The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software reliability is one of the important attributions of dependable systems. A number of software reliability models have been developed by now, but few of them take object-oriented features into account. Nowadays, more and more software systems are developed in object-oriented technology and object-oriented programming languages contain new language features, most notably inheritance, polymorphism,...
Symbolic techniques have been shown to be very effective in path-based test generation, however, they fail to scale to large programs due to the exponential number of paths to be explored. In this paper, we focus on tackling this path explosion problem and propose search strategies to achieve quick branch coverage under symbolic execution, while exploring only a fraction of paths in the program. We...
To advance efficiency of software test data generation automatically, based on traditional particle swarm optimizer (PSO) algorithm, we put forward an improved algorithm (APSO) in which inertia weight is adjusted according to the fitness value of particle. Experiment simulation result shows that APSO not only has better performance than immune genetic algorithm (IGA) but also better than PSO, and...
Cloud computing is causing a paradigm shift in the provision and use of computing services, away from the traditional desktop form to online services. This implies that the manner in which these computing services are tested should also change. This paper discusses the research issues that cloud computing imposes on software testing. These issues were gathered during interviews with industry practitioners...
The necessity of lowering the execution of system tests' cost is a consensual point in the software development community. The present study presents an optimization of the regression tests' activity, by adapting a test cases prioritization technique called Failure Pursuit Sampling-previously used and validated for the prioritization of tests in general-improving its efficiency for the exclusive execution...
In the software engineering area, has been observed a growing concern to perform experimental studies to evaluate the use of new technologies. However, conducting experimental research is a complex and challenging activity, once it suffers impacts related to human factors. The use of a well defined process for experimental study contributes to the control of the variables involved and their realization...
One of oldest and best-known methods used in constructive testing of smaller programs is the symbolic program execution. It is partly similar to method of simulation of computer function, but differs in aim. One of ways to prove whether given program is written correctly is to execute it symbolically. Aim of this paper is to test ramified program structure using single symbolic set of inputs, in one...
This paper presents an automated verification methodology aimed at detecting failures in multimedia systems based on a black box testing approach. Moreover, the verification is performed using a black test box as part of a test harness. The quality of a system is examined against functional failures using a model-based testing approach for generating test scenarios. System under test (specifically,...
Defect prevention techniques can be used during the creation of software artifacts to help developers create high-quality artifacts. These artifacts should have fewer faults that must be removed during inspection and testing. The Requirement Error Taxonomy that we have developed helps focus developers' attention on common errors that can occur during requirements engineering. Our claim is that, by...
This paper proposes a multi-factor software reliability model based on logistic regression and its effective statistical parameter estimation method. The proposed parameter estimation algorithm is composed of the algorithm used in the logistic regression and the EM (expectation-maximization) algorithm for discrete-time software reliability models. The multi-factor model deals with the metrics observed...
While software is more and more complex, software testability becomes one of important software quality factors. Testability measures help designers and testers to improve software quality. In this paper, we concentrate on testability analysis of software designs. We propose an extension of the SATAN technology to measure the testability of Scicos models. This work is integrated into the Scicos environment...
Information captured in software execution profiles can benefit verification activities by supporting more cost-effective fault localization and execution classification. This paper proposes an experimental design which utilizes execution information to quantify the effect of factors such as different programs and fault inclusions on the distinction between passed and failed execution profiles. For...
The drawback of classical software random testing is low efficiency to find failure-causing inputs, because it requires a large number of test cases compared to a family of partition testing. This paper proposes a software random testing scheme based on Markov chain Monte Carlo (MCMC) method. In this paper, we propose a probability model to represent the activities for finding failures in software...
Software frameworks, common and reusable to the development of a family of applications, are pre-implemented architectures having predefined points of variability. During framework reuse, implementation of one (or more than one) of the different possible alternatives of the variability take place. Variability is the number of possible variant implementations of hook methods, which are actually abstract...
The reference model of Competisoft is composed of nine processes and a work within the context of the project Competisoft established some validation and verification activities in the process Software Development. Software test tasks are considered in the validation and verification activities, but these activities are not sufficient to define a Software Testing process in the organization which...
It usually takes a long time or huge amount of test cases to do software reliability demonstration testing (SRDT) on a very high reliability software by conventional methods, which leads to the fact that the conventional SRDT methods cannot be put into use for accurately predicting failure rate of a very high reliability software. By means of importance sampling, for high reliability software systems,...
Computer software is an engine of growth of social-economy development which requires new engineering techniques and strategies. The demand for quality in software applications has grown. Hence as software becomes more integrated into our lives, the effects of software failures become more acute. Testing is an essential part of software development providing an indicator of the quality of the software...
Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes that all parameters of the system under test are always effective. However, in many realistic applications, there may exist some parameters that can disable other parameters in certain conditions. These parameters are called shielding parameters...
Mutation testing while being a successful fault revealing technique for unit testing, it is a rather expensive one for practical use. To bridge these two aspects there is a need to establish approximation techniques able to reduce its expenses while maintaining its effectiveness. In this paper several second order mutation testing strategies are introduced, assessed and compared along with weak mutation...
We present an approach to identify duplicate bug reports expressed in free-form text. Duplicate reports needs to be identified to avoid a situation where duplicate reports get assigned to multiple developers. Also, duplicate reports can contain complementary information which can be useful for bug fixing. Automatic identification of duplicate reports (from thousands of existing reports in a bug repository)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.