CN100382077C - Lawful testing method of cocurrent unit of flow chart - Google Patents

Lawful testing method of cocurrent unit of flow chart Download PDF

Info

Publication number
CN100382077C
CN100382077C CNB2004100212694A CN200410021269A CN100382077C CN 100382077 C CN100382077 C CN 100382077C CN B2004100212694 A CNB2004100212694 A CN B2004100212694A CN 200410021269 A CN200410021269 A CN 200410021269A CN 100382077 C CN100382077 C CN 100382077C
Authority
CN
China
Prior art keywords
node
concurrent
traversal
next adjacent
reverse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100212694A
Other languages
Chinese (zh)
Other versions
CN1680936A (en
Inventor
王可万
纪勇
刘积仁
袁淮
赵宏
赵大哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
DONGRUAN GROUP Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DONGRUAN GROUP Co Ltd filed Critical DONGRUAN GROUP Co Ltd
Priority to CNB2004100212694A priority Critical patent/CN100382077C/en
Publication of CN1680936A publication Critical patent/CN1680936A/en
Application granted granted Critical
Publication of CN100382077C publication Critical patent/CN100382077C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a legitimacy test method for concurrent units of a workflow flowchart, which examines an illicitly export, an illegal entry and skips between concurrent branches of the concurrent unit by flexibly combining a first deep search algorithm of an application chart. Specifically, a data structure adopts a forward adjacency list and a reverse adjacency list; the forward adjacency list is used when the illicitly export is checked, the reverse adjacency list is used when the illegal entry is checked, and the two adjacency lists are respectively used when the skips between the concurrent branches are checked. The present invention examines the illicitly export, the illegal entry and the skips between concurrent branches of the concurrent unit by flexibly combining the first deep search algorithm of an application chart.

