Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

CSE Conference and Workshop Papers

2001

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Understanding And Measuring The Sources Of Variation In The Prioritization Of Regression Test Suites, Sebastian Elbaum, David Gable, Gregg Rothermel Apr 2001

Understanding And Measuring The Sources Of Variation In The Prioritization Of Regression Test Suites, Sebastian Elbaum, David Gable, Gregg Rothermel

CSE Conference and Workshop Papers

Test case prioritization techniques let testers order their test cases so that those with higher priority, according to some criterion, are executed earlier than those with lower priority. In previous work, we examined a variety of prioritization techniques to determine their ability to improve the rate of fault detection of test suites. Our studies showed that the rate of fault detection of test suites could be significantly improved by using more powerful prioritization techniques. In addition, they indicated that rate of fault detection was closely associated with the target program. We also observed a large quantity of unexplained variance, indicating …


Optimization Of Amplifier Placements In Switch-Based Optical Networks, Ling Zong, Byrav Ramamurthy Jan 2001

Optimization Of Amplifier Placements In Switch-Based Optical Networks, Ling Zong, Byrav Ramamurthy

CSE Conference and Workshop Papers

Wavelength division multiplexing (WDM) offers a solution to the problem of exploiting the large bandwidth on optical links; it is the current favorite multiplexing technology for optical communication networks. Due to the high cost of an optical amplifier, it is desirable to strategically place the amplifiers throughout the network in a way that guarantees that all the signals are adequately amplified while minimizing the total number amplifiers being used. Previous studies all consider a star-based network. This paper demonstrates an original approach for solving the problem in switch-based WDM optical network assuming the traffic matrix is always the permutation of …


Design Verification And Functional Testing Of Finite State Machines, Mark W. Weiss, Sharad C. Seth, Shashank K. Mehta, Kent L. Einspahr Jan 2001

Design Verification And Functional Testing Of Finite State Machines, Mark W. Weiss, Sharad C. Seth, Shashank K. Mehta, Kent L. Einspahr

CSE Conference and Workshop Papers

The design of a finite state machine can be verified by simulating all its state transitions. Typically, state transitions involve many don’t care inputs that must be fully expanded for an exhaustive functional verification. However, by exploiting the knowledge about the design structure it is shown that only a few vectors from the fully expanded set suffice for both design verification and testing for manufacturing defects. The main contributions of the paper include a unified fault model for design errors and manufacturing faults and a function-based analysis of the circuit structure for the purpose of generating tests under the unified …


Adaptive Segmentation Of Document Images, Don Sylwester, Sharad C. Seth Jan 2001

Adaptive Segmentation Of Document Images, Don Sylwester, Sharad C. Seth

CSE Conference and Workshop Papers

A single-parameter text-line extraction algorithm is described along with an efficient technique for estimating the optimal value for the parameter for individual images without need for ground truth. The algorithm is based on three simple tree operations, cut, glue and flip. An XY-tree representing the segmentation is incrementally transformed to reflect a change in the parameter while intrinsic measures of the cost of the transformation are used to detect when specific tree operations would cause an error if they were performed, allowing these errors to be avoided. The algorithm correctly identified 98.8% of the area of the ground truth bounding …


Hierarchy-Based Access Control In Distributed Environments, Jean-Camille Birget, Xukai Zou, Guevara Noubir, Byrav Ramamurthy Jan 2001

Hierarchy-Based Access Control In Distributed Environments, Jean-Camille Birget, Xukai Zou, Guevara Noubir, Byrav Ramamurthy

CSE Conference and Workshop Papers

Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services.

Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is …


Diffserver: Application Level Differentiated Services For Web Servers, Gautam Rao, Byrav Ramamurthy Jan 2001

Diffserver: Application Level Differentiated Services For Web Servers, Gautam Rao, Byrav Ramamurthy

CSE Conference and Workshop Papers

Web content hosting, in which a Web server stores and provides Web access to documents for different customers, is becoming increasingly common. For example, a web server can host webpages for several different companies and individuals. Traditionally, Web Service Providers (WSPs) provide all customers with the same level of performance (best-effort service). Most service differentiation has been in the pricing structure (individual vs. business rates) or the connectivity type (dial-up access vs. leased line, etc.). This report presents DiffServer, a program that implements two simple, server-side, application-level mechanisms (server-centric and client-centric) to provide different levels of web service. The results …


The Impact Of Software Evolution On Code Coverage Information, Sebastian Elbaum, David Gable, Gregg Rothermel Jan 2001

The Impact Of Software Evolution On Code Coverage Information, Sebastian Elbaum, David Gable, Gregg Rothermel

CSE Conference and Workshop Papers

Many tools and techniques for addressing software maintenance problems rely on code coverage information. Often, this coverage information is gathered for a specific version of a software system, and then used to perform analyses on subsequent versions of that system without being recalculated. As a software system evolves, however, modifications to the software alter the software’s behavior on particular inputs, and code coverage information gathered on earlier versions of a program may not accurately reflect the coverage that would be obtained on later versions. This discrepancy may affect the success of analyses dependent on code coverage information. Despite the importance …