首页 > 最新文献

The 18th IEEE International Symposium on Software Reliability (ISSRE '07)最新文献

英文 中文
Correlations between Internal Software Metrics and Software Dependability in a Large Population of Small C/C++ Programs 在大量小型C/ c++程序中,内部软件度量与软件可靠性之间的关系
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.12
M. V. D. Meulen, M. Revilla
Software metrics are often supposed to give valuable information for the development of software. In this paper we focus on several common internal metrics: Lines of Code, number of comments, Halstead Volume and McCabe's Cyclomatic Complexity. We try to find relations between these internal software metrics and metrics of software dependability: Probability of Failure on Demand and number of defects. The research is done using 59 specifications from a programming competition---The Online Judge--on the internet. Each specification provides us between 111 and 11,495programs for our analysis; the total number of programs used is 71,917. We excluded those programs that consist of a look-up table. The results for the Online Judge programs are: (1) there is a very strong correlation between Lines of Code and Hal- stead Volume; (2) there is an even stronger correlation between Lines of Code and McCabe's Cyclomatic Complexity; (3) none of the internal software metrics makes it possible to discern correct programs from incorrect ones; (4) given a specification, there is no correlation between any of the internal software metrics and the software dependability metrics.
软件度量通常被认为为软件开发提供有价值的信息。在本文中,我们关注几个常见的内部度量:代码行数、注释数、Halstead Volume和McCabe的圈复杂度。我们试图找到这些内部软件度量和软件可靠性度量之间的关系:按需失败的概率和缺陷的数量。这项研究使用了互联网上编程竞赛“在线裁判”(The Online Judge)的59项规范。每个规范为我们提供了111到11,495个程序供我们分析;使用的程序总数为71,917个。我们排除了那些包含查找表的程序。在线评判程序的结果是:(1)代码行数与Hal- stead Volume之间存在很强的相关性;(2)代码行数与McCabe的圈复杂度之间存在更强的相关性;(3)没有一个内部软件指标能够区分正确的程序和不正确的程序;(4)给定一个规范,在任何内部软件度量和软件可靠性度量之间没有相关性。
{"title":"Correlations between Internal Software Metrics and Software Dependability in a Large Population of Small C/C++ Programs","authors":"M. V. D. Meulen, M. Revilla","doi":"10.1109/ISSRE.2007.12","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.12","url":null,"abstract":"Software metrics are often supposed to give valuable information for the development of software. In this paper we focus on several common internal metrics: Lines of Code, number of comments, Halstead Volume and McCabe's Cyclomatic Complexity. We try to find relations between these internal software metrics and metrics of software dependability: Probability of Failure on Demand and number of defects. The research is done using 59 specifications from a programming competition---The Online Judge--on the internet. Each specification provides us between 111 and 11,495programs for our analysis; the total number of programs used is 71,917. We excluded those programs that consist of a look-up table. The results for the Online Judge programs are: (1) there is a very strong correlation between Lines of Code and Hal- stead Volume; (2) there is an even stronger correlation between Lines of Code and McCabe's Cyclomatic Complexity; (3) none of the internal software metrics makes it possible to discern correct programs from incorrect ones; (4) given a specification, there is no correlation between any of the internal software metrics and the software dependability metrics.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116434536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Using Machine Learning to Support Debugging with Tarantula 使用机器学习来支持狼蛛的调试
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.31
L. Briand, Y. Labiche, Xuetao Liu
Using a specific machine learning technique, this paper proposes a way to identify suspicious statements during debugging. The technique is based on principles similar to Tarantula but addresses its main flaw: its difficulty to deal with the presence of multiple faults as it assumes that failing test cases execute the same fault(s). The improvement we present in this paper results from the use of C4.5 decision trees to identify various failure conditions based on information regarding the test cases' inputs and outputs. Failing test cases executing under similar conditions are then assumed to fail due to the same fault(s). Statements are then considered suspicious if they are covered by a large proportion of failing test cases that execute under similar conditions. We report on a case study that demonstrates improvement over the original Tarantula technique in terms of statement ranking. Another contribution of this paper is to show that failure conditions as modeled by a C4.5 decision tree accurately predict failures and can therefore be used as well to help debugging.
