1 | Val{\'{e}}ria Lelli and Arnaud Blouin and Benoit Baudry Classifying and Qualifying {GUI} Defects CoRR, abs/1703.09567(), 2017. |
|
| Abstract: Available soon... |
| @ARTICLE{LelliBB17,
author = {Val{\'{e}}ria Lelli and Arnaud Blouin and Benoit Baudry},
title = {Classifying and Qualifying {GUI} Defects},
journal = {CoRR},
year = {2017},
month = {},
volume = {abs/1703.09567},
number = {},
pages = {}
} |
2 | Vincent Aranega and Jean{-}Marie Mottu and Anne Etien and Thomas Degueule and Benoit Baudry and Jean{-}Luc Dekeyser Towards an automation of the mutation analysis dedicated to model transformation Softw. Test., Verif. Reliab., 25(), 2015. |
|
| Abstract: Available soon... |
| @ARTICLE{aranega_STVR_15,
author = {Vincent Aranega and Jean{-}Marie Mottu and Anne Etien and Thomas Degueule and Benoit Baudry and Jean{-}Luc Dekeyser},
title = {Towards an automation of the mutation analysis dedicated to model transformation},
journal = {Softw. Test., Verif. Reliab.},
year = {2015},
month = {},
volume = {25},
number = {},
pages = {653--683}
} |
3 | Benoit Baudry and Simon Allier and Martin Monperrus Tailored source code transformations to synthesize computationally diverse program variants International Symposium on Software Testing and Analysis, {ISSTA} '14, San Jose, CA, {USA} - July 21 - 26, 2014, 2014. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{BaudryAM14,
author = {Benoit Baudry and Simon Allier and Martin Monperrus},
title = {Tailored source code transformations to synthesize computationally diverse program variants},
booktitle = {International Symposium on Software Testing and Analysis, {ISSTA} '14, San Jose, CA, {USA} - July 21 - 26, 2014},
year = {2014},
address = {},
month = {},
pages = {149--159}
} |
4 | Alexandre Bartel and Benoit Baudry and Freddy Munoz and Jacques Klein and Tejeddine Mouelhi and Yves Le Traon Model Driven Mutation Applied to Adaptative Systems Testing Fourth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2011 Workshops Proceedings, March 21 - March 25, 2011, Berlin, Germany, 2011. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{bartel_ICSTW_11,
author = {Alexandre Bartel and Benoit Baudry and Freddy Munoz and Jacques Klein and Tejeddine Mouelhi and Yves Le Traon},
title = {Model Driven Mutation Applied to Adaptative Systems Testing},
booktitle = {Fourth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2011 Workshops Proceedings, March 21 - March 25, 2011, Berlin, Germany},
year = {2011},
address = {},
month = {},
pages = {408--413}
} |
5 | Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry Transforming and Selecting Functional Test Cases for Security Policy Testing Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{mouelhi_icst_09,
author = {Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry},
title = {Transforming and Selecting Functional Test Cases for Security Policy Testing},
booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009},
year = {2009},
address = {},
month = {},
pages = {171--180}
} |
6 | Tejeddine Mouelhi and Benoit Baudry and Yves Le Traon Transforming and Selecting Functional Test Cases for Security Policy Testing Proceedings of the 2nd International Conference on Software Testing, Verification and ValidationDenver, Colorado, 1-4 April 2009. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{MouelhFBL09,
author = {Tejeddine Mouelhi and Benoit Baudry and Yves Le Traon},
title = {Transforming and Selecting Functional Test Cases for Security Policy Testing},
booktitle = {Proceedings of the 2nd International Conference on Software Testing, Verification and Validation},
year = {2009},
address = {Denver, Colorado},
month = {1-4 April},
pages = {171–180}
} |
7 | Romain Delamare and Benoit Baudry and Yves Le Traon AjMutator: A Tool For The Mutation Analysis Of AspectJ Pointcut Descriptors Proceedings of the 4th International Workshop on Mutation Analysis (MUTATION'09)Denver, Colorado, 1-4 April 2009. |
|
| Abstract: Aspect-oriented programming introduces new challenges for software testing. Inparticular the pointcut descriptor (PCD) requires particular attention fromtesters. The PCD describes the set of joinpoints where the advices are woven.In this paper we present a tool, AjMutator, for the mutation analysis of PCDs.AjMutator implements several mutation operators that introduce faults in thePCDs to generate a set of mutants. AjMutator classifies the mutants accordingto the set of joinpoints they match compared to the set of joinpoints matchedby the initial PCD. An interesting result is that this automaticclassification can identify equivalent mutants for a particular class of PCDs.AjMutator can also run a set of test cases on the mutants to give a mutationscore. We have applied AjMutator on two systems to show that this tool issuitable for the mutation analysis of PCDs on large AspectJ systems. |
