Username   Password       Forgot your password?  Forgot your username? 

ISSUES BY YEAR

Volume 14 - 2018

No.1 January 2018
No.1 January 2018
No.3 March 2018
No.3 March 2018
No.4 April 2018
No.4 April 2018
No.5 May 2018
No.5 May 2018
No.6 June 2018
No.6 June 2018
No.7 July 2018
No.7 July 2018
No.8 August 2018
No.8 August 2018
No.9 September 2018
No.9 September 2018
No.10 October 2018
No.10 October 2018
No.11 November 2018
No.11 November 2018

Volume 13 - 2017

No.4 July 2017
No.4 July 2017
No.5 September 2017
No.5 September 2017
No.7 November 2017
No.7 November 2017
No.8 December 2017
No.8 December 2017

Volume 12 - 2016

Volume 11 - 2015

Volume 10 - 2014

Volume 9 - 2013

Volume 8 - 2012

Volume 7 - 2011

Volume 6 - 2010

Volume 5 - 2009

Volume 4 - 2008

Volume 3 - 2007

Volume 2 - 2006

Abstract:

Genetic Algorithm (GA for short), which simulates the process of natural evolution to search and achieve the optimal solution, is often employed to generate test cases. Therefore, a GA-based test case generation policy, which introduces the concept of node probability coverage as the detection method for nodes in unreachable paths, is proposed in this work. Moreover, in the application under test, complex decisions and nested structures often lead to different execution difficulty of each statement. Therefore, a path coverage method based on contact layer proximity is presented, which quantifies the difficulty difference of different statements using contact vector. Besides, contact layer proximity and node probability coverage are combined to design the fitness function in GA. Then, the experiments about two classical benchmark cases, namely triangle-classifying program and bubble sort program, are conducted. The result is compared and analyzed with a similar method, namely the method of node probability coverage. It is shown that the proposed test case generation method is more efficient. Finally, a plug-in using the proposed test case generation method is developed.

 

References: 15

      1. B. Bako, A. Borchert, N. Heidenbluth, and J. Mayer, “Plugin-Based Systems with Self-Organized Hierarchical Presentation,” in International Conference on Software Engineering Research and Practice, pp. 577-584, Las Vegas, Nevada, USA, June 2006
      2. D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar, “An Eclipse Plug-in for Model Checking,” in IEEE International Workshop on Program Comprehension, pp. 251-255, Bari, Italy, June 2004
      3. W. U. Chuan and D. W. Gong, “Evolutionary Generation of Test Data for Regression Testing Based on Path Correlation,” Chinese Journal of Computers, vol. 38, no. 11, pp. 2247-2261, November 2015 (in Chinese with English abstract)
      4. D. W. Gong and L. N. Ren, “Evolutionary Generation of Regression Test Data,” Chinese Journal of Computers, vol. 37, no. 3, pp. 489-499, March 2014 (in Chinese with English abstract)
      5. M. Greiler and A. V. Deursen. “What Your Plug-in Test Suites Really Test: an Integration Perspective on Test Suite Understanding,” Empirical Software Engineering, vol. 18, no. 5, pp. 859-900, October 2013
      6. M. Greiler, A. V. Deursen, and M. A. Storey, “Test confessions: A Study of Testing Practices for Plug-in Systems,” in IEEE International Conference on Software Engineering, pp. 244-254, Zurich, Switzerland, June 2012
      7. M. Greiler, H. G. Gross, Van Deursen A, “Understanding Plug-in Test Suites From an Extensibility Perspective,” in The 17th Working Conference on Reverse Engineering, pp. 67-76, Beverly, MA, USA, October 2010
      8. M. Jahn, R. Wolfinger, and H. Mössenböck, “Extending Web Applications with Client and Server Plug-ins,” in International Conference on Software Engineering, pp. 33-44, Paderborn, February 2010
      9. S. J. Jiang, L. S. Wang, M. Xue, Y. M. Zhang, Q. Yu, and H. R. Yao, “Test Case Generation Based on Combination of Schema Using Particle Swarm Optimization,” Journal of Software, vol. 27, no. 4, pp. 785-801, April 2016 (in Chinese with English abstract)
      10. H. V. Nguyen, C. Kästner, and T. N. Nguyen, “Exploring Variability-aware Execution for Testing Plugin-based Web Applications,” in ACM International Conference on Software Engineering, pp. 907-918, Orlando, Florida, USA, May 2014
      11. C. Wu, D. W. Gong, and X. J. Yao, “Selection of Paths for Regression Testing Based on Branch Coverage,” Journal of Software, vol. 27, no. 4, pp. 839-854, April 2016 (in Chinese with English abstract)
      12. C. Y. Xia, Y. Zhang, and L. Song, “Evolutionary Generation of Test Data for Paths Coverage Based on Node Probability,” Journal of Software, vol. 27, no. 4, pp. 802-813, April 2016 (in Chinese with English abstract)
      13. X. J. Yao, “Theory of Evolutionary Generation of Test Data for Complex Software and Applications,” China University of Mining and Technology, Xuzhou, China, April 2011 (in Chinese with English abstract)
      14. X. J. Yao, D. W. Gong, and B. Li, “Evolutional Test Data Generation for Path Coverage by Integrating Neural Network,” Journal of Software, vol. 27, no. 4, pp. 828-838, April 2016 (in Chinese with English abstract)
      15. G. J. Zhang, D. W. Gong, and X. J. Yao, “Test Case Generation Based on Mutation Analysis and Set Evolution,” Chinese Journal of Computers, vol. 38, no. 11, pp. 2318-2331, November 2015 (in Chinese with English abstract)

