Filters








17 Hits in 12.4 sec

Is XML-Based Test Case Prioritization for Validating WS-BPEL Evolution Effective in Both Average and Adverse Scenarios?

Changjiang Jia, Lijun Mei, W.K. Chan, Y.T. Yu, T.H. Tse
2014 2014 IEEE International Conference on Web Services  
The results show that only a minor portion of the 10 studied techniques, most of which are based on the iterative strategy, are consistently effective in both average and adverse scenarios.  ...  It is unclear whether the factors of test case prioritization techniques known to be significant in terms of average performance can be extrapolated to adverse scenarios.  ...  CONCLUSION We have empirically studied test case prioritization techniques for WS-BPEL applications in both the average and adverse scenarios.  ... 
doi:10.1109/icws.2014.43 dblp:conf/icws/JiaMCYT14 fatcat:whj7kvggnrc7tgibi2w7kpsucy

Tag-Based Techniques for Black-Box Test Case Prioritization for Service Testing

Lijun Mei, W. K. Chan, T. H. Tse, Robert G. Merkel
2009 2009 Ninth International Conference on Quality Software  
In this paper, we formulate new test case prioritization strategies using tags embedded in XML messages to reorder regression test cases, and reveal how the test cases use the interface specifications  ...  We evaluate experimentally their effectiveness on revealing regression faults in modified WS-BPEL programs.  ...  We have proposed two black-box test case prioritization techniques, and have used WS-BPEL programs in a controlled experiment to evaluate them.  ... 
doi:10.1109/qsic.2009.12 dblp:conf/qsic/MeiCTM09 fatcat:banlzbxwvbb45l2wsphs7oedce

XML-manipulating test case prioritization for XML-manipulating services

Lijun Mei, W.K. Chan, T.H. Tse, Robert G. Merkel
2011 Journal of Systems and Software  
Moreover, our experiment shows that prioritizing test cases based on WSDL tag coverage can achieve a smaller variance than that based on the number of tags in XML messages in regression test cases, even  ...  We also formulate new test case prioritization strategies using tags embedded in XML messages to reorder regression test cases, and reveal how the test cases use the interface specifications of web services  ...  ., 2009d) of WS-BPEL applications (OASIS, 2007) using both adequate test suites and random test suites to verify the effectiveness of our techniques.  ... 
doi:10.1016/j.jss.2010.11.905 fatcat:sfysqmtfuzgw7itutvvds37d3e

A Comprehensive Review on Regression Test Case Prioritization Techniques for Web Services

2020 KSII Transactions on Internet and Information Systems  
Test Case Prioritization (TCP) involves the rearrangement of test cases on a prioritized basis for various services.  ...  The results show that criteria-based test case prioritization techniques are reported mainly in 41 primary studies.  ...  In the latter study, researchers proposed an XML-based Coyote framework that converted the WSDL specifications into scenarios of testing in its first part and information tracing in the second part.  ... 
doi:10.3837/tiis.2020.05.001 fatcat:ikgdiv6uhzhljdsvjkaaennkge

Prioritizing Test Cases for Regression Testing of Location-Based Services: Metrics, Techniques, and Case Study

Ke Zhai, Bo Jiang, W.K. Chan
2014 IEEE Transactions on Services Computing  
in the expected outputs of test cases is used.  ...  A key observation is that locations captured in the inputs and the expected outputs of test cases are physically correlated by the LBS-enabled service, and these services heuristically use estimated and  ...  Then, the case-based engine will add this scenario as a case in the case database.  ... 
doi:10.1109/tsc.2012.40 fatcat:jrvtl5gv75dkxcf76k5r54fhzm

Crawler [chapter]

Kenneth A. Ross, Christian S. Jensen, Richard Snodgrass, Curtis E. Dyreson, Christian S. Jensen, Richard Snodgrass, Spiros Skiadopoulos, Cristina Sirangelo, Mary Lynette Larsgaard, Gösta Grahne, Daniel Kifer, Hans-Arno Jacobsen (+106 others)
2009 Encyclopedia of Database Systems  
As a result, it is common (at the time of writing) for data accesses to RAM to require several hundred CPU cycles to resolve.  ...  Synonyms Cache-aware query processing; Cache-sensitive query processing Definition Query processing algorithms are designed to efficiently exploit the available cache units in the memory hierarchy.  ...  Data variables in WS-BPEL contain XML data, which is typed according to the XML Schema language.  ... 
doi:10.1007/978-0-387-39940-9_2315 fatcat:x4qspjdytvhvroc7h753dihp7u

Definition and enforcement of access constraints in collaborative processes

Patrick Gaubatz
2015 unpublished
However, developing and maintaining means for defining and enforcing different kinds of access constraints and access control in general is a cross-cutting concern that is inherently prone to increase  ...  Especially in today's technology- and information-driven society, participation in such collaborative processes is common place.  ...  Acknowledgments We would like to thank the reviewers who evaluated the architectural decisions in both controlled experiments. We also thank all students for participating in the experiments.  ... 
doi:10.25365/thesis.36645 fatcat:lafmcexbkrdfjcr43foxtvbhyq

