Entries |
Document | Title | Date |
20080222610 | Intelligent Processing Tools - A method and system capable of executing software for recording and playback of actions associated with events occurring during execution of the software configured for processing a software, wherein the software comprises a set instructions for performing one or more system requirements and generating an output; recording an event at a first instance and the associated action taken by the user during execution of the software; creating an action map of the event and respective response for the event as recorded by the user; storing the action map and detecting occurrences of an unexpected event at a next instance during execution of the software; associating a respective response from the action map with the unexpected event; and providing the user with an respective response which comprises the action taken. | 09-11-2008 |
20080222611 | Generic validation layer for object properties - A validation layer that facilitates the automatic annotation of object properties by the object with a validation attribute (e.g., FieldValidation), thereby specifying a set of validation rules declaratively, and scenarios under which these validation rules should fire. During build time, the validation layer iterates through each module and associated module classes to automatically generate the validation code. This not only makes the code more readable, but also ensures that a project has consistent validation handling. The validation layer applies to the annotation and validation at the property-level and inter-property. Thus, property-level validation is employed to ensure the correctness of individual values, and inter-property validation can be employed to ensure the correctness in combinations of values. | 09-11-2008 |
20080229286 | SYSTEM AND METHOD FOR SCALABLE FLOW AND CONTEXT-SENSITIVE POINTER ALIAS ANALYSIS - A system and method for pointer analysis for computer program verification includes forming a subset or cluster of pointers from pointers in a program by applying increasingly accurate alias analyses in a cascaded fashion such that each analysis works on a subset of pointers generated by a previous analysis's results. Aliases are computed for any pointer by computing aliases in the subsets in parallel instead of an entire program. For carrying out context and flow-sensitive alias analysis, function summaries are computed on small subsets in a top-down manner based on the points-to hierarchy which reduces the sizes of the summaries. | 09-18-2008 |
20080229287 | Method and Process to Automatically Perform Test Builds of Translated Files for a Software Product - A method, apparatus, and computer program instructions for automatically performing test builds of natural language translated files for a software product. When a translated file is received from a translator, a test build of the translated file is executed in a translation test build environment, wherein the translation test build environment is separate from the main software product build environment. A determination is made as to whether the test build of the translated file is successful. If the test build is successful, the translated file is submitted to the main software product build environment. If the test build is unsuccessful, a log file containing error information is sent to the translator to allow the translator to fix compile errors identified in the translated file and resubmit the translated file to the translation test build environment. | 09-18-2008 |
20080263523 | Method for testing engineering software - There is described a method for testing engineering software for at least one switching device, with the engineering software being installed on a computer with at least one interface, with a first interface being provided for communication between the engineering software and switching device. To significantly reduce the software development time, it is proposed for information relating to the switching device to be input into simulation software, for the simulation software to communicate with the engineering software by way of the first interface and for the simulation software to simulate the behavior of the switching device with the aid of the information. | 10-23-2008 |
20080270989 | DETECTING AND DISPLAYING ERRORS IN DATABASE STATEMENTS WITHIN INTEGRATED DEVELOPMENT ENVIRONMENT TOOL - Embodiments of the invention provide database integration within an integrated development environment (IDE) tool for displaying database structure and other database information, query editing and execution, and error detection for database statements embedded in program source code. Embodiments of the invention integrate database connectivity and error detection into the IDE tool, thereby potentially reducing the time required for database-aware application development. | 10-30-2008 |
20080270990 | Unwinding unwindable code - Unwinding may take place in an annotated unwinding environment with non-annotated code by placing a context frame between a first annotated function and non-annotated function and an unwind thunk between the non-annotated function and a second annotated function. The unwind thunk may redirect an unwind function to the context frame so that an unwind process may continue across a non-annotated function. | 10-30-2008 |
20080270991 | Software tool for detecting plagiarism in computer source code - A method and system for detecting plagiarism of software source code. In one embodiment, a first set of arrays and a second set of arrays are created for a first program source code file and a second program source code file respectively. Each pair of arrays in the first and second sets has entries corresponding to program elements of a distinct program element type such as functional program code, program comments, or program code identifiers. Next, each pair of arrays from the first and second sets is compared to find similar entries, and an intermediate match score is calculated for each pair of arrays based on the similar entries. Further, the resulting intermediate match scores are combined to produce a combined match score, which is then used to provide an indication of copying with respect to the first program source code file and the second program source code file. | 10-30-2008 |
20080276224 | Method and Apparatus for Completing Functional Testing - The Functional Tester Plug-in (FTP) extracts information from a data base to enhance automated testing tools to accommodate changes to the computer environment and so that a simulation can be fully executed even if an exception occurs. The FTP accesses the test script and static data store created by a developer using the automated testing tool, wherein the test script and static data store indicate a first resource to be tested at a verification point and a first expected result. The FTP identifies the first resource used by the test script at a first verification point and accesses the data base. The FTP identifies the status and configuration of the first resource in the data base. The FTP calculates and optimal expected result based any changes in the status and configuration of the first resource. The FTP executes the test script using the optimal expected result based any changes in the status and configuration of the first resource. | 11-06-2008 |
20080295079 | System and Method for Verifying and Testing System Requirements - There is provided in accordance with embodiments of the present invention a method and a system for testing and verifying a requirements specification of a system comprising describing the requirements specification in a REQUIREMENTS ENGINEERING LANGUAGE (REL), simulating an execution of a scenario of the REL, and identifying logical faults in said requirements specification based on said simulating. Accordingly, the system for testing and verifying of requirements specification of a system comprising a modeling and testing component to build a model of the requirements specification, and a dynamic testing component to test the requirements specification by execution of at least one simulation cycle. | 11-27-2008 |
20080301645 | Verification of customization results - Objects associated with a business document and one or more functions associated with the production of the objects may be determined. An object associated with an unexpected result in the business document may be selected. A function associated with the object may be selected, the function being associated with one or more custom settings. One or more steps, based on the custom settings, used in producing the selected object and associated with the selected function may be determined and provided in a result view. | 12-04-2008 |
20090019427 | Method and Apparatus for Providing Requirement Driven Static Analysis of Test Coverage for Web-Based, Distributed Processes - A method (which can be computer implemented) for analyzing test coverage of distributed processes includes the steps of identifying at least one of the processes that is invoked by a test case, mapping at least a portion of the test case to a plurality of specific test paths in the at least one of the processes, and identifying given ones of the test paths as possibly relevant in at least one of the processes, if the test paths are not infeasible. | 01-15-2009 |
20090031290 | METHOD AND SYSTEM FOR ANALYZING PARALLELISM OF PROGRAM CODE - Methods and systems are provided for analyzing parallelism of program code. According to a method, the sequential execution of the program code is simulated so as to trace the execution procedure of the program code, and parallelism of the program code is analyzed based on the result of the trace to the execution procedure of the program code. Execution information of the program code is collected by simulating the sequential execution of the program code, and parallelism of the program code is analyzed based on the collected execution information, so as to allow programmers to perform parallel task partitioning of the program code with respect to a multi-core architecture more effectively, thus increasing the efficiency of parallel software development. | 01-29-2009 |
20090037884 | Method for Automatically Creating a Behavior Pattern of a Computer Program for Model-based Testing Techniques - A method is provided for creating a behavior pattern of a computer program which comprises at least one source code with a plurality of program operations which are arranged in a logical succession and the source code is provided with annotations. Each annotation is referencing to a respective program operation and the annotations are read out automatically by a modeling tool, which is running on a processing unit and generating the behavior pattern of the computer program by arranging the annotations which have been read out according to the logical succession of the program operations and providing the generated behavior pattern, so that the generated behavior pattern can be represented via a representing unit. Furthermore, an appropriate server and an appropriate network system are provided. | 02-05-2009 |
20090055803 | SEMICONDUCTOR TEST PROGRAM DEBUG DEVICE - It is possible to provide a semiconductor test program debug device capable of reducing the unnecessary facilities when using a semiconductor test device or a semiconductor test program of different specification. The semiconductor test program debug device | 02-26-2009 |
20090055804 | Method and device for automatically evaluating the quality of a software source code - A method and device are disclosed for automatically evaluating a software source code quality, wherein evaluation rules and/or metrics for evaluating the software source code are pre-set. The source code is inspected with the aid of a set of evaluation rules and/or metrics, wherein the set contains at least one part of pre-set evaluation rules and/or metrics. In addition, in at lest one embodiment, the set of evaluation rules and/or metrics used for inspecting the source code is adapted according to the evaluation of a performed inspection of the source code with respect to at lest one predefined criterion for forming an adapted set of evaluation rules and/or metrics different from the first set. In addition, the source code is inspected by way of the adapted set of evaluation rules and/or metrics. At lest one embodiment of the invention makes it possible to evaluate advantageously and automatically a large number of source codes with respect to the quality and the improvement thereof and to adapt the set of evaluation rules and/or metrics and, thereby the quality inspection to specific requirements, for example, related to projects. At least one embodiment of the invention makes it possible to carry out a modern control of the internal software quality taking into consideration a business model and requirements related to the internal software quality or the quality of use. Modifications and extensions necessary for a software development process can be taken into consideration in a particularly flexible manner. | 02-26-2009 |
20090064111 | Formal Verification of Graphical Programs - System and method for formal verification of a graphical program. A graphical program comprising a plurality of interconnected nodes is created in response to input. One or more correctness assertions regarding program state of the graphical program are specified in response to user input, and a proof obligation generated based on the graphical program and the correctness assertions, which is usable by a theorem prover to determine correctness of the graphical program. The proof obligation may be generated by compiling the graphical program to generate an object-level diagram, parsing the correctness assertions to generate an intermediate logical form of the one or more correctness assertions, and analyzing the object-level diagram, the intermediate logical form, and/or semantics of the graphical programming language in which the graphical program is written to generate the proof obligation. A theorem prover may then process the proof obligation to determine whether the graphical program is correct. | 03-05-2009 |
20090077540 | Atomicity Violation Detection Using Access Interleaving Invariants - During execution of a program, the situation where the atomicity of a pair of instructions that are to be executed atomically is violated is identified, and a bug is detected as occurring in the program at the pair of instructions. The pairs of instructions that are to be executed atomically can be identified in different manners, such as by executing a program multiple times and using the results of those executions to automatically identify the pairs of instructions. | 03-19-2009 |
20090089758 | TESTING AND DEBUGGING OF DYNAMIC BINARY TRANSLATION - A method for testing and debugging of dynamic binary translation wherein a dynamic binary translator allows a target binary to be executed transparently on a host machine having a different computer architecture than the target machine involves selecting a minimum set of target machine states for simulation at run-time. A series of target machine instructions from the target binary is translated into a series of host machine instructions. During translation, a plurality of check points are inserted into the series of host machine instructions. During translation, a plurality of verification points are inserted into the series of host machine instructions. The series of host machine instructions, including the check points and verification points, are executed. Execution of a check point determines a simulated target machine state. Execution of a verification point sends information pertaining to simulated target machine states to an external verifier. | 04-02-2009 |
20090089759 | System and Method for Providing Symbolic Execution Engine for Validating Web Applications - In accordance with a particular embodiment of the present invention, a method is offered that includes generating a symbolic string manipulation class library for one or more web applications. The manipulations are generalized into a string manipulation symbolic algebra. The method also includes performing symbolic execution for one or more web applications. Typically, a Java model checker is augmented to check for certain types of requirements or properties in performing the symbolic execution. If an error scenario exists, a solution to a set of symbolic constraints is obtained, and the solution is mapped back to a source code to obtain an error trace and a test case. In still other specific embodiments, requirements or properties are encoded through templates and checked using public domain decision procedures. The properties or requirements can relate to security validation. The symbolic execution can be customized and tuned for Java-based web applications. | 04-02-2009 |
20090106737 | Using Cross-entropy to Test Executable Logic Code - A method for detecting the occurrence of rare events in an executable logic code includes assigning a first probability of a chance of traversal of one or more decision paths, in which each path connects two decision points defined by execution of the logic code. As a result of execution of the logic code, the decision paths traversed are evaluated to determine whether said traversal conforms to a predefined performance function. The performance function defines a goal to be achieved pursuant to the execution of the logic code. A second probability is assigned to the chance of traversal of at least one of said one or more decision paths to increase the likelihood that the one or more decision paths are traversed in a subsequent execution of the logic code in a closer conformity with the predefined performance function. | 04-23-2009 |
20090113394 | METHOD AND SYSTEM FOR VALIDATING PROCESS MODELS - A method and system are described for validating process models. A process semantic model including a semantic directed graph including nodes associated with tasks and edges associated with a direction of flow of execution of the tasks may be obtained. Edges entering nodes include annotations including precondition semantic indicators associated with the entering edges and edges exiting nodes include annotations including postcondition semantic indicators associated with the exiting edges. The process semantic model may be traversed to determine a flow of execution of activities associated with the tasks based on visiting the nodes based on a depth-first traversal. A validity of execution associated with a flow of execution of the activities associated with the tasks may be determined based on checking a validity of execution status based on a semantic processing of one or more semantic annotation indicators associated with the precondition semantic indicators and the postcondition semantic indicators. | 04-30-2009 |
20090113395 | VALIDATING SOFTWARE IN A GRID ENVIRONMENT USING GHOST AGENTS - A validation method can include the step of identifying a host within a grid environment, wherein the host is a software object. A ghost agent can be associated with the host, where the ghost agent can move within the grid environment. The actions of the host can be replicated by the ghost agent. Data related to the replicated actions can be compared with validation data. Validation output can be generated based upon the comparison. | 04-30-2009 |
20090125887 | SYSTEM AND METHOD FOR GENERATING ERROR TRACES FOR CONCURRENCY BUGS - A system and method for program verification includes generating a product transaction graph for a concurrent program, which captures warnings for potential errors. The warnings are filtered to remove bogus warnings, by using constraints from synchronization primitives and invariants that are derived by performing one or more dataflow analysis methods for concurrent programs. The dataflow analysis methods are applied in order of overhead expense. Concrete execution traces are generated for remaining warnings using model checking. | 05-14-2009 |
20090138856 | SYSTEM AND METHOD FOR SOFTWARE PERFORMANCE TESTING AND DETERMINING A FRUSTRATION INDEX - A system and method for determining a frustration index for a software suite based upon the measurements of the software's performance. The frustration index communicates the overall state of a customer's performance-related user experience as defined by a set of testing criteria and specified testing scenarios. Actual test measurements of one or more pre-specified criteria in one or more pre-specified testing scenarios or operating environments are first received, calculated or otherwise determined. Priority weights are provided for each of the pre-specified criteria in each of the pre-specified testing scenarios. Actual test measurements are then compared to target quantities, to provide a delta percentage between the actual measurements and the target quantities. The frustration index (or indices) is calculated as the result of a ratio of the delta percentage between the actual and the target to the priority weight of the criterion. | 05-28-2009 |
20090172643 | PROGRAM VERIFICATION APPARATUS, PROGRAM VERIFICATION METHOD, AND PROGRAM STORAGE MEDIUM - A program verification apparatus includes: a program executing unit executing a program; a variable monitoring unit monitoring a plurality of variables in the program to obtain monitor values of the variables; a target variable determiner determining one or more target variables out of the variables; a constraint condition storage storing a first constraint condition that defines a constraint to be satisfied for each of the target variables and a second constraint condition that defines a constraint to be satisfied among the target variables; a state acquiring unit sequentially acquiring target program state each of which is a combination of monitor values of the target variables at same time respectively; a state generating unit generating an unreached target program state which has not been acquired yet and satisfies the first and second constraint conditions; and a state setting unit setting the unreached target program state to the program. | 07-02-2009 |
20090183143 | METHOD AND APPARATUS FOR GENERATING TEST CASES OF SOFTWARE SYSTEM - A method and an apparatus for generating test cases of a software system. The method includes the steps of: tracing a user request to acquire IT events related to each service and/or component invocation; forming IT transactions based on correlation information in IT events; correlating said IT transactions based on predetermined correlation rules, in order to form a business transaction; and extracting from the business transaction a business transaction pattern corresponding to said business transaction. The method further includes generating test cases of a software system based on the generated business transaction pattern. The apparatus includes hardware for accomplishing the foregoing method steps. | 07-16-2009 |
20090187891 | VERIFICATION OF INPUT/OUTPUT HARDWARE CONFIGURATION - A method for verifying an input/output (I/O) hardware configuration is provided. A verification command is processed. The verification command includes a software device address range associated with a logical control unit (LCU) of the I/O hardware. The LCU utilizes a first logical path. The software device address range utilizing the first logical path is compared with an existing software device address range utilizing at least one additional logical path. The verification command is accepted if the software device address range and the existing software device address range match. | 07-23-2009 |
20090187892 | APPARATUS AND PROGRAM FOR TEST CASE GENERATION - A test case generation apparatus checks if there is a source code inspected portion in a model that is used to generate a test case. The inspected portion in the model is determined based on inspection information, and, when the inspected portion is found in the model, the inspected portion of the model is simplified. Thus, the test case generated by the test case generation apparatus has a fewer number of test patterns due to the simplified model of the inspected portion, and, as a result, achieves an enhancement of performance limit of an automatic test case generation of the test case generation apparatus. | 07-23-2009 |
20090217245 | METHOD AND IMPLEMENTATION FOR CONSTRUCTING OF CORRECTED JAVA NATIVE CODE - Method and system for constructing corrected Java native code are provided. Native source code that interfaces or integrates with Java code is analyzed and validated before the source code is compiled. One or more checks are performed on the native source code to verify that the native source correctly interfaces with the Java code, and the verification results from said one or more checks are reported. The method and system for constructing corrected Java native code can be implemented as a plug-in to a program development environment, wherein a developer may invoke the method and system while developing said native source code. | 08-27-2009 |
20090217246 | Evaluating Software Programming Skills - Disclosed herein is a method and system for evaluating the software programming skills of a candidate. A plurality of question compendia comprising a problem description, a set of evaluation test cases, and a skeleton code, is rendered based on the logical and technical levels of the candidate. The solution code created by the candidate is then transferred to a server for compilation and execution. The solution code is evaluated by examining the solution code for solution accuracy to the constructed problem, analyzing the solution code for code compliance with predefined coding conventions and standards, ascertaining memory utilization of the solution code and examining the exception handling capabilities of the solution code. The candidate is then provided with a consolidated ranking generated from scores allotted to the candidate during the evaluation of the solution code. | 08-27-2009 |
20090241093 | METHOD FOR DEBUGGING PROGRAMMABLE LOGIC CONTROLLER - The present invention relates to a method for debugging a programmable logic controller. An invariant logic formula is set up. A program is checked by the invariant logic formula, and if the program satisfies the invariant logic formula, debugging is complete and the process returns to the program checking step. If the program does not satisfy the invariant logic formula, checking is stopped and a warning signal and position or timing of the program error are issued. | 09-24-2009 |
20090254887 | Testing Software Applications with Progress Tracking - Method, computer program products and systems for testing a software application by providing one or more test units. Each test unit is adapted to verity a feature of the software application. A weight is assigned to each test unit. A theoretical sequence of execution of the test units is determined for the assigned weights and the test units are executed for the theoretical sequence. | 10-08-2009 |
20090259992 | TESTING NOTIFICATION-BASED SOFTWARE APPLICATIONS - A solution is proposed for testing a notification-based software application in a service oriented data processing environment (e.g., implementing the WS-Notification specification). The software application includes one or more notification producers. Each notification producer is adapted to distribute notification messages (e.g., of the SOAP type) to notification consumers that are subscribed thereto—according to a specification defined in a corresponding publication, such as a WSDL document. For each notification producer, a corresponding method starts with the step of creating a subscribe request according to the publication—in order to subscribe a tester as a notification consumer to the notification producer. The subscribe request is then submitted to the notification producer. At this point, there is verified a result of the subscription. The method continues by verifying a reception by the tester of a test notification message from the notification producer. | 10-15-2009 |
20090265690 | METHOD AND SYSTEM FOR VALIDATING A KNOWLEDGE PACKAGE - A method for validating a knowledge package involves generating the knowledge package, where the knowledge package includes guidelines for obtaining and installing software deliverables. The method further involves obtaining the software deliverables based on the guidelines in the knowledge package, performing a test installation of the software deliverables on a managed host, based on the guidelines in the knowledge package, generating an incident report indicating that the test installation has failed, and updating the knowledge package based on the incident report. | 10-22-2009 |
20090288071 | TECHNIQUES FOR DELIVERING THIRD PARTY UPDATES - Various technologies and techniques are disclosed for receiving and distributing updates for third party customers to end users. Input is received from a customer to login to a software update system. A software update is received from the customer. Metadata describing the software update is received from the customer. The software update is optionally validated to confirm that the software update can be trusted by end users who have a software program that could be updated with the software update. The software update is made available to update systems running on computers of end users after receiving the customer consent to the release of the software update. | 11-19-2009 |
20090300586 | STAGED AUTOMATED VALIDATION OF WORK PACKETS INPUTS AND DELIVERABLES IN A SOFTWARE FACTORY - A method, system, and computer-readable medium for staged validation of work packets within a software factory are presented. In one embodiment, the method includes creating a preliminary work packet. A validation constraint is appended to the preliminary work packet to create a constrained work packet. The constrained work packet is submitted to the software factory, within which the validation constraint is validated at different stages to confirm that the validation constraint is proper for the constrained work packet. If a validation result fails to meet all requirements of the validation constraint at each stage, the validation constraint is resolved, and the constrained work packet is re-submitted at that stage. | 12-03-2009 |
20090313608 | ENABLING A BUSINESS ENTITY TO VALIDATE SUPPORT FOR SPECIFIC ACTIVITIES IN A CRM SYSTEM BEFORE MIGRATION FROM EARLIER VERSIONS - An aspect of the present invention enables users (belonging to a business entity) to validate support for specific activities in a customer relationship management (CRM) system before migration from earlier versions. In one embodiment, the differences between the earlier version and the later version of the CRM system are first identified. An application based on the identified differences is then implemented, with the application designed to demonstrate how activities according to the earlier version would be operative in the later version. The application is provided with an input data representing a first activity (according to the earlier version) and executed to demonstrate how the first activity would be operative in the later version of the CRM system. A user may then inspect an output (e.g., user interfaces related to the first activity) of execution of the application to validate support for the first activity. | 12-17-2009 |
20090319997 | PRECONDITION RULES FOR STATIC VERIFICATION OF CODE - A verification engine for verifying compliance of a module of computer-executable instructions to various specifications or guidelines can utilize precondition rules to obtain information about the module so as to select appropriate rules with which the module will be verified. The precondition rules can inform an evaluation tool, which can obtain the specified information about the module. A preprocessor can then evaluate conditional statements and select one or more rules or environment modules based on the results of the evaluation of the precondition rules. Multiple levels of dependent precondition rules can be evaluated with a drill-down approach, where each dependency chain is evaluated until a terminal level, or with a layered approach, where all terminal level precondition rules are evaluated followed by precondition rules of increasingly higher levels. | 12-24-2009 |
20100017789 | Selectively Obtaining Call Stack Information Based on Criteria - A computer implemented method, apparatus, and computer program product for sampling call stack information. A set of methods and a set of criteria are received. Responsive to detecting an event associated with a method in the set of methods, a determination is made as to whether the method has met a set of criteria comprising at least one of a time based metric and a hardware performance monitor counter metric. A call stack is retrieved for the method if the method has met the set of criteria. The retrieved call stack is saved in a tree. | 01-21-2010 |
20100050160 | SYSTEM, METHOD AND PROGRAM PRODUCT FOR RANKING PEER SUBMITTED CODE SNIPPETS USING EXECUTION FEEDBACK - A method, system and program product for providing execution feedback of peer submitted code snippets executed for correction of semantic errors in code. A first developer executing a code snippet to correct a semantic error in the use of a third-party library within a first IDE results in the transmission of an execution result to a collaboration datastore. If the code snippet execution completed with no errors, a result indicating a success is automatically transmitted by the IDE. Further, if the code snippet execution resulted in an error due to error within the code snippet, a result indicating code snippet failure along with error details is automatically transmitted. When a second developer is working on code within a second IDE that contains semantic errors, code snippets to correct the semantic error are presented to the second developer, ranked based on previous execution feedback provided by peer developers. | 02-25-2010 |
20100050161 | Detecting Locking Discipline Violations on Shared Resources - Detecting locking discipline violations on shared resources. For example, a method of detecting locking discipline violations of shared resources of a computing platform, by a testing process to be executed concurrently with one or more other processes on said computing platform, the testing process comprising: locking a shared resource of said computing platform; reading a value of the shared resource; locally storing the value of the shared resource; rereading the value of the shared resource after a predefined time period; and generating a locking discipline violation report if the value of said shared resource as reread by said rereading is different from the value of said resource as locally stored by said locally storing. | 02-25-2010 |
20100083233 | Symbolic Runtime Checking of Quantified Contracts - An extension of symbolic execution for programs involving contracts with quantifiers over large and potentially unbounded domains is described. Symbolic execution is used to generate, from a program, concrete test cases that exhibit mismatches between the program code and its contracts with quantifiers. Quantifiers are instantiated using symbolic values encountered during a set of exhibited runs. In this setting, quantifier instantiation is limited to values supplied to or produced by a symbolic execution. Quantifier instantiation is controlled by performing a matching algorithm that uses run-time values of input and program variables in order to guide and limit the set of quantifier instantiations. With a sufficient set of instances, test cases are derived that directly witness limitations of the auxiliary assertions. | 04-01-2010 |
20100088679 | BIDIRECTIONAL TYPE CHECKING FOR DECLARATIVE DATA SCRIPTING LANGUAGE - An efficient, logical and expressive type system supports the combination of refinement types and type membership expressions, as well as a top type that encompasses all valid values as members. A bidirectional type checking algorithm is provided for the type system including synthesis and checking steps to statically verify types of code based on the type system. | 04-08-2010 |
20100088680 | METHODS AND SYSTEMS FOR REDUCING VERIFICATION CONDITIONS FOR CONCURRENT PROGRAMS USING MUTUALLY ATOMIC TRANSACTIONS - Methods and systems for generating verification conditions and verifying the correctness of a concurrent system of program threads are described. The methods and systems determine and employ mutually atomic transactions to reduce verification problem sizes and state space for concurrent systems. The embodiments provide both an adequate and an optimal set of token-passing constraints for a bounded unrolling of threads. | 04-08-2010 |
20100088681 | SYMBOLIC REDUCTION OF DYNAMIC EXECUTIONS OF CONCURRENT PROGRAMS - A computer implemented method for the verification of concurrent software programs wherein the concurrent software program is partitioned into subsets named concurrent trace programs (CTPs) and each of the CTPs is evaluated using a satisfiability-based (SAT) symbolic analysis. By applying the SAT analysis to individual CTPs in isolation the symbolic analysis is advantageously more scalable and efficient. | 04-08-2010 |
20100115493 | Method and System for Verifying Properties of a Computer Program - A method and a system for verifying properties of a computer program is provided, pertaining to the validity of properties at program points by means of at least one forward analyser and one backward analyser. For each property, in an issuing phase an analyser issues to a centralizer module an assumption on the validity of the property at a point of the program, the centralizer module storing the assumption in a database with an attribute indicating the original analyser and a status indicating that the assumption needs to be verified; in a phase of verifying the assumption, stored in the database, a test analyser is selected to analyse the assumption in cooperation with the other analysers, the centralizer module determining analysers able to cooperate. The verification phase is iterated until all assumptions stored in the base have been analysed by at least one test analyser, a verified assumption being marked as valid. | 05-06-2010 |
20100131928 | AUTOMATED TESTING AND QUALIFICATION OF SOFTWARE-BASED, NETWORK SERVICE PRODUCTS - A computer-based method for qualifying a software application such as a monitoring and/or management network-delivered product. The method includes operating a computer to run a software application with network-delivered services. A qualification computer system is provided with a code generator adapted for processing device qualification data and with a comparator module. The method includes generating a set of event messages with the code generator by processing a set of received or retrieved device qualification data. The event messages are processed with the services or serviceability features of the software application to generate a set of output. With the comparator module, the actual output is compared with expected output for the event messages. Based on the comparison, a qualification report is generated, and the expected output may be output from unit test cases. A code generator may be included that generates one or more native protocol event generators. | 05-27-2010 |
20100131929 | EFFICIENT INVARIANT INFERENCE FOR PROGRAM VERIFICATION - In one embodiment, a computer system identifies a portion of software code that is to be verified using invariants. The computer system infers invariants from the software code portion at a join point. The linear inequalities of the invariants include a first abstract domain that includes linear equalities among variables, and a second, different abstract domain that includes intervals for variables. The computer system selects variables that are to be applied within the linear inequalities to form a linear equality and an interval based on the linear inequality and performs a reduction operation on the variables to determine the substantially tightest numerical bounds for the variable's interval. The computer system also performs a join operation of the first and second abstract domains, where the join results in a precise abstraction of various possible software program states at the join point in the software program. | 05-27-2010 |
20100146486 | ENTERPRISE SERVICE VALIDATION - Configuring a testing tool incorporated in a device to validate that a software component supplements enterprise services associated with an enterprise service architecture (ESA) for a business scenario to be executed on the ESA. The configuring of the testing tool is based on enterprise services associated with the ESA that are necessary to perform actions on data objects related to the business scenario, and requirements for each necessary enterprise service to interact with the data objects, business logic within the ESA, and the other necessary enterprise services. The software is then validated for the business scenario using the configured testing tool. The testing tool will generate result data indicating the software supplements enterprise services for the business scenario. | 06-10-2010 |
20100146487 | APPARATUS AND METHOD FOR APPLICATION TESTING OF EMBEDDED SYSTEM - Provided is to an apparatus for application testing of an embedded system which can cross-develop an application program installed in the embedded system regardless of the type of a target system. A virtual environment for testing the application program adopted in the target system is constructed on the basis of information inputted through a user interface and the application program is tested by configuring a virtual target system in the constructed virtual environment. According to the present invention, the application program adopted in the target system can be developed and tested without constructing a cross-development environment for each target system in an environment in which various kinds of embedded systems are developed. | 06-10-2010 |
20100153924 | Method and System for Performing Software Verification - Described is a method, system, and computer program product that provides control of a hardware/software system, and allows deterministic execution of the software under examination. According to one approach, a virtual machine for testing software is used with a tightly synchronized stimulus for the software being tested. A verification tool external to the virtual machine is used to provide test stimulus to and to collect test information from the virtual machine. Test stimulus from the verification tool that is external to the virtual machine provides the stimulation that incrementally operates and changes the state of the virtual machine. The stimulus is created and coverage is collected from outside the virtual machine by first stopping the virtual machine, depositing stimulus, and then reading coverage directly from the virtual machine memory while the machine is stopped. | 06-17-2010 |
20100162213 | SYSTEM AND METHOD FOR MESSAGE CHOREOGRAPHIES OF SERVICES - In one embodiment the present invention includes a computer-implemented method of evaluating interactions between processes. The method includes storing a message choreography meta-model that includes an interaction meta class and a constraint meta-class. The interaction meta-class relates to an exchange of a message between a sender and a receiver, and the constraint meta-class relates to an input to the interaction meta-class. The method further includes executing a user interface computer program with which a user creates a message choreography model between a first process and a second process. The message choreography model is based on the message choreography meta-model. The message choreography model includes interactions that conform to the interaction meta class, and includes constraints that conform to the constraint meta class. The method further includes executing a verification computer program that performs a verification of the message choreography model. The verification includes verifying absence of an inconsumable message. The method further includes executing a testing computer program that performs a testing based on the message choreography model. The testing validates on an existing implementation the message exchange execution described by the choreography. | 06-24-2010 |
