slicing of extended finite state machines
play

Slicing of Extended Finite State Machines Kelly Androutsopoulos 1 , - PowerPoint PPT Presentation

Slicing of Extended Finite State Machines Kelly Androutsopoulos 1 , David Clark 1 , Nicolas Gold 1 , Mark Harman 1 , Rob Hierons 2 , Zheng Li 1 and Laurence Tratt 3 Centre for Research in E Centre for Research in E volution, volution, Search


  1. Slicing of Extended Finite State Machines Kelly Androutsopoulos 1 , David Clark 1 , Nicolas Gold 1 , Mark Harman 1 , Rob Hierons 2 , Zheng Li 1 and Laurence Tratt 3 Centre for Research in E Centre for Research in E volution, volution, Search & Testing Search & Testing 1 CREST, King’s College London 2 Brunel University 3 Bournemouth University

  2. SLIcing state based Models SLIcing state based Models Benchmarks ATM Cashier EPSRC Project CruiseControl SLIM FuelPump Dependence Data Applications PrintToken Analysis Dependence 2008 – 2011 VendingMachine CREST DoorController Model INRES protocol debugging TCP Control Non- TCSbin(Motorola) termination Compre- Dependence Sensitive hension Non- Types of termination Correctness Insensitive Slicing Order Dependence Dependence Syntax Based Event Slicing Dependence Based Slicing Semantics Restriction - Dependence Analysis Slicing - Marked Transitions - ε -elimination - Minimisation Event Restriction Slicing - BasicSlice - Constant Propagation - R-mergeEquivalentStates - G-mergeEquivalentStates slim.dcs.kcl.ac.uk Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 2 / 34

  3. Program Slicing Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 3 / 34

  4. Program Slicing which other lines affect the selected line? we only care about this line Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 3 / 34

  5. Program Slicing which other lines affect the selected line? we only care about this line Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 3 / 34

  6. Program Slicing which other lines affect the selected line? we only care about this line Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 3 / 34

  7. Reverse Refactoring engineering Program Testing and Program Slicing compre- debugging hension Dependence Impact cluster analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  8. Reverse Refactoring engineering Program Program Testing and Program Slicing Program Slicing compre- compre- debugging hension hension Dependence Impact cluster analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  9. Reverse Refactoring engineering Program Program Program Testing and Program Slicing Program Slicing Program Slicing compre- compre- compre- debugging hension hension hension Dependence Impact Impact cluster analysis analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  10. Reverse Refactoring engineering Program Program Program Program Testing and Program Slicing Program Slicing Program Slicing Program Slicing compre- compre- compre- compre- debugging hension hension hension hension Dependence Dependence Impact Impact Impact cluster cluster analysis analysis analysis analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  11. Reverse Refactoring engineering Program Program Program Program Program Testing and Testing and Program Slicing Program Slicing Program Slicing Program Slicing Program Slicing compre- compre- compre- compre- compre- debugging debugging hension hension hension hension hension Dependence Dependence Dependence Impact Impact Impact Impact cluster cluster cluster analysis analysis analysis analysis analysis analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  12. Reverse Refactoring Refactoring engineering Program Program Program Program Program Program Testing and Testing and Testing and Program Slicing Program Slicing Program Slicing Program Slicing Program Slicing Program Slicing compre- compre- compre- compre- compre- compre- debugging debugging debugging hension hension hension hension hension hension Dependence Dependence Dependence Dependence Impact Impact Impact Impact Impact cluster cluster cluster cluster analysis analysis analysis analysis analysis analysis analysis analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  13. Reverse Reverse Refactoring Refactoring Refactoring engineering engineering Program Program Program Program Program Program Program Testing and Testing and Testing and Testing and Program Slicing Program Slicing Program Slicing Program Slicing Program Slicing Program Slicing Program Slicing compre- compre- compre- compre- compre- compre- compre- debugging debugging debugging debugging hension hension hension hension hension hension hension Dependence Dependence Dependence Dependence Dependence Impact Impact Impact Impact Impact Impact cluster cluster cluster cluster cluster analysis analysis analysis analysis analysis analysis analysis analysis analysis analysis analysis Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 4 / 34

