0% found this document useful (0 votes)
29 views41 pages

PDF Software Engineering Research and Practice 1st Edition Hamid R. Arabnia download

The document provides information about various ebooks available for download, including titles related to software engineering, education, and journalism. It also includes details about the 2017 International Conference on Software Engineering Research & Practice (SERP'17), highlighting its diverse participation and the peer-review process for submitted papers. Additionally, it acknowledges the contributions of various individuals and organizations involved in organizing the conference and the publication of its proceedings.

Uploaded by

ayzahallix3b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views41 pages

PDF Software Engineering Research and Practice 1st Edition Hamid R. Arabnia download

The document provides information about various ebooks available for download, including titles related to software engineering, education, and journalism. It also includes details about the 2017 International Conference on Software Engineering Research & Practice (SERP'17), highlighting its diverse participation and the peer-review process for submitted papers. Additionally, it acknowledges the contributions of various individuals and organizations involved in organizing the conference and the publication of its proceedings.

Uploaded by

ayzahallix3b
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Download the Full Version of the Ebook with Added Features ebookname.

com

Software Engineering Research and Practice 1st


Edition Hamid R. Arabnia

https://ebookname.com/product/software-engineering-research-
and-practice-1st-edition-hamid-r-arabnia/

OR CLICK HERE

DOWLOAD NOW

Download more ebook instantly today at https://ebookname.com


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Information and Knowledge Engineering 1st Edition Hamid R.


Arabnia

https://ebookname.com/product/information-and-knowledge-
engineering-1st-edition-hamid-r-arabnia-2/

ebookname.com

Information and Knowledge Engineering 1st Edition Hamid R.


Arabnia

https://ebookname.com/product/information-and-knowledge-
engineering-1st-edition-hamid-r-arabnia/

ebookname.com

Frontiers in Education Computer Science and Computer


Engineering 1st Edition Hamid R. Arabnia

https://ebookname.com/product/frontiers-in-education-computer-science-
and-computer-engineering-1st-edition-hamid-r-arabnia/

ebookname.com

Playing America s Game First Edition Adrian Burgos

https://ebookname.com/product/playing-america-s-game-first-edition-
adrian-burgos/

ebookname.com
Cinema 4D R14 Cookbook 2nd edition Simon Russell

https://ebookname.com/product/cinema-4d-r14-cookbook-2nd-edition-
simon-russell/

ebookname.com

The Invention of Journalism Ethics Second Edition The Path


to Objectivity and Beyond Stephen J.A. Ward

https://ebookname.com/product/the-invention-of-journalism-ethics-
second-edition-the-path-to-objectivity-and-beyond-stephen-j-a-ward/

ebookname.com

Long Non Coding RNAs in Cancer 1st Edition Alfons Navarro


(Editor)

https://ebookname.com/product/long-non-coding-rnas-in-cancer-1st-
edition-alfons-navarro-editor/

ebookname.com

Talk for Writing in the Early Years How to Teach Story and
Rhyme Involving Families 2 5 Years Pie Corbett

https://ebookname.com/product/talk-for-writing-in-the-early-years-how-
to-teach-story-and-rhyme-involving-families-2-5-years-pie-corbett/

ebookname.com

Fuel Processing for Fuel Cells 1. Auflage Edition Gunther


Kolb

https://ebookname.com/product/fuel-processing-for-fuel-
cells-1-auflage-edition-gunther-kolb/

ebookname.com
A Maritime Archaeology of Ships Innovation and Social
Change in Medieval and Early Modern Europe 1st Edition
Jonathan Adams.
https://ebookname.com/product/a-maritime-archaeology-of-ships-
innovation-and-social-change-in-medieval-and-early-modern-europe-1st-
edition-jonathan-adams/
ebookname.com
PROCEEDINGS OF
THE 2017 INTERNATIONAL CONFERENCE ON
SOFTWARE ENGINEERING RESEARCH & PRACTICE

Editors
Hamid R. Arabnia
Leonidas Deligiannidis, Fernando G. Tinetti

Associate Editors
Lamia Atma Djoudi, Ashu M. G. Solo

CSCE’17
July 17-20, 2017
Las Vegas Nevada, USA
americancse.org

©
CSREA Press
This volume contains papers presented at The 2017 International Conference on Software
Engineering Research & Practice (SERP'17). Their inclusion in this publication does not
necessarily constitute endorsements by editors or by the publisher.

Copyright and Reprint Permission

Copying without a fee is permitted provided that the copies are not made or distributed for direct
commercial advantage, and credit to source is given. Abstracting is permitted with credit to the
source. Please contact the publisher for other copying, reprint, or republication permission.

©
Copyright 2017 CSREA Press
ISBN: 1-60132-468-5
Printed in the United States of America
Foreword
It gives us great pleasure to introduce this collection of papers to be presented at the 2017 International
Conference on Software Engineering Research and Practice (SERP’17), July 17-20, 2017, at Monte Carlo
Resort, Las Vegas, USA.

An important mission of the World Congress in Computer Science, Computer Engineering, and Applied
Computing, CSCE (a federated congress to which this conference is affiliated with) includes "Providing a
unique platform for a diverse community of constituents composed of scholars, researchers, developers,
educators, and practitioners. The Congress makes concerted effort to reach out to participants affiliated
with diverse entities (such as: universities, institutions, corporations, government agencies, and research
centers/labs) from all over the world. The congress also attempts to connect participants from institutions
that have teaching as their main mission with those who are affiliated with institutions that have research
as their main mission. The congress uses a quota system to achieve its institution and geography diversity
objectives." By any definition of diversity, this congress is among the most diverse scientific meeting in
USA. We are proud to report that this federated congress has authors and participants from 64 different
nations representing variety of personal and scientific experiences that arise from differences in culture and
values. As can be seen (see below), the program committee of this conference as well as the program
committee of all other tracks of the federated congress are as diverse as its authors and participants.

The program committee would like to thank all those who submitted papers for consideration. About 65%
of the submissions were from outside the United States. Each submitted paper was peer-reviewed by two
experts in the field for originality, significance, clarity, impact, and soundness. In cases of contradictory
recommendations, a member of the conference program committee was charged to make the final decision;
often, this involved seeking help from additional referees. In addition, papers whose authors included a
member of the conference program committee were evaluated using the double-blinded review process.
One exception to the above evaluation process was for papers that were submitted directly to
chairs/organizers of pre-approved sessions/workshops; in these cases, the chairs/organizers were
responsible for the evaluation of such submissions. The overall paper acceptance rate for regular papers
was 26%; 20% of the remaining papers were accepted as poster papers (at the time of this writing, we had
not yet received the acceptance rate for a couple of individual tracks.)

