Using declarative specification to improve the understanding, extensibility, and comparison of model-inference algorithms

I Beschastnikh, Y Brun, J Abrahamson… - IEEE Transactions …, 2014‏ - ieeexplore.ieee.org
It is a staple development practice to log system behavior. Numerous powerful model-
inference algorithms have been proposed to aid developers in log analysis and system …

Timed k-tail: Automatic inference of timed automata

F Pastore, D Micucci, L Mariani - 2017 IEEE International …, 2017‏ - ieeexplore.ieee.org
Accurate and up-to-date models describing the behavior of software systems are seldom
available in practice. To address this issue, software engineers may use specification mining …

Gk-tail+ an efficient approach to learn software models

L Mariani, M Pezzè, M Santoro - IEEE Transactions on Software …, 2016‏ - ieeexplore.ieee.org
Inferring models of program behavior from execution samples can provide useful information
about a system, also in the increasingly common case of systems that evolve and adapt in …

Runtime verification on abstract finite state models

KP Jevitha, B Jayaraman, M Sethumadhavan - Journal of Systems and …, 2024‏ - Elsevier
Finite-state models are ubiquitous in the study of concurrent systems, especially controllers
and servers that operate in a repetitive cycle. In this paper, we show how to extract finite …

TLV: abstraction through testing, learning, and validation

J Sun, H **ao, Y Liu, SW Lin, S Qin - Proceedings of the 2015 10th Joint …, 2015‏ - dl.acm.org
A (Java) class provides a service to its clients (ie, programs which use the class). The
service must satisfy certain specifications. Different specifications might be expected at …

FITTEST: A new continuous and automated testing process for future internet applications

T Vos, P Tonella, W Prasetya, PM Kruse… - … -IEEE Conference on …, 2014‏ - ieeexplore.ieee.org
Since our society is becoming increasingly dependent on applications emerging on the
Future Internet, quality of these applications becomes a matter that cannot be neglected …

TkT: Automatic inference of timed and extended pushdown automata

F Pastore, D Micucci, M Guzman… - IEEE Transactions on …, 2020‏ - ieeexplore.ieee.org
To mitigate the cost of manually producing and maintaining models capturing software
specifications, specification mining techniques can be exploited to automatically derive up-to …

The FITTEST tool suite for testing future internet applications

TEJ Vos, P Tonella, ISWB Prasetya, PM Kruse… - … Workshop on Future …, 2013‏ - Springer
Future Internet applications are expected to be much more complex and powerful, by
exploiting various dynamic capabilities For testing, this is very challenging, as it means that …

In-the-field monitoring of functional calls: Is it feasible?

O Cornejo, D Briola, D Micucci, L Mariani - Journal of Systems and …, 2020‏ - Elsevier
Collecting data about the sequences of function calls executed by an application while
running in the field can be useful to a number of applications, including failure reproduction …

Field monitoring with delayed saving

O Cornejo, D Ginelli, D Briola, D Micucci… - IEEE Access, 2019‏ - ieeexplore.ieee.org
Field monitoring techniques can collect data about the behavior of software applications
while running in the field, with real users and real data. Developers can exploit the …