| @INPROCEEDINGS{DelamareBT09,
author = {Romain Delamare and Benoit Baudry and Yves Le Traon},
title = {AjMutator: A Tool For The Mutation Analysis Of AspectJ Pointcut Descriptors},
booktitle = {Proceedings of the 4th International Workshop on Mutation Analysis (MUTATION'09)},
year = {2009},
address = {Denver, Colorado},
month = {1-4 April},
pages = {200-204}
} |
8 | Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ Proceedings of the 2nd International Conference on Software Testing Verification and Validation (ICST'09)Davor Colorado, 01-04 April 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{DelamareBGT09,
author = {Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon},
title = {A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ},
booktitle = {Proceedings of the 2nd International Conference on Software Testing Verification and Validation (ICST'09)},
year = {2009},
address = {Davor Colorado},
month = {01-04 April},
pages = {376–385}
} |
9 | Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{delamare_ICST_09,
author = {Romain Delamare and Benoit Baudry and Sudipto Ghosh and Yves Le Traon},
title = {A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ},
booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009},
year = {2009},
address = {},
month = {},
pages = {376--385}
} |
10 | Romain Delamare and Benoit Baudry and Yves Le Traon AjMutator: {A} Tool for the Mutation Analysis of AspectJ Pointcut Descriptors Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops Proceedings, 2009. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{delamare_ICSTW_09,
author = {Romain Delamare and Benoit Baudry and Yves Le Traon},
title = {AjMutator: {A} Tool for the Mutation Analysis of AspectJ Pointcut Descriptors},
booktitle = {Second International Conference on Software Testing Verification and Validation, {ICST} 2009, Denver, Colorado, USA, April 1-4, 2009, Workshops Proceedings},
year = {2009},
address = {},
month = {},
pages = {200--204}
} |
11 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry A Generic Metamodel For Security Policies Mutation Proceedings of the IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)Lillehammer, Norway, 9-11 April 2008. |
|
| Abstract: We present a new approach for mutation analysis of security policies test cases. We propose a metamodel that provides a generic representation of security policies access control models and define a set of mutation operators at this generic level. We use Kermeta to build the metamodel and implement the mutation operators. We also illustrate our approach with two successful instantiation of this metamodel: we defined policies with RBAC and OrBAC and mutated these policies. |
| @INPROCEEDINGS{MouelhiFB08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry},
title = {A Generic Metamodel For Security Policies Mutation},
booktitle = {Proceedings of the IEEE International Conference on Software Testing Verification and Validation Workshop (ICSTW'08)},
year = {2008},
address = {Lillehammer, Norway},
month = {9-11 April},
pages = {278-286}
} |
12 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon A Model-based Framework for Security Policies Specifications, Deployment and Testing Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS'08)Toulouse, France, 28 September - 1 October 2008. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{MouelhiFBL08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon},
title = {A Model-based Framework for Security Policies Specifications, Deployment and Testing},
booktitle = {Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS'08)},
year = {2008},
address = {Toulouse, France},
month = {28 September - 1 October},
pages = {537–552}
} |
13 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry A Generic Metamodel For Security Policies Mutation First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings, 2008. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{mouelhi_icst_08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry},
title = {A Generic Metamodel For Security Policies Mutation},
booktitle = {First International Conference on Software Testing Verification and Validation, {ICST} 2008, Lillehammer, Norway, April 9-11, 2008, Workshops Proceedings},
year = {2008},
address = {},
month = {},
pages = {278--286}
} |
14 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon Mutating DAC And MAC Security Policies: A Generic Metamodel Based Approach Proceedings of the 1st International Modeling Security WorkshopToulouse, France, 28th September 2008. |
|
| Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| @INPROCEEDINGS{MouelhiFBL08a,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon},
title = {Mutating DAC And MAC Security Policies: A Generic Metamodel Based Approach},
booktitle = {Proceedings of the 1st International Modeling Security Workshop},
year = {2008},
