Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Willa K. Ehrlich is active.

Publication


Featured researches published by Willa K. Ehrlich.


international conference on software engineering | 1997

Applying design of experiments to software testing: experience report

I. S. Dunietz; Willa K. Ehrlich; B.D. Szablak; Colin L. Mallows; Anthony Iannino

Recently, a class of experimental designs has been devised that guarantee input domain coverage up to all combinations of k test factors taken t at a time. With such designs, all pair-wise combinations (or triplets or quadruplets, etc.) are selected at least once. To evaluate their applicability to software testing, we analyzed the extent to which software coverage (i.e., code execution) achieved by these designs for r = 1 ,...,k is representative of that achieved by exhaustively testing all factor combinations. The block coverage obtained for tS2 was comparable with that achieved by exhaustively testing all factor combinations but higher-order values of t were required for path coverage. Implications of these results for software testing are discussed. field, and that there is a total of 151 characters that can be entered across all 20 screen fields, then there are 95’5’~4.3x102g8 different inputs or test cases corresponding to the different ways a user can populate the screen. Clearly, exhaustive input testing is not feasible and hence, a software tester needs to efficiently generate an effective set of test cases as a means of verifying the correct operation of the software.


measurement and modeling of computer systems | 2000

End to End Performance Modeling of Web Server Architectures

R. Hadharan; Willa K. Ehrlich; D. Cura; Paul Kevin Reeser

Web server performance in a distributed Object-Oriented (OO) environment is a complex interplay between a variety of factors (e.g., hardware platform, threading model, object scope model, server operating system, network bandwidth, disk file size, caching). In this paper, we present a model-based approach to Web Server performance evaluation in terms of an end-to-end queueing model implemented in a simulation tool. We have applied this model to Active Server Page (ASP) and Common Object Model (COM) technology in Microsofts Internet Information Server and to the Java Server Page (JSP) and JavaBean technology in both IIS and Netscape Enterprise Server (NES). Our results indicate that for the ASP Script Engine, performance predictions from the simulation model matched the performance observed in a test environment. However, for the JSP Script Engine, the model predicted higher throughput than laboratory test results at high load. This result suggests that Web Server performance can be severely limited by a software bottleneck that causes requests to be serialized. This may cause a request to wait for some resource (i.e., a lock) as opposed to consuming CPU or memory. Implications of these results for Web Server performance in general are discussed


Journal of The Royal Statistical Society Series C-applied Statistics | 2002

Software reliability assessment using accelerated testing methods

Willa K. Ehrlich; Vijayan N. Nair; M. S. Alam; W. H. Chen; Mark Engel

The use of operational profiles and usage-based testing has received considerable attention recently in the software engineering literature. Testing under the actual operational profile can, however, be expensive, time consuming or even infeasible in situations where the performance of a system is dominated by infrequent but highly critical events. We consider a real application that deals with telecommunications network restoration after network failure caused by cuts in fibre optic cables. We use this application to demonstrate the usefulness of traditional accelerated testing methods to test and estimate software reliability. These methods, which have been extensively used in hardware reliability, have an important role to play in software reliability assessment as well.


Statistica Sinica | 1998

A STATISTICAL ASSESSMENT OF SOME SOFTWARE TESTING STRATEGIES AND APPLICATION OF EXPERIMENTAL DESIGN TECHNIQUES

Vijayan N. Nair; David A. James; Willa K. Ehrlich; J. Zevallos


Archive | 2010

Methods, Devices and Computer Program Products for Actionable Alerting of Malevolent Network Addresses Based on Generalized Traffic Anomaly Analysis of IP Address Aggregates

Willa K. Ehrlich; Ratna Chakka; Eric Fermon; David A. Hoeflin; Manuel Ortiz


Archive | 2008

System and Method for Detecting Remotely Controlled E-mail Spam Hosts

Danielle Liu; Willa K. Ehrlich; David A. Hoeflin; Anestis Karasaridis; Daniel F. Hurley


Archive | 2009

System and Method for Detecting Email Spammers

Danielle Liu; Willa K. Ehrlich; David A. Hoeflin; Anestis Karasaridis


Archive | 2013

Bot-Network Detection Based on Simple Mail Transfer Protocol (SMTP) Characteristics of E-Mail Senders Within IP Address Aggregates

Willa K. Ehrlich; David A. Hoeflin; Danielle Liu; Chaim Spielman; Stephen Wood


Archive | 2006

Method and apparatus for volumetric thresholding and alarming on internet protocol traffic

Myra E. Agostino; Willa K. Ehrlich; David Gross; Daniel F. Hurley; Jeanette Larosa; Carl Brian Rexroad


Archive | 2013

ANOMALY CORRELATION MECHANISM FOR ANALYSIS OF HANDOVERS IN A COMMUNICATION NETWORK

Willa K. Ehrlich; Zhi Cui; Duc Phan; Marcus Wright; Qinggang Zhou

Collaboration


Dive into the Willa K. Ehrlich's collaboration.

Researchain Logo
Decentralizing Knowledge