Search
Now showing items 51-60 of 60
Extending static code analysis with application-specific rules by analyzing runtime execution traces
(Springer International Publishing, 2016)
Static analysis tools cannot detect violations of application-specific rules. They can be extended with specialized checkers that implement the verification of these rules. However, such rules are usually not documented ...
Runtime verification of Iot systems using complex event processing
(IEEE, 2017)
Internet of Things (IoT) is a new computing paradigm that is proliferated by wide adoption of application level protocols such as MQTT and CoAP, each of which defines different styles of sequential interaction of events. ...
Impact of education and experience level on the effectiveness of exploratory testing: an industrial case study
(IEEE, 2017)
Exploratory Testing (ET) is a widely applied approach in practice. This approach relies on the knowledge and experience of test engineers and technicians who perform ET. Hence, we aimed at evaluating the impact of education ...
Generating runtime verification specifications based on static code analysis alerts
(ACM, 2017)
Runtime verification techniques verify dynamic system behavior with respect to a set of specifications. These specifications are often created manually based on system requirements and constraints. In this paper, we introduce ...
Risk-driven model-based testing of washing machine software: an industrial case study
(IEEE, 2018-07-16)
We previously introduced an approach for risk-driven model-based testing. In that approach, test models are represented in the form of Markov chains and test case generation is steered by state transition probabilities. ...
Evaluating the effectiveness of multi-level greedy modularity clustering for software architecture recovery
(Springer Nature, 2019)
Software architecture recovery approaches mainly analyze various types of dependencies among software modules to group them and reason about the high-level structural decomposition of a system. These approaches employ a ...
Incremental analysis of large-scale system logs for anomaly detection
(IEEE, 2019)
Anomalies during system execution can be detected by automated analysis of logs generated by the system. However, large scale systems can generate tens of millions of lines of logs within days. Centralized implementations ...
Evaluation of distributed machine learning algorithms for anomaly detection from large-scale system logs: a case study
(IEEE, 2018)
Anomaly detection is a valuable feature for detecting and diagnosing faults in large-scale, distributed systems. These systems usually provide tens of millions of lines of logs that can be exploited for this purpose. ...
Towards a testing framework with visual feedback for actor-based systems
(IEEE, 2018-08-02)
We introduce a prototype testing framework as an extension of JUnit for testing actor-based systems. Our framework runs a given JUnit test in various schedules and records the execution trace for each run. In case a failure ...
An architecture viewpoint for modeling dynamically configurable software systems
(Elsevier, 2017-01-01)
Current software systems are rarely static and need to be able to change their topology and behavior to the changing context. To support the communication among stakeholders, guide the design decisions, and analyze the ...
Share this page