Computer Technology Institute. Patras, Greece. In this paper we present a user{friendly framework and a

Size: px
Start display at page:

Download "Computer Technology Institute. Patras, Greece. In this paper we present a user{friendly framework and a"

Transcription

1 MEASURING SOFTWARE COMPLEXITY USING SOFTWARE METRICS 1 2 Xenos M., Tsalidis C., Christodoulakis D. Computer Technology Institute Patras, Greece In this paper we present a user{friendly framework and a methodology to analyse and interpret the extracted results, while applying software metrics. This methodology could be used for fast and ecient software quality control, without being an expert, regarding the metrics used and the particular software. 1 INTRODUCTION Nowadays a high number of software projects fails to follow their prespecied requirements regarding time, budget and specications. Also their maintenance eort is higher than their implementation eort. Thus, there is a great need for software metrics, in order to aid towards the overcoming of this \software crisis". Though, the results of the software metrics are not used eciently, in order to direct those actions which will lead towards the improvement of the software's quality. This is because the metric's results are not fully analysed and interpreted. In order to preform measurements we use the ATHENA metrics environment, which has already been presented in a former paper /7/. The overall architecture of ATHENA is depicted in gure 1. When measuring a specic programming language the grammar processor (gp) processes its specications described in the language specication le (LSF) and accordingly produces a metrics processor (mp) for this language. Then the metric processor processes source les and produces the RESULTS le, 1 This paper was supported in part by QUICHE Project in the AIM framework 2 Proceedings of the 3rd European Conference on Software Quality, Sponsored by EOQ (European Organization for Quality), Madrid Spain, pp , 1992.

2 RP report GP MP RES GXP graphics LSF source DBP data-base The ATHENA metrics environment Figure 1: The ATHENA metrics environment holding the results of all measurements. The graphics processor (gxp) processes the RESULT le in order to present the results graphically. The report processor (rp) process the RESULT le and generates a report text le. Finally, the database processor (dbp) saves the RESULTS le in a database. The main goal of this paper is to demonstrate how the extracted from ATHENA measurement results could be analysed and interpreted 3.It provides a methodology, used to evaluate software and locate its problem areas. Section 2 includes a brief presentation of the metrics, which were used in this methodology. Section 3 contains the analysis of the metrics, some ways towards interpretation of the results and the methodology. Finally, in section 4, future goals and open problems are briey discussed. 2 PRESENTATION OF METRICS 3 A tool to preform the methodology has also been developed

3 Although ATHENA is a metrics{free 4 environment, in our methodology we use three well{known metrics. These are Halstead's \Software Complexity Measure" /4/, McCabe's \Cyclomatic Complexity Metric" /5/ and Tsai's \Data Structure Complexity Metric" /6/. A brief presentation follows. 2.1 Software Complexity Measure Halstead considers a program as a collection of tokens (operators or operands). The measurements of the program are based on counts of those tokens. Four basic quantities are proposed: n 1 : the number of distinct operators. n 2 : the number of distinct operands. N 1 : the total occurrences of operators. N 2 : the total occurrences of operands. Halstead proposed some additional quantities. Those quantities presented in table 1 are used for the interpretation and the methodology of this paper. Quantity's Name Evaluation Formula Program's Length N = N 1 + N 2 Length's Estimator ^N = n1 log 2 n 1 + n 2 log 2 n 2 Language's Level = N(log 2 n)(2n 2 =n 1 N 2 ) 2 Eort E = Nn 1 N 2 (log 2 n)=(2n 2 ) Time Estimation T = E=S where S 18 Table 1: Halstead's Quantities 2.2 Cyclomatic Complexity Metric 4 We can use any new metric, providing that we will formally describe it

4 sequent. while-do do-while switch if-then-else Various McCabe subgraphs Figure 2: McCabe's statement cases Cyclomatic complexity metric, proposed by McCabe, is used to measure the complexity of a program, as implied by its name. Those measurements take place on the control graph of the program. The cases of the possible statements into a control graph are shown as follows: sequentially executed statements, a While Do statement, a Do While statement, a Switch statement, and an If Then Else statement. All the other commands could derive from the above. The graphs 5 for each one of them are shown at gure 2. McCabe dened the cyclomatic number of a graph as: V (G) = e; n+2p where: e is the number of edges, 5 The control graph for the switch statement is based on our experience using metrics

5 n is the numberofnodes,and p is the number of connecting components. Additionally McCabe dene the essential complexity as: ev = V (g) ; m where m is the number of subgraphs of the control graph, which have a unique input and output node. 2.3 Data Structure Complexity Metric This metric proposed by Tsai counts the complexity of the data structures, used by the program and, therefore, is applicable before the program's implementation. To apply this metric, the measured software must uses data structures D of the form: D :: F(D 1 ::: D n ), with n 1 where F is the operator 6 which builds the data structure. D i are references into previously dened data structures, which are used to build the structure D while n is their number. Tsai's metric takes as input a series of data structures Q of the form: Q = fd i jd i :: F j (D s1 ::: D sk )g, with 1 k(i) where F j are the data structure buildoperators and D s x (1 x k(i)) are references into previously dened data structures. First of all, a multigraph 7, which shows the references into the structure denitions is built. Afterwards, the graph is reduced, by deleting the nodes with unique input and output. Then the strongly connected components are located and a monomial for each one of them is dened as: S(K)=(V + E)x L 6 Internal function 7 In order to allow circular denitions

6 S=4x S=6x^2 S=6x^4 Various Tsai multigraphs Figure 3: Tsai's example graphs where V is the number of nodes of the component, E is the number of edges and L is the number of simple circular paths into this component. We dene an ordering relation as follows: If K i 6= K j, then retains K i K j If and only if there is a path from some node of K j to a node of K i It can be easily proven that is a partial ordering. There is a non empty set M: M = fk i j not exist K j : K j K i g Now, for each component, a polynomial of its complexity can be calculated as follows: S(K)= X 8KiK fc(k i )g + S(K) This polynomial expresses the complexity of each data structure used by the program. Examples of graphs and their complexity are illustrated in gure 3. 3 INTERPRETATION OF METRICS AND

