Search For:

Displaying 1-40 out of 40 total
Contract-Based Mutation for Testing Components
Found in: Software Maintenance, IEEE International Conference on
By Ying Jiang, Shan-Shan Hou, Jin-Hui Shan, Lu Zhang, Bing Xie
Issue Date:September 2005
pp. 483-492
Testing plays an important role in the maintenance of Component Based Software Development. Test adequacy for component testing is one of the hardest issues for component testing. To tackle this problem, it is a natural idea to apply mutation testing, whic...
 
Mining Condensed and Lossless Association Rules by Pruning Redundancy
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Lu Liu, Yin Chen, Siqing Shan, Lu Yin
Issue Date:October 2008
pp. 591-595
There are excessive and disordered rules generated by traditional approaches of association rule mining, many of which are redundant, so that they are difficult for users to understand and make use of. Han et al pointed out the bottleneck of association ru...
 
A power control mechanism for non-cooperative packet forwarding in ad hoc networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Yi Sun,Shan Lu,Yuming Ge,Zhongcheng Li,Eryk Dutkiewicz
Issue Date:October 2011
pp. 123-126
Based on energy consumption considerations, an ad hoc network node may reject other nodes' forwarding requests to save the limited battery power for its own data transmission. Therefore, a lot of incentive schemes have been proposed to promote the cooperat...
 
Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shan Lu,Soyeon Park,Yuanyuan Zhou
Issue Date:June 2012
pp. 1060-1072
Concurrency bugs are among the most difficult to detect and diagnose of all software bugs. This paper combats concurrency bugs from the perspective of programmers' synchronization intentions. We first study the root causes of 74 real-world concurrency bugs...
 
A Bi-level Programming Model for Network Traffic Surveillance of Optimal Camera Location
Found in: Computational Sciences and Optimization, International Joint Conference on
By Xiao-Shan Lu, Hai-Jun Huang, Jiancheng Long
Issue Date:April 2011
pp. 1035-1039
Cameras enable synthesis of disaggregated vehicle information from multiple locations. This paper addresses the problem of how to determine the optimal locations of cameras for best traffic surveillance in urban road networks. All users are divided into mu...
 
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing
Found in: IEEE Transactions on Software Engineering
By Shan Lu,Soyeon Park,Yuanyuan Zhou
Issue Date:July 2012
pp. 844-860
Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violations are common and important. How to test the interleaving space and expose atomic...
 
A Novel Dynamic Model for Peer-to-Peer File Sharing Systems
Found in: Computer Modeling and Simulation, International Conference on
By Dong Guo, Baoqun Yin, Shan Lu, Jing Huang, Jian Yang
Issue Date:January 2010
pp. 418-422
With widely application of Peer-to-Peer (P2P) file sharing technique, the P2P traffic occupies most of the current Internet bandwidth. Modeling the behaviors of P2P file sharing systems is important for designing and evaluating such systems. In this paper,...
 
An Evolution Model for P2P File-Sharing Networks
Found in: Computer Modeling and Simulation, International Conference on
By Jing Huang,Baoqun Yin,Dong Guo,Shan Lu,Xumin Wu
Issue Date:January 2010
pp. 361-365
Propose an evolution model for Peer-to-Peer (P2P) file-sharing systems, which try to capture the dynamic properties of P2P application networks. The model consists of four events: node joining, node departure, connection establishing and connection breakin...
 
Evaluation and Study on Core Competence of Virtual Enterprise
Found in: Intelligent Computation Technology and Automation, International Conference on
By Shan Lu
Issue Date:October 2008
pp. 734-738
Virtual Enterprise is a form that emerges and develops vigorously in the internet economy era, with characteristics of prominent core competence, flexible management mode, high flexibility and agility etc. Identifying the core competence of virtual enterpr...
 
