A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
A test case generation approach for conformance testing of SDL systems
2001
Computer Communications
This paper presents an approach for automatic executable test case and test sequence generation for a protocol modeled by an SDL system. ...
Our methodology uses a unified method which tests an Extended Finite State Machine (EFSM) based system by using control and data flow techniques. ...
His inputs are an SDL specification and a test suite structure with test purposes and his task is to develop an abstract TTCN test suite, based on this input. This tool is semi-automatic. ...
doi:10.1016/s0140-3664(00)00220-6
fatcat:of2dxl2fpffbbhxjekhm542dry
World Model for Testing Autonomous Systems Using Petri Nets
2016
2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE)
We apply the World Model-based Test Generation (WMBTG) technique to a case study from the Human-Robot Interaction domain (HRI) specifically a tour-guide robot. ...
This paper describes a model-based test generation approach for testing autonomous systems interacting with their environment (i.e., world). ...
They grouped MBT tools based on test criteria similarity. Twelve MBT tools are selected for primary studies. A comparison enables tool selection based on project needs. ...
doi:10.1109/hase.2016.11
dblp:conf/hase/AndrewsAG16
fatcat:bfd45sm27feablf5mcfkplb5ue
Fail-Safe Test Generation in Safety Critical Systems
2014
2014 IEEE 15th International Symposium on High-Assurance Systems Engineering
an explicit mitigation model for which we generate mitigation paths which are then woven at selected failure points into the original test suite to create failure-mitigation tests (safety mitigation test ...
Unlike other approaches which integrate behavioral and failure models, and then generate tests from the integrated model, we build safety mitigation tests from an existing behavioral test suite, using ...
They offers selective regression testing based on FSMWeb. ...
doi:10.1109/hase.2014.16
dblp:conf/hase/AndrewsEB14
fatcat:vi5ho6nbpbh3rb6qeyolghdlcu
Fail-Safe Testing of Safety-Critical Systems
2014
2014 23rd Australian Software Engineering Conference
This dissertation proposes an approach for testing of safety-critical systems. It is based on a behavioral and a fault model. ...
The dissertation illustrates this general framework using a CEFSM for the behavioral model and a Fault Tree for the fault model. ...
Test selection directives may be in the form of random test selection, selection based on some kind of coverage criteria, selection described by test purposes, or mixture of these. ...
doi:10.1109/aswec.2014.19
dblp:conf/aswec/GarioA14
fatcat:klsoi6au6rco7i5ufcktfltyii
Verification and testing of safety-critical airborne systems: A model-based methodology
2019
Computer Science and Information Systems
This is achieved by proposing a new methodology for the verification and testing of parallel communicating agents based on formal models. ...
The objective is to integrate model-based verification and model-based testing within a single framework and to capture the benefits of their cross-fertilization. ...
We then present our model-based testing and show how to automatically generate test cases in Section 4. ...
doi:10.2298/csis190430040e
fatcat:uvj2zoh2e5asvcycsnqlbois7m
A method to derive a single-EFSM from communicating multi-EFSM for data part testing
[chapter]
1997
Testing of Communicating Systems
However, existing automatic test generation methods based on single-module structure are not applicable to real protocol having multi-module one. ...
The necessity that test sequences are automatically generated from a protocol specification for the purpose of testing data Bow in the implementation has been emphasized because the cost of the most existing ...
Early work on test case generation has been based on a single-module FSM or EFSM model. ...
doi:10.1007/978-0-387-35198-8_7
fatcat:w4wlzobqtjeaphwmz4bxxlumy4
A Global Algorithm for Model-Based Test Suite Generation
2007
Electronical Notes in Theoretical Computer Science
Model-based testing has been proposed as a technique to automatically verify that a system conforms to its specification. ...
We propose an on-the-fly algorithm that generates a test suite that covers all feasible coverage items. ...
In this paper, we study techniques for model-based conformance testing in a setting where the test suite is automatically generated from a model before the actual testing takes place -sometimes referred ...
doi:10.1016/j.entcs.2007.08.005
fatcat:4g4fofahvje6bgxdlm5waen34u
A pattern-based development methodology for communication protocols
2005
Proceedings of the 2005 ACM symposium on Applied computing - SAC '05
In this paper, we propose a pattern-based software development methodology for communication protocols, particularly focusing on the specification and validation of message interactions. ...