本文利用一种特定的机器学习技术,提出了一种在调试过程中识别可疑语句的方法。该技术基于类似于Tarantula的原则,但解决了它的主要缺陷:它难以处理多个错误的存在,因为它假设失败的测试用例执行相同的错误。我们在本文中提出的改进源于使用C4.5决策树来根据有关测试用例的输入和输出的信息识别各种故障条件。失败的测试用例在类似的条件下执行,然后假定由于相同的错误而失败。如果语句被大量在相似条件下执行的失败测试用例所覆盖,那么语句就被认为是可疑的。我们报告了一个案例研究,证明了原始的狼蛛技术在语句排名方面的改进。本文的另一个贡献是展示了由C4.5决策树建模的故障条件可以准确地预测故障,因此也可以用于帮助调试。
{"title":"Using Machine Learning to Support Debugging with Tarantula","authors":"L. Briand, Y. Labiche, Xuetao Liu","doi":"10.1109/ISSRE.2007.31","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.31","url":null,"abstract":"Using a specific machine learning technique, this paper proposes a way to identify suspicious statements during debugging. The technique is based on principles similar to Tarantula but addresses its main flaw: its difficulty to deal with the presence of multiple faults as it assumes that failing test cases execute the same fault(s). The improvement we present in this paper results from the use of C4.5 decision trees to identify various failure conditions based on information regarding the test cases' inputs and outputs. Failing test cases executing under similar conditions are then assumed to fail due to the same fault(s). Statements are then considered suspicious if they are covered by a large proportion of failing test cases that execute under similar conditions. We report on a case study that demonstrates improvement over the original Tarantula technique in terms of statement ranking. Another contribution of this paper is to show that failure conditions as modeled by a C4.5 decision tree accurately predict failures and can therefore be used as well to help debugging.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Reliability Modeling of a 1-Out-Of-2 System: Research with Diverse Off-The-Shelf SQL Database Servers 1- of -2系统的可靠性建模:基于多种现成SQL数据库服务器的研究
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.16
P. Bishop, Ilir Gashi, B. Littlewood, David Wright
Fault tolerance via design diversity is often the only viable way of achieving sufficient dependability levels when using off-the-shelf components. We have reported previously on studies with bug reports of four open-source and commercial off-the-shelf database servers and later release of two of them. The results were very promising for designers of fault-tolerant solutions that wish to employ diverse servers: very few bugs caused failures in more than one server and none caused failure in more than two. In this paper we offer details of two approaches we have studied to construct reliability growth models for a 1-out-of-2 fault-tolerant server which utilize the bug reports. The models presented are of practical significance to system designers wishing to employ diversity with off-the-shelf components since often the bug reports are the only direct dependability evidence available to them.
当使用现成组件时,通过设计多样性实现容错通常是实现足够可靠性级别的唯一可行方法。我们之前已经报道过关于四个开源和商用现成数据库服务器的bug报告,以及其中两个后来的发布。对于希望使用多种服务器的容错解决方案的设计者来说,结果是非常有希望的:很少有bug会在多个服务器上导致故障,并且没有任何bug会在两个以上的服务器上导致故障。本文详细介绍了我们所研究的两种利用错误报告构建1 / 2容错服务器可靠性增长模型的方法。所提出的模型对于希望使用现成组件的多样性的系统设计人员具有实际意义,因为通常错误报告是他们可用的唯一直接可靠性证据。
{"title":"Reliability Modeling of a 1-Out-Of-2 System: Research with Diverse Off-The-Shelf SQL Database Servers","authors":"P. Bishop, Ilir Gashi, B. Littlewood, David Wright","doi":"10.1109/ISSRE.2007.16","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.16","url":null,"abstract":"Fault tolerance via design diversity is often the only viable way of achieving sufficient dependability levels when using off-the-shelf components. We have reported previously on studies with bug reports of four open-source and commercial off-the-shelf database servers and later release of two of them. The results were very promising for designers of fault-tolerant solutions that wish to employ diverse servers: very few bugs caused failures in more than one server and none caused failure in more than two. In this paper we offer details of two approaches we have studied to construct reliability growth models for a 1-out-of-2 fault-tolerant server which utilize the bug reports. The models presented are of practical significance to system designers wishing to employ diversity with off-the-shelf components since often the bug reports are the only direct dependability evidence available to them.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Self-Protecting Enterprise Applications 迈向自我保护的企业应用
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.21
Davide Lorenzoli, L. Mariani, M. Pezzè
Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and implementing fault tolerance techniques can reduce failure occurrences, and increase dependability. Most of such mechanisms address major problems that lead to unexpected service termination or crashes, but do not deal with many subtle domain dependent failures that do not necessarily cause service termination or crashes, but result in incorrect results. In this paper, we propose a technique for developing selfprotecting systems. The technique proposed in this paper observes values at relevant program points. When the technique detects a software failure, it uses the collected information to identify the execution contexts that lead to the failure, and automatically enables mechanisms for preventing future occurrences of failures of the same type. Thus, failures do not occur again after the first detection of a failure of the same type.
