用户名: 密码: 验证码:
基于自配置的软件可信性增长模型及方法
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机的不断发展和应用范围的不断扩大,应用在其上的软件系统也由于运行环境和自身特点变的越来越不可信,而人们对软件系统的依赖程度却越来越高,因此形成了用户对软件高可信需求与软件可信性得不到保障之间的矛盾。受到传统软件体系结构的限制,当前软件不能主动感知运行环境及自身行为状态,更多地依赖于人工配置,对环境的适应能力明显不足,难以满足人们对软件高可信性的要求。人们希望所使用的软件是一种灵活的,具有自我配置能力的软件,同时能明确了解自己所使用软件是否可信,可信程度是多少等问题。目前,利用自律计算(Autonomic Computing,AC)来解决“以技术管理技术”已经成为未来的发展趋势。在此背景下,本文借鉴自律计算中自配置(Self-configuration)思想,通过在软件系统中添加部分自律属性使软件具有感知自身和周围的环境的能力,实时动态地调整软件配置,智能地适应环境变化并能指导未来的自主决策,从而提高软件可信性。
     本文首先从软件架构这一宏观角度出发,结合自律计算中自配置思想,提出基于自配置的软件可信性增长模型,为后续工作奠定基础;为了对平衡信息处理能力和系统性能之间的矛盾,提出面向软件可信性分析的信息感知方法,为可信性度量和演化分析提供数据支持;从软件动作拟合的观点出发对软件可信性进行度量,为软件可信性是否增长或增长程度提供有力的支撑;最后以软件可信性的保持和增长为最终目标,进行软件可信演化和分析的研究。本文从体系架构、信息感知、可信性度量到可信性演化分析,构建了一条保障软件可信增长的有效途径,以满足用户对软件高可信性的需求。主要研究内容如下:
     首先,针对现有软件可信性较低与用户对软件可信性期望较高之间的矛盾,提出基于自配置的软件可信性增长模型。考虑到软件运行环境和自身结构的复杂性,结合自配置思想,将软件进行自律化处理,使软件具有部分自我管理能力。在此基础上设计软件自配置策略,以软件可信性为导向,对软件进行自配置动作。通过仿真实验证明了本方法理论上的合理性,通过实测实验说明将模型运用到实际环境中,软件可信性将有较高的提升。
     其次,对于具有自配置能力的软件来说,需要获取运行期的大量数据才能保证对外界环境和自身状态的感知,从而确保自配置行为的正确性。在数据收集后,哪些可以用来为可信性度量和演化分析提供高效且低代价的数据基础成为信息感知的研究重点。针对后续章节的研究内容,通过建立软件系统信息感知框架约束软件中信息采集过程,提出一种面向软件可信性分析的信息感知方法,对软件系统中自律单元(Autonomic Element,AE)收集信息过程进行建模,然后在不降低AE收集信息质量的情况下尽量减少收集信息所带来的代价,保证软件系统的高效运行。实验结果表明,在软件运行过程中添加面向软件可信性分析的信息感知方法,在保持一定运行代价基础上,能有效提高AE信息收集的性能。
     再次,传统软件可信性度量方法偏重于可信属性研究,因此带来的软件可信性属性多维、定义不统一等缺点,针对此问题,提出基于Pi演算的软件可信性度量方法。从软件行为学角度出发,将软件行为分解成为串联或并联的动作集合。根据软件设计之初对软件的要求定义软件可信行为,并将其组合成为软件可信行为路径,构建软件可信行为路径图。通过度量软件可信行为与软件实际运行行为的拟合度来度量软件的可信性。通过单个动作实验证明本方法的有效性;通过实测实验证明,在同等情况下与通过属性反映软件可信程度的传统度量方法相比,本方法更加实时、有效。
     最后,由于软件发生自配置后,软件自身必然会发生演化,如果对演化不进行控制,轻则不能保证用户对软件的高可信性需求,重则甚至会导致软件崩溃。针对这种问题,提出一种考虑历史数据的软件演化方法,将软件可信性作为约束软件演化的因素,保证软件演化后仍能满足用户对软件高可信属性的需求;同时建立考虑历史数据的软件演化分析方法,通过可视化手段记录软件演化过程并分析软件在演化过程中存在的问题。实验结果表明,考虑历史数据的软件演化方法能有效地保持和增长软件可信性,使软件可信性达到有条件的非降,能够为软件自配置和演化提供有效的指导。
With the rapid development of computers, softwares applicated in computers are becoming more and more undependable because of running environment and structural characters. However, people are increasingly dependent on softwares, which resultes in the confliction between user’s high dependability requirements and software undependability. Due to the limitations of traditional software architecture, the current softwares do not aware their running environment and behavior states. Current softwares more are dependent on manual configuration and have no ability to adapt them to the environment, which results uses’high reliability requirements can not be satisfied. People hope that softwares they are using are more flexible, have self-configuration capabilities, and definitely know whether the softwares are dependable or not as well as how much dependable value they have. At present, utilizing Autonomic Computing (AC) proposed by IBM to solve the "technology management" problem has become the developing trend in the future. In this context, this paper draws Self-configuration thinking in Autonomic Computing by adding some self-discipline in softwares, so that they can adjust the configurations real-timely and dynamically by awaring their owns properties and surrounding environment. Aiming at improving dependability, these autonomic sofewares can intelligently adapt themselves to environmental changes and guide future policy-making autonomously.