  14. Can slicing be applied to model level? Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 5 / 34

  15. Model START T1 wait T2 T3 closeDoor T4 T6 doorIsClosed T7 T5 T8 T12 openDoor T9 T10 doorIsOpen T11 Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 6 / 34

  16. Model START T1 null_0 T16 T7 T8 T3 overlap_receiving_25 T15 T50 call_initiated_1 overlap_received_call_present call_present_6 T9 T53 T54 T5 overlap_sending_2 T63 incoming_call_proceeding_9 T64 T11 T4 T55 T65 T56 outgoing_call_proceeding_3 T10 T6 T57 call_received_7 T32 T12 T58 T52 call_delivered_4 T30 T59 connect_request_8 T60 T34 T28 T66 T61 T13 T14 bearer_estab bearer_connect T62 T21 T22 T23 T31 T33 T41 T44 T67 T35 T36 wait_bearer_estab wait_bearer_con T45T47 T42 T46 T70 T43 T48 T49 call_active_10 initiated_clearing_nobearer T38 T37 disconnect_ind initiated_clearing T24 T72 T17 wait_bearer_disc_2 T25 T26 T27 wait_bearer_disc_1 disconnect_request_11 T20 T19 T71 T29 release_request_19 Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 6 / 34

  17. Model If the model like this? EFSM_CallControl: Dependence Graph: T4 (NTSCD and DATA) T65 T58 T66 T44 T45 T46 T47 T48 T49 T28 T17 T24 T25 T19 T20 T37 T59 T3 T9 T8 T5 T11 T7 T32 T10 T31 T36 T14 T33 T34 T6 T12 T30 T35 T41 T26 T42 T43 T13 T27 T70 T38 T16 T50 T52 T55 T63 T15 T53 T56 T54 T64 T57 T67 T62 T61 T60 T29 T72 T22 T71 T21 T23 Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 6 / 34

  18. Motivation Models tend to be larger and more complex. Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 7 / 34

  19. Motivation Models tend to be larger and more complex. Slicing has provided a valuable suite of maintenance techniques at the implementation level, but little at model level. Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 7 / 34

  20. Extended Finite State Machine(EFSM) Definition An Extended Finite State Machine (EFSM) M is a tuple (S, T, E, V) where S is a set of states, T is a set of transitions, E is a set of events, and V is a store represented by a set of variables. Transitions have a source state source ( t ) ∈ S , a target state target ( t ) ∈ S and a label lbl ( t ) . Transition labels are of the form e 1 [ c ] / a where e 1 ∈ E , c is a condition and a a sequence of actions. Event[Condition]/Action S1 S2 Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 8 / 34

  21. An EFSM example:DoorControl T11:openTimer[timer > 0]/timer:=timer-1 T9:opening g n T2:waitTimer[timer > 0]/timer:=timer - 1 s i o c l opened 4 : T T10:fullyOpened T12:timeout T3:ready[timer==0] T5:buttonInterrupt/timer:=3 T1:setTimer/timer:=5 Start wait closing opening T8:open/timer:=10 T6:fullyClosed closed T7:closeTimer Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 9 / 34

  22. Slicing EFSM Definition (Slicing Criterion) A slicing criterion for an EFSM is a pair ( t , V ) where transition t ∈ T and variable set V ⊆ Var . It designates the point in the exaluation immediately after the execution of the action contain in transition t . Definition (Slice) An EFSM slice M ′ is a reduced machine, where for all inputs i it contains at least one execution where the value of v ∈ V at t is equal to the value of v at t in the original EFSM M . Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 10 / 34

  23. The CREST EFSM slicing tool Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 11 / 34

  24. The CREST EFSM slicing tool Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 11 / 34

  25. EFSM VS CFG Start READ(x) T11:openTimer[timer > 0]/timer:=timer-1 no x > 0 yes T9:opening T4:closing T2:waitTimer[timer > 0]/timer:=timer - 1 opened T10:fullyOpened T12:timeout T3:ready[timer==0] T5:buttonInterrupt/timer:=3 T1:setTimer/timer:=5 y:=-x y:=x closing opening Start wait T8:open/timer:=10 T6:fullyClosed closed WRITE(y) T7:closeTimer Exit Slicing of EFSMs Zheng Li CREST, KING’S COLLEGE LONDON 12 / 34

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend