- document
-
Troost, Christian (author), Huber, Robert (author), Bell, Andrew R. (author), van Delden, Hedwig (author), Filatova, T. (author), Le, Quang Bao (author), Lippe, Melvin (author), Niamir, Leila (author), Polhill, J. Gareth (author), Sun, Zhanli (author), Berger, Thomas (author)There has so far been no shared understanding of validity in agent-based simulation. We here conceptualise validation as systematically substantiating the premises on which conclusions from simulation analysis for a particular modelling context are built. Given such a systematic perspective, validity of agent-based models cannot be ensured if...journal article 2023
- document
-
Symeonidis, Pandelis (author)System behavior models are highly useful for the developers of the system as they aid in system comprehension, documentation, and testing. Even though methods to obtain such models exist, e.g. profiling, tracing, source code inference and existing log-based inference methods, they can not successfully be applied to the case of large, real-time...bachelor thesis 2021
- document
-
Improving rippled: Leveraging passive model inference techniques to test large decentralized systemsKarayalçin, Sengim (author)Blockchains and cryptocurrencies, like Ripple, are becoming more widely used. Testing the large decentralized systems these technologies on is complex, as the behavior of the system is dependent on many external factors. We will examine the viability of using passive model inference techniques to test the systems based on the network traffic...bachelor thesis 2020
- document
-
Roelvink, Marijn (author)Ripple is a relatively new payments network that aims to improve the financial system by unifying its underlying infrastructure. Given its critical function, its system must be reliable and free of bugs. Therefore it should be tested extensively. One of the test methods that has not been used on it yet is log inference, a method that has a good...bachelor thesis 2020
- document
-
van der Lee, Wesley (author), Verwer, S.E. (author)Although the importance of mobile applications grows every day, recent vulnerability reports argue the application's deficiency to meet modern security standards. Testing strategies alleviate the problem by identifying security violations in software implementations. This paper proposes a novel testing methodology that applies state machine...conference paper 2018
- document
-
Wieman, R. (author)Analyzing large numbers of log entries can be challenging, especially when there are many short log entries that each describe only one execution of the system, either successful or unsuccessful. How can one determine whether the system is working correctly, based on these logs? The logs that are of interest (e.g., log entries pointing towards...master thesis 2017