7 PRESENTATION OF THE METHODOLOGY Before presenting the methodology, is important to interpret the metric results. In the following section we will combine all the partial interpretations, in order to evaluate software's quality. A brief presentation of the interpretation of the most signicant quantities follows. n 1 : The number of unique operators is limited (depending upon the programming language). It tends to stabilise its value while the program's length grows. Since each Goto label is a unique operator, the value of n1, when exceeds the average, in most cases, means non{structured programming with low quality. N and ^N : N counts the actual program's length. On the other hand, ^N ignores any code impurities. Thus, correlation of them indicates a program without code impurities. Actually, things are not so simple, because this correlation is eected by the program's size. Christensen's /1/ measurements shown the best correlation for modules between 2000 to 4000 tokens. Additionally, our measurements indicate the best correlation for subroutines, ranging between 300 to 800 tokens. : The language's level () is expected to be similar for every program written in the same language. But that does not occur. In fact, it depends upon the use of the language by the individual programmer. Existing estimated averages for, in every commonly used language, comparable to each resulting, for every measured program, could give an evaluation of \how well is the language used". Eort and Time : Funami's /3/ measurements indicate a 98% correlation between the program's eort and the number of bugs, as this was measured during the program's testing phase. Additionally, our experiments shown great correlation between estimated and real time.

8 V (g) and ev : As V(g) grows, the program's complexity grows and in most cases its quality decreases. Measurements, performed by McCabe show the number 10 as an upper limit for the cyclomatic complexity of a software's part. A program with V (g) >> 10 its better to get restructured, in order to become less complex. Every program's cyclomatic complexity could be reduced 8 until V(g)=ev. Additionally, could be proven, that the essential complexity of every structured program is equal to one. This means that structured programs could be reduced down to any cyclomatic complexity we have chosen (having minimum one). But, for the non{structured programs, we have the essential complexity as an indicator, to show their reducing ability down to an accepted value. Tsai's polynomials : In the previous section, metric results are polynomials of the form: a 0 + a 1 x + :::+ a n x n. By examining the data structure types that can occur in it, a program is distinguished, according to its data structure types, into two basic categories: a) Non{circular data structures : These are data structures which do not consist of recursive (circular) data denitions. b) Circular data structures : These are recursively dened data structures, which denition contains circular references. In Tsai's metric, exponents measure complexity due to circular denitions, and coecients measure complexity due to non{circular denitions. 3.1 The Methodology An expert scientist could view the tables, which consist of a program's metric results and evaluate its quality. But it uses his experience, rather than an automated method. To develop a program, which will preform the 8 The value of ev shows us the best complexity which could be achieved by breaking the program down to subroutines.

9 MODULE measurements analysis routine 1 Halstead results routine 2 McCabe results Analysis routine N OUTPUT Tsai results The measuring process Figure 4: The measuring process same task, was very dicult. There are many dierent cases to be tested, resulting a very complex program. In this section we will present the main idea of the used methodology, without entering in technical details. The measuring process is illustrated in gure 4. It shows how the three used metrics are applied and how their results are collected for each module. Halstead's and McCabe's metrics are applied in every routine and Tsai's metric in every module. Then, an evaluation of the module's quality takes place. This process is repeated for every module. The overall results are statistically analysed, primarily routine by routine and then module by module. Thus, a conclusion about the overall program's quality could be drawn and additionally its problematic modules and routines could be located. The analysis is aided by statistics stored in the database, from previous measurements of other programs. ATHENA environment aided the automation of the methodology, providing the necessary tools. An outlined presentation of this methodology is given in the

10 following steps: Step 1: Apply Halstead's and McCabe's metrics on routine. Store results into database. Step 2: Step 3: Step 4: Repeat step 1 until the end of module. Apply Tsai's metric on module. Store results into database. Repeat steps 1{3 until the end of project. Step 5: Statistically analyse results for every routine. Store results into database. Step 6: Statistically analyse results for every module. Store results into database. Step 7: Interpret the stored results using the output from the statistical analysis. Step 8: Cross-examine the results with those from other projects. Step 9: Conclude about project's quality (using results from steps 5{8). Locate problematic routines and modules. At table 2, the questions asked on every module are presented. Of course, the actual questions are not so simple. The rst 6 questions deal with routine's evaluation and the last one with module's evaluation. The order of the rst six represents the sequence of the automation and the way their results contribute in the nal result. The analysis of the answers, based on the previously presented interpretations, is also not so simple. For instance, when asking \are N and ^N correlated?" you don't answer \Yes" or \No", but a number showing the degree of their correlation. Based on the above analysis, this degree is higher for the pair (N = 25 and ^N =50, with ^N =2N), than the pair (N = 600 and ^N = 800, with ^N = 2 3 N).

11 # Quantity's Name Analysis 1 N is between 300 to 800? 2 V(g) and ev V (g) 10 and ev =1? 3 n 1 is near the average? 4 Nand ^N are correlated? 5 is near the expected one? 6 E and T are in low levels? 7 Tsai's polynomials are simple or complex? Table 2: Simple questions 4 CONCLUSION We have presented three metrics, their interpretation, a methodology to evaluate the quality of software and the environment under which this methodology was automated. The presentation of the methodology has been basically outlined, in order to maintain the paper's size in low levels. Including more metrics in it, is a future goal. To make the automated program simpler is another future goal and is already in progress. REFERENCES /1/ Christensen K., Fitsos G., Smith C. \A Perspective on Software Science" IBM SYST J. Vol. 20. No 4. (1981) /2/ Christodoulakis D., Tsalidis C. \Design Principles of the ATHENA Software Maintainability Tool" Microprocessing and Microprogramming, The Euromicro Journal, Vol. 28. No. 1{5, (1990) /3/ Funami Y., Halstead M. \A Software Physics Analysis of Akiyama's Dubugging Data" Symposium on Computer Software Engineering Polytechnic Institute of New York, (1976) /4/ Halstead M. \Elements of Software Science" Elsevier, New York, (1977)

