2011
DOI: 10.1109/tse.2010.93
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Analysis for Diagnosing Integration Faults

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
75
0
4

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 88 publications
(83 citation statements)
references
References 47 publications
0
75
0
4
Order By: Relevance
“…Some more powerful models with learning algorithms include: non-deterministic automata [60,29], probabilistic automata [19,17], Petri-nets [56], timed automata [57,35], I/O automata [5], and Büchi automata [39]. Despite their limited power, DFA and Mealy machine learning methods have recently been applied successfully to learn different types of complex systems such as web-services [15], X11 windowing programs [7], network protocols [24,9,22], and Java programs [59,26,46].…”
Section: Software Model Synthesismentioning
confidence: 99%
“…Some more powerful models with learning algorithms include: non-deterministic automata [60,29], probabilistic automata [19,17], Petri-nets [56], timed automata [57,35], I/O automata [5], and Büchi automata [39]. Despite their limited power, DFA and Mealy machine learning methods have recently been applied successfully to learn different types of complex systems such as web-services [15], X11 windowing programs [7], network protocols [24,9,22], and Java programs [59,26,46].…”
Section: Software Model Synthesismentioning
confidence: 99%
“…The FSA could be part of the program specification or could be automatically inferred by monitoring test case execution, as it usually happens in anomaly detection techniques that compare passing and failing executions [3], [7].…”
Section: Ava: Automata Violations Analyzermentioning
confidence: 99%
“…For instance, fault localization techniques exploit the differences between the program spectra of failing and successful executions to localize likely faulty statements [1], [2]. Anomaly detection techniques identify the suspicious events that have been produced in a failed execution to capture the rationale of the problem under investigation [3]- [5].…”
Section: Introductionmentioning
confidence: 99%
“…2 Assume that each of test cases that verifies different execution paths of the function B is given as (1,2) and (3,7), where the first field of each tuple is an input and the second is an output. The behavior of the function B integrated with the function C is represented by the two test cases.…”
Section: Reuse Mechanism Of Characterized Test Casesmentioning
confidence: 99%
“…And it is difficult to write significant test cases that verify interaction among the integrated source codes [1].…”
Section: Introductionmentioning
confidence: 99%