| 441 | Michael Ellims and Darrel C. Ince and Marian Petre The Effectiveness of T-Way Test Data Generation Proceedinsg of the 27th International Conference on Computer Safety, Reliability and Security (SAFECOMP'08)Newcastle, UK, 22-25 September 2008. |
|
| | Abstract: This paper reports the results of a study comparing the effectiveness of automatically generated tests constructed using random and t-way combinatorial techniques on safety related industrial code using mutation adequacy criteria. A reference point is provided by hand generated test vectors constructed during development to establish minimum acceptance criteria. The study shows that 2-way testing is not adequate measured by mutants kill rate compared with hand generated test set of similar size, but that higher factor t-way test sets can perform at least as well. To reduce the computation overhead of testing large numbers of vectors over large numbers of mutants a staged optimising approach to applying t-way tests is proposed and evaluated which shows improvements in execution time and final test set size. |
| | @INPROCEEDINGS{EllimsIP08,
author = {Michael Ellims and Darrel C. Ince and Marian Petre},
title = {The Effectiveness of T-Way Test Data Generation},
booktitle = {Proceedinsg of the 27th International Conference on Computer Safety, Reliability and Security (SAFECOMP'08)},
year = {2008},
address = {Newcastle, UK},
month = {22-25 September},
pages = {16-29}
} |
| 442 | Rui Wang and Ning Huang Requirement Model-Based Mutation Testing for Web Service Proceedings of the 4th International Conference on Next Generation Web Services Practices (NWeSP'08)Seoul, Republic of Korea, 20-22 October 2008. |
|
| | Abstract: Web services present a new promising software technology. However, some new issues and challenges in testing of them come out due to their characteristics of distribution, source code invisibility etc. This paper discusses the traditional mutation testing and then a new methodology of OWL-S requirement model-based web service mutation testing is brought forward. The traits of this methodology are as follows. Firstly, requirements are used effectively to reduce the magnitude of mutants. Secondly, mutants are generated by AOP technology conveniently and promptly. Thirdly, to reducing testing cost, using business logic implied in OWL-S requirement model as assistant of the process of killing the mutants. Fourthly, two sufficient measurement criteria are employed to evaluate the testing process. Finally, our empirical results have shown the usefulness of this testing method. |
| | @INPROCEEDINGS{WangH08,
author = {Rui Wang and Ning Huang},
title = {Requirement Model-Based Mutation Testing for Web Service},
booktitle = {Proceedings of the 4th International Conference on Next Generation Web Services Practices (NWeSP'08)},
year = {2008},
address = {Seoul, Republic of Korea},
month = {20-22 October},
pages = {71-76}
} |
| 443 | Juan Jos\'e Dom\'inguez-Jim\'enez and Antonia Estero-Botaro and Inmaculada Medina-Bulo Mutant Generation for Web Services Compositions with Genetic Algorithms. Proceedings of the 2nd International Conference on E-Activity and Leading Technologies (E-ALT'08)Madrid, Spain, 2008. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{DominguezEM08,
author = {Juan Jos\'e Dom\'inguez-Jim\'enez and Antonia Estero-Botaro and Inmaculada Medina-Bulo},
title = {Mutant Generation for Web Services Compositions with Genetic Algorithms.},
booktitle = {Proceedings of the 2nd International Conference on E-Activity and Leading Technologies (E-ALT'08)},
year = {2008},
address = {Madrid, Spain},
month = {},
pages = {}
} |
| 444 | Anna Derezi\'nska and Anna Szustek Tool-Supported Advanced Mutation Approach for Verification of C\# Programs Proceedings of the 3th International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX'08)Szklarska Por\^eba, Poland, 26-28 June 2008. |
|
| | Abstract: Mutation testing is a fault-based testing technique used to inject faults into an existing program and see if its test suite is sensitive enough to detect common faults. We are interested in using the mutation analysis to evaluate, compare and improve quality assurance techniques for testing object-oriented mechanisms and other advanced features of C# programs. This paper provides an overview of a current version of the CREAM system (CREAtor of Mutants), and reports on its use in experimental research. We apply advanced, object-oriented mutation operators to testing of open-source C# programs and discuss the results. |
| | @INPROCEEDINGS{DerezinskaS08,
author = {Anna Derezi\'nska and Anna Szustek},
title = {Tool-Supported Advanced Mutation Approach for Verification of C\# Programs},
booktitle = {Proceedings of the 3th International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX'08)},
year = {2008},
address = {Szklarska Por\^eba, Poland},
month = {26-28 June},
pages = {261-268}
} |
| 445 | Antonia Estero-Botaro and Francisco Palomo-Lozano and Inmaculada Medina-Bulo Mutation operators for WS-BPEL 2.0 Proceedings of the 21th International Conference on Software and Systems Engineering and their Applications (ICSSEA'08)Paris, France, 9-11 December 2008. |
|
| | Abstract: Available soon... |
| | @INPROCEEDINGS{EsteroLB08,
author = {Antonia Estero-Botaro and Francisco Palomo-Lozano and Inmaculada Medina-Bulo},
title = {Mutation operators for WS-BPEL 2.0},
booktitle = {Proceedings of the 21th International Conference on Software and Systems Engineering and their Applications (ICSSEA'08)},
year = {2008},
address = {Paris, France},
month = {9-11 December},
pages = {}
} |
| 446 | Chuanming Jing and Zhiliang Wang and Xingang Shi and Xia Yin and Jianping Wu Mutation Testing of Protocol Messages Based on Extended TTCN-3 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications (AINA'08)Okinawa, Japan, 25-28 March 2008. |
|