Supply Chain-Oriented Multi-stage ATP Study
Found in: Intelligent Computation Technology and Automation, International Conference on
By Shan Lu
Issue Date:October 2008
pp. 712-716
For production departments, available-to-promise (ATP) is a critical basis to work out master production schedule and an important reference to make supply promise to clients' orders quickly and accurately. Based on the summarization of ATP research by dom...
 
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants
Found in: IEEE Micro
By Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
Issue Date:January 2007
pp. 26-35
This article proposes an innovative concurrent-program invariant that captures programmers' atomicity assumptions. It describes a tool with two implementations, one in software and the other using hardware support, that can automatically extract such invar...
 
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:December 2006
pp. 38-52
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: they detect bugs only in taken paths but not in non-taken paths. In other word...
 
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
Found in: IEEE Transactions on Software Engineering
By Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
Issue Date:March 2006
pp. 176-192
Recent studies have shown that large software suites contain significant amounts of replicated code. It is assumed that some of this replication is due to copy-and-paste activity and that a significant proportion of bugs in operating systems are due to cop...
 
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Found in: High-Performance Computer Architecture, International Symposium on
By Feng Qin, Shan Lu, Yuanyuan Zhou
Issue Date:February 2005
pp. 291-302
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Database, 68% of all reported vulnerabilities in 2003 were caused by memory leaks ...
 
An Approach for Intent Identification by Building on Deception Detection
Found in: Hawaii International Conference on System Sciences
By Judee Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas Meservy, Douglas P. Twitchell, Amit Deokar, Jay F. Nunamaker, Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert E. Younger
Issue Date:January 2005
pp. 21a
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed a...
   
Blob Analysis of the Head and Hands: A Method for Deception Detection
Found in: Hawaii International Conference on System Sciences
By Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse
Issue Date:January 2005
pp. 20c
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. This method is validated...
   
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel Midkiff, Josep Torrellas
Issue Date:December 2004
pp. 269-280
This paper makes two contributions to architectural support for software debugging. First, it proposes a novel statistics-based, on-the-fly bug detection method called PC-based invariant detection. The idea is based on the observation that, in most program...
 
Using Multiple Cues for Hand Tracking and Model Refinement
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Shan Lu, Dimitris Metaxas, Dimitris Samaras, John Oliensis
Issue Date:June 2003
pp. 443
We present a model based approach to the integration of multiple cues for tracking high degree of freedom articulated motions and model refinement. We then apply it to the problem of hand tracking using a single camera sequence. Hand tracking is particular...
 
Model-based Integration of Visual Cues for Hand Tracking
Found in: Motion and Video Computing, IEEE Workshop on
By Shan Lu, Gang Huang, Dimitris Samaras, Dimitris Metax
Issue Date:December 2002
pp. 118
We present a model based approach to the integration of multiple cues for tracking high degree of freedom articulated motions. We then apply it to the problem of hand tracking using a single camera sequence. Hand tracking is particularly challenging becaus...
 
Recognition of Local Features for Camera-Based Sign Language Recognition System
Found in: Pattern Recognition, International Conference on
By Kazuyuki Imagawa, Hideaki Matsuo, Rin-ichiro Taniguchi, Daisaku Arita, Shan Lu, Seiji Igi
Issue Date:September 2000
pp. 4849
A sign language recognition system is required to use information from both global features, such as hand movement and location, and local features, such as hand shape and orientation. In this paper, we present an adequate local feature recognizer for a si...
 
Demodulators for AM-FM models of speech signals: a comparison
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Shan Lu, P.C. Doerschuk
Issue Date:May 1996
pp. 263-266
We compare two approaches, DESA-1 based on Teager's (1980) energy operator and MBDA based on statistical nonlinear filtering, for extracting the modulating signals from jointly amplitude (AM) and frequency (FM) modulated waveforms. Both demonstrate the str...
 