We are very grateful to the many colleagues who offered their services in organizing the conference. In
particular, we would like to thank the members of Program Committee of SERP’17, members of the
congress Steering Committee, and members of the committees of federated congress tracks that have topics
within the scope of SERP. Many individuals listed below, will be requested after the conference to provide
their expertise and services for selecting papers for publication (extended versions) in journal special
issues as well as for publication in a set of research books (to be prepared for publishers including:
Springer, Elsevier, BMC journals, and others).

• Prof. Afrand Agah; Department of Computer Science, West Chester University of Pennsylvania, West
Chester, PA, USA
• Prof. Nizar Al-Holou (Congress Steering Committee); Professor and Chair, Electrical and Computer
Engineering Department; Vice Chair, IEEE/SEM-Computer Chapter; University of Detroit Mercy, Detroit,
Michigan, USA
• Prof. Hamid R. Arabnia (Congress Steering Committee); Graduate Program Director (PhD, MS, MAMS);
The University of Georgia, USA; Editor-in-Chief, Journal of Supercomputing (Springer); Fellow, Center of
Excellence in Terrorism, Resilience, Intelligence & Organized Crime Research (CENTRIC).
• Dr. Travis Atkison; Director, Digital Forensics and Control Systems Security Lab, Department of Computer
Science, College of Engineering, The University of Alabama, Tuscaloosa, Alabama, USA
• Prof. Dr. Juan-Vicente Capella-Hernandez; Universitat Politecnica de Valencia (UPV), Department of
Computer Engineering (DISCA), Valencia, Spain
• Prof. Kevin Daimi (Congress Steering Committee); Director, Computer Science and Software Engineering
Programs, Department of Mathematics, Computer Science and Software Engineering, University of Detroit
Mercy, Detroit, Michigan, USA
• Prof. Zhangisina Gulnur Davletzhanovna; Vice-rector of the Science, Central-Asian University, Kazakhstan,
Almaty, Republic of Kazakhstan; Vice President of International Academy of Informatization, Kazskhstan,
Almaty, Republic of Kazakhstan
• Prof. Leonidas Deligiannidis (Congress Steering Committee); Department of Computer Information Systems,
Wentworth Institute of Technology, Boston, Massachusetts, USA; Visiting Professor, MIT, USA
• Dr. Lamia Atma Djoudi (Chair, Doctoral Colloquium & Demos Sessions); Synchrone Technologies, France
• Prof. Mary Mehrnoosh Eshaghian-Wilner (Congress Steering Committee); Professor of Engineering
Practice, University of Southern California, California, USA; Adjunct Professor, Electrical Engineering,
University of California Los Angeles, Los Angeles (UCLA), California, USA
• Prof. Byung-Gyu Kim (Congress Steering Committee); Multimedia Processing Communications
Lab.(MPCL), Department of Computer Science and Engineering, College of Engineering, SunMoon
University, South Korea
• Prof. Louie Lolong Lacatan; Chairperson, Computer Engineerig Department, College of Engineering,
Adamson University, Manila, Philippines; Senior Member, International Association of Computer Science
and Information Technology (IACSIT), Singapore; Member, International Association of Online Engineering
(IAOE), Austria
• Dr. Vitus S. W. Lam; Senior IT Manager, Information Technology Services, The University of Hong Kong,
Kennedy Town, Hong Kong; Chartered Member of The British Computer Society, UK; Former Vice
Chairman of the British Computer Society (Hong Kong Section); Chartered Engineer & Fellow of the
Institution of Analysts and Programmers
• Dr. Andrew Marsh (Congress Steering Committee); CEO, HoIP Telecom Ltd (Healthcare over Internet
Protocol), UK; Secretary General of World Academy of BioMedical Sciences and Technologies (WABT) a
UNESCO NGO, The United Nations
• Prof. Dr., Eng. Robert Ehimen Okonigene (Congress Steering Committee); Department of Electrical &
Electronics Engineering, Faculty of Engineering and Technology, Ambrose Alli University, Nigeria
• Prof. James J. (Jong Hyuk) Park (Congress Steering Committee); Department of Computer Science and
Engineering (DCSE), SeoulTech, Korea; President, FTRA, EiC, HCIS Springer, JoC, IJITCC; Head of
DCSE, SeoulTech, Korea
• Prof. Dr. R. Ponalagusamy; Department of Mathematics, National Institute of Technology, India
• Prof. Abd-El-Kader Sahraoui; Toulouse University and LAAS CNRS, Toulouse, France
• Prof. Igor Schagaev; Director of ITACS Ltd, United Kingdom (formerly a Professor at London Metropolitan
University, London, UK)
• Dr. Akash Singh (Congress Steering Committee); IBM Corporation, Sacramento, California, USA;
Chartered Scientist, Science Council, UK; Fellow, British Computer Society; Member, Senior IEEE, AACR,
AAAS, and AAAI; IBM Corporation, USA
• Chiranjibi Sitaula; Head, Department of Computer Science and IT, Ambition College, Kathmandu, Nepal
• Ashu M. G. Solo (Publicity), Fellow of British Computer Society, Principal/R&D Engineer, Maverick
Technologies America Inc.
• Prof. Fernando G. Tinetti (Congress Steering Committee); School of CS, Universidad Nacional de La Plata,
La Plata, Argentina; Co-editor, Journal of Computer Science and Technology (JCS&T).
• Prof. Hahanov Vladimir (Congress Steering Committee); Vice Rector, and Dean of the Computer
Engineering Faculty, Kharkov National University of Radio Electronics, Ukraine and Professor of Design
Automation Department, Computer Engineering Faculty, Kharkov; IEEE Computer Society Golden Core
Member; National University of Radio Electronics, Ukraine
• Varun Vohra; Certified Information Security Manager (CISM); Certified Information Systems Auditor
(CISA); Associate Director (IT Audit), Merck, New Jersey, USA
• Dr. Haoxiang Harry Wang (CSCE); Cornell University, Ithaca, New York, USA; Founder and Director,
GoPerception Laboratory, New York, USA
• Prof. Shiuh-Jeng Wang (Congress Steering Committee); Director of Information Cryptology and
Construction Laboratory (ICCL) and Director of Chinese Cryptology and Information Security Association
(CCISA); Department of Information Management, Central Police University, Taoyuan, Taiwan; Guest Ed.,
IEEE Journal on Selected Areas in Communications.
• Prof. Layne T. Watson (Congress Steering Committee); Fellow of IEEE; Fellow of The National Institute of
Aerospace; Professor of Computer Science, Mathematics, and Aerospace and Ocean Engineering, Virginia
Polytechnic Institute & State University, Blacksburg, Virginia, USA
• Prof. Jane You (Congress Steering Committee); Associate Head, Department of Computing, The Hong Kong
Polytechnic University, Kowloon, Hong Kong
We would like to extend our appreciation to the referees, the members of the program committees of
individual sessions, tracks, and workshops; their names do not appear in this document; they are listed on
the web sites of individual tracks.