Description

The legitimacy method of calibration of the concurrent unit of work process flow figure
Technical field
The invention belongs to the Workflow system technology, the legitimacy method of inspection of the concurrent unit of specifically a kind of work process flow figure.
Technical background
In the graphic process defining tool of Workflow system, defined process flow diagram must be legal, and illegal works stream engine can't be explained, thereby also with regard to the operation of uncontrollable flow instance, unpredictable mistake can occur in the circulation process.Flow instance can not just can not be realized user's intended target according to user's expection operation.People can make all restrictions and guarantee its correctness when drawing process flow diagram, but it is impossible sometimes making such restriction, and it is random being figure usually, and the legitimacy of process flow diagram just can not guarantee like this.Prior art is often come the correctness of inspection process by dry run, but the simulation need expend plenty of time and resource, and exhaustive all possible ruuning situation be very the difficulty, so need carry out verification to the legitimacy of process flow diagram.
The legitimacy verification of concurrent unit is the important ring in the legitimacy verification of process flow diagram.The verification of concurrent unit mainly contains two aspects: the one, and the closure of concurrent unit, promptly can only there be outlet of an inlet a concurrent unit; The one, the alternative between each concurrent branch promptly can not enter another concurrent branch by a concurrent branch.Check the legitimacy of concurrent unit must be able to check out redirect between illegal outlet, illegal entry and each concurrent branch of concurrent unit.Legitimacy verification to concurrent unit has been arranged, guaranteed the correctness of concurrent unit in the process flow diagram, could guarantee the expectation true(-)running of flow instance according to the user.Yet the legitimacy verification to concurrent unit does not at present also appear in the newspapers.
Summary of the invention
The purpose of this invention is to provide a kind of correctness that can guarantee concurrent unit in the process flow diagram, flow instance the legitimacy method of inspection according to the concurrent unit of work process flow figure of user's expectation true(-)running.
To achieve these goals, technical solution of the present invention is as follows:
Check the redirect between illegal outlet, illegal entry and each concurrent branch of concurrent unit by the dark searching algorithm of the elder generation that makes up utilization figure flexibly; Be specially: its data structure adopts forward, reverse two adjacency lists; Wherein: when the illegal outlet of check, use the forward adjacency list, when the check illegal entry, use reverse adjacency list, when the redirect of checking between concurrent branch, use two adjacency lists respectively, use the forward adjacency list during forward lookup, use reverse adjacency list during reverse search.
When illegal outlet of check and illegal entry, each node needs corresponding Search Flags, when the redirect of checking between concurrent branch, each node needs corresponding two Search Flags, and use forward sign is represented forward lookup and used reverse sign to represent reverse search.
The step of the illegal outlet of check is: a concurrent unit has only outlet of an inlet, concurrent start node is its inlet, concurrent end node is its outlet, carry out the dark search of elder generation from concurrent start node, to corresponding concurrent end node, when before arriving concurrent end node, just having arrived leaf node (not going out the limit) or having got back to concurrent start node, show that there is illegal outlet in concurrent unit; Be specially: 1) whole process flow diagram is created a forward adjacency list; 2) each concurrent start node V carries out following steps in the forward adjacency list:
A) the Search Flags f of each node correspondence in the forward adjacency list is changed to 0;
B) set out by concurrent start node V and call forward traversal substep and travel through.
Described forward traversal substep is: at first the Search Flags f of traversal start node V0 is made as 1; Judge then whether traversal start node V0 also has next adjacent node; If any next adjacent node, if the next adjacent node of traversal start node V0 is V2, again described next adjacent node V2 is made the following judgment:, continue to judge whether traversal start node V0 also has next adjacent node 1) if the next adjacent node V2 of traversal start node V0 is the concurrent end node V1 of concurrent start node V correspondence; 2), continue to judge whether traversal start node V0 also has next adjacent node if the Search Flags f of the next adjacent node V2 of traversal start node V0 is 1; 3) if the next adjacent node V2 of traversal start node V0 is concurrent start node V, there is illegal outlet then concurrent unit, prints traverse path, continues to judge whether traversal start node V0 also has next adjacent node; 4) if the next adjacent node V2 of traversal start node V0 is leaf node (not going out the limit), there is illegal outlet then concurrent unit, prints traverse path, continues to judge whether traversal start node V0 also has next adjacent node; 5) other situation recursive call forward traversal substep is then set out by the next adjacent node V2 of traversal start node V0 and to proceed traversal.
The step of check illegal entry is: a concurrent unit has only outlet of an inlet, concurrent start node is its inlet, concurrent end node is its outlet, carrying out reverse elder generation from concurrent end node searches for deeply, to arriving corresponding concurrent start node, if before arriving concurrent start node, just arrived root node (not going into the limit) or got back to concurrent end node, shown that then there is illegal entry in concurrent unit; Concrete steps are: at first whole process flow diagram is created a reverse adjacency list; Then each concurrent end node V1 in the reverse adjacency list is carried out following steps:
