A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Model-Checking Plus Testing: From Software Architecture Analysis to Code Testing
[chapter]
2004
Lecture Notes in Computer Science
Software Model-Checking and Testing are some of the most used techniques to analyze software systems and identify hidden faults. ...
While software model-checking allows for an exhaustive and automatic analysis of the system expressed through a model, software testing is based on a clever selection of "relevant" test cases, which may ...
The combination of SA-level model-checking and SA-based code testing allows to guarantee that the architecture correctly reflects important requirements and the code conforms to the software architecture ...
doi:10.1007/978-3-540-30233-9_26
fatcat:zdd7alsgwjbd5h75nded6nzwji
Built-In Contract Testing in Component Integration Testing
2003
Electronical Notes in Theoretical Computer Science
Assembling new software systems from prefabricated components is an attractive alternative to traditional software engineering practices which promises to increase reuse and reduce development costs. ...
This position paper outlines and introduces an approach for reducing manual system verification effort by equipping components with the ability to check their execution environments at run-time. ...
history plus a specific architecture. ...
doi:10.1016/s1571-0661(04)81022-3
fatcat:coy43my36jgcnfjvsabuzyw4bi
Diagnosis of Software using Testing Time and Testing Coverage
2016
International Journal of Hybrid Information Technology
Through this paper we have shown the importance of the testing time and testing coverage in the analysis of software reliability. ...
Software reliability testing plays a vital role to identify many flaws in software design as well as functional aspects. ...
But only testing is unable to remove all the flaws within the software because testing mechanism is suffered from the imperfect debugging and error generation. ...
doi:10.14257/ijhit.2016.9.9.08
fatcat:d4b6avgxhberlkn2r57wbl4zu4
Model-Based Built-In Tests
2005
Electronical Notes in Theoretical Computer Science
, represent them on model level, and to generate executable tests from these test models. ...
This paper extends contract-based built-in tests where components are equipped with the ability to check their execution environment at run-time with approaches to derive built-in tests from system models ...
Built-in Test Architecture
Generation of Built-In Tests from UML Testing that is based on the UML has many concepts in common with traditional code-based testing techniques. ...
doi:10.1016/j.entcs.2004.12.001
fatcat:xac4dxdswrgsjov2uu3bfzls2i
Model-based testing
2005
Proceedings of the 27th international conference on Software engineering - ICSE '05
where you have to think about its deployment ► Know what it can do and what it can't ► Know where and not automation is likely to be possible ► Be able to, in principle, conceive a set-up for model-based ...
and not systematic; bound to the ingenuity of single engineers 2 Model-Based Testing, 31/5/2010, Alexander Pretschner 3 Overview ► Motivation ► Models and Abstraction ► Scenarios ► Selection Criteria ...
► OEM builds model, suppliers have to conform to it
► 1 model from code
► Redundancy?
► Ex-post development of test cases only
► [Pretschner'05]
43
And in the real world? ...
doi:10.1145/1062455.1062636
dblp:conf/icse/Pretschner05
fatcat:m7yv7to4uba3fig4oeev3ovp6i
Test Case Recording using JavaScript for Automation Testing
2021
International journal of recent technology and engineering
Test automation is the usage of software to monitor the execution of experiments and the comparison of actual results with expected results, apart from the software being evaluated. ...
There is a need to simplify the test case recording process as most of the methods used at present requires the testers to generate scripts using any coding language. ...
PROPOSED MODEL A new recording process for web application testing, Selenium framework is used to induce the JavaScript code for recording and is used for running the test cases, JavaScript model is used ...
doi:10.35940/ijrte.a5810.0510121
fatcat:mowkupaxmvakxj4e5h2m4nop5u
Formal Methods in Testing Software Architectures
[chapter]
2003
Lecture Notes in Computer Science
We describe here an approach for SA-based conformance testing: architectural tests are selected from a Labelled Transition System (LTS) representing the SA behavior and are then refined into concrete tests ...
SA dynamic descriptions can be usefully employed in testing and analysis. ...
We are indebted to Antonio Bucchiarone, who provided the CW case study, and to Thierry Jeron for his constructive help in applying the TGV tool on the CW. ...
doi:10.1007/978-3-540-39800-4_7
fatcat:42xcmo6azrdmdkzmimofb6nwim
OSMOSE: automatic structural testing of executables
2011
Software testing, verification & reliability
Low-level analysis is much more difficult than high-level analysis since even the control-flow graph is not available and bit-level instructions have to be modelled faithfully. ...
The paper shows how "path-based" structural test data generation can be adapted from structured language to machine code, using both state-of-theart technologies and innovative techniques. ...
The authors wish to thank the three anonymous referees for their helpful comments, contributing to a significant improvement of the paper. ...
doi:10.1002/stvr.423
fatcat:m65u7avye5dobizq3xajt553za
Protocol testing
1994
Proceedings of the 1994 international symposium on Software testing and analysis - ISSTA '94
The purpose of this paper is to explain in which way the problem of testing protocol implementations is different from the usual problem of software testing. ...
Since protocols are implemented in software and/or hardware, the question arises whether the existing hardware and software testing methods would be adequate for the testing of communication protocols. ...
The authors wish to ...
doi:10.1145/186258.187153
dblp:conf/issta/BochmannP94
fatcat:cidcy7q36nfhte7sthilvgbw3y
Cross-layer analysis, testing and verification of automotive control software
2011
Proceedings of the ninth ACM international conference on Embedded software - EMSOFT '11
The emphasis is on modelbased code generation, analysis, testing and verification of control software for automotive architectures, as well as on architecture or platform configuration to ensure that the ...
Automotive Control Systems, Model-based code generation, Model-based testing and verification ...
Next, based on a test criteria, bounded model checking (BMC) is applied on the SAL model to derive test cases from counter example traces. ...
doi:10.1145/2038642.2038683
dblp:conf/emsoft/BroyCGRSRP11
fatcat:wixbqk74mrdhpl4e42n4hatqha
MANTra: Towards Model Transformation Testing
2010
2010 Seventh International Conference on the Quality of Information and Communications Technology
Our proposal, called MANTra (Model trANsformation Testing), allows software developers to design test cases directly within the QVTO language and verify them without moving from the transformation environment ...
This increasing usage asks for a new generation of testing tools to verify correctness and suitability of model transformations. ...
Specifically, reliability and performance estimation tools exploit model transformation in order to obtain analysis models from design ones. ...
doi:10.1109/quatic.2010.15
dblp:conf/quatic/CianconeFM10
fatcat:pqyhcdbcxjclfelctoqsw7hdve
A framework for testing hardware-software security architectures
2010
Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10
We show two important lessons learned from the testing of the SP architecture that affect the design and implementation of the architecture. ...
New security architectures are difficult to prototype and test at the design stage. Fine-grained monitoring of the interactions between hardware, the operating system and applications is required. ...
Furthermore, software-only security architectures can benefit from analysis under attack in our framework, both during development and for security validation. ...
doi:10.1145/1920261.1920318
dblp:conf/acsac/DwoskinGCL10
fatcat:cdxvpmsw25crzhob7oukr6idsm
Using source transformation to test and model check implicit-invocation systems
2006
Science of Computer Programming
In this paper we present a source transformation-based framework to support uniform testing and model checking of implicitinvocation software systems. ...
to assist in the implementation, validation and verification of programming languages and software systems in general. ...
Acknowledgements We would like to thank David Garlan, Serge Khersonsky and Jung Soo Kim for providing us with information and software that served as the basis for the model checking portion of our research ...
doi:10.1016/j.scico.2006.04.008
fatcat:dex64lrvmjbn7imlu23hnol3vi
Mixing ATPG and property checking for testing HW/SW interfaces
2003
Proceedings of the 13th ACM Great Lakes Symposium on VLSI - GLSVLSI '03
The proposed verification methodology joins functional verification and property checking in order to avoid their respective limitations. ...
This is particularly important since commercial model checking tools work on structural hardware descriptions, which can be obtained by performing rapid prototyping of both HW and SW parts of SystemC models ...
This verification methodology focuses the use of the powerful, but computational expensive, model checking analysis, to the only hard to detect faults, which can really represent design errors. ...
doi:10.1145/764883.764887
fatcat:c6cibu252zctjofdktv33d5ysu
Mixing ATPG and property checking for testing HW/SW interfaces
2003
Proceedings of the 13th ACM Great Lakes Symposium on VLSI - GLSVLSI '03
The proposed verification methodology joins functional verification and property checking in order to avoid their respective limitations. ...
This is particularly important since commercial model checking tools work on structural hardware descriptions, which can be obtained by performing rapid prototyping of both HW and SW parts of SystemC models ...
This verification methodology focuses the use of the powerful, but computational expensive, model checking analysis, to the only hard to detect faults, which can really represent design errors. ...
doi:10.1145/764808.764887
dblp:conf/glvlsi/FinFP03
fatcat:nq65skunonfefjh42mq6rwr3bu
« Previous
Showing results 1 — 15 out of 42,835 results