The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The controller program is the core of a safety-critical control system. However, the testing of controller program has been facing challenges because of the oracle problem. Since Proportional-Integral-Derivative (PID) controller is the most commonly used controller in the industry, this paper proposes to apply Metamorphic Testing (MT) to test it. Our experimental results show that MT is effective...
Pairwise strategies have tested effectively a range of software and hardware systems. These testing strategies offer solutions that can substitute exhaustive testing. In simple terms, a pairwise testing strategy significantly minimizes large input parameter values (or configuration options) of a system into a smaller set based on pairwise interaction (or combination). Fuzzy Adaptive Teaching Learning-based...
Code changes are often reviewed before they are deployed. Popular source control systems aid code review by presenting textual differences between old and new versions of the code, leaving developers with the difficult task of determining whether the differences actually produced the desired behavior. Fortunately, we can mine such information from code repositories. We propose aiding code review with...
Field failures, that is, failures caused by faults that escape the testing phase leading to failures in the field, are unavoidable. Improving verification and validation activities before deployment can identify and timely remove many but not all faults, and users may still experience a number of annoying problems while using their software systems.This paper investigates the nature of field failures,...
Combinatorial testing is a promising technique for testing highly-configurable systems. Software systems become larger and more complex every day, and due to the time and cost limitations, it is infeasible to test everything in a software with a large configuration space, or a graphical user interface with many settings and events. Combinatorial testing generates an interaction test suite to discover...
In the early 1990s, the Modified Condition/Decision Coverage (MC/DC) criterion was suggested as a structural white-box testing approach, but it can also be used for black-box specification-based testing. Practical application of MC/DC for specification-based testing has its own unique features and sometimes is quite different from code-based applications. However, MC/DC as a black-box approach has...
Process of detailed testing and verification of all automotive embedded software components generates detailed reports about each segment of tested electronic control units (ECU). The very first group of tests in this process is Acceptance tests, and one of the most important tests in this stage of testing and verification is interface check of the software component. The interface check must ensure...
Knowing the execution time of test cases is importantto perform test scheduling, prioritization and progressmonitoring. This work in progress paper presents a novelapproach for predicting the execution time of test cases basedon test specifications and available historical data on previouslyexecuted test cases. Our approach works by extractingtiming information (measured and maximum execution time)for...
Good planning and managing software test process require accurate estimation of software test effort. This becomes particularly significant when validation and verification activities are to be performed by an independent organization. This study presents a systematic literature review and a follow up industrial survey, which was performed to investigate the state of the art on software test effort...
Technical Debt (TD) is a metaphor used to explain the negative impacts that sub-optimal design decisions have in the long-term perspective of a software project. Although TD is acknowledged by both researchers and practitioners to have strong negative impact on Software development, its study on Testware has so far been very limited. A gap in knowledge that is important to address due to the growing...
Test case prioritization (TCP) attempts to order test cases such that those which are more important, according to some criterion or measurement, are executed earlier. TCP has been applied in many testing situations, including, for example, regression testing. An abstract test case (also called a model input) is an important type of test case, and has been widely used in practice, such as in configurable...
We consider the question of how to treat existing, context-based test inputs when contextual conditions change. Simply ignoring the voided inputs reduces confidence in the correctness of the system under test (SuT). Instead, we suggest to adjust the parameters of those inputs to the new conditions in a way that retains their original intention. This often comprises behavioral assumptions, e.g., because...
Not only is Android the most widely used mobile operating system, more apps have been released and downloaded for Android than for any other OS. However, quality is an ongoing problem, with many apps being released with faults, sometimes serious faults. Because the structure of mobile app software differs from other types of software, testing is difficult and traditional methods do not work. Thus...
fault injection is an effective technique in software testing. By introducing faults to software under test, fault injection can improve the coverage of a test, as the same time, the fault injected in software contributes significantly to find true fault related to fault injected. In this paper we propose a software testing method based on fault injection. In this method, we first use neural network...
Hyper-heuristics are advanced high-level search methodologies that solve hard computational problems indirectly via low-level heuristics. Choice function based hyper-heuristics are selection and acceptance hyper-heuristics that use statistical information to rank low-level heuristics for selection. In this paper, we describe a choice function based hyper-heuristic called Pairwise Choice Function based...
Uniform test suites consist of test cases exclusively differing in test inputs - not in test goals. Intended to gain confidence that a given invariant holds, these inputs trigger particular behavior of the system under test. Equipped with a simulation of the system under test we are able to cheaply explore this behavior virtually. When changing over to reality, testing the system within its real context,...
Big Data programs are those that process large data exceeding the capabilities of traditional technologies. Among newly proposed processing models, MapReduce stands out as it allows the analysis of schema-less data in large distributed environments with frequent infrastructure failures. Functional faults in MapReduce are hard to detect in a testing/preproduction environment due to its distributed...
Nowadays, more and more systems are coordinated and controlled to compose globally-distributed, highly-complex systems of systems (SoS). Existing testing methods focus on single devices and on performance characteristics from the network architecture upwards, but ignore the innate complexity caused by the spatial and temporal separation of these systems over vastly differing scales. As a result, quality...
The increasing complexity and size of software products combined with pressure to have shorter time-to-market is making manual testing techniques too costly and unscalable. This is particularly observed in industrial systems where continuous integration and deployment are applied. Therefore, there is a growing need to automate the testing process and make it scalable with respect to the context of...
Combinatorial interaction testing (CIT) stands as one of the efficient testing techniques that have been used in different applications recently. The technique is useful when there is a need to take the interaction of input parameters into consideration for testing a system. The key insight the technique is that not every single parameter may contribute to the failure of the system and there could...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.