企业系统必须保证高可用性和可靠性,以提供无中断和故障的24/7服务。处理异常情况和实现容错技术的机制可以减少故障的发生,并提高可靠性。大多数这样的机制解决导致意外服务终止或崩溃的主要问题,但不处理许多微妙的域相关故障,这些故障不一定会导致服务终止或崩溃,但会导致错误的结果。本文提出了一种开发自保护系统的技术。本文提出的方法在相关程序点上观测值。当该技术检测到软件故障时,它使用收集到的信息来识别导致故障的执行上下文,并自动启用机制来防止将来发生相同类型的故障。因此,在第一次检测到相同类型的故障后,故障不会再次发生。
{"title":"Towards Self-Protecting Enterprise Applications","authors":"Davide Lorenzoli, L. Mariani, M. Pezzè","doi":"10.1109/ISSRE.2007.21","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.21","url":null,"abstract":"Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and implementing fault tolerance techniques can reduce failure occurrences, and increase dependability. Most of such mechanisms address major problems that lead to unexpected service termination or crashes, but do not deal with many subtle domain dependent failures that do not necessarily cause service termination or crashes, but result in incorrect results. In this paper, we propose a technique for developing selfprotecting systems. The technique proposed in this paper observes values at relevant program points. When the technique detects a software failure, it uses the collected information to identify the execution contexts that lead to the failure, and automatically enables mechanisms for preventing future occurrences of failures of the same type. Thus, failures do not occur again after the first detection of a failure of the same type.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Corroborating User Assessments of Software Behavior to Facilitate Operational Testing 确认用户对软件行为的评估,以促进操作测试
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.30
Vinay Augustine, Andy Podgurski
Operational or "beta" testing of software has a number of benefits for software vendors and has become common industry practice. However, ordinary users are more likely to overlook or misreport software problems than experienced software testers are. To compensate for this shortcoming, we present a technique called corroboration-based filtering for corroborating user assessments of individual operational executions for which audit information has been captured for possible offline review. Independent assessments concerning similar executions are pooled by automatically clustering together executions with similar execution profiles. Executions are chosen for review based on their user assessments, the size of the cluster each execution belongs to, and whether the cluster has already been confirmed by developers to contain an actual failure. We explain the rationale for this technique, analyze it probabilistically, and present the results of empirically comparing it to alternative techniques.
