Supervised testing of embedded concurrent software:
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
Stuttgart
Fraunhofer Verlag
[2021]
|
Schriftenreihe: | PhD theses in experimental software engineering
volume 70 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | xv, 165 Seiten Illustrationen 24 cm |
ISBN: | 9783839616833 3839616832 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV047578648 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 211109s2021 gw a||| m||| 00||| eng d | ||
015 | |a 21,N16 |2 dnb | ||
015 | |a 21,A34 |2 dnb | ||
015 | |a 21,H09 |2 dnb | ||
016 | 7 | |a 1231380373 |2 DE-101 | |
020 | |a 9783839616833 |c Broschur : EUR 61.00 (DE), EUR 62.80 (AT), CHF 94.00 (freier Preis) |9 978-3-8396-1683-3 | ||
020 | |a 3839616832 |9 3-8396-1683-2 | ||
024 | 3 | |a 9783839616833 | |
028 | 5 | 2 | |a Bestellnummer: fhg-iese_98 |
035 | |a (OCoLC)1257028834 | ||
035 | |a (DE-599)DNB1231380373 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BW | ||
049 | |a DE-573 | ||
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
084 | |8 1\p |a 004 |2 23sdnb | ||
100 | 1 | |a Jahić, Jasmin |d 1988- |e Verfasser |0 (DE-588)1225582180 |4 aut | |
245 | 1 | 0 | |a Supervised testing of embedded concurrent software |c Jasmin Jahić |
264 | 1 | |a Stuttgart |b Fraunhofer Verlag |c [2021] | |
300 | |a xv, 165 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a PhD theses in experimental software engineering |v volume 70 | |
502 | |b Dissertation |c Technische Universität Kaiserslautern |d 2020 | ||
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwaretest |0 (DE-588)4132652-0 |2 gnd |9 rswk-swf |
653 | |a Software Engineering | ||
653 | |a Embedded Systems | ||
653 | |a Computing and Information Technology | ||
653 | |a Software testing and verification | ||
653 | |a Computer modelling and simulation | ||
653 | |a Informatiker | ||
653 | |a Wissenschaftler | ||
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 0 | 1 | |a Softwaretest |0 (DE-588)4132652-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bomarius, Frank |4 edt | |
710 | 2 | |a Fraunhofer IESE, Kaiserslautern |4 isb | |
710 | 2 | |a Fraunhofer IRB-Verlag |0 (DE-588)4786605-6 |4 pbl | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=25fa55fa5d4f46ea927a7c33dc0adff0&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m B:DE-101 |q application/pdf |u https://d-nb.info/1231380373/04 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032964067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032964067 | ||
883 | 2 | |8 1\p |a dnb |d 20210820 |q DE-101 |u https://d-nb.info/provenance/plan#dnb |
Datensatz im Suchindex
_version_ | 1804182929928093696 |
---|---|
adam_text | TABLE
OF
CONTENTS
1
INTRODUCTION
...............................................................................
1
1.1
TESTING
CONCURRENCY
IN
EMBEDDED
SYSTEMS
.......................
2
1.2
PROBLEM
STATEMENT
AND
RESEARCH
SCOPE
..............................
5
1.3
RESEARCH
CONTRIBUTIONS
.........................................................
7
1.4
DISSERTATION
STRUCTURE
.............................................................
7
2
RELATED
WORK
..............................................................................
9
2.1
BACKGROUND
............................................................................
10
2.1.1
MATHEMATICAL
BACKGROUND
OF
THE
PROBLEM
..............
10
2.1.2
STATIC
ANALYSIS
.............................................................
10
2.1.3
EXECUTION
MONITORING
.................................................
11
2.1.4
FORMAL
METHODS
.........................................................
11
2.1.5
HAPPENS-BEFORE
ALGORITHM
.......................................
12
2.1.6
ERASER
LOCKSET
ALGORITHM
...........................................
13
2.1.7
ALGORITHMS
FOR
DETECTING
ATOMICITY
VIOLATION
.........
14
2.1.8
WHY
MULTICORE
PROCESSORS?
.......................................
14
2.1.9
EXAMPLES
OF
CONCURRENCY
LIMITATIONS
.......................
