SlideShare une entreprise Scribd logo
1  sur  9
By,
Jyothsna.S
 Introduction
 A Framework for Object-Oriented Data Flow Testing
◦ Event-/Message-Driven Petri Nets
◦ Inheritance-Induced Data Flow
◦ Message-Induced Data Flow
 MM-paths were defined to serve as integration testing analogy of
DD-paths.
 For procedural software, DD-path testing is often insufficient;
and in such cases, data flow testing is more appropriate.
 The same holds for integration testing of object-oriented
software; if anything, the need is greater for two reasons:
(1) data can get values from inheritance tree and
(2) data can be defined at various stages of message passing.
 Program graphs formed the basis for describing and analyzing
data flow testing for procedural code.
 Event-Driven Petri Nets (EDPNs). They express more
closely event-driven systems, an important notion in object-
oriented applications.
 An event- and message-driven Petri net (EMDPN) is a
quadripartite directed graph (P, D, M, S,In, Out) composed
of four sets of nodes, P, D, M, and S, and two mappings, In
and Out, where
 P is a set of port events
 D is a set of data places
 M is a set of message places
 S is a set of transitions
 In is a set of ordered pairs from (P ∪ D ∪ M) × S
 Out is a set of ordered pairs from S × (P ∪ D ∪ M)
 Figure shows the notational symbols used in an event
and message-driven Petri net (EMDPN).
 The fused triangle shape for messages is intended to
convey that a message is an output of the sending
method and an input to the destination method.
 We retain the port input and
output events because these will
certainly occur in event-driven ,
object-oriented applications.
 We will still retain the data places
 The new symbol is intended to
capture the essence of
Inter object messages:
 They are an output of a method
execution path in the sending object.
 They are an input to a method
execution path in the receiving
object.
 The return is a very subtle output of a
method execution path in the
receiving object.
 The return is an input to a method
execution path in the sending object.
 Consider an inheritance tree in which the value of a data item is
defined; in that tree, consider a chain that begins with a data place
where the value is defined, and ends at the “bottom” of the tree.
 That chain will be an alternating sequence of data places.
 This framework therefore supports several forms of inheritance: single,
multiple, and selective multiple.
 The EMDPN that expresses inheritance is composed only of data
places and method execution paths, as shown in Figure.
 The EMDPN in Figure
shows the message
communication among
three objects.
 As an example of a
define/use path,
suppose mep3 is a
Define node for a data
item.
We can identify these two du-paths:
du1 = <mep3, msg2, mep5, d6, mep6, return(msg2), mep4, return(msg1),
mep2>
du2 = <mep6, return(msg2), mep4, return(msg1), mep2>
Svv

Contenu connexe

Tendances

Information retrieval as statistical translation
Information retrieval as statistical translationInformation retrieval as statistical translation
Information retrieval as statistical translationBhavesh Singh
 
Effective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkEffective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkUvaraj Shan
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...Madan Golla
 
Textmining Retrieval And Clustering
Textmining Retrieval And ClusteringTextmining Retrieval And Clustering
Textmining Retrieval And Clusteringguest0edcaf
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Textmining Predictive Models
Textmining Predictive ModelsTextmining Predictive Models
Textmining Predictive Modelsguest0edcaf
 
A survey of web clustering engines
A survey of web clustering enginesA survey of web clustering engines
A survey of web clustering enginesunyil96
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach IJCSIS Research Publications
 
A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...
A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...
A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...Cemal Ardil
 
On optimizing overlay topologies for search
On optimizing overlay topologies for searchOn optimizing overlay topologies for search
On optimizing overlay topologies for searchIMPULSE_TECHNOLOGY
 
Web clustering engines
Web clustering enginesWeb clustering engines
Web clustering enginesYash Darak
 
Spatio textual similarity join
Spatio textual similarity joinSpatio textual similarity join
Spatio textual similarity joinIJDKP
 
Seeds Affinity Propagation Based on Text Clustering
Seeds Affinity Propagation Based on Text ClusteringSeeds Affinity Propagation Based on Text Clustering
Seeds Affinity Propagation Based on Text ClusteringIJRES Journal
 
