{"title":"约束违例检测:软件控制论的一个基本部分","authors":"Qianxiang Wang","doi":"10.1109/COMPSAC.2005.64","DOIUrl":null,"url":null,"abstract":"Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for detecting the presence of such events during execution. Here we focus on issues related to service level constraints including types of constraints, the runtime structure of constraints and the related entities. An experiment to assess the feasibility of the proposed approach is also reported.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Constraint violation detection: a fundamental part of software cybernetics\",\"authors\":\"Qianxiang Wang\",\"doi\":\"10.1109/COMPSAC.2005.64\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for detecting the presence of such events during execution. Here we focus on issues related to service level constraints including types of constraints, the runtime structure of constraints and the related entities. An experiment to assess the feasibility of the proposed approach is also reported.\",\"PeriodicalId\":419267,\"journal\":{\"name\":\"29th Annual International Computer Software and Applications Conference (COMPSAC'05)\",\"volume\":\"118 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"29th Annual International Computer Software and Applications Conference (COMPSAC'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPSAC.2005.64\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC.2005.64","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Constraint violation detection: a fundamental part of software cybernetics
Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for detecting the presence of such events during execution. Here we focus on issues related to service level constraints including types of constraints, the runtime structure of constraints and the related entities. An experiment to assess the feasibility of the proposed approach is also reported.