Loading...
  • Home
  • Search Results
1825-1826 of 4327 Papers

REGRESSION TEST FRAMEWORK BASED ON EXTENDED SYSTEM DEPENDENCE GRAPH FOR OBJECT-ORIENTED PROGRAMS

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): ABU BAKAR M.D. SULTAN , AZIM ABD GHANI , SALMI BAHROM , SAMAILA MUSA

Abstract: This paper presents a regression testing framework for object-oriented software based on extended system dependence graph model of the affected program. The approach is based on semantic analysis of the code. The goal is to identify changes in a method’s body due to data dependence, control dependence and dependent due to object relation such as inheritance and polymorphism. To find the affected statements due to changes in the program, we used affected statement as slicing criterion to performed slicing on the constructed graph. The methods affected are determined by analysis of the ESDG based on the affected statements. Test cases that execute the affected methods are selected from an existing test suite. New test cases are generated when necessary. The selected test cases are prioritized by assigning weight to the affected methods. A case study will be reported to provide evidence of the feasibility of the approach and its benefits in increasing the rate of fault detection and reduc

  • Publication Date: 09-Mar-2014
  • DOI: 10.15224/978-1-63248-000-2-45
  • Views: 0
  • Downloads: 0

CLOUD COMPUTING SECURITY ISSUES AND MEASURES

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER SCIENCE AND ELECTRONICS ENGINEERING
Author(s): ANIRUDDHA S. RUMALE , DINESH N. CHAUDHARI

Abstract: Cloud computing is advanced distributed and parallel processing, involving Grids, clusters, virtualization of resources, networking, client-server mechanism etc… Without proper security such an integrated complex system won’t last for long. This paper briefs out types of security issues that a cloud must consider before and after its implementation. Service Level Agreements (SLA) plays an important role in cloud operation and implementation, as it covers almost every aspect of cloud. Paper discusses on what a clouds SLA must contain, and why SLA can’t be implemented from users’ point of view. Paper discusses in brief the security in/for/by cloud scenario of cloud computing. Paper discusses existing methods/measures for security and can be seen as a brief on cloud computing security issues and measures. This paper can act as a theoretical base or directives while designing and implementing the cloud as it briefs out information on cloud security.

  • Publication Date: 09-Mar-2014
  • DOI: 10.15224/978-1-63248-000-2-46
  • Views: 0
  • Downloads: 0