Modeling and processing speech with sums of AM-FM formant models
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Shan Lu, P.C. Doerschuk
Issue Date:May 1995
pp. 764-767
We describe a new approach to decomposing signals that are modeled as a sum of jointly amplitude and frequency modulated cosines with slowing-varying center frequencies observed in noise based on statistical nonlinear filtering ideas. We demonstrate the id...
 
A Study of Linux File System Evolution
Found in: ACM Transactions on Storage (TOS)
By Andrea C. Arpaci-Dusseau, Lanyue Lu, Remzi H. Arpaci-Dusseau, Shan Lu
Issue Date:January 2014
pp. 1-32
We conduct a comprehensive study of file-system code evolution. By analyzing eight years of Linux file-system changes across 5079 patches, we derive numerous new (and sometimes surprising) insights into the file-system development process; our results shou...
     
Leveraging the short-term memory of hardware to diagnose production-run software failures
Found in: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems (ASPLOS '14)
By Guoliang Jin, Joy Arulraj, Shan Lu
Issue Date:March 2014
pp. 207-222
Failures caused by software bugs are widespread in production runs, causing severe losses for end users. Unfortunately, diagnosing production-run failures is challenging. Existing work cannot satisfy privacy, run-time overhead, diagnosis capability, and di...
     
Automatic generation of high-speed accurate TLM models for out-of-order pipelined bus
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Jen-Chieh Yeh, Li-Chun Chen, Ren-Song Tsay, Chen-Kang Lo, Hsu-Yao Huang, Mao-Lin Li, Yi-Shan Lu
Issue Date:November 2013
pp. 1-25
Although pipelined/out-of-order (PL/OO) execution features are commonly supported by the state-of-the-art bus designs, no existing manual Transaction-Level-Modeling (TLM) approaches can effectively construct fast and accurate simulation models for PL/OO bu...
     
Efficient concurrency-bug detection across inputs
Found in: Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications (OOPSLA '13)
By Wei Zhang, Dongdong Deng, Shan Lu
Issue Date:October 2013
pp. 785-802
In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunate...
     
ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution
Found in: Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems (ASPLOS '13)
By Ang Li, Karthikeyan Sankaralingam, Marc de Kruijf, Shan Lu, Wei Zhang
Issue Date:March 2013
pp. 113-126
Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that help software survi...
     
Production-run software failure diagnosis via hardware performance counters
Found in: Proceedings of the eighteenth international conference on Architectural support for programming languages and operating systems (ASPLOS '13)
By Guoliang Jin, Joy Arulraj, Po-Chun Chang, Shan Lu
Issue Date:March 2013
pp. 101-112
Sequential and concurrency bugs are widespread in deployed software. They cause severe failures and huge financial loss during production runs. Tools that diagnose production-run failures with low overhead are needed. The state-of-the-art diagnosis techniq...
     
Applying transactional memory to concurrency bugs
Found in: Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '12)
By Shan Lu, Andres Jaan Tack, Haris Volos, Michael M. Swift
Issue Date:March 2012
pp. 211-222
Multithreaded programs often suffer from synchronization bugs such as atomicity violations and deadlocks. These bugs arise from complicated locking strategies and ad hoc synchronization methods to avoid the use of locks. A survey of the bug databases of ma...
     
Automated atomicity-violation fixing
Found in: Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation (PLDI '11)
By Ben Liblit, Guoliang Jin, Linhai Song, Shan Lu, Wei Zhang
Issue Date:June 2011
pp. 123-128
Fixing software bugs has always been an important and time-consuming process in software development. Fixing concurrency bugs has become especially critical in the multicore era. However, fixing concurrency bugs is challenging, in part due to non-determini...
     
Instrumentation and sampling strategies for cooperative concurrency bug isolation
Found in: Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA '10)
By Aditya Thakur, Ben Liblit, Guoliang Jin, Shan Lu
Issue Date:October 2010
pp. 241-255
Fixing concurrency bugs (or "crugs") is critical in modern software systems. Static analyses to find crugs such as data races and atomicity violations scale poorly, while dynamic approaches incur high run-time overheads. Crugs manifest only under specific ...
     