| | Abstract: The critical requirement on reliability, fault-tolerance and security of network devices highlights the necessity of protocol robustness testing. Mutation testing of protocol messages is an important part of robustness testing, but related theory and practices are not well developed. This paper builds a NFSM model for mutation testing of protocol messages and proposes two types of Normal-Verification Sequence to enhance verdict mechanism. For single-field mutation testing of protocol messages, we propose the concept of compound anomalous test case to further simplify test sequences. As a standard test specification language, TTCN-3 reveals strong excellence in conformance testing, so we apply TTCN-3 to mutation testing and extend it according to test requirements. Using our method we test OSPFv2 sufficiently with a test system based on extended TTCN-3. The results indicate that our method has good capability of error-finding. |
| | @INPROCEEDINGS{JingWSYW08,
author = {Chuanming Jing and Zhiliang Wang and Xingang Shi and Xia Yin and Jianping Wu},
title = {Mutation Testing of Protocol Messages Based on Extended TTCN-3},
booktitle = {Proceedings of the 22nd International Conference on Advanced Information Networking and Applications (AINA'08)},
year = {2008},
address = {Okinawa, Japan},
month = {25-28 March},
pages = {667-674}
} |
| 447 | Xin Feng and Simon Marr and Tony O'Callaghan ESTP: An Experimental Software Testing Platform Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART'08)Windsor, UK, 29-31 August 2008. |
|
| | Abstract: Most commercial software testing tools used in industry do not automatically generate test data even though many testing strategies have been proposed in academia. In this paper, we introduce a prototype software testing platform that we developed to automatically generate test data from tabular specifications. This method of documenting software specifications has been used successfully in industry to help produce reliable software. This platform can also be used to measure the effectiveness of new testing strategies. |
| | @INPROCEEDINGS{FengMO08,
author = {Xin Feng and Simon Marr and Tony O'Callaghan},
title = {ESTP: An Experimental Software Testing Platform},
booktitle = {Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART'08)},
year = {2008},
address = {Windsor, UK},
month = {29-31 August},
pages = {59-63}
} |
| 448 | Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon A Model-based Framework for Security Policies Specifications, Deployment and Testing Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS'08)Toulouse, France, 28 September - 1 October 2008. |
|
| | Abstract: We present a model-based approach to testing access control requirements. By using combinatorial testing, we first automatically generate test cases from and without access control policies—i.e., the model—and assess the effectiveness of the test suites by means of mutation testing. We also compare them to purely random tests. For some of the investigated strategies, non-random tests kill considerably more mutants thanthe same number of random tests. Since we rely on policies only, no information on the application is required at this stage. As a consequence, our methodology applies to arbitrary implementations of the policy decision points. |
| | @INPROCEEDINGS{MouelhiFBL08,
author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon},
title = {A Model-based Framework for Security Policies Specifications, Deployment and Testing},
booktitle = {Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MoDELS'08)},
year = {2008},
address = {Toulouse, France},
month = {28 September - 1 October},
pages = {537–552}
} |
| 449 | Yue Jia and Mark Harman Constructing Subtle Faults Using Higher Order Mutation Testing Proceedings of the 8th International Working Conference on Source Code Analysis and Manipulation (SCAM'08)Beijing, China, 28-29 September 2008. |
|
| | Abstract: Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easily killed. This paper investigates higher order mutants (HOMs). It introduces the concept of a subsuming HOM; one that is harder to kill than the first order mutants from which it is constructed. By definition, subsuming HOMs denote subtle fault combinations. The paper reports the results of an empirical study into subsuming HOMs, using six benchmark programs. This is the largest study of mutation testing to date. To overcome the exponential explosion in the number of mutants considered, the paper introduces a search based approach to the identification of subsuming HOMs. Results are presented for a greedy algorithm, a genetic algorithm and a hill climbing algorithm. |
| | @INPROCEEDINGS{JiaH08b,
author = {Yue Jia and Mark Harman},
title = {Constructing Subtle Faults Using Higher Order Mutation Testing},
booktitle = {Proceedings of the 8th International Working Conference on Source Code Analysis and Manipulation (SCAM'08)},
year = {2008},
address = {Beijing, China},
month = {28-29 September},
pages = {249-258}
} |
| 450 | Yue Jia and Mark Harman MILU: A Customizable, Runtime-Optimized Higher Order Mutation Testing Tool for the Full C Language Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART'08)Windsor, UK, 29-31 August 2008. |
|
| | Abstract: This paper introduces MILU, a C mutation testing tool designed for both first order and higher order mutation testing. All previous mutation testing tools apply all possible mutation operators to the program under test. By contrast, MILU allows customization of the set of mutation operators to be applied. To reduce runtime cost, MILU uses a novel 'test harness' technique to embed mutants and their associated test sets into a single-invocation procedure. |
| | @INPROCEEDINGS{JiaH08a,
author = {Yue Jia and Mark Harman},
title = {MILU: A Customizable, Runtime-Optimized Higher Order Mutation Testing Tool for the Full C Language},
booktitle = {Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART'08)},
year = {2008},
address = {Windsor, UK},
month = {29-31 August},
pages = {94-98}
} |