软件的操作测试或“beta”测试对软件供应商有许多好处,并且已经成为常见的行业实践。然而,普通用户比有经验的软件测试人员更容易忽略或错误报告软件问题。为了弥补这一缺点,我们提出了一种称为基于确证的过滤的技术,用于确证用户对个别操作执行的评估,这些操作执行的审计信息已被捕获,以供可能的离线审查。通过将具有类似执行配置文件的执行自动聚类在一起,将有关类似执行的独立评估汇集在一起。根据用户评估、每次执行所属集群的大小以及开发人员是否已经确认集群包含实际故障来选择执行以进行审查。我们解释了该技术的基本原理,对其进行了概率分析,并提出了将其与其他技术进行经验比较的结果。
{"title":"Corroborating User Assessments of Software Behavior to Facilitate Operational Testing","authors":"Vinay Augustine, Andy Podgurski","doi":"10.1109/ISSRE.2007.30","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.30","url":null,"abstract":"Operational or \"beta\" testing of software has a number of benefits for software vendors and has become common industry practice. However, ordinary users are more likely to overlook or misreport software problems than experienced software testers are. To compensate for this shortcoming, we present a technique called corroboration-based filtering for corroborating user assessments of individual operational executions for which audit information has been captured for possible offline review. Independent assessments concerning similar executions are pooled by automatically clustering together executions with similar execution profiles. Executions are chosen for review based on their user assessments, the size of the cluster each execution belongs to, and whether the cluster has already been confirmed by developers to contain an actual failure. We explain the rationale for this technique, analyze it probabilistically, and present the results of empirically comparing it to alternative techniques.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125594972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software 电信Java软件中构建错误倾向模型的数据挖掘技术
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.22
E. Arisholm, L. Briand, M. Fuglerud
This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high fault probability. The system under consideration is constantly evolving as several releases a year are shipped to customers. Developers usually have limited resources for their testing and inspections and would like to be able to devote extra resources to faulty system parts. The main research focus of this paper is two-fold: (1) use and compare many data mining and machine learning techniques to build fault-proneness models based mostly on source code measures and change/fault history data, and (2) demonstrate that the usual classification evaluation criteria based on confusion matrices may not be fully appropriate to compare and evaluate models.
本文描述了在工业环境中执行的一项研究,该研究试图构建预测模型,以识别具有高故障概率的Java系统部分。考虑中的系统在不断发展,因为每年向客户发布几个版本。开发人员通常只有有限的资源用于测试和检查,并且希望能够将额外的资源用于有缺陷的系统部件。本文的主要研究重点有两个方面:(1)利用和比较多种数据挖掘和机器学习技术来构建主要基于源代码度量和变更/故障历史数据的故障倾向模型;(2)证明通常基于混淆矩阵的分类评估标准可能并不完全适合于比较和评估模型。
{"title":"Data Mining Techniques for Building Fault-proneness Models in Telecom Java Software","authors":"E. Arisholm, L. Briand, M. Fuglerud","doi":"10.1109/ISSRE.2007.22","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.22","url":null,"abstract":"This paper describes a study performed in an industrial setting that attempts to build predictive models to identify parts of a Java system with a high fault probability. The system under consideration is constantly evolving as several releases a year are shipped to customers. Developers usually have limited resources for their testing and inspections and would like to be able to devote extra resources to faulty system parts. The main research focus of this paper is two-fold: (1) use and compare many data mining and machine learning techniques to build fault-proneness models based mostly on source code measures and change/fault history data, and (2) demonstrate that the usual classification evaluation criteria based on confusion matrices may not be fully appropriate to compare and evaluate models.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"2019 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
Sensitivity of Website Reliability to Usage Profile Changes 网站可靠性对用户配置文件变化的敏感性
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.9
Kim Weyns, Martin Höst
To measure the reliability of a website from a user's point of view, the uncertainly on the usage of the website has to be taken into account. In this paper we investigate the influence of this uncertainly on the reliability estimate for a web server. For this purpose a session based Markov model is used to model the usage extracted from the server's logfiles. From these logfiles a complete user profile can be extracted together with an estimate of the uncertainty on this user profile. This paper investigates the applicability of this kind of Markov model on web server reliability and discusses the difficulties with data extraction from the logfiles. Advantages and disadvantages of this approach are discussed and the approach is applied to data from a university department's web server to demonstrate its applicability.