     In this paper, combined with self-configuration thinking in Autonomic Computing, a software dependability growing model based on self-configuration is proposed, which lays the foundation for the follow-up researches. Information awareness method oriented software dependability analysis is studied in detail. Data collected by awareness method will serve as the base of dependability measurement and evolvement analysis. Based on this method, an evaluation method of software dependability is proposed in the view of fitting degree, which provides an effective evidence to judge whether the software dependability increase or not, as well as how much the dependability increase. Finally, for maintaining and increasing software dependability effectively, a software evolution and analysis method is proposed. On the whole, architecture, data-awareness, dependability measure and evolution analysis build up a valid way to ensure that the software dependability can meet user’s requirements. The main contents are organized as follows.
     Firstly, a software dependability growing model based on self-configuration is proposed, which is targeted at handling the confliction between the reducing software dependability and the demands of the high dependability. Taking into account the complexity of software operating and their running environment, we discipline the software based on self-configuration thinking, which made software has some self-management capabilities. Thus, we propose some self-configuration methods and configure the software according to the goal of software dependability increase. Experimental results show that the method can improve software dependability and reduce software maintenance cost more effectively.
     Secondly, in order to softwares having the self-configuration capability, it is necessary that large amounts of running data are obtained to guarantee the software self-awareness, self-configuration and other self-management behaviors. After data collection, research focuses on how softwares can aware efficient dependability measurement and analysis data with low cost. Aiming at following study sections, we propose an information awareness method oriented software dependability analysis. Through establishing the framework of software information awareness and modeling the information collection of Autonomic Element (AE), an effective way to ensure quality of collected information with minimum cost of gathering information is proposed. Experimental results show that adding the information awareness method in running process of software can improve the performance of information collection in certain running cost.
     Thirdly, traditional researches mostly focused on the conceptions and properties of dependability, which resulted in lots of different views about multiple properties and definition software dependability. An evaluation method of software dependability based on Pi Calculus is proposed in this paper and software behavior is decomposed into series or parallel action set from the perspective of software behavior. According to the requirements in initial stages of software design, we define software dependability behaviors and combine these behaviors into dependable action path. The software dependability is calculated by comparing the fitting degree between dependable action path and real action path. Experimental result shows that the proposed method in one behavior is reasonable; a real experiment proves the proposed measure method is more valid than traditional ones.
     Lastly, as the occurrence of software self-configuration, the software itself is bound to evolve. If evolution can not be controlled, software on one hand can not guarantee the high dependability; on the other hand it will lead to software crashes. A software evolution method considering software historical behavior is proposed in this paper, which uses software dependability as a constraint factor and ensure the software to meet the software users’high dependability demand after evolution. A software evolution analysis method considering software historical behavior is also proposed in this paper. It records software evolution process by means of visualization and analyses evolution problem in software evolution process. The simulated results show that the method is valid in maintaining and increasing the dependability of software and make the software dependability to be non-reducing conditions, which can provide effective guidance for software self-configuration and evolution.
