6. SPY@RUNTIME
DESIGN TIME RUN TIME
Specification
Update
Specification Monitoring
Change
Detection
Inference
5
7. MODELS NEEDED
Protocol Behavior Model Behavior Equivalence Model
Only the protocol of interaction Precise behavior description
General validity Valid in a small scope
Built via abstraction Built from an exhaustive search
Monitoring Violation Interpretation
6
8. MODELS NEEDED
Protocol Behavior Model Behavior Equivalence Model
Only the protocol of interaction Precise behavior description
General validity Valid in a small scope
Built via abstraction Built from an exhaustive search
Monitoring Violation Interpretation
6
9. MODELS NEEDED
Protocol Behavior Model Behavior Equivalence Model
Only the protocol of interaction Precise behavior description
General validity Valid in a small scope
Built via abstraction Built from an exhaustive search
Monitoring Violation Interpretation
6
10. MODELS NEEDED
Protocol Behavior Model Behavior Equivalence Model
Only the protocol of interaction Precise behavior description
General validity Valid in a small scope
Built via abstraction Built from an exhaustive search
Monitoring Violation Interpretation
6
11. MODELS NEEDED
Protocol Behavior Model Behavior Equivalence Model
Only the protocol of interaction Precise behavior description
General validity Valid in a small scope
Built via abstraction Built from an exhaustive search
Monitoring Violation Interpretation
6
Soprattutto di’ che la scope selection ha un costo inferiore o al massimo analogo alla scrittura di casi di test.\n
Soprattutto di’ che la scope selection ha un costo inferiore o al massimo analogo alla scrittura di casi di test.\n
\n
\n
Stress that BEM is used as an oracle to determine whether everything is still behaving correctly.\nExplain clearly how we use it to determine the nature of a violation\n