15
2.2
TESTING
OF
CONCURRENT
SOFTWARE:
STATE-OF-THE-ART
SURVEYS
.
16
2.3
EXECUTION
TRACING
...................................................................
18
2.4
LOCKSET
AND
SYNCHRONIZATION
MECHANISMS
..........................
21
2.5
LOCKSET
AND
CODE
COVERAGE
.................................................
23
2.6
SUMMARY
................................................................................
24
3
SUPERVISED
TESTING
OF
EMBEDDED
CONCURRENT
SOFTWARE
.....
25
4
FERA
-
A
FRAMEWORK
FOR
CRITICAL
ASSESSMENT
OF
EXECUTION
MONITORING
BASED
APPROACHES
FOR
FINDING
CONCURRENCY
BUGS
.............................................................................................
29
4.1
OVERVIEW
.................................................................................
29
4.2
GENERALIZED
APPROACH
FOR
FINDING
CONCURRENCY
BUGS
(GAF)
.......................................................................................
30
4.3
PROPERTIES
AND
ASSESSMENT
CRITERIA
OF
FERA
........................
33
4.3.1
EXECUTION
TRACING
........................................................
33
4.3.2
SYNCHRONIZATION
MECHANISMS
....................................
35
VII
4.3.3
CONCURRENCY
BUGS
.......................................................
40
4.3.4
SOFTWARE
SYNCHRONIZATION
INTENTIONS
........................
44
4.3.5
TEST
CASE
GENERATION
.................................................
44
4.3.6
CODE
COVERAGE
...........................................................
45
4.3.7
PRECISION
.......................................................................
46
4.3.8
PERFORMANCE
...............................................................
48
4.3.9
PROGRAMMING
LANGUAGE
............................................
49
4.3.10BENCHMARK
..................................................................
49
4.3.11
A
HYPOTHETICAL
IDEAL
APPROACH
FOR
FINDING
CON
CURRENCY
BUGS
BASED
ON
EXECUTION
MONITORING
.......
50
4.4
SUMMARY
................................................................................
50
5
ANALYSIS
OF
CONCURRENT
SOFTWARE
WITH
CONCURRENCY
LIMI
TATIONS
AS
SYNCHRONIZATION
MECHANISMS
......................
51
5.1
OVERVIEW
.................................................................................
51
5.2
HANDLING
CONCURRENCY
LIMITATIONS
WITH
THE
MODIFIED
LOCKSET
ALGORITHM
..................................................................
51
5.2.1
MUTUALLY
CONCURRENT
THREADS
....................................
53
5.2.2
MODIFIED
LOCKSET
FOR
EMBEDDED
SYSTEMS..................
56
5.3
IMPROVING
THE
PERFORMANCE
OF
THE
LOCKSET
ALGORITHM
BY
CONSIDERING
CONCURRENCY
LIMITATIONS
...................................
58
5.4
EVALUATION
...............................................................................
61
5.4.1
SETUP
AND
EXECUTION
..................................................
61
5.4.2
RESULTS
AND
DISCUSSION
................................................
64
5.4.3
THREATS
TO
VALIDITY
.......................................................
65
5.5
SUMMARY
................................................................................
67
6
SOFTWARE-BASED
NON-LNTRUSIVE
SOFTWARE
EXECUTION
TRAC
ING
.................................................................................................
69
6.1
OVERVIEW
.................................................................................
69
6.1.1
GEM5
SYSTEM
SIMULATOR
.............................................
70
6.1.2
LLVM
INSTRUCTION
SET
SIMULATOR
.................................
71
6.1.3
FERAL
...........................................................................
71
6.2
NON-LNTRUSIVE
TRACING
OF
EMBEDDED
MULTITHREADED
SOFT
WARE
WITH
TEMPORAL
CONSTRAINTS
USING
GEM5
............
71
6.2.1
CONCEPT
......................................................................
71
6.2.2
NON-INTRUSIVE
TRACING
OF
RAW
DATA
............................
73
6.2.3
RELATING
RAW
TRACE
DATA
TO
THE
SOURCE
CODE
.........
74
6.2.4
MAPPING
OF
THE
CONCEPTUAL
SOLUTION
TO
THE
GEM5
SYSTEM
SIMULATOR
........................................................
