skip to main content
10.1145/1509239.1509269acmconferencesArticle/Chapter ViewAbstractPublication PagesmodularityConference Proceedingsconference-collections
research-article

Aspect oriented programming with hidden markov models to verify design use cases

Published: 02 March 2009 Publication History

Abstract

The goal of this research is to formulate a framework to determine whether the usage of an application in production environments is consistent with the test cases used to verify it before the application was released. Aspect-Oriented Programming (AOP) techniques are used to apply the instrumentation required for the measuring process so that the program is oblivious to the instrumentation and Hidden Markov Models (HMMs) are used to create signatures of the program. This paper presents the preliminary findings on the use of such mathematical models to measure the completeness of use cases driving the quality assurance testing.
To demonstrate the technique, the Web Service API of a commercial product is used. SOAP calls executed through different client applications are used to create test data for the experiments. The HMMs signatures created from collecting method calls can be used to determine whether the application is used according to the uses cases that have been verified. If the likelihood that the stochastic model obtained during testing can generate the sequences of calls collected from the production environment (via AOP techniques) is low, then it suggests that the program is being used in a way that has not been formally tested. These experiments will show that observable differences of the measurements using log likelihood graphs can detect such anomalies.

References

[1]
J. Bilmes. What HMMs can do. Technical Report UWEETR--2002--0003, Department of Electrical Engineering, University of Washington, January 2002.
[2]
E. Bodden and K. Havelund. Racer: Effective race detection using Aspectj. In ISSTA '08: Proceedings of the 2008 international symposium on Software testing and analysis, pages 155--166, New York, NY, USA, 2008. ACM.
[3]
F. P. Brooks. No silver bullet -- essence and accidents of software engineering. Information Processing, 86:1069--1076, 1986.
[4]
G. Florez, Z. Liu, S. Bridges, A. Skjellum, and R. Vaughn. Detecting anomalies in high-performance parallel programs. Journal of Digital Information Management, 2(2):44--47, June 2004.
[5]
G. Florez-Larrahondo, S. Bridges, and E. A. Hansen. Incremental estimation of discrete hidden Markov models based on a new backward procedure. In Proceedings of the AAAI, pages 758--763. AAAI, 2005.
[6]
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. Griswold. Getting started with AspectJ. Commun. ACM, 44(10):59--65, 2001.
[7]
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. Griswold. An overview of AspectJ. In Proceedings of ECOOP, volume 44, pages 327--353, 2001.
[8]
G. Kniesel and M. Austermann. CC4J -- Code Coverage for Java -- A Load-Time Adaptation Success Story. In In Proceedings of the 1 st IFIP ACM Working Conference on Component Deployment, number 2370 in LNCS, pages 155--169. Springer, 2002.
[9]
J. Langford. Optimizing hidden Markov model learning. Technical report, Toyota Technological Institute at Chicago, Providence, RI 02912, 2003.
[10]
I. MacDonald and W. Zucchini. Hidden Markov and Other Models for Discrete-valued Time Series. Monographs on Statistics and Applied Probability. Chapman and HALL/CRC, 1997.
[11]
L. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. In Proceedings of the IEEE, volume 77 of 2, pages 257--286, February 1989.
[12]
A. Rahimim. An erratum for: A tutorial on hidden Markov models and selected applications in speech recognition. World Wide Web. http://xenia.media.mit.edu/ rahimi/rabiner/rabiner- errata/rabiner-errata.html.
[13]
G. Sun, H. Chen, Y. Lee, and C. Giles. Recurrent neural networks, hidden Markov models and stochastic grammars. In Proceedings of International Joint Conference on Neural Networks, pages 729--734, San Diego,CA, 1990.
[14]
Verari Systems Inc. Verari Systems Inc, Verari Command Center (VCC). World Wide Web, 2008. http://www.verari.com.

Cited By

View all
  • (2013)Hybrid Static-Runtime Information Flow and Declassification EnforcementIEEE Transactions on Information Forensics and Security10.1109/TIFS.2013.22677988:8(1294-1305)Online publication date: 1-Aug-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AOSD '09: Proceedings of the 8th ACM international conference on Aspect-oriented software development
March 2009
278 pages
ISBN:9781605584423
DOI:10.1145/1509239
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. acm proceedings
  2. aspect-oriented programming
  3. runtime verification
  4. stochastic models

Qualifiers

  • Research-article

Conference

AOSD '09

Acceptance Rates

Overall Acceptance Rate 41 of 139 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)Hybrid Static-Runtime Information Flow and Declassification EnforcementIEEE Transactions on Information Forensics and Security10.1109/TIFS.2013.22677988:8(1294-1305)Online publication date: 1-Aug-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media