过服务协作中间件实现业务流程管理系统的多样化和改进
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319127
Shaohua Liu, Jun Wei, Wei Xu
Emerging service oriented business process management (BPM) systems require efficient middleware infrastructure. However, current techniques for middleware are not optimal for that because they all do not have service-oriented natures themselves. This paper introduces a novel service cooperation middleware (SCM), which is designed to meet such requirements. It improves the development and integration of loosely coupled service oriented BPM system by applying several concepts such as control flow semantic and projection operation, etc. Furthermore, based on the SCM architecture, the related process integration suit viz. ISProcessIntegration (PI) can be widely applied into all kinds of scenes, for example EAI, B2B, B2C, P2P, cluster, with different topologies.
新兴的面向服务的业务流程管理(BPM)系统需要高效的中间件基础设施。然而,当前的中间件技术并不是最优的,因为它们本身都不具有面向服务的性质。本文介绍了一种新的服务协作中间件(SCM),该中间件就是为满足这种需求而设计的。通过应用控制流语义、投影操作等概念,改进了面向服务的松耦合BPM系统的开发与集成。此外,基于SCM体系结构,相关的流程集成套件ISProcessIntegration (PI)可以广泛应用于各种场景,例如EAI、B2B、B2C、P2P、集群等不同拓扑。
{"title":"Diversifying and improving business process management systems by service cooperation middleware","authors":"Shaohua Liu, Jun Wei, Wei Xu","doi":"10.1109/QSIC.2003.1319127","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319127","url":null,"abstract":"Emerging service oriented business process management (BPM) systems require efficient middleware infrastructure. However, current techniques for middleware are not optimal for that because they all do not have service-oriented natures themselves. This paper introduces a novel service cooperation middleware (SCM), which is designed to meet such requirements. It improves the development and integration of loosely coupled service oriented BPM system by applying several concepts such as control flow semantic and projection operation, etc. Furthermore, based on the SCM architecture, the related process integration suit viz. ISProcessIntegration (PI) can be widely applied into all kinds of scenes, for example EAI, B2B, B2C, P2P, cluster, with different topologies.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PRISMA: towards quality, aspect oriented and dynamic software architectures PRISMA:面向质量、面向方面和动态的软件架构
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319086
Jennifer Pérez, I. Ramos, J. Martínez, P. Letelier, Elena Navarro
The development of software systems must be done using platforms that allow the description of quality, complex, distributed, dynamic and reusable architectural models. We present in this paper PRISMA, an architectural modelling approach based on aspects and components that uses a component definition language (components, connectors and systems) to define architectural types at a high abstraction level and a configuration language to design the architecture of software systems. The component definition language increases reuse allowing importation of COTS and reduces complexity by integrating two modern software development approaches: component-based software development and aspect-oriented software development. The configuration language designs the architecture of software systems by creating and interconnecting instances of the defined types including possible imported COTS. PRISMA has a metalevel with reflexive properties for these two languages. For this reason, the types of PRISMA may evolve and the topologies of PRISMA may be reconfigured dynamically.
