Search
Now showing items 1-7 of 7
Model-based software product line testing by coupling feature Mmodels with hierarchical Markov chain usage models
(IEEE, 2016)
Model-based testing automates test case generation based on usage models of a system. In this paper, we introduce an approach for systematic reuse of these models for testing a large family of products. In our approach, ...
Using hypergraph clustering for software architecture reconstruction of data-tier software
(Springer International Publishing, 2016)
Software architecture reconstruction techniques aim at recovering software architecture documentation regarding a software system. These techniques mainly analyze coupling/dependencies among the software modules to group ...
Identifying critical architectural components with spectral analysis of fault trees
(Elsevier, 2016-12)
We increasingly rely on software-intensive embedded systems. Increasing size and complexity of these hardware/software systems makes it necessary to evaluate reliability at the system architecture level. One aspect of this ...
Automated procedure clustering for reverse engineering PL/SQL programs
(ACM, 2016)
PL/SQL programs are mainly composed of procedures that interact with a database. These procedures are grouped into packages at the architecture design level for increasing modularity and maintainability. However, the ...
Moving switching functions to continuous domain
(IEEE, 2016)
This paper proposes a method for moving switching functions to continuous domain. The benefits of this approach are twofold. First, the elementary calculus works with the transformed functions. Second, this transformation ...
Successive refinement of models for model-based testing to increase system test effectiveness
(IEEE, 2016)
Model-based testing is used for automatically generating test cases based on models of the system under test. The effectiveness of tests depends on the contents of these models. Therefore, we introduce a novel three-step ...
Extending static code analysis with application-specific rules by analyzing runtime execution traces
(Springer International Publishing, 2016)
Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented ...
Share this page