Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering

6-9 Nov. 1994

Filter Results

Displaying Results 1 - 25 of 40
  • Proceedings of 1994 IEEE International Symposium on Software Reliability Engineering

    Publication Year: 1994
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Temporal complexity and software faults

    Publication Year: 1994, Page(s):115 - 125
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB)

    Software developers use complexity metrics to predict development costs before embarking on a project and to estimate the likelihood of faults once the system is built. Traditional measures, however, were designed principally for sequential programs, providing little insight into the added complexity of concurrent systems or increased demands of real-time systems. For the purpose of predicting cos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying various learning curves to hyper-geometric distribution software reliability growth model

    Publication Year: 1994, Page(s):8 - 17
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    The hyper-geometric distribution software reliability growth model (HGDM) has been shown to be able to estimate the number of faults initially resident in a program at the beginning of the test-and-debug phase. A key factor of the HGDM is the “sensitivity factor”, which represents the number of faults discovered and rediscovered at the application of a test instance. The learning curve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study to investigate sensitivity of reliability estimates to errors in operational profile

    Publication Year: 1994, Page(s):276 - 281
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    We report a case study to investigate the effect of errors in an operational profile on reliability estimates. A previously reported tool named TERSE was used in this study to generate random flow graphs representing programs, model errors in operational profile, and compute reliability estimates. Four models for reliability estimation were considered: the Musa-Okumoto model, the Goel-Okumoto mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some effects of fault recovery order on software reliability models

    Publication Year: 1994, Page(s):338 - 342
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Since traditional approaches to software reliability modeling allow the user to formulate predictions using data from one realization of the debugging process, it is necessary to understand the influence of the fault recovery order on predictive performance. We introduce an experimental methodology using a data structure called the debugging graph and use it to analyze the effects of various fault... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing synchronous critical software

    Publication Year: 1994, Page(s):239 - 248
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    Three approaches to the problem of testing synchronous critical software are presented, based on the data-flow language LUSTRE. The first approach automatically transforms a set of LUSTRE invariant properties characterizing the environment into a constrained random generator of test data sequences. The second approach consists in analyzing the required safety properties (written in LUSTRE) of the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the impact of software product dissimilarity on software quality models

    Publication Year: 1994, Page(s):104 - 114
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    The current software market favors software development organizations that apply software quality models. Software engineers fit quality models to data collected from past projects. Predictions from these models provide guidance in setting schedules and allocating resources for new and ongoing development projects. To improve model stability and predictive quality, engineers select models from the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • V&V in defense and commercial projects

    Publication Year: 1994, Page(s):84 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Verification and validation activities in defense projects are compared with those in the nuclear power plant industry. A significant difference is that in most defense projects the V&V effort is funded directly by the sponsor whereas in the nuclear power industry the major responsibility for V&V resides with the developer. This may cause a shift in V&V emphasis from early life cycle s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An automated environment for software testing and reliability estimation

    Publication Year: 1994, Page(s):312 - 317
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    We present the automated testing performed at Ericsson Telecom, Transport Network Systems, and how we intend to combine it with a test analyser to estimate the software reliability of our products. The test analyser will also provide a basis for test management decisions, e.g. resource allocation, as well as feedback to system design View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software reliability: to use or not to use?

    Publication Year: 1994, Page(s):66 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Research activities in software reliability engineering have been vigorous in the past two decades since Z. Jelinski and P.B. Moranda (1972) proposed the first software reliability model. Since then, numerous software reliability models and measurement procedures have been proposed for the prediction, estimation, and engineering of software reliability. However, there seems to be a gap among the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting assertions in their place

    Publication Year: 1994, Page(s):152 - 157
    Cited by:  Papers (22)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB)

    Assertions that are placed at each statement in a program can automatically monitor the internal computations of a program execution. However, the advantages of universal assertions come at a cost. A program with such extensive internal instrumentation will be slower than the same program without the instrumentation. Some of the assertions may be redundant. The task of instrumenting the code with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FIABILOG: a software reliability tool and its application to space projects

    Publication Year: 1994, Page(s):296 - 302
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    To support project managers in reliability evaluation, the company Mathix has developed a tool named Fiabilog. Fiabilog can be used for any software from the test phase onwards and would be of interest to anyone involved in software debugging, validation or maintenance. The CNES (French Spatial Agency) has chosen Fiabilog to analyze software reliability during the development and operational phase... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generalized software reliability process simulation technique and tool

    Publication Year: 1994, Page(s):264 - 273
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    The paper describes the structure and rationale of the generalized software reliability process and a set of simulation techniques that may be applied for the purpose of software reliability modeling. These techniques establish a convenient means for studying a realistic, end-to-end software life cycle that includes intricate subprocess interdependencies, multiple defect categories, many factors o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process for software requirements safety analysis