Special Issue: Advances in Network Systems

Andrzej Chojnacki, Andrzej Kowalski, Bohdan Macukow, Maciej Grzenda, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina (+13 others)
2012 unpublished
In particular, large network operators managing core high bandwidth networks and providing services to millions of end users are facing growing demand for increased data transfer, quality of service and  ...  This results in unprecedented research and development of numerous network services, applications and systems.  ...  We thank Radek Strejc, Václav Steiner, and Jindřich Skupa for implementing and testing proposed concepts and ideas.  ... 
fatcat:cawnzh5r35hjzke3tpwe3d2dsu

Scientific workflows, data provenance management and data anonymization in context of the Genome Austria Tissue Bank

Konrad Stark
2013 unpublished
In order to guarantee the validity and traceability of research results, recording the provenance of data is of great importance.  ...  Therefore, a novel anonymization algorithm based on the principle of k-anonymity is presented.  ...  Firstly, a valid WS-BPEL definition has to be present in a .bpel file, which is a XML document containing a root element process, which has various XML namespaces declarations.  ... 
doi:10.25365/thesis.30061 fatcat:4ne6hd2hdzcf7kqos6g445xddy

The First International Workshop on Enterprise Cloud Computing-Strategies and Solutions

St, Mark Perry, Zaigham Mahmood
2011 unpublished
Web Services and applications are supported by a myriad of platforms, technologies, and mechanisms for syntax (mostly XML-based) and semantics (Ontology, Semantic Web).  ...  Internet and Web-based technologies led to new frameworks, languages, mechanisms and protocols for Web applications design and development.  ...  ACKNOWLEDGMENT The authors thank Marc Martens (Artesis lab industrial automation), for building the hardware mini-processes needed for performing the testing of this paper, and the good collaboration.  ... 
fatcat:bbhwhcilt5ew7l2ljx32ojcoaq

CLOUD COMPUTING 2011 Editors

Massimo Villari, Yong Lee, Wolf Zimmermann
2011 The Second International Conference on Cloud Computing, GRIDs, and Virtualization   unpublished
This allows IARIA to give articles increased visibility via distribution, inclusion in libraries, and arrangements for submission to indexes.  ...  The copyright release is a transfer of publication rights, which allows IARIA and its partners to drive the dissemination of the published material.  ...  ACKNOWLEDGMENT This research is based on activities of the project under the Cloud Software program in TIVIT SHOK (funded by TEKES and consortium of industrial partners) and the cCloud project (Academy  ... 
fatcat:ckpewilt4vcutmzrx2jtagih4q

Models, Methods and Tools for Availability Assessment of IT-Services and Business Processes

Nikola Milanovic, Technische Universität Berlin, Technische Universität Berlin, Volker Markl
2010
For that reason service availability is in central focus of the IT operations management research and practice.  ...  Downsides and limitations of standard availability models, both from methodical and practical perspective, are identified and a novel approach for quantitative service availability assessment is presented  ...  Crossvision Service Orchestrator is a tool for Web Services and XML-based message routing, schema validation and transformation and sequence workflows.  ... 
doi:10.14279/depositonce-2482 fatcat:qlumhihb3vgujcn472x2qgimua

Dynamic Interaction and Manipulation of Web Resources

Steffen Walter Stadtmüller
2015
In particular, we formalise the combination of both technologies as state transition systems.  ...  A B S T R A C T The World Wide Web is the single largest information system of mankind, which allows for the ubiquitous access to data and services for over 3 Billion people.  ...  REST services are wrapped in WSDL descriptions to allow for a BPEL composition.  ... 
doi:10.5445/ir/1000051935 fatcat:s4orb37kgrd3lcvqhh662qkjne

A Metamodel for Business Rules with Access Control

Lex Wedemeijer
2016 Proceedings of the Sixth International Symposium on Business Modeling and Software Design   unpublished
Involved partners were MobiHealth (eHealth provider), Reinier MDC (laboratory), and University of Twente. At the time of writing, the POCT service of the case study is provided by Mobipoct B.V.  ...  ACKNOWLEDGEMENTS I am grateful to Hubert Oesterle for his constructive comments on earlier versions of this paper and for important hints how to extend and improve it.  ...  The scenarios are based on the case study and interviews.  ... 
doi:10.5220/0006222100460053 fatcat:4fyl522eibfx3g2qaeq7nvk2um

CLOUD COMPUTING 2010 Committee CLOUD COMPUTING Advisory Chairs CLOUD COMPUTING 2010 Technical Program Committee

Cloud Computing Spain, Wolfgang Gentzsch, Deisa Eu Project, Ogf Board Of Directors Of, Germany Teemu Kanstren, Vtt, Finland Koschel, Fachhochschule Hannover
2010 Editors Ali Beklen   unpublished
We hope that CLOUD COMPUTING 2010 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of cloud computing  ...  We are grateful to the members of the CLOUD COMPUTING 2010 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  We also implicate cloud computing technology and services will be more diversity, hybrid and suitable for their services usage and contexts. This paper is limited to the four company cases analysis.  ... 
fatcat:uzjn7zcaobgyroub3k43ugiltu
« Previous Showing results 1 — 15 out of 17 results