期刊文献+

Visualization Analysis Framework for Large-Scale Software Based on Software Network

下载PDF
导出
摘要 Large-scale software systems,which are the most sophisticated human-designed objects,play more and more important role in our daily life.Consequently effective analysis for large-scale software has become an urgent problem to be solved with the increasing issues of software security and the continuous expansion of software applications scope.For the characteristics of large scale and complex structure in large-scale software,the traditional software analysis techniques are difficult to be used.With the problem of difficulty in presentation,storage and low efficiency in the process of large-scale software analysis,the visualization analysis framework for large-scale software based on software network,named SoNet,is proposed with the combination of complex network theory and program slicing technique.Constraint logic attributes of the programs will be obtained through source code parsing.Then we will construct a global view by the theory of complex network after extracting software structure and behavior,improving user’s perception of software architecture in a macro perspective.Use case slicing will be realized combined with Redis cluster,and accessibility analysis when given a keyword to be analyzed.We evaluate our prototype implementation on an open source software project named SoundSea in Github,and the results suggest that our approach can realize the analysis for large-scale software.
机构地区 School of Software
出处 《国际计算机前沿大会会议论文集》 2017年第1期185-187,共3页 International Conference of Pioneering Computer Scientists, Engineers and Educators(ICPCSEE)
  • 相关文献

参考文献5

二级参考文献38

  • 1王千祥,申峻嵘,梅宏.自适应软件初探[J].计算机科学,2004,31(10):168-171. 被引量:21
  • 2熊建新,王鼎兴,郑纬民,沈美明.基于事件模型的可视化并行调试技术[J].软件学报,1996,7(5):292-299. 被引量:6
  • 3Basili V R, Selby R W. Comparing the Effectiveness of Software Testing[J]. IEEE Transactions on Software Engineering, 1987, 13(12) : 1278-1296.
  • 4WestB.安全编程:代码静态分析[M].北京:机械工业出版社,2008.
  • 5Clarke L A. A System to Generate Test Data and Symbolically Execute Programs[J]. IEEE Trans. Softw. Eng., 1976,2(3): 215-222.
  • 6Wagner D, Dean D. Intrusion Detection via Static Analysis[C]// Proceedings of the 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2001 : 156.
  • 7Naik M, Park C-S, Sen K, et al. Effective static deadlock detection[C] // the 31st International Conference on Software Engineering. Vancouver, Canada, 2009 : 386-396.
  • 8Pousot A, Cousot R. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints[C]//Proceedings of the 4th ACM SIGACTSIGPLAN Symposium on Principles of Programming Languages. Los Angeles, California:ACM, 1977 :238-252.
  • 9Kildall G A. A unified approach to global program optimization [C]//Proceedings of the 1st Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming languages. Boston, Massachusetts: ACM, 1973 : 194-206.
  • 10Jet C. Bandera: Extracting finite-state models from Java source code[C]//22nd ICSE. Limerick, Ireland, 2000: 439-458.

共引文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部