Ch6 Protocol Testing. Outline. Outline. Protocol Conformance Testing. Introduction Concepts Fault models Related definitions General approach
|
|
- Jennifer Lizbeth Wright
- 5 years ago
- Views:
Transcription
1 Outline VI. Protocol Testing Introduction Concepts Fault models Related definitions General approach Methodologies based on FSM T-Method (Transition Tour method) D-Method d(distinguishing i sequences) W-Method (Characterizing sequences) U-Method (Unique input/output sequences) Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Outline Protocol Conformance Testing Introduction Concepts Fault models Related definitions General approach Methodologies based on FSM T-Method (Transition Tour method) D-Method d(distinguishing i sequences) W-Method (Characterizing sequences) U-Method (Unique input/output sequences) To confirm if an implementation conforms to its standard External tester applies a sequence of inputs to IUT and verifies its behavior Issue: preparation of conformance tests in coverage of IUT s all aspects Issue: time required to run test should not be unacceptably long Two main limitations Controllability: the IUT cannot be directly put into a desired state, usually requiring several additional state transitions Observability: prevents the external tester from directly observing the state of the IUT, which is critical for a test to detect errors Formal conformance testing techniques based on FSM Generate a set of input sequences that will force the FSM implementation to undergo all specified transitions Black box approach: only the outputs generated by the IUT (upon receipt of inputs) are observable to the external tester Dept. Electrical & Information Engineering, Computer Engineering Lab 6-3 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-4 Dr. Junzhao Sun
2 Fault Models Fault Model for FSM A fault model is a hypothetical model of what types of faults may occur in an implementation Most fault models are structural, t i.e. the model is a refinement of the specification formalism (or of an implementation model) E.g. mutations of the specification or of a correct implementation It may be used to construct the fault domain used for defining what complete test coverage means E.g. single fault hypothesis (or multiple faults) gp Test suite development for given coverage objective Formalization of "test purpose" For existing test suite: coverage evaluation and optimization Diagnostics A fault model is useful for the following problems: Output fault: the machine provides an output different from the one specified by the output function Transfer fault: the machine enters a different state than that specified by the transfer function Transfer faults with additional states: number of states of the system is increased by the presence of faults, additional states is used to model certain types of errors Additional or missing transitions: one basic assumption is that the FSM is deterministic and completely defined (fully specified). So the faults occur when it turns out to be non-deterministic and/or incompletely (partially) specified Dept. Electrical & Information Engineering, Computer Engineering Lab 6-5 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-6 Dr. Junzhao Sun Fault Models for FIFO Queue and Petri Nets FSM with several FIFO input queues Ordering fault: FIFO ordering is not preserved, or in case of multiple input queues, some input event enters a wrong input queue Maximum length fault: the maximum length implemented is less than the one specified, or if an input event gets lost while queue is not overflow Flow control fault: errors of ordering or of loss occur, in case the number of submitted input events overflows the maximum queue length specified Petri Nets Input or output arc fault: one of the input or output arcs is connected to the wrong place, missing, or exists in addition to those specified Missing or additional transition: the number of transitions is not the same as in the specification FSM Related Definitions (/) Directed graph G=(V, E) representing FSM M Set of vertices V = {v, v,, v n} represents the set of states S in M Directed edge (v i, v j) E represent a transition from state s i to state s j in M An edge in G is represented by a triple (v i, v j; L), L=a k/o l is the input/output operation corresponding to the transition from s i to s j in M Some other definitions & assumptions Deterministic FSM: predictable behavior in a given state for a given input Strongly connected: for each state pair (s i, s j) there is a transition path going from s i to s j, I.e. each state can be reached from any other state Fully specified: form each state it has a transition for each input symbol. Otherwise partially specified Minimal: the number of states of M is less than or equal to the number of states of any equivalent machine Dept. Electrical & Information Engineering, Computer Engineering Lab 6-7 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-8 Dr. Junzhao Sun