引文
[1]陈火旺,王戟,董威.高可信软件工程技术.电子学报, 2004. 31(B12): 1934-1938页
    [2] Dobson S, Sterritt R, Nixon P, et al. Fulfilling the vision of autonomic computing. IEEE Computer, 2010. 43(1): 35-41P
    [3] Johnson T. Improving automation software dependability: a role for formal methods. Control Engineering Practice, 2007. 15(11): 1403-1415P
    [4] Kenyon H. Battlefield cognizance tool points to future. Signal Magazine, 2001. 7: 16-24P
    [5] Cobleigh J, Osterweil L, Wise A, et al. Containment units: a hierarchically composable architecture for adaptive systems. ACM SIGSOFT Software Engineering Notes, 2002. 27(6): 159-165P
    [6] Kephart J, Chess D. The vision of autonomic computing. IEEE Computer, 2003. 1: 41-50P
    [7] Martinovic G, Filko D, Karic M. Analysis of autonomic computing concepts in computational grid based on the ACLM model. Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems. Cambridge, UK, 2008: 61-67P
    [8] Anthony R J. Policy-based autonomic computing with integral support for self-stabilisation. International Journal of Autonomic Computing, 2009. 1(1): 1-33P
    [9] Tianfield H, Unland R. Towards autonomic computing systems. Engineering Applications of Artificial Intelligence, 2004. 17(7): 689-699P
    [10] Agrawal S, Bruno N, Chaudhuri S, et al. Autoadmin: self-tuning database systemstechnology. IEEE Data Engineering Bulletin, 2006. 29(3): 7–15P
    [11] Xia E G. Optimal grid scheduling by dynamic selection of scheduling heuristics. University of Toronto: Canada, 2007: 201P
    [12] Grabiec P, Domanski K, Janus P, et al. Microsystem technology as a roadfrom macro to nanoworld. Bioelectrochemistry, 2005. 66(1-2): 23-28P
    [13] Holub V, Parsons T, O'Sullivan P, et al. Run-time correlation engine for system monitoring and testing. Proceedings of the 6th international conference industry session on Autonomic computing and communications industry session. Barcelona, Spain, 2009: 9-18P
    [14] Miller B. The autonomic computing edge: the "standard" way of autonomic computing. DB2 Developer Domain, 2005. 31(3): 11-17P
    [15] Müller H, O’Brien L, Klein M, et al. Autonomic computing. Carnegie Mellon University: Pittsburgh, USA, 2006
    [16] Pertet S, Narasimhan P, Wilkes J, et al. Prato: databases on demand. Proceedings of the Fourth International Conference on Autonomic Computing. Jacksonville, Florida, USA, 2007: 11-19P
    [17] Taleb-Bendiab A. Autonomic computing meets complex information systems: theory and practice, Proceedings of the 3rd International Conference on Web Information Systems and Technologies: Barcelona, Spain, 2007: 151-157P
    [18] Salehie M, Tahvildari L. Autonomic computing: emerging trends and open problems. Proceedings of Workshop on the Design and Evolution of Autonomic Application Software (DEAS 2005) Louis, Missouri, USA, 2005: 1-7P
    [19] Hariri S, Khargharia B, Chen H, et al. The autonomic computing paradigm. Cluster Computing, 2006. 9(1): 5-17P
    [20] Dong X, Hariri S, Xue L, et al. Autonomia: an autonomic computing environment. Proceedings of the 2003 IEEE International Conference on Performance, Computing, and Communications. Phoenix, 2003: 61-68P
    [21] Jarrett M, Seviora R. Constructing an autonomic computing infrastructure using cougaar. Proceedings of the Third IEEE International Workshop on Engineering of Autonomic & Autonomous Systems (EASE'06). Potsdam, Germany, 2006: 119-128P
