The document discusses detecting uninitialized variables in large Cobol programs with unrealizable code paths. It presents context-sensitive and context-insensitive analysis results, showing context-sensitive finds fewer uninitialized variables instances by tracking variable definitions and uses across code blocks. Heuristics like removing code smells and prioritizing by utility parameters further reduce detected instances. The technique supports maintenance by precisely locating variables causing failures and can be extended to other program analysis.
To effectively analyze issue root causes, it is crucial that evidence is properly collected, coded, filtered and analyzed. This presentation will outline proper data gathering and organizing techniques. It will examine various analysis methods, comparing their relative strengths and weaknesses. Lastly, it will introduce Root Cause Pattern Diagrams, a breakthrough analysis technique that displays data in colored graphical patterns that are compared against a library of known root cause patterns.
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...ICSM 2011
Paper: An Evaluation of the Strategies of Sorting, Filtering, and Grouping API Methods for Code Completion
Authors: Daqing Hou and Dave Pletcher
Session: Research Track Session 8 -Program Comprehension
Industry - Testing & Quality Assurance in Data Migration Projects ICSM 2011
Paper: Testing & Quality Assurance in Data Migration Projects
Authors: Klaus Haller, Florian Matthes, Christopher Schulz
Session: Industry Track Session 3: Evolution and migration
To effectively analyze issue root causes, it is crucial that evidence is properly collected, coded, filtered and analyzed. This presentation will outline proper data gathering and organizing techniques. It will examine various analysis methods, comparing their relative strengths and weaknesses. Lastly, it will introduce Root Cause Pattern Diagrams, a breakthrough analysis technique that displays data in colored graphical patterns that are compared against a library of known root cause patterns.
Program Comprehension - An Evaluation of the Strategies of Sorting, Filtering...ICSM 2011
Paper: An Evaluation of the Strategies of Sorting, Filtering, and Grouping API Methods for Code Completion
Authors: Daqing Hou and Dave Pletcher
Session: Research Track Session 8 -Program Comprehension
Industry - Testing & Quality Assurance in Data Migration Projects ICSM 2011
Paper: Testing & Quality Assurance in Data Migration Projects
Authors: Klaus Haller, Florian Matthes, Christopher Schulz
Session: Industry Track Session 3: Evolution and migration
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
Paper: Structural Conformance Checking with Design Tests: An Evaluation of Usability and Scalability.
Authors: João Brunet, Dalton Dario Serey Guerrero and Jorge Figueiredo.
Session: Research Track 5: Traceability
Abstract:
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I will report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
While botnets have been hijacked before, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server during the ten day period. This shows that botnet estimates that are based on IP addresses are likely to report inflated numbers. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of information from the infected victims. This allowed us to perform interesting data analysis that goes well beyond simply counting the number of stolen credit cards. In this talk I will discuss the analysis that we performed on the data collected and the lessons learned from the analysis, as well as from the process of obtaining (and losing) the botnet.
Bio:
Richard A. Kemmerer is the Computer Science Leadership Professor and a past Department Chair of the Department of Computer Science at the University of California, Santa Barbara. Dr. Kemmerer received the B.S. degree in Mathematics from the Pennsylvania State University in 1966, and the M.S. and Ph.D. degrees in Computer Science from the University of California, Los Angeles, in 1976 and 1979, respectively. His research interests include formal specification and verification of systems, computer system security and reliability, programming and specification language design, and software engineering.
Dr. Kemmerer is a Fellow of the IEEE Computer Society, a Fellow of the Association for Computing Machinery, and he is the 2007 recipient of The Applied Security Associates Distinguished Practitioner Award. He is a member of the IFIP Working Group 11.3 on Database Security, and a member of the International Association for Cryptologic Research. He is a past Editor-in-Chief of IEEE Transactions on Software Engineering, and he has served on the editorial boards of the ACM Computing Surveys and IEEE Security and Privacy and on the Board of Governors of the IEEE Computer Society. He served on Microsoft’s Trustworthy Computing Academic Advisory Board (2002-2010) and on the National Science Foundations/CISE Advisory Board (2002-2004).
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
Paper: Localizing Failure-Inducing Program Edits Based on Spectrum Information.
Authors: Lingming Zhang, Miryung Kim, Sarfraz Khurshid.
