Page 78 - 《软件学报》2025年第7期
P. 78

陈元亮 等: 分布式系统动态测试技术研究综述                                                          2999


                      10.1109/SP54263.2024.00109]
                 [22]  Liu Q, Cui L, Chen HM. Key technologies and applications of Internet of Things. Computer Science, 2010, 37(6): 1–4, 10 (in Chinese
                      with English abstract). [doi: 10.3969/j.issn.1002-137X.2010.06.001]
                 [23]  Lahami M, Krichen M. A survey on runtime testing of dynamically adaptable and distributed systems. Software Quality Journal, 2021,
                      29(2): 555–593. [doi: 10.1007/s11219-021-09558-x]
                 [24]  Gosain A, Sharma G. A survey of dynamic program analysis techniques and tools. In: Satapathy SC, Biswal BN, Udgata SK, Mandal
                      JK, eds. Proc. of the 3rd Int’l Conf. on Frontiers of Intelligent Computing: Theory and Applications. Cham: Springer, 2015. 113–122.
                      [doi: 10.1007/978-3-319-11933-5_13]
                 [25]  Sternberg RJ, Grigorenko EL. All testing is dynamic testing. Issues in Education, 2001, 7(2): 137–170.
                 [26]  Fairley RE. Tutorial: Static analysis and dynamic testing of computer software. Computer, 1978, 11(4): 14–23. [doi: 10.1109/C-M.1978.
                      218132]
                 [27]  Zhang J, Zhang C, Xuan JF, Xiong YF, Wang QX, Liang B, Li L, Dou WS, Chen ZB, Chen LQ, Cai Y. Recent progress in program
                      analysis. Ruan Jian Xue Bao/Journal of Software, 2019, 30(1): 80–109 (in Chinese with English abstract). http://www.jos.org.cn/1000-
                      9825/5651.htm [doi: 10.13328/j.cnki.jos.005651]
                 [28]  Sun XD, Cheng RX, Chen JY, Ang E, Legunsen, Xu TY. Testing configuration changes in context to prevent production failures. In:
                      Proc. of the 14th USENIX Symp. on Operating Systems Design and Implementation. USENIX Association, 2020. 42.
                 [29]  Wang T, Jia ZY, Li SS, Zheng S, Yu Y, Xu EC, Peng SL, Liao XK. Understanding and detecting on-the-fly configuration bugs. In:
                      Proc. of the 45th Int’l Conf. on Software Engineering. Melbourne: IEEE, 2023. 628–639. [doi: 10.1109/ICSE48619.2023.00062]
                 [30]  Chen  QR,  Wang  T,  Legunsen  O,  Li  SS,  Xu  TY.  Understanding  and  discovering  software  configuration  dependencies  in  cloud  and
                      datacenter systems. In: Proc. of the 28th ACM Joint Meeting on European Software Engineering Conf. and Symp. on the Foundations of
                      Software Engineering. ACM, 2020. 362–374. [doi: 10.1145/3368089.3409727]
                 [31]  Hoffmann A, Neubauer B. Deployment and configuration of distributed systems. In: Proc. of the 4th Int’l SDL and MSC Workshop on
                      System Analysis and Modeling. Ottawa: Springer, 2005. 1–16. [doi: 10.1007/978-3-540-31810-1_1]
                 [32]  Oppenheimer D. The importance of understanding distributed system configuration. In: Proc. of the 2003 Conf. on Human Factors in
                      Computer Systems Workshop. Ft. Lauderdale: ACM Press, 2003.
                 [33]  Barroso LA, Hölzle U, Ranganathan P. The Datacenter as A Computer: Designing Warehouse-scale Machines. 3rd ed., Cham: Springer,
                      2019. 189. [doi: 10.1007/978-3-031-01761-2]
                 [34]  Shieber J. Facebook outage. 2024. https://techcrunch.com/2019/03/14/facebook-blames-a-misconfigured-server-for-yesterdays-outage/
                 [35]  Gunawi HS, Hao MZ, Suminto RO, Laksono A, Satria AD, Adityatama J, Eliazar KJ. Why does the cloud stop computing? Lessons
                      from hundreds of service outages. In: Proc. of the 7th ACM Symp. on Cloud Computing. Santa Clara: ACM, 2016. 1–16. [doi: 10.1145/
                      2987550.2987583]
                 [36]  Liu  HP,  Lu  S,  Musuvathi  M,  Nath  S.  What  bugs  cause  production  cloud  incidents?  In:  Proc.  of  the  Workshop  on  Hot  Topics  in
                      Operating Systems. Bertinoro: ACM, 2019. 155–162. [doi: 10.1145/3317550.3321438]
                 [37]  Nagaraja K, Oliveira F, Bianchini R, Martin RP, Nguyen TD. Understanding and dealing with operator mistakes in internet services. In:
                      Proc. of the 6th Symp. on Operating Systems Design & Implementation. San Francisco: USENIX Association, 2004. 61–76.
                 [38]  Oppenheimer D, Ganapathi A, Patterson DA. Why do Internet services fail, and what can be done about it? In: Proc. of the 4th Conf. on
                      USENIX Symp. on Internet Technologies and Systems. Seattle: USENIX Association, 2003. 1. [doi: 10.5555/1251460.1251461]
                 [39]  Yuan D, Luo Y, Zhuang X, Rodrigues GR, Zhao X, Zhang YL, Jain PU, Stumm M. Simple testing can prevent most critical failures: An
                      analysis of production failures in distributed data-intensive systems. In: Proc. of the 11th USENIX Symp. on Operating Systems Design
                      and Implementation. Broomfield: USENIX Association, 2014. 249–265. [doi: 10.5555/2685048.2685068]
                 [40]  Hale B. Why every IT practitioner should care about network change & configuration management. 2012. https://content.solarwinds.
                      com/creative/pdf/Whitepapers/Why_Every_IT_Practitioner_Should_Care_About_NCCM_whitepaper.pdf
                 [41]  Cloudflare. Famous DDoS attacks in history. 2024 (in Chinese). https://www.cloudflare.com/zh-cn/learning/ddos/famous-ddos-attacks/
                 [42]  Huang CF, Tseng YC, Wu HL. Distributed protocols for ensuring both coverage and connectivity of a wireless sensor network. ACM
                      Trans. on Sensor Networks (TOSN), 2007, 3(1): 5–es. [doi: 10.1145/1210669.1210674]
                 [43]  Porambage  P,  Schmitt  C,  Kumar  P,  Gurtov  A,  Ylianttila  M.  Two-phase  authentication  protocol  for  wireless  sensor  networks  in
                      distributed  IoT  applications.  In:  Proc.  of  the  2014  IEEE  Wireless  Communications  and  Networking  Conf.  Istanbul:  IEEE,  2014.
                      2728–2733.
                 [44]  Zhong WY, Yang C, Liang W, Cai JH, Chen L, Liao J, Xiong NX. Byzantine fault-tolerant consensus algorithms: A survey. Electronics,
                      2023, 12(18): 3801. [doi: 10.3390/electronics12183801]
                 [45]  Distler  T.  Byzantine  fault-tolerant  state-machine  replication  from  a  systems  perspective.  ACM  Computing  Surveys  (CSUR),  2021,
   73   74   75   76   77   78   79   80   81   82   83