2012 IEEE 23rd International Symposium on Software Reliability Engineering 2012
DOI: 10.1109/issre.2012.14
|View full text |Cite
|
Sign up to set email alerts
|

Revolution: Automatic Evolution of Mined Specifications

Abstract: Abstract-Specifications mined from execution traces are largely used to support testing and analysis of software applications with little runtime variability. However, when models are mined from applications that evolve at runtime, the resulting models become quickly obsolete, and thus of little support for any testing and analysis activity.To cope with such systems, mined specifications must be consistently updated every time the software changes. In principle, models can be periodically mined from scratch, b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 12 publications
0
16
0
Order By: Relevance
“…When the traces include information about the state of the monitored application, it is possible to apply a style of inference that exploits state information rather than the sequences of the events. Some of the approaches that apply this strategy are ADABU [36], ReAjax [37], and Revolution [38]. These techniques can be extremely effective, but they can be applied only when suitable monitors that can efficiently inspect the state of the application can be implemented.…”
Section: Min−max Epsilon Propertymentioning
confidence: 99%
“…When the traces include information about the state of the monitored application, it is possible to apply a style of inference that exploits state information rather than the sequences of the events. Some of the approaches that apply this strategy are ADABU [36], ReAjax [37], and Revolution [38]. These techniques can be extremely effective, but they can be applied only when suitable monitors that can efficiently inspect the state of the application can be implemented.…”
Section: Min−max Epsilon Propertymentioning
confidence: 99%
“…Particularly, the event instances can be cached and checked against the new traces, new event instances can be mined from the new input traces, and the resulting set of event instances can be re-composed. This approach is not as fine-grained as in [30], but it can be extended to include some of the ideas in that work (e.g., by associating a timestamp with every transition in an event instance to support expiration).…”
Section: Invarimint Limitationsmentioning
confidence: 99%
“…Existing approaches on building finite state models [7,18,32,34,36] use similar state abstraction strategies as used in TLV. The STRAWBERRY tool [7] mines behavior protocols concerning usage of a web service.…”
Section: Related Workmentioning
confidence: 99%
“…KrKa et al [32] use DAIKON to generate a set of possible state invariants and then use SMT solvers to decide the feasibility of possible states (combinations of invariants) and transitions in the abstract model. Revolution [36] mines state based behavior model for systems whose behaviors may evolve with time.…”
Section: Related Workmentioning
confidence: 99%