12 /5/ McCabe T. \A complexity Measure", IEEE Transactions on Software Engineering, Vol. SE{2, No 4, pp. 308{320, (1976) /6/ Tsai W., Lopez M., Rodriguez W., Volonik D. \An Approach to Measuring Data Structure Complexity", IEEE COMPSAC 86, pp. 240{246 (1986) /7/ Tsalidis C., Christodoulakis D., Maritsas D. \ATHENA: A Software Measurement and Metrics Environment" Software Maintenance: Research and Practice (1991)

Frama-C's metrics plug-in

Frama-C's metrics plug-in Metrics Frama-C's metrics plug-in 20120901 (Oxygen) Richard Bonichon & Boris Yakobowski CEA LIST, Software Reliability Laboratory, Saclay, F-91191 c 2011 CEA LIST CONTENTS Contents 1 Quick overview 7

More information

Software Metrics and Microcode Development: A Case Study. George Triantafyllosy, Stamatis Vassiliadisz, Jose Delgado-Frias# October 24, 1995

Software Metrics and Microcode Development: A Case Study. George Triantafyllosy, Stamatis Vassiliadisz, Jose Delgado-Frias# October 24, 1995 Software Metrics and Microcode Development: A Case Study George Triantafyllosy, Stamatis Vassiliadisz, Jose Delgado-Frias# October 24, 1995 z Department of Electrical Engineering y IBM Corporation # EE

More information

Anale. Seria Informatică. Vol. XVI fasc Annals. Computer Science Series. 16 th Tome 1 st Fasc. 2018

Anale. Seria Informatică. Vol. XVI fasc Annals. Computer Science Series. 16 th Tome 1 st Fasc. 2018 Anale. Seria Informatică. Vol. XVI fasc. Annals. Computer Science Series. th Tome st Fasc. PERFORMANCE EVALUATION OF IMPROVED COGNITIVE COMPLEXITY METRIC AND OTHER CODE BASED COMPLEXITY METRICS Esther

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

Software Metrics. Lines of Code

Software Metrics. Lines of Code Software Metrics Naveed Arshad Lines of Code The total number of lines of executable code in the software program or module being measured But lines of code could mean anything e.g. count only executable

More information

However, no results are published that indicate the applicability for cycle-accurate simulation purposes. The language RADL [12] is derived from earli

However, no results are published that indicate the applicability for cycle-accurate simulation purposes. The language RADL [12] is derived from earli Retargeting of Compiled Simulators for Digital Signal Processors Using a Machine Description Language Stefan Pees, Andreas Homann, Heinrich Meyr Integrated Signal Processing Systems, RWTH Aachen pees[homann,meyr]@ert.rwth-aachen.de

More information

Finding a winning strategy in variations of Kayles

Finding a winning strategy in variations of Kayles Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

Extra-High Speed Matrix Multiplication on the Cray-2. David H. Bailey. September 2, 1987

Extra-High Speed Matrix Multiplication on the Cray-2. David H. Bailey. September 2, 1987 Extra-High Speed Matrix Multiplication on the Cray-2 David H. Bailey September 2, 1987 Ref: SIAM J. on Scientic and Statistical Computing, vol. 9, no. 3, (May 1988), pg. 603{607 Abstract The Cray-2 is

More information

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax:

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax: Consistent Logical Checkpointing Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 hone: 409-845-0512 Fax: 409-847-8578 E-mail: vaidya@cs.tamu.edu Technical

More information

Document Image Restoration Using Binary Morphological Filters. Jisheng Liang, Robert M. Haralick. Seattle, Washington Ihsin T.

Document Image Restoration Using Binary Morphological Filters. Jisheng Liang, Robert M. Haralick. Seattle, Washington Ihsin T. Document Image Restoration Using Binary Morphological Filters Jisheng Liang, Robert M. Haralick University of Washington, Department of Electrical Engineering Seattle, Washington 98195 Ihsin T. Phillips

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

SNOW 3G Stream Cipher Operation and Complexity Study

SNOW 3G Stream Cipher Operation and Complexity Study Contemporary Engineering Sciences, Vol. 3, 2010, no. 3, 97-111 SNOW 3G Stream Cipher Operation and Complexity Study Ghizlane ORHANOU ghizlane.orhanou@gmail.com Said EL HAJJI elhajji@fsr.ac.ma Youssef BENTALEB

More information

Enhancing Integrated Layer Processing using Common Case. Anticipation and Data Dependence Analysis. Extended Abstract

Enhancing Integrated Layer Processing using Common Case. Anticipation and Data Dependence Analysis. Extended Abstract Enhancing Integrated Layer Processing using Common Case Anticipation and Data Dependence Analysis Extended Abstract Philippe Oechslin Computer Networking Lab Swiss Federal Institute of Technology DI-LTI

More information

Measuring Complexity

Measuring Complexity Measuring Complexity outline why should we measure the complexity of a software system? what might we want to measure? complexity of the source code within a code module between code modules complexity

More information

ACM / /0262 $

ACM / /0262 $ USlNG A COMPETITIVE LEARNING NEURAL NETWORK TO EVALUATE SOFTWARE COMPLEXITY John W. Sheppard William R. Simpson ARINC Research Corporation ABSTRACT With recent advances in neural networks, an increasing

More information

Automated Testing Tool for

Automated Testing Tool for 44 Automated Testing Tool for NATURAL@ Sheung-Iun Hung, Lam-for Kwok, Ken Chee-keung Law Department of Computer Science, City Polytechnic of Hong Kong 83 Tat Chee Avenue, Kowloon, Hong Kong Abstract Traditional

More information

Outline. Computer Science 331. Information Hiding. What This Lecture is About. Data Structures, Abstract Data Types, and Their Implementations

Outline. Computer Science 331. Information Hiding. What This Lecture is About. Data Structures, Abstract Data Types, and Their Implementations Outline Computer Science 331 Data Structures, Abstract Data Types, and Their Implementations Mike Jacobson 1 Overview 2 ADTs as Interfaces Department of Computer Science University of Calgary Lecture #8

More information

i=1 i=2 i=3 i=4 i=5 x(4) x(6) x(8)

i=1 i=2 i=3 i=4 i=5 x(4) x(6) x(8) Vectorization Using Reversible Data Dependences Peiyi Tang and Nianshu Gao Technical Report ANU-TR-CS-94-08 October 21, 1994 Vectorization Using Reversible Data Dependences Peiyi Tang Department of Computer