           

          Click here to download the paper.

          Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

           

          CURRENT ISSUE

          Prev Next

          A Label Propagation Algorithm based on Circular Spread

          Yong Wang, Xinzhen Fang, Jiahao Shi, and Jing Yang

          Read more

          Abnormal Information Identification and Elimination in Cognitive Networks

          Ruowu Wu, Xiang Chen, Hui Han, Haojun Zhao, and Yun Lin

          Read more

          A Framework of Intrusion Detection System based on Bayesian Network in IoT

          Qingping Shi, Jian Kang, Rong Wang, Hang Yi, Yun Lin, and Jie Wang

          Read more

          Marine Three-Shaft Intercooled-Cycle Gas Turbine Engine Transient Thermodynamic Simulation

          Jingchao Li, Guoyin Zhang, Yulong Ying,Wanying Shi, and Dongyuan Bi

          Read more

          An Optimization Method for XML Twig Query

          Zhixue He, Huan Wang, and Husheng Liao

          Read more

          An Indoor Fusion Localization Method using Pedestrian Dead Reckoning

          Qian Zhao, Peng Luan, Huiqiang Wang, Hongwu Lv, Guangsheng Feng, and Mao Tang

          Read more

          Delay Constraint Data Collection Strategy in VANET

          Huanhuan Yang, Zongpu Jia, and Guojun Xie

          Read more

          Parallel Optimization of KNN Query Strategy based on Road Network

          Boqi Hu, Hailong Sun, Fangsong Li, Chao Jiang, and Weitao Zou

          Read more

          An Improved TOA Model based on Error Correction and Self-Genetic Algorithm

          Xuyang Wang, Yaxi Wang, Zhongkai Dang, Hongmei Pei, and Long Zhang

          Read more

          A Bipartite Graph Matching Algorithm in Human-Computer Collaboration

          Junfeng Man, Longqian Zhao, Ming Liu, Cheng Peng, and Qianqian Li

          Read more

          A Distributed Secure Monitoring System based on Blockchain

          Guangsong Yang, Xinwen Wu, Yiliang Wu, and Chincheng Chen

          Read more

          Design of Outcome-based Education Blockchain

          Tao Li, Bin Duan, Dayu Liu, and Zhen Fu

          Read more

          An Automatic Web Data Extraction Approach based on Path Index Trees

          Yan Wen, Qingtian Zeng, Hua Duan, Feng Zhang, and Xin Chen

          Read more

          Deep Web Entity Identification Method with Unique Constraint

          Xuefeng Xian, Pengpeng Zhao, Zhaobin Liu, Caidong Gu, and Victor S. Sheng

          Read more

          A Hierarchical Caching Decision Algorithm for Content-Centric Network

          Zengyu Cai, Xuhui Wang, Jianwei Zhang, Wanwei Huang, and Yong Gan

          Read more

          New Polling Scheme based on Busy/Idle Queues Mechanism

          Zhijun Yang, Yangyang Sun, and Jianhou Gan

          Read more
          This site uses encryption for transmitting your passwords. ratmilwebsolutions.com