{"title":"Performance Prediction of WS-CDL Based Service Composition","authors":"Yunni Xia, Hongchao Xue, Xiuwu Wang","doi":"10.1109/QSIC.2010.12","DOIUrl":"https://doi.org/10.1109/QSIC.2010.12","url":null,"abstract":"In this paper, we propose a translation-based approach for performance prediction of composite service built on WS-CDL. To translate a composite service into a state-transition model for quantitative analysis, we first give a set of translation rules to map WS-CDL elements into general-stochastic-petri-nets (GSPN). Based on the GSPN representation, we introduce the prediction algorithm to calculate the expected-process-normal-completion-time of WS-CDL processes. We also validate the accuracy of the approach in the experimental study by showing 95% confidence intervals obtained from experimental performance results cover corresponding theoretical prediction values.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"14 13-14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specification-Based Testing of Intrusion Detection Engines Using Logical Expression Testing Criteria","authors":"Frédéric Massicotte, Y. Labiche","doi":"10.1109/QSIC.2010.25","DOIUrl":"https://doi.org/10.1109/QSIC.2010.25","url":null,"abstract":"An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious behaviour as specified in attack descriptions (referred to as signatures). Many studies report that IDSs have problems accurately identifying attacks. Therefore, it is important to precisely understand under which conditions IDSs accurately identify attacks or fail to do so. However, no systematic approach has so far been defined and used to study this problem. Recognizing that signatures in essence provide the specification of an IDS engine, studying the accuracy of an IDS engine becomes a black-box testing problem. We therefore precisely and systematically evaluate which mature testing techniques can be used (and adapted) to derive tests from IDS signatures. We experiment with those criteria on one widely used and maintained IDS and show that our approach is effective at systematically revealing problems in this IDS engine (e.g., problems that prevent the detection of attacks).","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Develop Web Services for Reliable Cross-Platform Web Applications","authors":"Jiang B. Liu, N. Praveen, Kumar Macherla","doi":"10.1109/QSIC.2010.41","DOIUrl":"https://doi.org/10.1109/QSIC.2010.41","url":null,"abstract":"We have developed reliable web applications based on the web services technology on J2EE and .NET. Web applications implemented using web services are platform and language independent. The web services are available from several servers on different platforms so that the users can have a truly dynamic web services environment with autonomous services with underline server and user credential context automatic transfer for load balancing, security, and robust performance. Our implementation indicated that this cross-platform enterprise application using web services are reliable and secure.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Conformance Verification of Hybrid Systems","authors":"H. Brandl, Martin Weiglhofer, B. Aichernig","doi":"10.1109/QSIC.2010.53","DOIUrl":"https://doi.org/10.1109/QSIC.2010.53","url":null,"abstract":"Due to the combination of discrete events and continuous behavior the validation of hybrid systems is a challenging task. Nevertheless, as for other systems the correctness of such hybrid systems is a major concern. In this paper we present a new approach for verifying the input-output conformance of two hybrid systems. This approach can be used to generate mutation-based test cases. We specify a hybrid system within the framework of Qualitative Action Systems. Here, besides conventional discrete actions, the continuous dynamics of hybrid systems is described with so called qualitative actions. This paper then shows how labeled transition systems can be used to describe the trace semantics of Qualitative Action Systems. The labeled transition systems are used to verify the conformance between two Qualitative Action Systems. Finally, we present first experimental results on a water tank system.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and its Implementation","authors":"M. Saeki, Shinpei Hayashi, H. Kaiya","doi":"10.1109/QSIC.2010.19","DOIUrl":"https://doi.org/10.1109/QSIC.2010.19","url":null,"abstract":"This paper presents an integrated supporting tool for Attributed Goal-Oriented Requirements Analysis (AGORA), which is an extended version of goal-oriented analysis. Our tool assists seamlessly requirements analysts and stakeholders in their activities throughout AGORA steps including constructing goal graphs with group work, utilizing domain ontologies for goal graph construction, detecting various types of conflicts among goals, prioritizing goals, analyzing impacts when modifying a goal graph, and version control of goal graphs.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhimin He, Fengdi Shu, Ye Yang, Wen Zhang, Qing Wang
