期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Block-based test data adequacy measurement criteria and test complexity metrics
1
作者 陈卫东 杨建军 +1 位作者 叶澄清 潘云鹤 《Journal of Zhejiang University Science》 CSCD 2002年第1期37-41,共5页
On the basis of software testing tools we developed for programming languages, we firstly present a new control flowgraph model based on block. In view of the notion of block, we extend the traditional program\|based ... On the basis of software testing tools we developed for programming languages, we firstly present a new control flowgraph model based on block. In view of the notion of block, we extend the traditional program\|based software test data adequacy measurement criteria, and empirically analyze the subsume relation between these measurement criteria. Then, we define four test complexity metrics based on block. They are J\|complexity 0; J\|complexity 1; J\|complexity \{1+\}; J\|complexity 2. Finally, we show the Kiviat diagram that makes software quality visible. 展开更多
关键词 block NODE SEGMENT control flowgraph model test data adequacy measurement criteria test complexity metric Kiviat diagram
下载PDF
Research of Software Complexity Metrics with Security Indicator
2
作者 付剑晶 王珂 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期460-464,共5页
Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security o... Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security of the protected software. However, there are some researchers evaluating the security of the proposed protect techniques directly by the traditional complexity metrics, which is not suffident. In order to better reflect security from software complexity, a multi-factor complexity metric based on control flow graph (CFG) is proposed, and the corresponding calculating procedures are presented in detail. Moreover, complexity density models are constructed to indicate the strength of software resisting reverse engineering and code analysis. Instance analysis shows that the proposed method is simple and practical, and can more objectively reflect software security from the perspective of the complexity. 展开更多
关键词 complexity metric software protection complexity density control flow graph
下载PDF
防腐仪微机监测系统
3
作者 高念俊 《重庆通信学院学报》 1989年第2期16-20,共5页
本文介绍了金属防腐仪微机监测系统的结构、功能、软件流图及系统操作等。最后简要讨论了该系统的改进和待解决的新课题。
关键词 金属防腐仪 微机监测系统 软件流图 系统操作
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部