Session: Research Track Session 1: Faults and Regression Testing
Reliability and Quality - Predicting post-release defects using pre-release f...ICSM 2011
Paper : Predicting Post-release Defects Using Pre-release Field Testing Results
Authors : Foutse Khomh, Brian Chan, Ying Zou, Anand Sinha and Dave Dietz
Session: Research Track Session 9: Reliability and Quality
ERA - Clustering and Recommending Collections of Code Relevant to TaskICSM 2011
Paper: Clustering and Recommending Collections of Code Relevant to Task
Authors: Seonah Lee and Sungwon Kang
Session: Early Research Achievements Track Session 3: Managing and Supporting Software Maintenance Activities
Abstract:
Though in essence an engineering discipline, software engineering research has always been struggling to demonstrate impact. This is reflected in part by the funding challenges that the discipline faces in many countries, the difficulties we have to attract industrial participants to our conferences, and the scarcity of papers reporting industrial case studies.
There are clear historical reasons for this but we nevertheless need, as a community, to question our research paradigms and peer evaluation processes in order to improve the situation. From a personal standpoint, relevance and impact are concerns that I have been struggling with for a long time, which eventually led me to leave a comfortable academic position and a research chair to work in industry-driven research.
I will use some concrete research project examples to argue why we need more inductive research, that is, research working from specific observations in real settings to broader generalizations and theories. Among other things, the examples will show how a more thorough understanding of practice and closer interactions with practitioners can profoundly influence the definition of research problems, and the development and evaluation of solutions to these problems. Furthermore, these examples will illustrate why, to a large extent, useful research is necessarily multidisciplinary. I will also address issues regarding the implementation of such a research paradigm and show how our own bias as a research community worsens the situation and undermines our very own interests.
On a more humorous note, the title hints at the fact that being a scientist in software engineering and aiming at having impact on practice often entails leading two parallel careers and impersonate different roles to different peers and partners.
Bio:
Lionel Briand is heading the Certus center on software verification and validation at Simula Research Laboratory, where he is leading research projects with industrial partners. He is also a professor at the University of Oslo (Norway). Before that, he was on the faculty of the department of Systems and Computer Engineering, Carleton University, Ottawa, Canada, where he was full professor and held the Canada Research Chair (Tier I) in Software Quality Engineering. He is the coeditor-in-chief of Empirical Software Engineering (Springer) and is a member of the editorial boards of Systems and Software Modeling (Springer) and Software Testing, Verification, and Reliability (Wiley). He was on the board of IEEE Transactions on Software Engineering from 2000 to 2004. Lionel was elevated to the grade of IEEE Fellow for his work on the testing of object-oriented systems. His research interests include: model-driven development, testing and verification, search-based software engineering, and empirical software engineering.
ERA - A Comparison of Stemmers on Source Code Identifiers for Software SearchICSM 2011
Paper: A Comparison of Stemmers on Source Code Identifiers for Software
Search
Authors: Andrew Wiese, Valerie Ho, Emily Hill.
Session: ERA1 - Linguistic Analysis of Software Artifacts
Postdoc symposium - A Logic Meta-Programming Foundation for Example-Driven Pa...ICSM 2011
Paper: A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in Object-Oriented Programs
Author: Coen De Roover
Session: Post-doctoral symposium
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
Paper: Estimating Software Maintenance Effort from Use Cases: an Industrial Case Study
Authors:Yan Ku, Jing Du, Ye Yang, Qing Wang
Session: Industry Tracking 5: Metrics and
Estimation
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
Paper title: Using Source Code Metrics to Predict Change-Prone Java Interfaces
Authors: Daniele Romano and Martin Pinzger
Session: Research Track Session 11: Metrics
ERA - Measuring Maintainability of Spreadsheets in the Wild ICSM 2011
Paper: Measuring Maintainability of Spreadsheets in the Wild
Authors: José Pedro Correia and Miguel Alexandre Ferreira
Session: Early Research Achievements Track Session 2: Software Changes and Maintainability
Paper: SCOTCH: Improving Test-to-Code Traceability using Slicing and Conceptual Coupling
Authors: Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David Binkley
Session: Research Track Session 3: Dynamic Analysis
Components - Crossing the Boundaries while Analyzing Heterogeneous Component-...ICSM 2011
Paper: "Crossing the Boundaries while Analyzing Heterogeneous Component-Based Software Systems"
Authors: Amir Reza Yazdanshenas, Leon Moonen
Session: Research Track Session 7: Components
Metrics - You can't control the unfamiliarICSM 2011
Paper: You Can't Control the Unfamiliar: A Study on the Relations Between Aggregation Techniques for Software Metrics
Authors: Bogdan Vasilescu, Alexander Serebrenik and Mark Van Den Brand
Session: Research Track 11 - Metrics
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
Paper : The Evolution of Information Systems. A Case Study on Document Management
Authors : Paolo Salvaneschi
Session: Industry Track Session 3: Evolution and migration
Developing and Visualizing Live Model QueriesZoltán Ujhelyi
1st Analysis of Model Transformations Workshop, 2012
Several important tasks performed by model driven development tools — such as well-formedness constraint validation or model transformations — rely on evaluating model queries. If the model changes rapidly or frequently, it is beneficial to provide live queries that automatically propagate these model changes into the query results. To ease the development and debugging of live queries, the development environment should provide a way to evaluate the query results continuously, helping to understand how the created query works.