20100162214 | CUSTOMIZATION VERIFICATION - Results of an execution of a function including customizable steps, may be verified. Multiple of steps of the function, may be determined and may the customizable steps that have been customized. Results may be determined based on an execution of the function, wherein the execution uses values provided as inputs to the function. A result view for verifying the one or more results may be provided, the result view may include the steps of the function, the values corresponding to the inputs, and the results. | 06-24-2010 |
20100186003 | Per Group Verification - Various embodiments provide per group verification techniques in which code may be verified against one or more rules on a group by group basis. In one or more embodiments relationships between portions of a module to be verified can be defined. By being aware of relationships between various code portions, various embodiments can divide a module into related groups and perform verification on the basis of the groups. Multiple groups can be derived based at least in part upon the relationships. Each group can then be verified separately for compliance with one or more rules. Verification results can be output for each of the groups. | 07-22-2010 |
20100192129 | SEMANTIC SUBTYPING FOR DECLARATIVE DATA SCRIPTING LANGUAGE BY CALLING A PROVER - An efficient, logical and expressive type system supports the combination of refinement types and type membership expressions, as well as a top type that encompasses all valid values as members. Various embodiments verify the validity of subtyping relationships by translating to first-order logic, and invoking a general-purpose theorem prover with the first-order logic as input. In contrast to treating formulas as types, types are translated into formulas of standard first-order logic. Moreover, to represent data structures of the programming language as first-order logic, universal and existential quantifiers of first-order logic, and function symbols in terms, are exploited. Data intensive applications can be generated, verified, and deployed with greater speed and scale. | 07-29-2010 |
20100192130 | AUTOMATED VERIFICATION OF A TYPE-SAFE OPERATING SYSTEM - An “Automated, Static Safety Verifier” uses typed assembly language (TAL) and Hoare logic to achieve highly automated, static verification of type and memory safety of an operating system (OS). Various techniques and tools mechanically verify the safety of every assembly language instruction in the OS, run-time system, drivers, and applications, except the boot loader (which can be separately verified). The OS includes a “Nucleus” for accessing hardware and memory, a kernel that builds services running on the Nucleus, and applications that run on top of the kernel. The Nucleus, written in verified assembly language, implements allocation, garbage collection, multiple stacks, interrupt handling, and device access. The kernel, written in C# and compiled to TAL, builds higher-level services, such as preemptive threads, on top of the Nucleus. A Hoare-style verifier with automated theorem prover verifies safety and correctness of the Nucleus. A TAL checker verifies safety of the kernel and applications. | 07-29-2010 |
20100192131 | USING ATOMIC SETS OF MEMORY LOCATIONS - A system and method for ensuring consistency of data and preventing data races, including steps of: receiving and examining a computer program written in an object-oriented language; receiving sequences of accesses that form logical operations on a set of memory locations used by the program; receiving definitions of atomic sets of data from the memory locations, wherein said atomic sets are sets of data that indicate an existence of a consistency property without requiring the consistency property itself; inferring which code blocks of the computer program must be synchronized in order to prevent one or more data races in the computer program, wherein synchronization is inferred by determining by analysis for each unit of work, what atomic sets are read and written by the unit of work; and providing a message indicating where synchronization is required. | 07-29-2010 |
20100211934 | APPARATUS AND METHOD FOR SERVICE-ENABLING COMPUTER PROGRAMS - A method of injecting services into a computer program includes analyzing the computer program to evaluate its technologies. The method further includes identifying objects within the running computer program to inform an injected service that an event has occurred, and modifying the computer program so that the injected service responds to an occurrence of the determined object. | 08-19-2010 |
20100235816 | DATA-DRIVEN TESTING WITHOUT DATA CONFIGURATION - In software development, the provision of a testing tool which includes a method for defining a data source dynamically during an execution run, instead of programming such a definition within test script. | 09-16-2010 |
20100235817 | FAST AND ACCURATE DATA RACE DETECTION FOR CONCURRENT PROGRAMS WITH ASYNCHRONOUS CALLS - A system and method for analyzing a concurrent program employ asynchronous function calls for communication and recursion. A control flow graph is constructed based on a context-sensitive pointer analysis, whereupon encountering a function pointer, a points-to set of the function pointer is computed in a context-sensitive fashion to determine a set of potential function calls. The context-sensitive pointer analysis is terminated when no new potential function calls are encountered and where the potential function calls may contribute new data races other than those that exist in the contexts traversed thus far. To decide this, a characterization of pointer aliasing based upon complete update sequences is employed. A set of contexts that may contribute to different data races are enumerated by tracking update sequences for function and lock pointers and pointers that are shared or point to shared memory locations. Data race detection is carried out on the control flow graph. | 09-16-2010 |
20100235818 | PRE-CONDITION GENERATION DEVICE, POST-CONDITION GENERATION DEVICE, AND METHOD FOR GENERATING THESE CONDITIONS - A device includes: a storage storing second logical expressions; an storage storing an essential condition which indicates a set of one or more second logical expressions selected such that a proposition is not satisfied that the post-condition is satisfied immediately after a program is executed when a logical product of other second logical expressions obtained by excluding the set indicated by the essential condition from the storage is satisfied; a generator generating a candidate condition represented by a logical product of one or more second logical expressions to include a common second logical expression with the set indicated by the essential condition; a judging unit judging whether satisfied is a proposition that the post-condition is satisfied immediately after the program is executed when the candidate condition is satisfied, and an output unit configured to output the candidate condition determined to satisfy the proposition as representing a pre-condition of the program. | 09-16-2010 |
20100251216 | USING ENCODING TO DETECT SECURITY BUGS - A system that facilitates detecting security flaws in a web site that receives and transmits untrusted content is described herein. The system includes a receiver component that receives test content that corresponds to a field on a web page that, when the web site is online, is configured to receive user-generated content, wherein the test content includes non-malicious data. An encoder component encodes each character of the test content regardless of form or content of the test content to generate encoded content. A display component displays encoded content and non-encoded content of the web page to a tester on a computer screen, wherein the display component causes the encoded content to be displayed in a visually distinct manner from the non-encoded content. | 09-30-2010 |
20100251217 | METHOD AND SYSTEM FOR TESTING WEBSITES - A method and system is provided for testing and analyzing websites via a test-enabled web browser. In the representative embodiment a user controls a test-enabled web browser via a set of pull-down menus, thereby choosing between alternative testing and analysis functional capabilities, selecting files in which to store recordings (scripts), choosing files into which to place test results and messages, and setting various parameters that affect how the testing and analysis functions are performed. When the user requests it, the representative embodiment provides for deep recording of user interactions as they relate to a specific web page currently on display in the browser view area, for extracting key information from the current web page sufficient to validate that a future playback does or does not produce the same effects on the chosen website page, for playing back a prior recording to confirm that a website page continues to pass the user-defined tests, and for providing detailed analyses based on the specific contents of the current website page. The general result of systematic use of the test-enabled browser on websites is improved content quality, demonstrated website server behavior for deep tests, quicker delivery by the website server, and better serviceability for e-business. | 09-30-2010 |
20100281467 | METHOD AND APPARATUS FOR AUTOMATIC SOFTWARE TESTING - System and method for automated testing of computer software, especially for business process (enterprise) computer software applications. The present system generates scripts for testing software in an automated manner. Business process testing scripts, for instance for functional automated software testing, are thereby converted by an adapter to other types of testing scripts, for instance for testing performance or security or application monitoring. | 11-04-2010 |
20100293530 | SYSTEMS AND METHODS FOR MODEL CHECKING THE PRECISION OF PROGRAMS EMPLOYING FLOATING-POINT OPERATIONS - Methods and systems for verifying the precision of a program that utilizes floating point operations are disclosed. Interval and affine arithmetic can be employed to build a model of the program including floating point operations and variables that are expressed as reals and integers, thereby permitting accurate determination of precision loss using a model checker. Abstract interpretation can be also employed to simplify the model. In addition, counterexample-guided abstraction refinement can be used to refine the values of parametric error constants introduced in the model. | 11-18-2010 |
20100333069 | STATIC CODE ANALYSIS - Techniques for static code analysis are provided. The techniques include routing a code analysis request to a set of one or more static code analysis tools based on a context of the request, merging one or more tool-specific outputs of the code analysis, wherein merging the one or more tool-specific outputs comprises using one or more tool-specific mappings to one or more static code analysis abstractions and one or more source linkages of one or more static code analysis defects, performing a deep analysis on a set of one or more defect categories, and combining results of the merging with the deep analysis to filter out one or more false-positives and to add one or more new true positives to create an optimal set of defects. | 12-30-2010 |
20110041120 | PREDICTING DEFECTS IN CODE - A system is described herein that predicts defects in a portion of code of an application that is configured to execute on a computing device. Versions of code are analyzed to locate change bursts, which are alterations to at least one portion of code over time-related events. If a change burst is identified, defects are predicted with respect to the code based at least in part upon the identified change burst. | 02-17-2011 |
20110055816 | METHOD TO DERIVE SOFTWARE USE AND SOFTWARE DATA OBJECT USE CHARACTERISTICS BY ANALYZING ATTRIBUTES OF RELATED FILES - A system and method of deriving software use and software data object characteristics determine one or more locations on one or more computer storage devices where one or more configuration and data files associated with computer software components are stored, and obtain one or more attributes associated with said one or more computer software components. One or more commands associated with said one or more computer software components may be issued and one or more related information associated with said one or more software computer components resulting from issuing one or more commands may be collected. The related information and the one or more attributes may be mapped to the computer software components to derive information about the computer software component use and data object use characteristics. | 03-03-2011 |
20110078663 | Method and Apparatus for Cross-Browser Testing of a Web Application - An apparatus for cross-browser testing of a web application is disclosed, including: a first broker residing among a plurality of browsers for receiving information of a user action from a browser operated by a user among the plurality of browsers and for transmitting the information of the user action to other browsers so that the other browsers can execute the user action; a second broker residing between the plurality of browsers and the web application for receiving at least one web request generated by executing the user action from the plurality of browsers and for determining whether to be able to merge the at least one web request, so as to determine whether the plurality of browsers are compatible with the web application. An associated method is also provided. | 03-31-2011 |
20110083124 | Software Verification Using Two-State Invariants - Software verification using two-state invariants is described. In an embodiment a verifier represents an annotated program to be verified as a plurality of atomic transitions between global program states, each state comprising a plurality of objects. For example, the verifier accesses the annotations which specify a two-state invariant for each object. A two-state invariant is a predicate that relates a global program state before a state transition to the state after that state transition. In an example some of the two-state invariants are cross-object in that they refer to other objects. For example, a verification system checks that only the two-state invariants of the objects which changed in each transition are preserved; this modularity enables the verifier to work for large code bases and concurrent software. In an example the modularity is possible since the two-state invariants meet an admissibility requirement which is independent of the functionality of the program. | 04-07-2011 |
20110119655 | COMPUTER PRODUCT, VERIFICATION SUPPORT APPARATUS, AND VERIFICATION SUPPORT METHOD - A non-transitory, recording medium stores therein a program that causes a computer to execute extracting from hardware description of a circuit, a conditional branch statement representing a conditional branch process; determining whether the extracted conditional branch statement includes at least three condition expressions, where a given combination thereof has exclusive satisfying conditions; extracting from the conditional branch statement determined at the determining, a combination of condition expressions for which satisfying conditions are exclusive; extracting each condition expression from the extracted combination and creating, for each extracted condition expression and according to an order of appearance in the hardware description, a conditional branch statement in which the extracted condition expression has a hierarchical relationship with a condition expression not included in the combination; generating an assertion for checking whether a specified condition is satisfied in each created conditional branch statement; and outputting, as assertion data of the circuit, the generated assertion. | 05-19-2011 |
20110126173 | VERIFYING SYNCHRONIZATION COVERAGE IN LOGIC CODE - A computer implemented system and method for measuring synchronization coverage for one or more concurrently executed threads is provided. The method comprises updating an identifier of a first thread to comprise an operation identifier associated with a first operation, in response to determining that the first thread has performed the first operation; associating the identifier of the first thread with one or more resources accessed by the first thread; and generating a synchronization coverage model by generating a relational data structure of said one or more resources, wherein a resource is associated with at least the identifier of the first thread and an identifier of a second thread identifier, such that the second thread waits for the first thread before accessing said resource. | 05-26-2011 |
20110138362 | SOFTWARE EQUIVALENCE CHECKING - Two programs are checked for equivalence. Based on concrete states, a control path in each program is determined. A symbolic representation of the output is determined for each program and verified that for every input that would execute the programs on the determined control paths, the outputs are the same. Based on this operation, iterative processing may be performed to verify equivalence for all inputs of the program. | 06-09-2011 |
20110145795 | SYSTEM AND METHOD FOR AUTOMATED PERFORMANCE TESTING IN A DYNAMIC PRODUCTION ENVIRONMENT - The present invention relates to a system and method for automated performance testing in a dynamic production environment. More particularly the present invention relates to an automated system that enables the determination of whether a software application can meet the scalability and performance requirements in a real time use environment, wherein the performance requirement test comprises test for workload, reliability and resource usage. The system of the present invention provides an automated system for performing testing method that can convert a static environment i.e. fixed workload, one application state and one hardware representation into a dynamic one and predict accurate performance results for said constantly changing application. The system enables less effort, time and consequently money, and meets the performance scalability and requirements in real-time. | 06-16-2011 |
20110167411 | Configuration information verification apparatus and configuration information verification method - A configuration information verification apparatus includes an alive monitoring information collecting unit for collecting alive monitoring information from a plurality of configuration items constituting a network, a logical formula creating unit for referring to configuration information that represents information about connection relationships between the configuration items and creating a logical formula with respect to each configuration item by performing an AND operation on configuration items positioned on a route leading to corresponding configuration item, and assigning a “true” value to the logical formula if the alive monitoring information indicates that the corresponding configuration item is operating normally and assigning a “false” to the logical formula if the alive monitoring information indicates that the corresponding configuration item is not operating normally; and a logical formula verifying unit for verifying, from a plurality of logical formulae, whether an inconsistent logical formula is present. | 07-07-2011 |
20110173591 | Unit Test Generator - In one example, a software unit test generator is configured to receive a design document and a software unit. In this example, the design document includes a table of business objects in an enterprise software system and business rules that define the behavior of the business objects and the software unit includes a business rules engine that controls the behavior of the business objects. Continuing this example, a software unit test generator analyzes a design document to extract some or all of the business rules, and the software unit test generator creates a plurality of test scripts that, when executed, verify that a software unit conforms to the business rules. In some implementations, parameters for the test scripts are determined from the design document. In this example, a software unit test generator executes a collection of test scripts on the software unit and collects the results of the test scripts. | 07-14-2011 |
20110197180 | SYSTEM AND METHOD FOR SECURING WEB APPLICATION CODE AND VERIFYING CORRECTNESS OF SOFTWARE - Methods, software tools and systems for analyzing software applications, e.g., Web applications, are described. A software application to be analyzed is transformed into an abstract representation which preserves its information flow properties. The abstract interpretation is evaluated to identify vulnerabilities using, for example, type qualifiers to associate security levels with variables and/or functions in the application being analyzed and typestate checking. Runtime guards are inserted into the application to secure identified vulnerabilities. | 08-11-2011 |
20110202902 | Method and System for Configurable Pessimistic Static XSL Output Validation - A system, method, and computer readable medium. A method includes loading a first language definition and a second language definition. The method includes loading a transformation definition corresponding to the first language definition and the second language definition and loading a validation rule definition. The method includes applying the validation rule definition to the transformation definition to produce a validation result indicating whether the transformation definition produces a valid transformation between the first language definition and the second language definition. The method includes storing the validation result. | 08-18-2011 |
20110209123 | REDUCED INTEROPERABILITY VALIDATION SETS FOR MULTI-FEATURE PRODUCTS - Systems and methods of validating multi-feature products can provide for identifying a feature combination for a product, and expanding the feature combination to include additional features only if the additional features are interoperable with all features in the feature combination and the additional features are new to the feature combination. The feature combination and the expanded feature combination may be added to a validation set for the product, wherein the validation set can be used to validate various platform configurations of the product. | 08-25-2011 |
