Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Defining defects, errors, and service degradations

Published: 28 February 2009 Publication History

Abstract

The study of defects is a principal topic of software systems, af-fecting all phases of a system's lifecycle. Defects are the cause of errors and service degradations. Unresolved errors cause failures. If defects cannot be prevented effectively, then error control me-chanisms must be evaluated.
We introduce a model to distinguish between defects, errors, and service degradations. A two-dimensional classification scheme is developed for defects, defined by the types of process interaction and software corruption that are involved. A third dimension is added to this taxonomy for defects that cause service degradation, based on the deviations in service quality that are tolerated. We investigate the role of service degradation in error prevention.

References

[1]
A. Avizienis, J. Laprie, B. Randell, and C. Landwehr (2004), Basic Concepts and Taxonomy for Dependable and Secure Computing, IEEE Transactions on Dependable and Secure Computing, vol. 1, no.1 (Jan.-Mar. 2004) pp. 11--33.
[2]
P. A. Bernstein and N. Goodman (1981), Concurrency Control in Distributed Database Systems, ACM Computer Surveys, vol. 13, no. 2 (June 1981) pp. 185--211.
[3]
A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour (2002), Predicting and Bypassing End-to-End Internet Service Degradations, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (November 2002) pp. 307--320.
[4]
R. Chillarege, I.S. Bhandari, J.K. Chaar, M. Halliday, D.S. Moebus, B.K. Ray, and M-Y. Wong (1992), Orthogonal Defect Classification-- a Concept for In-process Measurement, IEEE Trans. on Software Engineering, vol.18, no.11 (Nov. 1992) pp. 943--956.
[5]
S. Ghosh, Q. Razouqi, H. J. Schumacher, and A. Celmins (1998), A Survey of Recent Advances in Fuzzy Logic in Telecommunications Networks and New Challenges, IEEE Transactions on Fuzzy Systems, volume 6, (e) (Aug. 1998) pp. 443--447.
[6]
M. Hadzialic, M. Hamza, and P. Begovic (2007), An Approach to Cell Signal Coverage Reliability in the Presence of Different Fading Models, Proceedings of the 5th ACM International Workshop on Mobility Management and wireless Access, (2007) pp 91--98.
[7]
R.C. Holt (1972), Some Deadlock Properties of Computer Systems, ACM Computing Surveys, vol.4, no.3 (Sept. 1972) pp. 179--195.
[8]
J.N. Herder, H. Bos, B. Gras, P. Homburg, and A.S. Tanenbaum (2006), MINIX 3: a Highly Reliable, Self-repairing Operating System," Operating System Review, ACM Press, vol. 40, no. 3 (July 2006) pp. 80--89.
[9]
IEEE Computer Society 1990. "Standard Glossary of Software Engineering Terminology," ANSE/IEEE Standard 610.12-1990. IEEE Press, New York.
[10]
ISO Reference Model for Open Distributed Processing (1996), ISO/IEC 10746-2:1996 (E) at http://standards.iso.org/ittf/PubliclyAvailableStandards/
[11]
R. Kotla and M. Dahlin (2004), High Throughput Byzantine Fault Tolerance, International Conference on Dependable Systems and Networks (June 2004) pp. 575--584.
[12]
C. E. Landwehr, A.R. Bull, J.P. McDermott, and W.S. Choi (1994) A Taxonomy of Computer Program Security Flaws, ACM Computing Surveys, vol.26, no.3 (Sept. 1994) pp. 211--254.
[13]
G. Levine (1988) The Control of Priority Inversion in Ada, Ada Letters, vol. 8, no.6 (Nov., Dec. 1988) pp. 53--56.
[14]
G. Levine (1989) The Control of Starvation, International Journal of General Systems, vol.15 (1989) pp. 113--127.
[15]
G. Levine (2003) Defining Deadlock, Operating Systems Review, ACM Press, vol.37, no.1 (Jan. 2003) pp. 54--64.
[16]
G. Levine (2005) A Model for Anomalies of Software Engineering, in T. Sobh and K. Elleithy (Ed), Advances in Systems, Computing Sciences and Software Engineering, Springer, 2005, pp. 243--250.
[17]
G. Levine (1996) A Model for Software Reuse, OOPSLA, San Diego, CA, Oct. 1996, pp. 71--87.
[18]
H. Liao, X. Wang, and H. Chen (2008), Adaptive Call Admission Control for Multi-class services in Wireless Networks, IEEE International Conference on Communications, (May 2008) pp. 2840--2844.
[19]
J. Liebeherr and D. Liao (1995) A Service With Bounded Degradation in Quality-of-Service Networks, Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies, vol 3, April 1995, pp. 1103--1110.
[20]
G. Novark, E. D. Berger, and B.G. Zorn (2008), Exterminator: Automatically Correcting Memory Errors with High Probability, CACM, vol 51 (12) (Dec. 2008), pp. 87--95.
[21]
H. D. Owens, B.F. Womack, and M.J. Gonzalez (1996) Software Error Classification using Purify, Proceedings, International Conference on Software Maintenance., Nov. 1996, pp. 104--112.
[22]
W.O. Rom and S. A. Slotnick (2009), Order Acceptance Using Genetic Algorithms, Computer and Operations Research, 36 (2009), pp. 1758--1767.
[23]
A. N. Rouskas, A. A. Kikilis, and S. S. Ratsiatos, A game theoretical formulation of integrated admission and pricing in wireless networks, European Journal of Operational Research, vol 191 (3), 2008, pp. 1175--1188.
[24]
A. S. Tanenbaum (2002) Computer Networks, 4th edition, Prentice-Hall, 2002.
[25]
G. V. Zaruba, I. Chlamtac, S.K. Das, A Prioritized Real-time Wireless Call Degradation Framework for Optimal Call Mix Selection (2002), Mobile works and Applications, vol 7, (2), April 2002, pp 143--151.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 34, Issue 2
March 2009
140 pages
ISSN:0163-5948
DOI:10.1145/1507195
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 February 2009
Published in SIGSOFT Volume 34, Issue 2

Check for updates

Author Tags

  1. defects
  2. errors
  3. failure
  4. service degradation

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Incorporating Service Degradations into a Security PlanProceedings of the 2014 IEEE International Conference on Software Science, Technology and Engineering10.1109/SWSTE.2014.10(1-9)Online publication date: 11-Jun-2014
  • (2013)Computer security with service degradationsACM SIGSOFT Software Engineering Notes10.1145/2532780.253281038:6(1-7)Online publication date: 11-Nov-2013
  • (2012)Priority inversion with fungible resourcesACM SIGAda Ada Letters10.1145/2148436.214843831:2(9-14)Online publication date: 22-Feb-2012
  • (2012)Towards adopting ODC in automation application development projectsProceedings of the 5th India Software Engineering Conference10.1145/2134254.2134282(153-156)Online publication date: 22-Feb-2012
  • (2011)Vulnerability Analysis in SOA-Based Business ProcessesIEEE Transactions on Services Computing10.1109/TSC.2010.374:3(230-242)Online publication date: 1-Jul-2011
  • (2009)Ada for the control of degradation of serviceACM SIGAda Ada Letters10.1145/1620593.162059629:2(20-27)Online publication date: 25-Sep-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media