要从用户的角度衡量网站的可靠性,就必须考虑到网站使用的不确定性。本文研究了这种不确定性对web服务器可靠性估计的影响。为此,使用基于会话的马尔可夫模型对从服务器日志文件中提取的使用情况进行建模。从这些日志文件中可以提取出完整的用户配置文件,并对该用户配置文件的不确定性进行估计。本文研究了这种马尔可夫模型在web服务器可靠性方面的适用性,并讨论了从日志文件中提取数据的难点。讨论了该方法的优点和缺点,并将该方法应用于某大学院系的web服务器数据,以证明其适用性。
{"title":"Sensitivity of Website Reliability to Usage Profile Changes","authors":"Kim Weyns, Martin Höst","doi":"10.1109/ISSRE.2007.9","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.9","url":null,"abstract":"To measure the reliability of a website from a user's point of view, the uncertainly on the usage of the website has to be taken into account. In this paper we investigate the influence of this uncertainly on the reliability estimate for a web server. For this purpose a session based Markov model is used to model the usage extracted from the server's logfiles. From these logfiles a complete user profile can be extracted together with an estimate of the uncertainty on this user profile. This paper investigates the applicability of this kind of Markov model on web server reliability and discusses the difficulties with data extraction from the logfiles. Advantages and disadvantages of this approach are discussed and the approach is applied to data from a university department's web server to demonstrate its applicability.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129820499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Statistical Inference of Computer Virus Propagation Using Non-Homogeneous Poisson Processes 利用非齐次泊松过程进行计算机病毒传播的统计推断
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.28
H. Okamura, K. Tateishi, T. Dohi
This paper presents statistical inference of computer virus propagation using non-homogeneous Poisson processes (NHPPs). Under some mathematical assumptions, the number of infected hosts can be modeled by an NHPP In particular, this paper applies a framework of mixed-type NHPPs to the statistical inference of periodic virus propagation. The mixed-type NHPP is defined by a superposition of NHPPs. In numerical experiments, we examine a goodness-of-fit criterion of NHPPs on fitting to real virus infection data, and discuss the effectiveness of the model-based prediction approach for computer virus propagation.
本文利用非齐次泊松过程(NHPPs)对计算机病毒传播进行了统计推断。在一定的数学假设下,被感染主机的数量可以用NHPP来建模,特别是本文将混合型NHPP框架应用于病毒周期性传播的统计推断。混合型NHPP是由多个NHPP叠加而成的。在数值实验中,我们检验了NHPPs拟合真实病毒感染数据的拟合优度准则,并讨论了基于模型的计算机病毒传播预测方法的有效性。
{"title":"Statistical Inference of Computer Virus Propagation Using Non-Homogeneous Poisson Processes","authors":"H. Okamura, K. Tateishi, T. Dohi","doi":"10.1109/ISSRE.2007.28","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.28","url":null,"abstract":"This paper presents statistical inference of computer virus propagation using non-homogeneous Poisson processes (NHPPs). Under some mathematical assumptions, the number of infected hosts can be modeled by an NHPP In particular, this paper applies a framework of mixed-type NHPPs to the statistical inference of periodic virus propagation. The mixed-type NHPP is defined by a superposition of NHPPs. In numerical experiments, we examine a goodness-of-fit criterion of NHPPs on fitting to real virus infection data, and discuss the effectiveness of the model-based prediction approach for computer virus propagation.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"150 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125885401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intra-Class Testing of Abstract Class Features 抽象类特征的类内测试
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.11
Peter J. Clarke, Djuradj Babich, Tariq M. King, James F. Power
One of the characteristics of the increasingly widespread use of object-oriented libraries and the resulting intensive use of inheritance is the proliferation of dependencies on abstract classes. Such classes defer the implementation of some features, and are typically used as a specification or design tool. However, since their features are not fully implemented, abstract classes cannot be instantiated, and thus pose challenges for execution-based testing strategies. This paper presents a structured approach that supports the testing of features in abstract classes. Core to the approach is a series of static analysis steps that build a comprehensive view of the inter-class dependencies in the system under test. We then leveraged this information to define a test order for the methods in an abstract class that minimizes the number of stubs required during testing, and clearly identifies the required functionality of these stubs. Our approach is based on a comprehensive taxonomy of object-oriented classes that provides a framework for our analysis. First we describe the algorithms to calculate the inter-class dependencies and the test-order that minimizes stub creation. Then we give an overview of our tool, AbstractTestJ that implements our approach by generating a test order for the methods in an abstract Java class. Finally, we harness this tool to provide an analysis of 12 substantial Java applications that demonstrates both the feasibility of our approach and the importance of this technique.