20110209124 | AUTOMATED TOP DOWN PROCESS TO MINIMIZE TEST CONFIGURATIONS FOR MULTI-FEATURE PRODUCTS - Systems and methods of conducting interoperability assessments provide for generating a feature interoperability matrix based on feature data and interoperability data, wherein the feature data defines a plurality of features of a product and the interoperability data indicates levels of interoperability of the plurality of features. A validation set can be generated based on the feature interoperability matrix, wherein the validation set includes a plurality of feature combinations. A subfeature interoperability matrix can be used to convert the validation set into a test plan for the product, wherein the test plan minimizes test configurations for the product. | 08-25-2011 |
20110225568 | Providing Software Validation as a Service - In one embodiment, a method includes accessing an event-driven application input by a user, the event-driven application comprising source code, one or more use cases input by the user for the event-driven application, and one or more functional requirements input by the user for the event-driven application; parsing the use cases and the functional requirements according to the predefined syntax to construct one or more validation modules for validating the event-driven application without any modification to the source code of the event-driven application for validation purposes; formally validating the event-driven application using the validation modules without relying on assertions inserted into the source code of the event-driven application for validation purposes; and if the formal validation finds one or more defects in the event-driven application, generating output for communication to the user identifying the defects. | 09-15-2011 |
20110231824 | LOW-LEVEL CODE REWRITER VERIFICATION - Verification of low-level rewriters such as binary rewriters involves “vanilla” rewriting a file to generate a rewritten low-level file without performing any optimization, compaction, or other substantive low-level code transformation during the rewrite. Then the metadata of the original low-level file is automatically compared with matching metadata of the rewritten low-level file for semantic equivalence. A properly functioning rewriter produces semantically equivalent files, whereas a defective rewriter may produce files whose metadata semantics differ. Comparison may distinguish composite metadata entities from self-contained metadata entities, and transitive closures of metadata may be compared. Comparison may also test for bitwise equality of self-contained metadata entities, and test for equality between respective flags, strings, fields, and/or methods of the original and rewritten files. Syntactic variants may be detected during comparison, and metadata may be converted into a canonical form to facilitate comparison. | 09-22-2011 |
20110231825 | AUTOMATIC TEST GENERATION FOR REFERENCE TESTING - A system for application reference testing (SMART) solves the technical problem of generating test data and test cases from graphical user interface applications (GAPs) to test web services, effectively and non-invasively. SMART allows organizations to easily and promptly identify and resolve software bugs, ensure higher quality software and development productivity, complete software projects faster, deliver software products to market quicker, and improve the return on investment for software development projects. SMART provides a user friendly visualization mechanism that interacts with an accessibility layer to enable organizations to economically and easily define user interactions with GAPs, by performing point-and-click, drag-and-drop operations on the GAPs, and generate reusable test data and test cases for web services. | 09-22-2011 |
20110239195 | DEPENDENCE-BASED SOFTWARE BUILDS - Dependence-based software builds are described. In embodiments, authored source code is received as inputs to a computer device to develop a buildable unit of a software build project. The software build project includes multiple buildable units that can be allocated for independent development among multiple developers, such as at computer devices local to each developer. At the computer device, dependent buildable units are identified that have a dependency relationship with the buildable unit for execution. The authored source code of the buildable unit is then validated to determine that the buildable unit executes with the dependent buildable units for error-free execution before the buildable unit is subsequently provided to a software build service that compiles the multiple buildable units to generate the software build project. | 09-29-2011 |
20110252406 | FACILITATING USE OF MODEL TRANSFORMATIONS - Techniques for facilitating use of a transformer are provided. The techniques include analyzing code of a transformer to compute one or more exception constraints and one or more output constraints, translating the one or more exception constraints and one or more output constraints to state them in terms of one or more input and output meta-model elements, wherein translating the one or more exception constraints and one or more output constraints comprises inferring one or more transformer rules in terms of vocabulary of a meta-model, wherein a transformer rule comprises one of a verification rule and a comprehension rule, and using the one or more inferred transformer rules to facilitate use of a transformer, wherein facilitating use of a transformer comprises supporting model verification and transform comprehension. | 10-13-2011 |
20110258605 | SOFTWARE DEVELOPMENT COMPLIANCE SYSTEM - A computer compliance system checks a software application during a software development process. The system receives an object definition file of the software application comprising a definition of a plurality of objects and generates an object hierarchy that describes the plurality of objects. For each rule of a plurality of rules from a rule engine, the system applies the rule to the object hierarchy, and augments the object hierarchy based on one or more new objects that are generated. When all rules have been applied, the system generates a final object hierarchy and converts the final object hierarchy into a predetermined output format. | 10-20-2011 |
20110258606 | ABSTRACTION-GUIDED SYNTHESIS - Given a program P, a specification S, and an abstraction function α, verification determines whether P satisfies the specification S under the abstraction α. If not, a trace T that violate the specification is selected, and either the abstraction α is refined or a constraint that avoids the trace T is computed and added to a set of constraints. The set of constraints are used to modify the program P. | 10-20-2011 |
20110258607 | METHOD FOR AUTOMATED ERROR DETECTION AND VERIFICATION OF SOFTWARE - A method for automated error detection and verification of software comprises providing a model of the software, the model including one or more model inputs and one or more model outputs, and a plurality of blocks embedded within the model each with an associated block type, the block types each having a plurality of associated block-level requirements. The method further comprises topologically propagating from the model inputs, a range of signal values or variable values, and error bounds, across computational semantics of all the blocks to the model outputs. Each behavior pivot value for a given block is identified and examined to determine if modifying or extending the propagated range by the error bound will or may cause a signal value to fall on either side of the behavioral pivot value. All occurrences of the signal value that will or may fall on either side of the behavioral pivot value are reported. | 10-20-2011 |
20110276948 | PARTITION-BASED STATIC ANALYSIS OF COMPUTER SOFTWARE APPLICATIONS - Partition-based static analysis of computer software applications may include inspecting each of a plurality of modules of a computer software application to identify at least one dependency of the inspected module on at least one other module of the computer software application, for each of the inspected modules, determining any transitive dependencies of the inspected module from the dependencies identified for the inspected module, performing a first static analysis on one of the inspected modules and its transitive dependencies, and performing a second static analysis on another of the inspected modules and its transitive dependencies, where the first and second analyses may be performed independently from each other. | 11-10-2011 |
20110289483 | AUTOMATED QUALIFICATION OF A BINARY APPLICATION PROGRAM - Methods and systems are disclosed that allow automated qualification of a binary application program. A binary application program submitted from a developer can be automatically examined to determine whether the binary application program complies with rules or guidelines of a platform. If the binary application program complies with the rules or guidelines, the binary application program can be qualified, and can be distributed upon further approval. If the binary application program does not comply with the rules or guidelines, the application program can be rejected and a notification can be sent to the developer. | 11-24-2011 |
20120011489 | Methods and Systems for Test Automation of Forms in Web Applications - In one embodiment, a method may include accessing a particular page of Web application that includes an interactive form having at least one field for entry of data by a user of the Web application, the interactive form rendered by the Web application based on code for the interactive form. The method may also include extracting input validation code from the code, the input validation code including at least one constraint on data entered into the at least one field. The method may additionally include extracting the at least one constraint based on an analysis of the input validation code. The method may further include solving, for the at least one field, for a string value based at least on the at least one constraint for the at least one field. The may also include automatically entering, into the at least one field, the string value. The method may additionally include automatically submitting the interactive form, including the string value entered into the at least one field. | 01-12-2012 |
20120017200 | Solving Hybrid Constraints to Validate a Security Software Module for Detecting Injection Attacks - In one embodiment, a method includes analyzing one or more first numeric constraints and one or more first string constraints associated with a software module including one or more numeric variables and string variables; inferring one or more second numeric constraints applying to specific ones of the string variables; inferring one or more second string constraints applying to specific ones of the numeric variables; representing each one of the first and second numeric constraints with an equation; representing each one of the first and second string constraints with a finite state machine; and verifying whether the software module is able to detect one or more forms of injection attacks by attempting to solve for a solution including one or more values for specific ones of the numeric and string variables that satisfies all the first and second numeric constraints and all the first and second string constraints. | 01-19-2012 |
20120023486 | Verification of Information-Flow Downgraders - A method includes determining grammar for output of an information-flow downgrader in a software program. The software program directs the output of the information-flow downgrader to a sink. The method includes determining whether the grammar of the output conforms to one or more predetermined specifications of the sink. The method includes, in response to a determination the grammar of the output conforms to the one or more predetermined specifications of the sink, determining the information-flow downgrader is verified for the sink, wherein determining grammar, determining whether the grammar, and determining the information-flow downgrader are performed via static analysis of the software program. Apparatus and computer program products are also disclosed. An apparatus includes a user interface providing a result of whether or not output of an information-flow downgrader in the software program conforms to one or more predetermined specifications of a sink in the software program. | 01-26-2012 |
20120036499 | SYSTEM AND METHOD FOR AUTOMATICALLY TESTING A PROGRAM FOR SAFETY-RELATED AUTOMATION SYSTEMS - A method and system are provided for automatically testing a program for automation systems (e.g., programmable logic controllers) with regard to maintaining programming guidelines for program design for automation systems. A copy of at least part of a safety-related program is obtained from a development system for automation systems as a copy to be tested. The program copy to be tested is loaded into a test device for testing programs. The test device has access to programming guidelines for program testing. The test device automatically performs the program test with regard to maintaining programming guidelines, and outputs the test result. | 02-09-2012 |
20120084759 | SYSTEM AND METHOD FOR IN-VIVO MULTI-PATH ANALYSIS OF BINARY SOFTWARE - A system and method for in-vivo multi-path analysis and testing of binary software including binary device drivers is disclosed. The system and method may be used to test a binary software system and may comprise a virtual machine, a symbolic execution engine and a modular plugin architecture. In addition, a device driver testing system is also disclosed wherein symbolic execution may be used to explore the device driver's execution paths and check for device driver behavior. | 04-05-2012 |
20120096440 | Modular and/or demand-driven string analysis of a computer program - Modular and/or demand-driven string analysis of a computer program is performed. Each method of the program is encoded into monadic second-order logic (M2L) to yield a set of predicate declarations and a set of constraints. The two sets for each method are composed to yield a union set of predicate declarations and a union set of constraints for the program. The union set of constraints includes a particular set of constraints corresponding to call relationships among the methods. An M2L formula including a free variable corresponding to a program variable is added to the union set of constraints. The two union sets are processed to verify a satisfiability of the constraints in relation to an illegal pattern. Where the constraints are satisfiable, the program can generate a string containing the illegal pattern. Where the constraints are not satisfiable, the program never generates a string containing the illegal pattern. | 04-19-2012 |
20120110550 | NODE COMPUTATION INITIALIZATION TECHNIQUE FOR EFFICIENT PARALLELIZATION OF SOFTWARE ANALYSIS IN A DISTRIBUTED COMPUTING ENVIRONMENT - A method for verifying software includes determining an initialization path condition of a received software verification job, determining a termination path condition of a computing node, and initializing the execution of the received software verification job on the computing node based on the initialization path condition and the termination path condition. The initialization path condition includes a sequence of program predicates for reaching a starting state of software to be verified. The received software verification job includes an indication of a portion of the software to be verified. The termination path condition includes an indication of the last state reached during the execution of a previous software verification job on the computing node. The computing node is assigned to execute the received software verification job. | 05-03-2012 |
20120117544 | AMPLIFICATION OF DYNAMIC CHECKS THROUGH CONCURRENCY FUZZING - The subject disclosure relates to effective dynamic monitoring of an application executing in a computing system by increasing concurrency coverage. A set of dynamic checks are linked to an application by mechanisms that enable the dynamic checks to monitor behavior of the application at runtime. As additionally described herein, concurrency fuzzing is applied to the application to randomize thread schedules of the application, thus increasing a number of disparate concurrency scenarios of the application observed by the plurality of dynamic checks. | 05-10-2012 |
20120117545 | EFFICIENTLY DEVELOPING SOFTWARE USING TEST CASES TO CHECK THE CONFORMITY OF THE SOFTWARE TO THE REQUIREMENTS - A method, system and computer program product for efficiently developing software and supporting creation of source code so as to develop software that meets the requirements. A plurality of test cases defining a plurality of respective tests to be executed to check the conformity of the software to the requirements are used. In a test execution step, one or more specific test cases selected from the plurality of test cases are executed or the specific test cases are caused to be executed. Furthermore, a test result of a test case executed or caused to be executed in the test case execution step is added to the source code. | 05-10-2012 |
20120151449 | Scope Bounding with Automated Specification Inference for Scalable Software Model Checking - A scalable, computer implemented method for finding subtle flaws in software programs. The method advantageously employs 1) scope bounding which limits the size of a generated model by excluding deeply-nested function calls, where the scope bounding vector is chosen non-monotonically, and 2) automatic specification inference which generates constraints for functions through the effect of a light-weight and scalable global analysis. Advantageously, scalable software model checking is achieved while at the same time finding more bugs. | 06-14-2012 |
20120167055 | EFFICIENTLY DEVELOPING SOFTWARE USING TEST CASES TO CHECK THE CONFORMITY OF THE SOFTWARE TO THE REQUIREMENTS - A method for efficiently developing software and supporting creation of source code so as to develop software that meets the requirements. A plurality of test cases defining a plurality of respective tests to be executed to check the conformity of the software to the requirements are used. In a test execution step, one or more specific test cases selected from the plurality of test cases are executed or the specific test cases are caused to be executed. Furthermore, a test result of a test case executed or caused to be executed in the test case execution step is added to the source code. | 06-28-2012 |
20120174073 | BRAND IMPACT VERIFICATION SYSTEM - A system to perform brand impact verification (BIV) for a utilization-related software application (URSA), associated with an identity and a software development process (SDP) including multiple phases. The system includes a requirements-design module to determine brand characteristics of a brand associated with the identity, and software application properties associated with the URSA. The system also includes a BIV testing engine, executed by a computer system, to identify design test procedures to produce quantitative and qualitative design test results based on the determined brand characteristics and the determined software application properties. The BIV testing engine also implements the design test procedures to generate design test results in an SDP design step of an SDP associated with the URSA. The design test procedures are implemented in the SDP in a SDP design step prior to implementing an SDP full implementation test step testing a full implementation of the URSA. | 07-05-2012 |
20120174074 | SCENARIO DRIVEN CONCURRENCY BUGS : MODEL AND CHECK - A computer implemented testing methodology employing a scenario-driven modeling of specific instances of bug patterns that commonly occur in concurrent programs which encodes these instances in an SMT-based symbolic analysis. Such modeling and encoding advantageously allow the symbolic analysis framework to focus on real bugs, thereby allowing effective utilization of resources. Experimentation determined a number of previously unknown bugs in public benchmarks and advantageously scenario-specific modeling and encoding improves the scalability of symbolic technique and, therefore, improves overall quality of concurrency testing. | 07-05-2012 |
20120180027 | SOFTWARE VERIFICATION SYSTEM AND METHOD, AND COMPUTER-READABLE MEDIUM FOR USE WITH THE METHOD - It is described a software verification system and a method for determining anew, upon detection that key characteristics fail an acceptance criteria test, key characteristics and acceptance criteria thereof required for an ensuing verification procedure, so as to perform a spiral verification procedure. Thus, the system and method overcome drawbacks of conventional verification solutions, improve consistency in requirements for budgets and schedules of a verification project, optimize use of resources, maintain the quality of software verification services, enhance the quality of key-controlled services and products, and increase the chance of performing the project successfully. A computer-readable medium for use with the method is further provided. | 07-12-2012 |
20120192157 | HEURISTIC APPROACH ON CHECKING SERVICE INSTANCE PROTECTION FOR AVAILABILITY MANAGEMENT FRAMEWORK (AMF) CONFIGURATIONS - A configuration including Service Instances (SIs) and a list of Service Units (SUs) is to be validated. The SIs are to be allocated to the SUs for protection of the service represented by the SIs. A set of heuristics is applied to determine whether, for each of the SI assignments, the SI can be allocated to one of the SUs whose capacities support the required capacities of the SI. The heuristic then walks the list in order, to find a first SU that supports a current SI. If none of the SUs in the list can support the current SI, the heuristic indicates that the configuration is not validated. In response to a result that at least one of the heuristics in the set indicates the SUs can support all of the SIs, a final result is generated indicating that the configuration is valid. | 07-26-2012 |
