Shanghai Key Laboratory of Computer Software Testing and Evaluating

Shanghai, China

Shanghai Key Laboratory of Computer Software Testing and Evaluating

Shanghai, China
SEARCH FILTERS
Time filter
Source Type

Shi K.,East China University of Science and Technology | Shi K.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Yu H.-Q.,East China University of Science and Technology | Luo F.,East China University of Science and Technology | Fan G.-S.,East China University of Science and Technology
Huadong Ligong Daxue Xuebao/Journal of East China University of Science and Technology | Year: 2017

In the cloud data center, virtual machine consolidation (VMC) is one of the key technologies for green computing and minimizing cluster power consumption. In the relevant research works, most seek the most reasonable consolidation schemes based on resource utilization and don't consider the stability and availability of PM and co-located virtual machines (VM).In this paper, by analyzing their mutual exclusion conditions, a virtual machine consolidation strategy is proposed, in which both the availability of PM and the mutual exclusivity among VM are considered. Moreover, the cluster server uniform resources reservation approach and the similarity calculation method based on the historical running data of VM are also given. Finally, this strategy is evaluated by collecting and analyzing the running data of VM deployed on the open stack platform. Experiment results show that the proposed method can effectively guarantee the PM availability and avoid the situation that the same type of VM is consolidated in one PM. Hence, this algorithm can reduce the performance degradation of co-located VM and improve the quality of service (Qos). © 2017, East China University of Science and Technology. All right reserved.


Xiao L.,Shanghai University | Xiao L.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Miao H.,Shanghai University | Zhuang W.,Xiamen University of Technology | Chen S.,Xiamen Software Testing Center
Proceedings - 2016 International Conference on Software Analysis, Testing and Evolution, SATE 2016 | Year: 2016

Cluster application is proposed as an efficient approach to improve test case prioritization, Test case in a same cluster are considered to have similar behaviors. In the process of cluster test case, the selection of test case feature and the clusters number have great influence on the clustering results. but to date almost clustering algorithm to improve test case prioritization are selected random clusters number and clustering result are based on one or a few of the code features, the paper propose a new prioritization techniques that not only consider the best clusters number but also produce the best clustering result based on test case multidimensional feature. After clustering, considering the inter-cluster prioritization and intra-cluster prioritization,in order to improve the effectiveness of our approach, the fault prediction value of code corresponding to the test case is used as one of a prioritization weight. Finally,we implemented an empirical studies using an industrial software to illustrate the effectiveness of the test case prioritization techniques. © 2016 IEEE.


Liu P.,Shanghai Business School | Liu P.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Miao H.,Shanghai University
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

This paper presents a theory of test modeling by using regular expressions for software behaviors. Unlike the earlier modeling theory of regular expression, the proposed theory is used to build a test model which can derive effective test sequences easily. We firstly establish an expression algebraic system by means of transition sequences and a set of operators. And we then give the modeling method for behaviors of software under test based on this algebraic system. Some examples are also given for illustrating our test modeling method. Compared with the finite state machine model, the expression model is more expressive for the concurrent system and can provide the accurate and concise description of software behaviors. © 2014 Springer International Publishing Switzerland.


Wang X.,Shanghai University | Wang X.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Miao W.,East China Normal University
2016 IEEE/ACIS 17th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2016 | Year: 2016

Although formal specification is considered as a potential technique for improving the accuracy of requirements documentation and the quality of software product, the difficulty of using formal notations leads to the gap between this technique and the practice of software development. Many approaches for solving this problem were proposed. Most of them provide automatic transformation from informal requirements into formal specifications. However, rather than clarifying and formalizing requirements on the semantic level, they only use syntactic rules to translate between different languages. To handle the challenge, this paper describes an approach for formal specification construction based on pattern knowledge. The knowledge is composed of a set of inter-related specification patterns. Each pattern defines the method for formalizing one kind of function, including derivation knowledge for guiding the clarification of the function and transformation knowledge for formally representing the clarified function. A supporting tool is also described in the paper which derives necessary function details of the intended requirement through interactions by applying the derivation knowledge and transforms these details into formal specifications by applying the transformation knowledge. An experiment on the tool is held and the result shows that the tool can help formalize requirements efficiently and enhance the quality of the resultant formal specifications. © 2016 IEEE.


Chen S.,Shanghai University | Sun D.,Shanghai University | Miao H.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Zeng H.,Shanghai Key Laboratory of Computer Software Testing and Evaluating
Proceedings - Asia-Pacific Software Engineering Conference, APSEC | Year: 2014

Graphical User Interface (GUI) provides a popular and convenient way for the user to freely interact with the systems which makes it widely used in various software applications; it has become an important and indispensable part of today's software. Owing to the characteristics of GUIs different from the traditional software, traditional test techniques and methods cannot satisfy the requirements of GUI testing. Modeling and testing of GUIs-based system is a difficult and challenging work. GUIs-based application is an event-driven application. In GUIs, there exist not only the input events and output events, but also the internal events. In this paper, we identify the input events, output events and internal events and propose an approach to modeling and testing of GUIs-based system using the IOLTS, and input events, output events and internal events are also taken into account. Constraints on events and regular expressions on validation of data are given out. The interactions of GUIs are constructed by the corresponding output events. Finally, tests generation and tests instantiation are given out. © 2014 IEEE.


