马于涛,何克清,李兵,刘婧.网络化软件的复杂网络特性实证[J].软件学报,2011,22(3):381-407. Ma Yu-Tao,He Ke-Qing,Li Bing,Liu Jing.Empirical study on the characteristics of complex networks in networked software[J].Journal of Software,2011,22(3):381-407.(in Chinese)
Christopher Ackermann,Mikael Lindvall,Rance Cleaveland.Towards behavioral reflexion models[A].Reliability Society[C].Mysuru,India:IEEE Computer Society,2009.175-184.
[4]
Jonathan E.Cook,Alexander L.Wolf.Discovering models of software processes from event-based data [J].ACM Transactions on Software Engineering and Methodology,1998,7(3):215-249.
[5]
Chun ying Zhao,Jun Kong,Kang Zhang.Program behavior discovery and verification:A graph grammar approach[J].IEEE Transactions on Software Engineering,2010,36(3):431-447.
[6]
Anton ChuvAkin,GunnAr Peterson.How to doapplication logging right[J].IEEE Computer and Reliability Societies,2010,8(4):82-85.
[7]
傅建明,陶芬,王丹,张焕国.基于对象的软件行为模型[J].软件学报,2011,22(11):2716-2728. Fu Jian-Ming,Tao Fen,Wang Dan,Zhang Huan-Guo.Software behavior model based on system objects[J].Journal of Software,2011,22(11):2716-2728.(in Chinese)
[8]
Selvaraj Srinivasan,R Rajaram.A decentralized deadlock detection and resolution algorithm for generalized model in distributed systems [J].Distributed and Parallel Databases,2011,29(4):261-276.
[9]
Jonathan E Cook,Zhidian Du.Discovering thread interactions in a concurrent system[J].Journal of Systems and Software,2005,77(3):285-297.
[10]
Jonathan E Cook,Cha He,Changjun Ma.Measuring behavioral correspondence to a timed concurrent model[A].IEEE Computer Society''s Technical Council on Software Engineering[C].Florence,Italy:IEEE Computer Society,2001.332-341.
[11]
彭成,杨路明,满君丰.不完全事务行为踪迹标记研究[J].小型微型计算机系统,2011,32(8):1593-1598. Peng Cheng,Yang Lu-ming,Man Jun-feng.Research on tokenizing behavior footprints of incomplete transaction[J].Journal of Chinese Computer Systems,2011,32(8):1593-1598.(in Chinese)
[12]
Jian-guang Lou,Qiang Fu,Shengqi Yang,Ye Xu,Jiang Li.Mining invariants from console logs for system problem detection[A].USENIX Workshop[C].Boston,US:USENIX,2010.231-244.
[13]
Andrzej Wasylkowski ,Andreas Zeller.Mining temporal specifications from object usage[A].ACM SIGART/SIGSOFTWorkshop[C].Washington,DC:IEEE Computer Society,2009.295-306.
[14]
Florian Skopik,Daniel Schall,Schahram Dustdar.Modeling and mining of dynamic trust in complex service-oriented systems[J].Information Systems,2010,35(7):735-757.
[15]
J Tan,X Pan,S Kavulya,R G,P Narasimhan.Mochi:visual log-analysis based tools for debugging hadoop .IEEE International Conference on Distributed Computing Systems Workshops .Geneva,Italy:IEEE Computer Society,2010.795-806.
[16]
A W Biermann,J A Feldman.On the synthesis of finite-state machines from samples of their behavior[J].IEEE Trans.Comput,1972,21(6):592-597.
[17]
C Damas,et al.Generating annotated behavior models from end-user scenarios[J].IEEE Transaction on Software Engineering,2005,31(12):1056-1073.
[18]
张尧学.透明计算:概念,结构和示例[J].电子学报,2004,32(12A):169-173. Zhang Yao-xue.Transparence computing:Concept,architecture and example[J].Acta Electronica Sinica,2004,32(12A):169-173.(in Chinese)
[19]
杨芙清,梅宏,吕建,金芝.浅论软件技术发展[J].电子学报,2002,30(12A):1901-1906. Yang Fu-qing,Mei Hong,Lu Jian,Jin Zhi.Some discussion on the development of software technology[J].Acta Electronica Sinca,2002,30(12A):1901-1906.(in Chinese)
[20]
Leonardo Mariani,Mauro Pezzè,Oliviero Riganelli,Mauro Santoro.SEIM:static extraction of interaction models[A].International Workshop on Software Engineering[C].Cape Town,South Africa:IEEE Computer Society,2010.22-28.
[21]
Kai-Yuan Cai,Bei-Bei Yin.Software execution processes as an evolving complex network[J].Information Sciences,2009,179 (12):1903-1928.
[22]
Tao Li,Wei Peng,Charles Perng,Sheng Ma,Haixun Wang.An integrated data-driven framework for computing system management[J].IEEE Transactions on Systems,2010,40(1):90-99.
[23]
Zhen Li,Jun Feng Tian,Liu Yang.An improved software behavior model in system call level and trustworthiness evaluation[J].Information Technology Journal,2011,10(11):2208-2213.
[24]
Curtis E.Hrischuk,Murray Woodside.Logical clock requirements for reverse engineering scenarios from a distributed system[J].IEEE Transaction on Software Engineering,2002,28(4):321-338.
[25]
Jonathan E.Cook,Zhidian Du,Chongbing Liu,Alexander L.Wolf.Discovering models of behavior for concurrent workflows[J].Computers in Industry,2004,53(3):97-319.
[26]
J Tan,X Pan,S Kavulya,R G,P Narasimhan.SALSA:analyzing logs as state machines .USENIX Workshop .San Diego,CA:USENIX,2008.6-6.