20120192158 | Model Based Verification Using Forward and Reverse Traversal of Variable Time Line - A technique for debugging of a program model (or the debugging and reconciliation of two independent software model instantiations) with the perception of immediate showing of values assumed by all variables at any selected time, by permitting a user to move a selected test point in a forward and reverse direction along a time line, without recalculating the model each time the test point is moved. This is achieved by running the program model once and then saving all the variable values in memory, the values associated with the explicit name of the pertaining variable. | 07-26-2012 |
20120210306 | System and Method for Application Testing - The present invention is directed to a system and method which allows applications that are otherwise not addressable by a network to be accessed and tested via the network. For test purposes, an Application Under Test (AUT) is bundled with a several components that allow a Test Server (TS) to access the AUT as if the AUT were directly addressable via the network. In one embodiment, the AUT is bundled with a Client Proxy (CP). The client proxy is also limited in that it also is not addressable by the test server. However, the client proxy can make outgoing socket connections (HTTP, in this implementation). The client proxy queries a Server Proxy (SP) for queued requests, sends the appropriate commands to the AUT, and then responds to the SP with the results. The combination of the SP and the CP, working in tandem, abstract the network connection to the device and provide a virtual connection to the AUT. To the TS, there is a socket (HTTP) connection directly to the device, and thus the methods are invoked directly on the device. | 08-16-2012 |
20120233599 | EFFICIENT MODEL CHECKING TECHNIQUE FOR FINDING SOFTWARE DEFECTS - A method for detecting defects in a computer program. The method steps include obtaining source code and a potential defect definition; identifying, based on the potential defect definition, a set of program objects associated with a potential defect in the source code; extracting an executable program slice having the potential defect from the source code; generating, by a processor, an abstracted model of the program slice by: modeling, using data abstraction, the set of program objects as data-abstracted variables, identifying, within the program slice, a set of control statements including predicates necessary for evaluating the set of control statements, modeling, using predicate abstraction, the predicates as predicate-abstracted Boolean variables, and creating, based on the data-abstracted variables and the predicate-abstracted Boolean variables, a finite state machine (FSM) model of the program slice; and identifying an error state of the FSM indicating an occurrence of the potential defect within the program slice. | 09-13-2012 |
20120246621 | COMMAND LINE INTERFACE ROBUSTNESS TESTING - One embodiment of the present invention sets forth a method for generating one or more tests for testing a command provided by a command line interface. The command is specified in a pre-determined meta-language. The meta-language is then converted in the tokenized post-fix notation, which is processed to generate a direct acyclic graph (DAG) that represents the different permutations of the command. By traversing the DAG from a root node to a leaf node, a test can be generated. The test is then executed within the command line interface, and the result analyzed to determine whether the command line interface is operating correctly. | 09-27-2012 |
20120266141 | API DESCRIPTIONS - API description techniques are described for consumption by dynamically-typed languages. In one or more implementations, machine-readable data is parsed to locate descriptions of one or more application programming interfaces (APIs). The descriptions of the one or more application programming interfaces are projected into an alternate form that is different than a form of the machine-readable data. | 10-18-2012 |
20120284696 | Method, Apparatuses and a System for Compilation - The invention relates to forming a binary computer program. Target platform information is provided to a compiler, as well as source code. A compilation environment is then determined based on the platform information and a binary computer program is formed from the source code for the target platform in the compilation environment. | 11-08-2012 |
20120291018 | METHOD AND APPARATUS FOR MANAGING EVALUATION OF COMPUTER PROGRAM CODE - A computer implemented method of managing evaluation of computer program code is described, the method comprises receiving, in an input module, an input indicating a selection of computer program code for evaluation; receiving, in the input module, an input indicating a selection of rules, to be applied to the selection of computer program code from a plurality of rules, each rule of the plurality of rules indicating a criterion for compliance with the rule, the criterion for compliance being a result of at least one check on a portion of computer program code; and generating, in a processor, an indication for use in evaluating the computer program code indicating data comprising the selection of computer program code and the selection of rules. | 11-15-2012 |
20120291019 | PROGRAM VERIFICATION APPARATUS BASED ON MODEL VERIFYING AND STORAGE MEDIUM - An apparatus includes a unit configured to analyze a program and generate a verification formula for determining whether a specification to be verified out of a language specification of the program is fulfilled; a code generating unit configured to generate a verification code including the generated verification formula; a code composition unit configured to determine, with respect to at least two verification codes generated by the code generating unit, whether or not the two verification codes can be composed to form a single verification code, and compose the two verification codes to form a single verification code if it is possible; and a unit configured to determine, with respect to the at least two verification codes that can be composed, whether the specification to be verified is fulfilled using the verification code composed by the code composition unit. | 11-15-2012 |
20120297368 | Fake Check-In Entries Posted on Behalf of Social Network Users - An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application. | 11-22-2012 |
20120297369 | METHOD AND SYSTEM FOR CONCISE EXPRESSION OF OPTIONAL CODE SNIPPETS IN INTERREPTED LANGUAGES - A method and apparatus for the concise expression of optional code snippets in interpreted object-oriented programming language software applications is described. In one embodiment, the method includes defining a first class where the first class is a concise expression class that includes one or more objects. The method may also include including the concise expression class in a second class that includes one or more objects of the second class. The method may also include executing an expression in a software application to evaluate an object of the second class and returning an instance of an object of the concise expression class when data associated with the object of the second class does not exist within the software application. | 11-22-2012 |
20120311538 | Capturing Rich Actionable Feedback on Working Software - Described is a workflow and procedure that automates the process of requesting feedback on a software solution from a customer (user). A system facilitates creating a feedback request that is sent to a user, by which the user launches the software solution and a feedback tool. Via the tool, the customer provides rich actionable feedback, which is maintained in a data store for subsequent action, e.g., review by a product owner/development team. The development team may take action on the feedback, and notify the user, closing the loop with the user. | 12-06-2012 |
20120324427 | STREAMLINED TESTING EXPERIENCE - Tests can be categorized as important with respect to ensuring software functions correctly as a function of one or more rules that define importance. The rules can be configurable to enable control of categorization. Further, tests categorized as important can be highlighted in some manner, for instance by displaying important tests in a group designated for such tests. | 12-20-2012 |
20130031531 | METHOD AND SYSTEM FOR PERFORMING BACKWARD-DRIVEN PATH-SENSITIVE DATAFLOW ANALYSIS - In general, in one aspect, the invention relates to a method for static analysis. The method includes: obtaining source code; constructing a control flow graph (CFG) corresponding to the source code, by identifying control structures within the source code, creating a set of graph nodes of the CFG, and creating a set of directed graph edges of the CFG connecting the set of graph nodes; assigning a first Boolean flow value to a selected node of the set of graph nodes; backward traversing the CFG from the selected node to a target node; computing, by a computer processor and while backward traversing the CFG, disjoint predicate expressions representing flow values at the set of directed graph edges; computing, based on the disjoint predicate expressions, a resulting disjoint predicate expression; and identifying, based on the resulting disjoint predicate expression, a potential program property in the source code. | 01-31-2013 |
20130055208 | Performing Taint Analysis for Javascript Software Using a Control Flow Graph - In one embodiment, marking an object in source code of a software program written in JavaScript; identifying one or more locations paired with the object in the source code of the software program; constructing a control flow graph (CFG) for the software program; and determining whether there is any path in the CFG that leads from a first node corresponding to the marked object to a second node corresponding to any identified location paired with the object. | 02-28-2013 |
20130055209 | Constructing a Control Flow Graph for Javascript Software - In one embodiment, constructing a λ | 02-28-2013 |
20130055210 | Symbolic Execution of Javascript Software Using a Control Flow Graph - In one embodiment, accessing a control flow graph (CFG) of a software program written in JavaScript; identifying one or more paths in the CFG; and performing symbolic execution on the software program using the CFG. | 02-28-2013 |
20130055211 | CLIENT-SIDE POLICY ENFORCEMENT OF DEVELOPER API USE - Methods and systems are disclosed that allow automated pre-qualification and qualification of an application. An application description can be generated for an application submitted by a developer, the application description can be automatically examined to determine whether the application complies with rules or guidelines (e.g., policies) of a platform. If the application complies with the rules or guidelines, the application can be pre-qualified and submitted for approval and distribution. If the application does not comply with the rules or guidelines, the application developer can be notified of the errors in the application and the developer can be prevented from uploading the application for approval and distribution. | 02-28-2013 |
20130055212 | SYSTEM AND METHOD FOR GENERATING APPLICATION REQUIREMENTS - A method for execution by a processing module begins by receiving inputted requirements and parameters. The method continues by generating application requirements based on the inputted requirements, the parameters, and verification feedback. For one or more application requirements, the method continues by determining whether the generating of the one or more application requirements is consistent with valid system states and correctness criteria to produce one or more verification results. For the one or more application requirements, the method continues by comparing the one or more verification results with one or more verification thresholds to produce the verification feedback. | 02-28-2013 |
20130055213 | SYSTEM AND METHOD FOR TESTING APPLICATION CODE - A testing unit includes an input/output module and a processing module. The input/output module receives application requirements and parameters. The processing module generates a set of test cases based on the application requirements and the parameters; adjusts at least some of the set of test cases based on a code generation progression to produce targeted progression test cases; and tests a developing application code based on the targeted progression test cases, wherein the code generation progression indicates a level of development of the developing application code. | 02-28-2013 |
20130061211 | SYSTEMS, METHODS, AND COMPUTER-READABLE MEDIA FOR MEASURING QUALITY OF APPLICATION PROGRAMMING INTERFACES - Systems, methods, and computer-readable media for determining the quality of an API by one or more computing devices includes: receiving documentation of the API; determining, based on the documentation, values that include at least one of names of the methods, parameters of the methods, and functions of the methods; determining one or more measurement value including at least one of a complexity of the API, a consistency of the parameters of the API, a level of confusion of the API, a logical method groupings of the API, a thread safety of the API, an exception notification of the API, and a documentation quality of the API; and specifying at least one quality metric for the API based on the measurement values. | 03-07-2013 |
20130074046 | APPLICATION PROTOYPING SUITE - Various exemplary embodiments relate to a method and related network node including one or more of the following: an application storage that stores code defining an application, wherein the code is received by the prototyping suite from the developer device; a testing controller configured to effect performance of at least one test in association with the application to produce at least one test result; a certification controller configured to analyze the at least one test result to determine whether the application meets a certification requirement of a first plurality of certification requirements; and an application marketplace server configured to provide the application to at least one other device when the certification controller has determined that the application meets each certification requirement of the first plurality of certification requirements. | 03-21-2013 |
20130074047 | METHOD FOR OPERATING A HOUSEHOLD APPLIANCE AND HOUSEHOLD APPLIANCE INTENDED FOR USE IN SUCH A METHOD - A method for operating a household appliance uses a computer that is communicatively connectable to the household appliance or is part of the household appliance. The household appliance includes a memory containing a control program and at least one appliance program executable by the control program, and a processing unit configured to execute the control program. The computer is communicatively connectable to the Internet and includes a computer program configured to exchange data between the household appliance and a database available on the Internet. At least one appliance program available in the database is selected using the computer under control of the computer program, is transmitted to the computer and is transferred into the memory of the household appliance from the computer. | 03-21-2013 |
20130086556 | SYSTEM FOR ENSURING COMPREHENSIVENESS OF REQUIREMENTS TESTING OF SOFTWARE APPLICATIONS - A method for determining a comprehensiveness of software requirements tests for testing a software application includes receiving data that defines artifacts of a software project. A first sub-link between at least one application requirement and at least one code module of the application code is identified. The first sub-link indicates a relationship between the application requirement and the code module. A second sub-link between at least one test case and the code module is identified. The second sub-link indicates a relationship between the test case and the module. A traceability link between the test case and the application requirement is determined based on the first sub-link and the second sub-link. The traceability link indicates that the test case tests the software application for compliance with the application requirement. | 04-04-2013 |
20130111449 | STATIC ANALYSIS WITH INPUT REDUCTION | 05-02-2013 |
20130125095 | AUTOMATED ANALYSIS OF COMPOSITE APPLICATIONS - An application analysis mechanism analyzes a composite application for conformance to a set of component interaction rules that define one or more conditions that should be satisfied between components written in different languages, along with an action that is performed depending on the analysis of the conditions. Once the component interaction rules are defined, the composite application is received. Next, a model of the composite application is built that separates components of the composite application into categories based on the programming language used, and includes metadata to describe interaction between components. The set of component interaction rules is then run against the model of the composite application. The results of the analysis are then output. The automated analysis of composite applications removes much of the process that is prone to human errors to provide an efficient and consistent approach for analyzing composite applications. | 05-16-2013 |
20130132933 | AUTOMATED COMPLIANCE TESTING DURING APPLICATION DEVELOPMENT - An integrated development environment incorporates a mechanism to automatically test the execution of a software application for compliance with requirements set forth in a compliance test. The integrated development environment incorporates a compliance test tool for analyzing system data generated during execution of the software application under test. The execution of the software application is performed in a runtime environment having code markers that are used to identify the occurrence of events that are associated with the requirements of the compliance test. | 05-23-2013 |
20130159976 | ABSTRACT SYNTAX TREE TRANSFORMATION - The transformation of an abstract syntax tree of a dynamic language program at evaluation time in a manner that is helpful for evaluating the program. For instance, the abstract syntax tree may be altered such that metadata is attached to variables generated during execution. The tree might also be altered to force code to execute faster or more likely than would occur otherwise. This might occur so that the dynamic language program might be executed at authoring time up to a halt point that represents a point of interest to the author. Without transformation of the abstract syntax tree, the execution might have not proceeded to the halt point or might have taken a long time. Once at the halt point, the program state at the halt point may be evaluated, allowing the program to perform functions such as generating an available symbol set at the halt point. | 06-20-2013 |
20130219367 | ATOMICITY VIOLATION DETECTION USING ACCESS INTERLEAVING INVARIANTS - During execution of a program, the situation where the atomicity of a pair of instructions that are to be executed atomically is violated is identified, and a bug is detected as occurring in the program at the pair of instructions. The pairs of instructions that are to be executed atomically can be identified in different manners, such as by executing a program multiple times and using the results of those executions to automatically identify the pairs of instructions. | 08-22-2013 |
20130219368 | Automatically Testing a Web Application - A mechanism is provided for automatically testing a web application running inside a web browser. Pieces of test code are included in the web application code. An HTTP server provides a test service to the web application instrumented with test code. Through an API interface, the test code requests to the HTTP server that user inputs be simulated and sent to the browser. The HTTP server generates simulated system events corresponding to the user input and sends them to the browser. The browser processes the system events for the web application as usual. In this way the test code will check the data structure of the web application and the entire environment of the web application will be included as well. | 08-22-2013 |
20130239092 | Automated Validation of Generated Test Cases Following Changes to the Underlying Test Model - Automated checking of test cases when the underlying test model has been modified includes verifying the structure of the original test cases against the new (modified) test model. Verified test cases are assessed by manipulating the new test model to produce corresponding manipulated test models. A test case is still valid for the new test model if a test case can be generated from its corresponding manipulated test model. | 09-12-2013 |
20130239093 | PARALLELIZING TOP-DOWN INTERPROCEDURAL ANALYSIS - Technologies pertaining to top-down interprocedural analysis of a computer program are described herein. A query is received for processing over a root procedure in the computer program. Responsive to the query being received, the root procedure is explored, and calls to sub-procedures are located. Sub-queries are generated upon encountering the calls to the sub-procedures, and execution of the sub-queries is performed in parallel across multiple computing nodes. | 09-12-2013 |
20130239094 | DETECTING LOCKING DISCIPLINE VIOLATIONS ON SHARED RESOURCES - Detecting locking discipline violations on shared resources. For example, a method of detecting locking discipline violations of shared resources of a computing platform, by a testing process to be executed concurrently with one or more other processes on said computing platform, the testing process comprising: locking a shared resource of said computing platform; reading a value of the shared resource; locally storing the value of the shared resource; rereading the value of the shared resource after a predefined time period; and generating a locking discipline violation report if the value of said shared resource as reread by said rereading is different from the value of said resource as locally stored by said locally storing. | 09-12-2013 |
