摘要:
A method, apparatus, system, and computer program products for implementing non-function logic extensibly and independently of functional logic, the method comprising the steps of: acquiring association relationship between a policy and a required plug-in based on a loaded policy demand configuration; generating a plug-in context definition according to the acquired association relationship, the plug-in context definition being part of a plug-in context associated with the plug-in, wherein the plug-in context defines services provided by the plug-in and reference to other plug-ins related to the plug-in; and generating a plug-in context object based on the plug-in context definition, wherein the plug-in context object is an instantiated plug-in context definition. According to the method of the present invention, it is possible to perform inexplicit invocation of infrastructure service plug-ins according to application configuration without querying plug-in registry, and better performance is acquired in the process of invoking plug-ins.
摘要:
A method, apparatus, system, and computer program products for implementing non-function logic extensibly and independently of functional logic, the method comprising the steps of: acquiring association relationship between a policy and a required plug-in based on a loaded policy demand configuration; generating a plug-in context definition according to the acquired association relationship, the plug-in context definition being part of a plug-in context associated with the plug-in, wherein the plug-in context defines services provided by the plug-in and reference to other plug-ins related to the plug-in; and generating a plug-in context object based on the plug-in context definition, wherein the plug-in context object is an instantiated plug-in context definition. According to the method of the present invention, it is possible to perform inexplicit invocation of infrastructure service plug-ins according to application configuration without querying plug-in registry, and better performance is acquired in the process of invoking plug-ins.
摘要:
The present invention provides a component reuse method for reusing at least first component that is selected from a first software system to a second software system. The method comprises the steps of: analyzing the first software system, determining dependencies of the at least one first component of the first software system and acquiring relevant interface information; generating surrogates based on the dependencies and the interface information, which will be deployed in the first operating environment and in the second operating environment respectively, wherein the surrogates allow the second software system to invoke service provided by the at least one first component in the first operating environment and allow the at least one first component to invoke relevant service provided in the second software system.
摘要:
The present invention provides a component reuse method for reusing at least first component that is selected from a first software system to a second software system. The method comprises the steps of: analyzing the first software system, determining dependencies of the at least one first component of the first software system and acquiring relevant interface information; generating surrogates based on the dependencies and the interface information, which will be deployed in the first operating environment and in the second operating environment respectively, wherein the surrogates allow the second software system to invoke service provided by the at least one first component in the first operating environment and allow the at least one first component to invoke relevant service provided in the second software system.
摘要:
A method and apparatus for detecting an anomalistic data record. The method includes the steps of mining a data rule from a verified data record set in accordance with a mining rule, checking data records in an unverified data record set in accordance with the mined data rule and determining a data record unconformable to the mined data rule as an anomalistic data record. The apparatus includes a mining device configured to mine a data rule from a verified data record set in accordance with a mining rule and a checking device configured to check a data record in an unverified data record set in accordance with the mined data rule and to determine a data record unconformable to the mined data rule as an anomalistic data record.
摘要:
A method and an apparatus for generating test cases of a software system. The method includes the steps of: tracing a user request to acquire IT events related to each service and/or component invocation; forming IT transactions based on correlation information in IT events; correlating said IT transactions based on predetermined correlation rules, in order to form a business transaction; and extracting from the business transaction a business transaction pattern corresponding to said business transaction. The method further includes generating test cases of a software system based on the generated business transaction pattern. The apparatus includes hardware for accomplishing the foregoing method steps.
摘要:
Techniques are provided for analyzing testing coverage of one or more software modules to provide process coverage statistics. The techniques include obtaining one or more coverage measures from a test specification document, performing a trace on each of the one or more coverage measures during a test, analyzing each trace to generate a run-time service choreography model for a process, wherein the model includes each of one or more service choreography patterns occurring in the process, and using the model to provide statistical data on test coverage according to a process definition.In an embodiment of the invention, an exemplary method for generating a database of run-time service choreography models for a process can include obtaining one or more coverage measures from a test specification document, performing a trace on each of the one or more coverage measures during a test, analyzing each trace to generate a run-time service choreography model for a process, wherein the model includes each of one or more service choreography patterns occurring in the process, and storing the model in a database, wherein the database is used to provide statistical data on test coverage according to a process definition.
摘要:
Techniques are provided for analyzing testing coverage of one or more software modules to provide process coverage statistics. The techniques include obtaining one or more coverage measures from a test specification document, performing a trace on each of the one or more coverage measures during a test, analyzing each trace to generate a run-time service choreography model for a process, wherein the model includes each of one or more service choreography patterns occurring in the process, and using the model to provide statistical data on test coverage according to a process definition.
摘要:
A method (which can be computer implemented) for analyzing test coverage of distributed processes includes the steps of identifying at least one of the processes that is invoked by a test case, mapping at least a portion of the test case to a plurality of specific test paths in the at least one of the processes, and identifying given ones of the test paths as possibly relevant in at least one of the processes, if the test paths are not infeasible.
摘要:
A method and apparatus for determining a data mapping relationship between a source database table and a target database table are included. The method includes obtaining attribute values of an attribute other than a primary key and corresponding primary key value sets from plural rows of data in a source database table, and obtaining attribute values of a specific attribute other than a corresponding primary key and corresponding primary key value sets from plural rows of data in the target database table. A determination is made as to whether the attribute of the source database table and the specific attribute of the target database table have a potential data mapping relationship. If the determination is affirmative, a data mapping relationship is determined therebetween.