{"title":"Data Unpredictability in Software Defect-Fixing Effort Prediction","authors":"Zhimin He, Fengdi Shu, Ye Yang, Wen Zhang, Qing Wang","doi":"10.1109/QSIC.2010.40","DOIUrl":"https://doi.org/10.1109/QSIC.2010.40","url":null,"abstract":"The prediction of software defect-fixing effort is important for strategic resource allocation and software quality management. Machine learning techniques have become very popular in addressing this problem and many related prediction models have been proposed. However, almost every model today faces a challenging issue of demonstrating satisfactory prediction accuracy and meaningful prediction results. In this paper, we investigate what makes high-precision prediction of defect-fixing effort so hard from the perspective of the characteristics of defect dataset. We develop a method using a metric to quantitatively analyze the unpredictability of a defect dataset and carry out case studies on two defect datasets. The results show that data unpredictability is a key factor for unsatisfactory prediction accuracy and our approach can explain why high-precision prediction for some defect datasets is hard to achieve inherently. We also provide some suggestions on how to collect highly predictable defect data.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121368202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Modeling and Verification of Low-Level Software Programs","authors":"B. Bartels, S. Glesner","doi":"10.1109/QSIC.2010.67","DOIUrl":"https://doi.org/10.1109/QSIC.2010.67","url":null,"abstract":"Process-algebraic formalisms offer convenient mechanisms for specifying and analyzing concurrent system behavior on an abstract level, but the high level of abstraction comes at the cost of introducing a semantic gap between the actual implementation and its specification. To bridge this gap, we semi-automatically synthesize a process-specific system model from its implementation-level description. In this paper, we show how the correctness of the synthesis procedure can be shown for a given instance by establishing a bisimulation relation between the process-specific model and its low-level system model. This enables us to reason about a system on an abstract level that faithfully captures the semantics of the low-level implementation.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Localization Based on Dynamic Slicing and Hitting-Set Computation","authors":"F. Wotawa","doi":"10.1109/QSIC.2010.51","DOIUrl":"https://doi.org/10.1109/QSIC.2010.51","url":null,"abstract":"Slicing is an effective method for focusing on relevant parts of a program in case of a detected misbehavior. Its application to fault localization alone and in combination with other methods has been reported. In this paper we combine dynamic slicing with model-based diagnosis, a method for fault localization, which originates from Artificial Intelligence. In particular, we show how diagnosis, i.e., root causes, can be extracted from the slices for erroneous variables detected when executing a program on a test suite. We use these diagnoses for computing fault probabilities of statements that give additional information to the user. Moreover, we present an empirical study based on our implementation JSDiagnosis and a set of Java programs of various size from 40 to more than 1,000 lines of code.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Service Security Analysis Model Based on Program Slicing","authors":"Xiaohong Li, Yan Cao, Zhiyong Feng, Ran Liu","doi":"10.1109/QSIC.2010.66","DOIUrl":"https://doi.org/10.1109/QSIC.2010.66","url":null,"abstract":"A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface information flow; critical information is checked to see whether it is disclosed through the interface information flow. Vulnerability proliferation of a service net is found through analyzing process of interface calling between two web services in which the critical information is transmitted and disclosed. A security report describing test results of a test scene is provided to verify the of security analysis process.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127189142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Slicing Concurrent Programs Based on Program Reachability Graphs","authors":"Xiaofang Qi, Xiaoyu Zhou, Xiaojing Xu, Yingzhou Zhang","doi":"10.1109/QSIC.2010.37","DOIUrl":"https://doi.org/10.1109/QSIC.2010.37","url":null,"abstract":"Program slicing is an effective and established technique to analyze sequential programs. However, owing to intransitive dependences between statements, it is hard to get precise slices of concurrent programs with traditional slicing algorithms for sequential programs. This paper proposes a novel representation, thread interaction reachability graph (TIRG), for concurrent programs with shared memory, interleaving semantics and mutual exclusion. Based on TIRG, dependences can be analyzed globally and we construct a new dependence graph (MSDG), where each node is a 2-tuple composed of program state and statement. The research shows that dependences in MSDG are transitive and more precise slice can be obtained by traversing MSDG compared with previous approaches.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}