    Publication Year: 1994, Page(s):45 - 54
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    We introduce a detailed process for software requirements safety analysis. The approach for identification of safety faults in this process is based on fault tree analysis. This process consists of four main steps: software requirements fault tree generation; software requirements fault tree verification and validation; software safety requirements generation and safety fault mitigation; and softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensitivity of field failure intensity to operational profile errors

    Publication Year: 1994, Page(s):334 - 337
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Sensitivity of field failure intensity estimates to operational profile occurrence probability errors is investigated. This is an important issue in software reliability engineering, because these estimates enter into many development decisions. Sensitivity was computed for 59,200 sets of conditions, spread over a wide range. For 99.4% of these points, the failure intensity was very robust with re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The relationship between test coverage and reliability

    Publication Year: 1994, Page(s):186 - 195
    Cited by:  Papers (37)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (660 KB)

    Models the relationship between testing effort, coverage and reliability, and presents a logarithmic model that relates testing effort to test coverage: statement (or block) coverage, branch (or decision) coverage, computation use (c-use) coverage, or predicate use (p-use) coverage. The model is based on the hypothesis that the enumerables (like branches or blocks) for any coverage measure have di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of test set size and block coverage on the fault detection effectiveness

    Publication Year: 1994, Page(s):230 - 238
    Cited by:  Papers (39)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Size and code coverage are two important attributes that characterize a set of tests. When a program P is executed on elements of a test set T, we can observe the fault-detecting capacity of T for P. We can also observe the degree to which T induces code coverage on P according to some coverage criterion. We would like to know whether it is the size of T or the coverage of T on P which determines ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault modeling using the program dependence graph

    Publication Year: 1994, Page(s):126 - 135
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    We present a fault classification scheme and a fault seeding method that is based on the manifestation of faults in the program dependence graph (PDG). We enhance the domain/computation fault classification scheme to further characterize faults as structural and statement level, depending on the differences between the PDG for the original program and the PDG for the faulty program. Structural fau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for reliability estimation

    Publication Year: 1994, Page(s):18 - 24
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB)

    We present a framework for reliability estimation for software modules. The framework comprises methods and tools relating not only to calculating the reliability estimates, but also for specifying and creating the operational profiles and random test cases upon which the estimations are based View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying risk using ODC based growth models

    Publication Year: 1994, Page(s):282 - 288
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The paper uses the relative growth of defects, classified using orthogonal defect classification to get a finer insight into dynamics of the software development process during later parts of testing. This is particularly useful to help identify management actions to better use people resources (both skill and staffing levels) to respond to difficulties experienced with the product in test. Specif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing the dynamic strength of software systems using interference analysis

    Publication Year: 1994, Page(s):343 - 348
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    The concept of dynamic strength is closely related to reliability: the probability that a software system does not encounter a latent fault during execution. Dynamic strength is assessed by analyzing the interference between the execution profile, a probability density for system size, and the composite static strength distributions. Composite static strength is the sum of the relative software co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using formal methods to validate C programs

    Publication Year: 1994, Page(s):252 - 258
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Presents the CAVEAT project. The purpose of this project is to develop a tool designed to assist a user in the verification of C programs. Such a verification is required for safety applications in a pragmatic approach. The tool enables a user to verify the global or local properties of these applications. The context in which a property is to be verified is defined in terms of hypotheses. Most of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of a sampling method for measuring safety-critical software reliability

    Publication Year: 1994, Page(s):93 - 102
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    The paper addresses the issue of using sampling to assess the reliability of safety-critical software. Several factors are considered, such as the number of test cases required, modifications in the program, determining the operational profile, generating test cases, and checking the correctness of the output. The problems are classified into two broad categories: those that can be overcome via ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • More efficient software testing through the application of design of experiments (DOE)

    Publication Year: 1994, Page(s):318 - 322
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    The paper presents one application of the design of experiments techniques to the software test of a thrust vector control system similar to those used in space booster vehicles and upper stages. Traditionally, testing similar control systems has involved substantial investments in time to test all the components of the system and large quantities of engineering experience to make critical choices... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Methodology of independent software nuclear safety analysis

    Publication Year: 1994, Page(s):76 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB)

    Independent software nuclear safety analysis provides a methodology to ensure that software does not cause or contribute to a violation of the nuclear safety standards established by the Department of Defense, and that nuclear safety-critical software is not adversely affected by interfacing software or by operator action. This methodology is a systematic approach to examine a specific aspect of s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.