3 FSM Related Definitions (/) Transition Level Approach Start state s 0 S, usually the state when power-up Often, there is a special input taking M to state s 0 from any other state with a single transition. In this case, M is said to have the reset capability and the input which performs the reset is denoted by ri Sequences for testing A test subsequence of M is a sequence of input symbols for testing either a state or a transition of M A β-sequence for M is a concatenation of test subsequences for testing all transitions of M A test sequence for M is a sequence of input symbols which can be used in testing conformance of implementations of M against the specification of M An optimize test sequence is a test sequence such that no subsequence of it is completely contained in any other subsequence So, the problem is how to obtain a optimize test sequence for M Dept. Electrical & Information Engineering, Computer Engineering Lab 6-9 Dr. Junzhao Sun The methods for protocol conformance test sequence generation Produce a test sequence which checks the correctness of each transition of the FSM implementation By no means exhaustive, I.e. no guarantee to exhibit correct behavior given every possible input sequence. The intent is to design a test sequence which guarantees beyond a reasonable doubt Three basic steps for checking a transition (s i, s j; L), L=a k/o l Step : The FSM implementation is put into state s i; (e.g. reset+transfer) Difficulty in realizing this is due to the limited controllability of the implementation Step : Input a k is applied and the output is checked to verify that it is o l, as expected; Step 3: The new state of the FSM implementation is checked to verify that it is s j, as expected Difficulty in verifying this is due to the limited observability of the implementation Dept. Electrical & Information Engineering, Computer Engineering Lab 6-0 Dr. Junzhao Sun Outline T-Method: Transition Tour Method Introduction Concepts Fault models Related definitions General approach Methodologies based on FSM T-Method (Transition Tour method) D-Method d(distinguishing i sequences) W-Method (Characterizing sequences) U-Method (Unique input/output sequences) For a given FSM S, a transition tour is a sequence which takes the FSM S from the initial state s 0, traverses every transition at least once, and returns to the initial state s 0. Straightforward and simple scheme New state of the FSM is not checked Fault detection power Detects all output errors There is no guarantee that all transfer errors can be detected The problem of generating a minimum-cost i ttest tsequence using the transition tour method is equivalent to the so-called Chinese Postman problem in graph theory First studied by Chinese mathematician Kuan Mei-Ko ( 管梅谷 ) in 96 Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun
4 T-Method Example T-Method Example The specification S. A transition tour is a,a,a,b,b,b The implementation I contains an output error. Our transition tour will detect it. The implementation I contains an transition error. Our transition tour will not detect it. 5 a/z 3 4 b/z A minimum-cost transition tour of the FSM is (including reset edges), starting from state : r, a, r, c, a, b, b, r, c, r, c, a, b, r, c, a, c, b, a, c, a, r, c, b, a, a Dept. Electrical & Information Engineering, Computer Engineering Lab 6-3 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-4 Dr. Junzhao Sun T-Method Example 3 0 A/0 4 A/0 A/0 3 B/0 A transition tour sequence is : B, A, B, A, B, A, A, A, A, A, A, A, B, B 0, 0, 3, 3, 4, 0, 3, 4,,, 4,,, (not return to 0, but traverse all the transitions) D-Method: Distinguishing Sequences A sequence of inputs is a distinguishing sequence (DS) for an FSM S, if the output sequence produced by the FSM S in response to the input sequence is distinct for each initial state A DS is used as a state identification sequence A DS is a useful tool for achieving Step 3 in checking the new state Fault detection power Detects all output errors Detects all transfer errors Two severe drawbacks In practice, very few FSMs actually possess a DS Even if an FSM does have a DS, the upper bound on the length of the DS will be too large to be useful in general The requirement is too strong (leading to W- & U- methods ) Dept. Electrical & Information Engineering, Computer Engineering Lab 6-5 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-6 Dr. Junzhao Sun
