The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic fault localization is a representative concept and product proposed by academia to alleviate software engineering pains, but it is rarely heard adopted or used in realistic development. Realizing the difficulties in transferring the approaches of dynamic fault localization to practical tools, this paper gives our work FLAVS, whose add-in implementation organically and seamlessly integrates...
This paper investigates the performance of Baah et al.'s causal regression model for fault localization when an important precondition for causal inference, called positivity, is violated. Two kinds of positivity violations are considered: structural and random ones. We prove that random, but not structural nonpositivity may harm the performance of Baah et al.'s causal estimator. To address the problem...
Software static analysis is one of many options for finding bugs in software. Like compilers, static analyzers take a program as input. This paper covers tools that examine source code -- without executing it -- and output bug reports. Static analysis is a complex and generally undecidable problem. Most tools resort to approximation to overcome these obstacles and it sometimes leads to incorrect results...
Although critical for delivering resilient, secure, efficient, and easily changed IT systems, cross-technology, cross layer quality defect detection in IT systems still faces hurdles. Two hurdles involve the absence of an absolute target architecture and the difficulty of apprehending multi-component anti-patterns. However, Static analysis and measurement technologies are now able to both consume...
Many failures arise from complex and imperfectly understood interactions of a computational system with aspects of the environment in which it operates. By environment we mean the computational system's broader context, also called the problem world. In this work, we propose a new analysis technique called failure frames, a variation of Jackson's problem frames, to identify and model classes of environmental...
The interaction of software with its execution environment is an underestimated cause of complex faults activation and systems failure. This paper discusses a possible framework to emulate anomalous environment conditions in order to assess the impact of the execution environment on a software application under test. We discuss a characterization of the software's execution environment, introducing...
In software engineering, classification is a way to find an organized structure of knowledge about objects. Classification serves to investigate the relationship between the items to be classified, and can be used to identify the current gaps in the field. In many cases users are able to order and relate objects by fitting them in a category. This paper presents initial work on a taxonomy for classification...
Communications Based Train Control (CBTC) is the newest railway system to solve traffic congestion in China's cities. Compared with the traditional signaling systems, CBTC systems are more complicated for which the modern moving block systems have been designed so that the exact position of a train can be known more accurately. Using traditional software development processes to design and expand...
Demonstrating software reliability across multiple software revisions has become essential to end users of an end point detection system used in the semiconductor industry. This would enable them to make informed decisions of upgrading software versions without making significant impact to their current established processes. We show how one can use standard defect data normally collected in any software...
When monitoring complex applications in cloud systems, a difficult problem for operators is receiving false positive alarms. This becomes worse when the system is sporadically being changed and upgraded due to the emerging continuous deployment practice. Other legitimate but sporadic maintenance operations, such as log compression, garbage collection and data reconstruction in distributed systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.