Intrusive type grey box assembly validation method based on model

A verification method and intrusive technology, applied in program control devices, software testing/debugging, etc., can solve the problems of limited number of components, difficult application, and difficulty in formally describing the requirements of push point components, so as to increase the matching degree. , the effect of improving development efficiency, automatic verification of correctness and security

Active Publication Date: 2015-09-09
SHANGHAI UNIV
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But each has advantages and disadvantages: the black-box assembly method does not require any understanding of the implementation details of the components, nor does it need to configure or modify the components, but the concept of "assembled with constant components into ever-changing applications" is too realistic , the practical application is difficult
[0008] 1) Due to the lack of component specification language, it is difficult to correctly and formally describe the component requirements of the push point;
[0009] 2) Due to the limited number of components in the component library, it is difficult to accurately retrieve a single component entity that meets the request
[0011] 1) From the source code level of implementation details, intrusive assembly will add some useless or dangerous codes;
[0012] 2) From the perspective of assembly high-level workflow, intrusive assembly will attach some useless or threatening interfaces

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusive type grey box assembly validation method based on model
  • Intrusive type grey box assembly validation method based on model
  • Intrusive type grey box assembly validation method based on model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0069] A Model-Based Approach to Intrusive Gray-Box Assembly Verification as figure 1 As shown, firstly, the Java executable program is parsed using reflection technology, and the internal process logic and assembly points are added, and the assembly points are added, and encapsulated into the component library. Secondly, users design abstract workflows on the visual interface according to their needs. Next, for the workflow, the satisfiable singleton artifacts are retrieved from the service repository. If there is no satisfying instance component, an algorithm is used to intrude mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an intrusive type grey box assembly validation method based on a model, and belongs to the technical field of software engineering. The intrusive type grey box assembly validation method based on the model includes steps: 1) designing workflow: designing a workflow model composed of a plurality of abstract components according to business logic of software to be developed; 2) performing instantiation: performing retrieval in an instance component library according to function demands and interface information of all the abstract components in the workflow, confirming whether one single instance component matched with the abstract components exists, and if yes, inserting the matched single instance component into the position of the abstract components, or if not, selecting a plurality of the instance components, combining the selected instance components into a composite component, and invading the composite component into the position of the abstract components; 3) verifying properties: converting a configuration file generated in the instantiation so as to obtain a Kripke structure script suitable for execution of a model checker NuSMV, and verifying validity and safety of a component assembly process based on the Kripke structure script. Compared with the prior art, the intrusive type grey box assembly validation method based on the model has the advantages of improving software development efficiency based on the components and the like.

Description

technical field [0001] The invention relates to a software engineering technology, in particular to a model-based intrusive gray box assembly verification method. Background technique [0002] Component-Based Software Development (CBSD) is a general trend of software industrialization. Computer software architecture has changed from a manual code development model to a reusable, independently run, encapsulated component model, which has higher flexibility. Due to the reuse of algorithms and software functions, component-based software development greatly shortens the development progress of software systems, especially in the case of limited funds, this method is the best choice for realizing software project development. [0003] A component is to encapsulate a module or code with a specific function in a certain format. Component assembly is to study the mechanism of how to assemble components. Based on the requirement model, find suitable components for integration to r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F11/36
Inventor 高洪皓陈颖田野曾红卫缪淮扣
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products