As Sponsors-at-large, partners, and/or organizers each of the followings (separated by semicolons)


provided help for at least one track of the Congress: Computer Science Research, Education, and
Applications Press (CSREA); US Chapter of World Academy of Science; American Council on Science &
Education & Federated Research Council (http://www.americancse.org/); HoIP, Health Without
Boundaries, Healthcare over Internet Protocol, UK (http://www.hoip.eu); HoIP Telecom, UK
(http://www.hoip-telecom.co.uk); and WABT, Human Health Medicine, UNESCO NGOs, Paris, France
(http://www.thewabt.com/ ). In addition, a number of university faculty members and their staff (names
appear on the cover of the set of proceedings), several publishers of computer science and computer
engineering books and journals, chapters and/or task forces of computer science associations/organizations
from 3 regions, and developers of high-performance machines and systems provided significant help in
organizing the conference as well as providing some resources. We are grateful to them all.

We express our gratitude to keynote, invited, and individual conference/tracks and tutorial speakers - the
list of speakers appears on the conference web site. We would also like to thank the followings: UCMSS
(Universal Conference Management Systems & Support, California, USA) for managing all aspects of the
conference; Dr. Tim Field of APC for coordinating and managing the printing of the proceedings; and the
staff of Monte Carlo Resort (Convention department) at Las Vegas for the professional service they
provided. Last but not least, we would like to thank the Co-Editors of SERP’17: Prof. Hamid R. Arabnia,
Prof. Leonidas Deligiannidis, and Prof. Fernando G. Tinetti.

We present the proceedings of SERP’17.

Steering Committee, 2017


http://americancse.org/
Contents
SESSION: TESTING AND RESILIENCE, TEST GENERATION METHODS, FORMAL
METHODS, BUG-FIXING TECHNIQUES AND SECURITY RELATED ISSUES

A Comparison of Strategies to Generate Test Requirements for Fail-Safe Behavior 3


Salah Boukhris, Ahmed Alhaddad, Anneliese Andrews

The Impact of Test Case Prioritization on Test Coverage versus Defects Found 10
Ramadan Abdunabi, Yashwant Malaiya

Behavior Driven Test Automation Framework 17


Ramaswamy Subramanian, Ning Chen, Tingting Zhu

Efficient Component Integration Testing of a Landing Platform for Vertical Take Off and 24
Landing UAVs
Anneliese Andrews, Aiman Gannous, Ahmed Gario, Matthew J. Rutherford

A Software Test Approach to Evaluate the Enforcement of a Workflow Engine 31


Laurent Bobelin, Christian Toinard, Tuan Hiep Tran, Stéphane Moinard

An Automated Approach for Selecting Bugs in Component-Based Software Projects 38


Georgenes Lima, Gledson Elias

Simple Promela Verification Model Translation Method based on Relative SysML State 45
Machine Diagrams
Bo Wang, Takahiro Ando, Kenji Hisazumi, Weiqiang Kong, Akira Fukuda, Yasutaka Michiura, Keita
Sakemi, Michihiro Matsumoto

Cybersecurity Practices from a Software Engineering Perspective 51


Aakanksha Rastogi, Kendall Nygard

A Sound Operational Semantics for Circus 56


Samuel Barrocas, Marcel Oliveira

Resilience Methods within the Software Development Cycle 62


Acklyn Murray, Marlon Mejias, Peter Keiller

SESSION: WEB-BASED TECHNOLOGIES AND APPLICATIONS + CLOUD


AND MOBILE COMPUTING
A Comparison of Server Side Scripting Technologies 69
Tyler Crawford, Tauqeer Hussain

The Architecture of a Ride Sharing Application 77


Mao Zheng, Yifan Gu, Chaohui Xu
An Automated Input Generation Method for Crawling of Web Applications 81
Yuki Ishikawa, Kenji Hisazumi, Akira Fukuda

The Application of Software Engineering to Moving Goods Mobile App 88


Katherine Snyder, Kevin Daimi

Support Environment for Traffic Simulation of ITS Services 98


Ryo Fujii, Takahiro Ando, Kenji Hisazumi, Tsunenori Mine, Tsuneo Nakanishi, Akira Fukuda

Publishing and Consuming RESTful Web API Services 104


Yurii Boreisha, Oksana Myronovych

SESSION: PROGRAMMING ISSUES AND ALGORITHMS + SOFTWARE


ARCHITECTURES AND SOFTWARE ENGINEERING + EDUCATION
Aesthetics Versus Entropy In Source Code 113
Ron Coleman, Brendon Boldt

KDD Extension Tool for Software Architecture Extraction 120


Mira Abboud, Hala Naja, Mourad Oussalah, Mohamad Dbouk

Version Control Open Source Software for Computer Science Programming Courses 127
Mesafint Fanuel, Tzusheng Pei, Ali Abu El Humos, Xuejun Liang, Hyunju Kim

Software Engineering Experience - Fraud Detection 131


Suhair Amer, Zirou Qiu

Determining Degree of Alignment of Undergraduate Software Engineering Program with 137


SWECOM
Massood Towhidnejad, Mouza Al Balooshi

Improving Cuckoo Hashing with Perfect Hashing 143


Moulika Chadalavada, Yijie Han

SESSION: AGILE DEVELOPMENT AND MANAGEMENT


IEEE 42010 and Agile Process - Create Architecture Description through Agile Architecture 149
Framework
Shun Chi Lo, Ning Chen

Implementation and Analysis of Autonomic Management SaaSEHR System 156


Nadir Salih, Tianyi Zang
SESSION: POSTER PAPERS
Enriching Information Technology Research for Each Video Contents Scene based on 165
Semantic Social Networking using Ontology-Learning
SungEn Kim, TaeGyun Lee, JaeDu Kim

Strategy Development on Disaster Information Integration System in High-rise Buildings in 167


