Skip to main content

Showing 1–9 of 9 results for author: Walkinshaw, N

.
  1. arXiv:2406.07040  [pdf, ps, other

    cs.FL

    Learning EFSM Models with Registers in Guards

    Authors: Germán Vega, Roland Groz, Catherine Oriat, Michael Foster, Neil Walkinshaw, Adenilso Simão

    Abstract: This paper presents an active inference method for Extended Finite State Machines, where inputs and outputs are parametrized, and transitions can be conditioned by guards involving input parameters and internal variables called registers. The method applies to (software) systems that cannot be reset, so it learns an EFSM model of the system on a single trace.

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: 14 pages (last page blank), 8 figures, 4 algorithms Submitted to LearnAut workshop 2024 (not published)

  2. Bounding Random Test Set Size with Computational Learning Theory

    Authors: Neil Walkinshaw, Michael Foster, Jose Miguel Rojas, Robert M Hierons

    Abstract: Random testing approaches work by generating inputs at random, or by selecting inputs randomly from some pre-defined operational profile. One long-standing question that arises in this and other testing contexts is as follows: When can we stop testing? At what point can we be certain that executing further tests in this manner will not explore previously untested (and potentially buggy) software b… ▽ More

    Submitted 24 June, 2024; v1 submitted 27 May, 2024; originally announced May 2024.

    Comments: Preprint, accepted to FSE 2024

  3. arXiv:2209.00357  [pdf, other

    cs.SE

    Testing Causality in Scientific Modelling Software

    Authors: Andrew G. Clark, Michael Foster, Benedikt Prifling, Neil Walkinshaw, Robert M. Hierons, Volker Schmidt, Robert D. Turner

    Abstract: From simulating galaxy formation to viral transmission in a pandemic, scientific models play a pivotal role in develo** scientific theories and supporting government policy decisions that affect us all. Given these critical applications, a poor modelling assumption or bug could have far-reaching consequences. However, scientific models possess several properties that make them notoriously diffic… ▽ More

    Submitted 30 June, 2023; v1 submitted 1 September, 2022; originally announced September 2022.

    ACM Class: D.2.5; I.6.4

  4. Test case generation for agent-based models: A systematic literature review

    Authors: Andrew G. Clark, Neil Walkinshaw, Robert M. Hierons

    Abstract: Agent-based models play an important role in simulating complex emergent phenomena and supporting critical decisions. In this context, a software fault may result in poorly informed decisions that lead to disastrous consequences. The ability to rigorously test these models is therefore essential. In this systematic literature review, we answer five research questions related to the key aspects of… ▽ More

    Submitted 18 March, 2021; v1 submitted 12 March, 2021; originally announced March 2021.

  5. arXiv:2101.04948  [pdf, other

    cs.LG cs.SE

    Deep State Inference: Toward Behavioral Model Inference of Black-box Software Systems

    Authors: Foozhan Ataiefard, Mohammad Jafar Mashhadi, Hadi Hemmati, Niel Walkinshaw

    Abstract: Many software engineering tasks, such as testing, and anomaly detection can benefit from the ability to infer a behavioral model of the software.Most existing inference approaches assume access to code to collect execution sequences. In this paper, we investigate a black-box scenario, where the system under analysis cannot be instrumented, in this granular fashion.This scenario is particularly pre… ▽ More

    Submitted 12 October, 2021; v1 submitted 13 January, 2021; originally announced January 2021.

    Comments: 17 pages,9 figures. arXiv admin note: text overlap with arXiv:2008.11856

  6. arXiv:1610.06089  [pdf, other

    cs.NI

    Finding Clustering Configurations to Accurately Infer Packet Structures from Network Data

    Authors: Othman Esoul, Neil Walkinshaw

    Abstract: Clustering is often used for reverse engineering network protocols from captured network traces. The performance of clustering techniques is often contingent upon the selection of various parameters, which can have a severe impact on clustering quality. In this paper we experimentally investigate the effect of four different parameters with respect to network traces. We also determining the optima… ▽ More

    Submitted 19 October, 2016; originally announced October 2016.

    Comments: 14 pages, 3 figures

  7. arXiv:1608.03181  [pdf, other

    cs.SE

    Uncertainty-Driven Black-Box Test Data Generation

    Authors: Neil Walkinshaw, Gordon Fraser

    Abstract: We can never be certain that a software system is correct simply by testing it, but with every additional successful test we become less uncertain about its correctness. In absence of source code or elaborate specifications and models, tests are usually generated or chosen randomly. However, rather than randomly choosing tests, it would be preferable to choose those tests that decrease our uncerta… ▽ More

    Submitted 10 August, 2016; originally announced August 2016.

  8. arXiv:1505.07987  [pdf, other

    cs.LO

    SEPIA: Search for Proofs Using Inferred Automata

    Authors: Thomas Gransden, Neil Walkinshaw, Rajeev Raman

    Abstract: This paper describes SEPIA, a tool for automated proof generation in Coq. SEPIA combines model inference with interactive theorem proving. Existing proof corpora are modelled using state-based models inferred from tactic sequences. These can then be traversed automatically to identify proofs. The SEPIA system is described and its performance evaluated on three Coq datasets. Our results show that S… ▽ More

    Submitted 29 May, 2015; originally announced May 2015.

    Comments: To appear at 25th International Conference on Automated Deduction

  9. arXiv:1405.3623  [pdf, other

    cs.LO

    Mining State-Based Models from Proof Corpora

    Authors: Thomas Gransden, Neil Walkinshaw, Rajeev Raman

    Abstract: Interactive theorem provers have been used extensively to reason about various software/hardware systems and mathematical theorems. The key challenge when using an interactive prover is finding a suitable sequence of proof steps that will lead to a successful proof requires a significant amount of human intervention. This paper presents an automated technique that takes as input examples of succes… ▽ More

    Submitted 14 May, 2014; originally announced May 2014.

    Comments: To Appear at Conferences on Intelligent Computer Mathematics 2014