1) the Search Flags f of each node correspondence in the reverse adjacency list is changed to 0;
2) set out by concurrent end node V1 and call reverse traversal substep and travel through.
Described reverse traversal substep is: at first the Search Flags f of traversal start node V0 is made as 1; Judge again whether traversal start node V0 also has next adjacent node; If any words, if the next adjacent node of traversal start node V0 is V2, described next adjacent node V2 is made the following judgment:, continue then to judge whether traversal start node V0 also has next adjacent node 1) if the next adjacent node V2 of traversal start node V0 is the concurrent start node V of concurrent end node V1 correspondence; 2), continue then to judge whether traversal start node V0 also has next adjacent node if the Search Flags f of the next adjacent node V2 of traversal start node V0 is 1; 3) if the next adjacent node V2 of traversal start node V0 is concurrent end node V1 then there is illegal entry concurrent unit, print traverse path, continue then to judge whether traversal start node V0 also has next adjacent node; 4) if the next adjacent node V2 of traversal start node V0 is root node (not going into the limit), there is illegal entry then concurrent unit, prints traverse path, continues then to judge whether traversal start node V0 also has next adjacent node; 5) other situation reverse traversal substep of recursive call is then set out by the next adjacent node V2 of traversal start node V0 and to proceed traversal.
Check the step of redirect between concurrent branch to be: to carry out the forward traversal from concurrent start node, run into when having into the limit number greater than 1 node, carry out reverse traversal from this node, if can just can get back to concurrent start node without the node of the traversal of forward, have redirect between then concurrent branch; Its step: 1) whole process flow diagram is created a forward adjacency list, a reverse adjacency list; 2) each concurrent start node V in forward, the reverse adjacency list is carried out following steps:
1) forward lookup of each node correspondence in forward, reverse adjacency list sign f is made as 0;
2) set out by concurrent start node V and call forward traversal substep and carry out the forward traversal.
Described forward traversal substep is: at first the forward lookup sign f of traversal start node V0, reverse traversal sign f1 are made as 1; Judge then whether traversal start node V0 also has next adjacent node, if any words, if the next adjacent node of traversal start node V0 is V2, again to described next adjacent node V2 execution in step: 1) if next adjacent node V2 and concurrent start node V direct neighbor identify f1 to the reverse search of each node correspondence in the adjacency list and be made as 0; 2) if the reverse search of next adjacent node V2 sign f1 is 0, and next adjacent node V2 is not concurrent start node V, concurrent end node V1 that neither concurrent start node V correspondence, and next adjacent node V2 goes into the limit number greater than 1, is set out by next adjacent node V2 and calls reverse traversal substep and carry out reverse traversal; 3) next adjacent node V2 is made the following judgment:, then whether also have next adjacent node V2 to continue to carry out and judge traversal start node V0 if the next adjacent node V2 of a. is concurrent start node V; If b. next adjacent node V2 is the concurrent end node V1 of concurrent start node V correspondence, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0; If the forward lookup of c. next adjacent node V2 sign f is 1, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0; If d. next adjacent node V2 is leaf node (not going out the limit), then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0; E. other situation (not being four kinds of a~d) recursive call forward traversal substep is then set out by next adjacent node V2 and to proceed traversal.
Described reverse traversal substep is: the reverse search sign f1 that at first will travel through start node V0 is made as 1; Judge again whether traversal start node V0 also has next adjacent node, if any words, if the next adjacent node of traversal start node V0 is V3, again the reverse adjacent node V3 of this next one is judged:, then continue to judge next reverse adjacent node 1) if reverse adjacent node V3 is the concurrent end node V1 of concurrent start node V correspondence; 2), then continue to judge next reverse adjacent node if reverse adjacent node V3 is root node (not going into the limit); 3) if the reverse search of reverse adjacent node V3 sign f1 is 1, then continue to judge next reverse adjacent node; 4) if reverse adjacent node V3 is concurrent start node V, there is redirect between then concurrent branch, prints traverse path, continue to judge next reverse adjacent node again; 5) other situation reverse traversal substep of recursive call is then set out by reverse adjacent node V3 and to proceed reverse traversal.
The present invention has following advantage:
1. the present invention can check out the redirect between illegal outlet, illegal entry and each concurrent branch of concurrent unit by the dark searching algorithm of the elder generation that makes up utilization figure flexibly, realized legitimacy verification to concurrent unit, thereby guaranteed the correctness of concurrent unit in the process flow diagram, made the flow instance can be according to user's expectation true(-)running.
2. the present invention has guaranteed the true(-)running of flow instance to a great extent by when defining process flow diagram being carried out verification, has reduced the possibility of makeing mistakes.
3. the present invention carries out verification by after finishing at process flow diagram to its legitimacy, has removed from when mapping and has made all restrictions, makes the user more flexible when mapping, and is convenient to revise.
