2010 10th International Conference on Quality Software最新文献

筛选
英文 中文
Performance Prediction of WS-CDL Based Service Composition 基于WS-CDL的服务组合性能预测
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.12
Yunni Xia, Hongchao Xue, Xiuwu Wang
{"title":"Performance Prediction of WS-CDL Based Service Composition","authors":"Yunni Xia, Hongchao Xue, Xiuwu Wang","doi":"10.1109/QSIC.2010.12","DOIUrl":"https://doi.org/10.1109/QSIC.2010.12","url":null,"abstract":"In this paper, we propose a translation-based approach for performance prediction of composite service built on WS-CDL. To translate a composite service into a state-transition model for quantitative analysis, we first give a set of translation rules to map WS-CDL elements into general-stochastic-petri-nets (GSPN). Based on the GSPN representation, we introduce the prediction algorithm to calculate the expected-process-normal-completion-time of WS-CDL processes. We also validate the accuracy of the approach in the experimental study by showing 95% confidence intervals obtained from experimental performance results cover corresponding theoretical prediction values.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"14 13-14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114046906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Specification-Based Testing of Intrusion Detection Engines Using Logical Expression Testing Criteria 基于逻辑表达式测试标准的入侵检测引擎规范测试
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.25
Frédéric Massicotte, Y. Labiche
{"title":"Specification-Based Testing of Intrusion Detection Engines Using Logical Expression Testing Criteria","authors":"Frédéric Massicotte, Y. Labiche","doi":"10.1109/QSIC.2010.25","DOIUrl":"https://doi.org/10.1109/QSIC.2010.25","url":null,"abstract":"An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious behaviour as specified in attack descriptions (referred to as signatures). Many studies report that IDSs have problems accurately identifying attacks. Therefore, it is important to precisely understand under which conditions IDSs accurately identify attacks or fail to do so. However, no systematic approach has so far been defined and used to study this problem. Recognizing that signatures in essence provide the specification of an IDS engine, studying the accuracy of an IDS engine becomes a black-box testing problem. We therefore precisely and systematically evaluate which mature testing techniques can be used (and adapted) to derive tests from IDS signatures. We experiment with those criteria on one widely used and maintained IDS and show that our approach is effective at systematically revealing problems in this IDS engine (e.g., problems that prevent the detection of attacks).","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124449393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Develop Web Services for Reliable Cross-Platform Web Applications 为可靠的跨平台Web应用程序开发Web服务
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.41
Jiang B. Liu, N. Praveen, Kumar Macherla
{"title":"Develop Web Services for Reliable Cross-Platform Web Applications","authors":"Jiang B. Liu, N. Praveen, Kumar Macherla","doi":"10.1109/QSIC.2010.41","DOIUrl":"https://doi.org/10.1109/QSIC.2010.41","url":null,"abstract":"We have developed reliable web applications based on the web services technology on J2EE and .NET. Web applications implemented using web services are platform and language independent. The web services are available from several servers on different platforms so that the users can have a truly dynamic web services environment with autonomous services with underline server and user credential context automatic transfer for load balancing, security, and robust performance. Our implementation indicated that this cross-platform enterprise application using web services are reliable and secure.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129794273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Conformance Verification of Hybrid Systems 混合动力系统的自动一致性验证
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.53
H. Brandl, Martin Weiglhofer, B. Aichernig
{"title":"Automated Conformance Verification of Hybrid Systems","authors":"H. Brandl, Martin Weiglhofer, B. Aichernig","doi":"10.1109/QSIC.2010.53","DOIUrl":"https://doi.org/10.1109/QSIC.2010.53","url":null,"abstract":"Due to the combination of discrete events and continuous behavior the validation of hybrid systems is a challenging task. Nevertheless, as for other systems the correctness of such hybrid systems is a major concern. In this paper we present a new approach for verifying the input-output conformance of two hybrid systems. This approach can be used to generate mutation-based test cases. We specify a hybrid system within the framework of Qualitative Action Systems. Here, besides conventional discrete actions, the continuous dynamics of hybrid systems is described with so called qualitative actions. This paper then shows how labeled transition systems can be used to describe the trace semantics of Qualitative Action Systems. The labeled transition systems are used to verify the conformance between two Qualitative Action Systems. Finally, we present first experimental results on a water tank system.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and its Implementation 面向属性目标的需求分析方法的集成支持及其实现
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.19
M. Saeki, Shinpei Hayashi, H. Kaiya
{"title":"An Integrated Support for Attributed Goal-Oriented Requirements Analysis Method and its Implementation","authors":"M. Saeki, Shinpei Hayashi, H. Kaiya","doi":"10.1109/QSIC.2010.19","DOIUrl":"https://doi.org/10.1109/QSIC.2010.19","url":null,"abstract":"This paper presents an integrated supporting tool for Attributed Goal-Oriented Requirements Analysis (AGORA), which is an extended version of goal-oriented analysis. Our tool assists seamlessly requirements analysts and stakeholders in their activities throughout AGORA steps including constructing goal graphs with group work, utilizing domain ontologies for goal graph construction, detecting various types of conflicts among goals, prioritizing goals, analyzing impacts when modifying a goal graph, and version control of goal graphs.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Unpredictability in Software Defect-Fixing Effort Prediction 软件缺陷修复工作预测中的数据不可预测性