TextRank: Bringing Order into Texts
TextRank: Bringing Order into TextsTextRank: Bringing Order into Texts
TextRank: Bringing Order into TextsSharath TS
 
A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...Fellowship at Vodafone FutureLab
 

Tendances (19)

Information retrieval as statistical translation
Information retrieval as statistical translationInformation retrieval as statistical translation
Information retrieval as statistical translation
 
Effective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkEffective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p Network
 
Document clustering for forensic analysis an approach for improving compute...
Document clustering for forensic   analysis an approach for improving compute...Document clustering for forensic   analysis an approach for improving compute...
Document clustering for forensic analysis an approach for improving compute...
 
Textmining Retrieval And Clustering
Textmining Retrieval And ClusteringTextmining Retrieval And Clustering
Textmining Retrieval And Clustering
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Textmining Predictive Models
Textmining Predictive ModelsTextmining Predictive Models
Textmining Predictive Models
 
Web clustring engine
Web clustring engineWeb clustring engine
Web clustring engine
 
A survey of web clustering engines
A survey of web clustering enginesA survey of web clustering engines
A survey of web clustering engines
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach Improved Text Mining for Bulk Data Using Deep Learning Approach
Improved Text Mining for Bulk Data Using Deep Learning Approach
 
A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...
A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...
A fast-replica-placement-methodology-for-large-scale-distributed-computing-sy...
 
EDI 2009- Advanced Search: What’s Under the Hood of your Favorite Search System?
EDI 2009- Advanced Search: What’s Under the Hood of your Favorite Search System?EDI 2009- Advanced Search: What’s Under the Hood of your Favorite Search System?
EDI 2009- Advanced Search: What’s Under the Hood of your Favorite Search System?
 
On optimizing overlay topologies for search
On optimizing overlay topologies for searchOn optimizing overlay topologies for search
On optimizing overlay topologies for search
 
Web clustering engines
Web clustering enginesWeb clustering engines
Web clustering engines
 
Spatio textual similarity join
Spatio textual similarity joinSpatio textual similarity join
Spatio textual similarity join
 
Seeds Affinity Propagation Based on Text Clustering
Seeds Affinity Propagation Based on Text ClusteringSeeds Affinity Propagation Based on Text Clustering
Seeds Affinity Propagation Based on Text Clustering
 
TextRank: Bringing Order into Texts
TextRank: Bringing Order into TextsTextRank: Bringing Order into Texts
TextRank: Bringing Order into Texts
 
I AM SAM web app
I AM SAM web appI AM SAM web app
I AM SAM web app
 
A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...A machine learning based protocol for efficient routing in opportunistic netw...
A machine learning based protocol for efficient routing in opportunistic netw...
 

En vedette

Connecting social media to e commerce system
Connecting social media to e commerce systemConnecting social media to e commerce system
Connecting social media to e commerce systemJyothsna Sridhar
 
Connecting social media to e commerce (2)
Connecting social media to e commerce (2)Connecting social media to e commerce (2)
Connecting social media to e commerce (2)krsenthamizhselvi
 
Connecting social media to e commerce
Connecting social media to e commerceConnecting social media to e commerce
Connecting social media to e commercecloudtechnologies42
 
Social Media & Ecommerce
Social Media & EcommerceSocial Media & Ecommerce
Social Media & EcommerceMark Logan
 
Effect of social media on e commerce
Effect of social media on e commerceEffect of social media on e commerce
Effect of social media on e commercePooja Gupta
 
Impact of Social Media on E-Commerce
Impact of Social Media on E-CommerceImpact of Social Media on E-Commerce
Impact of Social Media on E-CommerceAkshay Thakur
 
Social Commerce : E-Commerce and Social Media
Social Commerce :  E-Commerce and Social MediaSocial Commerce :  E-Commerce and Social Media
Social Commerce : E-Commerce and Social MediaVijay S Paul
 
Social commerce slides
Social commerce slidesSocial commerce slides
Social commerce slidesRobin Steele
 