5 D-Method Example D-Method Example The specification S. A distinguishing sequence is: b,b If we apply it from: - state, we obtain y,y - state, we obtain y,x - state 3, we obtain x,y A test case which allow the detection of the transfer error is: a,b,b,b If we apply it from the initial state of: - the specification, we obtain x,x,y,y - the implementation, we obtain x,x,x,x Definitions to be used for other methods as well. The test cases (β -sequences) are: (no reset) state t : a,b,b bb b,b,b state : b,a,b,b b,b,b,b State 3: a,a,b,b a,b,b,b Test case structure corresponding to 3-step: preamble, tested transition, state identification Transfer sequence (Preamble): the minimumcost (shortest path) input sequence taking FSM fro one state to another. Dept. Electrical & Information Engineering, Computer Engineering Lab 6-7 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-8 Dr. Junzhao Sun D-Method Example 3 D-Method Example 4 DS = a,c,a,, 3 The test cases (β -sequences) are: r,a,c,a(-) r,a,a,c,a r,c,a,c,a r,c,a,b,r,a,c,a (-) 5 b/z r,c,a,b,a,a,c,a r,c,a,b,b,a,c,a a/z r,c,b,r,a,c,a(3-) r,c,b,a,a,c,a r,c,r,a,c,a(4-) r,c,a,a,c,a 4 r,c,b,a,c,a r,c,a,r,a,c,a(5-) r,c,a,a,a,c,a r,c,a,b,a,c,a r,c,a,c,a,c,a Including the testing for reset capability 0 A/0 4 A/0 A/0 3 B/0 DS = B, B The β -sequences are: r, A, B, B r, B, B, B r, A, A, A, A, A, B, B r, A, A, A, A, B, B, B r, A, A, A, A, B, B r, A, A, A, B, B, B r, A, A, B, B r, A, B, B, B r, A, A, A, B, B r, A, A, B, B, B An optimized test sequence constructed from above is: raaaaabbraaaabbb raaabbbraabbbrabbbrbbb Dept. Electrical & Information Engineering, Computer Engineering Lab 6-9 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-0 Dr. Junzhao Sun
6 W-Method: Characterizing Sequences W-Method Example For FSMs that do not possess a DS, W-Method defines partial DS each of which distinguishes a state si from a subset of the remaining states instead of from every state of the FSM The states of the FSM are first partitioned into blocks which can be distinguished by observing the sequence of outputs produced by a sequence of inputs Each block is subsequently partitioned into distinguishable sub-blocks, and so on, until each block consists of exactly one state Main idea is to iteratively find a DS for each subset To identify a state (for step 3) Applying an input sequence Returning to the state via a transfer sequence Applying a second input sequence, and so on The complete set of such input sequences for an FSM is called the characterizing set Attach each CS in the set to the end of each transfer sequence 0 A/0 4 A/0 A/0 3 B/0 For the input sequence Acs = A,A, the response is identical for states and 3 (0), but is distinct from that for states 0(00), (), 4(0). Another input sequence Acs = B is distinct for states (0) and 3(). Therefore, Acs is required to identify states 0,, 4, and two input sequences Acs and Acs, along with appropriate transfer sequences, are required to identify states and 3. I.e. W = {AA, B} Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun W-Method Example W-Method Example 3 /0 A D 0/ 0/0 0/0 /0 /0 0/ /0 B C No DS! For the input sequence Acs = 0,,0, the response is identical i for states C and D (0), but is distinct from that for states A(000) and B(00). Another input sequence Acs =, 0 is distinct for states C(00) and D(0). Therefore, Acs is required to identify states A and B, and two input sequences Acs and Acs, along with appropriate transfer sequences, are required to identify states C and D. I.e. W = {00, 0} Dept. Electrical & Information Engineering, Computer Engineering Lab 6-3 Dr. Junzhao Sun b/e c/e b/f a/e a/f 3 a/f c/e b/f c/f A characterizing set W = {a, b} - for state : a/e, b/f - for state : a/f, b/f - for state 3: a/f, b/e The β -sequences generated are: r,a r,b r,a,a r,a,b r,b,a r,b,b r,c,a, r,c,b, r,b,a,a r,b,a,b r,b,b,a r,b,b,b r,b,c,a r,b,c,b r,c,a,a r,c,a,b r,c,b,a r,c,b,b r,c,c,a r,c,c,b Dept. Electrical & Information Engineering, Computer Engineering Lab 6-4 Dr. Junzhao Sun
7 U-Method: Unique Input/Putout Sequences U-Method Example In DS and CS, requirement of state identification is too strong Answer the question of what is the current state of the implementation? For testing it is sufficient to know an error has been detected UIO sequence of a state of a FSM An I/O behavior that is not exhibited by any other state of the FSM Answer the question of is the implementation currently in state x? Advantages against DS & CS Cost is never more than DS and in practice is usually much less (shorter) Nearly all FSMs have UIO sequences for each state DS same for all states; UIO sequence normally different for each state To check state s by using UIO sequence of s Apply input part of UIO, compare output sequence with the expected one If the same, then the FSM is in the state s; otherwise, not in the state s If not in state s, no information about the identity of the actual state s The UIO sequences are: - state :, - state :, - state 3: The β -sequences generated by U-Method are: r,a,b r,a,a r,b,a,a r,b,a,a,b r,b,b,a r,a,a,a,a r,a,b,a,b Dept. Electrical & Information Engineering, Computer Engineering Lab 6-5 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-6 Dr. Junzhao Sun U-Method Example U-Method Example 3 3 The UIO sequences are: state :, state : state 3:,a/z state 4: b/z state 5: The minimum-cost test sequence 5 b/z generated by U-Method are: a/z r,a,c,a, a,c,a, r,c,a, (5-) c,b, a,c,a, b,b, a,b, b,a,a, r,c,a, (-) a,c,b, r,c,a, (3-) a,c,r,c,a, (4-) a,c,a,b, 4 r,c,a, (-) a,c,b,a,a Including the testing for reset capability 0 A/0 4 A/0 A/0 3 B/0 The UIO sequences are: state 0: B/null state :, state : B/0 state 3:, state 4:,A/0 The β -sequences are: r,a,b,b r,b,b r,a,a,a,a,a,a,a r,a,a,a,a,b,b r,a,a,a,a,a,a r,a,a,a,b,b,b r,a,a,a,a r,a,b,b,b r,a,a,a,b r,a,a,b,b An optimized test sequence is: raaaaaaaraaaabbraaabbbraabbrab BBrBB Dept. Electrical & Information Engineering, Computer Engineering Lab 6-7 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-8 Dr. Junzhao Sun