Korea
Chunjoo Yoon, Changhee Hong

SW Test Automation System Implementation for Securing SW Quality and Stability 169
Cheol Oh Jeong, Byoung-Sun Lee, In Jun Kim, Yoola L. Hwang, Soojeon Lee

SESSION: LATE PAPERS - SOFTWARE ENGINEERING RESEARCH


Object Orientation: A Mathematical Perspective 173
Nelson Rushton

An Actor Model of Concurrency for the Swift Programming Language 178


Kwabena Aning, Keith Leonard Mannock

Performance Investigation of Deep Neural Networks on Object Detection 184


Oluseyi Adejuwon, Hsiang-Huang Wu, Yuzhong Yan , Lijun Qian
Int'l Conf. Software Eng. Research and Practice | SERP'17 | 1

SESSION
TESTING AND RESILIENCE, TEST GENERATION
METHODS, FORMAL METHODS, BUG-FIXING
TECHNIQUES AND SECURITY RELATED ISSUES

Chair(s)
TBA

ISBN: 1-60132-468-5, CSREA Press ©


2 Int'l Conf. Software Eng. Research and Practice | SERP'17 |

ISBN: 1-60132-468-5, CSREA Press ©


Int'l Conf. Software Eng. Research and Practice | SERP'17 | 3

A Comparison of Strategies to Generate Test Requirements for


Fail-Safe Behavior
Salah Boukhris1 , Ahmed Alhaddad1 , and Anneliese Andrews1
1 Department of Computer Science, University of Denver, Denver, CO, USA

Abstract— This paper compares the effectiveness and effi- work in model-based testing, testing fail-safe behavior and
ciency of generating test requirements for testing fail-safe use of Genetic Algorithms (GA) to find defects in software.
behavior with simulation experiments and case studies. The Section 3 explains the test generation process. Section 4
strategies to generate test requirements include genetic algo- explains the selection of fail-safe test requirements via GA
rithm (GA) and coverage criteria for failure scenarios. The and coverage criteria. Section 5 describes the simulation ex-
underlying testing method is based on a behavioral model periments. Section 6 compares the efficiency and effectiveness
and its test suite. The results show that test requirements of both types of strategies to determine test requirements on a
generated by a genetic algorithm (GA) are more efficient number of case studies. Section 7 discusses threats to validity.
for large search spaces. They are equally effective for the Section 8 draws conclusions.
two strongest coverage criteria. For small search spaces,
the genetic algorithm is less effective. The weakest coverage 2. Related Work
criteria is ineffective.
2.1 Model Based Testing (MBT)
Utting et al. [7] provide a survey on MBT. They define
1. Introduction six dimensions of MBT approaches (a taxonomy): model
An external failure is an undesirable event in the envi- scope, characteristics, paradigm, test selection criteria, test
ronment that affects system operation [1]. Examples include generation technology and test execution. Dias-Neto et al. [8]
hardware failures, sensor failures, or network outages. Ex- characterize 219 MBT techniques, discuss approaches sup-
ternal failures are not a result of faults in the software. porting the selection of MBT techniques for software projects,
External failures in safety-critical systems (SCSs) such as risk factors that may influence the use of these techniques in
medical devices, autonomous systems, many control systems, industry and their mitigation. Utting et al. [7] classify MBT
and some robots can cause loss of life, destruction of property notations as State Based, History Based, Functional, Oper-
or large financial losses. Even failures in web applications ational, Stochastic, and Transition based. Transition based
can result in losses of billions of dollars [2]. Testing external notations are graphical node-and-arc notations that focus on
failure mitigation is therefore important for many application defining the transitions between states of the system such as
domains. Andrews et al. [3] introduce a technique for testing variants of finite state machines (FSMs), extended finite state
proper external failure mitigation in safety-critical systems. machines (EFSMs), and communicating extended finite state
Unlike other approaches which integrate behavioral and fail- machines (CEFSMs). Examples of transition based notations
ure models, and then generate tests from the integrated model also include UML behavioral models (like activity diagrams,
[4], [5], they construct failure mitigation tests (F M T ) from an sequence and interaction diagrams), UML state charts, and
existing behavioral test suite that is generated from extended Simulink Stateflow charts [7]. Testing with FSM models has
finite state machines (EFSMs) [3], using an explicit mitigation a long history [9]–[13]. FSM-based test generation has been
model (M M ) for which they generate mitigation tests (M T ) used to test a large number of application domains.
which are then woven at selected failure points into the
original test suite to create failure-mitigation tests (F M T 2.2 Testing Fail-Safe Behavior
[6]) [3]. The possible combinations of failures and where An external failure is an undesirable event in the envi-
in the test suite they occur represent failure scenarios. Test ronment that affects system operation [1]. External failures
requirements state which of these failure scenarios need to are not a result of faults in the software. They can occur
be tested. Test requirements have been selected using failure because of physical (network and system domain) failures,
scenario coverage criteria [3] and a genetic algorithm (GA) or client error (user generated/Interaction). Sensor failure in
[6]. Neither [3] nor [6] evaluate their approach with respect to a safety critical system is an example of a physical failure.
effectiveness and efficiency, nor do they compare under which One strategy for testing fail-safe behavior alongside functional
circumstances coverage criteria may be preferable over GA. behavior is to integrate fault models with behavioral models:
This paper reports on a series of simulation experiments and [4], [14] integrate State Charts and Fault Trees (FTs), while
case studies that compare the two strategies with respect to [15] integrates UML State Diagrams and FTs for safety
effectiveness and efficiency. analysis but not for testing. These approaches have a variety of
The paper is organized as follows: Section 2 describes related limitations and challenges, including: (1) possible mismatches

ISBN: 1-60132-468-5, CSREA Press ©


4 Int'l Conf. Software Eng. Research and Practice | SERP'17 |

between notations and terminologies used in the FT vs. the


behavioral model; (2) potential scalability problems when
multiple or large FTs exist or a fault can occur in a large
portion of behavioral states; (3) they cannot leverage an
existing behavioral test suite; and (4) there is no formal
mitigation model.