软件系统的开发必须使用允许描述质量、复杂、分布式、动态和可重用的体系结构模型的平台。我们在这篇论文中提出了PRISMA,一种基于方面和组件的架构建模方法,它使用组件定义语言(组件、连接器和系统)在高抽象级别定义架构类型,并使用配置语言来设计软件系统的架构。组件定义语言增加了重用,允许引入COTS,并通过集成两种现代软件开发方法(基于组件的软件开发和面向方面的软件开发)来降低复杂性。配置语言通过创建和连接已定义类型的实例(包括可能导入的COTS)来设计软件系统的体系结构。PRISMA为这两种语言提供了一个具有自反属性的元层。由于这个原因,PRISMA的类型可能会发展,PRISMA的拓扑结构可能会动态地重新配置。
{"title":"PRISMA: towards quality, aspect oriented and dynamic software architectures","authors":"Jennifer Pérez, I. Ramos, J. Martínez, P. Letelier, Elena Navarro","doi":"10.1109/QSIC.2003.1319086","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319086","url":null,"abstract":"The development of software systems must be done using platforms that allow the description of quality, complex, distributed, dynamic and reusable architectural models. We present in this paper PRISMA, an architectural modelling approach based on aspects and components that uses a component definition language (components, connectors and systems) to define architectural types at a high abstraction level and a configuration language to design the architecture of software systems. The component definition language increases reuse allowing importation of COTS and reduces complexity by integrating two modern software development approaches: component-based software development and aspect-oriented software development. The configuration language designs the architecture of software systems by creating and interconnecting instances of the defined types including possible imported COTS. PRISMA has a metalevel with reflexive properties for these two languages. For this reason, the types of PRISMA may evolve and the topologies of PRISMA may be reconfigured dynamically.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
A study of Japanese software process practices and a potential for improvement using SOFL 日本软件过程实践的研究和使用SOFL进行改进的潜力
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319091
Sirin Bekbay, Shaoying Liu
The goal of this paper is to examine the Japanese experience with the software development process, the challenges they face and how formal engineering methods, in particular SOFL (structured object-oriented formal language), can help overcome these problems. We also recommend additional management tools and documents that can aid organizations in achieving a higher CMM rating through the use of SOFL.
本文的目标是研究日本在软件开发过程中的经验,他们面临的挑战,以及形式化工程方法,特别是SOFL(结构化面向对象的形式化语言)如何帮助克服这些问题。我们还推荐额外的管理工具和文档,这些工具和文档可以帮助组织通过使用SOFL获得更高的CMM等级。
{"title":"A study of Japanese software process practices and a potential for improvement using SOFL","authors":"Sirin Bekbay, Shaoying Liu","doi":"10.1109/QSIC.2003.1319091","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319091","url":null,"abstract":"The goal of this paper is to examine the Japanese experience with the software development process, the challenges they face and how formal engineering methods, in particular SOFL (structured object-oriented formal language), can help overcome these problems. We also recommend additional management tools and documents that can aid organizations in achieving a higher CMM rating through the use of SOFL.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134549097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Formal methods applied to plywood production 胶合板生产的正式方法
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319114
R. Ibrahim, Marlene Lu
Formal notations and mathematics are used in several areas to capture the requirements and express the functionalities of the software. This paper focuses on the use of formal methods to model the real world environment in a Malaysian plywood production manufacturing industry. The formal methods are used to describe abstractly the plywood production system in the aspect of its behavior but not precisely the way the system is programmed. Other informal description does the same, but with a formal description, we can determine (in theory) whether or not a real system satisfies its description and functionalities. Because of this, precise analysis on the description itself can be performed and it exposes design decisions which otherwise might not be identified until the system prototype is being developed.
形式化符号和数学在几个领域被用来捕捉需求和表达软件的功能。本文着重于使用形式化方法来模拟马来西亚胶合板生产制造行业的真实世界环境。形式化方法用于抽象地描述胶合板生产系统的行为,而不是精确地描述系统的编程方式。其他非正式的描述也做同样的事情,但是有了正式的描述,我们可以(在理论上)确定一个真实的系统是否满足它的描述和功能。正因为如此,可以对描述本身进行精确的分析,并且它暴露了设计决策,否则这些决策可能在开发系统原型之前无法识别。
{"title":"Formal methods applied to plywood production","authors":"R. Ibrahim, Marlene Lu","doi":"10.1109/QSIC.2003.1319114","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319114","url":null,"abstract":"Formal notations and mathematics are used in several areas to capture the requirements and express the functionalities of the software. This paper focuses on the use of formal methods to model the real world environment in a Malaysian plywood production manufacturing industry. The formal methods are used to describe abstractly the plywood production system in the aspect of its behavior but not precisely the way the system is programmed. Other informal description does the same, but with a formal description, we can determine (in theory) whether or not a real system satisfies its description and functionalities. Because of this, precise analysis on the description itself can be performed and it exposes design decisions which otherwise might not be identified until the system prototype is being developed.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131064208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the incremental approach to generate test sets: a case study 使用增量方法生成测试集:一个案例研究
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319110
Yuen-Tak Yu, M. Lau, T. Chen
With the increasing complexity of software systems, the set of testing requirements can become very large. If the set of testing requirements can be naturally decomposed into smaller subsets, one may construct a test set separately to satisfy each subset of testing requirements, and then combine the test sets to form the complete test set. Such an approach is referred to as the union approach. On the other hand, the incremental approach attempts to incrementally expand a test set to satisfy the subsets of testing requirements, one at a time. This paper investigates empirically the effect of the incremental approach as compared to the union approach. Our case study indicates that the incremental approach can result in a significantly smaller test set, particularly when supplemented with the greedy heuristics.