4. the present invention is by the verification to process flow diagram in when definition, removed to the correctness that guarantees flow process and carried out dry run, for the user has saved resource.
5. the inventive method is simple, and is reliable.
Description of drawings
Fig. 1 checks the process flow diagram of the forward traversal substep of illegal outlet for the present invention.
Fig. 2 checks the reverse traversal substep process flow diagram of illegal entry for the present invention.
Fig. 3 checks the forward traversal substep process flow diagram of redirect between branch for the present invention.
Fig. 4 checks the reverse traversal substep process flow diagram of redirect between branch for the present invention.
Fig. 5 has the concurrent unit example of illegal outlet for the present invention.
Fig. 6 has the concurrent unit example of illegal entry for the present invention.
Fig. 7 is for existing the concurrent unit example of redirect between branch of the present invention.
Embodiment
Below in conjunction with drawings and Examples the present invention is described in further detail.
Data structure of the present invention adopts adjacency list.Need two adjacency lists, the adjacency list of a forward, a reverse adjacency list.When checking illegal outlet, use the forward adjacency list, when the check illegal entry, use reverse adjacency list, when the redirect of checking between concurrent branch, use two adjacency lists respectively.When illegal outlet of check and illegal entry, each node needs corresponding Search Flags, when the redirect of checking between concurrent branch, each node needs corresponding two Search Flags, represents forward lookup (using the forward adjacency list) and reverse search (using reverse adjacency list) respectively.
The step of the illegal outlet of check: a concurrent unit has only outlet of an inlet, concurrent start node is its inlet, concurrent end node is its outlet, carry out the dark search of elder generation from concurrent start node like this, necessarily can arrive corresponding concurrent end node, if before arriving concurrent end node, just arrived leaf node (not going out the limit) or got back to concurrent start node, just show that there is illegal outlet in concurrent unit.
Step is as follows:
1. whole process flow diagram is created an adjacency list.
2. each concurrent start node V in the forward adjacency list is carried out following steps:
1) the Search Flags f of each node correspondence in the forward adjacency list is changed to 0;
2) set out by concurrent start node V and call forward traversal substep and travel through.
Wherein: as shown in Figure 1, described forward traversal substep is described below:
1. the Search Flags f of traversal start node V0 is made as 1;
2. judge whether traversal start node V0 also has next adjacent node; If any next adjacent node, the next adjacent node of establishing traversal start node V0 is V2, then this next one adjacent node V2 is made the following judgment:
1), continues to judge whether traversal start node V0 also has next adjacent node if the next adjacent node V2 of traversal start node V0 is the concurrent end node V1 of concurrent start node V correspondence;
2), continue to judge whether traversal start node V0 also has next adjacent node if the Search Flags f of the next adjacent node V2 of traversal start node V0 is 1;
3) if the next adjacent node V2 of traversal start node V0 is concurrent start node V, there is illegal outlet then concurrent unit, prints traverse path, continues to judge whether traversal start node V0 also has next adjacent node;
4) if the next adjacent node V2 of traversal start node V0 is leaf node (not going out the limit), there is illegal outlet then concurrent unit, prints traverse path, continues to judge whether traversal start node V0 also has next adjacent node;
5) other situation when four kinds of situations (be not above-mentioned) recursive call forward traversal substep is then set out by the next adjacent node V2 of traversal start node V0 and to proceed traversal.
The step of check illegal entry: a concurrent unit has only outlet of an inlet, concurrent start node is its inlet, concurrent end node is its outlet, carrying out reverse elder generation from concurrent end node like this searches for deeply, necessarily can arrive corresponding concurrent start node, if before arriving concurrent start node, just arrived root node (not going into the limit) or got back to concurrent end node, just shown that there is illegal entry in concurrent unit.
Step is as follows:
1. whole process flow diagram is created a reverse adjacency list;
2. each concurrent end node V1 in the adjacency list is carried out following steps:
1) the Search Flags f of each node correspondence in the adjacency list is changed to 0;
2) set out by concurrent end node V1 and call reverse traversal substep and travel through.
Wherein said reverse traversal substep is described below (referring to Fig. 2):
1. the Search Flags f of traversal start node V0 is made as 1.
2. judge whether traversal start node V0 also has next adjacent node, if any, the next adjacent node of establishing traversal start node V0 is V2, this next one adjacent node V2 is made the following judgment again:
1), continues then to judge whether traversal start node V0 also has next adjacent node if the next adjacent node V2 of traversal start node V0 is the concurrent start node V of concurrent end node V1 correspondence.
2), continue then to judge whether traversal start node V0 also has next adjacent node if the Search Flags f of the next adjacent node V2 of traversal start node V0 is 1.
3) if the next adjacent node V2 of traversal start node V0 is concurrent end node V1, there is illegal entry then concurrent unit, prints traverse path, continues then to judge whether traversal start node V0 also has next adjacent node.