面向对象库的日益广泛使用以及由此产生的对继承的大量使用的特征之一是对抽象类的依赖的扩散。这样的类推迟了某些特性的实现,通常用作规范或设计工具。然而,由于它们的特性没有完全实现,抽象类不能被实例化,因此对基于执行的测试策略提出了挑战。本文提出了一种支持在抽象类中测试特征的结构化方法。该方法的核心是一系列静态分析步骤,这些步骤构建了被测系统中类间依赖关系的全面视图。然后,我们利用这些信息为抽象类中的方法定义一个测试顺序,以最小化测试期间所需的存根数量,并清楚地标识这些存根所需的功能。我们的方法基于面向对象类的全面分类,它为我们的分析提供了一个框架。首先,我们描述了计算类间依赖关系的算法和最小化存根创建的测试顺序。然后我们概述一下我们的工具AbstractTestJ,它通过为抽象Java类中的方法生成测试顺序来实现我们的方法。最后,我们利用这个工具对12个重要的Java应用程序进行了分析,这些应用程序演示了我们的方法的可行性和这项技术的重要性。
{"title":"Intra-Class Testing of Abstract Class Features","authors":"Peter J. Clarke, Djuradj Babich, Tariq M. King, James F. Power","doi":"10.1109/ISSRE.2007.11","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.11","url":null,"abstract":"One of the characteristics of the increasingly widespread use of object-oriented libraries and the resulting intensive use of inheritance is the proliferation of dependencies on abstract classes. Such classes defer the implementation of some features, and are typically used as a specification or design tool. However, since their features are not fully implemented, abstract classes cannot be instantiated, and thus pose challenges for execution-based testing strategies. This paper presents a structured approach that supports the testing of features in abstract classes. Core to the approach is a series of static analysis steps that build a comprehensive view of the inter-class dependencies in the system under test. We then leveraged this information to define a test order for the methods in an abstract class that minimizes the number of stubs required during testing, and clearly identifies the required functionality of these stubs. Our approach is based on a comprehensive taxonomy of object-oriented classes that provides a framework for our analysis. First we describe the algorithms to calculate the inter-class dependencies and the test-order that minimizes stub creation. Then we give an overview of our tool, AbstractTestJ that implements our approach by generating a test order for the methods in an abstract Java class. Finally, we harness this tool to provide an analysis of 12 substantial Java applications that demonstrates both the feasibility of our approach and the importance of this technique.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"2512 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131333114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Integrated Software Vulnerability and Security Functionality Assessment 集成软件漏洞和安全功能评估
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.20
Xiangrong Wang, Hang Shi, Tze-Yau William Huang, F. C. Lin
Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for some software vulnerability assessment and security function verification. Based on this approach, a scalable and adaptable automatic test system was implemented to test over a hundred production software releases over the past year. This paper describes the methodology, the framework, and the results.
产品安全是网络设备供应商面临的一个持续挑战。本文提出了一种系统的软件漏洞评估和安全功能验证方法。基于这种方法,在过去的一年中,实现了一个可伸缩和可适应的自动测试系统,以测试一百多个生产软件版本。本文描述了方法、框架和结果。
{"title":"Integrated Software Vulnerability and Security Functionality Assessment","authors":"Xiangrong Wang, Hang Shi, Tze-Yau William Huang, F. C. Lin","doi":"10.1109/ISSRE.2007.20","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.20","url":null,"abstract":"Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for some software vulnerability assessment and security function verification. Based on this approach, a scalable and adaptable automatic test system was implemented to test over a hundred production software releases over the past year. This paper describes the methodology, the framework, and the results.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116169617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
The 18th IEEE International Symposium on Software Reliability (ISSRE '07)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1