The Rise of Social commerce
The Rise of Social commerceThe Rise of Social commerce
The Rise of Social commerceRobin Steele
 
E-Commerce Connected By Social Media: Microblogging Information Recommitted t...
E-Commerce Connected By Social Media: Microblogging Information Recommitted t...E-Commerce Connected By Social Media: Microblogging Information Recommitted t...
E-Commerce Connected By Social Media: Microblogging Information Recommitted t...dbpublications
 
Social commerce slideshare
Social commerce slideshareSocial commerce slideshare
Social commerce slideshareUnderlined
 
Social Media & E-commerce (How social commerce works)
Social Media & E-commerce (How social commerce works)Social Media & E-commerce (How social commerce works)
Social Media & E-commerce (How social commerce works)Alexandru Rada
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Jyothsna Sridhar
 
social commerce
social commercesocial commerce
social commercetumetr1
 
Shopify (An e-Commerce) PPT
Shopify (An e-Commerce) PPTShopify (An e-Commerce) PPT
Shopify (An e-Commerce) PPTkoushik karthik
 
Internet Of Things in Automobile Industry
Internet Of Things in Automobile IndustryInternet Of Things in Automobile Industry
Internet Of Things in Automobile IndustryIEI GSC
 
Social Commerce - What Are We Waiting For?
Social Commerce - What Are We Waiting For?Social Commerce - What Are We Waiting For?
Social Commerce - What Are We Waiting For?Jurgen Appelo
 

En vedette (20)

Connecting social media to e commerce system
Connecting social media to e commerce systemConnecting social media to e commerce system
Connecting social media to e commerce system
 
Connecting social media to e commerce (2)
Connecting social media to e commerce (2)Connecting social media to e commerce (2)
Connecting social media to e commerce (2)
 
Connecting social media to e commerce
Connecting social media to e commerceConnecting social media to e commerce
Connecting social media to e commerce
 
Social Media & Ecommerce
Social Media & EcommerceSocial Media & Ecommerce
Social Media & Ecommerce
 
Effect of social media on e commerce
Effect of social media on e commerceEffect of social media on e commerce
Effect of social media on e commerce
 
Impact of Social Media on E-Commerce
Impact of Social Media on E-CommerceImpact of Social Media on E-Commerce
Impact of Social Media on E-Commerce
 
Social Commerce : E-Commerce and Social Media
Social Commerce :  E-Commerce and Social MediaSocial Commerce :  E-Commerce and Social Media
Social Commerce : E-Commerce and Social Media
 
E commerce
E commerceE commerce
E commerce
 
Jli
JliJli
Jli
 
Social commerce slides
Social commerce slidesSocial commerce slides
Social commerce slides
 
The Rise of Social commerce
The Rise of Social commerceThe Rise of Social commerce
The Rise of Social commerce
 
E-Commerce Connected By Social Media: Microblogging Information Recommitted t...
E-Commerce Connected By Social Media: Microblogging Information Recommitted t...E-Commerce Connected By Social Media: Microblogging Information Recommitted t...
E-Commerce Connected By Social Media: Microblogging Information Recommitted t...
 
Social commerce slideshare
Social commerce slideshareSocial commerce slideshare
Social commerce slideshare
 
Social Media & E-commerce (How social commerce works)
Social Media & E-commerce (How social commerce works)Social Media & E-commerce (How social commerce works)
Social Media & E-commerce (How social commerce works)
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
 
social commerce
social commercesocial commerce
social commerce
 
Shopify (An e-Commerce) PPT
Shopify (An e-Commerce) PPTShopify (An e-Commerce) PPT
Shopify (An e-Commerce) PPT
 
Internet Of Things in Automobile Industry
Internet Of Things in Automobile IndustryInternet Of Things in Automobile Industry
Internet Of Things in Automobile Industry
 
Connected Cars
Connected CarsConnected Cars
Connected Cars
 
Social Commerce - What Are We Waiting For?
Social Commerce - What Are We Waiting For?Social Commerce - What Are We Waiting For?
Social Commerce - What Are We Waiting For?
 

