跳到主要內容

臺灣博碩士論文加值系統

(44.192.49.72) 您好!臺灣時間:2024/09/14 07:06
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳柏凱
研究生(外文):Po-Kai Chen
論文名稱:針對資源測試的自動化方法
論文名稱(外文):An Automated Method for Resource Testing
指導教授:鄭炳強鄭炳強引用關係陳嘉玫陳嘉玫引用關係
指導教授(外文):Bing-Chiang JengChia-Mei Chen
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊管理學系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:52
中文關鍵詞:基因演算法記憶體洩漏軟體測試資源測試
外文關鍵詞:Genetic AlgorithmResource TestingSoftware TestingMemory Leak
相關次數:
  • 被引用被引用:2
  • 點閱點閱:219
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
這篇論文介紹一個自動化測試資料產生技術的方法,結合大量測試輔以資源監控來找出較難發現之資源耗用相關的軟體弱點。大量測試重覆產生測試案例許多次用來模擬測試長時期的執行區間,這項測試技術已經被發現在對於找出元件協調之間的錯誤及記憶體耗用(e.g. memory leaks)十分有用。藉由程式碼插裝監控資源使用趨勢,可更快速的產生有效的測試資料。結合使用大量測試及資源監控觀點的自動化測試資料產生能夠使得本方法在這領域當中更實用且有效。
This thesis introduces a method that combines automated test data generation techniques with high volume testing and resource monitoring. High volume testing repeats test cases many times, simulating extended execution intervals. These testing techniques have been found useful for uncovering errors resulting from component coordination problems, as well as system resource consumption (e.g. memory leaks) or corruption. Coupling automated test data generation with high volume testing and resource monitoring could make this approach more scalable and effective in the field.
致謝 i
中文摘要 ii
英文摘要 iii
目錄 iv
圖表目錄 v
第一章 緒論 1
1.1 研究動機 1
1.2 背景說明 2
1.3 論文架構 4
第二章 文獻探討 5
2.1 資源消耗相關問題 5
2.2 軟體測試(Software Testing) 7
2.3 基因演算法(Genetic Algorithm, GA) 12
第三章 自動化資源測試方法 18
3.1 問題描述 18
3.2 先前作法 18
3.3 發展自動化資源測試方法的動機 19
3.4 自動化資源測試方法 22
3.5 使用工具 30
第四章 實驗結果與討論 32
4.1 實驗案例說明 32
4.2 參數設定與限制 33
4.3 資源需求趨勢 34
4.4 結果比較與討論 36
第五章 結論與未來研究方向 39
5.1 結論 39
5.2 研究限制 39
5.3 未來研究方向 40
參考文獻 41
附錄一、實驗結果比較表 45
1.Hetzel, B., The Complete Guide to Software Testing, QED Information Sciences, Wellesley, Mass. 1988.
2.Beizer, B. 1990 Software Testing Techniques. John Wiley & Sons, Inc.
3.Hetzel, B., "Software Testing: Some Troubling Issues and Opportunities", BCS Special Interest Group in Software Testing, Dec 6, 1991.ression clustering to Reverse Engineering. Bioinformatics, 2000. 16(8): p. 707-726.
4.D. Alberts, “The economics of software quality assurance,” in AFIPS Conf. Proc. 1976 Nar. Computer Conf., vol. 45. Montvale, NJ: AFIPS Press, pp. 433-442.
5.G. Myers, The Art of Sofrware Testing. New York: Wiley, 1979.
6.Hoglund, G. and McGraw, G. 2004 Exploiting Software: How to Break Code. Pearson Higher Education.
7.McGraw, G. and Potter, B. 2004. Software Security Testing. IEEE Security and Privacy 2, 5 (Sep. 2004), 81-85.
8.Huang, Y., Yu, F., Hang, C., Tsai, C., Lee, D., and Kuo, S. 2004. Securing web application code by static analysis and runtime protection. In Proceedings of the 13th international Conference on World Wide Web (New York, NY, USA, May 17 - 20, 2004). WWW ''04. ACM Press, New York, NY, 40-52.
9.Berndt, D. J. and Watkins, A. 2005. High Volume Software Testing using Genetic Algorithms. In Proceedings of the Proceedings of the 38th Annual Hawaii international Conference on System Sciences (Hicss''05) - Track 9 - Volume 09 (January 03 - 06, 2005). HICSS. IEEE Computer Society, Washington, DC, 318.2.
10.McGee, P. and Kaner, C. 2004. Experiments with high volume test automation. SIGSOFT Softw. Eng. Notes 29, 5 (Sep. 2004), 1-3.
11.Beizer, B. 1990 Software Testing Techniques. John Wiley & Sons, Inc.
12.Ntafos, S. C. 1988. A Comparison of Some Structural Testing Strategies. IEEE Trans. Softw. Eng. 14, 6 (Jun. 1988), 868-874.
13.M. Roper, Software Testing. London: McGraw-Hill Book Company, 1994.
14.A. H.Watson, “Structured testing: Analysis and extensions,” Tech. Rep. TR-528-96, Princeton University, 1996.
15.Tikir, M. M. and Hollingsworth, J. K. 2002. Efficient instrumentation for code coverage testing. In Proceedings of the 2002 ACM SIGSOFT international Symposium on Software Testing and Analysis (Roma, Italy, July 22 - 24, 2002). ISSTA ''02. ACM Press, New York, NY, 86-96.