4) if the next adjacent node V2 of traversal start node V0 is root node (not going into the limit), there is illegal entry then concurrent unit, prints traverse path, continues then to judge whether traversal start node V0 also has next adjacent node.
5) other situation (not being above-mentioned four kinds of situations) reverse traversal subalgorithm of recursive call is then set out by the next adjacent node V2 of traversal start node V0 and to be proceeded traversal.
Check the step of redirect between concurrent branch: owing to should not have redirect between each concurrent branch, so can not there be two disjoint paths in the arbitrary node in from concurrent start node to concurrent unit; The present invention carries out forward traversal from concurrent start node, and running into has into the limit number greater than 1 node, promptly carries out reverse traversal from this node, if can just can get back to concurrent spending node without the node of forward traversal, has redirect between then concurrent branch.
Step is as follows:
1. whole process flow diagram is created a forward adjacency list, a reverse adjacency list.
2. each concurrent start node V in the adjacency list is carried out following steps:
1) forward lookup of each node correspondence in adjacency list sign f is made as 0;
2) set out by concurrent start node V and call forward traversal substep and travel through.
As shown in Figure 3, forward traversal substep is described below:
1. the forward lookup sign f of traversal start node, reverse search sign f1 are made as 1.
2. judge whether V0 also has next adjacent node, if any, the next adjacent node of establishing V0 is V2, again this next one adjacent node V2 is carried out following steps:
1) if next adjacent node V2 and concurrent start node V direct neighbor (having a limit from concurrent start node V to next adjacent node V2) identify f1 to the reverse search of each node correspondence in the adjacency list and are made as 0;
2) if the reverse search of next adjacent node V2 sign f1 is 0, and next adjacent node V2 is not concurrent start node V, concurrent end node V1 that neither concurrent start node V correspondence, and next adjacent node V2 goes into the limit number greater than 1, is set out by next adjacent node V2 and calls reverse traversal substep and carry out reverse traversal;
3) next adjacent node V2 is made the following judgment:
If a. next adjacent node V2 is concurrent start node V, then whether also has next adjacent node to continue to carry out and judge traversal start node V0;
If b. next adjacent node V2 is the concurrent end node V1 of concurrent start node V correspondence, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0;
If the forward lookup of c. next adjacent node V2 sign f is 1, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0;
If d. next adjacent node V2 is leaf node (not going out the limit), then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0;
E. other situation (not being four kinds of a~d) recursive call forward traversal substep is then set out by next adjacent node V2 and to proceed traversal.
As shown in Figure 4, reverse traversal substep is described below:
1. the reverse search sign f1 that will travel through start node V0 is made as 1;
2. judge whether traversal start node V0 also has next adjacent node, if any, the next adjacent node of establishing traversal start node V0 is V3, the more reverse adjacent node V3 of this next one is carried out to judge:
1), then continues to judge next reverse adjacent node if reverse adjacent node V3 is the concurrent end node V1 of concurrent start node V correspondence;
2), then continue to judge next reverse adjacent node if reverse adjacent node V3 is root node (not going into the limit);
3) if the reverse search of reverse adjacent node V3 sign f1 is 1, then continue to judge next reverse adjacent node;
4) if reverse adjacent node V3 is concurrent start node V, there is redirect between then concurrent branch, prints traverse path, continue to judge next reverse adjacent node again;
5) other situation (not being 1)~4) content) the reverse traversal substep of recursive call is then set out by reverse adjacent node V3 and to proceed reverse traversal.
Illustrate legitimacy how to use this method to check concurrent unit below.
As shown in Figure 5, concurrent unit that illegal outlet arranged can directly arrive behavior node A3 outside the concurrent unit by the behavior node A2 in the concurrent unit.Adopt the present invention to check the method for the illegal outlet in concurrent unit, set out by concurrent start node V and to travel through, the order of traversal is V, A1, A2, A3, E successively, so just exist one to set out by concurrent start node V, concurrent end node V1 without its correspondence, can arrive the path of leaf node, illustrate that there is illegal outlet in this concurrent unit.
As shown in Figure 6, concurrent unit that illegal entry arranged can directly arrive behavior node A2 in the concurrent unit by the behavior node A3 outside the concurrent unit.Adopt the present invention to check the method for concurrent unit illegal entry, set out by concurrent end node V1 and to carry out reverse traversal, the order of traversal is V, A1, A2, A3, S successively, so just exist one to set out by concurrent end node V1, concurrent start node V without its correspondence, can arrive the inverse path of root node, illustrate that there is illegal entry in this concurrent unit.
As shown in Figure 7, exist the concurrent unit of redirect to have two paths that do not overlap fully can arrive behavior node A1 between a branch by concurrent start node.Adopt the present invention to check the method for redirect between concurrent cell branch, set out by concurrent start node V earlier and carry out the forward traversal, the order of traversal is V, A1, when arriving A1, find that it has two inlets, set out by A1 and to carry out reverse traversal, the order of traversal is A1, A2, V, like this from concurrent start node V, there are two paths that do not overlap fully to arrive behavior node A1, illustrate between this concurrent cell branch to have redirect.

