The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many of the micro and small-sized companies still do not have a formal testing process and do not even have the ability to implement a process that meets the needs and ensures the correct execution of activities. In addition, these companies have unique characteristics, in general, they develop smaller and less complex software, avoid expensive tools and complex procedures, because they do not have...
This paper shows an extended mutation score to evaluate a test suite for concurrent software in model-driven development. It is calculated based on a weighted PN (place/transition net) that consists of two elements. One is a PN that is constructed based on specifications of SUT (software under test), and another is the weights that are calculated based on software metrics.
Automated test regeneration intends to ensure high coverage of the system model from an existing test suite. While regenerating test suite, most of the existing techniques ignore coverage achieved so far by existing test suite. An automatic test regeneration technique to achieve high coverage of state model is proposed in this paper which uses coverage result as well as information from UML diagrams...
Software testing is a fundamental part of the software development process. In the context of embedded-software applications, testing can find defects which cause unprecedented risks. The path explosion problem often necessitates one to consider an extremely large number of paths in order to reach a specific target. Symbolic execution can reduce this cost by using symbolic values and heuristic exploration...
Software testing is a process of finding bugs by comparing actual and expected result of the software. Depending upon the type of applications i.e. desktop or web based, different types of testing performed. Web based application are set of programs run on web browser and access over a network connection. Different types of testing performed for web based application for check correctness, completeness,...
This paper cover the importance of performance testing of the web application. The performance of any web application has been depend on the some different type of the testing process like load testing, soak testing, smoke testing and stress testing etc. In this paper we applied smoke testing on a web application. This web application has been developed for the customer before delivering the software...
This paper covers the importance of performance testing of web applications and analysing the application's bottleneck based on hardware, software and resource utilization. Mainly, the focus would be to performance test the application on different parameters like load, stress, scalability, reliability, security and capacity front. Now a days everyone expects everything to be very fast but at the...
We present an automated approach for cost model discovery in configuration spaces. Given a configuration space, a quality assurance (QA) task of interest, and a means of measuring the cost of carrying out the QA task, the proposed approach systematically sample the configuration space by using a traditional covering array, carry out the QA task in each of the selected configurations, measure the costs,...
Some scenario-based testing approaches propose to express a test suite as a regular expression (called scenario or pattern). It specifies a set of valid sequences of operations in a abstract way. When the regular expression is "unfold", test sequences are obtained. Usually, the unfolding is done in an exhaustive way, which can result in a combinatorial explosion. In this article, we explore...
While modern web development technologies enhancethe capabilities of web applications, they introduce challengesfor testers. This paper introduces, evaluates, and refinesweb mutation operators that target interaction faults in web applications. An experimental study is conducted on 11 subject webapplications using 15 web mutation operators. The effectivenessof 12 independently developed test sets...
Testing software based on symbolic execution is a promising and well-researched approach. Recently, various dynamic symbolic execution approaches have been proposed that are of interest for industrial practice. However, the corresponding tools are typically not directly usable on model-based languages that are predominantly used in the automotive sector. To this end, we use an internal software analysis...
For the purpose of security of the computer systems, organizations now a days plan a lot of things like firewalls, network scanning tools, secure sockets layer (SSL) etc. However security bugs present at the application layer (code level) caused by unawareness or mistakes of the developers are usually ignored. Such security bugs can lead to unauthorized privileges on a computer system. For example...
Building high quality software is one of the main goals in software industry. Software testing is a critical step in confirming the quality of software. Testing is an expensive activity because it consumes about 30% to 50% of all software developing cost. Today much research has been done in generating and prioritizing tests. First, tester should find the most important and critical path in software...
While a substantial body of prior research has investigated the form and nature of production code, comparatively little attention has examined characteristics of test code, and, in particular, test smells in that code. In this paper, we explore the relationship between production code properties (at the class level) and a set of test smells, in five open source systems. Specifically, we examine whether...
Much more information itself needs information about information. Since last twenty years, data scientists are working on Big Data and its analytics. We already covered a long distance in all verticals of Big Data but cloud based software testing. Big Data analytics is based on 5 V's and analytical results may sometime generate unwanted data for the financial forecasters. Cloud computing plays a crucial...
This standard supports test case design and execution during any phase or type of testing (e.g., unit, integration, system, acceptance, performance, usability, reliability).
As the attacks on the website and domain names are increasing day by day it becomes very important for various verticals in the country to be secured against the deadly attacks which can hamper the operations of the web traffic in the country and its verticals. XSS is one such attack which is more frequently tried on the websites to gain information and data which is relevant to the attacker from...
Reliability testing of web portals is distinctive as compared to that of conventional software. It requires usability and reliability metrics besides functional testing to ensure diverse users are able to use such portals without any formal training and can rely on the portals or requirements quickly and efficiently. The study utilizes the measurable metrics for usability and reliability testing and...
State models are widely used as specification or design artifacts and form the basis of various analysis techniques. In this paper, we make use of the advances in the area of random test generation to propose a novel approach to infer state models of black-box components from their executions. We also present an implementation and the results of applying our approach on a number of examples.
Extended finite state machines (EFSM) models are currently widely utilized to model embedded and control systems. Thus, there are recent upsurge studies to generate test data from EFSM models (EFSM-based testing). Applying metaheuristic search-based techniques (MHSBT) for automating the process of test case generation from EFSM models has become a proliferated field of interest during the last decade...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.