2.3 Genetic Algorithms and Software Testing


Ali et al. [16] analyze the use and results of search-based
algorithms in test generation, including Genetic Algorithms
(GA). The majority of techniques (78%) have been applied
at the unit level and do not target specific external faults, but
focus on structural coverage criteria. By contrast, the goal
of fail-safe mitigation test requirements is to target specific Fig. 1
external fault types and to test at various points of the test T EST G ENERATION P ROCESS [ ADAPTED FROM [6] AND [3]]
suite whether mitigation of external faults works properly. coverage criteria (M C) are used to create mitigation tests
Berndt and Watkins [17] and Watkins et al. [18] introduce a (MT). A State Event Matrix (SE) determines which failure
multi-objective fitness function that changes based on results types are possible in which behavioral states. This matrix
from previous testing cycles, i. e. the fitness function changes and the test suite BT are then used in both techniques
as the population evolves, based on the knowledge gained to identify fail-safe testing requirements: either through a
from prior generations (the “fossil record”). Individuals are heuristic search (GA) or coverage criteria (CC). The failure
rewarded based on novelty, proximity, and severity. Boukhris mitigation test (F M T ) is then created based on selecting an
et al. [6] used a similar strategy to select failure scenarios that appropriate mitigation test and weaving it into the behavioral
explore the search space for novel failure scenarios, prospect test according to weaving rules. The next sections describes
in the larger vicinity of found mitigation defects, and mine the selection of test requirements in more detail.
for further mitigation defects in the immediate vicinity.

3. Approach 4. Selection of Test Requirements


The fail-safe test generation process for both techniques Let F = {f1 , ..., fm } be the failure types, and S =
(coverage criteria (CC) [3] and Genetic Algorithm (GA) [6]) {s1 , ..., sn } be the behavioral states. Failures may not be
consists of five steps (see Figure 1): applicable in all behavioral states. We express this in a State-
1) Generating test cases from the behavioral model. Event matrix:

2) Identifying external failure events and their required 1, if failure type j applies in node i in S
mitigation. SE(i, j) =
0 otherwise.
3) Generating test requirements (i.e. selecting external
Andrews et al. [3], [6] encode the test suite as a whole. They
failure types and position in the test suite where the
do so by concatenating the test paths in the test suite. Let
failure is to be applied either via GA [6] or Cover-
BT={t1 , t2 , ..., tl } be the behavioral test suite. l is the number
age Criteria CC [3]). Evaluating and comparing the
of test paths. Then CT= t1 ◦t2 ◦t3 . . . tl is the concatenated test
efficiency and effectiveness of generating the fail-safe
path. Let I =Len(CT). Let |F | be the number of failure types.
test requirements via coverage criteria or GA is not
Let node(p) be the index of the state in S at position p. Then
addressed in [3], [6] and is the core contribution of
PE={(p, e)|1 ≤ p ≤ I, 1 ≤ e ≤ |F |, SE(node(p), e) = 1}
this paper.
represents all possible failure scenarios. Both GA and CC
4) Generating mitigation tests from the mitigation models
select (p, e) pairs to build safety/failure mitigation tests. The
5) Applying weaving rules at the points of failure in the
GA uses PE as the search space, while CC imposes coverage
behavioral test suite to generate failure mitigation tests
criteria on it. For example, assume the test paths in rows 1
(FMT).
and 2 of Table 2 for a behavioral model with 8 states and
The failure mitigation test process assumes that a technique three failure types. Table 1 shows a state-event matrix for
for testing required functionality exists via a behavioral this example. Table 2 shows CT in row 2. PE is defined by
model (BM ), associated behavioral testing criteria (BC), the entries in the matrix that are marked ’1’.
and a behavioral test suite (BT ). Boukhris et al. [6] uses Table 1
an existing web application MBT approach, FSMWeb [19]. S TATE -E VENT (SE) M ATRIX
Both [3] and [6] assume that system requirements exist that
F/S s1 s2 s3 s4 s5 s6 s7 s8
identify types of failure events and any required mitigation
f1 1 1 1 1 1 1 1 1
actions, e.g via hazard and risk analysis [20]. This is used to f2 0 0 0 0 1 1 1 1
build failure mitigation models (M M ) for which mitigation f3 0 0 0 0 1 1 1 1

ISBN: 1-60132-468-5, CSREA Press ©


Int'l Conf. Software Eng. Research and Practice | SERP'17 | 5

Table 2
4.1 Selection of Test Requirements Using a GA C1: A LL P OSITIONS , A LL A PPLICABLE FAILURES

Boukhris et al. [6] used the defect potential of an individual t1 t2 t3


(p, e) for selecting the initial population, as it is more effective F\S s1 s1 s2 s2 s3 s3 s4 s4 s1 s1 s2 s5 s6 s1 s2 s3 s4 s7 s8 s5
than random selection. Test results are recorded in the fossil f1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
record (FR). A fossil record entry is a triplet (p, e, d) where f2 1 1 1 1 1
(p, e) is a test requirement from a given generation and d is f3 1 1 1 1 1
a boolean value that is 1 if a mitigation defect was found
through the test requirement and 0 if it was not. The fitness (only one failure per node, but covering all failures).
function uses this information. First, the fitness function is Collectively, all failures must be paired with a node at least
using the novelty (S) of an individual (p, e). It is computed once, but not with each selected node as in criteria 2. Criteria
as the Euclidean distance from each new individual to each 3 can be met with 8 pairs: (1,1), (1,3), (1,6), (1,7), (1,12),
entry in the current fossil record. The second part of the fitness (1,18), (2,13), and (3,13).
function uses proximity (R) of individuals to individuals with
known mitigation defects. R is calculated as the distance for
the new individual from all individuals in the fossil record 5. Experiment Design and Results
that triggered a defect.
q We built a simulator to compare the effectiveness and
P (pc −p)2 (ec −e)2
R(pc , ec ) = length(I) + |F | efficiency of test requirements generated by GA and the three
(p,e,1)∈F Rd
coverage criteria. More test requirements lead to more tests.
where p, and e are the position and failure type in the We can hence measure the efficiency by the number of test
fossil record that triggered a mitigation defect. F Rd = requirements generated. We measure the effectiveness of a test
{(p, e, 1)|(p, e, 1) ∈ F R and (p,e) found mitigation defect} requirement by whether the test(s) generated from it detected
After executing the test cases associated with a given individ- a mitigation defect.
ual (p, e), R is computed as follows:
 5.1 Simulator
R(pc , ec ) if (pc , ec ) found a defect;
R= 1 We extended the simulator in Boukhris et al. [6]1 . The
R(pc ,ec ) Otherwise.
simulator takes the following independent variables as input:
The overall fitness function is: Test suite size (I), Failure types (F) Mitigation defect density
(D), Applicability level (AL)(percentage of “1” entries in the
F itness = (ws × S 1.5 )2 × (wr × R1.5 )2
state-event matrix), Duplication factor (DF). This variable is
where ws is a weight for exploration and wr is a weight for defined as DF = I/|S|. that is, the length of the concatenated
prospecting and mining. Crossover between two individuals test suite divided by the number of states in the behavioral
(p1 , e1 ) and (p2 , e2 ) creates new individuals (p1 , e2 ) and model. It computes the average number of times a state occurs
(p2 , e1 ) based on a defined crossover rate. An individual in CT, and Type of (p,e) pair (test requirement) generation.
(p, e) is mutated to (p0 , e) based on a given mutation rate. Currently the simulator supports the following approaches:
The algorithm removes duplicates and infeasible pairs.The GA, Random, and coverage criteria C1-C3. The first two
procedure ends when no new generations can be found. variables describe the problem size and characteristics. I and
Boukhris et al. [6] showed that the GA approach is superior F determine the size of the search space. The mitigation
to random generation of test requirements. defect density is used to determine how many mitigations are
defective. These are marked with (d), so it can be determined
4.2 Selection of Test Requirements Using Cov- later whether a selected (p,e) pair uncovers a mitigation defect
erage Criteria or not. The applicability level is used to determine the number
Coverage criteria are attractive, since they allow for of ’1’ in the state event matrix which is generated next. Using
systematic algorithmic generation of failure scenarios. We the duplication factor, the simulator determines the number of
evaluate these criteria in section 6. Andrews et al. [3] defined states in the behavioral model and generates a concatenated
the following coverage criteria. test suite. The simulator selects one or more of the (p,e)
Criteria 1 (C1): All combinations, i.e. all positions p, pair generation approaches and determines the set of test
all applicable failure types e (test everything). C1 requires requirements ((p,e) pairs). Then it determines whether or not
testing all (p,e) pairs that are marked with a ”1” in Table 2. they found a defect and computes defect coverage. We use
Criteria 2 (C2): All tests, all unique nodes, all applicable the following dependent variables:
failures. Here we require that when unique nodes need to • Test requirements ((p,e) pairs) and their number
be covered they are selected from tests that have not been • The set of mitigation defects found and their number
covered. Table 2 shows (p, e) pairs marked ’1’ in gray that • The percentage of mitigation defects found.
meet C2 for the example.
Criteria 3 (C3): All tests, all unique nodes, some failures 1 Note that [6] does not account for duplication factor (DF).