This presentation presents a generic live model query visualizer that displays and updates the query results depending on their source models. It has been implemented for the EMF-IncQuery framework and presented here for validating BPMN models.
Traceability - Structural Conformance Checking with Design Tests: An Evaluati...ICSM 2011
Paper: Structural Conformance Checking with Design Tests: An Evaluation of Usability and Scalability.
Authors: João Brunet, Dalton Dario Serey Guerrero and Jorge Figueiredo.
Session: Research Track 5: Traceability
Abstract:
Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type of bot is Torpig, which is a malware program that is designed to harvest sensitive information (such as bank account and credit card data) from its victims. In this talk, I will report on our efforts to take control of the Torpig botnet for ten days. Over this period, we observed more than 180 thousand infections and recorded more than 70 GB of data that the bots collected.
While botnets have been hijacked before, the Torpig botnet exhibits certain properties that make the analysis of the data particularly interesting. First, it is possible (with reasonable accuracy) to identify unique bot infections and relate that number to the more than 1.2 million IP addresses that contacted our command and control server during the ten day period. This shows that botnet estimates that are based on IP addresses are likely to report inflated numbers. Second, the Torpig botnet is large, targets a variety of applications, and gathers a rich and diverse set of information from the infected victims. This allowed us to perform interesting data analysis that goes well beyond simply counting the number of stolen credit cards. In this talk I will discuss the analysis that we performed on the data collected and the lessons learned from the analysis, as well as from the process of obtaining (and losing) the botnet.
Bio:
Richard A. Kemmerer is the Computer Science Leadership Professor and a past Department Chair of the Department of Computer Science at the University of California, Santa Barbara. Dr. Kemmerer received the B.S. degree in Mathematics from the Pennsylvania State University in 1966, and the M.S. and Ph.D. degrees in Computer Science from the University of California, Los Angeles, in 1976 and 1979, respectively. His research interests include formal specification and verification of systems, computer system security and reliability, programming and specification language design, and software engineering.
Dr. Kemmerer is a Fellow of the IEEE Computer Society, a Fellow of the Association for Computing Machinery, and he is the 2007 recipient of The Applied Security Associates Distinguished Practitioner Award. He is a member of the IFIP Working Group 11.3 on Database Security, and a member of the International Association for Cryptologic Research. He is a past Editor-in-Chief of IEEE Transactions on Software Engineering, and he has served on the editorial boards of the ACM Computing Surveys and IEEE Security and Privacy and on the Board of Governors of the IEEE Computer Society. He served on Microsoft’s Trustworthy Computing Academic Advisory Board (2002-2010) and on the National Science Foundations/CISE Advisory Board (2002-2004).
Faults and Regression testing - Localizing Failure-Inducing Program Edits Bas...ICSM 2011
Paper: Localizing Failure-Inducing Program Edits Based on Spectrum Information.
Authors: Lingming Zhang, Miryung Kim, Sarfraz Khurshid.
Session: Research Track Session 1: Faults and Regression Testing
Reliability and Quality - Predicting post-release defects using pre-release f...ICSM 2011
Paper : Predicting Post-release Defects Using Pre-release Field Testing Results
Authors : Foutse Khomh, Brian Chan, Ying Zou, Anand Sinha and Dave Dietz
Session: Research Track Session 9: Reliability and Quality
ERA - Clustering and Recommending Collections of Code Relevant to TaskICSM 2011
Paper: Clustering and Recommending Collections of Code Relevant to Task
Authors: Seonah Lee and Sungwon Kang
Session: Early Research Achievements Track Session 3: Managing and Supporting Software Maintenance Activities
Abstract:
Though in essence an engineering discipline, software engineering research has always been struggling to demonstrate impact. This is reflected in part by the funding challenges that the discipline faces in many countries, the difficulties we have to attract industrial participants to our conferences, and the scarcity of papers reporting industrial case studies.
There are clear historical reasons for this but we nevertheless need, as a community, to question our research paradigms and peer evaluation processes in order to improve the situation. From a personal standpoint, relevance and impact are concerns that I have been struggling with for a long time, which eventually led me to leave a comfortable academic position and a research chair to work in industry-driven research.
