期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Approach to evaluating exception handling of programs
1
作者 姜淑娟 徐宝文 《Journal of Southeast University(English Edition)》 EI CAS 2007年第4期524-528,共5页
To solve the problems that the exception handling code is hard to test and maintain and that it affects the robustness and reliability of software, a method for evaluating the exception handling of programs is present... To solve the problems that the exception handling code is hard to test and maintain and that it affects the robustness and reliability of software, a method for evaluating the exception handling of programs is presented. The exception propagation graph (EPG) that describes the large programs with exception handling constructs is proposed by simplifying the control flow graph and it is applied to a case to verify its validity. According to the EPG, the exception handling code that never executes is identified; the points that are the most critical to controlling exception propagation are found; and the irrational exception handling code is corrected. The constructing algorithm for the EPG is given; thus, this provides a basis for automatically constructing the EPG and automatically correcting the irrational exception handling code. 展开更多
关键词 software robustness exception handling exception propagation evaluating program control flow graph
下载PDF
Method for test case selection and execution of web application regression testing
2
作者 曹曦 许蕾 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期325-329,共5页
In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case select... In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved. 展开更多
关键词 regression testing web application test case selection control flow graph optimizing execution
下载PDF
Research of the Control Domain of Edges in Regression Testing 被引量:1
3
作者 高建华 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期57-61,共5页
Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the mo... Regression testing is the process of validating modified software to provide confidence that the changed parts of the software behave as intended and that the unchanged parts have not been adversely affected by the modifications. The goal of regression testing is to reduce the test suit by testing the new characters and the modified parts of a program with the original test suit. Regression testing is a high cost testing method. This paper presents a regression testing selection technique that can reduce the test suit on the basis of Control Flow Graph (CFG). It import the inherit strategy of object-oriented language to ensure an edge’s control domain to reduce the test suit size effectively. We implement the idea by coding the edge. An algorithm is also presented at last. 展开更多
关键词 regression testing control flow graph control domain of edges code value of edge inherit strategy
下载PDF
Switched Capacitor Network Analysis by Means of TCM
4
作者 徐静波 徐望人 《Journal of Donghua University(English Edition)》 EI CAS 2004年第1期100-103,共4页
The totally coded method (TCM) reveals the same objective law, which governs the gain calculating for signal flow graph as Mason formula does. This algorithm is carried out merely in the domain of code operation. Base... The totally coded method (TCM) reveals the same objective law, which governs the gain calculating for signal flow graph as Mason formula does. This algorithm is carried out merely in the domain of code operation. Based on pure code algorithm, it is more efficient because figure searching is no longer necessary. The code-series ( CS ), which are organized from node association table, have the holoinformation nature, so that both the content and the sign of each gain-term can be determined via the coded method.The principle of this method is obvious and it is suited for computer programming. The capability of the computeraided analysis for Switched Capacitor (SCN) can be enhanced. 展开更多
关键词 signal flow graph ALGORITHM coded method SCN.
下载PDF
Research of Software Complexity Metrics with Security Indicator
5
作者 付剑晶 王珂 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期460-464,共5页
Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security o... Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security of the protected software. However, there are some researchers evaluating the security of the proposed protect techniques directly by the traditional complexity metrics, which is not suffident. In order to better reflect security from software complexity, a multi-factor complexity metric based on control flow graph (CFG) is proposed, and the corresponding calculating procedures are presented in detail. Moreover, complexity density models are constructed to indicate the strength of software resisting reverse engineering and code analysis. Instance analysis shows that the proposed method is simple and practical, and can more objectively reflect software security from the perspective of the complexity. 展开更多
关键词 complexity metric software protection complexity density control flow graph
下载PDF
Computer-aided Symbolic Analysis for the Active Network
6
作者 徐望人 徐静波 《Journal of Donghua University(English Edition)》 EI CAS 2004年第2期149-151,共3页