8 Analysis References Fault Testing Coverage Fault coverage for D-, W-, and U-methods is better than of T-method Fault coverage for D-, W-, and du-methods are the same Summary All of these four methods assume minimal, strongly connected and fully specified Mealy FSM model of protocol entities On average, T-method produces the shortest test sequence, W-method the longest. D- and U- methods generate test sequence of comparable lengths T-method test sequences are able to detect output faults but not transition D-, W-, and U-methods are capable of detecting all kinds of faults and give the same performance. U-method attracts more and more attentions and there are several approaches based on the basic idea with some improvements R. Dssouli and F. Khendek, Test development for distributed system, 000, R. Lai, A survey of communication protocol testing. Elsevier Journal of Systems and Software, 6, 00: -46 G.V. Bochmann and A. Petrenko, Protocol testing: review of methods and relevance for software testing, Proc. ACM ISSTA, Seattle Washington, USA, 994: 09-4 A.T. Dahbura, K.K. Sabnani, and M.U. Uyar, Formal methods for generating g protocol conformance test sequences, Proceedings of the IEEE, vol. 78, no. 8, 990: D.P. Sidhu and T.-K. Leung, Formal methods for protocol testing: a detailed study, IEEE Trans. Software Engineering, vol. 5, no. 4, 989: Dept. Electrical & Information Engineering, Computer Engineering Lab 6-9 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-30 Dr. Junzhao Sun
Université de Montréal
Diagnosing Multiple Faults in Finite State Machines by A. Ghedamsi, G.v. Bochmann and R. Dssouli Publication # 859 Département d'informatique et de recherche opérationnelle Université de Montréal Janvier
More informationCommunication Protocols Testability Improvement by Narrow Input/Output (NIO) Sequences
Communication Protocols Testability Improvement by Narrow Input/Output (NIO) Sequences Tao Huang and Anthony Chung School of Computer Science, Telecommunications and Information Systems DePaul University
More informationModel-Based Testing. (DIT848 / DAT260) Spring Lecture 10 FSMs, EFSMs and ModelJUnit
Model-Based Testing (DIT848 / DAT260) Spring 2015 Lecture 10 FSMs, EFSMs and ModelJUnit Gerardo Schneider Department of Computer Science and Engineering Chalmers University of Gothenburg 1 Outline The
More informationPart I: Preliminaries 24
Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................
More informationTest Path Selection Based on Effective Domains*
Abstract Test Path Selection Based on Effective Domains* In this papec a method is proposed to produce test paths that check both dataflow and controlflow for a protocol specijied in the Extended Finite
More informationFault Management using Passive Testing formobileipv6networks
Fault Management using Passive Testing formobileipv6networks Raymond E. Miller Khaled A. Arisha Department of Computer Science Honeywell International Inc. University of Maryland, 7 Columbia Gateway Drive
More informationOn Fault Coverage of Tests for Finite State Specifications
On Fault Coverage of Tests for Finite State Specifications A. Petrenko and G. v. Bochmann Département d'informatique et de Recherche Opérationnelle, Université de Montréal, CP. 6128, Succ. Centre-Ville,
More informationCS402 Theory of Automata Solved Subjective From Midterm Papers. MIDTERM SPRING 2012 CS402 Theory of Automata
Solved Subjective From Midterm Papers Dec 07,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 MIDTERM SPRING 2012 Q. Point of Kleen Theory. Answer:- (Page 25) 1. If a language can be accepted
More informationChapter 4: Regular Expressions
CSI 3104 /Winter 2011: Introduction to Formal Languages What are the languages with a finite representation? We start with a simple and interesting class of such languages. Dr. Nejib Zaguia CSI3104-W11
More informationAbstract This thesis presents a mathematical model for test selection problem in protocol conformance testing, the goal of which is to select a test s
Budapest University of Technology and Economics Department of Telecommunication and Telematics Conformance Test Suite Optimization PhD thesis Tibor Csöndes Advisors Dr. Katalin Tarnay dr. Gyula Csopaki
More informationMultiple Choice Questions
Techno India Batanagar Computer Science and Engineering Model Questions Subject Name: Formal Language and Automata Theory Subject Code: CS 402 Multiple Choice Questions 1. The basic limitation of an FSM