I will use some concrete research project examples to argue why we need more inductive research, that is, research working from specific observations in real settings to broader generalizations and theories. Among other things, the examples will show how a more thorough understanding of practice and closer interactions with practitioners can profoundly influence the definition of research problems, and the development and evaluation of solutions to these problems. Furthermore, these examples will illustrate why, to a large extent, useful research is necessarily multidisciplinary. I will also address issues regarding the implementation of such a research paradigm and show how our own bias as a research community worsens the situation and undermines our very own interests.
On a more humorous note, the title hints at the fact that being a scientist in software engineering and aiming at having impact on practice often entails leading two parallel careers and impersonate different roles to different peers and partners.
Bio:
Lionel Briand is heading the Certus center on software verification and validation at Simula Research Laboratory, where he is leading research projects with industrial partners. He is also a professor at the University of Oslo (Norway). Before that, he was on the faculty of the department of Systems and Computer Engineering, Carleton University, Ottawa, Canada, where he was full professor and held the Canada Research Chair (Tier I) in Software Quality Engineering. He is the coeditor-in-chief of Empirical Software Engineering (Springer) and is a member of the editorial boards of Systems and Software Modeling (Springer) and Software Testing, Verification, and Reliability (Wiley). He was on the board of IEEE Transactions on Software Engineering from 2000 to 2004. Lionel was elevated to the grade of IEEE Fellow for his work on the testing of object-oriented systems. His research interests include: model-driven development, testing and verification, search-based software engineering, and empirical software engineering.
ERA - A Comparison of Stemmers on Source Code Identifiers for Software SearchICSM 2011
Paper: A Comparison of Stemmers on Source Code Identifiers for Software
Search
Authors: Andrew Wiese, Valerie Ho, Emily Hill.
Session: ERA1 - Linguistic Analysis of Software Artifacts
Postdoc symposium - A Logic Meta-Programming Foundation for Example-Driven Pa...ICSM 2011
Paper: A Logic Meta-Programming Foundation for Example-Driven Pattern Detection in Object-Oriented Programs
Author: Coen De Roover
Session: Post-doctoral symposium
Industry - Estimating software maintenance effort from use cases an indu...ICSM 2011
Paper: Estimating Software Maintenance Effort from Use Cases: an Industrial Case Study
Authors:Yan Ku, Jing Du, Ye Yang, Qing Wang
Session: Industry Tracking 5: Metrics and
Estimation
Metrics - Using Source Code Metrics to Predict Change-Prone Java InterfacesICSM 2011
Paper title: Using Source Code Metrics to Predict Change-Prone Java Interfaces
Authors: Daniele Romano and Martin Pinzger
Session: Research Track Session 11: Metrics
ERA - Measuring Maintainability of Spreadsheets in the Wild ICSM 2011
Paper: Measuring Maintainability of Spreadsheets in the Wild
Authors: José Pedro Correia and Miguel Alexandre Ferreira
Session: Early Research Achievements Track Session 2: Software Changes and Maintainability
Paper: SCOTCH: Improving Test-to-Code Traceability using Slicing and Conceptual Coupling
Authors: Abdallah Qusef, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, David Binkley
Session: Research Track Session 3: Dynamic Analysis
Components - Crossing the Boundaries while Analyzing Heterogeneous Component-...ICSM 2011
Paper: "Crossing the Boundaries while Analyzing Heterogeneous Component-Based Software Systems"
Authors: Amir Reza Yazdanshenas, Leon Moonen
Session: Research Track Session 7: Components
Metrics - You can't control the unfamiliarICSM 2011
Paper: You Can't Control the Unfamiliar: A Study on the Relations Between Aggregation Techniques for Software Metrics
Authors: Bogdan Vasilescu, Alexander Serebrenik and Mark Van Den Brand
Session: Research Track 11 - Metrics
Industry - The Evolution of Information Systems. A Case Study on Document Man...ICSM 2011
Paper : The Evolution of Information Systems. A Case Study on Document Management
Authors : Paolo Salvaneschi
Session: Industry Track Session 3: Evolution and migration
Developing and Visualizing Live Model QueriesZoltán Ujhelyi
1st Analysis of Model Transformations Workshop, 2012
Several important tasks performed by model driven development tools — such as well-formedness constraint validation or model transformations — rely on evaluating model queries. If the model changes rapidly or frequently, it is beneficial to provide live queries that automatically propagate these model changes into the query results. To ease the development and debugging of live queries, the development environment should provide a way to evaluate the query results continuously, helping to understand how the created query works.
This presentation presents a generic live model query visualizer that displays and updates the query results depending on their source models. It has been implemented for the EMF-IncQuery framework and presented here for validating BPMN models.