The totally coded method (TCM) reveal the same law which governing the gain calculating for signal flow graph as Mason formula does. This algorithm is carried out merely in the domain of code operation. Based on pure ... The totally coded method (TCM) reveal the same law which governing the gain calculating for signal flow graph as Mason formula does. This algorithm is carried out merely in the domain of code operation. Based on pure code algorithm, it is more efficiency because any figure searching is no longer necessary. The code-series (CS), which are organized from node association table, have the holo-information nature, so that both the content and the sign of each gain-term can be determined via the coded method. The principle of this method is obvious and it is suited for computer programming. The capability of the computer-aided analysis for the active network, such as operation amplifier network, can be enhanced. 展开更多
关键词 Signal flow graph ALGORITHM coded method operation amplifier network
下载PDF
AN OBJECT ORIENTED MODEL SCHEDULING FOR MEDIA-SOC
7
作者 Cheng Xingmei Yao Yingbiao +2 位作者 Zhang Yixiong Liu Peng Yao Qingdong 《Journal of Electronics(China)》 2009年第2期244-251,共8页
This paper proposes an object oriented model scheduling for parallel computing in media MultiProcessors System on Chip(MPSoC).Firstly,the Coarse Grain Data Flow Graph(CGDFG) parallel programming model is used in this ... This paper proposes an object oriented model scheduling for parallel computing in media MultiProcessors System on Chip(MPSoC).Firstly,the Coarse Grain Data Flow Graph(CGDFG) parallel programming model is used in this approach.Secondly,this approach has the feature of unified abstraction for software objects implementing in processor and hardware objects implementing in ASICs,easy for mapping CGDFG programming on MPSoC.This approach cuts down the kernel overhead and reduces the code size effectively.The principle of the oriented object model,the method of scheduling,and how to map a parallel programming through CGDFG to the MPSoC are analyzed in this approach.This approach also compares the code size and execution cycles with conventional control flow scheduling,and presents respective management overhead for one application in me-dia-SoC. 展开更多
关键词 Multimedia computing Coarse Grain Data flow Graph(CGDFG) Parallel program-ming Real Time Operating System(RTOS) MultiProcessors System on Chip(MPSoC)
下载PDF
A Comparative Study on Test Case Generation of Concurrent Programs
8
作者 Bidush Kumar Sahoo Mitrabinda Ray 《World Journal of Engineering and Technology》 2016年第2期273-280,共8页
This paper deals with a comparative study on testing of concurrent programs based on different techniques. The various challenges in testing concurrent programming are: defining test coverage criteria based on control... This paper deals with a comparative study on testing of concurrent programs based on different techniques. The various challenges in testing concurrent programming are: defining test coverage criteria based on control flow, generating control flow graph of nondeterministic programs, investigating the applicability of sequential testing criteria to parallel program testing etc. For solving these issues, some existing techniques are discussed in this study. Various researchers use an intermediate graph called Event Inter Actions Graph (EIAG) to solve the problem of generating the control flow graph of nondeterministic programs. Some researches propose an intermediate graph called Interaction Sequence Testing Criteria (ISTC) approach based on sequence of interactions to solve the problem of test coverage criteria based on control and data flow. Another method to solve the problem of generating test coverage based on control flow graph of nondeterministic programs is constraint based approach. It needs constrained elements to generate test case which includes structural element and constraint. The selection of good test cases has been addressed by test data generation technique. The technique of concurrent path analysis approach is used to solve the problem of applicability of sequential testing criteria to parallel program testing. It reduces the number of combined concurrent test paths. The sequential test paths are combined to form concurrent test path. The Integration and System Test Automation (ISTA) approach is used to solve the problem of applicability of sequential testing criteria to parallel program testing. It is used for automated test case generation and execution by using high-level Petri net is a finite state test model. 展开更多
关键词 Concurrent Program EIAG Dead Statement Control flow Graph Nondeterministic Program
下载PDF
Research on Intrusion Detection Method of Web Service Composition
9
作者 Xiaosen Wen 《International Journal of Technology Management》 2013年第2期104-106,共3页
The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model ... The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services. 展开更多
关键词 Web attack network intrusion detection anomaly detection control flow graph
下载PDF
CFOA Based Band Pass and Band Stop Ladder Filter—A New Configuration
10
作者 Praween K. Sinha Neelam Sharma +1 位作者 Simran Agarwal Sudipto Saha 《Circuits and Systems》 2016年第1期29-42,共14页