    [22] Michael Y, Rouff C, Rash J, et al. Modeling for NASA autonomousNano-technology swarm missions and model-driven autonomic computing. Proceedings of the 21st International Conference on Advanced Networking and Applications. Niagara Falls, Canada, 2007: 250-257P
    [23] Huebscher M, McCann J. A survey of autonomic computing-degrees, models, and applications. ACM Computing Surveys (CSUR), 2008. 40(3): 1-28P
    [24] Egyed A. Architecture differencing for self management. Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems Newport Beach, California, 2004: 44-48P
    [25] Litoiu M. A performance analysis method for autonomic computing systems. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 2007. 2(1): 1-26P
    [26] Yumerefendi A, Shivam P, Irwin D, et al. Towards an autonomic computing testbed. Hot Topics in Autonomic Computing. Jacksonville, FL, 2007: 1-5P
    [27] Cheng Y, Leon-Garcia A, Foster I. Agents and service-oriented computing for autonomic computing: a research agenda. IEEE Communications Magazine, 2008. 46(5): 138-146P
    [28]付长冬,舒继武,郑纬民,等.基于自主运算的自适应存储区域网络系统.软件学报, 2004. 15(7): 1056-1063页
    [29]李春江,肖侬,杨学军.具有自主计算特征的计算网格资源备份服务系统.计算机工程与科学, 2005. 27(12): 59-60页
    [30]张海俊,史忠植.自主计算软件工程方法.小型微型计算机系统, 2006. 27(6): 1077-1082页
    [31]张海俊,史忠植.自主计算环境.计算机工程, 2006. 32(7): 1-3页
    [32]刘涛,曾国荪,吴长议.网格环境下任务分配的自主计算方法.通信学报, 2006. 27(11): 139-143, 147页
    [33]刘文洁,李战怀.一种面向服务器集群的自律计算模型.计算机应用, 2007. 27(B6): 299-301页
    [34]刘文洁,李战怀.一种基于自律计算的性能监视工具.微电子学与计算机, 2008. 25(3): 130-133页
    [35]臧铖,黄忠东,董金祥.基于状态的通用自主计算模型.计算机辅助设计与图形学学报, 2007. 19(11): 1476-1481页
    [36]廖备水,黄华新,高济.一种支持自治计算的基于可废止逻辑的柔性Agent.软件学报, 2008. 19(3): 605-620页
    [37]廖备水,李石坚,姚远,等.自主计算概念模型与实现方法研究.软件学报, 2008. 19(4): 779-802页
    [38]张琨,许满武,刘凤玉.面向自主计算的主体服务匹配:研究综述.计算机科学, 2008. 35(12): 1-4页
    [39]郑瑞娟,王慧强,庞永刚.生物启发的多网安全体系建模与仿真.系统仿真学报, 2008. 20(5): 1118-1125页
    [40]郑瑞娟王慧强,徐东.生物启发的多维网络安全模型及实现模式研究.计算机研究与发展, 2006. 43(z2): 509-514页
    [41]李冰洋,王慧强,冯光升.自律入侵容忍系统的模型构建与量化分析.计算机应用研究, 2009(5): 1883-1887页
    [42]张海涛,王慧强,刘洪刚,等.自律计算评估技术研究.小型微型计算机系统, 2009(9): 1791-1795页
    [43]王慧强,吕宏武,赵倩,等.一种关键任务系统自律可信性模型与量化分析.软件学报, 2010. 21(2): 344-358页
    [44] Feng G, Wang H, Li B, et al. Dynamic self-configuration of user QoS for next generation network. Proceedings of the 2009 Sixth IFIP International Conference on Network and Parallel Computing. Gold Coast, Australia, 2009: 80-85P
    [45] Neelakantan S, Ampatt P, Muraleedharan N, et al. An architecture for self-configuration of network for QoS and security. Proceedings of the 1st international conference on COMmunication Systems And Networks. Bangalore, India, 2009: 91-95P
    [46] Saleem K, Sadjadi S, Chen S. Towards a self-configurable weather research and forecasting system. Proceedings of the 2008 International Conference on Autonomic Computing. Norway, 2008: 195-196P
    [47] Anthony R, Pelc M, Ward P, et al. A run-time configurable software architecture for self-managing systems. Proceedings of the 2008 International Conference on Autonomic Computing. Chicago, IL, USA, 2008: 207-208P
    [48] Khan M, Awais M, Shamail S. Self-configuration in autonomic systems using clustered CBR approach. Proceedings of the 2008 International Conference on Autonomic Computing. Chicago, Illinois, USA, 2008: 211-212P
    [49]胡剑军,官荷卿,魏峻,等.一种基于性能模型的中间件自配置框架.软件学报, 2007. 18(9): 2117-2129页
    [50]张国敏,陈鸣,王亮,等.支持大规模分布式网络测量的组件自配置机制.吉林大学学报:信息科学版, 2007. 25(1): 91-97页
    [51]林煜明,蔡国永,李优.基于政策的自配置系统的形式建模与分析.计算机与现代化, 2008(2): 63-66页