More information

Frama-C s metrics plug-in

Frama-C s metrics plug-in Metrics Frama-C s metrics plug-in Magnesium-20151002 Richard Bonichon & Boris Yakobowski CEA LIST, Software Reliability Laboratory, Saclay, F-91191 2011 2013 CEA LIST CONTENTS Contents 1 Quick overview

More information

An Interactive Desk Calculator. Project P2 of. Common Lisp: An Interactive Approach. Stuart C. Shapiro. Department of Computer Science

An Interactive Desk Calculator. Project P2 of. Common Lisp: An Interactive Approach. Stuart C. Shapiro. Department of Computer Science An Interactive Desk Calculator Project P2 of Common Lisp: An Interactive Approach Stuart C. Shapiro Department of Computer Science State University of New York at Bualo January 25, 1996 The goal of this

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

Lecture 26. Introduction to Trees. Trees

Lecture 26. Introduction to Trees. Trees Lecture 26 Introduction to Trees Trees Trees are the name given to a versatile group of data structures. They can be used to implement a number of abstract interfaces including the List, but those applications

More information

Network. Department of Statistics. University of California, Berkeley. January, Abstract

Network. Department of Statistics. University of California, Berkeley. January, Abstract Parallelizing CART Using a Workstation Network Phil Spector Leo Breiman Department of Statistics University of California, Berkeley January, 1995 Abstract The CART (Classication and Regression Trees) program,

More information

Routing and Ad-hoc Retrieval with the. Nikolaus Walczuch, Norbert Fuhr, Michael Pollmann, Birgit Sievers. University of Dortmund, Germany.

Routing and Ad-hoc Retrieval with the. Nikolaus Walczuch, Norbert Fuhr, Michael Pollmann, Birgit Sievers. University of Dortmund, Germany. Routing and Ad-hoc Retrieval with the TREC-3 Collection in a Distributed Loosely Federated Environment Nikolaus Walczuch, Norbert Fuhr, Michael Pollmann, Birgit Sievers University of Dortmund, Germany

More information

Basel Dudin

Basel Dudin Measuring Internal Product Attributes: Size Basel Dudin dudinbk@mcmaster.ca Outline Aspects of Software Size Length (LOC) Lines of Code Halstead s Theory Functionality Unadjusted Function Point Count (UFC)

More information

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst An Evaluation of Information Retrieval Accuracy with Simulated OCR Output W.B. Croft y, S.M. Harding y, K. Taghva z, and J. Borsack z y Computer Science Department University of Massachusetts, Amherst

More information

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have been red in the sequence up to and including v i (s) is deg(v)? s(v), and by the induction hypothesis this sequence

More information

Software Metrics and Design Principles. What is Design?

Software Metrics and Design Principles. What is Design? Software Metrics and Design Principles Chapters 5,8 What is Design? Design is the process of creating a plan or blueprint to follow during actual construction Design is a problem-solving activity that

More information

OO Development and Maintenance Complexity. Daniel M. Berry based on a paper by Eliezer Kantorowitz

OO Development and Maintenance Complexity. Daniel M. Berry based on a paper by Eliezer Kantorowitz OO Development and Maintenance Complexity Daniel M. Berry based on a paper by Eliezer Kantorowitz Traditional Complexity Measures Traditionally, Time Complexity Space Complexity Both use theoretical measures,

More information

The temporal explorer who returns to the base 1

The temporal explorer who returns to the base 1 The temporal explorer who returns to the base 1 Eleni C. Akrida, George B. Mertzios, and Paul G. Spirakis, Department of Computer Science, University of Liverpool, UK Department of Computer Science, Durham

More information

ClearSQL Code Metrics Inside

ClearSQL Code Metrics Inside THE CODE METRICS FEATURE DETERMINES THE COMPLEXITY OF CODE AND HIGH- LIGHTS COMPLEX AND HARD TO MAINTAIN CODE BY FLAGGED METRICS. IT IDENTI- FIES POTENTIAL PROBLEM AREAS BASED ON COMPLEXITY, SIZE AND MODULARITY.

More information

MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS

MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS N. Kannadhasan and B. Uma Maheswari Department of Master of Computer Applications St. Joseph s College of Engineering, Chennai,

More information

User Interface Modelling Based on the Graph Transformations of Conceptual Data Model

User Interface Modelling Based on the Graph Transformations of Conceptual Data Model User Interface Modelling Based on the Graph Transformations of Conceptual Data Model Martin Molhanec Department of e-technology, Faculty of Electrical Engineering Czech Technical University in Prague Technická

More information

Frama-C s metrics plug-in

Frama-C s metrics plug-in Metrics Frama-C s metrics plug-in Sulfur-20171101 Richard Bonichon & Boris Yakobowski CEA LIST, Software Reliability Laboratory, Saclay, F-91191 2011 2017 CEA LIST CONTENTS Contents 1 Quick overview

More information

Risk-based Object Oriented Testing

Risk-based Object Oriented Testing Risk-based Object Oriented Testing Linda H. Rosenberg, Ph.D. Ruth Stapko Albert Gallo NASA GSFC SATC NASA, Unisys SATC NASA, Unisys Code 302 Code 300.1 Code 300.1 Greenbelt, MD 20771 Greenbelt, MD 20771

More information

Evolutionary Decision Trees and Software Metrics for Module Defects Identification

Evolutionary Decision Trees and Software Metrics for Module Defects Identification World Academy of Science, Engineering and Technology 38 008 Evolutionary Decision Trees and Software Metrics for Module Defects Identification Monica Chiş Abstract Software metric is a measure of some

More information

AST: Support for Algorithm Selection with a CBR Approach

AST: Support for Algorithm Selection with a CBR Approach AST: Support for Algorithm Selection with a CBR Approach Guido Lindner 1 and Rudi Studer 2 1 DaimlerChrysler AG, Research &Technology FT3/KL, PO: DaimlerChrysler AG, T-402, D-70456 Stuttgart, Germany guido.lindner@daimlerchrysler.com

More information

Gen := 0. Create Initial Random Population. Termination Criterion Satisfied? Yes. Evaluate fitness of each individual in population.