20130247006 | SOFTWARE WIZARD IMPLEMENTATION FRAMEWORK - A framework for developing and testing a software wizard formalizes, through constraint functions, relationships between different pages of the software wizard. A sequence of user interface (UI) pages of a software wizard is generated in accordance with this framework by carrying out the steps of displaying a first UI page that includes a first UI element for causing a transition to a next UI page of the software wizard, wherein the first UI page is associated with one or more constraint functions, detecting an input event that triggers the one or more constraint functions of the first UI page to produce an output that identifies the next UI page in the sequence of UI pages of the software wizard, and transitioning to the next UI page based on the output. | 09-19-2013 |
20130254747 | METHOD AND APPARATUS FOR TESTING PROGRAMS - A method and apparatus for testing a computer program for correct execution by various computerized apparatuses, the method comprising: obtaining at least two configurations for a computing platform; for each configurations of the at least two configurations: setting the computing platform in accordance with the configuration; and executing a computer program on the computing platform using the configuration, thereby testing the computer program for correct execution by various computerized apparatuses. | 09-26-2013 |
20130263091 | SELF-EVOLVING COMPUTING SERVICE TEMPLATE TRANSLATION - Methods and apparatus for automatically generating translation programs for translating computing services templates to service blueprints are disclosed. An example method includes generating a population of translation logic elements from a plurality of verified computing services template translation programs, where each of the verified programs is configured to correctly translate at least one computing services template of a plurality of known templates to a respective service blueprint. The example method further includes identifying a new computing services template and programmatically augmenting the population of translation logic elements. The example method also includes generating one or more additional translation programs based on the augmented population of translation logic elements and validating each of the one or more additional computing services template translation programs. Based on the validating, each of the one or more additional computing services template translation programs is added to the verified translation programs or is discarded. | 10-03-2013 |
20130263092 | METHOD OF CONVERTING SOURCE CODE AND SOURCE CODE CONVERSION PROGRAM - A method of converting a source code for converting a source code of software to an inspection code by using a computer, including the steps of: inputting a source code of software; inputting a plurality of different conversion rules; inputting a nonfunctional rule that is a constraint relating to process performance; and converting the source code to a nonfunctional inspection code written in an input language of a validation tool by the plurality of different conversion rules and the nonfunctional rule. | 10-03-2013 |
20130268917 | CONFIGURABLE AUTO CONTENT TESTING FRAMEWORK FOR TECHNICAL DOCUMENTATION - A system including a processor, a memory store, and a script generation engine. The script generation engine is configured to generate a test script comprising a test command instruction obtained from the technical documentation file, and submit a first query to the command configuration database using the test command instruction. The script generation engine is further configured to submit a second query to the command configuration database using the input parameter argument and the input parameter state, receive a second command entry comprising a prerequisite command instruction, an output parameter argument, and an output parameter state, where the output parameter argument matches the input parameter argument and the output parameter state matches the input parameter state, modify the test script to obtain an updated test script, and execute the updated test script on a target operating system. | 10-10-2013 |
20130275951 | RACE DETECTION FOR WEB APPLICATIONS - A method of executing a rendering engine including executing a web application including at least two operations a single thread of execution, generating an auxiliary map for instrumentation accesses of the web application, and detecting and reporting concurrent memory accesses of the web application as a race. | 10-17-2013 |
20130283238 | TESTING SYSTEM FOR AN INTEGRATED SOFTWARE SYSTEM - Systems and methods are provided for testing an integrated software system. A scenario is generated as a hierarchical data object in which configuration parameters for each of a plurality of methods associated with a mock object are related to an associated method signature. A mock object, implemented as a stateless proxy for the plurality of methods, is injected into the integrated software system. The mock object is invoked with provided input data and configuration parameters stored at the scenario. | 10-24-2013 |
20130283239 | SYSTEM AND METHOD TO CLASSIFY AUTOMATED CODE INSPECTION SERVICES DEFECT OUTPUT FOR DEFECT ANALYSIS - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive a tool error output determined by a code inspection tool and select at least one defect classification mapping profile based on the code inspection tool. Additionally, the programming instructions are operable to map the tool error output to one or more output classifications using the selected at least one defect classification mapping profile and generate at least one report based on the one or more output classifications. | 10-24-2013 |
20130290935 | SOURCE CODE INSPECTION - A source code inspection method and system. The method includes receiving by a computing system, source code files associated with a specified project. The computing system retrieves metrics data comprising software metrics associated with the source code files. The computing system generates first evaluation scores associated with the source code files. The computing system generates and presents to a user, a graph displaying the first evaluation scores. The computing system calculates parameter values associated with an evaluation function used to calculate second evaluation scores associated with the source code files. The computing system calculates the second evaluation scores by enabling the evaluation function using the parameter values. The computing system generates and presents to the user, a second graph displaying the second evaluation scores. | 10-31-2013 |
20130305224 | Rules Engine for Architectural Governance - A software architecture as designed is governed. A rules engine tests code for implemented architectural decisions. Deviation from designed architecture is detected by execution of the rules engine. To create the rules engine, the architecture is broken down into automatically testable architectural decisions. The decisions can be tested, allowing creation and application of the rules engine. | 11-14-2013 |
20130318503 | SYMBOLIC EXECUTION AND AUTOMATIC TEST CASE GENERATION FOR JAVASCRIPT PROGRAMS - A method includes, by one or more computing devices, determining JavaScript statements to be evaluated, parsing the JavaScript statements, translating the JavaScript statements into Java bytecodes and JavaScript-specific instructions, executing the Java bytecodes in a Java execution engine, calling a JavaScript run-time engine from the Java execution engine, handling one or more semantic operations associated with the JavaScript-specific instructions through use of the JavaScript run-time engine, and providing return values to the Java execution engine. The statements are configured for execution on a computing device. The set of Java bytecodes and JavaScript-specific instructions is configured to conduct symbolic execution of one or more portions of the JavaScript statements. The symbolic execution is configured to evaluate the JavaScript statements. | 11-28-2013 |
20130326485 | RULE-BASED METHOD FOR PROVING UNSATISFIABLE CONDITIONS IN A MIXED NUMERIC AND STRING SOLVER - A method includes, by computing devices, analyzing numeric and string constraints associated with a software module that includes numeric and string variables and operations applying to specific variables for numeric or string results. The numeric constraints apply to specific numeric variables. The string constraints apply to specific string variables. The method further includes determining an over-approximated constraint from the numeric constraints or operations, representing the over-approximated constraint and string constraints with finite state machines, representing the numeric constraints with an equation, determining whether a solution does not exist for the combination of the variables that satisfies the over-approximated constraint, the numeric constraints, and the string constraints using operations, and terminating attempts to solve for the variables based on the determination whether the solution does not exist. The over-approximated constraint includes a superset of the numeric constraints or operations and applies to specific string variables. | 12-05-2013 |
20140007057 | EVALUATING APPLICATION COMPATIBILITY | 01-02-2014 |
20140019943 | SYSTEMS AND METHODS FOR VERIFYING EXPRESSION FOLDING - A system for verifying that a comparison model having folded expressions matches a reference model includes at least one memory device that stores a reference model and a comparison model, wherein the comparison model was previously generated based on the reference model. The reference model adheres to a first set of syntax and semantics, wherein the reference model includes a plurality of first expressions, each of the first expressions including a first operator and a first operand. The comparison model adheres to a second set of syntax and semantics, wherein the comparison model includes a second expression, the second expression including a second operator and a second operand. The system further includes a processing unit configured to match the second expression with the plurality of first expressions. | 01-16-2014 |
20140026125 | METHODS FOR GENERATING SOFTWARE TEST INPUT DATA AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that extracts a plurality of attributes from a software requirements specification wherein each attribute is associated with a data type and one or more properties. Constraint representation syntax is applied to the extracted attributes based on the data type and the one or more properties associated with each attribute to generate a plurality of constraints, wherein the constraint representation syntax is a machine readable format. Each of the plurality of constraints is output and optionally associated with one or more nodes of a specification requirements model. | 01-23-2014 |
20140040864 | SYSTEM AND METHOD FOR USING A SHARED STANDARD EXPECTATION COMPUTATION LIBRARY TO IMPLEMENT COMPLIANCE TESTS WITH ANNOTATION BASED STANDARD - A system and method can implement compliance tests with annotation based standards using a model library. The model library encapsulates expectation computation logic described in one or more annotation based assertions. A compliance test can obtain an actual value for one or more software properties based on evaluating a source file that contains one or more annotations that is defined by the one or more annotation based assertions, and can determine an expected value for the one or more software properties using the model library. Then, the compliance test can compare the actual value for the one or more software properties with the expected value for the one or more software properties. | 02-06-2014 |
20140040865 | SYSTEM AND METHOD FOR USING AN ABSTRACT SYNTAX TREE TO ENCAPSULATE THE DESCRIPTIVE ASSERTIONS IN AN ANNOTATION BASED STANDARD INTO A CODE BASED LIBRARY - A system and method can support compliance tests with annotation based standards using an expectation library. The expectation library can convert one or more descriptive assertions into a structured data model, wherein the one or more descriptive assertions describe one or more annotations. Furthermore, the expectation library can parse a source file that contains the one or more annotations based on the structured data model. Additionally, the expectation library can obtain information related to the one or more annotations of the source file from the structured data model. | 02-06-2014 |
20140053136 | DETERMINING CORRECTNESS CONDITIONS FOR USE IN STATIC ANALYSIS - An embodiment comprising a method is associated with static analysis of a program, which detects violations of conditions of the program correctness specification. The method includes selectively encoding the program and adding one or more correctness conditions to the encoded program, wherein the added conditions comprise a set of assumptions that render the program correct with respect to one or more properties pertaining to detected violations. The set of assumptions are reported to a program user, together with a request to the user to verify the validity of each assumption of the set. | 02-20-2014 |
20140053137 | METHOD FOR DEVELOPING SOFTWARE IN A PARALLEL COMPUTING ENVIRONMENT - A method for developing software in a parallel computing environment comprises the steps of developing a sequential implementation and parallel implementation of the software and verifying the results of the parallel implementation of the software against the results of the sequential implementation of the software. | 02-20-2014 |
20140053138 | QUALITY ON SUBMIT PROCESS - The present disclosure involves systems, software, and computer implemented methods for providing a quality on submit process. One process includes operations for monitoring a source control system for submissions of new source code and determining that new source code has been submitted by a user to the source control system. A request to perform a quality control task for the new source code is sent to at least one quality control application. A report from the quality control application regarding results of the quality control task is received. A general report of results of each quality control task performed by each of the at least one quality control application is generated. The general report is sent to the user. | 02-20-2014 |
20140059522 | Generating Test Cases for Covering Enterprise Rules and Predicates - Techniques, an apparatus and an article of manufacture for generating test cases for covering enterprise rules and predicates. A method includes obtaining a web application and a specification of at least one enterprise rule, constructing a link graph that captures at least one navigation path in the web application, and performing a traversal of the web application guided by the link graph to generate an executable test case that drives the web application along one of the at least one navigation paths in which the at least one enterprise rule is covered to determine the web application's conformance to the at least one enterprise rule, wherein the executable test case is a sequence of one or more test steps, each test step representing an action to be performed on the web application and/or a verification of the application state. | 02-27-2014 |
20140082593 | TESTING FRAMEWORK FOR DYNAMIC WEB PAGES - A system and method for bucket testing includes: retrieving a user's information from a user in a bucket testing group when a request to serve a web page is received; determining from the user's information if the user has an active bucket identifier associated with the user's account in a persistent store; retrieving bucket parameters from the user's information when it is determined that the user has an active bucket identifier; determining if the bucket parameters are within a range assigned to the bucket testing group; passing the bucket parameters to the server; and loading configuration and files associated with the active bucket identifier. | 03-20-2014 |
20140082594 | ABSTRACT SYMBOLIC EXECUTION FOR SCALING SYMBOLIC EXECUTION GENERATION AND AUTOMATIC TEST GENERATION - A method includes, by one or more computing devices, determining code-under-test configured for execution on a computing device to be evaluated, creating a plurality of test cases based on the symbolic execution and including a plurality of constraints, selectively conducting abstract interpretation on the constraints, selectively conducting Satisfiability Modulo Theory (“SMT”) solving on the constraints, and validating or invalidating the code-under-test based on at least the SMT solving and the abstract interpretation. The abstract interpretation includes using a plurality of abstract interpretation models based on the constraints of the test case and over-approximating the constraints of the test case. | 03-20-2014 |
20140082595 | CONTEXT BASED CODE ANALYSIS - Embodiments provided a formalized set of intermediate analysis contexts that are relevant for analysis checks of target code. Such intermediate analysis context may include, but are not limited to, the development phase of targeted code, the type or state of the targeted code, a source manipulating the targeted code, a purpose for the targeted code, or other development or runtime requirements. Accordingly, embodiments dynamically identify a current analysis context under which targeted code is being developed and can then execute rules based on knowledge of what contexts the rule(s) may apply. More specifically, analysis rules can describe (e.g., via metadata) those context conditions under which a rule can run. Based on such description and the current context, those rules that have been configured to apply to such context conditions can be executed. | 03-20-2014 |
20140089900 | SYSTEM AND METHOD FOR PROVIDING AN IMPLEMENTATION ACCELERATOR AND REGRESSION TESTING FRAMEWORK FOR USE WITH ENVIRONMENTS SUCH AS FUSION APPLICATIONS - A system and method for providing a regression testing framework for use with enterprise applications, such as Oracle Fusion Applications and Fusion Financials, by rapidly implementing applications according to a customized configuration, and subsequently performing regression tests on an implemented application instance. In accordance with an embodiment, the system comprises a plurality of automated, e.g., Fusion Financials application setups; automation services which can be consumed by setups and regression tests as per requirement; multiple automated regression tests which can be executed by the regression testing framework, to test an implemented instance of the applications; and a central execution controller, which controls the runtime behavior of application setups and regression tests that subscribe to it. | 03-27-2014 |
20140096113 | POLICY EVALUATION BASED UPON DYNMAMIC OBSERVATION, STATIC ANALYSIS AND CODE CHANGE HISTORY - A method is provided to evaluate tests of computer program code comprising: configuring a computer to produce, in a computer readable storage device, a code filter to indicate one or more respective portions of the computer program code to respectively either omit from or to include in a determination of adequacy of results; and comparing test results with the computer program code with the one or more respective portions filtered using the code filter to respectively either omit the respective portions from or include the respective portions in the determination as indicated by the code filter. | 04-03-2014 |
20140109061 | TEST CREATION WITH EXECUTION - In a method of executing a test while creating the test, a portion of a line of a test case for a software item is received. The syntax of the received portion of the line is validated upon entry of the portion of the line. The line is executed after the syntax validation. Any error based on execution is indicated. | 04-17-2014 |
20140109062 | SYSTEM AND METHOD TO PROVIDE COMPLIANCE SCRUTINY AND IN-DEPTH ANALYSIS OF A SOFTWARE APPLICATION - The present disclosure in general relates to a software compliance analysis and in particular to a system and method to provide compliance scrutiny and in-depth analysis of a software application. In one embodiment, a software compliance analysis method is disclosed, comprising: allowing a user to select one or more industry compliance standards with respect to a particular safety level; initiating a compliance verification process for the software application with respect to one or more normative parameters associated with the safety level; mapping the selected compliance standards with features of one or more analysis tools; analyzing only the mapped features of the one or more analysis tools to calculate a compliance level for the software application; and visually representing compliance of the software application in a multi-stage manner providing one or more suggestive measures to meet a desired compliance level. | 04-17-2014 |
20140115564 | DIFFERENTIAL STATIC PROGRAM ANALYSIS - Methods for program analysis include performing a high-level analysis on a program using a processor to generate one or more high-level findings; performing one or more low-level analyses on the program using a processor to generate one or more low-level findings; mapping the one or more low-level findings to the high-level findings to generate a concise combination report that categorizes each finding according to the highest-level analysis that produces the finding. | 04-24-2014 |
20140157238 | SYSTEMS AND METHODS OF ASSESSING SOFTWARE QUALITY FOR HARDWARE DEVICES - Systems and techniques of monitoring, assessing and determining the quality of software components and/or their associated features that may be designed and built to be run on a plurality of hardware devices. Such hardware devices may be devices made by different manufacturers. In addition, certain of these manufacturers may be device partners with the software maker. Software product and/or components may be subjected to test runs on various hardware devices and the results may be correlated. This pass/fail data may also be correlated against a number of additional factors—e.g., the market share of device products for which a software product has a minimum level of acceptable or passing rates. | 06-05-2014 |