    [52] Lee S, Youn H, Lee E. Context adaptive self-configuration system based on multi-agent. Lecture Notes in Computer Science, 1989. 3554: 268-277P
    [53] Garcia F, Canovas O, Martinez G, et al. Self-configuration of grid nodes using a policy-based management architecture. Lecture Notes in Computer Science, 2004. 3038: 158-165P
    [54] Boutaba R, Omari S, Virk A. Selfcon: an architecture for self-configuration of networks. Journal of Communications and Networks, 2001. 3(4): 317-323P
    [55] Want R, Hopper A, Falcao V, et al. The Active Badge Location System. ACM Transactions on Information Systems, 1992. 10(1): 91-102P
    [56] Brown P. The stick-e document: a framework for creating context-aware applications. Electronic Publishing-Chichester-, 1995. 8: 259-272P
    [57] Abowd G D, Dey A K, Brown P J, et al. Towards a better understanding of context and context-awareness. Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing. Karlsruhe, Germany,1999: 304-307P
    [58] Soldatos J, Pandis I, Stamatis K, et al. Agent based middleware infrastructure for autonomous context-aware ubiquitous computing services. Computer Communications, 2007. 30(3): 577-591P
    [59] Strassner J, Samudrala S, Cox G, et al. The Design of a New Context-Aware Policy Model for Autonomic Networking, 2008: 119-128P
    [60] Anthony R, Pelc M, Ward P, et al. A Run-Time Configurable Software Architecture for Self-Managing Systems, 2008: 207-208P
    [61] Dawson D. Facilitating autonomic computing using reflection. University of Victoria, 2009: 121P
    [62] Sterritt R, Bantz D. Personal autonomic computing reflex reactions and self-healing. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2006. 36(3): 304-314P
    [63] Cybenko G, Berk V H, Gregorio-De.Souza I D, et al. Practical autonomic computing. Proceedings of the 30th Annual International Computer Software and Applications Conference. Chicago, USA, 2006: 3-14P
    [64] Blair G S, Coulson G, Blair L, et al. Reflection, self-awareness and self-healing in OpenORB. Proceedings of the first workshop on Self-healing systems. Charleston, South Carolina, 2002: 9-14P
    [65] Gelenbe E, Lent R, Nunez A. Self-aware networks and QoS. Proceedings of the IEEE, 2004. 92(9): 1478-1489P
    [66] Gelenbe E, Sakellari G, D'Arienzo M. Controlling access to preserve QoS in a self-aware network. Proceedings of the First International Conference on Self-Adaptive and Self-Organizing Systems. Boston, USA, 2007: 205-213P
    [67] Gelenbe E, Loukas G. A self-aware approach to denial of service defence. Computer Networks, 2007. 51(5): 1299-1314P
    [68] Gelenbe E. Steps toward self-aware networks. Communications of the ACM, 2009. 52(7): 66-75P
    [69] Agarwal A, Miller J, Eastep J, et al. Self-aware computing. MassachusettsInstitute of Technology Cambridge: Massachusetts, 2009: 15P
    [70] Iyer R, Tang D. Measurement-based dependability evaluation of operational computer systems. Foundations of Dependable Computing, 1994. 283: 195-234P
    [71] Hecht H, Incorporated S. A proposal for standardized software dependability data. Proceedings of Second IEEE International Software Engineering Standards Symposium 'Experience and Practice'(ISESS'95). Montrdal, Qukbec, Canada, 1995: 235-243P
    [72] Hamlet D. Connecting test coverage to software dependability. Proceedings of 5th International Symposium on Software Reliability Engineering, 1994: 158–165P