Claims (9)

1. the legitimacy method of calibration of the concurrent unit of work process flow figure is characterized in that: check the redirect between illegal outlet, illegal entry and each concurrent branch of concurrent unit by the dark searching algorithm of the elder generation that makes up utilization figure flexibly; Be specially: its data structure adopts forward, reverse two adjacency lists, when the illegal outlet of check, use the forward adjacency list, when the check illegal entry, use reverse adjacency list, when the redirect of checking between concurrent branch, use two adjacency lists respectively, use the forward adjacency list during forward lookup, use reverse adjacency list during reverse search.
2. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 1, it is characterized in that: when illegal outlet of check and illegal entry, each node needs corresponding Search Flags, when the redirect of checking between concurrent branch, each node needs corresponding two Search Flags, uses forward lookup sign expression forward lookup and uses reverse search sign expression reverse search.
3. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 2, it is characterized in that: the step of the illegal outlet of check is: a concurrent unit has only outlet of an inlet, concurrent start node is its inlet, concurrent end node is its outlet, carry out the dark search of elder generation from concurrent start node, to corresponding concurrent end node, when before arriving concurrent end node, just having arrived leaf node or having got back to concurrent start node, show that there is illegal outlet in concurrent unit; Be specially: 1) whole process flow diagram is created the forward adjacency list; 2) each concurrent start node V carries out following steps in the forward adjacency list:
A) the Search Flags f of each node correspondence in the forward adjacency list is changed to 0;
B) set out by concurrent start node V and call forward traversal substep and travel through.
4. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 3, it is characterized in that: described forward traversal substep is: at first the Search Flags f of traversal start node V0 is made as 1; Judge then whether traversal start node V0 also has next adjacent node; If any next adjacent node, if the next adjacent node of traversal start node V0 is V2, again described next adjacent node V2 is made the following judgment:, continue to judge whether traversal start node V0 also has next adjacent node 1) if the next adjacent node V2 of traversal start node V0 is the concurrent end node V1 of concurrent start node V correspondence; 2), continue to judge whether traversal start node V0 also has next adjacent node if the Search Flags f of the next adjacent node V2 of traversal start node V0 is 1; 3) if the next adjacent node V2 of traversal start node V0 is concurrent start node V, there is illegal outlet then concurrent unit, prints traverse path, continues to judge whether traversal start node V0 also has next adjacent node; 4) if the next adjacent node V2 of traversal start node V0 is a leaf node, there is illegal outlet then concurrent unit, prints traverse path, continues to judge whether traversal start node V0 also has next adjacent node; 5) other situation then recursive call forward traversal substep set out by the next adjacent node V2 of traversal start node V0 and proceed traversal.
5. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 2, it is characterized in that: the step of check illegal entry is: a concurrent unit has only outlet of an inlet, concurrent start node is its inlet, concurrent end node is its outlet, carrying out reverse elder generation from concurrent end node searches for deeply, to arriving corresponding concurrent start node, if before arriving concurrent start node, just arrived root node or got back to concurrent end node, shown that then there is illegal entry in concurrent unit; Concrete steps are: at first whole process flow diagram is created a reverse adjacency list; Then each concurrent end node V1 in the reverse adjacency list is carried out following steps:
1) the Search Flags f of each node correspondence in the reverse adjacency list is changed to 0;
2) set out by concurrent end node V1 and call reverse traversal substep and travel through.
6. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 5, it is characterized in that: described reverse traversal substep is: at first the Search Flags f of traversal start node V0 is made as 1; Judge again whether traversal start node V0 also has next adjacent node; If any words, if the next adjacent node of traversal start node V0 is V2, described next adjacent node V2 is made the following judgment:, continue then to judge whether traversal start node V0 also has next adjacent node 1) if the next adjacent node V2 of traversal start node V0 is the concurrent start node V of concurrent end node V1 correspondence; 2), continue then to judge whether traversal start node V0 also has next adjacent node if the Search Flags f of the next adjacent node V2 of traversal start node V0 is 1; 3) if the next adjacent node V2 of traversal start node V0 is concurrent end node V1, there is illegal entry then concurrent unit, prints traverse path, continues then to judge whether traversal start node V0 also has next adjacent node; 4) if the next adjacent node V2 of traversal start node V0 is a root node, there is illegal entry then concurrent unit, prints traverse path, continues then to judge whether traversal start node V0 also has next adjacent node; 5) other situation reverse traversal substep of recursive call is then set out by the next adjacent node V2 of traversal start node V0 and to proceed traversal.
7. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 2, it is characterized in that: check the step of redirect between concurrent branch to be: carry out the forward traversal from concurrent start node, run into when having into the limit number greater than 1 node, carry out reverse traversal from this node, if can just can get back to concurrent start node without the node of the traversal of forward, have redirect between then concurrent branch; Its step: 1) whole process flow diagram is created a forward adjacency list, a reverse adjacency list; 2) each concurrent start node V in forward, the reverse adjacency list is carried out following steps:
1) forward lookup of each node correspondence in forward, reverse adjacency list sign f is made as 0;
2) set out by concurrent start node V and call forward traversal substep and travel through.
8. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 7, it is characterized in that: forward traversal substep is: at first the forward lookup sign f of traversal start node V0, reverse search sign f1 are made as 1; Judge then whether traversal start node V0 also has next adjacent node, if any words, if the next adjacent node of traversal start node V0 is V2, again to described next adjacent node V2 execution in step: 1) if next adjacent node V2 and concurrent start node V direct neighbor identify f1 to the reverse search of each node correspondence in the adjacency list and be made as 0; 2) if the reverse search of next adjacent node V2 sign f1 is 0, and next adjacent node V2 is not concurrent start node V, concurrent end node V1 that neither concurrent start node V correspondence, and next adjacent node V2 goes into the limit number greater than 1, is set out by next adjacent node V2 and calls reverse traversal substep and carry out reverse traversal; 3) next adjacent node V2 is made the following judgment:, then whether also have next adjacent node V2 to continue to carry out and judge traversal start node V0 if the next adjacent node V2 of a. is concurrent start node V; If b. next adjacent node V2 is the concurrent end node V1 of concurrent start node V correspondence, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0; If the forward lookup of c. next adjacent node V2 sign f is 1, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0; If d. next adjacent node V2 is a leaf node, then whether also has next adjacent node V2 to continue to carry out and judge traversal start node V0; E. other situation recursive call forward traversal substep is then set out by next adjacent node V2 and to proceed traversal.
9. according to the legitimacy method of calibration of the concurrent unit of the described work process flow figure of claim 8, it is characterized in that: reverse traversal substep is: the reverse search sign f1 that at first will travel through start node V0 is made as 1; Judge again whether traversal start node V0 also has next adjacent node, if any words, if the next adjacent node of traversal start node V0 is V3, again the reverse adjacent node V3 of this next one is judged:, then continue to judge next reverse adjacent node 1) if reverse adjacent node V3 is the concurrent end node V1 of concurrent start node V correspondence; 2), then continue to judge next reverse adjacent node if reverse adjacent node V3 is a root node; 3) if the reverse search of reverse adjacent node V3 sign f1 is 1, then continue to judge next reverse adjacent node; 4) if reverse adjacent node V3 is concurrent start node V, there is redirect between then concurrent branch, prints traverse path, continue to judge next reverse adjacent node again; 5) other situation reverse traversal substep of recursive call is then set out by reverse adjacent node V3 and to proceed reverse traversal.
CNB2004100212694A 2004-04-09 2004-04-09 Lawful testing method of cocurrent unit of flow chart Expired - Fee Related CN100382077C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100212694A CN100382077C (en) 2004-04-09 2004-04-09 Lawful testing method of cocurrent unit of flow chart