随着软件系统复杂性的增加,测试需求的集合会变得非常大。如果测试需求集可以自然地分解成更小的子集,那么可以单独构建一个测试集来满足每个测试需求子集,然后将测试集组合起来形成完整的测试集。这种方法被称为联合方法。另一方面,增量方法尝试增量地扩展测试集以满足测试需求的子集,一次一个。本文对增量方法与联合方法的效果进行了实证研究。我们的案例研究表明,增量方法可以产生一个明显更小的测试集,特别是在补充了贪婪启发式的情况下。
{"title":"Using the incremental approach to generate test sets: a case study","authors":"Yuen-Tak Yu, M. Lau, T. Chen","doi":"10.1109/QSIC.2003.1319110","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319110","url":null,"abstract":"With the increasing complexity of software systems, the set of testing requirements can become very large. If the set of testing requirements can be naturally decomposed into smaller subsets, one may construct a test set separately to satisfy each subset of testing requirements, and then combine the test sets to form the complete test set. Such an approach is referred to as the union approach. On the other hand, the incremental approach attempts to incrementally expand a test set to satisfy the subsets of testing requirements, one at a time. This paper investigates empirically the effect of the incremental approach as compared to the union approach. Our case study indicates that the incremental approach can result in a significantly smaller test set, particularly when supplemented with the greedy heuristics.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133530858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generating scenarios from use case map specifications 从用例图规范生成场景
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319092
Daniel Amyot, Xiangyang He, Yong He, Dae Yong Cho
The use case map (UCM) notation is being standardized as part of the user requirements notation (URN), the most recent addition to ITU-T's family of languages. UCM models describe functional requirements and high-level designs with causal paths superimposed on a structure of components. The generation of individual scenarios from UCM specifications enables the validation of requirements and facilitates the transition from requirements to design. In this paper, we address the challenges faced during the automated generation of such scenarios. Scenario definitions and traversal algorithms are first used to extract individual scenarios from UCMs and to store them as XML files. Transformations to other scenario languages (for instance, message sequence charts) are then achieved using XSLT. Possible applications of this two-step generation process include early validation and synthesis of design models. Illustrative examples are given based on our current tools and recent experiments.
用例图(UCM)表示法正在作为用户需求表示法(URN)的一部分进行标准化,用户需求表示法是ITU-T语言家族的最新成员。UCM模型用叠加在组件结构上的因果路径描述功能需求和高级设计。从UCM规范中生成的单个场景使需求的验证成为可能,并促进了从需求到设计的过渡。在本文中,我们解决了这些场景自动生成过程中所面临的挑战。场景定义和遍历算法首先用于从ucm中提取单个场景,并将它们存储为XML文件。然后使用XSLT实现到其他场景语言的转换(例如,消息序列图)。这两步生成过程的可能应用包括设计模型的早期验证和综合。基于我们现有的工具和最近的实验给出了说明性的例子。
{"title":"Generating scenarios from use case map specifications","authors":"Daniel Amyot, Xiangyang He, Yong He, Dae Yong Cho","doi":"10.1109/QSIC.2003.1319092","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319092","url":null,"abstract":"The use case map (UCM) notation is being standardized as part of the user requirements notation (URN), the most recent addition to ITU-T's family of languages. UCM models describe functional requirements and high-level designs with causal paths superimposed on a structure of components. The generation of individual scenarios from UCM specifications enables the validation of requirements and facilitates the transition from requirements to design. In this paper, we address the challenges faced during the automated generation of such scenarios. Scenario definitions and traversal algorithms are first used to extract individual scenarios from UCMs and to store them as XML files. Transformations to other scenario languages (for instance, message sequence charts) are then achieved using XSLT. Possible applications of this two-step generation process include early validation and synthesis of design models. Illustrative examples are given based on our current tools and recent experiments.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132200992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Data mining and cyber security 数据挖掘和网络安全
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319078
B. Thuraisingham
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Cyber security is the area that deals with protecting from cyber terrorism. Cyber attacks include access control violations, unauthorized intrusions, and denial of service as well as insider threat. The presentation provides an overview of data mining techniques and cyber threats and discusses developments in applying data mining for cyber security.
