Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"East Carolina University" +contributor:("Junhua Ding"). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


East Carolina University

1. Jiang, Wenhuan. Modeling and Testing of Aspect-Oriented Systems.

Degree: 2011, East Carolina University

Aspect-Oriented programming modularizes crosscutting concerns into Aspects which are automatically weaved to the specified points of a program. Although Aspect-Oriented programming improves program maintainability and the encapsulation of crosscutting concerns it also breaks some traditional programming rules due to the weaving mechanism. Therefore a new software testing approach has to be developed to rigorously test Aspect-Oriented programs. In this thesis we introduce the concept of Aspect modeling and Aspect testing and then proceed to our investigation of a model-based incremental approach for testing Aspect-Oriented programs. First a state machine model in UML is created for each Aspect and each base class which is the class to be weaved with the aspect. Then each individual aspect or base class is tested using the test cases generated from state machine models. A combined state machine model is established by weaving the aspect model into the base class model. Finally we perform a test on the woven program using test cases generated from the combined state machine model. Because the number of scenarios for weaving aspects and base classes could be very large it may require a huge number of test cases to effectively test the program. To speed up the process we propose a prioritizing strategy for selecting test cases in order to find errors sooner since different test cases have different capacity for tracking errors. We demonstrate that the test cases generated from the state machine model have to satisfy the adequacy of the transition coverage the round-trip coverage and the state coverage in the state machine model. Furthermore the prioritizing strategy is developed based on the number of changes brought by weaving of an aspect and its base classes. The test case including more changes will have a higher priority. The effectiveness of the investigated strategy is evaluated through the case study and the mutation testing. The result of case study shows that the model-based incremental approach integrated with prioritizing test case selection provides an effective tool for testing large-scale Aspect-Oriented systems. ; Computer science, Computer engineering, Aspect-Oriented Modeling, Aspect-Oriented Testing Advisors/Committee Members: Junhua Ding (advisor).

Subjects/Keywords: Aspect-oriented programming; Computer programming – Testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jiang, W. (2011). Modeling and Testing of Aspect-Oriented Systems. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14331

Chicago Manual of Style (16th Edition):

Jiang, Wenhuan. “Modeling and Testing of Aspect-Oriented Systems.” 2011. Masters Thesis, East Carolina University. Accessed July 21, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14331.

MLA Handbook (7th Edition):

Jiang, Wenhuan. “Modeling and Testing of Aspect-Oriented Systems.” 2011. Web. 21 Jul 2019.

Vancouver:

Jiang W. Modeling and Testing of Aspect-Oriented Systems. [Internet] [Masters thesis]. East Carolina University; 2011. [cited 2019 Jul 21]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14331.

Council of Science Editors:

Jiang W. Modeling and Testing of Aspect-Oriented Systems. [Masters Thesis]. East Carolina University; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14331


East Carolina University

2. Anderson, James Carold. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.

Degree: 2012, East Carolina University

Social networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of human collaboration may also be used to store and distribute information of a sensitive nature that must be secured against intrusions at all times. Given the massive operation embodied by social networks multiple methods have been developed that control the flow of information so that those with authorization can gain access. Before allowing a social network to begin distributing its contents a prudent prerequisite should be that the security protocols prevent unauthorized access. Formal modeling and analysis of security properties particularly those of Role-Based Access Control (RBAC) in social networks is the main focus of this thesis. A social network system and its security assurance mechanisms are modeled using the input language of Symbolic Model Verifier (SMV) and the properties of the system are specified using computation tree temporal logic (CTL*). Those properties are then verified using the SMV model checker. A real case was studied to demonstrate the effectiveness of model checking security properties in a social network system. The case consists of an account in which a group of users share various resources and access privileges which are controlled by RBAC. The case study results show that model checking is capable of formally analyzing security policies particularly RBAC in a social network system. In addition the counter examples generated from model checking could help to create test cases for testing system implementation and they can help us to find defects in the model as well. Formally modeling and model checking security policies in a complex system like a social network can greatly improve the security of these systems. ; Computer science, Model Checking, Social networks Advisors/Committee Members: Junhua Ding (advisor).