A new technique for the conversion of ladder based filter into CFOA based filter has been proposed. The technique uses signal flow graph and converts the existing LC ladder based filter into band pass & band stop ... A new technique for the conversion of ladder based filter into CFOA based filter has been proposed. The technique uses signal flow graph and converts the existing LC ladder based filter into band pass & band stop configurations. The design of band pass and band stop filter has been realized using the proposed technique. The proposed configuration is implemented using CFOA as an active device and all the capacitors are grounded. CFOA based circuits have greater linearity, high dynamic rate, high slew rate and high signal bandwidth. Simulation has been carried out using simulation software P Spice (v10.1). The simulation results have been demonstrated and discussed. 展开更多
关键词 CFOA-Current Feedback Operational Amplifier Ladder Filter Signal flow Graph Current Mode Voltage Mode Band Pass Filter Band Stop Filter
下载PDF
A Survey of Malware Classification Methods Based on Data Flow Graph
11
作者 Tingting Jiang Lingling Cui +1 位作者 Zedong Lin Faming Lu 《国际计算机前沿大会会议论文集》 2022年第1期80-93,共14页
Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the o... Malware is emerging day by day.To evade detection,many malware obfuscation techniques have emerged.Dynamicmalware detectionmethods based on data flow graphs have attracted much attention since they can deal with the obfuscation problem to a certain extent.Many malware classification methods based on data flow graphs have been proposed.Some of them are based on userdefined features or graph similarity of data flow graphs.Graph neural networks have also recently been used to implement malware classification recently.This paper provides an overview of current data flow graph-based malware classification methods.Their respective advantages and disadvantages are summarized as well.In addition,the future trend of the data flow graph-based malware classification method is analyzed,which is of great significance for promoting the development of malware detection technology. 展开更多
关键词 Malware detection Malware classification Data flow graph Graph neural network
原文传递
A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features 被引量:4
12
作者 Jinchang Hu Jinfu Chen +4 位作者 Lin Zhang Yisong Liu Qihao Bao Hilary Ackah-Arthur Chi Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期604-613,共10页
Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source... Developing secure software systems is a major challenge in the software industry due to errors or weaknesses that bring vulnerabilities to the software system.To address this challenge,researchers often use the source code features of vulnerabilities to improve vulnerability detection.Notwithstanding the success achieved by these techniques,the existing studies mainly focus on the conceptual description without an accurate definition of vulnerability features.In this study,we introduce a novel and efficient Memory-Related Vulnerability Detection Approach using Vulnerability Features (MRVDAVF).Our framework uses three distinct strategies to improve vulnerability detection.In the first stage,we introduce an improved Control Flow Graph (CFG) and Pointer-related Control Flow Graph (PCFG) to describe the features of some common vulnerabilities,including memory leak,doublefree,and use-after-free.Afterward,two algorithms,namely Vulnerability Judging algorithm based on Vulnerability Feature (VJVF) and Feature Judging (FJ) algorithm,are employed to detect memory-related vulnerabilities.Finally,the proposed model is validated using three test cases obtained from Juliet Test Suite.The experimental results show that the proposed approach is feasible and effective. 展开更多
关键词 vulnerability feature Control flow Graph(CFG) Memory Leak(ML) Double-Free(DF) Use-After-Free(UAF)
原文传递
Dynamical Self-Reconfigurable Mechanism for Data-Driven Cell Array 被引量:1
13
作者 SHAN Rui JIANG Lin +2 位作者 WU Haoyue HE Feilong LIU Xinchuang 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期511-521,共11页
The utilization of computation resources and reconfiguration time has a large impact on reconfiguration system performance. In order to promote the performance, a dynamical self-reconfigurable mechanism for data-drive... The utilization of computation resources and reconfiguration time has a large impact on reconfiguration system performance. In order to promote the performance, a dynamical self-reconfigurable mechanism for data-driven cell array is proposed. Cells can be fired only when the needed data arrives, and cell array can be worked on two modes: fixed execution and reconfiguration. On reconfiguration mode, cell function and data flow direction are changed automatically at run time according to contexts. Simultaneously using an H-tree interconnection network, through pre-storing multiple application mapping contexts in reconfiguration buffer, multiple applications can execute concurrently and context switching time is the minimal. For verifying system performance, some algorithms are selected for mapping onto the proposed structure, and the amount of configuration contexts and execution time are recorded for statistical analysis. The results show that the proposed self-reconfigurable mechanism can reduce the number of contexts efficiently, and has a low computing time. 展开更多