address = {Toulouse, France},
month = {28th September},
pages = {}
} |
15 | Yves Le Traon and Tejeddine Mouelhi and Benoit Baudry Testing Security Policies: Going Beyond Functional Testing The 18th IEEE International Symposium on Software ReliabilityTrollh\"attan, Sweden, 5-9 November 2007. |
|
| Abstract: While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper introduces security policy testing as a specific target for testing. We propose two strategies for producing security policy test cases, depending if they are built in complement of existing functional test cases or independently from them. Indeed, any security policy is strongly connected to system functionality: testing functions includes exercising many security mechanisms. However, testing functionality does not intend at putting to the test security aspects. We thus propose test selection criteria to produce tests from a security policy. To quantify the effectiveness of a set of test cases to detect security policy flaws, we adapt mutation analysis and define security policy mutation operators. A library case study, a 3-tiers architecture, is used to obtain experimental trends. Results confirm that security must become a specific target of testing to reach a satisfying level of confidence in security mechanisms. |
| @INPROCEEDINGS{TraonMB07,
author = {Yves Le Traon and Tejeddine Mouelhi and Benoit Baudry},
title = {Testing Security Policies: Going Beyond Functional Testing},
booktitle = {The 18th IEEE International Symposium on Software Reliability},
year = {2007},
address = {Trollh\"attan, Sweden},
month = {5-9 November},
pages = {93-102}
} |
16 | Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry Mutation Analysis for Security Tests Qualification Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)Windsor, UK, 10-14 September 2007. |
|
| Abstract: In this paper, we study how mutation analysis can be adapted to qualify test cases aiming at testing a security policy. The objective is to make test cases efficient to reveal erroneous implementations of a security policy. The notion of security policy testing is studied and mutation operators are defined in relation with the security rules. To make the approach applicable in practice we discuss and empirically rank the security mutation operators from the most to the least difficult to kill. The empirical study is a library software, which is implemented with a typical 3-tier architecture. |
| @INPROCEEDINGS{MouelhiTB07,
author = {Tejeddine Mouelhi and Yves Le Traon and Benoit Baudry},
title = {Mutation Analysis for Security Tests Qualification},
booktitle = {Proceedings of the 3rd Workshop on Mutation Analysis (MUTATION'07)},
year = {2007},
address = {Windsor, UK},
month = {10-14 September},
pages = {233-242}
} |
17 | Benoit Baudry and Franck Fleurey and Yves Le Traon Improving Test Suites for Efficient Fault Localization Proceedings of the 28th International Conference on Software Engineering (ICSE'06)Shanghai, China, 20-28 May 2006. |
|
| Abstract: The need for testing-for-diagnosis strategies has been identified for a long time, but the explicit link from testing to diagnosis (fault localization) is rare. Analyzing the type of information needed for efficient fault localization, we identify the attribute (called Dynamic Basic Block) that restricts the accuracy of a diagnosis algorithm. Based on this attribute, a test-for-diagnosis criterion is proposed and validated through rigorous case studies: it shows that a test suite can be improved to reach a high level of diagnosis accuracy. So, the dilemma between a reduced testing effort (with as few test cases as possible) and the diagnosis accuracy (that needs as much test cases as possible to get more information) is partly solved by selecting test cases that are dedicated to diagnosis. |
| @INPROCEEDINGS{BaudryFT06,
author = {Benoit Baudry and Franck Fleurey and Yves Le Traon},
title = {Improving Test Suites for Efficient Fault Localization},
booktitle = {Proceedings of the 28th International Conference on Software Engineering (ICSE'06)},
year = {2006},
address = {Shanghai, China},
month = {20-28 May},
pages = {82-91}
} |
18 | Sagar Sen and Benoit Baudry Mutation-based Model Synthesis in Model Driven Engineering Proceedings of the 2nd Workshop on Mutation Analysis (MUTATION'06)Raleigh, North Carolina, November 2006. |
|
