The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Generating the test inputs, that have high code coverage while minimizing the number of test inputs, is a practical but difficult problem. The application of symbolic execution in combination with SMT solvers gives a promising way to solve it. Recently, there have been several tools that help generating the test inputs for C programs, but their abilities are still limited, depending on the particular...
Black box testing focuses on the core functionality of the system, while user interface testing is concerned with details of user interactions. Functional and user interface test cases are usually generated from two distinct system models, one for the functionality and one for the user interface. As a result, test cases derived from either model capture only partial system behavior and as such, are...
Web Services (WS) is a popular way of implementing SOA-based software, which gained rapid progress. Several Web Services are usually combined to create new services by a mechanism named Composite Web Service. Composite Web Service is one of the most important components to WS.Composite Web Services testing is a difficult topic in WS testing. In this paper, we present a regression testing method for...
Pair-wise testing is widely used to detect faults in software systems. In many applications where pair-wise testing is needed, the whole test set can not be run completely due to time or budget constraints. In these situations, it is essential to prioritize the tests. In this paper, we drive weight for each value of each parameter, and adapt UWA algorithm to generate an ordered pair-wise coverage...
SQL injection attacks have posed a serious security threat to Web databases. To address this problem, this paper presents a scheme of database security testing. It studies how to detect potential input points of SQL injection, automatically generate test cases and find vulnerability of databases by running these test cases to make a simulation attack to an application. The database security testing...
By analyzing various methods of automatic generation of test data using branch coverage, their characteristics and disadvantages are discussed, a new algorithm for automatic generation of test data is proposed. Through constructing the new procedure flow chart, the algorithm optimizes the selection paths using Fibonacci law, and generates test data for assigned branch. When the branch predicates of...
This paper considers the task of software test case generation from a large space of values of input parameters. The purpose of the paper is to create a model of software input space with constraints among parameters to serve as a basis of testing. We suggest a procedure to create a directed graph model, where paths through the graph represent all valid (and only valid) input combinations. The procedure...
Grammars, especially context-free grammars, are widely used within and even outside the field of computer science. In this paper, we present a systematic framework for grammar testing, in which some commonly used techniques for testing programs such as module testing and integration testing are adapted and applied to the testing of grammars. We propose a nonterminal-based approach for grammar modularization,...
In order to ensure reliability and quality, software systems must be tested. Testing object-oriented software is harder than testing procedure-oriented software. It involves four levels, namely the algorithmic level, class level, cluster level, and system level. We proposed a methodology TACCLE for class- and cluster- level testing. It includes an important algorithm GFT for generating fundamental...
Formalized testing is to improve quality of software product based on software architecture. It is an important research in the fields of software engineering. Testing criteria are conditions which software testing must satisfy. Therefore, the highly effective testing strategy is very important. This paper introduces pi Behavior Graph that describes software architecture. We propose seven testing...
To make function test of Web application based on struts automation, an automated test tool is proposed. The content of form is produced through analyzing Web page by HtmlParser. The test cases are produced by matching the data in test database and the content of form. The test cases are described by XML. Changing the test cases to code of Cactus and running the code to achieve the target of testing...
In this paper, it first describes the problems which existed in the computer science education, and discusses the necessity of developing the automatic program assessment system. Then it introduces the AutoMark which is an online, automatic assessment system and it currently is being developed at Zhenzhou University. The AutoMark mainly uses dynamic testing to check the program, and will give a score...
This paper examines the outcomes of teaching a course in software testing in Ireland and China over a two-year period. In both institutions the delivery of the course is constrained to two-week duration. The learning objectives for this course are explained. The outcomes of the courses in terms of student learning are compared and analyzed. A number of observations are made that lead to recommendations...
Test-case prioritization is a typical scenario of regression testing, which plays an important role in software maintenance. With the popularity of Web services, integrating Web services to build service-centric systems (SCSs) has attracted attention of many researchers and practitioners. During regression testing, as SCSs may use up constituent Web servicespsila request quotas (e.g., the upper limit...
We describe a benchmark of publicly-available multi-threaded programs with documented bugs in them. This project was initiated a few years ago with the goal of helping research groups in the fields of concurrent testing and debugging to develop tools and algorithms that improve the quality of concurrent programs. We present a survey of usage of the benchmark, concluding that the benchmark had an impact...
A major issue in software testing is the automatic generation of the inputs to be applied to the programme under test. To solve this problem, a number of approaches based on search methods have been developed in the last few years, offering promising results for adequacy criteria like, for instance, branch coverage. We devise branch coverage as the satisfaction of a number of constraints. This allows...
Software specification is an important element of the software development process. However, in most cases the specifications are out-of-date or even missing. One solution for this kind of problem is to use some process that infers the specification automatically. Work by Ernst et al (2000 ; 2002) has shown how specifications can be generated using program execution traces. These approaches are dependent...
We propose a benchmark for object-oriented unit testing, called the behavioural response. This is a normative set of state- and equivalence partition-based test cases. Metrics are then defined to measure the adequacy and effectiveness of a test set (with respect to the benchmark) and the efficiency of the testing method (with respect to the time invested). The metrics are applied to expert manual...
This paper investigates the adequacy of a general form of fitness function, based on a state-based specification, by characterizing the associated search problem and the dynamics of the applied metaheuristic. The measurement approach of the fitness landscape is experimented on various examples and suggests some tuning choices to be made for the metaheuristic considered.
We propose an approach to generate and execute tests of the conformance of a system to a given security policy. The method is rule-based: it generates test cases directly from a security policy expressed as a set of security requirements, using two relations: one between predicates appearing in the rules and elementary test cases, called tiles, used to test predicates in the system, and another one...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.