Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A component protocol mining method, device and system

A protocol and component technology, applied in the field of program mining, can solve the problems of low mining efficiency and high labor consumption, and achieve the effects of improving accuracy and completeness, improving efficiency and reducing costs.

Inactive Publication Date: 2017-10-10
WUHAN INSTITUTE OF TECHNOLOGY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention provides a component protocol mining method, device and system to solve the technical problems of high manpower consumption and low mining efficiency existing in the component protocol mining method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A component protocol mining method, device and system
  • A component protocol mining method, device and system
  • A component protocol mining method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] This embodiment provides a component protocol mining method, the method is applied in the server 102, the server 102 is connected to N clients 101, and N is an integer greater than 1, such as figure 2 As shown, the method includes:

[0068] Step S201, sending a stub start instruction to the N clients, where the stub start command carries function identifiers of M functions of the class to be mined, and M is an integer greater than 1;

[0069] Step S202, receiving the function call information of the M functions sent by the N clients; the function call information is the information collected by the N clients based on the start instrumentation instruction;

[0070] Step S203, updating the component protocol of the class stored in the server according to the function call information.

[0071] In the embodiment of the present application, the function is an interface function, that is, a public function.

[0072] In the embodiment of the present application, the server...

Embodiment 2

[0120] In this embodiment, a component protocol mining method is provided, and the method is applied to a client 101, and the client 101 is connected to a server 102, such as Figure 6 As shown, the method includes:

[0121] Step S601, receiving the start instrumentation instruction sent by the server, the start instrumentation instruction carries the function identifiers of M functions of the class to be mined, and M is an integer greater than 1;

[0122] Step S602, determining L functions from the M functions; M≥L≥1;

[0123] Step S603, when the target application is running on the client, instrument the L functions of the target application to collect function call information of the L functions;

[0124] Step S604, sending the function call information to the server, so that the server updates the component protocol of the class stored in the server according to the function call information.

[0125] In the embodiment of the present application, the determination of L f...

Embodiment 3

[0134] This embodiment provides a component protocol mining system, such as figure 1 As shown, the system includes a server 102 and N clients 101 connected to the server 102, where N is an integer greater than 1;

[0135] Wherein, the server 102 is configured to send a stub start instruction to the N clients, where the stub start command carries function identifiers of M functions of the class to be mined, and M is an integer greater than 1;

[0136] The N clients 101 are used to receive the start instrumentation instruction; and determine L functions from the M functions; M≥L≥1; and when running the target application program on the clients, Instrumenting the L functions of the target application to collect function call information of the L functions; and sending the function call information to the server 102;

[0137] The server 102 is further configured to receive the function call information sent by the N clients 101 ; and update the component protocol of the class sto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a component protocol mining method, device and system. The method includes: sending a stub start instruction to the N clients, and the stub start command carries M functions of the class to be mined Function identification, M is an integer greater than 1; receive the function call information of the M functions sent by the N clients; the function call information is collected by the N clients based on the start instrumentation instruction information; updating the component protocol of the class stored in the server according to the function call information. The method, device and system provided by the invention are used to solve the technical problems of high manpower consumption and low mining efficiency existing in the component protocol mining method in the prior art. The technical effect of reducing the labor cost of data acquisition and improving the efficiency of component protocol mining has been realized.

Description

technical field [0001] The present invention relates to the technical field of program mining, in particular to a component protocol mining method, device and system. Background technique [0002] Timing constraints usually exist between interface functions of software components. The timing constraints that need to be followed when using a software component constitute a protocol for that component, the component protocol. This protocol specifies the sequence of calls between interface functions. As shown below, a timing constraint of classes java.util.Stack and java.util.Iteration are shown respectively: [0003] (1) Before calling the peek() function of the Stack class to view the top element of the stack, the push() function should be called to insert an element into the stack; [0004] (2) Before calling the next() function of the Iteration class to get the next element, the hasNext() function should be called to check whether the next element exists. [0005] This ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/38G06F9/54
Inventor 陈灯魏巍张彦铎李迅于宝成鲁统伟闵峰周华兵朱锐彭丽
Owner WUHAN INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products