数据挖掘是提出查询和提取模式的过程,通常是使用模式匹配或其他推理技术从大量数据中提取以前未知的模式。网络安全是一个涉及防范网络恐怖主义的领域。网络攻击包括访问控制违规、未经授权的入侵、拒绝服务以及内部威胁。该报告概述了数据挖掘技术和网络威胁,并讨论了将数据挖掘应用于网络安全的发展。
{"title":"Data mining and cyber security","authors":"B. Thuraisingham","doi":"10.1109/QSIC.2003.1319078","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319078","url":null,"abstract":"Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Cyber security is the area that deals with protecting from cyber terrorism. Cyber attacks include access control violations, unauthorized intrusions, and denial of service as well as insider threat. The presentation provides an overview of data mining techniques and cyber threats and discusses developments in applying data mining for cyber security.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Debugging with reverse watchpoint 用反向观察点调试
Pub Date : 2003-11-06 DOI: 10.1109/QSIC.2003.1319093
Kazutaka Maruyama, M. Terada
Many programmers have had to deal with an overwritten variable resulting for example from an aliasing problem. The culprit is obviously the last write-access to that memory location before the manifestation of the bug. The usual technique for removing such bugs starts with the debugger by (1) finding the last write and (2) moving the control point of execution back to that time by re-executing the program from the beginning. We call the feature to implement this process "reverse watchpoint" and believe automating it is important. In this paper we propose a new concept, "position ", that is, a point in the program execution trace, as needed for step (2) above. The position enables debuggers to automate the control of program execution to support common debugging activities. We have implemented position in Java with a bytecode transformer. Measurements show that position can be provided with an acceptable amount of overhead.
许多程序员不得不处理由于混叠问题而导致的覆盖变量。罪魁祸首显然是在出现错误之前对该内存位置的最后一次写访问。消除这类错误的常用技术是从调试器开始:(1)找到最后一次写入,(2)通过从头重新执行程序将执行控制点移回那个时间。我们把实现这个过程的功能称为“反向观察点”,并认为自动化它很重要。在本文中,我们提出了一个新的概念,“位置”,即程序执行轨迹中的一个点,这是上述步骤(2)所需要的。该位置使调试器能够自动控制程序执行,以支持常见的调试活动。我们已经用字节码转换器在Java中实现了position。测量表明,该位置可以提供可接受的开销量。
{"title":"Debugging with reverse watchpoint","authors":"Kazutaka Maruyama, M. Terada","doi":"10.1109/QSIC.2003.1319093","DOIUrl":"https://doi.org/10.1109/QSIC.2003.1319093","url":null,"abstract":"Many programmers have had to deal with an overwritten variable resulting for example from an aliasing problem. The culprit is obviously the last write-access to that memory location before the manifestation of the bug. The usual technique for removing such bugs starts with the debugger by (1) finding the last write and (2) moving the control point of execution back to that time by re-executing the program from the beginning. We call the feature to implement this process \"reverse watchpoint\" and believe automating it is important. In this paper we propose a new concept, \"position \", that is, a point in the program execution trace, as needed for step (2) above. The position enables debuggers to automate the control of program execution to support common debugging activities. We have implemented position in Java with a bytecode transformer. Measurements show that position can be provided with an acceptable amount of overhead.","PeriodicalId":145980,"journal":{"name":"Third International Conference on Quality Software, 2003. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2003-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
Third International Conference on Quality Software, 2003. Proceedings.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1