20140157239 | SYSTEM AND METHOD FOR PEER-BASED CODE QUALITY ANALYSIS REPORTING - Systems and methods for peer-based code quality analysis reporting are provided. In accordance with an embodiment, a system can include a peer-based code quality analysis tool, executing on a computer, which is configured to receive one or more source code files, and perform an analysis of the one or more source code files based on a plurality of rules. The peer-based code quality analysis tool can further compare results of the analysis to peer results data to determine a percentile based score, and create an interactive report which includes the results of the analysis and the percentile based score. | 06-05-2014 |
20140189654 | SYSTEMS, METHODS, AND MEDIA FOR TESTING SOFTWARE PATCHES - Systems, methods, and media for testing software patches are provided. The methods include: injecting a software patch into a program; determining a portion of the program modified by the software patch; concurrently executing a first instance of the portion of the program prior to modification by the software patch and a second instance of the portion of the program that has been modified by the software patch; obtaining a first outcome of the first instance and a second outcome of the second instance; comparing the first outcome and the second outcome with a policy associated with the program; and determining whether the software patch has executed correctly based at least in part on the comparison. | 07-03-2014 |
20140208297 | Validation of revised computer programs - A computer implemented method, an computerized apparatus and a computer program product for validating revised computer programs. The method performed by a computerized device, comprising: validating a computer program having one or more revised instructions, wherein said validating comprises: checking the computer program with respect to only a portion of a Control Flow Graph (CFG) of the computer program, wherein the portion of the CFG including all paths of the CFG that include at least one node associated with a revised instruction. | 07-24-2014 |
20140250427 | METHOD AND APPARATUS FOR PRODUCING REGULATORY-COMPLIANT SOFTWARE - A method for producing regulatory-compliant software includes validating a software application and freezing the validated software application in a validation portal, proving-in an infrastructure on which the software application operates, and providing evidence of operational change management for a regulatory agency, which evidence comprises documentation that satisfies the agency's compliance rules. A regulatory-compliant software package is also described. | 09-04-2014 |
20140250428 | AUTOMATICALLY CUSTOMIZING A COMPUTER-EXECUTABLE APPLICATION AT RUNTIME - Disclosed is a method of automatically customizing a computer executable application, such as a test automation harness, based on currently installed modules. The functionality of the application can be split in multiple modules. At runtime, the application can automatically detect the presence or absence of a module. If a module is available, it can automatically be integrated with the application such that the functionality, such as language-level features and constructs, provided by the module is active and/or exposed. If the module is absent, the application can continue executing without the functionality provided by the module. | 09-04-2014 |
20140258986 | Identifying Implicit Assumptions Associated with a Software Product - A framework is described herein for identifying implicit assumptions associated with an SDK and its accompanying documentation (e.g., dev guide). An implicit assumption is information that is not expressly stated in the documentation, but which would be useful in assisting an application developer in building an application. The framework also describes a systematic approach for identifying one or more vulnerability patterns based on the identified implicit assumptions. An application developer may run a test on an application that is being developed to ensure that it does not have any deficiency which matches a vulnerability pattern. | 09-11-2014 |
20140258987 | DETERMINING CORRECTNESS OF AN APPLICATION - The present invention provides a method for determining correctness of an application, comprising: obtaining a dataset and a reference running result for the application; and determining correctness of the application based on a comparison between the reference running result and an actual running result of the dataset on the application. Through the method, the users can connect to a standard task tool repository, thereby using a data-driven testing method as a complement to the existing quality assurance framework. | 09-11-2014 |
20140258988 | SELF-EVOLVING COMPUTING SERVICE TEMPLATE TRANSLATION - Methods and apparatus for automatically generating translation programs for translating computing services templates to service blueprints are disclosed. An example method includes generating a population of translation logic elements from a plurality of verified computing services template translation programs, where each of the verified programs is configured to correctly translate at least one computing services template of a plurality of known templates to a respective service blueprint. The example method further includes identifying a new computing services template and programmatically augmenting the population of translation logic elements. The example method also includes generating one or more additional translation programs based on the augmented population of translation logic elements and validating each of the one or more additional computing services template translation programs. Based on the validating, each of the one or more additional computing services template translation programs is added to the verified translation programs or is discarded. | 09-11-2014 |
20140282419 | SOFTWARE VERIFICATION - A method of verifying software includes receiving at least a portion of a software program. The portion of the software program may include a software function within a class. The method may also include generating a proxy class based on the class where the proxy class includes a proxy function that includes a call to the software function and analyzing the proxy function. The analysis of the proxy function may include analyzing the software function based on a proxy condition used by the proxy function, the proxy condition based on the software program and configured to apply conditions to parameters and/or variables in the software function. | 09-18-2014 |
20140282420 | TEST AUTOMATION BOOSTER - A method is provided for a proxy server to assist in the testing of a product. The method includes receiving, from the product, a first request and passing the first request to a server, receiving, from the server, a first response to the first request and passing the first response to the product, recording the first request and the first response, generating one or more second responses from one or more simulated servers based on the first request and the first response, intercepting a second request from the product, in response to the second request, matching the second request to a second response, and sending the second response to the product. | 09-18-2014 |
20140282421 | DISTRIBUTED SOFTWARE VALIDATION - A computer-implemented method for validation of a software product via a distributed computing infrastructure includes receiving configuration data for a plurality of validation tasks of the validation, receiving code data representative of the software product, defining a validation pipeline to implement the plurality of validation tasks based on the configuration data, and initiating execution of the plurality of validation tasks on a plurality of virtual machines of the distributed computing infrastructure. Initiating the execution includes sending the code data and data indicative of the defined validation pipeline to configure each virtual machine in accordance with the code data and the defined validation pipeline. | 09-18-2014 |
20140289709 | MOBILE DEVELOPMENT PLATFORM IN A CLOUD BASED ARCHITECTURE - Embodiments are directed towards mobile application development in a cloud-based architecture. Mobile applications may be designed to communicate with a cloud platform over a network. Mobile application developers may be enabled to submit cloud code to cloud platforms for use by mobile applications. If cloud code is provided to a cloud platform, the cloud platform may perform one or more actions to authenticate the cloud code, such as, ensuring that that the user providing the cloud code is authorized to provide the cloud code. If the cloud code is authenticated the cloud platform may perform one or more actions to validate the cloud code. If validated, the cloud code may be activated for use by mobile applications and/or mobile application developers. Activation of the cloud code may include associating the cloud code with one or more function calls and/or with one or more trigger points. | 09-25-2014 |
20140304687 | COMPILATION VALIDATION - A system and method for compilation validation uses a second compiler, in addition to the compiler under test, to generate intermediate code (a.k.a. certificates). A checker processes the output of the two compilers and generates a statement of correctness regarding the output of the compiler under test. | 10-09-2014 |
20140344788 | LOGIC VALIDATION AND DEPLOYMENT - A method of implementing and validating business logic may include translating the business logic into an executable routine, and providing the executable routine to a logic interpreter. The logic interpreter may be configured to receive inputs from the user interface during live use, process the inputs according to the executable routine to generate a result set, and provide the result set to a database for storage. The method may also include receiving a test harness comprising a plurality of input sets and a corresponding plurality of expected result sets, and processing each of the plurality of input sets according to the executable routine to generate a plurality of result sets. The method may additionally include generating an automatic determination as to whether the executable routine should be deployed for live use based on the plurality of result sets and the plurality of expected result sets. | 11-20-2014 |
20140351796 | ACCESSIBILITY COMPLIANCE TESTING USING CODE INJECTION - Web pages are automatically checked for compliance with specified accessibility rules. When accessibility compliance testing is enabled, code to check for accessibility compliance is automatically injected and run to test one or more elements of the web page for accessibility compliance. Once the code is injected, the code is executed to determine the compliance with the specified accessibility rules. All/portion of the elements on the web page may be checked for accessibility compliance. The web page may be checked for accessibility compliance at one or more times. For example, the page may be checked for accessibility compliance upon loading and/or upon changes (e.g. AJAX event) which modifies the page markup. As long as the accessibility compliance testing is enabled, each page that is loaded by a service may be checked for accessibility compliance. | 11-27-2014 |
20140359581 | DATABASE CODE TESTING FRAMEWORK - The present disclosure involves systems, software, and computer-implemented methods for providing an integrated testing framework within a database system for testing database code. An example method includes identifying a test script associated with a database, identifying an expected result to be produced by the test script, the expected result stored in an expected results table in the database, executing the test script within the database, where executing the test script produces an actual result, and comparing, within the database, the actual result produced by the test script with the expected result from the expected results table to determine a success condition associated with the execution of the test script. | 12-04-2014 |
20140372985 | API Rules Verification Platform - A stateful rules verification platform is described. The verification platform implements a specification language to provide a formal definition for rules used to test target systems having a central module that provides APIs (“API provider”) and applications (“API clients”) that use the APIs. Rules may be defined in terms of transitions on state elements associated with interactions between API providers and API clients. The rules defined in accordance with the specification language enable run-time verification in which calls may be intercepted and run-time code to implement checks may automatically be generated and injected to test behaviors of the intercepted calls. The same set of rules may also be employed for static verification during compilation. Additionally, the specification language includes constructs to provide rule descriptions and comments with rules definitions that facilitate publication of the rules and documentation of misbehavior identified during verification. | 12-18-2014 |
20140372986 | Timed API Rules for Runtime Verification - A stateful rules verification platform is described that support timed state transitions. The verification platform implements a specification language to provide a formal definition for rules used to test target systems having a central module that provides APIs (“API provider”) and applications (“API clients”) that use the APIs. Rules may be defined in terms of transitions on state elements associated with interactions between API providers and API clients. The rules defined in accordance with the specification language enable run-time verification in which calls may be intercepted and run-time code to implement checks may automatically be generated and injected to test behaviors of the intercepted calls. The same set of rules may also be employed for static verification during compilation. Additionally, the specification language includes constructs to specify timed state transitions for at least some rules that impose time limits on state transitions specified by the rules. | 12-18-2014 |
20150033208 | Validating a Specification Associated with a Software Application and/or a Hardware - System and method for validating a specification associated with a software application and/or a hardware is disclosed. The specification comprising expected behaviour requirements specified in a specification language and the semantics in the tabular notation is received. In order to validate the specification, a string may be identified for the specification. The string may indicate characters conforming to the specification language. Upon identifying the string, a token may be generated using the string. The token may be a binary representation of the string. The token may be arranged into a data structure. The specification is checked to conform to the specification language. Two or more specifications specified in the specification language are merged. A test case is generated from the validated specification. The expected behaviour with the actual behaviour of the specification is validated. | 01-29-2015 |
20150046907 | VALIDATING TRANSLATIONS OF EXTERNALIZED CONTENT FOR INCLUSION IN AN APPLICATION - An approach is provided for validating translated files for inclusion in an application being developed. Content in a natural language is translated into another language and received as a first translation in a first translated file. Based on an error condition indicated by simulations of loading and presenting the first translation in a user interface of the application, a syntax error that causes the error condition is determined. The syntax error can include a lack of a match between a key and exactly one value, a missing key, or a mismatch of placeholders in the first translated file. Responsive to a receipt of a second translation of the content that includes the correction of the syntax error, and based on simulations of loading and presenting the second translation in the interface not indicating the error condition, the second translation is presented at runtime without causing the application to stop running. | 02-12-2015 |
20150052504 | METHOD AND SYSTEM FOR VERIFYING SLEEP WAKEUP PROTOCOL BY COMPUTING STATE TRANSITION PATHS - Disclosed are a method and a system for facilitating verification of program code implementing Sleep Wakeup protocol for a microcontroller. An input handling module is configured to receive metadata from user required for verification of the program code. Identification module is configured to identify abstract syntax tree (AST) nodes corresponding to each program point in the program code. A computation module is configured to compute an actual interrupt protection status (IPS), task lock status (TLS), path entities and shared variables for each program point in the program code. A path analysis module is configured to determine transition paths between program points specified in the metadata, and are computed in terms of the path entities. Also, review information is computed for each of the path entities comprised in the transition paths. Further, a report generation module is configured to generate a report comprising the review information facilitating the user to verify the program code. | 02-19-2015 |
20150067653 | AUTOMATIC GENERATION OF ANALYSIS-EQUIVALENT APPLICATION CONSTRUCTS - A computer program to be subjected to static analysis includes at least one framework, in turn including high-level code and at least one configuration file. A specification which describes run-time behavior of the program, including run-time behavior of the at least one framework including the high-level code and the at least one configuration file, is created from the computer program. Based on the specification, synthetic high-level code which accurately simulates the run-time behavior of the at least one framework including the high-level code and the at least one configuration file, without framework usage, is created. Static analysis of the computer program is carried out based on the synthetic high-level code. | 03-05-2015 |
20150074651 | DIRECTING VERIFICATION TOWARDS BUG-PRONE PORTIONS - A method, system and product for directing verification towards bug-prone portions. The method comprising syntactically analyzing a computer program to identify portions of the computer program that correspond to one or more bug patterns; and performing verification of the computer program, wherein the verification comprises traversing a control flow graph of the computer program and tracking symbolic values of variables of the computer program, wherein said performing comprises directing the traversal of the control flow graph to nodes of the control flow graph that correspond to the identified portions, whereby bug-prone portions of the computer program are prioritized to be verified before non-bug-prone portions of the computer program. | 03-12-2015 |
20150074652 | AVOIDING SIMILAR COUNTER-EXAMPLES IN MODEL CHECKING - A method, apparatus, and product for avoiding similar counter-examples in model checking. One method comprises model checking of a program by traversing control flow paths of the program to determine states associated with execution of the program, each state comprises at least symbolic values of variables; said traversing is biased to give preference to traversing control flow paths that are substantially different than control flow paths associated with traces of the program; whereby said model checking is guided away from executions that are similar to the traces. A second method comprises obtaining a counter-example produced by a model checker, computing a distance between a control flow path of the counter-example and between a set of one or more control flow paths of additional counter-examples; and in response to the distance being below a threshold, dropping the counter-example. | 03-12-2015 |
20150121347 | PLATFORM FRAMEWORK FOR WIRELESS MEDIA DEVICE SIMULATION AND DESIGN - Embodiments of the invention relate generally to electrical and electronic hardware, computer aided simulation and design, high-level language numerical computation, analysis, programming, and visualization of designs, target hardware compilers, assembly code, executable firmware, computer software, wired and wireless network communications, wearable, hand held, and portable computing devices for facilitating communication of information. More specifically, disclosed is a framework for computer aided simulation and design of wireless media devices for one or more target hardware platforms. | 04-30-2015 |
20150143342 | FUNCTIONAL VALIDATION OF SOFTWARE - Aspects of the subject matter described herein relate to software validation. In aspects, a baseline may be created by instrumenting code of a software application or runtime, executing the code of the software application a plurality of times to generate a plurality of logs, determining invariant characteristics of the logs, and writing the invariant characteristics to a baseline. When a new version of the software application or runtime is created, the new version may be validated by instrumenting the code of the new version or runtime, executing the code of the new version, and comparing the log generated with the baseline. | 05-21-2015 |