Gen := 0. Create Initial Random Population. Termination Criterion Satisfied? Yes. Evaluate fitness of each individual in population. An Experimental Comparison of Genetic Programming and Inductive Logic Programming on Learning Recursive List Functions Lappoon R. Tang Mary Elaine Cali Raymond J. Mooney Department of Computer Sciences

More information

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003

Measuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003 Measuring the Vulnerability o Interconnection Networks in Embedded Systems V. Lakamraju, Z. Koren, I. Koren, and C. M. Krishna Department o Electrical and Computer Engineering University o Massachusetts,

More information

CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL

CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL 64 CHAPTER 4 OBJECT ORIENTED COMPLEXITY METRICS MODEL 4.1 INTRODUCTION Customers measure the aspects of the final product to determine whether it meets the requirements and provides sufficient quality.

More information

Frank Mueller. Dept. of Computer Science. Florida State University. Tallahassee, FL phone: (904)

Frank Mueller. Dept. of Computer Science. Florida State University. Tallahassee, FL phone: (904) Static Cache Simulation and its Applications by Frank Mueller Dept. of Computer Science Florida State University Tallahassee, FL 32306-4019 e-mail: mueller@cs.fsu.edu phone: (904) 644-3441 July 12, 1994

More information

such internal data dependencies can be formally specied. A possible approach to specify

such internal data dependencies can be formally specied. A possible approach to specify Chapter 6 Specication and generation of valid data unit instantiations In this chapter, we discuss the problem of generating valid data unit instantiations. As valid data unit instantiations must adhere

More information

perspective, logic programs do have a notion of control ow, and the in terms of the central control ow the program embodies.

perspective, logic programs do have a notion of control ow, and the in terms of the central control ow the program embodies. Projections of Logic Programs Using Symbol Mappings Ashish Jain Department of Computer Engineering and Science Case Western Reserve University Cleveland, OH 44106 USA email: jain@ces.cwru.edu Abstract

More information

Comparing Software Abstractions Baby Steps. Michael Hansen Lab Lunch Talk 2011

Comparing Software Abstractions Baby Steps. Michael Hansen Lab Lunch Talk 2011 Comparing Software Abstractions Baby Steps Michael Hansen Lab Lunch Talk 2011 Comparing Abstractions Need objective comparison method Libraries (OpenGL vs. Direct3D) Language constructs ( -expressions,

More information

Software Component Relationships. Stephen H. Edwards. Department of Computer Science. Virginia Polytechnic Institute and State University

Software Component Relationships. Stephen H. Edwards. Department of Computer Science. Virginia Polytechnic Institute and State University Software Component Relationships Stephen H. Edwards Department of Computer Science Virginia Polytechnic Institute and State University 660 McBryde Hall Blacksburg, VA 24061-0106 Tel: (540)-231-7537 Email:

More information

C1: C2: C3: C4: C5: C6: C7: pop(a,[],ns):- A=empty, NS=[]. pop(n,l,s,os) and 0 C8: N>0 L=[X NL], pop(x,s,ns), NN=N-1, pop(nn,nl,ns,os)

C1: C2: C3: C4: C5: C6: C7: pop(a,[],ns):- A=empty, NS=[]. pop(n,l,s,os) and 0 C8: N>0 L=[X NL], pop(x,s,ns), NN=N-1, pop(nn,nl,ns,os) A Metrics Suite for Concurrent Logic Programs Jianjun Zhao Department of Computer Science and Engineering Fukuoka Institute of Technology 3-10-1 Wajiro-Higashi, Higashi-ku Fukuoka 811-02, Japan zhao@cs.t.ac.jp

More information

ABSTRACT Finding a cut or nding a matching in a graph are so simple problems that hardly are considered problems at all. Finding a cut whose split edg

ABSTRACT Finding a cut or nding a matching in a graph are so simple problems that hardly are considered problems at all. Finding a cut whose split edg R O M A TRE DIA Universita degli Studi di Roma Tre Dipartimento di Informatica e Automazione Via della Vasca Navale, 79 { 00146 Roma, Italy The Complexity of the Matching-Cut Problem Maurizio Patrignani

More information

2 Texts and Text Styles The texts considered for generation in the current stage of the AGILE project are simplied versions of routine passages occurr

2 Texts and Text Styles The texts considered for generation in the current stage of the AGILE project are simplied versions of routine passages occurr Text Structuring in a Multilingual System for Generation of Instructions Ivana Kruij-Korbayova and Geert-Jan M. Kruij Institute of Formal and Applied Linguistics ( UFAL) Faculty of Mathematics and Physics,

More information

Impact of Dependency Graph in Software Testing

Impact of Dependency Graph in Software Testing Impact of Dependency Graph in Software Testing Pardeep Kaur 1, Er. Rupinder Singh 2 1 Computer Science Department, Chandigarh University, Gharuan, Punjab 2 Assistant Professor, Computer Science Department,

More information

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs Journal of Computer Science 2 (12): 872-876, 26 ISSN 1549-3636 26 Science Publications Evaluating the Effect of Inheritance on the Characteristics of Object Oriented 1 Thabit Sultan Mohammed and 2 Hayam

More information

1 Introduction One of the contributions of Java is in its bytecode verier, which checks type safety of bytecode for JVM (Java Virtual Machine) prior t

1 Introduction One of the contributions of Java is in its bytecode verier, which checks type safety of bytecode for JVM (Java Virtual Machine) prior t On a New Method for Dataow Analysis of Java Virtual Machine Subroutines Masami Hagiya Department of Information Science, Graduate School of Science, University of Tokyo hagiyais.s.u-tokyo.ac.jp Abstract

More information

A.java class A f void f() f... g g - Java - - class file Compiler > B.class network class file A.class Java Virtual Machine Loa

A.java class A f void f() f... g g - Java - - class file Compiler > B.class network class file A.class Java Virtual Machine Loa A Type System for Object Initialization In the Java TM Bytecode Language Stephen N. Freund John C. Mitchell Department of Computer Science Stanford University Stanford, CA 94305-9045 ffreunds, mitchellg@cs.stanford.edu

