Please wait a minute...
J4  2010, Vol. 44 Issue (11): 2183-2187    DOI: 10.3785/j.issn.1008973X.2010.11.025
    
Adaptive generation algorithm for executable state identification
sequences in EFSM model
SHU Ting1,2, SUN Shou-qian1, WANG Hai-ning1, XU Wei-qiang2
1. College of computer science and Technology, Zhejiang University, Hangzhou 310027, China ;
2. College of Informatics and Electronics, Zhejiang SCITECH University, Hangzhou 310018, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

In the protocol conformance testing system specified in extended finite state machine (EFSM) model, an algorithm for adaptive generating executable state identification sequences (ESIS) is introduced to improve efficiency in the Computation of state identification sequences (SIS). The executability of the ESIS generated in the novel algorithm can be ensured by an executability analysis method based on the executability analysis tree (EAT). Transition distinguish degrees and node convergence degrees are introduced to compute the weight of the current node for the EAT, which can be used to evaluate the correctness of the current search direction. Using a search strategy based on the node-weight function for the EAT, the node which is to be the root of the new sub-spanning tree is adaptively selected based on the weight of the latest explored node. In this way, the problem of automatic ESIS generation is formulated as adaptive exploration of the maximum weight node from unexplored nodes in EAT. Experimental results show that the proposed method needs to explore less state configuration than the executability analysis algorithm based on bread-first-search.



Published: 23 December 2010
CLC:  TP 393  
Cite this article:

SHU Ting, SUN Shou-qian, WANG Hai-ning, XU Wei-qiang. Adaptive generation algorithm for executable state identification
sequences in EFSM model. J4, 2010, 44(11): 2183-2187.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008973X.2010.11.025     OR     http://www.zjujournals.com/eng/Y2010/V44/I11/2183


ESIS序列自适应生成算法

在以扩展有限状态机 (EFSM)为模型描述的协议一致性测试系统中,为了提高可执行状态验证序列 (ESIS)的计算效率,提出一种ESIS序列自适应生成算法.新算法采用基于可执行分析树 (EAT)的可执行分析方法确保生成的ESIS序列的可执行性.引入变迁区分度因子和节点收敛度因子,计算EAT搜索树节点权重来评价当前搜索方向的正确性.利用EAT搜索树节点权重函数作为节点搜索引擎,根据当前已经搜索节点的权重自适应选择下一步搜索的目标节点,把ESIS序列自动生成问题转化为自适应搜索权重最大的EAT节点问题来解决.实验数据表明,与宽度优先可执行性分析方法相比,自适应算法具有更小的状态格局搜索空间.

[1] RAMLIGOM T, THULASIRAMAN K, DAS A. Context independent unique state identification sequences for testing communication protocols modelled as extended finite state machines [J]. Computer Communications, 2003, 26(14) : 1622-1633.

[2] ROBINSONMALLETT C, MUCKE T, LIGGESMEYER P, et al. Extended state identification and verification using a model checker [J]. Journal on Information and Software Technology, 2006, 48 (10): 981-992.
[3] RAMLIGOM T, THULASIRAMAN K, DAS A. Context independent unique sequences generation for protocol testing [C] ∥ IEEE INFOCOM ’96. CA, USA: IEEE,1996: 1141-1148.
[4] NAIK K. Efficient computation of unique input/ output sequences in finite state machines [J]. IEEE/ ACM Transactions on Networking , 1997,5 (4) :585-599.
[5] HUANG Chungming, CHIANG Mengshu, JANG Mingyuhe . UIOE: A protocol test sequence generation method using the transition executability analysis (TEA)  [J] . Computer Communication , 1998, 21 (16): 1462-147.
[6] PETRENKO A, BORODAY S, GROZ R. Confirming configurations in EFSM testing [J]. IEEE Trans Software Engineering, 2004, 30 (1) : 29-42.
[7] SABNANI K, DAHBURA A. A protocol test generation procedure [J]. Computer Networks and ISDN Systems, 1988, 15(4):285-297.
[8] 舒挺,魏仰苏,吴柏青,等. EFSM可执行状态验证序列的生成[J].北京邮电大学学报,2007, 30(2):84-88.
SHU Ting, WEI Yangsu, WU Baiqing, et al. An algorithm for generating executable state identification sequences in EFSM model [J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(2):84-88.

[1] GUO Tong,LIN Feng. Bayesian network structure learning based on hybrid genetic
and fish swarm algorithm
[J]. J4, 2014, 48(1): 130-135.
[2] I De-jun,WANG Gang,YANG Can-jun,JIN Bo,CHEN Yan-hu. NTP/IEEE1588-based time synchronization system in seafloor observatory network[J]. J4, 2014, 48(1): 1-7.
[3] DU Rui-zhong, TIAN Jun-feng, ZHANG Huan-guo. Cloud service selection model based on trust and personality preferences[J]. J4, 2013, 47(1): 53-61.
[4] ZHANG Shuai, SUN Jian-ling, XU Bin, HUANG Chao, KAVS Aleksander J.. RBAC based access control model for services compositions
cross multiple enterprises
[J]. J4, 2012, 46(11): 2035-2043.
[5] Chen Sui-sheng,Lu Jian-gang,Lou Xiao-chun. Localization algorithm for wireless sensor networks
based on MDS-MAP and nonlinear filtering
[J]. J4, 2012, 46(5): 866-872.
[6] PAN Ju-long, LI Shan-ping, ZHANG Dao-yuan. Detecting suspicious node within one cluster in wireless sensor network
using game theoretic approach
[J]. J4, 2012, 46(1): 72-78.
[7] GAO Qing,LI Shan-ping,YANG Zhao-hui. Virtual force-field based energy efficient geo-routing in
wireless sensor network
[J]. J4, 2012, 46(1): 98-104.
[8] YANG Zhao-hui, LI Shan-ping, LIN Xin. Quality optimizing real-time scheduling for incremental context services[J]. J4, 2012, 46(1): 90-97.
[9] QIAN Jian-feng, YIN Jian-wei, DONG Jin-xiang. Load balancing algorithms of semantic publish/subscribe system
over structured P2P networks
[J]. J4, 2011, 45(10): 1710-1719.
[10] YANG Zhao-hui, LI Shan-ping, LIN Xin. Anonymity level adaptation algorithm to meet resource constraint
of K-anonymity service in LBS
[J]. J4, 2011, 45(7): 1154-1160.
[11] PAN Gang, LI Shi-jian, CHEN Yun-xing. ScudContext: large-scale environmental context services infrastructure
towards cyber-physical space integration
[J]. J4, 2011, 45(6): 991-998.
[12] CHE Jian-hua, HE Qin-ming, CHEN Jian-hai, WANG Bei. Software simulation-based fault injection tool of
virtual machine system
[J]. J4, 2011, 45(4): 614-620.
[13] LI Jian-ting, JIN Xin-yu, TANG Jun, ZHANG Yu. Target localization method based on wireless multimedia sensor network[J]. J4, 2011, 45(1): 45-49.
[14] ZHANG Li-ping, PAN Gang, ZHENG Neng-gan, YANG Guo-qing, LI Hong, ZHAO Min-de. Consistent bidirectional generation method and  development
platform based on SmartC models and codes
[J]. J4, 2011, 45(1): 20-29.
[15] CHEN You-Rong, SHU Li, DONG Ji-Fen, HONG Zhen. Power control in wireless sensor network based on
nearestneighbor algorithm
[J]. J4, 2010, 44(7): 1321-1326.