Author: Chao Liu, Xiangyu Zhang Presented by Wenbin Li.

Slides:



Advertisements
Similar presentations
Testing Coverage Test case
Advertisements

Delta Debugging and Model Checkers for fault localization
There are two types of addressing schemes:
MGT-491 QUANTITATIVE ANALYSIS AND RESEARCH FOR MANAGEMENT
Dimensionality Reduction PCA -- SVD
Locating in fingerprint space: wireless indoor localization with little human intervention. Proceedings of the 18th annual international conference on.
1 Enviromatics Spatial database systems Spatial database systems Вонр. проф. д-р Александар Маркоски Технички факултет – Битола 2008 год.
Solutions to Review Questions. 4.1 Define object, class and instance. The UML Glossary gives these definitions: Object: an instance of a class. Class:
Authors: Thilina Gunarathne, Tak-Lon Wu, Judy Qiu, Geoffrey Fox Publish: HPDC'10, June 20–25, 2010, Chicago, Illinois, USA ACM Speaker: Jia Bao Lin.
1 Programming for Engineers in Python Autumn Lecture 5: Object Oriented Programming.
Expectation Maximization Method Effective Image Retrieval Based on Hidden Concept Discovery in Image Database By Sanket Korgaonkar Masters Computer Science.
Social Position & Social Role Lei Tang 2009/02/13.
Multivariate Data Analysis Chapter 10 - Multidimensional Scaling
1 Efficient Clustering of High-Dimensional Data Sets Andrew McCallum WhizBang! Labs & CMU Kamal Nigam WhizBang! Labs Lyle Ungar UPenn.
1 Software Testing and Quality Assurance Lecture 31 – Testing Systems.
(c) 2007 Mauro Pezzè & Michal Young Ch 16, slide 1 Fault-Based Testing.
CS590Z Statistical Debugging Xiangyu Zhang (part of the slides are from Chao Liu)
02/13/20071 Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach Chao Liu, Xiangyu Zhang, Jiawei Han, Yu Zhang, Bharat K. Bhargava University.
Scalability for High Cardinality in Steerable MDS CPSC 533C Project Presentation Allan Rempel December 19, 2005.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Objectives Understand the basic concepts and definitions relating to testing, like error, fault, failure, test case, test suite, test harness. Understand.
Topological Relationships Between Complex Spatial Objects Daniel Hess and Yun Zhang.
Visualization. CS351 - Software Engineering (AY2004)2 Program visualization Debugging programs without the aid of support tools can be extremely difficult.
Automated Diagnosis of Software Configuration Errors
The Tutorial of Principal Component Analysis, Hierarchical Clustering, and Multidimensional Scaling Wenshan Wang.
Unsupervised Learning. CS583, Bing Liu, UIC 2 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate.
Preparing Data for Analysis and Analyzing Spatial Data/ Geoprocessing Class 11 GISG 110.
O BJECT O RIENTATION F UNDAMENTALS Prepared by: Gunjan Chhabra.
Objectives Understand the basic concepts and definitions relating to testing, like error, fault, failure, test case, test suite, test harness. Explore.
CPIS 357 Software Quality & Testing
Unsupervised Learning Reading: Chapter 8 from Introduction to Data Mining by Tan, Steinbach, and Kumar, pp , , (
Marketing Research Aaker, Kumar, Day Seventh Edition Instructor’s Presentation Slides.
Teaching Students to Prove Theorems Session for Project NExT Fellows Presenter: Carol S. Schumacher Kenyon College and.
Data Mining & Knowledge Discovery Lecture: 2 Dr. Mohammad Abu Yousuf IIT, JU.
Partitioning – A Uniform Model for Data Mining Anne Denton, Qin Ding, William Jockheck, Qiang Ding and William Perrizo.
Testing Basics of Testing Presented by: Vijay.C.G – Glister Tech.
Bug Localization with Machine Learning Techniques Wujie Zheng
1 Motivation Web query is usually two or three words long. –Prone to ambiguity –Example “keyboard” –Input device of computer –Musical instruments How can.
Introduction to Software Testing. Types of Software Testing Unit Testing Strategies – Equivalence Class Testing – Boundary Value Testing – Output Testing.
Proximity Assignment Unit 1 Design Fundamentals. Directions: Read the directions found on each slide. Some slides may ask you to go out and find examples.
Today’s Agenda  Reminder: HW #1 Due next class  Quick Review  Input Space Partitioning Software Testing and Maintenance 1.
Slide 14.1 Nonmetric Scaling MathematicalMarketing Chapter 14 Nonmetric Scaling Measurement, perception and preference are the main themes of this section.
A survey of different shape analysis techniques 1 A Survey of Different Shape Analysis Techniques -- Huang Nan.
1 CSC 594 Topics in AI – Text Mining and Analytics Fall 2015/16 6. Dimensionality Reduction.
Similarity Searching in High Dimensions via Hashing Paper by: Aristides Gionis, Poitr Indyk, Rajeev Motwani.
Presented by: Daniel Hess, Yun Zhang. Motivation Problem statement Major contributions Key concepts Validation methodology Assumptions Recommended changes.
Clustering Clustering is a technique for finding similarity groups in data, called clusters. I.e., it groups data instances that are similar to (near)
LogTree: A Framework for Generating System Events from Raw Textual Logs Liang Tang and Tao Li School of Computing and Information Sciences Florida International.
Basic Definitions of Set Theory Lecture 23 Section 5.1 Wed, Mar 8, 2006.
Memory Management OS Fazal Rehman Shamil. swapping Swapping concept comes in terms of process scheduling. Swapping is basically implemented by Medium.
Requirements Engineering Methods for Requirements Engineering Lecture-31.
HNDIT23082 Lecture 09:Software Testing. Validations and Verification Validation and verification ( V & V ) is the name given to the checking and analysis.
Multidimensional Scaling
Basic Definitions of Set Theory Lecture 23 Section 5.1 Mon, Feb 21, 2005.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Nonlinear Dimension Reduction: Semi-Definite Embedding vs. Local Linear Embedding Li Zhang and Lin Liao.
Out of sample extension of PCA, Kernel PCA, and MDS WILSON A. FLORERO-SALINAS DAN LI MATH 285, FALL
CS223: Software Engineering Lecture 25: Software Testing.
A Self-organizing Semantic Map for Information Retrieval Xia Lin, Dagobert Soergel, Gary Marchionini presented by Yi-Ting.
The PLA Model: On the Combination of Product-Line Analyses 강태준.
Item Based Recommender System SUPERVISED BY: DR. MANISH KUMAR BAJPAI TARUN BHATIA ( ) VAIBHAV JAISWAL( )
Input Space Partition Testing CS 4501 / 6501 Software Testing
Multiple Classes and Inheritance
CS5123 Software Validation and Quality Assurance
Overview Identify similarities present in biological sequences and present them in a comprehensible manner to the biologists Objective Capturing Similarity.
Lecture 09:Software Testing
Test Case Purification for Improving Fault Localization
CS240: Advanced Programming Concepts
Precise Condition Synthesis for Program Repair
Basic Definitions of Set Theory
Presentation transcript:

Author: Chao Liu, Xiangyu Zhang Presented by Wenbin Li

 Automated failure reporting is widely used  failure indexing: which asks how to identify all failures due to the same fault ◦ Failure Prioritization ◦ Duplicate Failure Removal ◦ Patch Suggestion

 Crashing failure: ◦ Incurred by memory bugs ◦ Nearly one-to-one mapping  Noncrashing failure: ◦ Caused by semantic bugs ◦ A hard problem

 T-Proximity ◦ Weakness: failures with similar behaviors rather than the same fault are indexed together  R-Proximity ◦ Weakness: Use passing execution, which may violate the privacy of users.

 identify a subset of program statements that are involved in producing a program failure.  execution instances: it is used to distinguish different execution of the same statement s. Suppose s is executed n times, we use s1; s2; …; sn to denote the n execution instances.  Data slice and full slice will be used in this study.

 For example:  E i = (10, 30, 40)  E j = (10, 20, 30, 40)  D(e i, e j ) = 1- ¾ = 1/4

 To prepare for the failure indexing, we should do the following: 1. “due to” function 2. partitions the set of failuresX into m mutually exclusive and collectively exhaustive sets 3. define G(x i ) includes all the failures due to the same fault as x i

 The distance function D quantifies how failures are close to each other based on the similarity between their corresponding failure signature  Use a pair-wise distance matrix M(Ǿ;D), which is called the proximity matrix, to calculated for the given set of n failures

 Two Concepts: ◦ Cohesion:  To what extent failures in the same group are close to each other; ◦ Separation:  To what extent failures in different groups are separated from each other.  Both Cohesion and Separation should be HIGH

 Problem: objects reside in a very high- dimensional space. Each failure is in a space of hundreds of dimensions because a typical slice contains hundreds of statements.  Method: multidimensional scaling (MDS) techniques. The techniques re-arrange them in a specific way in a much lower (usually 2) dimensional space.

 The two faults are manually seeded.  hand-crafted test inputs are used.  Metrics may not be accurate enough

 The approach is more fault-relevant than the method used by T-PROXIMITY.  The approach eliminates the need of passing executions, which is used by R-PROXIMITY.

 It is hard to define data slices, considering how many codes a software may contain.  The paper just provides some special example, which is not enough to prove the effectiveness of the approach.