Abstract
The study of defects is a principal topic of software systems, af-fecting all phases of a system's lifecycle. Defects are the cause of errors and service degradations. Unresolved errors cause failures. If defects cannot be prevented effectively, then error control me-chanisms must be evaluated.
We introduce a model to distinguish between defects, errors, and service degradations. A two-dimensional classification scheme is developed for defects, defined by the types of process interaction and software corruption that are involved. A third dimension is added to this taxonomy for defects that cause service degradation, based on the deviations in service quality that are tolerated. We investigate the role of service degradation in error prevention.
- A. Avizienis, J. Laprie, B. Randell, and C. Landwehr (2004), Basic Concepts and Taxonomy for Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, vol. 1, no.1 (Jan.-Mar. 2004) pp. 11--33. Google ScholarDigital Library
- P. A. Bernstein and N. Goodman (1981), Concurrency Control in Distributed Database Systems, ACM Computer Surveys, vol. 13, no. 2 (June 1981) pp. 185--211. Google ScholarDigital Library
- A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour (2002), Predicting and Bypassing End-to-End Internet Service Degradations, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (November 2002) pp. 307--320. Google ScholarDigital Library
- R. Chillarege, I.S. Bhandari, J.K. Chaar, M. Halliday, D.S. Moebus, B.K. Ray, and M-Y. Wong (1992), Orthogonal Defect Classification-- a Concept for In-process Measurement, IEEE Trans. on Software Engineering, vol.18, no.11 (Nov. 1992) pp. 943--956. Google ScholarDigital Library
- S. Ghosh, Q. Razouqi, H. J. Schumacher, and A. Celmins (1998), A Survey of Recent Advances in Fuzzy Logic in Telecommunications Networks and New Challenges, IEEE Transactions on Fuzzy Systems, volume 6, (e) (Aug. 1998) pp. 443--447. Google ScholarDigital Library
- M. Hadzialic, M. Hamza, and P. Begovic (2007), An Approach to Cell Signal Coverage Reliability in the Presence of Different Fading Models, Proceedings of the 5th ACM International Workshop on Mobility Management and wireless Access, (2007) pp 91--98. Google ScholarDigital Library
- R.C. Holt (1972), Some Deadlock Properties of Computer Systems, ACM Computing Surveys, vol.4, no.3 (Sept. 1972) pp. 179--195. Google ScholarDigital Library
- J.N. Herder, H. Bos, B. Gras, P. Homburg, and A.S. Tanenbaum (2006), MINIX 3: a Highly Reliable, Self-repairing Operating System," Operating System Review, ACM Press, vol. 40, no. 3 (July 2006) pp. 80--89. Google ScholarDigital Library
- IEEE Computer Society 1990. "Standard Glossary of Software Engineering Terminology," ANSE/IEEE Standard 610.12-1990. IEEE Press, New York.Google Scholar
- ISO Reference Model for Open Distributed Processing (1996), ISO/IEC 10746-2:1996 (E) at http://standards.iso.org/ittf/PubliclyAvailableStandards/Google Scholar
- R. Kotla and M. Dahlin (2004), High Throughput Byzantine Fault Tolerance, International Conference on Dependable Systems and Networks (June 2004) pp. 575--584. Google ScholarDigital Library
- C. E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi (1994) A Taxonomy of Computer Program Security Flaws, ACM Computing Surveys, vol.26, no.3 (Sept. 1994) pp. 211--254. Google ScholarDigital Library
- G. Levine (1988) The Control of Priority Inversion in Ada, Ada Letters, vol. 8, no.6 (Nov., Dec. 1988) pp. 53--56. Google ScholarDigital Library
- G. Levine (1989) The Control of Starvation, International Journal of General Systems, vol.15 (1989) pp. 113--127.Google ScholarCross Ref
- G. Levine (2003) Defining Deadlock, Operating Systems Review, ACM Press, vol.37, no.1 (Jan. 2003) pp. 54--64. Google ScholarDigital Library
- G. Levine (2005) A Model for Anomalies of Software Engineering, in T. Sobh and K. Elleithy (Ed), Advances in Systems, Computing Sciences and Software Engineering, Springer, 2005, pp. 243--250.Google Scholar
- G. Levine (1996) A Model for Software Reuse, OOPSLA, San Diego, CA,, Oct. 1996, pp. 71--87.Google Scholar
- H. Liao, X. Wang, and H. Chen (2008), Adaptive Call Admission Control for Multi-class services in Wireless Networks, IEEE International Conference on Communications, (May 2008) pp. 2840--2844.Google ScholarCross Ref
- J. Liebeherr and D. Liao (1995) A Service With Bounded Degradation in Quality-of-Service Networks, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies, vol 3, April 1995, pp. 1103--1110. Google ScholarDigital Library
- G. Novark, E. D. Berger, and B.G. Zorn (2008), Exterminator: Automatically Correcting Memory Errors with High Probability, CACM, vol 51 (12) (Dec. 2008), pp. 87--95. Google ScholarDigital Library
- H. D. Owens, B.F. Womack, and M.J. Gonzalez (1996) Software Error Classification using Purify, Proceedings, International Conference on Software Maintenance., Nov. 1996, pp. 104--112. Google ScholarDigital Library
- W.O. Rom and S. A. Slotnick (2009), Order Acceptance Using Genetic Algorithms, Computer and Operations Research, 36 (2009), pp. 1758--1767. Google ScholarDigital Library
- A. N. Rouskas, A. A. Kikilis, and S. S. Ratsiatos, A game theoretical formulation of integrated admission and pricing in wireless networks, European Journal of Operational Research, vol 191 (3), 2008, pp. 1175--1188.Google Scholar
- A. S. Tanenbaum (2002) Computer Networks, 4th edition, Prentice-Hall, 2002. Google ScholarDigital Library
- G. V. Zaruba, I. Chlamtac, S.K. Das, A Prioritized Real-time Wireless Call Degradation Framework for Optimal Call Mix Selection (2002), Mobile works and Applications, vol 7, (2), April 2002, pp 143--151. Google ScholarDigital Library
Index Terms
Defining defects, errors, and service degradations
Recommendations
A service with bounded degradation in quality-of-service networks
INFOCOM '95: Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 3)-Volume - Volume 3Many network applications that require quality-of-service (QoS) support, such as transmission of digital voice and video, tolerate a certain level of service degradation. In this study, a novel network service, referred to as service with bounded ...
Predicting postcompletion errors using eye movements
CHI '08: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsA postcompletion error is a distinct type of procedural error where one fails to complete the final step of a task. While redesigning interfaces and providing explicit cues have been shown to be effective in reducing the postcompletion error rate, these ...
Error-Based Software Testing and Analysis
COMPSACW '11: Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications Conference WorkshopsAn approach to error-based testing is described that uses simple programmer error models and focus-directed methods for detecting the effects of errors. Errors are associated with forgetting, ignorance, bandwidth and perversity. The focus-directed ...
Comments