76
VIII
6.2.5
COMPUTATIONAL
COMPLEXITY
OF
RELATING
RAW
TRACE
DATA
TO
THE
SOURCE
CODE
...........
77
6.3
NON-LNTRUSIVE
TRACING
OF
EMBEDDED
MULTITHREADED
SOFT
WARE
ON
THE
LOGICAL
LEVEL
USING
AN
LLVM
INTERPRETER
........
78
6.3.1
CONCEPT
......................................................................
78
6.3.2
ALTERING
THE
VALUE
OF
SOFTWARE
STATES
.......................
79
6.3.3
MAPPING
OF
THE
CONCEPTUAL
SOLUTION
TO
THE
LLVM
COMPILER
INFRASTRUCTURE
.............................................
81
6.3.4
QUANTIFICATION
OF
CODE
COVERAGE
.............................
85
6.4
EVALUATION
.........
.....................................................................
88
6.4.1
SETUP
AND
EXECUTION
..................................................
88
6.4.2
TRACING
SOFTWARE
WITH
TEMPORAL
CONSTRAINTS
USING
GEM5
...........................................................................
90
6.4.3
TRACING
SOFTWARE
ON
THE
LOGICAL
LEVEL
USING
THE
LLVM
INTERPRETER
.........................................................
92
6.4.4
THREATS
TO
VALIDITY
.......................................................
95
6.4.5
RESULTS
AND
DISCUSSION
................................................
97
6.5
SUMMARY
................................................................................
99
7
CONCLUSIONS
AND
FUTURE
WORK
..................................................
101
7.1
SUMMARY
AND
CONCLUSIONS
.....................................................
101
7.2
OPEN
QUESTIONS
AND
FUTURE
WORK
.........................................
102
ZUSAMMENFASSUNG
...............................................................................
105
ACRONYMS
.................................................
109
REFERENCES
.............................................................................................
113
A
DAWN
OF
MAINSTREAM
CONCURRENT
COMPUTING
AND
APOC
ALYPSE
OF
CONCURRENCY
ISSUES..........................................
131
A.
1
OVERVIEW
.................................................................................
131
A.
2
MOORE S
LAW,
MULTICORES,
AND
DARK
SILICON
...........................
132
A.
3
CONCURRENT,
PARALLEL,
AND
DISTRIBUTED
COMPUTING
...............
133
A.
4
COMPUTING
MODELS
OF
COMPUTER
SYSTEMS
...........................
134
A.
5
EXECUTION
SPEEDUP
WITH
MULTICORE
PROCESSORS
.....................
135
A.
6
CONCURRENT
COMPUTING
IN
PRACTICE
.......................................
136
A.
6.1
PROGRAMMING
LANGUAGES
FOR
CONCURRENT
COM
PUTING
................................................................
136
A.
6.
2
SOFTWARE
LIBRARIES
FOR
CONCURRENT
COMPUTING
........
137
IX
A.
7
CONCURRENCY
BUGS
....................................................................
139
A.
7.1
CONCURRENCY
BUGS:
FAILURE-MODE-EFFECT-MEASURE....
139
A.
7.2
FAMOUS
CONCURRENCY
BUGS
..........................................
141
B
EXAMPLES
WITH
THREADS
...............................................................
143
B.
1
CREATION
OF
THREAD
EXAMPLES
..................................................
143
B.
1.1
C++11
..........................................................................
143
B.
1
.2
JAVA
...............................................................................
143
B.
1.3
C++
AND
PTHREAD
..........................................................
144
B.
1.4
C++
AND
BOOST
.............................................................
144
B.
1.5
C
AND
OPENMP
............................................................
145
B.
2
THREAD
SYNCHRONIZATION
EXAMPLES
.........................................
145
B.
2.1
C++1
1
THREAD
AND
MUTEX
...........................................
145
B.
2.
2
C++,
PTHREAD,
AND
MUTEX
...........................................
145
B.
3
CONCURRENCY
BUG
EXAMPLES
....................................................
146
B.
3.1
DATA
RACE:
C++1
1
THREAD
.............................................
146
B.
3.
2
DATA
RACE:
C++
AND
PTHREAD
.......................................