关键词 cell array configurable computing self-reconfigurable mechanism DATA-DRIVEN data flow graph
原文传递
Code Based Analysis for Object-Oriented Systems
14
作者 Swapan Bhattacharya Ananya Kanjilal 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第6期965-972,共8页
Tile basic features of object-oriented software makes it difficult to apply traditional testing methods in objectoriented systems. Control Flow Graph (CFG) is a well-known model used for identification of independen... Tile basic features of object-oriented software makes it difficult to apply traditional testing methods in objectoriented systems. Control Flow Graph (CFG) is a well-known model used for identification of independent paths in procedural software. This paper highlights the problem of constructing CFG in object-oriented systems and proposes a new model named Extended Control Flow Graph (ECFG) for code based analysis of Object-Oriented (OO) software. ECFG is a layered CFG where nodes refer to methods rather than statements. A new metrics Extended Cyclomatic Complexity (E-CC) is developed which is analogous to McCabe's Cyclomatic Complexity (CC) and refers to the number of independent execution paths within the OO software. The different ways in which CFG's of individual methods are connected in an ECFG are presented and formulas for E-CC for these different cases are proposed. Finally we have considered an example in Java and based on its ECFG, applied these cases to arrive at the E-CC of the total system as well as proposed a methodology for calculating the basis set, i.e., the set of independent paths for the OO system that will help in creation of test cases for code testing. 展开更多
关键词 object-oriented testing extended control flow graph extended cyclomatic complexity test paths graph-based testing
原文传递
Stability and Hopf Bifurcation Analysis of an (n+m)-Neuron Double-Ring Neural Network Model with Multiple Time Delays
15
作者 XING Ruitao XIAO Min +1 位作者 ZHANG Yuezhong QIU Jianlong 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2022年第1期159-178,共20页
Up till the present moment,researchers have always featured the single-ring neural network.These investigations,however,disregard the link between rings in neural networks.This paper highlights a high-dimensional doub... Up till the present moment,researchers have always featured the single-ring neural network.These investigations,however,disregard the link between rings in neural networks.This paper highlights a high-dimensional double-ring neural network model with multiple time delays.The neural network has two rings of a shared node,where one ring has n neurons and the other has m+1 neurons.By utilizing the sum of time delays as the bifurcation parameter,the method of Coates’flow graph is applied to obtain the relevant characteristic equation.The stability of the neural network model with bicyclic structure is discussed by dissecting the characteristic equation,and the critical value of Hopf bifurcation is derived.The effect of the sum of time delays and the number of neurons on the stability of the model is extrapolated.The validity of the theory can be verified by numerical simulations. 展开更多
关键词 Coates’flow graph HIGH-DIMENSIONAL Hopf bifurcation STABILITY
原文传递
Automatic Identification of Use Cases from Codes: A User’s Goal Driven Approach
16
作者 ZHOU Xiaoyu QIAN Ju +1 位作者 CHEN Lin XU Baowen 《Wuhan University Journal of Natural Sciences》 CAS 2009年第5期409-414,共6页
Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect diffe... Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect different use cases. This paper presents an approach to identify base flows and alternative flows of different use cases by traversing control flow graph in which back edges are eliminated. The effectiveness of the approach is verified by identification of the use case structure of an ATM system. The workload of human intervention of the approach is relatively slight, and the manner of human intervention closely follows the usual process of software comprehension. 展开更多
关键词 use case identification control flow graph program analysis reverse engineering unified modeling language (UML)
原文传递
A Partitioning Methodology That Optimizes the Communication Cost for Reconfigurable Computing Systems
17
作者 Ramzi Ayadi Bouraoui Ouni Abdellatif Mtibaa 《International Journal of Automation and computing》 EI 2012年第3期280-287,共8页
This paper focuses on the design process for reconfigurable architecture. Our contribution focuses on introducing a new temporal partitioning algorithm. Our algorithm is based on typical mathematic flow to solve the t... This paper focuses on the design process for reconfigurable architecture. Our contribution focuses on introducing a new temporal partitioning algorithm. Our algorithm is based on typical mathematic flow to solve the temporal partitioning problem. This algorithm optimizes the transfer of data required between design partitions and the reconfiguration overhead. Results show that our algorithm considerably decreases the communication cost and the latency compared with other well known algorithms. 展开更多
关键词 Temporal partitioning data flow graph communication cost reconfigurable computing systems field-programmable gate array (FPGA)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部