Configuration item type constraint inference method based on name semantics

A technology of configuration items and types, applied in software maintenance/management, reverse engineering, etc., to achieve the effect of reducing the difficulty of extraction, good application scenarios, and avoiding complex program analysis

Active Publication Date: 2018-11-13
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no published literature in the existing research on the impact maximization problem that

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration item type constraint inference method based on name semantics
  • Configuration item type constraint inference method based on name semantics
  • Configuration item type constraint inference method based on name semantics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0049] The key to the embodiment of the present invention is how to use the semantics of the configuration name to infer the configuration type, and how to define the configuration constraints through the configuration type. The following describes typical implementation methods for these two aspects.

[0050] The first step is configuration type inference based on name semantics. The types corresponding to the configuration items are inferred mainly through name semantic analysis (take the configuration item "max_file_size" as an example).

[0051] (1.1) Firstly, the configuration item type is inferred through the name semantic information. Specific process such as figure 1 Shown:

[0052] (1.1.1) First, word segmentation is performed on the name of the configuration item "max_file_size". Mainly use the camel case naming method often use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a configuration item type constraint inference method based on name semantics, and provides a configuration item type inference and related constraint extraction method based on name semantics, wherein semantic information in a name and a type of a configuration item are fully mined, and consequently an aim of promoting configuration constraint extraction precision and eliminating constraint extraction boundedness is realized. A technical scheme comprises the following steps: firstly, reading a configuration file of a software system in advance, and obtaining the configuration item in the configuration file through parsing; secondly, finding out mapping between the system configuration item and a program source code through a characteristic mode; then, obtaining thetype of the configuration item through name analysis and program source code analysis; completing verification for the configuration type; and finally, inferring out the configuration constraint in cooperation with program analysis through a predefined template. According to the method provided by the invention, the semantic information in the name of the configuration item, particularly the constraint information contained in the configuration item type, is mined fully. The type of the configuration item is inferred through the name of the configuration item, meanwhile, grammar and semanticconstraint of the configuration item are extracted, difficulty in extraction of the configuration constraint is reduced greatly, the configuration constraint can be described in a fine granularity mode at the same time, and the method has good application scenes.

Description

technical field [0001] The invention relates to a solution for automatic analysis of configuration-related codes in large-scale open source software codes, in particular to a method for inferring configuration item type constraints based on name semantics for complex code analysis of large-scale open source software. Background technique [0002] With the continuous development of information technology, software systems have undergone tremendous changes in system scale and software functions. In terms of system scale, the scale of most commonly used open source software has reached the order of millions of lines and is increasing continuously. According to Coverity's annual open source software code analysis report, in the past three years, the number of lines of Linux kernel code has increased by millions of lines per year. On the other hand, software functions are increasingly diverse, and complex software often improves the high customizability of the system through a l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F8/75
CPCG06F8/75
Inventor 李姗姗廖湘科郦旺王戟董威贾周阳徐向阳周书林张元良王腾何浩辰
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products