    [73] Tang D, I R K. Analysis of the VAWVMS error logs in multicomputer environments- a case study of software dependability. Proceedings of Third International Symposium on Software Reliability Engineering. Research Triangle Park, NC, 1992: 216-226P
    [74] Meyer J, Littlewood B, Wright D. Dependability of modular software in a multiuser operationalenvironment. Proceedings of Sixth International Symposium on Software Reliability Engineering. Toulouse, France, 1995: 170-179P
    [75] Tang D, Hecht M. Evaluation of software dependability based on stability test data. Proceedings of Twenty-Fifth International Symposium on Fault-Tolerant Computing(FTCS-25). Pasadena, California, 1995: 434-434P
    [76] Mukherjee A, Siewiorek D. Measuring software dependability by robustness benchmarking. IEEE Transactions on Software Engineering, 1997. 23(6): 366-378P
    [77] Lee I, Iyer R. Software dependability in the Tandem GUARDIAN system. IEEE Transactions on Software Engineering, 1995. 21(5): 455-467P
    [78] Benso A, Di Carlo S, Di Natale G, et al. Software dependability techniques validated via fault injection experiments. Proceedings of 6th EuropeanConference on Radiation and Its Effects on Components and Systems. Grenoble, France, 2001: 269-274P
    [79] Yang C, Bo L. Fuzzy comprehensive evaluation of software dependability with rough set theory based combinational weight. Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing(NSWCTC '09). Wuhan, China, 2009: 400-403P
    [80] Blanc S, Bonastre A, Gil P. Dependability assessment of by-wire control systems using fault injection. Journal of Systems Architecture, 2009. 55(2): 102-113P
    [81] Cho B, Youn H, Lee E. Software dependability analysis methodology. Lecture Notes in Computer Science, 2009. 5593: 580-593P
    [82] Inverardi P, Tivoli M. The future of software: adaptation and dependability. Lecture Notes in Computer Science, 2009. 5413: 1-31P
    [83] Michalska K, Walkowiak T. Hierarchical approach to dependability analysis of information systems by modeling and simulation. Proceedings of Second International Conference on Emerging Security Information, Systems and Technologies(SECURWARE '08). Cap Esterel, France, 2008: 356-361P
    [84] Lin M, Yongsen X. An adaptive dependability model of component-based software. ACM SIGSOFT Software Engineering Notes, 2003. 28(2): 1-10P
    [85]黄罡,王千祥,曹东刚,等. PKUAS:一种面向领域的构件运行支撑平台.电子学报, 2002. 30(12A): 1938-1942页
    [86]黄罡,王千祥,梅宏,等.基于软件体系结构的反射式中间件研究.软件学报, 2003. 14(11): 1257-1275页
    [87] Ma C, Zhao J, Gu G, et al. Research on software dependability testing profile in internet environment. Proceedings of the 2008 International Conference on Information Security and Assurance (ISA '08). Hanwha Resort Haeundae, Busan, Korea, 2008: 206-209P
    [88]卢锡城,李根,卢凯,等.面向高可信软件的整数溢出错误的自动化测试.软件学报, 2010. 21(2): 179-193页
    [89]李仁杰,张瞩熹,江海燕,等.基于监控的可信软件构造模型研究与实现.计算机应用研究, 2009(12): 4585-4588页
    [90]郭树行,兰雨晴,金茂忠.基于目标的软件可信性需求规约方法研究.计算机工程, 2007. 33(11): 37-38页
    [91]王怀民,唐扬斌,尹刚,等.互联网软件的可信机理.中国科学: E辑, 2006. 36(10): 1156-1169页
    [92] Huang L. A value-based process for achieving software dependability. Lecture Notes in Computer Science, 2005. 3840: 108-121P
    [93]杨静.软件可信性评估工具的研究与实现.西北大学:西安, 2009
    [94]杨善林,丁帅,褚伟.一种基于效用和证据理论的可信软件评估方法.计算机研究与发展, 2009. 46(7): 1152-1159P
    [95] Gall H, Jazayeri M, Kl sch R, et al. Software evolution observations based on product release history. Proceedings of International Conference on Software Maintenance. Bari, Italy, 1997: 160-166P