To provide confidence in the protocol description, we validate the pattern-based specification by using the SPIN model checker. ...
We provide a translation mechanism to build a model from a pattern-based specification. ...
doi:10.1145/1066677.1067020
dblp:conf/sac/ByunS05
fatcat:wkykk6qxyzdknhgt5h4c746f7y
Virtual Control
2004
IEEE robotics & automation magazine
A cluster tool usually has six or eight PMs, a cooler (CL), an aligner (AL), two loadlocks (LLs), and a TM based on a robot ...
Dong-Hwan Hwang for his work on 3-D graphic modeling of a cluster tool.
Keywords Cluster tool, semiconductor manufacturing, control software, virtual model, verification. ...
That is, a state transition or an event occurrence at one CEFSM, which is internal within the CTC or the scheduler, may affect state transitions at other CEFSMs. ...
doi:10.1109/mra.2004.1337825
fatcat:efilt22ejrgq7np4ja75zhsxlm
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
[chapter]
2008
Lecture Notes in Computer Science
Our testing reveals some serious reliability and security flaws by automatically crashing both of them. ...
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. ...
The key idea is to obtain an approximate formal model of the component under test and use it to automatically guide test selection for better fault coverage. ...
doi:10.1007/978-3-540-68855-6_19
fatcat:rwlvzbbxwfeulk4qrrlc373rqm
Model-based testing for software safety: a systematic mapping study
2017
Software quality journal
Based on the analysis of the data extraction process, we discuss the primary trends and approaches and present the identified obstacles. ...
Model-based testing adopts models of a system under test and/or its environment to derive test artifacts. ...
There seems to be a clear impact of the specific domain on the model-based testing process. ...
doi:10.1007/s11219-017-9386-2
fatcat:vnsqgyzf75gmpdld5l3in5r6mi
Mutation Testing Applied to Validate SDL Specifications
[chapter]
2004
Lecture Notes in Computer Science
Mutation Testing is an error-based criterion that provides mechanisms to evaluate the quality of a test set and/or to generate test sets. ...
This criterion, originally proposed to program testing, has also been applied to specification testing. In this paper, we propose the application of Mutation Testing for testing SDL specifications. ...
The test cases generated at specification level are used to test the programs implemented based on the specification and its mutants. Two algorithms were proposed to select test cases. ...
doi:10.1007/978-3-540-24704-3_13
fatcat:lbgz76yqijdx5geywt7w74gnua
Harnessing Context for Vandalism Detection in Wikipedia
2014
EAI Endorsed Transactions on Collaborative Computing
In this paper, we propose a context-based vandalism detection framework for Wikipedia. ...
We outline machine learning-based vandalism identification schemes that utilize these metrics. Our experiments indicate that utilizing context can substantially improve vandalism detection accuracy. ...
The automatic data instance labeler uses the revision history (specifically, the revert and rollback history) to label edits as vandalism or regular edit. ...
doi:10.4108/cc.1.1.e7
fatcat:wjs344fzp5fuzfnve54yqioezy
Scalable Incremental Test-case Generation from Large Behavior Models
[chapter]
2015
Lecture Notes in Computer Science
Firstly, our approach relies on a synchronous specification language for test models, thus avoiding the problem of interleaving actions. ...
Model-based testing is a popular black-box testing technology that enables automation of test generation and execution, while achieving a given coverage. ...
We note that in model-based testing there are various possible test-selection mechanisms, which aim at di↵erent coverage criteria. ...
doi:10.1007/978-3-319-21215-9_1
fatcat:hkmx5ai4y5bgffqsvxvdbkch3a
Validation of SDL specifications using EFSM-based test generation
2009
Information and Software Technology
In this paper, we present our test generation method and tool, and provide case studies on five SDL processes demonstrating the effectiveness of our coverage-based test sequence selection. ...
We propose a test generation method that can accomplish conformance verification as well as coverage criteria-driven white box testing of the specification itself. ...
Second, many of them are focused on the conformance testing on the system implemented based on the specification (i.e., testing the consistency between the specification and the implementation) with an ...
doi:10.1016/j.infsof.2009.06.005
fatcat:xkwgpmyxg5bfvfhwkfe5xzv6xu
« Previous
Showing results 1 — 15 out of 25 results