Constraint violation detection: a fundamental part of software cybernetics

  • Authors:
  • Qianxiang Wang

  • Affiliations:
  • School of Electronics Engineering and Computer Science, Peking University, Beijing, China

  • Venue:
  • COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Monitoring of sensitive events is a key step for controlling the behavior of software. Specifying a sufficient set of constraints prior to software deployment is necessary for detecting the presence of such events during execution. Here we focus on issues related to service level constraints including types of constraints, the runtime structure of constraints and the related entities. An experiment to assess the feasibility of the proposed approach is also reported.