全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

网络化软件交互行为动态建模

DOI: 10.3969/j.issn.0372-2112.2013.02.017, PP. 314-320

Keywords: 网络化软件,交互行为,不变量约束,动态模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

目前的软件行为建模方法有其局限性,而网络化软件交互行为比传统软件更为复杂难控,对模型的定义和优化提出了更高的要求.本文提出一种基于不变量约束规则的挖掘方法,从监控收集的软件交互行为日志中挖掘出六类不变模式,简化了模型空间;并用事件描述状态,提高了数据集的表达能力;构建的动态模型考虑了参数传递和组件之间的交互,将数值关联关系映射到控制流中,从而更真实地刻画了软件交互行为;模型中的事件满足不变量约束规则,为软件行为分析提供了依据;同时,本文提出合并划分子图间的等价状态方法,对模型进行精化和抽象,确保了模型的确定性和完备性.仿真实验和实例分析证实了该方法的正确性和有效性.

References

[1]  马于涛,何克清,李兵,刘婧.网络化软件的复杂网络特性实证[J].软件学报,2011,22(3):381-407. Ma Yu-Tao,He Ke-Qing,Li Bing,Liu Jing.Empirical study on the characteristics of complex networks in networked software[J].Journal of Software,2011,22(3):381-407.(in Chinese)
[2]  陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(12A):1933-1938. Chen Huo-wang,Wang Ji,Dong Wei.High confidence software engineering technologies [J].Acta Electronica Sinica 2003,31(12A):1933-1938.(in Chinese)
[3]  Christopher Ackermann,Mikael Lindvall,Rance Cleaveland.Towards behavioral reflexion models[A].Reliability Society[C].Mysuru,India:IEEE Computer Society,2009.175-184.
[4]  Jonathan E.Cook,Alexander L.Wolf.Discovering models of software processes from event-based data [J].ACM Transactions on Software Engineering and Methodology,1998,7(3):215-249.
[5]  Chun ying Zhao,Jun Kong,Kang Zhang.Program behavior discovery and verification:A graph grammar approach[J].IEEE Transactions on Software Engineering,2010,36(3):431-447.
[6]  Anton ChuvAkin,GunnAr Peterson.How to doapplication logging right[J].IEEE Computer and Reliability Societies,2010,8(4):82-85.
[7]  傅建明,陶芬,王丹,张焕国.基于对象的软件行为模型[J].软件学报,2011,22(11):2716-2728. Fu Jian-Ming,Tao Fen,Wang Dan,Zhang Huan-Guo.Software behavior model based on system objects[J].Journal of Software,2011,22(11):2716-2728.(in Chinese)
[8]  Selvaraj Srinivasan,R Rajaram.A decentralized deadlock detection and resolution algorithm for generalized model in distributed systems [J].Distributed and Parallel Databases,2011,29(4):261-276.
[9]  Jonathan E Cook,Zhidian Du.Discovering thread interactions in a concurrent system[J].Journal of Systems and Software,2005,77(3):285-297.
[10]  Jonathan E Cook,Cha He,Changjun Ma.Measuring behavioral correspondence to a timed concurrent model[A].IEEE Computer Society''s Technical Council on Software Engineering[C].Florence,Italy:IEEE Computer Society,2001.332-341.
[11]  彭成,杨路明,满君丰.不完全事务行为踪迹标记研究[J].小型微型计算机系统,2011,32(8):1593-1598. Peng Cheng,Yang Lu-ming,Man Jun-feng.Research on tokenizing behavior footprints of incomplete transaction[J].Journal of Chinese Computer Systems,2011,32(8):1593-1598.(in Chinese)
[12]  Jian-guang Lou,Qiang Fu,Shengqi Yang,Ye Xu,Jiang Li.Mining invariants from console logs for system problem detection[A].USENIX Workshop[C].Boston,US:USENIX,2010.231-244.
[13]  Andrzej Wasylkowski ,Andreas Zeller.Mining temporal specifications from object usage[A].ACM SIGART/SIGSOFTWorkshop[C].Washington,DC:IEEE Computer Society,2009.295-306.
[14]  Florian Skopik,Daniel Schall,Schahram Dustdar.Modeling and mining of dynamic trust in complex service-oriented systems[J].Information Systems,2010,35(7):735-757.
[15]  J Tan,X Pan,S Kavulya,R G,P Narasimhan.Mochi:visual log-analysis based tools for debugging hadoop .IEEE International Conference on Distributed Computing Systems Workshops .Geneva,Italy:IEEE Computer Society,2010.795-806.
[16]  A W Biermann,J A Feldman.On the synthesis of finite-state machines from samples of their behavior[J].IEEE Trans.Comput,1972,21(6):592-597.
[17]  C Damas,et al.Generating annotated behavior models from end-user scenarios[J].IEEE Transaction on Software Engineering,2005,31(12):1056-1073.
[18]  张尧学.透明计算:概念,结构和示例[J].电子学报,2004,32(12A):169-173. Zhang Yao-xue.Transparence computing:Concept,architecture and example[J].Acta Electronica Sinica,2004,32(12A):169-173.(in Chinese)
[19]  杨芙清,梅宏,吕建,金芝.浅论软件技术发展[J].电子学报,2002,30(12A):1901-1906. Yang Fu-qing,Mei Hong,Lu Jian,Jin Zhi.Some discussion on the development of software technology[J].Acta Electronica Sinca,2002,30(12A):1901-1906.(in Chinese)
[20]  Leonardo Mariani,Mauro Pezzè,Oliviero Riganelli,Mauro Santoro.SEIM:static extraction of interaction models[A].International Workshop on Software Engineering[C].Cape Town,South Africa:IEEE Computer Society,2010.22-28.
[21]  Kai-Yuan Cai,Bei-Bei Yin.Software execution processes as an evolving complex network[J].Information Sciences,2009,179 (12):1903-1928.
[22]  Tao Li,Wei Peng,Charles Perng,Sheng Ma,Haixun Wang.An integrated data-driven framework for computing system management[J].IEEE Transactions on Systems,2010,40(1):90-99.
[23]  Zhen Li,Jun Feng Tian,Liu Yang.An improved software behavior model in system call level and trustworthiness evaluation[J].Information Technology Journal,2011,10(11):2208-2213.
[24]  Curtis E.Hrischuk,Murray Woodside.Logical clock requirements for reverse engineering scenarios from a distributed system[J].IEEE Transaction on Software Engineering,2002,28(4):321-338.
[25]  Jonathan E.Cook,Zhidian Du,Chongbing Liu,Alexander L.Wolf.Discovering models of behavior for concurrent workflows[J].Computers in Industry,2004,53(3):97-319.
[26]  J Tan,X Pan,S Kavulya,R G,P Narasimhan.SALSA:analyzing logs as state machines .USENIX Workshop .San Diego,CA:USENIX,2008.6-6.
[27]  J Yang,D Evans.Dynamically inferring temporal properties .Acm Sigartsigsoft Workshop .Washington,DC:Association for Computing Machinary,2004.23-28.
[28]  J Whittle,J Schumann.Generating state chart designs from scenarios .ACM Limerick .New York,Ireland:IEEE-CS Computer Society,2000.314-323.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133