Chen Y.,Shanghai JiaoTong University | Chen Y.,Shanghai Key Laboratory of Computer Software Testing and Evaluating
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

A SOFL specification can be written with errors inside, leading to an untrustable situation for implementation. Some techniques, such as specification review and testing, have been proposed to detect and remove the errors from the specification as early as possible. Meanwhile these techniques face strong challenges when applied to practice in that they strongly rely on human intelligence to either cautiously design a review task tree for directing the whole review process, or design some test inputs to "run" the specification. The completeness of the review or testing tasks also remains a problem. In this paper we propose a hybrid approach to checking the internal consistency of a SOFL specification. The internal consistency is an important property indicating that the entire specification can work properly. The essential idea of the hybrid approach is to adopt the different strategies to check the different aspects of the specification: concrete or abstract values are used to check the satisfiability of a process, and the symbolic execution and the deduction techniques can be used to check the internal consistency of the specification at the integration level. We also use a Sort-Search example to illustrate the use of the hybrid approach. © 2014 Springer International Publishing Switzerland.


Chen M.,Shanghai JiaoTong University | Chen M.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Cai W.,Autodesk | Ma L.,Shanghai JiaoTong University
Mathematical Problems in Engineering | Year: 2013

The rapid developing of digital content industry calls for online model libraries. For the efficiency, user experience, and reliability merits of the model library, this paper designs a Web 3D model library system based on a cloud computing platform. Taking into account complex models, which cause difficulties in real-time 3D interaction, we adopt the model simplification and size adaptive adjustment methods to make the system with more efficient interaction. Meanwhile, a cloud-based architecture is developed to ensure the reliability and scalability of the system. The 3D model library system is intended to be accessible by online users with good interactive experiences. The feasibility of the solution has been tested by experiments. © 2013 Mingang Chen et al.


Chen Y.,Shanghai JiaoTong University | Chen Y.,Shanghai Key Laboratory of Computer Software Testing and Evaluating
2013 IEEE/ACIS 12th International Conference on Computer and Information Science, ICIS 2013 - Proceedings | Year: 2013

A concurrent program is intuitively associated with probability. In this paper we propose a platform independent approach, called ProbPP, to analyzing the probabilities on the execution paths of the multithreaded programs. The main idea of ProbPP is to calculate the probabilities on the basis of two kinds of probabilities: Primitive Dependent Probabilities (PDPs) representing the control dependent probabilities among the program statements and Thread Execution Probabilities (TEPs) representing the probabilities of threads being scheduled to execute. We have also conducted two preliminary experiments to evaluate the effectiveness and performance of ProbPP, and the experimental results show that ProbPP can provide engineers with acceptable accuracy. © 2013 IEEE.


Liu P.,Shanghai Business School | Liu P.,Shanghai Key Laboratory of Computer Software Testing and Evaluating
2014 IEEE/ACIS 15th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014 - Proceedings | Year: 2014

The paper presents a novel reduction approach to test suite in regression testing. Our approach selects a test case from those redundant test cases with the same rank according to the boundary coverage taken as second coverage criterion. Different from the previous researches for the selection of the second coverage criterion to assist test suite reduction, our approach bases on our empirical point of view that some faults in the program lie on its boundary of the program. Therefore test cases picked by our approach have the higher probability to find software errors. An algorithm is proposed to realize our approach. In addition, we also discuss the relationship between our approach with three traditional heuristics. Through a simple exampke, we illustrate our algorithm for test suite reduction. © 2014 IEEE.


Yang Y.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Cai L.,Shanghai Key Laboratory of Computer Software Testing and Evaluating | Zhang Y.,Shanghai Key Laboratory of Computer Software Testing and Evaluating
2016 IEEE/ACIS 17th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2016 | Year: 2016

This paper briefly analyzes the security mechanism of android platform and describes permission statement and request of android application. According to android permission mechanism and its shortcoming, the android privilege escalation detection technology and attacking principle is mainly analyzed, and privilege escalation attacking model and architecture of application is put forward. Penetration testing tool Drozer is used to detect application permission. Application package and Manifest file is analyzed to obtain privilege elevation vulnerability. At the same time, sensitive combination permission is distinguished to avoid and exclude the use of malicious code. © 2016 IEEE.

Loading Shanghai Key Laboratory of Computer Software Testing and Evaluating collaborators
Loading Shanghai Key Laboratory of Computer Software Testing and Evaluating collaborators