16.Gallagher, M. J. and Narasimhan, V. L. 1997. ADTEST: A Test Data Generation Suite for Ada Software Systems. IEEE Trans. Softw. Eng. 23, 8 (Aug. 1997), 473-484.
17.Holland, J. H. 1992 Adaptation in natural and artificial systems. MIT Press.
18.Michalewicz Z. (1992). Genetic Algorithms + Data Structures = Evolution Programs. Springer-Verlag, New York.
19.Haupt R. L. and Haupt S. E., Practical Genetic Algorithms 2nd Edition, John Wiley & Sons, Inc., 2004.
20.Lozano M., Herrera F., Krasnogor N., and Molina D. Real-coded memetic algorithms with crossover hill-climbing. Evolutionary Computation 12 (3):273-302, 2004.
21.Herrera F., Lozano M., and Verdegay J. L., Tackling real-coded genetic algorithms: operators and tools for the behavioral analysis. Artificial Intelligence Reviews 12 (4):265-319, 1998.
22.Puchkov, F. M. and Shapchenko, K. A. 2005. Static Analysis Method for Detecting Buffer Overflow Vulnerabilities. Program. Comput. Softw. 31, 4 (Jul. 2005), 179-189.
23.Lammermann, F. and Wappler, S. 2005. Benefits of software measures for evolutionary white-box testing. In Proceedings of the 2005 Conference on Genetic and Evolutionary Computation (Washington DC, USA, June 25 - 29, 2005). H. Beyer, Ed. GECCO ''05. ACM Press, New York, NY, 1083-1084.
24.N. Tracey. A search-based automated test-data generation framework for safety critical software. PhD thesis, University of York, 2000.
25.P. McMinn. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 14:105--156, June 2004.
26.Amit Kulkarni, Stephen Bush, Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics, Journal of Network and Systems Management, Volume 14, Issue 1, Mar 2006, Pages 69 - 80
27.David Larson, Keith Miller, "Silver Bullets for Little Monsters: Making Software More Trustworthy," IT Professional, vol. 07, no. 2, pp. 9-13, Mar/Apr, 2005.
28.Scholz, B., Blieberger, J., and Fahringer, T. 1999. Symbolic pointer analysis for detecting memory leaks. SIGPLAN Not. 34, 11 (Nov. 1999), 104-113.
29.Heine, D. L. and Lam, M. S. 2003. A practical flow-sensitive and context-sensitive C and C++ memory leak detector. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (San Diego, California, USA, June 09 - 11, 2003). PLDI ''03. ACM Press, New York, NY, 168-181.
30.R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proceedings of the Winter USENIX Conference, pages 125–136, December 1992.
31.W. R. Bush, J. D. Pincus, and D. J. Sielaff. A static analyzer for finding dynamic programming errors. Software–Practice and Experience, 30(7):775–802, June 2000.
32.S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, pages 69–82, June 2002.
33.Chris Wilkinson, "對 Web 服務進行壓力測試", http://www-128.ibm.com/developerworks/tw/library/ws-tip-strstest/
34.Xie, Y. and Aiken, A. 2005. Context- and path-sensitive memory leak detection. SIGSOFT Softw. Eng. Notes 30, 5 (Sep. 2005), 115-125.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 林朝欽、李英弘(2001)。遊憩體驗的多階段性驗證。戶外遊憩研究,14(1),1-10。
2. 林俊昇(2005)。不同類型遊客的遊憩動機與滿意度對重遊意願之關聯性分析-以渡假行休閒農場為例,戶外遊憩研究18(2),25-47。
3. 林俊昇、黃文琪(2003)。初遊與重遊者對渡假農莊型休閒農場渡假行為偏好差異研究。農業經營管理年刊,9,195-219。
4. 沈進成、廖若岑、周君妍(2005)。遊客體驗、旅遊意象、滿意度與忠誠度影響關係之研究--以華山咖啡為例。戶外遊憩研究,18(3),59-79。
5. 王偉哲、賴美蓉(1999)。遊客對休閒農場之認知與體驗之研究-以苗栗飛牛牧場為例。戶外遊憩研究,12(1),19-40。
6. 王小璘、張舒雅(1993)。休閒農業資源分類系統之研究。戶外遊憩研究,6(1/2),1-30。
7. 陳水源(1989)。遊客遊憩需求與遊憩體驗之研究。戶外遊憩研究,1(3),25-52。
8. 陳昭郎(2002)。促進休閒農業發展。國家政策論壇,2(5),37-43。
9. 陳肇堯、胡學彥(2002)。休閒農場遊客認知與滿意度分析-以南部地區為例。戶外遊憩研究,15(3),31-54。
10. 黃宗成、吳忠宏、高崇倫(2000)。休閒農場遊客遊憩體驗之研究。戶外遊憩研究,13(4),1-25。
11. 楊文燦、鄭琦玉(1995)。遊憩衝擊認知及其滿意度關係之研究。戶外遊憩研究,8(2),109-132。
12. 鄭健雄(2002)。休閒農業旅遊市場區隔化之研究-以宜蘭休閒農場為例。農業經營管理,8,144-160。
13. 歐聖榮、蕭芸殷(1998)。生態旅遊遊客特質之研究。戶外遊憩研究 11(3):35-58