ISBN: 1-60132-468-5, CSREA Press ©


Another Random Scribd Document
with Unrelated Content
Lake Placid, New York. As a slight testimonial of my confidence and
admiration, I hereby appoint you to represent the Old North State at
that meeting, and your expenses shall be paid from the public
purse.”
“The boys wish to see your excellencies before they leave,” said
Collins when he had acknowledged the governor’s compliment; and
as he spoke the sound of great cheering broke through the windows,
and Mrs. Atchison promptly rose and led the way to the broad
terraces which were now gay with coloured lanterns.
“Speech! speech!” cried the corps of correspondents. Then Ardmore
seized Governor Osborne’s hand and led him forward to the
balustrade; but before the governor of South Carolina could speak,
the group of newspaper men began chanting, in the manner of a
college antiphonal:
What did he say to you?
What did he say to you?
What did who say?
What did the governor of North Carolina
SAY
To the governor of South Carolina?
“Gentlemen,” began Governor Osborne, speaking with great
deliberation, “I am profoundly touched by the cordiality of your
greeting. (Applause.) Amid the perplexities of my official life I am
deeply sensible always of the consideration and generosity of our
free and untrammelled American press. (Cheers.) Without your
support and approval, my best aims, my sincerest endeavours in
behalf of the people, must fall short and fail of their purpose. (A
voice: You’re dead right about that.) I am proud of this opportunity to
greet this most complimentary delegation of men distinguished in the
noble profession of which Greeley, Raymond, and Dana were the
high ornaments. (Cheers.) I look into your upturned faces as into the
faces of old friends. But I dare not—(A voice: Oh, don’t be afraid,
Governor!)—I dare not take too personally this expression of your
good-will. It is not myself but the great state of South Carolina that
you honour, and on behalf of mine own people, who have always
stood sturdily for the great principles of the constitution (Cheers);
who have failed in no hour of the country’s need, but have tilled their
fields in peace and defended them in the dark days of war, I thank
you, my friends, with all my heart, again and again.” (Applause and
cheers.)
What did you say to him?
What did you say to him?
What did who say?
What did the governor of North Carolina
SAY
To the governor of South Carolina?
“On an occasion so purely social as this,” began Governor
Dangerfield, balancing himself lightly upon the balustrade, “it would
be most indelicate for me to discuss any of the great issues of the
day. (A voice: Oh, I don’t know!) I endorse, with all the strength of my
being, and with all the sincerity of which my heart is capable, the
stirring tribute paid to your noble profession by my friend, known far
and near, and justly known, as the great reform governor of South
Carolina. (Cheers.) I am proud that the American press is
incorruptible. (Cheers.) Great commercial nation though we be, the
American newspaper—the American newspaper, I say, is one thing
that is never for sale. (Applause and cheers.) The temptation is
strong upon me to take advantage of this gathering of representative
journalists to speak—not of the fathers of the constitution, not of
Jefferson or Jackson, but of living men and living issues (Cheers and
cries of Let ’er go!); but the hour is late (A voice: Oh, not on
Broadway, William!) and, to repeat, it would be the height of
impropriety—a betrayal of the bountiful hospitality we have all
enjoyed (A voice: Our lobster was all right. Another voice, with
ironical inflection: This lobster is all right!), a betrayal, I say, of
hospitality for me to do more, gentlemen, than to thank you, and to
say that in your strong hands the liberties of the people are safe
indeed.” (Prolonged cheering.)
As the correspondents marched away to take the special train
provided for them at Kildare by Ardmore, they continued to cheer,
and they were still demanding, as long as their cries could be heard
at Ardsley:
What did he say to him?
What did he say to him?
What did who say?
What did the governor of North Carolina
SAY
To the governor of South Carolina?
With a sigh Ardmore left them at the great gates of Ardsley and
returned to the house to find Jerry; but that young woman was the
centre of a wide circle of admiring militia officers, and the master of
Ardsley was so depressed by the spectacle that he sought a dim
corner of the grounds where there was a stone bench by a fountain,
and there, to his confusion, he beheld Miss Barbara Osborne and
Henry Maine Griswold; and Miss Osborne, it seemed, was in the act
of fastening a white rose in Professor Griswold’s coat.
CHAPTER XXI.
GOOD-BYE TO JERRY DANGERFIELD.