147
C
SYSTEMATIC
LITERATURE
REVIEW
....................................................
149
C.
1
PHASES
OF
THE
SYSTEMATIC
LITERATURE
REVIEW
(SLR)
.................
149
C.
1.1
RATIONALE
FOR
THE
SURVEY
AND
RESEARCH
QUESTIONS....
149
C.
1.2
PRIMARY
STUDIES
.............................................................
150
C.
1.3
SELECTION
CRITERIA
AND
SELECTION
PROCEDURES
.............
150
C.
1.4
SELECTED
PUBLICATIONS
....................................................
151
C.
2
SYSTEMATIC
LITERATURE
REVIEW:
RESULTS
....................................
152
C.
2.1
PRECISION
........................................................................
153
C.
2.
2
PERFORMANCE
.................................................................
155
C.
2.
3
RELATED
ANALYSES
...........................................................
158
C.
2.4
RELATED
TOOLS
.................................................................
159
C.
2.
5
SUMMARY
OF
THE
RESULTS
...............................................
159
LEBENSLAUF
.............................................................................................
165
|
adam_txt |
TABLE
OF
CONTENTS
1
INTRODUCTION
.
1
1.1
TESTING
CONCURRENCY
IN
EMBEDDED
SYSTEMS
.
2
1.2
PROBLEM
STATEMENT
AND
RESEARCH
SCOPE
.
5
1.3
RESEARCH
CONTRIBUTIONS
.
7
1.4
DISSERTATION
STRUCTURE
.
7
2
RELATED
WORK
.
9
2.1
BACKGROUND
.
10
2.1.1
MATHEMATICAL
BACKGROUND
OF
THE
PROBLEM
.
10
2.1.2
STATIC
ANALYSIS
.
10
2.1.3
EXECUTION
MONITORING
.
11
2.1.4
FORMAL
METHODS
.
11
2.1.5
HAPPENS-BEFORE
ALGORITHM
.
12
2.1.6
ERASER
LOCKSET
ALGORITHM
.
13
2.1.7
ALGORITHMS
FOR
DETECTING
ATOMICITY
VIOLATION
.
14
2.1.8
WHY
MULTICORE
PROCESSORS?
.
14
2.1.9
EXAMPLES
OF
CONCURRENCY
LIMITATIONS
.
15
2.2
TESTING
OF
CONCURRENT
SOFTWARE:
STATE-OF-THE-ART
SURVEYS
.
16
2.3
EXECUTION
TRACING
.
18
2.4
LOCKSET
AND
SYNCHRONIZATION
MECHANISMS
.
21
2.5
LOCKSET
AND
CODE
COVERAGE
.
23
2.6
SUMMARY
.
24
3
SUPERVISED
TESTING
OF
EMBEDDED
CONCURRENT
SOFTWARE
.
25
4
FERA
-
A
FRAMEWORK
FOR
CRITICAL
ASSESSMENT
OF
EXECUTION
MONITORING
BASED
APPROACHES
FOR
FINDING
CONCURRENCY
BUGS
.
29
4.1
OVERVIEW
.
29
4.2
GENERALIZED
APPROACH
FOR
FINDING
CONCURRENCY
BUGS
(GAF)
.
30
4.3
PROPERTIES
AND
ASSESSMENT
CRITERIA
OF
FERA
.
33
4.3.1
EXECUTION
TRACING
.
33
4.3.2
SYNCHRONIZATION
MECHANISMS
.
35
VII
4.3.3
CONCURRENCY
BUGS
.
40
4.3.4
SOFTWARE
SYNCHRONIZATION
INTENTIONS
.
44
4.3.5
TEST
CASE
GENERATION
.
44
4.3.6
CODE
COVERAGE
.
45
4.3.7
PRECISION
.
46
4.3.8
PERFORMANCE
.
48
4.3.9
PROGRAMMING
LANGUAGE
.
49
4.3.10BENCHMARK
.
49
4.3.11
A
HYPOTHETICAL
IDEAL
APPROACH
FOR
FINDING
CON
CURRENCY
BUGS
BASED
ON
EXECUTION
MONITORING
.
50
4.4
SUMMARY
.