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100212694A CN100382077C (en) 2004-04-09 2004-04-09 Lawful testing method of cocurrent unit of flow chart

Publications (2)

Publication Number Publication Date
CN1680936A CN1680936A (en) 2005-10-12
CN100382077C true CN100382077C (en) 2008-04-16

Family

ID=35067530

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100212694A Expired - Fee Related CN100382077C (en) 2004-04-09 2004-04-09 Lawful testing method of cocurrent unit of flow chart

Country Status (1)

Country Link
CN (1) CN100382077C (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101876900B (en) * 2009-11-24 2014-01-08 恒生电子股份有限公司 Method for automatically adjusting and distributing flow chart and device thereof
CN101826103B (en) * 2010-04-06 2015-06-10 浪潮电子信息产业股份有限公司 Method for reversely searching packet depended relationship in unix operating system
CN106446417B (en) * 2016-09-27 2023-05-12 东软集团股份有限公司 Processing method, device and terminal of concurrency body
CN107704235A (en) * 2017-09-22 2018-02-16 深圳航天科技创新研究院 The analytic method of data flowchart, system and storage medium in mathematics library

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202192B1 (en) * 1998-01-09 2001-03-13 International Business Machines Corporation Distributed static timing analysis

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202192B1 (en) * 1998-01-09 2001-03-13 International Business Machines Corporation Distributed static timing analysis

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种并发程序可测试性分析框架. 陈振强,徐宝文,许蕾,张斌.计算机学报,第26卷第12期. 2003 *
实时并发软件的测试研究. 李伟华,康继昌.微电子学与计算机,第2期. 1996 *

Also Published As

Publication number Publication date
CN1680936A (en) 2005-10-12

Similar Documents

Publication Publication Date Title
CN105808266B (en) Code operation method and device
CN106528399A (en) Test case determination method and apparatus
CN104331366A (en) Test case design efficiency promotion method and system
CN106021093A (en) Test case reuse method and system
CN102708053B (en) The method that the context environmental influence of function call is determined in Program path
CN101853200A (en) High-efficiency dynamic software vulnerability exploiting method
CN101794283A (en) Method and system for processing character strings and matcher
CN108647043A (en) A kind of realization method and system of order line input
CN107145784A (en) A kind of method of vulnerability scanning, device and computer-readable medium
CN104866764B (en) A kind of Android phone malware detection method based on object reference figure
CN108255467A (en) The method, apparatus and system of service are performed according to workflow sequence
CN100382077C (en) Lawful testing method of cocurrent unit of flow chart
CN114091028B (en) Android application information leakage detection method based on data flow
CN101056210B (en) An event processing system and method of network central management platform
CN106452954B (en) HTTP data characteristics analysis method and system
CN101505241B (en) Method and apparatus for generating test instances
CN1812347A (en) Protocol validity verifying and testing method based on mode conversion
CN110572278B (en) Method and device for positioning information of three-layer gateway of metropolitan area network
Cavalli et al. A passive conformance testing approach for a manet routing protocol
CN113095515A (en) Service fault information processing method and device
CN105760293B (en) The method and system of muti-language support test
CN103019663A (en) Method and system for acquiring intermodule function interface in program
CN115408700A (en) Open source component detection method based on binary program modularization
US20050273774A1 (en) Method and system for flexible/extendable at command interpreter
CN104572087A (en) Adaptation mode method and system for business logic implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SHENYANG NEUSOFT SOFTWARE CO., LTD.

Free format text: FORMER OWNER: DONGRUAN GROUP CO., LTD.

Effective date: 20080620

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20080620

Address after: Lane 3, Lane 11, Wenhua Road, Heping District, Shenyang

Patentee after: Shenyang Dongruan Software Co., Ltd.

Address before: Liaoning city of Shenyang Province Hunnan hi tech Industrial Development Zone, East Software Park

Patentee before: Dongruan Group Co., Ltd.

C56 Change in the name or address of the patentee

Owner name: NEUSOFT GROUP CO., LTD.

Free format text: FORMER NAME OR ADDRESS: SHENYANG NEUSOFT SOFTWARE CO., LTD.

CP03 Change of name, title or address

Address after: Hunnan rookie street Shenyang city Liaoning province 2 No.

Patentee after: Neusoft Group Corporation

Address before: Lane 3, Lane 11, Wenhua Road, Heping District, Shenyang

Patentee before: Shenyang Dongruan Software Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080416

Termination date: 20170409

CF01 Termination of patent right due to non-payment of annual fee