scholarly journals Conditioned Slicing of Interprocedural Programs

2019 ◽  
Vol 6 (1) ◽  
pp. 43-60
Author(s):  
Madhusmita Sahu

Program slicing is a technique to decompose programs depending on control flow and data flow amongst several lines of code in a program. Conditioned slicing is a generalization of static slicing and dynamic slicing. A variable, the desired program point, and a condition of interest form a slicing criterion for conditioned slicing. This paper proposes an approach to calculate conditioned slices for programs containing multiple procedures. The approach is termed Node-Marking Conditioned Slicing (NMCS) algorithm. In this approach, first and foremost step is to build an intermediate symbolization of a given program code and the next step is to develop an algorithm for finding out conditioned slices. The dependence graph, termed System Dependence Graph (SDG), is used to symbolize intermediate presentation. After constructing SDG, the NMCS algorithm chooses nodes that satisfy a given condition by the process of marking and unmarking. The algorithm also finds out conditioned slices for every variable at every statement during the process. NMCS algorithm employs a stack to save call context of a method. Few edges in SDG are labeled to identify the statement that calls a method. The proposed algorithm is implemented, and its performance is tested with several case study projects.

Programing is basic knowledge in maintaining software and software engineering. Knowing the program suspected of the output extraction of the program. And relationship carried out through programming. The behaviour of spectating full the involved given program sentences is focusing or unfocusing the value the which the variable given in the statements at some place in the program it is known as program slicing. The approach that extracts the parts of system programs by excluding them by data flow which is similar to items of data in the program is Program slicing technique. This paper explains the different centers of program slicing techniques (which are not executed) like conditional slicing, static slicing, dynamic slicing and, quasi-static slicing. The paper incorporates various techniques, playing with various slicing techniques like, backward slicing, forwarding slicing, semantic slicing and syntactic slicing.


2012 ◽  
Vol 462 ◽  
pp. 383-391
Author(s):  
Xue Feng Zhao ◽  
Shu Juan Jiang ◽  
Qi Zhou

Exception propagation affects the dependences of an Object-Oriented program, which must be taken into account when calculating program slicing; otherwise the result may be not precise. This paper proposes an approach to construct the extended interclass dependence graph and the Object-Oriented system dependence graph, which are able to represent the influence of exception propagation on the dependences of Object-Oriented programs precisely. In addition, the program slicing algorithm proposed by S. B. Horwitz has been extended, which is able to traverse both the extended interclass dependence graph and the Object-Oriented system dependence graph when calculating program slicing. Finally, we evaluate our approach with an experiment and compare it with other approaches. The result shows that our approach more precise.


2010 ◽  
Vol 108-111 ◽  
pp. 856-859
Author(s):  
Shu Kun Liu ◽  
Xiao Hua Yang

Program analysis plays an important role in software development and maintenance. With this method, characteristics of every variable in program can be analyzed. During the period of program analyzing, computing the program slicing by the method of constructing system dependence graph is an efficient way but the work of constructing the system dependence graph is very complicated which often leads to many wrong results. So the algorithm of hierarchy slice is used in this paper. Using the precise results, the whole program can be analyzed and the dependence relation in the program can be discovered quickly.


Author(s):  
Bipin Chadha ◽  
R. E. Fulton ◽  
J. C. Calhoun

Abstract Information-Integration is vital for keeping manufacturing operations competitive. A case study approach has been adopted to better understand the role of information in integrated manufacturing. Information is now considered a corporate asset. Creation, processing, movement, and security of information is therefore as important as that of the products/services of an enterprise. The case studies have helped in identifying the issues involved in developing an information system and supporting software framework for a manufacturing enterprise. The case studies have helped in refining an integration model, and identifying the characteristics desirable in modeling methodologies and tools. This paper describes a case study dealing with integrated manufacture of optical fiber products. A phased development and implementation approach was adopted where a small, manageable slice of the system is considered for the case study followed by functional modeling (IDEF0) and data flow modeling (Data Flow Diagrams). This identifies the pieces of information of interest. The information relationships are modeled using Extended Entity Relationship (EER) diagrams which are then mapped on to a relational model. The relational tables thus obtained were implemented on a commercial Database Management System. The functional constraints and application interfaces were then built using SQL and commercial application interface tools. The sections in the paper describe the functional models, data flow diagrams, EER diagrams, relational database design, and user/application interfaces developed for the system. Implementation experiences and observations are discussed followed by plans for the next phase of the system.


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Yadi Wang ◽  
Wangyang Yu ◽  
Peng Teng ◽  
Guanjun Liu ◽  
Dongming Xiang

With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects of life. Abnormal transaction detection is important in e-commerce since abnormal transactions can result in large losses. Additionally, integrating data flow and control flow is important in the research of process modeling and data analysis since it plays an important role in the correctness and security of business processes. This paper proposes a novel method of detecting abnormal transactions via an integration model of data and control flows. Our model, called Extended Data Petri net (DPNE), integrates the data interaction and behavior of the whole process from the user logging into the e-commerce platform to the end of the payment, which also covers the mobile transaction process. We analyse the structure of the model, design the anomaly detection algorithm of relevant data, and illustrate the rationality and effectiveness of the whole system model. Through a case study, it is proved that each part of the system can respond well, and the system can judge each activity of every mobile transaction. Finally, the anomaly detection results are obtained by some comprehensive analysis.


2013 ◽  
Vol 11 ◽  
pp. 291-295
Author(s):  
N. Phruksahiran ◽  
M. Chandra

Abstract. A synthetic aperture radar (SAR) data processing uses the backscattered electromagnetic wave to map radar reflectivity of the ground surface. The polarization property in radar remote sensing was used successfully in many applications, especially in target decomposition. This paper presents a case study to the experiments which are performed on ESAR L-Band full polarized data sets from German Aerospace Center (DLR) to demonstrate the potential of coherent target decomposition and the possibility of using the weather radar measurement parameter, such as the differential reflectivity and the linear depolarization ratio to obtain the quantitative information of the ground surface. The raw data of ESAR has been processed by the SAR simulator developed using MATLAB program code with Range-Doppler algorithm.


Sign in / Sign up

Export Citation Format

Share Document