Subjects/Keywords: Computer security; Social networks – Security measures; Information storage and retrieval systems – Security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anderson, J. C. (2012). ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062

Chicago Manual of Style (16th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Masters Thesis, East Carolina University. Accessed July 21, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062.

MLA Handbook (7th Edition):

Anderson, James Carold. “ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK.” 2012. Web. 21 Jul 2019.

Vancouver:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Internet] [Masters thesis]. East Carolina University; 2012. [cited 2019 Jul 21]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062.

Council of Science Editors:

Anderson JC. ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK. [Masters Thesis]. East Carolina University; 2012. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14062


East Carolina University

3. Wu, Tong. Self-Checked Metamorphic Testing of Monte Carlo Simulation.

Degree: 2011, East Carolina University

Photon propagation in biological tissues can be modeled with Monte Carlo simulations numerically. However testing a such program is difficult due to the unknown character of the test oracles. Although approaches based on Beer-Lambert law van de Hulst's table or Radiative Transfer Equation (RTE) can be used for testing the Monte Carlo modeling programs these approaches are only applied to the programs that are designed for homogeneous media. A rigorous way for testing the Monte Carlo modeling programs for heterogeneous media is needed. Metamorphic testing as an effective approach for testing systems that do not have test oracles is one of possible supplementary approaches to test a Monte Carlo modeling program for heterogeneous media. In metamorphic testing instead of verifying the correctness of a test output the satisfaction of a metamorphic relation of the test outputs is checked. If a violation of the metamorphic relation is found the system implementation must have some faults. However checking only the metamorphic relations is not good enough to ensure the testing quality. Randomly or accidently generated incorrect outputs may satisfy a metamorphic relation as well. Therefore it is necessary to provide a systematic approach to measure the test effectiveness of a metamorphic testing to choose metamorphic relations and to generate test input data. In this thesis we propose a new approach called self-checked metamorphic testing. In our new approach the original metamorphic testing is extended with the evaluation of the adequacy of testing coverage criteria to measure the quality of a metamorphic testing to guide the creation of metamorphic relations to generate testing inputs and to investigate the found exceptions. The effectiveness of this approach has been demonstrated through testing a parallel Monte Carlo modeling program we developed for simulating photon propagation in human skins. This thesis contains three parts of work. In first part the enhanced Monte Carlo modeling program was used to preliminarily study the relationship between the height of the collection lens and the contrast values of the reflectance image of the system. In second part the homogenous part of the Monte Carlo program was validated with van de Hulst's table method which compares the simulation results with the calculated values on van de Hulst's table. The third and the main part of the thesis is applying the self-checked metamorphic testing approach to test the Monte Carlo modeling program. ; Computer science, metamorphic testing, Monte Carlo modeling, test adequacy criteria Advisors/Committee Members: Junhua Ding (advisor).

Subjects/Keywords: Monte Carlo method; Computer programs – Testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, T. (2011). Self-Checked Metamorphic Testing of Monte Carlo Simulation. (Masters Thesis). East Carolina University. Retrieved from http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14532

Chicago Manual of Style (16th Edition):

Wu, Tong. “Self-Checked Metamorphic Testing of Monte Carlo Simulation.” 2011. Masters Thesis, East Carolina University. Accessed July 21, 2019. http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14532.

MLA Handbook (7th Edition):

Wu, Tong. “Self-Checked Metamorphic Testing of Monte Carlo Simulation.” 2011. Web. 21 Jul 2019.

Vancouver:

Wu T. Self-Checked Metamorphic Testing of Monte Carlo Simulation. [Internet] [Masters thesis]. East Carolina University; 2011. [cited 2019 Jul 21]. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14532.

Council of Science Editors:

Wu T. Self-Checked Metamorphic Testing of Monte Carlo Simulation. [Masters Thesis]. East Carolina University; 2011. Available from: http://libres.uncg.edu/ir/listing.aspx?styp=ti&id=14532

.