More information

Function in Marvel. Toni A. Bunter

Function in Marvel. Toni A. Bunter Optimization of the Binding Mechanism of the Characteristic Function in Marvel Toni A. Bunter Technical Report CUCS-029-93 COLUMBIA UNIVERSITY 0 Abstract The applied binding mechanism in Marvel 3.1 for

More information

160 M. Nadjarbashi, S.M. Fakhraie and A. Kaviani Figure 2. LUTB structure. each block-level track can be arbitrarily connected to each of 16 4-LUT inp

160 M. Nadjarbashi, S.M. Fakhraie and A. Kaviani Figure 2. LUTB structure. each block-level track can be arbitrarily connected to each of 16 4-LUT inp Scientia Iranica, Vol. 11, No. 3, pp 159{164 c Sharif University of Technology, July 2004 On Routing Architecture for Hybrid FPGA M. Nadjarbashi, S.M. Fakhraie 1 and A. Kaviani 2 In this paper, the routing

More information

A Formal Analysis of Solution Quality in. FA/C Distributed Sensor Interpretation Systems. Computer Science Department Computer Science Department

A Formal Analysis of Solution Quality in. FA/C Distributed Sensor Interpretation Systems. Computer Science Department Computer Science Department A Formal Analysis of Solution Quality in FA/C Distributed Sensor Interpretation Systems Norman Carver Victor Lesser Computer Science Department Computer Science Department Southern Illinois University

More information

15-122: Principles of Imperative Computation, Spring 2016

15-122: Principles of Imperative Computation, Spring 2016 15-122 Programming 3 Page 1 of 8 15-122: Principles of Imperative Computation, Spring 2016 Programming 3: Images Due: Thursday 4 th February, 2016 by 22:00 This programming assignment will have you using

More information

International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE) Volume 1, Issue 2, July 2014.

International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE) Volume 1, Issue 2, July 2014. A B S T R A C T International Journal of Advance Foundation and Research in Science & Engineering (IJAFRSE) Information Retrieval Models and Searching Methodologies: Survey Balwinder Saini*,Vikram Singh,Satish

More information

Outline. 1 About the course

Outline. 1 About the course Outline EDAF50 C++ Programming 1. Introduction 1 About the course Sven Gestegård Robertz Computer Science, LTH 2018 2 Presentation of C++ History Introduction Data types and variables 1. Introduction 2/1

More information

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects A technique for adding range restrictions to generalized searching problems Prosenjit Gupta Ravi Janardan y Michiel Smid z August 30, 1996 Abstract In a generalized searching problem, a set S of n colored

More information

Detecting Code Similarity Using Patterns. K. Kontogiannis M. Galler R. DeMori. McGill University

Detecting Code Similarity Using Patterns. K. Kontogiannis M. Galler R. DeMori. McGill University 1 Detecting Code Similarity Using atterns K. Kontogiannis M. Galler R. DeMori McGill University 3480 University St., Room 318, Montreal, Canada H3A 2A7 Abstract Akey issue in design recovery is to localize

More information

Set Constraints: Results, Applications and. current state of the art, open problems, applications and implementations.

Set Constraints: Results, Applications and. current state of the art, open problems, applications and implementations. Set Constraints: Results, Applications and Future Directions Alexander Aiken Computer Science Division University of California, Berkeley Berkeley, CA 94720-1776 aiken@cs.berkeley.edu Abstract. Set constraints

More information

Conclusions and Future Work. We introduce a new method for dealing with the shortage of quality benchmark circuits

Conclusions and Future Work. We introduce a new method for dealing with the shortage of quality benchmark circuits Chapter 7 Conclusions and Future Work 7.1 Thesis Summary. In this thesis we make new inroads into the understanding of digital circuits as graphs. We introduce a new method for dealing with the shortage

More information

guessed style annotated.style mixed print mixed print cursive mixed mixed cursive

guessed style annotated.style mixed print mixed print cursive mixed mixed cursive COARSE WRITING-STYLE CLUSTERING BASED ON SIMPLE STROKE-RELATED FEATURES LOUIS VUURPIJL, LAMBERT SCHOMAKER NICI, Nijmegen Institute for Cognition and Information, University of Nijmegen, P.O.Box 9104, 6500

More information

Process Allocation for Load Distribution in Fault-Tolerant. Jong Kim*, Heejo Lee*, and Sunggu Lee** *Dept. of Computer Science and Engineering

Process Allocation for Load Distribution in Fault-Tolerant. Jong Kim*, Heejo Lee*, and Sunggu Lee** *Dept. of Computer Science and Engineering Process Allocation for Load Distribution in Fault-Tolerant Multicomputers y Jong Kim*, Heejo Lee*, and Sunggu Lee** *Dept. of Computer Science and Engineering **Dept. of Electrical Engineering Pohang University

More information

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords:

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords: Embedding Protocols for Scalable Replication Management 1 Henning Koch Dept. of Computer Science University of Darmstadt Alexanderstr. 10 D-64283 Darmstadt Germany koch@isa.informatik.th-darmstadt.de Keywords:

More information

Annex A (Informative) Collected syntax The nonterminal symbols pointer-type, program, signed-number, simple-type, special-symbol, and structured-type

Annex A (Informative) Collected syntax The nonterminal symbols pointer-type, program, signed-number, simple-type, special-symbol, and structured-type Pascal ISO 7185:1990 This online copy of the unextended Pascal standard is provided only as an aid to standardization. In the case of dierences between this online version and the printed version, the

More information

instruction fetch memory interface signal unit priority manager instruction decode stack register sets address PC2 PC3 PC4 instructions extern signals

instruction fetch memory interface signal unit priority manager instruction decode stack register sets address PC2 PC3 PC4 instructions extern signals Performance Evaluations of a Multithreaded Java Microcontroller J. Kreuzinger, M. Pfeer A. Schulz, Th. Ungerer Institute for Computer Design and Fault Tolerance University of Karlsruhe, Germany U. Brinkschulte,

