[1] 张尧学.透明计算:概念,结构和示例[J].电子学报,2004,32(12A):169-173. Zhang Yao-xue.Transparence computing:Concept,architecture and example[J].Acta Electronica Sinica,2004,32(12A):169-173.(in Chinese) [2] 马于涛,何克清,李兵,刘婧.网络化软件的复杂网络特性实证[J].软件学报,2011,22(3):381-407. Ma Yu-Tao,He Ke-Qing,Li Bing,Liu Jing.Empirical study on the characteristics of complex networks in networked software[J].Journal of Software,2011,22(3):381-407.(in Chinese) [3] 杨芙清,梅宏,吕建,金芝.浅论软件技术发展[J].电子学报,2002,30(12A):1901-1906. Yang Fu-qing,Mei Hong,Lu Jian,Jin Zhi.Some discussion on the development of software technology[J].Acta Electronica Sinca,2002,30(12A):1901-1906.(in Chinese) [4] 陈火旺,王戟,董威.高可信软件工程技术[J].电子学报,2003,31(12A):1933-1938. Chen Huo-wang,Wang Ji,Dong Wei.High confidence software engineering technologies [J].Acta Electronica Sinica 2003,31(12A):1933-1938.(in Chinese) [5] Leonardo Mariani,Mauro Pezzè,Oliviero Riganelli,Mauro Santoro.SEIM:static extraction of interaction models[A].International Workshop on Software Engineering[C].Cape Town,South Africa:IEEE Computer Society,2010.22-28. [6] Christopher Ackermann,Mikael Lindvall,Rance Cleaveland.Towards behavioral reflexion models[A].Reliability Society[C].Mysuru,India:IEEE Computer Society,2009.175-184. [7] Jonathan E.Cook,Alexander L.Wolf.Discovering models of software processes from event-based data [J].ACM Transactions on Software Engineering and Methodology,1998,7(3):215-249. [8] Kai-Yuan Cai,Bei-Bei Yin.Software execution processes as an evolving complex network[J].Information Sciences,2009,179 (12):1903-1928. [9] Tao Li,Wei Peng,Charles Perng,Sheng Ma,Haixun Wang.An integrated data-driven framework for computing system management[J].IEEE Transactions on Systems,2010,40(1):90-99. [10] Chun ying Zhao,Jun Kong,Kang Zhang.Program behavior discovery and verification:A graph grammar approach[J].IEEE Transactions on Software Engineering,2010,36(3):431-447. [11] Anton ChuvAkin,GunnAr Peterson.How to doapplication logging right[J].IEEE Computer and Reliability Societies,2010,8(4):82-85. [12] Zhen Li,Jun Feng Tian,Liu Yang.An improved software behavior model in system call level and trustworthiness evaluation[J].Information Technology Journal,2011,10(11):2208-2213. [13] 傅建明,陶芬,王丹,张焕国.基于对象的软件行为模型[J].软件学报,2011,22(11):2716-2728. Fu Jian-Ming,Tao Fen,Wang Dan,Zhang Huan-Guo.Software behavior model based on system objects[J].Journal of Software,2011,22(11):2716-2728.(in Chinese) [14] Curtis E.Hrischuk,Murray Woodside.Logical clock requirements for reverse engineering scenarios from a distributed system[J].IEEE Transaction on Software Engineering,2002,28(4):321-338. [15] Selvaraj Srinivasan,R Rajaram.A decentralized deadlock detection and resolution algorithm for generalized model in distributed systems [J].Distributed and Parallel Databases,2011,29(4):261-276. [16] Jonathan E.Cook,Zhidian Du,Chongbing Liu,Alexander L.Wolf.Discovering models of behavior for concurrent workflows[J].Computers in Industry,2004,53(3):97-319. [17] Jonathan E Cook,Zhidian Du.Discovering thread interactions in a concurrent system[J].Journal of Systems and Software,2005,77(3):285-297. [18] Jonathan E Cook,Cha He,Changjun Ma.Measuring behavioral correspondence to a timed concurrent model[A].IEEE Computer Society's Technical Council on Software Engineering[C].Florence,Italy:IEEE Computer Society,2001.332-341. [19] 彭成,杨路明,满君丰.不完全事务行为踪迹标记研究[J].小型微型计算机系统,2011,32(8):1593-1598. Peng Cheng,Yang Lu-ming,Man Jun-feng.Research on tokenizing behavior footprints of incomplete transaction[J].Journal of Chinese Computer Systems,2011,32(8):1593-1598.(in Chinese) [20] Jian-guang Lou,Qiang Fu,Shengqi Yang,Ye Xu,Jiang Li.Mining invariants from console logs for system problem detection[A].USENIX Workshop[C].Boston,US:USENIX,2010.231-244. [21] Andrzej Wasylkowski ,Andreas Zeller.Mining temporal specifications from object usage[A].ACM SIGART/SIGSOFTWorkshop[C].Washington,DC:IEEE Computer Society,2009.295-306. [22] Florian Skopik,Daniel Schall,Schahram Dustdar.Modeling and mining of dynamic trust in complex service-oriented systems[J].Information Systems,2010,35(7):735-757. [23] J Tan,X Pan,S Kavulya,R G,P Narasimhan.SALSA:analyzing logs as state machines .USENIX Workshop .San Diego,CA:USENIX,2008.6-6. [24] J Tan,X Pan,S Kavulya,R G,P Narasimhan.Mochi:visual log-analysis based tools for debugging hadoop .IEEE International Conference on Distributed Computing Systems Workshops .Geneva,Italy:IEEE Computer Society,2010.795-806. [25] J Yang,D Evans.Dynamically inferring temporal properties .Acm Sigartsigsoft Workshop .Washington,DC:Association for Computing Machinary,2004.23-28. [26] A W Biermann,J A Feldman.On the synthesis of finite-state machines from samples of their behavior[J].IEEE Trans.Comput,1972,21(6):592-597. [27] J Whittle,J Schumann.Generating state chart designs from scenarios .ACM Limerick .New York,Ireland:IEEE-CS Computer Society,2000.314-323. [28] C Damas,et al.Generating annotated behavior models from end-user scenarios[J].IEEE Transaction on Software Engineering,2005,31(12):1056-1073. |