More informationCHAPTER TWO LANGUAGES. Dr Zalmiyah Zakaria
CHAPTER TWO LANGUAGES By Dr Zalmiyah Zakaria Languages Contents: 1. Strings and Languages 2. Finite Specification of Languages 3. Regular Sets and Expressions Sept2011 Theory of Computer Science 2 Strings
More informationDepartment of Computer Science San Marcos, TX Report Number TXSTATE-CS-TR Ngozi I. Ihemelandu Carl J. Mueller
Department of Computer Science San Marcos, TX 78666 Report Number TXSTATE-CS-TR-2011-26 THE INTRACTABILITY OF FINITE STATE MACHINE TEST SEQUENCES Ngozi I. Ihemelandu Carl J. Mueller 2011-01-03 T A B L
More informationUsing Finite State Machine at the Testing of Network Protocols
Australian Journal of Basic and Applied Sciences, 5(10): 956-960, 2011 ISSN 1991-8178 Using Finite State Machine at the Testing of Network Protocols 1 Ashraf Abdel-Karim Helal Abu-Ein, 2 Hazem (Moh'd Said)
More informationLec-5-HW-1, TM basics
Lec-5-HW-1, TM basics (Problem 0)-------------------- Design a Turing Machine (TM), T_sub, that does unary decrement by one. Assume a legal, initial tape consists of a contiguous set of cells, each containing
More informationCMPSCI 521/621 HW6 Solutions
CMPSCI 521/621 HW6 Solutions Problem 1 (based on Xiang Zhao s solution). The node labels are an ordered pair that indicates the location of the program counter in the two different tasks. The first element
More informationCE 371 Surveying ANGLE MEASURING_3
CE 371 Surveying ANGLE MEASURING_3 Dr. Ragab Khalil Department of Landscape Architecture Faculty of Environmental Design King AbdulAziz University Room LIE15 Overview 2/20 Deflection Angle Measurement
More informationThe paper provides an inventory of various fault models used for speciæcationbased hardware and software testing. Various types of speciæcations are c
Fault Model-Driven Test Derivation from Finite State Models: Annotated Bibliography Alexandre Petrenko Centre de Recherche Informatique de Montreal ècrimè, 550 Sherbrooke West, Suite 100, Montreal, H3A
More informationAutomata Theory TEST 1 Answers Max points: 156 Grade basis: 150 Median grade: 81%
Automata Theory TEST 1 Answers Max points: 156 Grade basis: 150 Median grade: 81% 1. (2 pts) See text. You can t be sloppy defining terms like this. You must show a bijection between the natural numbers
More informationOn Code Coverage of Extended FSM Based Test Suites: An Initial Assessment
On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment Khaled El-Fakih 1, Tariq Salameh 1, and Nina Yevtushenko 2 1 American University of Sharjah, Sharjah, UAE {Kelfakih,b00046306}@aus.edu
More informationGraph Theory. Part of Texas Counties.
Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.
More informationVerification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1
Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should
More informationNEW STABILITY RESULTS FOR ADVERSARIAL QUEUING
NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.
More informationAn Efficient Method for Multiple Fault Diagnosis
An Efficient Method for Multiple Fault Diagnosis Khushboo Sheth Department of Electrical and Computer Engineering Auburn University, Auburn, AL Abstract: In this paper, failing circuits are analyzed and
More informationMatching Theory. Figure 1: Is this graph bipartite?
Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to
More informationLexical Analysis. Dragon Book Chapter 3 Formal Languages Regular Expressions Finite Automata Theory Lexical Analysis using Automata
Lexical Analysis Dragon Book Chapter 3 Formal Languages Regular Expressions Finite Automata Theory Lexical Analysis using Automata Phase Ordering of Front-Ends Lexical analysis (lexer) Break input string
More informationCompiler Construction
Compiler Construction Exercises 1 Review of some Topics in Formal Languages 1. (a) Prove that two words x, y commute (i.e., satisfy xy = yx) if and only if there exists a word w such that x = w m, y =
More informationSection 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected
Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected graph G with at least 2 vertices contains at least 2
More informationSlides for Faculty Oxford University Press All rights reserved.
Oxford University Press 2013 Slides for Faculty Assistance Preliminaries Author: Vivek Kulkarni vivek_kulkarni@yahoo.com Outline Following topics are covered in the slides: Basic concepts, namely, symbols,
More informationProof Techniques Alphabets, Strings, and Languages. Foundations of Computer Science Theory
Proof Techniques Alphabets, Strings, and Languages Foundations of Computer Science Theory Proof By Case Enumeration Sometimes the most straightforward way to prove that a property holds for all elements
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More informationA New Optimal State Assignment Technique for Partial Scan Designs
A New Optimal State Assignment Technique for Partial Scan Designs Sungju Park, Saeyang Yang and Sangwook Cho The state assignment for a finite state machine greatly affects the delay, area, and testabilities
More informationEvaluation of test coverage for embedded system testing
Evaluation of test coverage for embedded system testing Jinsong Zhu, Son T. Vuong Department of Computer Science University of British Columbia Vancouver, B.C., Canada V6T lz4 Samuel T. Chanson Department
More informationTest Design Techniques ISTQB (International Software Testing Qualifications Board)
Test Design Techniques ISTQB (International Software Testing Qualifications Board) Minsoo Ryu Hanyang University Testing Process Planning and Control Analysis and Design Implementation and Execution Evaluating
More informationStudying Graph Connectivity
Studying Graph Connectivity Freeman Yufei Huang July 1, 2002 Submitted for CISC-871 Instructor: Dr. Robin Dawes Studying Graph Connectivity Freeman Yufei Huang Submitted July 1, 2002 for CISC-871 In some
More informationTesting Process and Methods. CS 490MT/5555, Spring 2017, Yongjie Zheng
Testing Process and Methods CS 490MT/5555, Spring 2017, Yongjie Zheng Context of Software Testing Verification & Validation Verification: checking that the software conforms to its specification. Validation:
More informationPart 5. Verification and Validation
Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this
More informationTheory of Computations III. WMU CS-6800 Spring -2014
Theory of Computations III WMU CS-6800 Spring -2014 Markov Algorithm (MA) By Ahmed Al-Gburi & Barzan Shekh 2014 Outline Introduction How to execute a MA Schema Examples Formal Definition Formal Algorithm
More informationRegular Expressions. Lecture 10 Sections Robb T. Koether. Hampden-Sydney College. Wed, Sep 14, 2016
Regular Expressions Lecture 10 Sections 3.1-3.2 Robb T. Koether Hampden-Sydney College Wed, Sep 14, 2016 Robb T. Koether (Hampden-Sydney College) Regular Expressions Wed, Sep 14, 2016 1 / 23 Outline 1
More informationThe Restrained Edge Geodetic Number of a Graph
International Journal of Computational and Applied Mathematics. ISSN 0973-1768 Volume 11, Number 1 (2016), pp. 9 19 Research India Publications http://www.ripublication.com/ijcam.htm The Restrained Edge
More informationDecreasing the Diameter of Bounded Degree Graphs
Decreasing the Diameter of Bounded Degree Graphs Noga Alon András Gyárfás Miklós Ruszinkó February, 00 To the memory of Paul Erdős Abstract Let f d (G) denote the minimum number of edges that have to be
More information2 Solution of Homework
Math 3181 Name: Dr. Franz Rothe February 6, 2014 All3181\3181_spr14h2.tex Homework has to be turned in this handout. The homework can be done in groups up to three due February 11/12 2 Solution of Homework
More informationThe testing process. Component testing. System testing
Software testing Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating system
More informationModeling and Testing of Protocol Systems
23 Modeling and Testing of Protocol Systems David Lee Bell Laboratories, Lucent Technologies 600 Mountain Avenue, Murray Hill, NJ 07974 Tel: (908) 582-5872; Fax: (908) 582-5857 E-mail: lee@research.bell-labs.com
More informationCUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS
CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS M. AXTELL, N. BAETH, AND J. STICKLES Abstract. A cut vertex of a connected graph is a vertex whose removal would result in a graph having
More informationCross Clock-Domain TDM Virtual Circuits for Networks on Chips
Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm
More informationGlynda, the good witch of the North
Strings and Languages It is always best to start at the beginning -- Glynda, the good witch of the North What is a Language? A language is a set of strings made of of symbols from a given alphabet. An
More information2010: Compilers REVIEW: REGULAR EXPRESSIONS HOW TO USE REGULAR EXPRESSIONS
2010: Compilers Lexical Analysis: Finite State Automata Dr. Licia Capra UCL/CS REVIEW: REGULAR EXPRESSIONS a Character in A Empty string R S Alternation (either R or S) RS Concatenation (R followed by
More informationChapter 9 Graph Algorithms
Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set
More informationINACTIVE T[ 7,8,12,13,15,20, 25,26,30,32,35] T[ 15,17,19,20,26,28, 30,32,34,35] T[ 9,11,16,18,22,27,33] T[23] T[ 2-6,7,8,25,26,32,35] TOP-UPDATE
GENERATION OF REALIZABLE CONFORMANCE TESTS UNDER TIMING CONSTRAINTS æ M. íumit Uyar y, Mariusz A. Fecko, Adarshpal S. Sethi, Paul D. Amer Computer and Information Science Department University of Delaware,
More informationUNIT I PART A PART B
OXFORD ENGINEERING COLLEGE (NAAC ACCREDITED WITH B GRADE) DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING LIST OF QUESTIONS YEAR/SEM: III/V STAFF NAME: Dr. Sangeetha Senthilkumar SUB.CODE: CS6503 SUB.NAME:
More informationDarshan Institute of Engineering & Technology for Diploma Studies
CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations
More informationFigure 2.1: A bipartite graph.