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.40
Zhimin He, Fengdi Shu, Ye Yang, Wen Zhang, Qing Wang
{"title":"Data Unpredictability in Software Defect-Fixing Effort Prediction","authors":"Zhimin He, Fengdi Shu, Ye Yang, Wen Zhang, Qing Wang","doi":"10.1109/QSIC.2010.40","DOIUrl":"https://doi.org/10.1109/QSIC.2010.40","url":null,"abstract":"The prediction of software defect-fixing effort is important for strategic resource allocation and software quality management. Machine learning techniques have become very popular in addressing this problem and many related prediction models have been proposed. However, almost every model today faces a challenging issue of demonstrating satisfactory prediction accuracy and meaningful prediction results. In this paper, we investigate what makes high-precision prediction of defect-fixing effort so hard from the perspective of the characteristics of defect dataset. We develop a method using a metric to quantitatively analyze the unpredictability of a defect dataset and carry out case studies on two defect datasets. The results show that data unpredictability is a key factor for unsatisfactory prediction accuracy and our approach can explain why high-precision prediction for some defect datasets is hard to achieve inherently. We also provide some suggestions on how to collect highly predictable defect data.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121368202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formal Modeling and Verification of Low-Level Software Programs 低级软件程序的形式化建模与验证
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.67
B. Bartels, S. Glesner
{"title":"Formal Modeling and Verification of Low-Level Software Programs","authors":"B. Bartels, S. Glesner","doi":"10.1109/QSIC.2010.67","DOIUrl":"https://doi.org/10.1109/QSIC.2010.67","url":null,"abstract":"Process-algebraic formalisms offer convenient mechanisms for specifying and analyzing concurrent system behavior on an abstract level, but the high level of abstraction comes at the cost of introducing a semantic gap between the actual implementation and its specification. To bridge this gap, we semi-automatically synthesize a process-specific system model from its implementation-level description. In this paper, we show how the correctness of the synthesis procedure can be shown for a given instance by establishing a bisimulation relation between the process-specific model and its low-level system model. This enables us to reason about a system on an abstract level that faithfully captures the semantics of the low-level implementation.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Fault Localization Based on Dynamic Slicing and Hitting-Set Computation 基于动态切片和命中集计算的故障定位
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.51
F. Wotawa
{"title":"Fault Localization Based on Dynamic Slicing and Hitting-Set Computation","authors":"F. Wotawa","doi":"10.1109/QSIC.2010.51","DOIUrl":"https://doi.org/10.1109/QSIC.2010.51","url":null,"abstract":"Slicing is an effective method for focusing on relevant parts of a program in case of a detected misbehavior. Its application to fault localization alone and in combination with other methods has been reported. In this paper we combine dynamic slicing with model-based diagnosis, a method for fault localization, which originates from Artificial Intelligence. In particular, we show how diagnosis, i.e., root causes, can be extracted from the slices for erroneous variables detected when executing a program on a test suite. We use these diagnoses for computing fault probabilities of statements that give additional information to the user. Moreover, we present an empirical study based on our implementation JSDiagnosis and a set of Java programs of various size from 40 to more than 1,000 lines of code.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Web Service Security Analysis Model Based on Program Slicing 基于程序切片的Web服务安全分析模型
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.66
Xiaohong Li, Yan Cao, Zhiyong Feng, Ran Liu
{"title":"Web Service Security Analysis Model Based on Program Slicing","authors":"Xiaohong Li, Yan Cao, Zhiyong Feng, Ran Liu","doi":"10.1109/QSIC.2010.66","DOIUrl":"https://doi.org/10.1109/QSIC.2010.66","url":null,"abstract":"A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface information flow; critical information is checked to see whether it is disclosed through the interface information flow. Vulnerability proliferation of a service net is found through analyzing process of interface calling between two web services in which the critical information is transmitted and disclosed. A security report describing test results of a test scene is provided to verify the of security analysis process.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127189142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Slicing Concurrent Programs Based on Program Reachability Graphs 基于程序可达性图的并行程序切片
2010 10th International Conference on Quality Software Pub Date : 2010-07-14 DOI: 10.1109/QSIC.2010.37
Xiaofang Qi, Xiaoyu Zhou, Xiaojing Xu, Yingzhou Zhang
{"title":"Slicing Concurrent Programs Based on Program Reachability Graphs","authors":"Xiaofang Qi, Xiaoyu Zhou, Xiaojing Xu, Yingzhou Zhang","doi":"10.1109/QSIC.2010.37","DOIUrl":"https://doi.org/10.1109/QSIC.2010.37","url":null,"abstract":"Program slicing is an effective and established technique to analyze sequential programs. However, owing to intransitive dependences between statements, it is hard to get precise slices of concurrent programs with traditional slicing algorithms for sequential programs. This paper proposes a novel representation, thread interaction reachability graph (TIRG), for concurrent programs with shared memory, interleaving semantics and mutual exclusion. Based on TIRG, dependences can be analyzed globally and we construct a new dependence graph (MSDG), where each node is a 2-tuple composed of program state and statement. The research shows that dependences in MSDG are transitive and more precise slice can be obtained by traversing MSDG compared with previous approaches.","PeriodicalId":111067,"journal":{"name":"2010 10th International Conference on Quality Software","volume":"426 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信