50
5
ANALYSIS
OF
CONCURRENT
SOFTWARE
WITH
CONCURRENCY
LIMI
TATIONS
AS
SYNCHRONIZATION
MECHANISMS
.
51
5.1
OVERVIEW
.
51
5.2
HANDLING
CONCURRENCY
LIMITATIONS
WITH
THE
MODIFIED
LOCKSET
ALGORITHM
.
51
5.2.1
MUTUALLY
CONCURRENT
THREADS
.
53
5.2.2
MODIFIED
LOCKSET
FOR
EMBEDDED
SYSTEMS.
56
5.3
IMPROVING
THE
PERFORMANCE
OF
THE
LOCKSET
ALGORITHM
BY
CONSIDERING
CONCURRENCY
LIMITATIONS
.
58
5.4
EVALUATION
.
61
5.4.1
SETUP
AND
EXECUTION
.
61
5.4.2
RESULTS
AND
DISCUSSION
.
64
5.4.3
THREATS
TO
VALIDITY
.
65
5.5
SUMMARY
.
67
6
SOFTWARE-BASED
NON-LNTRUSIVE
SOFTWARE
EXECUTION
TRAC
ING
.
69
6.1
OVERVIEW
.
69
6.1.1
GEM5
SYSTEM
SIMULATOR
.
70
6.1.2
LLVM
INSTRUCTION
SET
SIMULATOR
.
71
6.1.3
FERAL
.
71
6.2
NON-LNTRUSIVE
TRACING
OF
EMBEDDED
MULTITHREADED
SOFT
WARE
WITH
TEMPORAL
CONSTRAINTS
USING
GEM5
.
71
6.2.1
CONCEPT
.
71
6.2.2
NON-INTRUSIVE
TRACING
OF
RAW
DATA
.
73
6.2.3
RELATING
RAW
TRACE
DATA
TO
THE
SOURCE
CODE
.
74
6.2.4
MAPPING
OF
THE
CONCEPTUAL
SOLUTION
TO
THE
GEM5
SYSTEM
SIMULATOR
.
76
VIII
6.2.5
COMPUTATIONAL
COMPLEXITY
OF
RELATING
RAW
TRACE
DATA
TO
THE
SOURCE
CODE
.
77
6.3
NON-LNTRUSIVE
TRACING
OF
EMBEDDED
MULTITHREADED
SOFT
WARE
ON
THE
LOGICAL
LEVEL
USING
AN
LLVM
INTERPRETER
.
78
6.3.1
CONCEPT
.
78
6.3.2
ALTERING
THE
VALUE
OF
SOFTWARE
STATES
.
79
6.3.3
MAPPING
OF
THE
CONCEPTUAL
SOLUTION
TO
THE
LLVM
COMPILER
INFRASTRUCTURE
.
81
6.3.4
QUANTIFICATION
OF
CODE
COVERAGE
.
85
6.4
EVALUATION
.
.
88
6.4.1
SETUP
AND
EXECUTION
.
88
6.4.2
TRACING
SOFTWARE
WITH
TEMPORAL
CONSTRAINTS
USING
GEM5
.
90
6.4.3
TRACING
SOFTWARE
ON
THE
LOGICAL
LEVEL
USING
THE
LLVM
INTERPRETER
.
92
6.4.4
THREATS
TO
VALIDITY
.
95
6.4.5
RESULTS
AND
DISCUSSION
.
97
6.5
SUMMARY
.
99
7
CONCLUSIONS
AND
FUTURE
WORK
.
101
7.1
SUMMARY
AND
CONCLUSIONS
.
101
7.2
OPEN
QUESTIONS
AND
FUTURE
WORK
.
102
ZUSAMMENFASSUNG
.
105
ACRONYMS
.
109
REFERENCES
.
113
A
DAWN
OF
MAINSTREAM
CONCURRENT
COMPUTING
AND
APOC
ALYPSE
OF
CONCURRENCY
ISSUES.
131
A.
1
OVERVIEW
.
131
A.
2
MOORE'S
LAW,
MULTICORES,
AND
DARK
SILICON
.
132
A.
3
CONCURRENT,
PARALLEL,
AND
DISTRIBUTED
COMPUTING
.