More information

[13] D. Karger, \Using randomized sparsication to approximate minimum cuts" Proc. 5th Annual

[13] D. Karger, \Using randomized sparsication to approximate minimum cuts Proc. 5th Annual [12] F. Harary, \Graph Theory", Addison-Wesley, Reading, MA, 1969. [13] D. Karger, \Using randomized sparsication to approximate minimum cuts" Proc. 5th Annual ACM-SIAM Symposium on Discrete Algorithms,

More information

highest cosine coecient [5] are returned. Notice that a query can hit documents without having common terms because the k indexing dimensions indicate

highest cosine coecient [5] are returned. Notice that a query can hit documents without having common terms because the k indexing dimensions indicate Searching Information Servers Based on Customized Proles Technical Report USC-CS-96-636 Shih-Hao Li and Peter B. Danzig Computer Science Department University of Southern California Los Angeles, California

More information

Implementations of Dijkstra's Algorithm. Based on Multi-Level Buckets. November Abstract

Implementations of Dijkstra's Algorithm. Based on Multi-Level Buckets. November Abstract Implementations of Dijkstra's Algorithm Based on Multi-Level Buckets Andrew V. Goldberg NEC Research Institute 4 Independence Way Princeton, NJ 08540 avg@research.nj.nec.com Craig Silverstein Computer

More information

A Case for Two-Level Distributed Recovery Schemes. Nitin H. Vaidya. reduce the average performance overhead.

A Case for Two-Level Distributed Recovery Schemes. Nitin H. Vaidya.   reduce the average performance overhead. A Case for Two-Level Distributed Recovery Schemes Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-31, U.S.A. E-mail: vaidya@cs.tamu.edu Abstract Most distributed

More information

Intersection of sets *

Intersection of sets * OpenStax-CNX module: m15196 1 Intersection of sets * Sunil Kumar Singh This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 We have pointed out that a set

More information

PROJECTION MODELING SIMPLIFICATION MARKER EXTRACTION DECISION. Image #k Partition #k

PROJECTION MODELING SIMPLIFICATION MARKER EXTRACTION DECISION. Image #k Partition #k TEMPORAL STABILITY IN SEQUENCE SEGMENTATION USING THE WATERSHED ALGORITHM FERRAN MARQU ES Dept. of Signal Theory and Communications Universitat Politecnica de Catalunya Campus Nord - Modulo D5 C/ Gran

More information

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD CAR-TR-728 CS-TR-3326 UMIACS-TR-94-92 Samir Khuller Department of Computer Science Institute for Advanced Computer Studies University of Maryland College Park, MD 20742-3255 Localization in Graphs Azriel

More information

Rance Cleaveland The Concurrency Factory is an integrated toolset for specication, simulation,

Rance Cleaveland The Concurrency Factory is an integrated toolset for specication, simulation, The Concurrency Factory Software Development Environment Rance Cleaveland (rance@csc.ncsu.edu) Philip M. Lewis (pml@cs.sunysb.edu) y Scott A. Smolka (sas@cs.sunysb.edu) y Oleg Sokolsky (oleg@ccc.com) y

More information

CSM27 Exercises. Hans Georg Schaathun. November 25, Week In session. 1.2 Weekly Exercises. Security problems brain storming

CSM27 Exercises. Hans Georg Schaathun. November 25, Week In session. 1.2 Weekly Exercises. Security problems brain storming CSM27 Exercises Hans Georg Schaathun November 25, 2008 1 Week 1 1.1 In session Security problems brain storming Classication of brain stormed problems. 1.2 Weekly Exercises 1.2.1 Current Security Problems

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

. The problem: ynamic ata Warehouse esign Ws are dynamic entities that evolve continuously over time. As time passes, new queries need to be answered

. The problem: ynamic ata Warehouse esign Ws are dynamic entities that evolve continuously over time. As time passes, new queries need to be answered ynamic ata Warehouse esign? imitri Theodoratos Timos Sellis epartment of Electrical and Computer Engineering Computer Science ivision National Technical University of Athens Zographou 57 73, Athens, Greece

More information

Abstract The Transmission Control Protocol (TCP) has been shown to yield low utilization over networks with high delay*bandwidth products (DBP). We ha

Abstract The Transmission Control Protocol (TCP) has been shown to yield low utilization over networks with high delay*bandwidth products (DBP). We ha Multiple Data Connection FTP Extensions Mark Allman, Shawn Ostermann fmallman,ostermanng@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University TR-19971 February 13, 1997 This

More information

Acknowledgments 2

Acknowledgments 2 Program Slicing: An Application of Object-oriented Program Dependency Graphs Anand Krishnaswamy Dept. of Computer Science Clemson University Clemson, SC 29634-1906 anandk@cs.clemson.edu Abstract A considerable

More information

Matrices. D. P. Koester, S. Ranka, and G. C. Fox. The Northeast Parallel Architectures Center (NPAC) Syracuse University

Matrices. D. P. Koester, S. Ranka, and G. C. Fox. The Northeast Parallel Architectures Center (NPAC) Syracuse University Parallel LU Factorization of Block-Diagonal-Bordered Sparse Matrices D. P. Koester, S. Ranka, and G. C. Fox School of Computer and Information Science and The Northeast Parallel Architectures Center (NPAC)

More information

Parallel Program Graphs and their. (fvivek dependence graphs, including the Control Flow Graph (CFG) which

Parallel Program Graphs and their. (fvivek dependence graphs, including the Control Flow Graph (CFG) which Parallel Program Graphs and their Classication Vivek Sarkar Barbara Simons IBM Santa Teresa Laboratory, 555 Bailey Avenue, San Jose, CA 95141 (fvivek sarkar,simonsg@vnet.ibm.com) Abstract. We categorize

More information

Creating Meaningful Training Data for Dicult Job Shop Scheduling Instances for Ordinal Regression

Creating Meaningful Training Data for Dicult Job Shop Scheduling Instances for Ordinal Regression Creating Meaningful Training Data for Dicult Job Shop Scheduling Instances for Ordinal Regression Helga Ingimundardóttir University of Iceland March 28 th, 2012 Outline Introduction Job Shop Scheduling