The next morning Ardmore knocked at Griswold’s door as early as


he dared, and went in and talked to his friend in their old intimate
fashion. The associate professor of admiralty was shaving himself
with care.
“You won’t have any hard feelings about that scarlet fever business,
will you, Grissy? It was downright selfish of me to want to keep the
thing to myself, but I thought it would be fun to go ahead and carry it
through and then show you how well I pulled it off.”
“Don’t ever refer to it again, if you love me,” spluttered Griswold
amiably, as he washed off the lather. “I, too, have ruled over a
kingdom, and I have seen history in the making, quorum pars magna
fui.”
“But I say, Grissy, there is such a thing as fate and destiny and all
that after all; don’t you believe it?”
“Don’t I believe it! I know it!” thundered Griswold, reaching for a
towel. He lifted a white rose from a glass of water where it had spent
the night, and regarded it tenderly. “The right rose under the right
star, and the thing’s done; the rose, the star, and the girl—the
combination simply can’t be beat, Ardy.”
Ardmore seized and wrung his friend’s hand for the twentieth time;
but he was preoccupied, and Griswold, fastening his collar at the
mirror, hummed softly the couplet:
With the winking eye
For my battle-cry.
“Grissy!” shouted Ardmore, “she never did it!”
“Oh—bless my soul, what was I saying! Why, of course she wasn’t
the one! Not Miss Dangerfield—never!”
“Well, you like her, don’t you?” demanded Ardmore petulantly.
“Of course I like her, you idiot! She’s wonderful. She’s——”
He frowned upon the scarf he had chosen with much care, snapped
it to shake the wrinkles out, humming softly, while Ardmore glared at
him.
“She’s wise,” Griswold resumed, “with the wisdom of laughter—
accept that, with my compliments. It’s not often I do so well before
breakfast. And now if you’re to be congratulated before I go back to
the groves of Academe, pray bestir yourself. At this very moment I
have an engagement to walk with a lady before breakfast—thanks,
yes, that’s my coat. Good-bye!”
Breakfast was a lingering affair at Ardsley that morning. The two
governors and the national guard officers who had spent the night in
the house were not in the slightest hurry to break up the party, for
such a company, they all knew, could hardly be assembled again.
The governors were a trifle nervous as to the attitude of the press, in
spite of Collins’s efforts to dictate what history should say of the affair
on the Raccoon; but before they left the table the Raleigh morning
papers were brought in, and it was clear that the newspaper men
were keeping their contract.
“I congratulate you, Dangerfield,” said Governor Osborne. “I only
hope that the Columbia and Charleston papers have done half as
well by me.”
Both governors had decided upon an inspection of such portions of
their militia as were assembled on the Raccoon, and a joint dress
parade was appointed for six o’clock.
Ardmore, anxious to make every one at home, saw the morning pass
without a chance to speak to Jerry; and when he was free shortly
before noon he was chagrined to find that she had gone for a ride
over the estate with her father, Governor Osborne, Barbara, and
Griswold. He went in pursuit, and to his delight found her presently
sitting alone on a log by the Raccoon, having dismounted, it
appeared, to rescue a fledgling robin whose cries had led her away
from her companions. She pointed out the nest, and directed him to
climb the tree and restore the bird. This done, he sat down beside
her at a point where the Raccoon curved sweepingly and swung off
abruptly into a new course.
“I hope your father didn’t scold you for anything we did,” he began
meekly.
“No; he took it all pretty well, and promised that if I wouldn’t tell
mamma what he had been doing—about coming down here with
Governor Osborne just to settle an old score at poker—mamma
doesn’t approve of cards, you know—that he would make me a
present of a better riding horse than the one I now have, and he
might even consider a trip abroad next summer.”
“Oh, you mustn’t go abroad! It’s—it’s so lonesome abroad!”
“How perfectly ridiculous! Has it never occurred to you that I am
never lonesome, not even when I’m alone?”
“Well,” said Ardmore, who saw that he was headed for a blind alley,
“I’m glad your father was not displeased with our work.”
“He’ll think we did pretty well after he’s read our correspondence in
his letter books. I told him the stamp we stamped his name with
worked better with the red ink pad than with the black one, which
ought, at any rate, to be clear enough to a man of papa’s
intelligence.”
“Did you tell him about that railroad lawyer from New York who
wanted to suppress the law which compels all locomotive whistles to
be tuned to E flat?”
“No; that man sent me a ten-pound box of candy, which was highly
improper, considering papa’s position, and I should have scorned to
accept the candy, only I had forgotten to keep his card.”
“And besides,” added Ardmore gently, “you had eaten the candy.
Don’t you remember that you left nothing but a few burnt almonds
which you wanted to keep for eating filapenas?”
“Don’t be silly!” ejaculated Jerry contemptuously.
“It’s a good thing all this fuss about the Appleweight people is over,
or I should be worse than silly. My mind was not intended for such
heavy work.”
“I think you have a good mind, Mr. Ardmore,” said Jerry, with the air
of one who makes concessions. “You really did well in all these
troubles, and you did much better than I thought you would the day I
hired you for private secretary. I think I could safely recommend you
to any governor in need of assistance.”
“You talk as though you were getting ready to discharge me,” said
Ardmore plaintively, “and I don’t want to lose my job.”
“You ought to have something to do,” said Jerry thoughtfully. “As
near as I can make out you have never done anything but study
about pirates and collect pernicious books on the sinful life of
Captain Kidd. You should have some larger aim in life than that, and
I think I know of a good position that is now open, or will be as soon
as papa has cleared out the peanut shells we left in his desk. I think
you would make an excellent adjutant-general with full charge of the
state militia. You have already had experience in the handling of
troops, and as Rutherford Gillingwater never did anything but get
typhoid fever to earn the place, I see no reason why papa should not
appoint you to the position.”
“But you have to get rid of Gillingwater first,” suggested Ardmore, his
heart beating fast.
“If you mean that he has to be removed from office, I will tell you
now, Mr. Ardmore, that Rutherford Gillingwater will no longer sign
himself adjutant-general of North Carolina. I removed him myself in a
general order I wrote yesterday afternoon just before I told papa that
you and I could not act as governor any longer, but that he must
resume the yoke.”
“But that must have been a matter of considerable delicacy, Miss
Dangerfield, when you consider that you are engaged to marry Mr.
Gillingwater.”
“Not in the least,” said Jerry. “I broke our engagement the moment I
saw that he came here the other night all dressed up to eat and not
to fight, and he is now free to engage himself to that thin blonde at
Goldsboro whom he thinks so highly intellectual.”
Jerry held up her left hand and regarded its ringless fingers judicially,
while Ardmore, his heart racing hotly against all records, watched
her, and with a particular covetousness his eyes studied that trifle of
a hand.
Then with a quick gesture he seized her hand and raised her gently
to her feet.
“Jerry!” he cried. “From the moment you winked at me I have loved
you. I should have followed you round the world until I found you. If
you can marry a worthless wretch like me, if—O Jerry!”
She gently freed her hand and stepped to one side, bending her
head like a bird that pauses alarmed, or uncertain of its
whereabouts, glancing cautiously up and down the creek.
“Mr. Ardmore,” she said, “you may not be aware that when you
asked me to be your wife—and that, I take it, was your intention—
you were standing in South Carolina, while I stood with both feet on
the sacred soil of the Old North State. Under the circumstances I do
not think your proposal is legal. Moreover, unless you are quite
positive which eye it was that so far forgot itself as to wink, I do not
think the matter can go further.”
The slightest suggestion of a smile played about her lips, but he was
very deeply troubled, and seeing this, her eyes grew grave with
kindness.
“Mr. Ardmore, if your muscles of locomotion have not been utterly
paralyzed, and if you will leave that particular state of the Union
which, next to Massachusetts, I most deeply abhor, I will do what I
can in my poor weak way—as father says in beginning his best
speeches—to assist you to the answer.”
Then for many æons, when he had his arms about her, a kiss, which
he had intended for the lips that were so near, somehow failed of its
destination, and fell upon what seemed to him a rose-leaf gone to
Heaven, but which was, in fact, Jerry Dangerfield’s left eye. His
being tingled with the most delicious of intoxications, to which the
clasp of her arms about his neck added unnecessary though not
unwelcome delight. Then she drew back and held him away with her
finger-tips for an instant.
“Mr. Thomas Ardmore,” she said, with maddening deliberation, “it
may not be important, but I must tell you in all candour that it was the
other eye.”
THE END.
LIBRARY
OF COPYRIGHT FICTION.
POPULAR editions of recent novels in
library-style binding, uniform with
this volume.