| Abstract: With the increasing use of models for software development and the emergence of model-driven engineering, it has become important to build accurate and precise models that present certain characteristics. Model transformation testing is a domain that requires generating a large number of models that satisfy coverage properties (cover the code of the transformation or the structure of the metamodel). However, manually building a set of models to test a transformation is a tedious task and having an automatic technique to generate models from a metamodel would be very helpful. We investigate the synthesis of models based on plans. Each plan comprises of a sequence of model synthesis rules (or mutation operators) specified as graph grammar (GG) rules. These mutation operators are primitive GG rules , automatically obtained from any meta-model. Such plans can be evolved by various artificial intelligence techniques to generate useful models for different tasks including model transformation testing. |
| @INPROCEEDINGS{SenB06,
author = {Sagar Sen and Benoit Baudry},
title = {Mutation-based Model Synthesis in Model Driven Engineering},
booktitle = {Proceedings of the 2nd Workshop on Mutation Analysis (MUTATION'06)},
year = {2006},
address = {Raleigh, North Carolina},
month = {November},
pages = {13}
} |
19 | Jean-Marie Mottu and Benoit Baudry and Yves Le Traon Mutation Analysis Testing for Model Transformations Proceedings of the 2nd European Conference on Model Driven Architecture - Foundations and ApplicationsBilbao, Spain, July 2006. |
|
| Abstract: In MDE, model transformations should be efficiently tested so that it may be used and reused safely. Mutation analysis is an efficient technique to evaluate the quality of test data, and has been extensively studied both for procedural and object-oriented languages. In this paper, we study how it can be adapted to model oriented programming. Since no model transformation language has been widely accepted today, we propose generic fault models that are related to the model transformation process. First, we identify abstract operations that constitute this process: model navigation, model’s elements filtering, output model creation and input model modification. Then, we propose a set of specific mutation operators which are directly inspired from these operations. We believe that these operators are meaningful since a large part of the errors in a transformation are due to the manipulation of complex models regardless of the concrete implementation language. |
| @INPROCEEDINGS{MottuBT06,
author = {Jean-Marie Mottu and Benoit Baudry and Yves Le Traon},
title = {Mutation Analysis Testing for Model Transformations},
booktitle = {Proceedings of the 2nd European Conference on Model Driven Architecture - Foundations and Applications},
year = {2006},
address = {Bilbao, Spain},
month = {July},
pages = {376-390}
} |
20 | Yves Le Traon and Benoit Baudry and Jean-Marc J\'ez\'equel Design by Contract to Improve Software Vigilance IEEE Transactions of Software Engineering, 32(8), August 2006. |
|
| Abstract: Available soon... |
| @ARTICLE{TraonBJ06,
author = {Yves Le Traon and Benoit Baudry and Jean-Marc J\'ez\'equel},
title = {Design by Contract to Improve Software Vigilance},
journal = {IEEE Transactions of Software Engineering},
year = {2006},
month = {August},
volume = {32},
number = {8},
pages = {571–586}
} |
21 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon Automatic Test Case Optimization: A Bacteriologic Algorithm IEEE Software, 22(2), March-April 2005. |
|
| Abstract: Improving test cases automatically is a nonlinear optimization problem. To solve this problem, we've developed a bacteriologic algorithm, adapted from genetic algorithms that can generate and optimize a set of test cases. A .NET component that parses C# source files illustrates our algorithm. |
| @ARTICLE{BaudryFJT05a,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {Automatic Test Case Optimization: A Bacteriologic Algorithm},
journal = {IEEE Software},
year = {2005},
month = {March-April},
volume = {22},
number = {2},
pages = {76-82}
} |
22 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon From Genetic to Bacteriological Algorithms for Mutation-based Testing Software Testing, Verification and Reliability, 15(2), June 2005. |
|
| Abstract: The level of confidence in a software component is often linked to the quality of its test cases. This quality can in turn be evaluated with mutation analysis: faults are injected into the software component (making mutants of it) to check the proportion of mutants detected (‘killed’) by the test cases. But while the generation of a set of basic test cases is easy, improving its quality may require prohibitive effort. This paper focuses on the issue of automating the test optimization. The application of genetic algorithms would appear to be an interesting way of tackling it. The optimization problem is modelled as follows: a test case can be considered as a predator while a mutant program is analogous to a prey. The aim of the selection process is to generate test cases able to kill as many mutants as possible, starting from an initial set of predators, which is the test cases set provided by the programmer. To overcome disappointing experimentation results, on .Net components and unit Eiffel classes, a slight variation on this idea is studied, no longer at the ‘animal’ level (lions killing zebras, say) but at the bacteriological level. The bacteriological level indeed better reflects the test case optimization issue: it mainly differs from the genetic one by the introduction of a memorization function and the suppression of the crossover operator. The purpose of this paper is to explain how the genetic algorithms have been adapted to fit with the issue of test optimization. The resulting algorithm differs so much from genetic algorithms that it has been given another name: bacteriological algorithm. |