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs
Found in: Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA '10)
By Shan Lu, Soyeon Park, Weimin Zheng, Wenguang Chen, Yao Shi, Yuanyuan Zhou, Zuoning Yin
Issue Date:October 2010
pp. 160-174
Software bugs, such as concurrency, memory and semantic bugs, can significantly affect system reliability. Although much effort has been made to address this problem, there are still many bugs that cannot be detected, especially concurrency bugs due to the...
     
ConMem: detecting severe concurrency bugs through an effect-oriented approach
Found in: Proceedings of the fifteenth edition of ASPLOS on Architectural support for programming languages and operating systems (ASPLOS '10)
By Chong Sun, Shan Lu, Wei Zhang
Issue Date:March 2010
pp. 222-230
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly...
     
PRES: probabilistic replay with execution sketching on multiprocessors
Found in: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP '09)
By Kyu H. Lee, Rini Kaushik, Shan Lu, Soyeon Park, Weiwei Xiong, Yuanyuan Zhou, Zuoning Yin
Issue Date:October 2009
pp. 177-192
Bug reproduction is critically important for diagnosing a production-run failure. Unfortunately, reproducing a concurrency bug on multi-processors (e.g., multi-core) is challenging. Previous techniques either incur large overhead or require new non-trivial...
     
Cooperative crug isolation
Found in: Proceedings of the Seventh International Workshop on Dynamic Analysis (WODA '09)
By Aditya Thakur, Shan Lu, Ben Liblit, Rathijit Sen
Issue Date:July 2009
pp. 35-41
With the widespread deployment of multi-core hardware, writing concurrent programs has become inescapable. This has made fixing concurrency bugs (or crugs) critical in modern software systems. Static analysis techniques to find crugs such as data races and...
     
CTrigger: exposing atomicity violation bugs from their hiding places
Found in: Proceeding of the 14th international conference on Architectural support for programming languages and operating systems (ASPLOS '09)
By Shan Lu, Soyeon Park, Yuanyuan Zhou
Issue Date:March 2009
pp. 23-27
Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violation bugs are common and important. Existing techniques to detect atomicity violatio...
     
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
Found in: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems (ASPLOS XIII)
By Eunsoo Seo, Shan Lu, Soyeon Park, Yuanyuan Zhou
Issue Date:March 2008
pp. 1-1
The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires advances in multiple directions, including concurrency bug detection, concurrent ...
     
A study of interleaving coverage criteria
Found in: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC-FSE '07)
By Shan Lu, Weihang Jiang, Yuanyuan Zhou
Issue Date:September 2007
pp. 533-536
Concurrency bugs are becoming increasingly important due to the prevalence of concurrent programs. A fundamental problem of concurrent program bug detection and testing is that the interleaving space is too large to be thoroughly explored. Practical yet ef...
     
AVIO: detecting atomicity violations via access interleaving invariants
Found in: Proceedings of the 12th international conference on Architectural support for programming languages and operating systems (ASPLOS-XII)
By Feng Qin, Joseph Tucek, Shan Lu, Yuanyuan Zhou
Issue Date:October 2006
pp. 109-es
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detection work focuses on one bug subclass, data races, and neglects many other impo...
     
Analyzing persistent state interactions to improve state management
Found in: Proceedings of the joint international conference on Measurement and modeling of computer systems (SIGMETRICS '06/Performance '06)
By Brad Daniels, Chad Verbowski, Emre Kiciman, Juhan Lee, Roussi Roussev, Shan Lu, Yi-Min Wang
Issue Date:June 2006
pp. 1928-1929
Advance-reservation requests are an essential feature of LambdaGrids, where resources may need to be co-allocated at pre-determined times. In this paper, we discuss unconstrained advance reservations, which use flexible time-windows to lower blocking proba...
     
 1