CROSSmeeting UM, Fev. 2010 1 T5: Slicing Techniques Applied to OSS Pedro Rangel Henriques Daniela da Cruz Dep. de Informática/CCTC, Universidade do Minho,

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Slide 1 Configuration Management. Slide 2 Goal – Primary Objective To provide a logical model of the IT infrastructure by identifying,controlling, maintaining.
March 25, 2012 Organizing committee: Hana Chockler IBM Daniel Kroening Oxford Natasha Sharygina USI Leonardo Mariani Giovanni Denaro UniMiB.
Semantic Business Management November 5, 2009 Paul Haley Automata, Inc. (412)
Semantic Integration of Social and Domain Knowledge in a Collaborative Network Platform Luís Carneiro Supervisor: Professor António Lucas Soares
Andrea Maurino Web Service Design Methodology Batini, De Paoli, Maurino, Grega, Comerio WP2-WP3 Roma 24/11/2005.
Maurizio Pighin, University of Udine, Italy Venezia, marzo 2001 Workshop SALADIN Slide 1 Maurizio Pighin Dipartimento di Matematica e Informatica.
Slide 1 Insert your own content. Slide 2 Insert your own content.
1 Formal Model and Analysis of Usage Control Dissertation defense Student: Xinwen Zhang Director: Ravi S. Sandhu Co-director: Francesco Parisi-Presicce.
Chapter 27 Software Change.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Building a Knowledge Management System as a Life Cycle
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
OMV Ontology Metadata Vocabulary April 10, 2008 Peter Haase.
August 6, 2009 Joint Ontolog-OOR Panel 1 Ontology Repository Research Issues Joint Ontolog-OOR Panel Discussion Ken Baclawski August 6, 2009.
…to Ontology Repositories Mathieu dAquin Knowledge Media Institute, The Open University From…
HL7 V2 Implementation Guide Authoring Tool Proposal
Multimission Ground Systems & Services MOS 2.0: A View of the Next Generation in Mission Operations Systems Duane L. Bindschadler, Carole A. Boyles, Carlos.
1 Future strategy for e-submission as seen by industry Dr Michael Colmorgen, IFAH-Europe 2nd Veterinary Workshop on E-submission 4 Dec 2009, EMEA, London.
0 - 0.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 DTI/EPSRC 7 th June 2005 Reacting to HCI Devices: Initial Work Using Resource Ontologies with RAVE Dr. Ian Grimstead Richard Potter BSc(Hons)
Visual Model-based Software Development EUD-Net Workshop, Pisa, Italy September 23 rd, 2002 University of Paderborn Gregor Engels, Stefan Sauer University.
TECHcommunity March 2012 Collaborate, Connect, Contribute, Catch up & Customize.
Chapter 14 Software Testing Techniques - Testing fundamentals - White-box testing - Black-box testing - Object-oriented testing methods (Source: Pressman,
Research & development Towards a Versatile Contract Model to Organize Behavioral Specifications Philippe Collet 1, Alain Ozanne 2 and Nicolas Rivierre.
OO databases 1 Object Oriented databases. OO databases 2 Developing OODBMS - motivation motivation more and more application areas require systems that.
Testing Workflow Purpose
© 2011 TIBCO Software Inc. All Rights Reserved. Confidential and Proprietary. Towards a Model-Based Characterization of Data and Services Integration Paul.
Service Level Agreement
Access Lesson 13 Programming in Access Microsoft Office 2010 Advanced Cable / Morrison 1.
1 Use or disclosure of data contained on this sheet is subject to the restriction on the title page of this proposal or quotation. An Introduction to Data.
© S Haughton more than 3?
TU e technische universiteit eindhoven / department of mathematics and computer science 1 Empirical Evaluation of Learning Styles Adaptation Language Natalia.
Software Architecture Lecture 3
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 4 Slide 1 Software processes 2.
Lecture 6: Software Design (Part I)
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Advanced Manufacturing Laboratory Department of Industrial Engineering Sharif University of Technology Session # 14.
This work was partially funded by the RNTL initiative (LUTIN project) 1 Refactoring to Object-Oriented Design Patterns Mikal Ziane (LIP6 and Université.
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Addition 1’s to 20.
Requirements Analysis 1. 1 Introduction b501.ppt © Copyright De Montfort University 2000 All Rights Reserved INFO2005 Requirements Analysis Introduction.
Test B, 100 Subtraction Facts
Analysis of engineering system by means of graph representation.
Week 1.
From Model-based to Model-driven Design of User Interfaces.
Improving System Safety through Agent-Supported User/System Interfaces: Effects of Operator Behavior Model Charles SANTONI & Jean-Marc MERCANTINI (LSIS)
Overview Structural Testing Introduction – General Concepts
Program Slicing – Based Techniques
1 Program Slicing Purvi Patel. 2 Contents Introduction What is program slicing? Principle of dependences Variants of program slicing Slicing classifications.
May 14, May 14, 2015May 14, 2015May 14, 2015 Azusa, CA Sheldon X. Liang Ph. D. Software Engineering in CS at APU Azusa Pacific University, Azusa,
ISBN Chapter 3 Describing Syntax and Semantics.
Requirements Engineering n Elicit requirements from customer  Information and control needs, product function and behavior, overall product performance,
Describing Syntax and Semantics
Strategies to relate the program and problem domains using code instrumentation Mario Marcelo Berón University of Minho Pedro Rangel Henriques University.
A Survey of Software Refactoring Tom Mens, Tom Tourwé
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Basic Concepts Software Architecture. What is Software Architecture? Definition: – A software architecture is the set of principal design decisions about.
Composition of UML Described Refactoring Rules Presented by Chin-Yi Tsai.
E XV IS XML, UMA FERRAMENTA EMBLEMÁTICA NA ANÁLISE DOCUMENTAL Daniela da Cruz, Pedro Rangel Henriques Departamento de Informática Universidade do Minho.
1 Program Slicing Amir Saeidi PhD Student UTRECHT UNIVERSITY.
RE’05 The 13 th International conference on Requirements Engineering Reverse Engineering Goal Models from Legacy Code Yijun Yu 1 Yiqiao Wang 1 John Mylopoulos.
Chapter 5: Software Re-Engineering Omar Meqdadi SE 3860 Lecture 5 Department of Computer Science and Software Engineering University of Wisconsin-Platteville.
Program Comprehension for Domain-Specific Languages Maria João Varanda 1, Marjan Mernik 2, Daniela da Cruz 3, Pedro Henriques 3 1 Polytechnic Institute.
 System Requirement Specification and System Planning.
Software Requirements and the Requirements Engineering Process
SwE 455 Program Slicing.
Reverse Engineering: A Roadmap
Presentation transcript:

CROSSmeeting UM, Fev T5: Slicing Techniques Applied to OSS Pedro Rangel Henriques Daniela da Cruz Dep. de Informática/CCTC, Universidade do Minho, Braga-Portugal UM Fevereiro de 2010

CROSSmeeting UM, Fev Context CROSS (an infrastructure for Certification and Re-engineering of Open-Source Sw) ; Code Analysis for software comprehension (quality assessment, re-use, re-engineering, transformation)

CROSSmeeting UM, Fev Motivation To contribute to the portfolio of analysis tools – that will be made available through the OSS Certification Portal (task T7) improving Code Analysis via Slicing Techniques

CROSSmeeting UM, Fev Code Analysis Code Analysis is concerned with the extraction of data from Programs the storage of information, and the visualization of knowledge SWSystem, aiming at its comprehension.

CROSSmeeting UM, Fev Code Analysis To face the growing complexity of software systems, a promising approach for CA is the restriction of the analysis to a program slice.

CROSSmeeting UM, Fev Our main Proposal Semantic slicing applied intra and inter program components increases component understanding/reusing Semantic slicing is based on contracts (pre, post-conditions and invariants)

CROSSmeeting UM, Fev Objectives We planned 5 subtasks 1. Test-bed. 2. Semantic Slicing 3. Labeled Control Graph 4. Slicing Specific Software Facets 5. Dynamic slicing techniques

CROSSmeeting UM, Fev Objectives – substask1 Test-bed. Development of a platform (web environment) to support the pragmatic validation of the semantic slicing variants under study.

CROSSmeeting UM, Fev Objectives – substask2 Development of new slicing techniques for annotated programs ( programs whose code is commented with constraints, typically logical expressions capturing pre/post conditions and invariants ). Different perspectives can be considered: ……..

CROSSmeeting UM, Fev Objectives – substask2 a) Given a traditional slicing criterion, perform backward slicing in order to identify all the pre/post conditions involving that variable; b) Given a pre/post condition of a method, perform forward slicing in order to identify all the program statements that depends on that condition;

CROSSmeeting UM, Fev Objectives – substask2 c) Given an annotated procedure, identify all its statements that do not contribute to the verification of the post- condition; d) Given an annotated procedure and set of procedure-calls remove from the procedure all the statements that do not contribute to calling needs;

CROSSmeeting UM, Fev Objectives – substask2 e) Given an annotated procedure, extract and display the annotation in order to aid in its reuse; f) Given an annotated procedure verify the precondition satisfiability at each calling point; g) Given a procedure, infer its annotation

CROSSmeeting UM, Fev Objectives – substask3 Development of new instrument for visualization and manipulation of annotated procedures : Labeled Control Flow Graph Labeled System Dependency Graph

CROSSmeeting UM, Fev Objectives – substask4 Application of slicing techniques to reverse engineering of specific software facets --business logic, user interfaces, architectural issue, etc.-- to assess a given SwSystem. ( verify its compliance with the problem requirements )

CROSSmeeting UM, Fev Objectives – substask4 To attain this objective, it is required to change the traditional definition of slicing criterion in order to deal with the vocabulary of each specific facet.

CROSSmeeting UM, Fev Objectives – substask5 Dynamic slicing techniques to extract specific behavior, dealing with strong dynamic characteristics.

CROSSmeeting UM, Fev Conclusion Present Status: Tasks 1, 2, 3 under-development (Ph.D. work + BI / M.Sc.) Future: 2nd BI