| @ARTICLE{BaudryFJT05,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {From Genetic to Bacteriological Algorithms for Mutation-based Testing},
journal = {Software Testing, Verification and Reliability},
year = {2005},
month = {June},
volume = {15},
number = {2},
pages = {73 - 96}
} |
23 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon Automatic Test Case Optimization Using a Bacteriological Adaptation Model: Application to .NET Components Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE'02)Edinburgh, Scotland, 23-27 September 2002. |
|
| Abstract: In this paper, we present several complementary computational intelligence techniques that we explored in the field of .Net component testing. Mutation testing serves as the common backbone for applying classical and new artificial intelligence (AI) algorithms. With mutation tools, we know how to estimate the revealing power of test cases. With AI, we aim at automatically improving test case efficiency. We therefore looked first at genetic algorithms (GA) to solve the problem of test. The aim of the selection process is to generate test cases able to kill as many mutants as possible. We then propose a new AI algorithm that fits better to the test optimization problem, called bacteriological algorithm (BA): BAs behave better that GAs for this problem. However, between GAs and BAs, a family of intermediate algorithms exists: we explore the whole spectrum of these intermediate algorithms to determine whether an algorithm exists that would be more efficient than BAs.: the approaches are compared on a .Net system. |
| @INPROCEEDINGS{BaudryFJT02,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {Automatic Test Case Optimization Using a Bacteriological Adaptation Model: Application to .NET Components},
booktitle = {Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE'02)},
year = {2002},
address = {Edinburgh, Scotland},
month = {23-27 September},
pages = {253-256}
} |
24 | Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE'02)Annapolis, Maryland, 12-15 November 2002. |
|
| Abstract: The level of confidence in a software component is often linked to the quality of its test cases. This quality can in turn be evaluated with mutation analysis: faulty components (mutants) are systematically generated to check the proportion of mutants detected ("killed") by the test cases. But while the generation of basic test cases set is easy, improving its quality may require prohibitive effort. This paper focuses on the issue of automating the test optimization. We looked at genetic algorithms to solve this problem and modeled it as follows: a test case can be considered as a predator while a mutant program is analogous to a prey. The aim of the selection process is to generate test cases able to kill as many mutants as possible. To overcome disappointing experimentation results on the studied .Net system, we propose a slight variation on this idea, no longer at the "animal" level (lions killing zebras) but at the bacteriological level. The bacteriological level indeed better reflects the test case optimization issue: it introduces of a memorization function and the suppresses the crossover operator. We describe this model and show how it behaves on the case study. |
| @INPROCEEDINGS{BaudryFJT02a,
author = {Benoit Baudry and Franck Fleurey and Jean-Marc Jezequel and Yves Le Traon},
title = {Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment},
booktitle = {Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE'02)},
year = {2002},
address = {Annapolis, Maryland},
month = {12-15 November},
pages = {195-206}
} |
25 | Benoit Baudry and Vu Le Hanh and Jean-Marc J\'ez\'equel and Yves Le Traon Trustable Components: Yet Another Mutation-Based Approach Proceedings of the 1st Workshop on Mutation Analysis (MUTATION'00)San Jose, California, 6-7 October 2001. |
|
| Abstract: Available soon... |
| @INPROCEEDINGS{BaudryHJT01,
author = {Benoit Baudry and Vu Le Hanh and Jean-Marc J\'ez\'equel and Yves Le Traon},
title = {Trustable Components: Yet Another Mutation-Based Approach},
booktitle = {Proceedings of the 1st Workshop on Mutation Analysis (MUTATION'00)},
year = {2001},
address = {San Jose, California},
month = {6-7 October},
pages = {47-54}
} |