Using Graph Patterns to Extract Scenarios

نویسندگان

  • Jingwei Wu
  • Ahmed E. Hassan
  • Richard C. Holt
چکیده

Scenario diagrams are useful for helping software developers to understand the interactions among the components of a software system. In this paper, we present a semiautomatic approach to extracting scenarios from the implementation of a software system. In our approach, the source code of a software system is represented as a graph and scenarios are specified as graph patterns. A relational calculator, Grok, is extended to support graph pattern matching. Grok, as extended, is used in our analysis of the Nautilus open source file manager. Multiple scenarios are extracted and analyzed. These scenarios have helped us to understand Nautilus’s architecture.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

Near-fault seismic damage patterns and failure scenarios prediction of concrete gravity dams using nonlinear incremental dynamic analysis

Performance based earthquake engineering approach has been under evolution for seismic safety assessment of structures. Qualitative and quantitative definition of seismic performance levels is major challenge of concrete gravity dams. The main purpose of this article is damage patterns and failure scenarios prediction of structure while they prepare a suitable basement to determine dam seismic ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Generating an Indoor space routing graph using semantic-geometric method

The development of indoor Location-Based Services faces various challenges that one of which is the method of generating indoor routing graph. Due to the weaknesses of purely geometric methods for generating indoor routing graphs, a semantic-geometric method is proposed to cover the existing gaps in combining the semantic and geometric methods in this study. The proposed method uses the CityGML...

متن کامل

Simulating Optimal Scenarios of Urbanization Impacts on Flow Hydro-graph and Sediment Concentration in Ziarat Watershed, Iran

Extended abstract 1- INTRODUCTION Landuse change due to human activities is one of the important issues in regional planning. Considering the advantages and capabilities of the distributed hydrological models, they are appropriate for the survey of landuse changes as well as their quantitative estimates. Land evaluation methods are used to determine the compatibility of the land according to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002