More information

2 The Service Provision Problem The formulation given here can also be found in Tomasgard et al. [6]. That paper also details the background of the mo

2 The Service Provision Problem The formulation given here can also be found in Tomasgard et al. [6]. That paper also details the background of the mo Two-Stage Service Provision by Branch and Bound Shane Dye Department ofmanagement University of Canterbury Christchurch, New Zealand s.dye@mang.canterbury.ac.nz Asgeir Tomasgard SINTEF, Trondheim, Norway

More information

A macro- generator for ALGOL

A macro- generator for ALGOL A macro- generator for ALGOL byh.leroy Compagnie Bull-General Electric Paris, France INTRODUCfION The concept of macro-facility is ambiguous, when applied to higher level languages. For some authorsl,2,

More information

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING

IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING IMPACT OF DEPENDENCY GRAPH IN SOFTWARE TESTING Pardeep kaur 1 and Er. Rupinder Singh 2 1 Research Scholar, Dept. of Computer Science and Engineering, Chandigarh University, Gharuan, India (Email: Pardeepdharni664@gmail.com)

More information

residual residual program final result

residual residual program final result C-Mix: Making Easily Maintainable C-Programs run FAST The C-Mix Group, DIKU, University of Copenhagen Abstract C-Mix is a tool based on state-of-the-art technology that solves the dilemma of whether to

More information

CPSC 320 Sample Solution, Playing with Graphs!

CPSC 320 Sample Solution, Playing with Graphs! CPSC 320 Sample Solution, Playing with Graphs! September 23, 2017 Today we practice reasoning about graphs by playing with two new terms. These terms/concepts are useful in themselves but not tremendously

More information

VISION-BASED HANDLING WITH A MOBILE ROBOT

VISION-BASED HANDLING WITH A MOBILE ROBOT VISION-BASED HANDLING WITH A MOBILE ROBOT STEFAN BLESSING TU München, Institut für Werkzeugmaschinen und Betriebswissenschaften (iwb), 80290 München, Germany, e-mail: bl@iwb.mw.tu-muenchen.de STEFAN LANSER,

More information

B2 if cs < cs_max then cs := cs + 1 cs := 1 ra

B2 if cs < cs_max then cs := cs + 1 cs := 1 ra Register Transfer Level VHDL Models without Clocks Matthias Mutz (MMutz@sican{bs.de) SICAN Braunschweig GmbH, Digital IC Center D{38106 Braunschweig, GERMANY Abstract Several hardware compilers on the

More information

An On-line Variable Length Binary. Institute for Systems Research and. Institute for Advanced Computer Studies. University of Maryland

An On-line Variable Length Binary. Institute for Systems Research and. Institute for Advanced Computer Studies. University of Maryland An On-line Variable Length inary Encoding Tinku Acharya Joseph F. Ja Ja Institute for Systems Research and Institute for Advanced Computer Studies University of Maryland College Park, MD 242 facharya,

More information

Mahsa Vahidi and Alex Orailoglu. La Jolla CA of alternatives needs to be explored to obtain the

Mahsa Vahidi and Alex Orailoglu. La Jolla CA of alternatives needs to be explored to obtain the Metric-Based Transformations for Self Testable VLSI Designs with High Test Concurrency Mahsa Vahidi and Alex Orailoglu Department of Computer Science and Engineering University of California, San Diego

More information

BMVC 1996 doi: /c.10.41

BMVC 1996 doi: /c.10.41 On the use of the 1D Boolean model for the description of binary textures M Petrou, M Arrigo and J A Vons Dept. of Electronic and Electrical Engineering, University of Surrey, Guildford GU2 5XH, United

More information

Siegfried Loer and Ahmed Serhrouchni. Abstract. SPIN is a tool to simulate and validate Protocols. PROMELA, its

Siegfried Loer and Ahmed Serhrouchni. Abstract. SPIN is a tool to simulate and validate Protocols. PROMELA, its DIMACS Series in Discrete Mathematics and Theoretical Computer Science Volume 00, 19xx Creating Implementations from PROMELA Models Siegfried Loer and Ahmed Serhrouchni Abstract. SPIN is a tool to simulate

More information

The 17th International Conference on Safety, Reliability and Security (SAFECOMP 98) LNCS, Heidelberg, 1998

The 17th International Conference on Safety, Reliability and Security (SAFECOMP 98) LNCS, Heidelberg, 1998 The 17th International Conference on Safety, Reliability and Security (SAFECOMP 98) LNCS, Heidelberg, 1998 Verifying Integrity of Decision Diagrams Rolf Drechsler Institute of Computer Science Albert-Ludwigs-University

More information

SORT INFERENCE \coregular" signatures, they derive an algorithm for computing a most general typing for expressions e which is only slightly more comp

SORT INFERENCE \coregular signatures, they derive an algorithm for computing a most general typing for expressions e which is only slightly more comp Haskell Overloading is DEXPTIME{complete Helmut Seidl Fachbereich Informatik Universitat des Saarlandes Postfach 151150 D{66041 Saarbrucken Germany seidl@cs.uni-sb.de Febr., 1994 Keywords: Haskell type

More information

Plaintext (P) + F. Ciphertext (T)

Plaintext (P) + F. Ciphertext (T) Applying Dierential Cryptanalysis to DES Reduced to 5 Rounds Terence Tay 18 October 1997 Abstract Dierential cryptanalysis is a powerful attack developed by Eli Biham and Adi Shamir. It has been successfully

More information

A note on distributed multicast routing in point-to-point networks

A note on distributed multicast routing in point-to-point networks Computers & Operations Research 28 (2001) 1149}1164 A note on distributed multicast routing in point-to-point networks Roman Novak*, Jozye Rugelj, Gorazd Kandus Department of Digital Communications and

More information

Synchronization Expressions: Characterization Results and. Implementation. Kai Salomaa y Sheng Yu y. Abstract

Synchronization Expressions: Characterization Results and. Implementation. Kai Salomaa y Sheng Yu y. Abstract Synchronization Expressions: Characterization Results and Implementation Kai Salomaa y Sheng Yu y Abstract Synchronization expressions are dened as restricted regular expressions that specify synchronization

More information