20150309920 | METHOD AND SYSTEM FOR TESTING CONTROL SOFTWARE OF A CONTROLLED SYSTEM - The present invention relates to a method and a system for testing control software of a controlled system, the controlled system comprising one or more electronic control units, one or more actuators, and one or more sensors, each sensor being adapted to input a respective sensor signal to at least one of the one or more electronic control units and each actuator being adapted to act responsive to respective control signals input from at least one of the electronic control units, and each electronic control unit being configured to execute a respective executable control program based on control software code data to output one or more control signals to the one or more actuators on the basis of input sensor signals. The control testing process comprises providing control software code data for each of the one or more electronic control units, providing simulation code data for the controlled system, creating a system model based on the provided control software code data provided for each of the one or more electronic control units and the provided simulation code data, creating an executable program based on the created system model, and performing a software verification process on the basis of the executable program. | 10-29-2015 |
20150317235 | SYSTEMS AND METHODS FOR ANALYZING SOFTWARE COMPATIBILITY - Computer-implemented systems, methods, and computer-readable media are provided for facilitating analysis of a software application to determine its compatibility with one or more computer platforms. In accordance with some embodiments, a processor may receive, via an operator interface, a selection of an application and a user identity, and the processor may determine compatibility status between the application and at least one computing platform of a device associated with the user identity, and generate a report with the compatibility results. | 11-05-2015 |
20150324212 | VALIDATING TRANSLATIONS OF EXTERNALIZED CONTENT FOR INCLUSION IN AN APPLICATION - An approach is provided for validating translated files for inclusion in an application being developed. Content in a natural language is translated into another language and received as a first translation in a first translated file. Based on an error condition indicated by simulations of loading and presenting the first translation in a user interface of the application, a syntax error that causes the error condition is determined. The syntax error can include a lack of a match between a key and exactly one value, a missing key, or a mismatch of placeholders in the first translated file. Responsive to a receipt of a second translation of the content that includes the correction of the syntax error, and based on simulations of loading and presenting the second translation in the interface not indicating the error condition, the second translation is presented at runtime without causing the application to stop running. | 11-12-2015 |
20150331778 | Evaluating Reliability of a Software Module Using Development Life Cycle - Reliability of one or more software modules is projected according to a current state in a development life cycle of the software modules and any of various additional indicators. Preferably, a data processing support provider separate from the service-providing enterprise maintains historical field support data concerning significant field defect events with respect to various resources, and uses this data for projecting reliability of the resources. Preferably, software module reliability projections are used to support an analysis of risk of degradation of a service specified in a service requirements specification when provided by a configuration of data processing resources specified in a configuration specification. | 11-19-2015 |
20150347127 | METHOD AND SYSTEM FOR IMPLEMENTING SOFTWARE REQUIREMENTS - A method for incorporating a set of requirements into an executable program to be run on an airborne system is provided. The method obtains the set of requirements for the program in a first format. The method uses a first tool to convert the set of requirements in the first format into a second format utilizing a markup language. The method uses a second tool to convert the set of requirements in the second format into a third format that influences a behavior of the program without changing the program. The method uses a third tool to determine whether the set of requirements in the third format incorporates all of the set of requirements in the second format in order to verify the program under a compliance standard for the airborne system without performing a verification process directly on the program. | 12-03-2015 |
20150355995 | DETECTING MERGE CONFLICTS AND COMPILATION ERRORS IN A COLLABORATIVE INTEGRATED DEVELOPMENT ENVIRONMENT - A method, and associated computer system and computer program product, of detecting source code merge conflicts and compilation errors. Uncommitted changes associated with a source code are received periodically at each time of a sequence of times. A temporary branch corresponding to each uncommitted change associated with the source code is created. The temporary branch corresponding to each uncommitted change is merged to corresponding portions of the source code. It is ascertained that no merge conflict resulted from the merging and in response, a compilation of a merged version of the source code is performed, wherein the merged version of the source code includes the temporary branch corresponding to each uncommitted change. It is determined that no compilation error occurred from the compilation and in response, a version of a product that includes the merged version of the source code is created. | 12-10-2015 |
20150363295 | COMMAND COVERAGE ANALYZER - A method and apparatus of a novel command coverage analyzer is disclosed. Combinations of commands, options, arguments, and values of a product are extracted, customer environment and uses are considered, and a more comprehensive and accurate quality of software process and metric is provided. | 12-17-2015 |
20150363296 | FUNCTION TEST APPARATUS BASED ON UNIT TEST CASES REUSING AND FUNCTION TEST METHOD THEREOF - There is provided a function test apparatus based on unit test cases reusing and a function test method thereof. The function test apparatus related to the present disclosure is constructed with a Storage Portion, storing a unit test case for each function into a hierarchical constitution; a Selection Portion of unit test case, when a Test Object Function is provided, in order to abstract an internal constitution of a callee function activated by the Test Object Function, selectively reusing a unit test case of the callee function; a Generator of test case, generating at least one test case in order for all the unit test cases selected by the Selection Portion of test case to be performed; and a Performance Portion of test case, testing the Test Object Function by performing the test case. According to the configuration herein, a test for function may be conducted without analyzing the internal constitution of software function at an integral testing motion and a test of which a Test coverage is high may be conducted to the Test Object Function. Therefore, an advantage of high reliability for the test result is obtained. | 12-17-2015 |
20150370680 | METHOD FOR TRANSMITTING HUMAN INPUT EVENT AND ELECTRICAL DEVICE - A method for transmitting a human input event includes the steps of: connecting an Android device to an electrical device which can execute Android debug Bridge (ADB) through a USB cable to run a software program with shell permission of the Android device; establishing a cable communication way between the electrical device and the Android device with the shell permission, wherein the software program is configured to use the shell permission to inject the human input event into the Android device; changing the cable communication way into a wireless communication way with the shell permission; disconnecting the Android device from the electrical device while remaining the wireless communication way with the shell permission; and transmitting the human input event from an external device to the Android device through the wireless communication way with the shell permission. | 12-24-2015 |
20150370695 | TESTING OPTIMIZED BINARY MODULES - Various embodiments test an optimized binary module. In one embodiment, a region in a set of original binary code of an original binary module in which branch coverage is expected to be achieved is selected based on a set of profile information. The region is selected as a target region to be optimized. An optimized binary module is created, where the target region has been optimized in the optimized binary module. The optimized binary module is verified by synchronizing execution of the optimized binary module with execution of the original binary module at a checkpoint while executing both the optimized binary module and the original binary module. The optimized binary module is further verified by comparing an output from executing the optimized binary module to an output from executing the original binary module. | 12-24-2015 |
20150378866 | SYSTEM AND METHOD TO CLASSIFY AUTOMATED CODE INSPECTION SERVICES DEFECT OUTPUT FOR DEFECT ANALYSIS - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to receive a tool error output determined by a code inspection tool and select at least one defect classification mapping profile based on the code inspection tool. Additionally, the programming instructions are operable to map the tool error output to one or more output classifications using the selected at least one defect classification mapping profile and generate at least one report based on the one or more output classifications. | 12-31-2015 |
20160019132 | VALIDATING CODE OF AN EXTRACT, TRANSFORM AND LOAD (ETL) TOOL - An approach for validating code for an extract, transform and load (ETL) tool is provided. Naming, coding, and performance standards for the code is received. The code is exported to a job definition file and parsed. Violations of the standards are determined by determining the parsed code does not match the standards. A report identifying the violations is generated. Based on a review of the report and a rework of the code to comply with the standards, the reworked code is exported to another job definition file and parsed, the parsed reworked code is determined to not include the violations of the standards, and a second report is generated that indicates that the reworked code does not include the violations. An approval of the reworked code is received based on the second report. | 01-21-2016 |
20160034270 | ESTIMATING LIKELIHOOD OF CODE CHANGES INTRODUCING DEFECTS - Information about a failed build of a computer software project under development can be accessed, where the information describes symptoms of the failed build. Committed change collections can be identified as collections that were committed since a previous successful build of the computer software project. Also, respective scores for the committed change collections can be produced. Each score can represent an estimate of a likelihood that an associated one of the committed change collections is at least a partial cause of the build failure. | 02-04-2016 |
20160070635 | MOBILE DEVELOPMENT PLATFORM IN A CLOUD BASED ARCHITECTURE - Embodiments are directed towards mobile application development in a cloud-based architecture. Mobile applications may be designed to communicate with a cloud platform over a network. Mobile application developers may be enabled to submit cloud code to cloud platforms for use by mobile applications. If cloud code is provided to a cloud platform, the cloud platform may perform one or more actions to authenticate the cloud code, such as, ensuring that that the user providing the cloud code is authorized to provide the cloud code. If the cloud code is authenticated the cloud platform may perform one or more actions to validate the cloud code. If validated, the cloud code may be activated for use by mobile applications and/or mobile application developers. | 03-10-2016 |
20160070636 | CONDITIONAL WRAPPER FOR PROGRAM OBJECT - The described technology is directed towards conditional wrapper that wraps part(s) of a selected program object with added logic, such as to perform validation and/or tracing on part(s) the object; the wrapper may be multi-functional in this regard. The wrapper logic is selectively added to one or more selected object parts by the object creator at object creation time based upon conditional data. During runtime, the added logic may be run before the wrapped part of the object (e.g., a function) is executed and/or after execution of the object part. Validation and/or tracing operations may be run before the part of the object is executed as well as after the part of the object is executed. Objects that do not meet the conditional data criteria are created and returned without any added wrapping logic. | 03-10-2016 |
20160070637 | DOCUMENTS FOR HUMAN READABLE DOCUMENTATION AND RUNTIME VALIDATION - The described technology is directed towards having document files (e.g., a JSON object) associated with objects of a computer program. The document files may include validation information that is used during runtime to validate one or more parts of the object via validation code such as a validation function. For example, a function of an object may have one validation function that during runtime validates whether the input parameter(s) are valid (their types and/or values are correct), and another validation function that during runtime validates whether the return values from the function are valid. Also described is processing the document files into more easily readable documentation, e.g., without any source code. | 03-10-2016 |
20160085659 | Base Line for Code Analysis - In an example embodiment, static code analysis is performed by designating a first portion of the computer code as base line code. A check run is then performed on the base line code, resulting in one or more findings, with each finding identifying a flaw in the base line code discovered by the check run. The one or more findings may then be designated as a base line. Then a subsequent check run on a modified version of the computer code is performed, resulting in one or more subsequent findings. The one or more findings of the base line are then subtracted from the one or more subsequent findings, resulting in a modified version of the one or more subsequent findings. The modified version of the one or more subsequent findings may then be displayed on a display. | 03-24-2016 |
20160103754 | METHOD AND SYSTEM FOR GRADING A COMPUTER PROGRAM - The system includes a receiving module configured to receive a first set of data and a second set of data, wherein the first set of data comprises one or more high quality objects, and one or more ungraded objects, wherein the second set of data comprises one or more ungraded objects, an identification module configured to identify the one or more high quality objects, an extraction module is configured to extract one or more features from each high quality object of the one or more high quality objects, a building module is configured to build a predictive model based on the one or more features extracted for the each high quality object, a comparison module configured to compares the one or more ungraded objects and the one or more high quality objects, and an assessment module configured to score the one or more ungraded objects. | 04-14-2016 |
20160132427 | USER INTERFACE CONFORMANCE - Verifying user interface conformance can include deriving a conformance rule set based on desired user interface characteristics identified through an examination of mockup data for the user interface. That mockup data includes a visual representation of the desired characteristics. Conformance data can then be generated based on differences between the desired characteristics and actual characteristics. Those differences are identified by processing the conformance rule set against screen capture data of the user interface as produced by an application under test. The screen capture data includes a visual representation of the actual characteristics of the user interface. | 05-12-2016 |
20160139915 | EVALUATING SOFTWARE COMPLIANCE - A software compliance assessment apparatus for determining a level of compliance of a software application in execution in a virtualised computing environment, the apparatus comprising: an identifier component operable to identify resources instantiated for execution of the application; a retriever component operable to retrieve a compliance characteristic for the application, the compliance characteristic being retrieved based on the identified resources, and the compliance characteristic having associated a compliance criterion based on a formal parameter; a selector component operable to select a software component for providing an actual parameter corresponding to the formal parameter, the actual parameter being based on data concerning at least one of the resources; an evaluator component operable to evaluate the compliance criterion using the actual parameter; and a detector component operable to detect a change to one or more of the resources, wherein the identifier component, selector component and evaluator component are operable in response to a determination by the detector component that one or more resources is changed, wherein the selector component selects the software component based on an identification of one or more data items that the software component is operable to provide. | 05-19-2016 |
20160140032 | CORRELATING TEST RESULTS VARIATIONS WITH BUSINESS REQUIREMENTS - A method, system, and computer program product for relating test data to business requirements are provided in the illustrative embodiments. a test operation of a code is configured in a test data processing environment, a section in the code corresponding to a portion of a business requirements document. A set of baseline results is received. The test operation is executed, identifying the section of the code and associating the section of the code with a test result produced from the test operation. A determination is made whether the test result matches a first baseline result from the set of baseline results within a tolerance. When the test result does not match the first baseline result from the set of baseline results within the tolerance, the portion of the business requirements document is annotated. | 05-19-2016 |
20160162396 | UPDATING SOFTWARE - This invention relates to a method and apparatus for updating software. In particular this invention relates to a method, system and computer program for updating an operating system in a hypervisor comprising: determining a new version of a component of the operating system; installing the new component version; measuring an identifying characteristic of the component and making it available to an attestation system; notifying the attestation system that a component has been updated to a new version whereby, when the attestation system finds that the identifying characteristic of the new component does not match a pre-stored attestation value it is aware that a legitimate mis-match could have occurred. The installing of the new version of the component comprises: identifying an updater associated with new version of the component; measuring an identifying characteristic of the identified updater; loading and installing the new version of the component; and making both the identifying measurement of the updater and the new version of the component available to the attestation system. | 06-09-2016 |
20160170860 | DEPENDENT OBJECT DELEGATION TESTER | 06-16-2016 |
20160170864 | INTEGRATED AUTOMATED TEST CASE GENERATION FOR SAFETY-CRITICAL SOFTWARE | 06-16-2016 |
20160179653 | SOURCE CODE EQUIVALENCE VERIFICATION DEVICE AND SOURCE CODE EQUIVALENCE VERIFICATION METHOD | 06-23-2016 |
20160179659 | TECHNIQUES FOR AUTOMATICALLY GENERATING TESTCASES | 06-23-2016 |
20160179660 | Securing Secret Information in Source Code Verification and at Runtime | 06-23-2016 |
20160188436 | METHOD AND APPARATUS FOR PRODUCING REGULATORY-COMPLIANT SOFTWARE - A system for producing a clinical trial software application includes a processor, comprising a validation service and an audit service, and a platform, configured to prove-in an infrastructure on which the software application operates. The software application operating on the infrastructure is the same as the software application previously validated in a validation portal. The proving-in of the infrastructure comprises receiving infrastructure requirements from a software application supplier, building the software application supplier's instances, logging an installation report to the validation portal, and comparing the log to the frozen, validated software in the validation portal. The validation service is configured to validate the software application, freeze the validated software application in the validation portal, and generate documentation that satisfies compliance rules for the clinical trial software application. The validation service receives software code, testable requirements, and test results from a software application supplier and generates documentation regarding the validation of the software application. The audit service is configured to provide evidence of operational change management for a regulatory agency according to compliance rules of the regulatory agency. A method for producing regulatory-compliant software is also described and claimed. | 06-30-2016 |
20160203071 | DESIGN RULE SPACES AND ARCHITECTURE ROOT DETECTION | 07-14-2016 |
20170235669 | VERSION PERFORMANCE DATA DELTA TESTER AND METHODS ASSOCIATED WITH USING SAME | 08-17-2017 |
20220138080 | COMPUTER-IMPLEMENTED METHOD AND DEVICE FOR SELECTING A FUZZING METHOD FOR TESTING A PROGRAM CODE - A computer-implemented method for selecting a fuzzing method for carrying out fuzzing testing of a predefined program code. The method includes: providing program code metrics that characterize the program code to be tested; applying the program code metrics to a data-based fuzzing selection model for ascertaining performance metrics, associated with the fuzzing methods, for a number of fuzzing methods, the data-based fuzzing selection model being trained to output a performance metric for each of the fuzzing methods; selecting one or multiple fuzzing methods corresponding to the associated performance metrics; carrying out fuzzing testing corresponding to the one or multiple selected fuzzing methods. | 05-05-2022 |