    [96] Tokuda L, Batory D. Automated software evolution via design pattern transformations, Automated Software Evolution via Design Pattern Transformations. University of Texas at Austin, 1995: 1-20P
    [97] Cinnéide Mó, Nixon P. Automated software evolution towards design patterns. Proceedings of the 4th International Workshop on Principles of Software Evolut(IWPSE'01). Vienna, Austria, 2001: 162-165P
    [98] Mens T, Tourwe T. A survey of software refactoring. IEEE Transactions on Software Engineering, 2004. 30(2): 126-139P
    [99] Wu J, Holt R, Hassan A. Exploring software evolution using spectrographs. Proceedings of 11th Working Conference on Reverse Engineering. Delft, Netherlands, 2004: 80-89P
    [100] Wu J, Spitzer C, Hassan A, et al. Evolution spectrographs: visualizing punctuated change in software evolution. Proceedings of 7th International Workshop on Principles of Software Evolution, 2004: 57-66P
    [101] G rba T, Ducasse S. Modeling history to analyze software evolution. Journal on Software Maintenance and Evolution: Research and Practice, 2006. 18(3): 207-236P
    [102] Robbes R, Lanza M. A change-based approach to software evolution. Electronic Notes in Theoretical Computer Science, 2007. 166: 93-109P
    [103]王远,吕建,徐锋,等.一个适用于网构软件的信任度量及演化模型.软件学报, 2006. 17(4): 682-690页
    [104]李玉龙,李长云.软件动态演化技术.计算机技术与发展, 2008. 18(9): 83-86页
    [105] Gong Hongquan, Wenyun Z, Ruzh X, et al. A research on pi-calculus based component evolution. Acta Electronica Sinica, 2004. 32(12A): 238-242P
    [106] Kurmas Z. Using the distiller to direct the development of self-configuration software. Proceedings of the First International Conference on Autonomic Computing. New York, NY, USA, 2004: 172-179P
    [107] Jarrett M, Seviora R. Diversity to enhance autonomic computing self-protection. The First International Conference on Availability, Reliability and Security(ARES2006). Austria, 2006: 295-299P
    [108] Choi H, Kulkarni V, Trivedi K. Markov regenerative stochastic Petri nets. Performance Evaluation, 1994. 20(1-3): 337-357P
    [109] Heimann D, Mittal N, Trivedi K. Availability and reliability modeling for computer systems. Advances in computers, 1990. 31: 175-233P
    [110] Borodin A, Kleinberg J, Raghavan P, et al. Adversarial queuing theory. Journal of the ACM (JACM), 2001. 48(1): 38P
    [111]孙荣恒,李建平.排队论基础,北京,科学出版社, 2002
    [112]唐应辉,唐小我.排队论—基础与分析技术,北京,科学出版社, 2006
    [113] Nelson R, Probability. Stochastic processes, and queuing theory-the mathematics of computer performance modeling, New York, Springer Verlag, 1995: 255P
    [114]李长云,李赣生,何频捷.一种形式化的动态体系结构描述语言.软件学报, 2006. 17(6): 1349-1359页
    [115] Milner R, Parrow J, Walker D. A calculus of mobile processes, i. Information and computation, 1992. 100(1): 1-40P
    [116]何飞.基于Pi-演算的Agent交互模式研究.太原理工大学:太原, 2007: 75页
    [117]沈昌祥.大力发展我国可信计算技术和产业.信息安全与通信保密, 2007. 9: 18-20页
    [118]刘克,单志广,王戟,等.“可信软件基础研究”重大研究计划综述.中国科学基金, 2008. 22(3): 145-151页
    [119] Victor B, Moller F. The Mobility Workbench—a tool for theπ-calculus. Lecture Notes in Computer Science, 1994. 818: 428-440P
    [120] Zyla M, Caban D. Dependability analysis of SOA systems. Proceedings of the 2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX. Szklarska Poreba, Poland, 2008: 301-306P
    [121]周方.一种指控系统软件可靠性评估的尝试.系统仿真学报, 2007. 19(6): 1403-1405页
    [122]王怀民,尹刚.网络时代的软件可信演化.中国计算机学会通讯, 2010. 6(2): 28-36页

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700