Matching problems The dance-class problem. A group of boys and girls, with just as many boys as girls, want to dance together; hence, they have to be matched in couples. Each boy prefers to dance with
More informationThe Service-Time Restricted Capacitated Arc Routing Problem
The Service-Time Restricted Capacitated Arc Routing Problem Lise Lystlund Aarhus University Århus, Denmark Sanne Wøhlk CORAL - Centre of OR Applications in Logistics, Aarhus School of Business, Aarhus
More informationLecture 6,
Lecture 6, 4.16.2009 Today: Review: Basic Set Operation: Recall the basic set operator,!. From this operator come other set quantifiers and operations:!,!,!,! \ Set difference (sometimes denoted, a minus
More informationSoftware testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1
Software testing Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles
More informationChapter 4. Relations & Graphs. 4.1 Relations. Exercises For each of the relations specified below:
Chapter 4 Relations & Graphs 4.1 Relations Definition: Let A and B be sets. A relation from A to B is a subset of A B. When we have a relation from A to A we often call it a relation on A. When we have
More informationJNTUWORLD. Code No: R
Code No: R09220504 R09 SET-1 B.Tech II Year - II Semester Examinations, April-May, 2012 FORMAL LANGUAGES AND AUTOMATA THEORY (Computer Science and Engineering) Time: 3 hours Max. Marks: 75 Answer any five
More informationTHE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS
THE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS BY TREVOR EVANS 1. Introduction. We give here a solution of the isomorphism problem for finitely presented algebras in various classes
More informationA Controller Testability Analysis and Enhancement Technique
A Controller Testability Analysis and Enhancement Technique Xinli Gu Erik Larsson, Krzysztof Kuchinski and Zebo Peng Synopsys, Inc. Dept. of Computer and Information Science 700 E. Middlefield Road Linköping
More informationA macro- generator for ALGOL
A macro- generator for ALGOL byh.leroy Compagnie Bull-General Electric Paris, France INTRODUCfION The concept of macro-facility is ambiguous, when applied to higher level languages. For some authorsl,2,
More informationChapter 9 Graph Algorithms
Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a
More informationLOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING
LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING Ieva Zeltmate (a) (a) Riga Technical University, Faculty of Computer Science and Information Technology Department of System Theory and Design ieva.zeltmate@gmail.com
More informationOnline Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors
Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors A. Fabri 1 and P. Recht 2 1 Universität Dortmund a.fabri@wiso.uni-dortmund.de 2 Universität Dortmund p.recht@wiso.uni-dortmund.de
More informationConData: a Tool for Automating Specification-based Test Case Generation for Communication Systems
ConData: a Tool for Automating Specification-based Test Case Generation for Communication Systems Eliane Martins, Selma B.Sabião Institute of Computing State University of Campinas (UNICAMP) {eliane, selmasab}@dcc.unicamp.br
More informationDesign for testability: a step-wise approach to protocol testing
Proc. 10th Int. Workshop on Testing of Communicating Systems (IWTCS 97), Seoul, Sept. 1997, Chapman & Hall, pp. 125-140. Design for testability: a step-wise approach to protocol testing Hartmut König a,
More informationRequest for Comments: 2. 1a1 Logical link 0 will be a control link between any two HOSTs on the network
Network Working Group Request for Comments: 2 Bill Duvall SRI [unknown title] [page 1 missing] 1 LINKS 1a Control Links 1a1 Logical link 0 will be a control link between any two HOSTs on the network 1a1a
More informationMONIKA HEINER.
LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25
More information[IT6004-SOFTWARE TESTING] UNIT 2
1. List the two basic Testing strategies. UNIT 2 Black box testing. White box testing. 2. What are the knowledge sources for Black box testing? Requirements Document specification Domain knowledge Defect
More informationOn Code Coverage of Extended FSM Based Test Suites: An Initial Assessment
On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment Khaled El-Fakih, Tariq Salameh, Nina Yevtushenko To cite this version: Khaled El-Fakih, Tariq Salameh, Nina Yevtushenko. On Code
More informationA Connection between Network Coding and. Convolutional Codes
A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source
More informationNotes for Comp 454 Week 2
Notes for Comp 454 Week 2 This week we look at the material in chapters 3 and 4. Homework on Chapters 2, 3 and 4 is assigned (see end of notes). Answers to the homework problems are due by September 10th.
More information8. The Postman Problems
8. The Postman Problems The Chinese postman problem (CPP) A postal carrier must pick up the mail at the post office, deliver the mail along blocks on the route, and finally return to the post office. To
More informationSIP Conformance Testing Based on TTCN-2 *
TSINGHUA SCIENCE AND TECHNOLOGY ISSN 1007-0214 40/49 pp223-228 Volume 12, Number S1, July 2007 SIP Conformance Testing Based on TTCN-2 * LI Tian ( 李天 ), WANG Zhiliang ( 王之梁 ), YIN Xia ( 尹霞 ) ** Department
More informationCSE 431S Scanning. Washington University Spring 2013
CSE 431S Scanning Washington University Spring 2013 Regular Languages Three ways to describe regular languages FSA Right-linear grammars Regular expressions Regular Expressions A regular expression is
More informationIntroducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence
Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology
More informationINTEGRATED SYSTEM INTEROPERABILITY TESTING WITH APPLICATIONS TO VOIP
INTEGRATED SYSTEM INTEROPERABILITY TESTING WITH APPLICATIONS TO VOIP Nancy Griffeth, Ruibing Hao, David Lee*, Rakesh K. Sinha Bell Laboratories Murray Hill, New Jersey * Bell Laboratories Research China
More informationZhizheng Zhang. Southeast University
Zhizheng Zhang Southeast University 2016/10/5 Lexical Analysis 1 1. The Role of Lexical Analyzer 2016/10/5 Lexical Analysis 2 2016/10/5 Lexical Analysis 3 Example. position = initial + rate * 60 2016/10/5
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationOn the construction of convergent transfer subgraphs in general labeled directed graphs
On the construction of convergent transfer subgraphs in general labeled directed graphs 38th CGTC 7 March 2007 Christopher League * Mohammed Ghriga First, I ll explain what we mean by Convergent Transfer
More informationTrees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.
Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial
More informationDETECTION OF IMAGE PAIRS USING CO-SALIENCY MODEL
DETECTION OF IMAGE PAIRS USING CO-SALIENCY MODEL N S Sandhya Rani 1, Dr. S. Bhargavi 2 4th sem MTech, Signal Processing, S. J. C. Institute of Technology, Chickballapur, Karnataka, India 1 Professor, Dept
More informationSpecifications and Modeling
12 Specifications and Modeling Peter Marwedel TU Dortmund, Informatik 12 Springer, 2010 2012 年 10 月 17 日 These slides use Microsoft clip arts. Microsoft copyright restrictions apply. Hypothetical design
More informationAutomatic Verification of Firewall Configuration with Respect to Security Policy Requirements
Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements Soutaro Matsumoto 1 and Adel Bouhoula 2 1 Graduate School of System and Information Engineering University
More informationFormal Languages and Automata
Mobile Computing and Software Engineering p. 1/3 Formal Languages and Automata Chapter 3 Regular languages and Regular Grammars Chuan-Ming Liu cmliu@csie.ntut.edu.tw Department of Computer Science and
More informationIntroduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation
Introduction to Electronic Design Automation Model of Computation Jie-Hong Roland Jiang 江介宏 Department of Electrical Engineering National Taiwan University Spring 03 Model of Computation In system design,
More informationBinary Relations McGraw-Hill Education
Binary Relations A binary relation R from a set A to a set B is a subset of A X B Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B. We can also represent
More informationPaths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach.
Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach. S. Bessy, Projet Mascotte, CNRS/INRIA/UNSA, INRIA Sophia-Antipolis, 2004 route des Lucioles BP 93, 06902 Sophia-Antipolis
More informationModule 11. Directed Graphs. Contents
Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationDynamically Random Graphs
Dynamically Random Graphs Alexis Byers, Wittenberg University Mallory Reed, Earlham College Laura Rucci, Cabrini College Elle VanTilburg, University of Texas-Austin SUMSRI 203 Miami University July 8,
More information11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions
Introduction Chapter 9 Graph Algorithms graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 2 Definitions an undirected graph G = (V, E) is
More informationLOGIC SYNTHESIS AND VERIFICATION ALGORITHMS. Gary D. Hachtel University of Colorado. Fabio Somenzi University of Colorado.
LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS by Gary D. Hachtel University of Colorado Fabio Somenzi University of Colorado Springer Contents I Introduction 1 1 Introduction 5 1.1 VLSI: Opportunity and
More informationChapter 9 Graph Algorithms
Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)
More informationGenerating Minimum-Cost Fault-Free Rule Bases Using Minimum Spanning Trees
International Journal of Computing & Information Sciences Vol. 4, No. 3, December 2006, On-Line 114 Generating Minimum-Cost Fault-Free Rule Bases Using Minimum Spanning Trees Nabil Arman Pages 114 118
More informationAutomated Generation of Directed Tests for Transition Coverage in Cache Coherence Protocols
Automated Generation of Directed Tests for Transition Coverage in Cache Coherence Protocols Xiaoke Qin and Prabhat Mishra Computer and Information Science and Engineering, University of Florida, USA {xqin,
More informationRELATIONAL REPRESENTATION OF ALN KNOWLEDGE BASES
RELATIONAL REPRESENTATION OF ALN KNOWLEDGE BASES Thomas Studer ABSTRACT The retrieval problem for a knowledge base O and a concept C is to find all individuals a such that O entails C(a). We describe a
More informationKey Grids: A Protocol Family for Assigning Symmetric Keys
Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed
More informationDirection-Length Code (DLC) To Represent Binary Objects
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 29-35 www.iosrjournals.org Direction-Length Code (DLC) To Represent Binary
More informationPBW 654 Applied Statistics - I Urban Operations Research. Unit 3. Network Modelling
PBW 54 Applied Statistics - I Urban Operations Research Unit 3 Network Modelling Background So far, we treated urban space as a continuum, where an entity could travel from any point to any other point
More information