Similaire à Svv

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Mid term Topic
Mid term TopicMid term Topic
Mid term TopicDulal Miah
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...IJERA Editor
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)DheerajPachauri
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsIJERA Editor
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
Application Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionApplication Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionCSCJournals
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolijwmn
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 

Similaire à Svv (20)

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Mid term Topic
Mid term TopicMid term Topic
Mid term Topic
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
 
Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)Clustering for Stream and Parallelism (DATA ANALYTICS)
Clustering for Stream and Parallelism (DATA ANALYTICS)
 
Notes on Class 3
Notes on Class 3Notes on Class 3
Notes on Class 3
 
Packet Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String KernelsPacket Classification using Support Vector Machines with String Kernels
Packet Classification using Support Vector Machines with String Kernels
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
Research Papar
Research PaparResearch Papar
Research Papar
 
Av33274282
Av33274282Av33274282
Av33274282
 
Av33274282
Av33274282Av33274282
Av33274282
 
Application Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts PredictionApplication Of Extreme Value Theory To Bursts Prediction
Application Of Extreme Value Theory To Bursts Prediction
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
 
Saif_CCECE2007_full_paper_submitted
Saif_CCECE2007_full_paper_submittedSaif_CCECE2007_full_paper_submitted
Saif_CCECE2007_full_paper_submitted
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Osi model
Osi modelOsi model
Osi model
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Osi rp3
Osi rp3Osi rp3
Osi rp3
 
Osi model
Osi modelOsi model
Osi model
 

Dernier

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 

Dernier (20)

Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 

Svv

  • 2.  Introduction  A Framework for Object-Oriented Data Flow Testing ◦ Event-/Message-Driven Petri Nets ◦ Inheritance-Induced Data Flow ◦ Message-Induced Data Flow
  • 3.  MM-paths were defined to serve as integration testing analogy of DD-paths.  For procedural software, DD-path testing is often insufficient; and in such cases, data flow testing is more appropriate.  The same holds for integration testing of object-oriented software; if anything, the need is greater for two reasons: (1) data can get values from inheritance tree and (2) data can be defined at various stages of message passing.  Program graphs formed the basis for describing and analyzing data flow testing for procedural code.
  • 4.  Event-Driven Petri Nets (EDPNs). They express more closely event-driven systems, an important notion in object- oriented applications.  An event- and message-driven Petri net (EMDPN) is a quadripartite directed graph (P, D, M, S,In, Out) composed of four sets of nodes, P, D, M, and S, and two mappings, In and Out, where  P is a set of port events  D is a set of data places  M is a set of message places  S is a set of transitions  In is a set of ordered pairs from (P ∪ D ∪ M) × S  Out is a set of ordered pairs from S × (P ∪ D ∪ M)
  • 5.  Figure shows the notational symbols used in an event and message-driven Petri net (EMDPN).  The fused triangle shape for messages is intended to convey that a message is an output of the sending method and an input to the destination method.
  • 6.  We retain the port input and output events because these will certainly occur in event-driven , object-oriented applications.  We will still retain the data places  The new symbol is intended to capture the essence of Inter object messages:  They are an output of a method execution path in the sending object.  They are an input to a method execution path in the receiving object.  The return is a very subtle output of a method execution path in the receiving object.  The return is an input to a method execution path in the sending object.
  • 7.  Consider an inheritance tree in which the value of a data item is defined; in that tree, consider a chain that begins with a data place where the value is defined, and ends at the “bottom” of the tree.  That chain will be an alternating sequence of data places.  This framework therefore supports several forms of inheritance: single, multiple, and selective multiple.  The EMDPN that expresses inheritance is composed only of data places and method execution paths, as shown in Figure.
  • 8.  The EMDPN in Figure shows the message communication among three objects.  As an example of a define/use path, suppose mep3 is a Define node for a data item. We can identify these two du-paths: du1 = <mep3, msg2, mep5, d6, mep6, return(msg2), mep4, return(msg1), mep2> du2 = <mep6, return(msg2), mep4, return(msg1), mep2>