58. LADY ROSE’S DAUGHTER. Mrs. H. Ward.


57. THE PRIMROSE PATH. Mrs. Oliphant.
56. THOMPSON’S PROGRESS. C. J. Cutcliffe Hyne.
LONELY LADY OF GROSVENOR
55. Mrs. H. de la Pasture.
SQUARE.
54. LOVE AND MR. LEWISHAM. H. G. Wells.
53. CLARISSA FURIOSA. W. E. Norris.
52. CYNTHIA’S WAY. Mrs. A. Sidgwick.
51. RAFFLES. E. W. Hornung.
50. THE FOOD OF THE GODS. H. G. Wells.
49. FRENCH NAN. A. and E. Castle.
48. SPRINGTIME. H. C. Bailey.
47. MOONFLEET. J. Meade Falkner.
46. KIPPS. H. G. Wells.
45. THE GATELESS BARRIER. Lucas Malet.
44. MAJOR VIGOUREUX. “Q.”
43. OLD GORGON GRAHAM. G. H. Lorimer.
42. MRS. GALER’S BUSINESS. W. Pett Ridge.
HOUSE WITH THE GREEN
41. George Douglas.
SHUTTERS.
40. SELAH HARRISON. S. Macnaughtan.
39. MARCELLA. Mrs. Humphry Ward.
38. HIS HONOR AND A LADY. S. J. Duncan.
37. THE DUENNA OF A GENIUS. M. E. Francis.
36. OWD BOB. Alfred Ollivant.
35. EIGHT DAYS. R. E. Forrest.
34. LADY AUDLEY’S SECRET. Miss Braddon.
33. THE WAGES OF SIN. Lucas Malet.
32. AN ADVENTURER OF THE NORTH. Sir Gilbert Parker.
31. THE PIT. Frank Norris.
30. MONSIEUR BEAUCAIRE. Booth Tarkington.
29. WOODSIDE FARM. Mrs. W. K. Clifford.
28. RECIPE FOR DIAMONDS. C. J. Cutcliffe Hyne.
27. A LAME DOG’S DIARY. S. Macnaughtan.
26. MAN FROM AMERICA. Mrs. H. de la Pasture.
25. SIR JOHN CONSTANTINE. “Q.”
C. N. and A. M.
24. THE PRINCESS PASSES.
Williamson.
23. WHITE FANG. Jack London.
22. THE OCTOPUS. Frank Norris.
21. TRANSLATION OF A SAVAGE. Sir G. Parker.
20. MATTHEW AUSTIN. W. E. Norris.
19. THE ODD WOMEN. George Gissing.
18. THE LADY OF THE BARGE. W. W. Jacobs.
17. THE GOD IN THE CAR. Anthony Hope.
16. THE HOSTS OF THE LORD. Mrs. F. A. Steel.
15. HIS GRACE. W. E. Norris.
14. THE AMERICAN PRISONER. Eden Phillpotts.
13. IF YOUTH BUT KNEW! A. and E. Castle.
12. CLEMENTINA. A. E. W. Mason.
11. JOHN CHARITY. H. A. Vachell.
10. THE KING’S MIRROR. Anthony Hope.
9. DAVID GRIEVE. Mrs. Humphry Ward.
8. INCOMPARABLE BELLAIRS. A. and E. Castle.
7. QUISANTÉ. Anthony Hope.
6. NO. 5 JOHN STREET. Richard Whiteing.
5. ROBERT ELSMERE. Mrs. Humphry Ward.
4. BATTLE OF THE STRONG. Sir Gilbert Parker.
THE FORTUNE OF CHRISTINA
3. S. Macnaughtan.
M’NAB.
2. INTRUSIONS OF PEGGY. Anthony Hope.
1. THE MARRIAGE OF WILLIAM ASHE. Mrs. Humphry Ward.
Others in the Press. A new volume appears on the first and third
Wednesdays of each month.
THOMAS NELSON AND SONS,
And at all Booksellers and Bookstalls.
TRANSCRIBER’S NOTES:
Obvious typographical errors have been corrected.
Inconsistencies in hyphenation have been
standardized.
Archaic or variant spelling has been retained.
The cover image for this eBook was created by the
transcriber using the original cover as the background
and is entered into the public domain.
*** END OF THE PROJECT GUTENBERG EBOOK THE WAR OF
THE CAROLINAS ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookname.com

You might also like