 介紹 5 種錯誤定位技巧  Tarantula  Set-union  Set-intersection  Nearest Neighbor  Cause Transition.

Slides:



Advertisements
Similar presentations
DO NOW Key Words in Geometry With a neighbor, discuss the difference between the key location words in geometry in relation to Points, Lines and Planes.
Advertisements

Delta Debugging and Model Checkers for fault localization
Data-Flow Analysis II CS 671 March 13, CS 671 – Spring Data-Flow Analysis Gather conservative, approximate information about what a program.
Data-Flow Analysis Framework Domain – What kind of solution is the analysis looking for? Ex. Variables have not yet been defined – Algorithm assigns a.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
Delta Debugging AAIS 05 Curino, Giusti Delta Debugging Authors: Carlo Curino, Alessandro Giusti Politecnico di Milano An advanced debugging technique.
Ongoing projects in the Program Analysis Group Marcelo d’Amorim Informatics Center, Federal University of Pernambuco (UFPE) Belo Horizonte, MG-Brazil,
Statistical Approaches for Finding Bugs in Large-Scale Parallel Systems Leonardo R. Bachega.
Automatic Program Correction Anton Akhi Friday, July 08, 2011.
Dave Lattanzi’s RRT Algorithm. General Concept Use dictionaries for trees Create a randomized stack of nodes Iterate through stack “Extend” each tree.
HSR 課程介紹. 指定用書 Health Services Research Method Leiyu Shi 2008.
Pruning Dynamic Slices With Confidence Xiangyu Zhang Neelam Gupta Rajiv Gupta The University of Arizona.
Speaker: Pei-Ni Tsai. Outline  Introduction  Fitness Function  GA Parameters  GA Operators  Example  Shortest Path Routing Problem 2.
CH-23 失效原因樹分析 FTA Failure Tree Analysis. 前言 為了提昇系統可靠度,產品在開發階段,利 用類似品管方法之魚骨圖分析手法,找出潛在 缺點,並加以改進,此種分析方法稱之為失效 原因樹分析法 (Failure Tree Analysis)– FTA 。 FTA 是一種系統化的方法,可以有效的找出.
Binary Search (I) Date: June 17, 2009 Introducer: Hsing-Yen Ann.
OS 期中檢討 2005/11/30. Problem 1 課本上有答案 (e) 指出一定時間內完成 (f) 除了 many-to-many ,還有 1-to-1.
From: BOOKS ONLINE 1 Safari Tech Books Online Safari Business Books Online 電子書資料庫.
7.1 背景介紹 7.2 多解析度擴展 7.3 一維小波轉換 7.4 快速小波轉換 7.5 二維小波轉換 7.6 小波封包
CS590Z Statistical Debugging Xiangyu Zhang (part of the slides are from Chao Liu)
: Little Red Riding Hood ★★★☆☆ 題組: Contest Volumes Archive with Online Judge 題號: 11067: Little Red Riding Hood 解題者:陳明凱 解題日期: 2008 年 3 月 14 日 題意:
Statistical Debugging: A Tutorial Steven C.H. Hoi Acknowledgement: Some slides in this tutorial were borrowed from Chao Liu at UIUC.
: Multisets and Sequences ★★★★☆ 題組: Problem Set Archive with Online Judge 題號: 11023: Multisets and Sequences 解題者:葉貫中 解題日期: 2007 年 4 月 24 日 題意:在這個題目中,我們要定義.
Calculating Word Frequency in a Document.   11/6( 四 ) 這個星期四小考, 5. Threaded Binary.
人文學資源報告 第七組 圖資二 范雲清 圖資二 黃浩雲 圖資二 黃彥翰 圖資二 藍毅頎 圖資二 林泰宇 圖資二 李明峰.
本章重點 2-1 有序串列(Ordered List) 2-2 介紹陣列(array) 2-3 矩陣(matrix)的應用
Delta Debugging - Demo Presented by: Xia Cheng. Motivation Automation is difficult Automation is difficult fail analysis needs complete understanding.
概念性產品企劃書 呂學儒 李政翰.
:Commandos ★★★☆☆ 題組: Contest Archive with Online Judge 題號: 11463: Commandos 解題者:李重儀 解題日期: 2008 年 8 月 11 日 題意: 題目會給你一個敵營區內總共的建築物數,以及建築物 之間可以互通的路有哪些,並給你起點的建築物和終點.
1 Revisiting Difficult Constraints if (hash(x) == hash(y)) {... } How do we cover this code? Suppose we’re running (DART, SAGE, SMART, CUTE, SPLAT, etc.)
Project Report II RIPE: A Rapid Implication- based Power Estimator Sunil Motaparti, Gaurav Bhatia.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc.,All Rights Reserved. 肆 資料分析與表達.
Software Bug Localization with Markov Logic Sai Zhang, Congle Zhang University of Washington Presented by Todd Schiller.
Automated Diagnosis of Software Configuration Errors
Objectives Understand the basic concepts and definitions relating to testing, like error, fault, failure, test case, test suite, test harness. Explore.
An Automated Approach to Predict Effectiveness of Fault Localization Tools Tien-Duy B. Le, and David Lo School of Information Systems Singapore Management.
1 Debugging and Testing Overview Defensive Programming The goal is to prevent failures Debugging The goal is to find cause of failures and fix it Testing.
Locating Causes of Program Failures Texas State University CS 5393 Software Quality Project Yin Deng.
CS5103 Software Engineering Lecture 17 Debugging.
Scalable Statistical Bug Isolation Ben Liblit, Mayur Naik, Alice Zheng, Alex Aiken, and Michael Jordan, 2005 University of Wisconsin, Stanford University,
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
Exercise Solutions 2014 Fall Term. Week 2: Exercise 1 public static Boolean repOK(Stack mystack) { if (mystack.capacity() < 0) { return false;
Bug Localization with Machine Learning Techniques Wujie Zheng
Ongoing projects in the Program Analysis Group Marcelo d’Amorim Informatics Center, Federal University of Pernambuco (UFPE) Belo Horizonte, MG-Brazil,
References: “Pruning Dynamic Slices With Confidence’’, by X. Zhang, N. Gupta and R. Gupta (PLDI 2006). “Locating Faults Through Automated Predicate Switching’’,
“Isolating Failure Causes through Test Case Generation “ Jeremias Rößler Gordon Fraser Andreas Zeller Alessandro Orso Presented by John-Paul Ore.
How to isolate cause of failure? 최윤라. Contents Introduction Isolating relevant input Isolating relevant states Isolating the error Experiments.
Bug Localization with Association Rule Mining Wujie Zheng
Fixing the Defect CEN4072 – Software Testing. From Defect to Failure How a defect becomes a failure: 1. The programmer creates a defect 2. The defect.
Automated Debugging with Error Invariants TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAA A A A AA A A Chanseok Oh.
1 CS510 S o f t w a r e E n g i n e e r i n g Delta Debugging Simplifying and Isolating Failure-Inducing Input Andreas Zeller and Ralf Hildebrandt IEEE.
Simplifying and Isolating Failure-Inducing Input Andreas Zeller and Ralf Hildebrandt IEEE Transactions on Software Engineering (TSE) 2002.
Defensive Programming. Good programming practices that protect you from your own programming mistakes, as well as those of others – Assertions – Parameter.
Automated Adaptive Bug Isolation using Dyninst Piramanayagam Arumuga Nainar, Prof. Ben Liblit University of Wisconsin-Madison.
Testing Concurrent Programs Sri Teja Basava Arpit Sud CSCI 5535: Fundamentals of Programming Languages University of Colorado at Boulder Spring 2010.
Visit:
衛生福利部 金門醫院 資源中心名稱: 衛生福利部金門醫院 在地化教材名稱: 正確用藥 - 大富翁遊戲.
Test Case Purification for Improving Fault Localization presented by Taehoon Kwak SoftWare Testing & Verification Group Jifeng Xuan, Martin Monperrus [FSE’14]
PSYCH 550 Week 6 Individual The Memory Process Paper To purchase this material link 550/PSYCH-550-Week-6-Individual-The-Memory-
Tung Dao* Lingming Zhang+ Na Meng* Virginia Tech*
Godrej Prakriti Sodepur | Godrej Prakriti Kolkata
Business For Sale Western Sydney
Giftalove Best Cake Offers
تحليل الحساسية Sensitive Analysis.
Fail Fail Poor Communication Lack of Documentation Poor Execution.
Test Case Purification for Improving Fault Localization
Comparing Images Using Hausdorff Distance
50.530: Software Engineering
Chapter 15 Debugging.
Chapter 15 Debugging.
Presentation transcript:

 介紹 5 種錯誤定位技巧

 Tarantula  Set-union  Set-intersection  Nearest Neighbor  Cause Transition

 上一篇 Paper 有介紹  多了計算 statement 的 suspiciousness 並且 rank

 Coverage-based Methods -> A statement is more likely to be buggy if it is visited more often in failed test cases and less often in passed test cases.

 Assume there are one or more passed test cases {P 0, P 1, P 2, …} and one failed test case f.  Union : the bug is contained in the set { statements executed by f } – { statements executed by any P i }  Intersection : the bug is contained in the set { statements executed by all P i } – { statements executed by f }

 Neglect test case 1

 The technique performs poorly in practice – sensitive to particular test cases.

 Pick a passed test case p which is the nearest to the failed test case f.  Distance between f and p could be defined as: the number of statements in f which are not in p.  Report f-p as the potential bugs.

 This technique is also sensitive to the particular test cases used.

 Performs a binary search of the memory states of a program between a passing test case and a failing test case  This technique is part of a suite of techniques defined by Zeller and colleagues called Delta Debugging.  H. Cleve and A. Zeller. Locating causes of program failures.

 Identify the initial set of blamed statements; rank them the highest  Find statements of distance 1 from the initial set (in both forward and backward direction); rank them the second highest  Find statements of distance 2 and so on.

 Finish this paper