133
A.
4
COMPUTING
MODELS
OF
COMPUTER
SYSTEMS
.
134
A.
5
EXECUTION
SPEEDUP
WITH
MULTICORE
PROCESSORS
.
135
A.
6
CONCURRENT
COMPUTING
IN
PRACTICE
.
136
A.
6.1
PROGRAMMING
LANGUAGES
FOR
CONCURRENT
COM
PUTING
.
136
A.
6.
2
SOFTWARE
LIBRARIES
FOR
CONCURRENT
COMPUTING
.
137
IX
A.
7
CONCURRENCY
BUGS
.
139
A.
7.1
CONCURRENCY
BUGS:
FAILURE-MODE-EFFECT-MEASURE.
139
A.
7.2
FAMOUS
CONCURRENCY
BUGS
.
141
B
EXAMPLES
WITH
THREADS
.
143
B.
1
CREATION
OF
THREAD
EXAMPLES
.
143
B.
1.1
C++11
.
143
B.
1
.2
JAVA
.
143
B.
1.3
C++
AND
PTHREAD
.
144
B.
1.4
C++
AND
BOOST
.
144
B.
1.5
C
AND
OPENMP
.
145
B.
2
THREAD
SYNCHRONIZATION
EXAMPLES
.
145
B.
2.1
C++1
1
THREAD
AND
MUTEX
.
145
B.
2.
2
C++,
PTHREAD,
AND
MUTEX
.
145
B.
3
CONCURRENCY
BUG
EXAMPLES
.
146
B.
3.1
DATA
RACE:
C++1
1
THREAD
.
146
B.
3.
2
DATA
RACE:
C++
AND
PTHREAD
.
147
C
SYSTEMATIC
LITERATURE
REVIEW
.
149
C.
1
PHASES
OF
THE
SYSTEMATIC
LITERATURE
REVIEW
(SLR)
.
149
C.
1.1
RATIONALE
FOR
THE
SURVEY
AND
RESEARCH
QUESTIONS.
149
C.
1.2
PRIMARY
STUDIES
.
150
C.
1.3
SELECTION
CRITERIA
AND
SELECTION
PROCEDURES
.
150
C.
1.4
SELECTED
PUBLICATIONS
.
151
C.
2
SYSTEMATIC
LITERATURE
REVIEW:
RESULTS
.
152
C.
2.1
PRECISION
.
153
C.
2.
2
PERFORMANCE
.
155
C.
2.
3
RELATED
ANALYSES
.
158
C.
2.4
RELATED
TOOLS
.
159
C.
2.
5
SUMMARY
OF
THE
RESULTS
.
159
LEBENSLAUF
.
165 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Jahić, Jasmin 1988- |
author2 | Bomarius, Frank |
author2_role | edt |
author2_variant | f b fb |
author_GND | (DE-588)1225582180 |
author_facet | Jahić, Jasmin 1988- Bomarius, Frank |
author_role | aut |
author_sort | Jahić, Jasmin 1988- |
author_variant | j j jj |
building | Verbundindex |
bvnumber | BV047578648 |
classification_rvk | ST 233 |
ctrlnum | (OCoLC)1257028834 (DE-599)DNB1231380373 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02669nam a2200637 cb4500</leader><controlfield tag="001">BV047578648</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211109s2021 gw a||| m||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">21,N16</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">21,A34</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">21,H09</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1231380373</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783839616833</subfield><subfield code="c">Broschur : EUR 61.00 (DE), EUR 62.80 (AT), CHF 94.00 (freier Preis)</subfield><subfield code="9">978-3-8396-1683-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3839616832</subfield><subfield code="9">3-8396-1683-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783839616833</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: fhg-iese_98</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1257028834</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1231380373</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="8">1\p</subfield><subfield code="a">004</subfield><subfield code="2">23sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jahić, Jasmin</subfield><subfield code="d">1988-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1225582180</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Supervised testing of embedded concurrent software</subfield><subfield code="c">Jasmin Jahić</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Stuttgart</subfield><subfield code="b">Fraunhofer Verlag</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 165 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">PhD theses in experimental software engineering</subfield><subfield code="v">volume 70</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="b">Dissertation</subfield><subfield code="c">Technische Universität Kaiserslautern</subfield><subfield code="d">2020</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software Engineering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Embedded Systems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computing and Information Technology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software testing and verification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer modelling and simulation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Informatiker</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Wissenschaftler</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwaretest</subfield><subfield code="0">(DE-588)4132652-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bomarius, Frank</subfield><subfield code="4">edt</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Fraunhofer IESE, Kaiserslautern</subfield><subfield code="4">isb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Fraunhofer IRB-Verlag</subfield><subfield code="0">(DE-588)4786605-6</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=25fa55fa5d4f46ea927a7c33dc0adff0&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:DE-101</subfield><subfield code="q">application/pdf</subfield><subfield code="u">https://d-nb.info/1231380373/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032964067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032964067</subfield></datafield><datafield tag="883" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">dnb</subfield><subfield code="d">20210820</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#dnb</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV047578648 |
illustrated | Illustrated |
index_date | 2024-07-03T18:32:48Z |
indexdate | 2024-07-10T09:15:22Z |
institution | BVB |
institution_GND | (DE-588)4786605-6 |
isbn | 9783839616833 3839616832 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032964067 |
oclc_num | 1257028834 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | xv, 165 Seiten Illustrationen 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Fraunhofer Verlag |
record_format | marc |
series2 | PhD theses in experimental software engineering |
spelling | Jahić, Jasmin 1988- Verfasser (DE-588)1225582180 aut Supervised testing of embedded concurrent software Jasmin Jahić Stuttgart Fraunhofer Verlag [2021] xv, 165 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier PhD theses in experimental software engineering volume 70 Dissertation Technische Universität Kaiserslautern 2020 Software Engineering (DE-588)4116521-4 gnd rswk-swf Softwaretest (DE-588)4132652-0 gnd rswk-swf Software Engineering Embedded Systems Computing and Information Technology Software testing and verification Computer modelling and simulation Informatiker Wissenschaftler (DE-588)4113937-9 Hochschulschrift gnd-content Software Engineering (DE-588)4116521-4 s Softwaretest (DE-588)4132652-0 s DE-604 Bomarius, Frank edt Fraunhofer IESE, Kaiserslautern isb Fraunhofer IRB-Verlag (DE-588)4786605-6 pbl X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=25fa55fa5d4f46ea927a7c33dc0adff0&prov=M&dok_var=1&dok_ext=htm Inhaltstext B:DE-101 application/pdf https://d-nb.info/1231380373/04 Inhaltsverzeichnis DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032964067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p dnb 20210820 DE-101 https://d-nb.info/provenance/plan#dnb |
spellingShingle | Jahić, Jasmin 1988- Supervised testing of embedded concurrent software Software Engineering (DE-588)4116521-4 gnd Softwaretest (DE-588)4132652-0 gnd |
subject_GND | (DE-588)4116521-4 (DE-588)4132652-0 (DE-588)4113937-9 |
title | Supervised testing of embedded concurrent software |
title_auth | Supervised testing of embedded concurrent software |
title_exact_search | Supervised testing of embedded concurrent software |
title_exact_search_txtP | Supervised testing of embedded concurrent software |
title_full | Supervised testing of embedded concurrent software Jasmin Jahić |
title_fullStr | Supervised testing of embedded concurrent software Jasmin Jahić |
title_full_unstemmed | Supervised testing of embedded concurrent software Jasmin Jahić |
title_short | Supervised testing of embedded concurrent software |
title_sort | supervised testing of embedded concurrent software |
topic | Software Engineering (DE-588)4116521-4 gnd Softwaretest (DE-588)4132652-0 gnd |
topic_facet | Software Engineering Softwaretest Hochschulschrift |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=25fa55fa5d4f46ea927a7c33dc0adff0&prov=M&dok_var=1&dok_ext=htm https://d-nb.info/1231380373/04 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032964067&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT jahicjasmin supervisedtestingofembeddedconcurrentsoftware AT bomariusfrank supervisedtestingofembeddedconcurrentsoftware AT fraunhoferiesekaiserslautern supervisedtestingofembeddedconcurrentsoftware AT fraunhoferirbverlag supervisedtestingofembeddedconcurrentsoftware |