Conference presentation given by Niels Lohmann on September 27, 2007 in Brisbane, Australia at the Fifth International Conference on Business Process Management (BPM 2007).
Business considerations for node.js applicationsAspenware
Node.js is one of the newest and most exciting open web technologies to surface in the last few years. This presentation explores considerations for business stakeholders and technology decision-makers looking to switch their existing stacks to Node.js. Mike examines questions like: What is Node.js? What are the benefits from using Node.js? What are the drawbacks? Who is using this technology today? In a world of people demanding responsive, real-time applications, Node.js makes a compelling argument for change. Mike includes case studies from companies like LinkedIn and Yammer to illustrate the business cases that make sense.
About Node.js:
Node.js (Node) , the brain child of Ryan Dahl, was released in 2009 when he worked for Joyent, Inc. Node is one of the most hyped technologies to arrive on the web development scene, though it is also one of the most misunderstood.
So what is Node? Is it a programming language like Python, Java, or C++? Is it an application framework like Django, Rails, or Symphony? Is it maybe some type of middleware that can be plugged into existing web stacks like Memcached or RabbitMQ? Actually, it is none of the above. Node is simply a set of JavaScript language bindings to Google's powerful V8 engine. This begs the question: "what is a language binding and what is V8?"
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
4. Case Study
Background Concerns
• Core banking product • Repeated failure of transactions
• Stable back-office COBOL • Not so-easily-reproducible failures
applications • Longer turn-around time
• Over 1 million transactions daily
Examples…
Transaction for Recurring Deposit account
change of base A Forex transaction closure fails whenever
branch fails failing only after 6PM triggered at the same time at
randomly two different branches
Not yet 5 days 8 months
fixed 1 day 10 days
4
5. Case Study
Branch A Request for RD
acct closure
Check Balance
Notify balance
to customer
Customer Banker Request for RD
acct closure
Branch B
Check Balance
Notify balance
to customer
Fire Close acct
command
Customer Banker
Fire Close acct 5
command
9. Context-Insensitive Analysis
Paragraph • Paragraph - A set of statements
1. A. represented by a label. Can be executed
2. MOVE 0 TO VA as a unit.
3. PERFORM P.
4.
5. B.
6. MOVE 1 TO VB • Perform - Using PERFORM statement
7. MOVE 1 TO VA Perform one can execute a paragraph.
8. PERFORM P
9. MOVE VB TO MV.
10.
11. P.
12. MOVE 5 TO VF.
9
10. Context-Insensitive Analysis
1. A.
E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV.
8
10. X
11. P.
12. MOVE 5 TO VF. X 9
X
10
11. Context-Insensitive Analysis
1. A.
VA E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV.
8
10. X
11. P.
12. MOVE 5 TO VF. X 9
X
11
12. Context-Insensitive Analysis
1. A.
VA E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV.
8
10. X
11. P.
12. MOVE 5 TO VF. X 9
VA,
VF
X
12
13. Context-Insensitive Analysis
1. A.
VA E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV. VA, 8
10. VF X VA,
11. P. VF
12. MOVE 5 TO VF. X 9
VA,
VF
X
13
14. Context-Insensitive Analysis
1. A.
VA E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV. VA, 8
10. VF X VA,
11. P. VF
12. MOVE 5 TO VF. X 9
VA,
VF
X
14
16. Design Challenges
Perform Chain
Paragraph level information
Paragraph range level information
Data flow equations:
NBottom = [ Ntop – KillSump ] ∪ GenSump
GenSump = Defined (p)
KillSump = Ø
16
17. Context-Insensitive Analysis
1. A.
E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV.
8
10. X
11. P.
12. MOVE 5 TO VF. X 9
X
17
18. Context-Insensitive Analysis
1. A.
E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV.
8
10. X
11. P.
12. MOVE 5 TO VF. X 9
X
18
19. Context-Insensitive Analysis
1. A.
E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV.
8
10. X
11. P.
12. MOVE 5 TO VF. X 9
VF
X
19
20. Context-Insensitive Analysis
1. A.
E
2. MOVE 0 TO VA
E
3. PERFORM P.
E
4. 6
5. B. 2
6. MOVE 1 TO VB
VA 12 7
7. MOVE 1 TO VA
8. PERFORM P 3 VA,
VB
9. MOVE VB TO MV. VA, 8
10. VF X
VA,
11. P.
12. MOVE 5 TO VF. X 9 VB
VF ,VF
X
20
25. Key Learning
Precise detection of un-initialized variables
Heuristics
Realizable data-flow analysis across Paragraphs for COBOL
Technique can be extended to other analyses – defect
detection, program understanding, code architecture discovery
25