By Topic

Software Testing Verification and Validation, 2009. ICST '09. International Conference on

Date 1-4 April 2009

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (204 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (172 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009 , Page(s): v - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (189 KB)  
    Freely Available from IEEE
  • Welcome Message from the General Chair

    Publication Year: 2009 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Introduction by the Program Chairs

    Publication Year: 2009 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (33 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2009 , Page(s): xii
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2009 , Page(s): xiii - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE
  • Inferring Types of References to GUI Objects in Test Scripts

    Publication Year: 2009 , Page(s): 1 - 10
    Cited by:  Papers (2)  |  Patents (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    Since manual black-box testing of GUI-based applications (GAPs) is tedious and laborious, test engineers create test scripts to automate the testing process. These test scripts interact with GAPs by performing actions on their GUI objects. Unlike conventional languages that require programmers to declare types of variables explicitly, test script statements reference GUI objects using their proper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Initial Characterization of Industrial Graphical User Interface Systems

    Publication Year: 2009 , Page(s): 11 - 20
    Cited by:  Papers (11)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (369 KB) |  | HTML iconHTML  

    To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners, as our data was derived from open source applications, small compared to industrial systems. This paper presents a study of three industrial GUI-based software systems developed at ABB, including data on classified defe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Evaluation of Automated Black Box Testing Techniques for Crashing GUIs

    Publication Year: 2009 , Page(s): 21 - 30
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (496 KB) |  | HTML iconHTML  

    This paper reports an empirical evaluation of four black-box testing techniques for crashing programs through their GUI interface: SH, AF, DH, and BxT. The techniques vary in their level of automation and the results they offer. The experiments we conducted quantify execution time and the capability of finding a crash for each technique on 8 different cellular phone configurations with historical ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking

    Publication Year: 2009 , Page(s): 31 - 40
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (547 KB) |  | HTML iconHTML  

    Bounded model checking-as well as symbolic equivalence checking-are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC have been developed that are able to check properties of (mostly low-level) software written in C. However, using these tools to check equivalence of software implementations has rarely been pursued. In this case study we tac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of Model Checkers for Specification Based Test Case Generation

    Publication Year: 2009 , Page(s): 41 - 50
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    Under certain constraints the test case generation problem can be represented as a model checking problem, thus enabling the use of powerful model checking tools to perform the test case generation automatically. There are, however, several different model checking techniques, and to date there is little evidence and comparison on which of these techniques is best suited for test case generation. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Generation of Object Graphs in Java PathFinder

    Publication Year: 2009 , Page(s): 51 - 60
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    Java PathFinder (JPF) is a popular model checker for Java programs. JPF was used to generate object graphs as test inputs for object-oriented programs. Specifically, JPF was used as an implementation engine for the Korat algorithm. Korat takes two inputs---a Java predicate that encodes properties of desired object graphs and a bound on the size of the graph---and generates all graphs (within the g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timed Testing under Partial Observability

    Publication Year: 2009 , Page(s): 61 - 70
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (366 KB) |  | HTML iconHTML  

    This paper studies the problem of model-based testing of real-time systems that are only partially observable. We model the system under test (SUT) using timed game automata (TGA) which has internal actions, uncontrollable outputs and timing uncertainty of outputs. We define the partial observability of SUT using a set of predicates over the TGA state space, and specify the test purposes in comput... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive Testing of Stochastic Timed Systems

    Publication Year: 2009 , Page(s): 71 - 80
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (535 KB) |  | HTML iconHTML  

    In this paper we introduce a formal methodology to perform passive testing, based on invariants, for systems where the passing of time is represented in probabilistic terms by means of probability distributions functions. In our approach, invariants express the fact that each time the implementation under test performs a given sequence of actions, then it must exhibit a behavior according to the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Embedded Real Time Systems with TTCN-3

    Publication Year: 2009 , Page(s): 81 - 90
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (859 KB) |  | HTML iconHTML  

    The problems of testing software based systems that, like automobiles, steadily increase in complexity are still not solved. To cope with the requirements and complexities of today's systems, adequate test solutions are needed, which at least feature a minimum of flexibility, reusability and abstraction. The Testing and Test Control Notation TTCN-3 is a test specification language, which was origi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Resource Allocation for Batch Testing

    Publication Year: 2009 , Page(s): 91 - 100
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (378 KB) |  | HTML iconHTML  

    Batch resource allocation problem arises in the context of executing a sequence of automated system tests or distributed computations where resources are pooled together and flexibly matched with requests. Minimizing resource allocation for a batch of processes reduces the resource management (e.g., setup) cost for the batch while allowing more users to share the resource pool simultaneously. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Flexible Framework for Quality Assurance of Software Artefacts with Applications to Java, UML, and TTCN-3 Test Specifications

    Publication Year: 2009 , Page(s): 101 - 110
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefacts. Usually, software analysis tools are implemented for analysing only one specific language as target and for performing only one class of analyses. Furthermore, most software analysis tools support only common programm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Assurance of Software Applications Using the In Vivo Testing Approach

    Publication Year: 2009 , Page(s): 111 - 120
    Cited by:  Papers (4)  |  Patents (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (286 KB) |  | HTML iconHTML  

    Software products released into the field typically have some number of residual defects that either were not detected or could not have been detected during testing. This may be the result of flaws in the test cases themselves, incorrect assumptions made during the creation of test cases, or the infeasibility of testing the sheer number of possible configurations for a complex system; these defec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test Input Generation Using UML Sequence and State Machines Models

    Publication Year: 2009 , Page(s): 121 - 130
    Cited by:  Papers (1)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (294 KB) |  | HTML iconHTML  

    We propose a novel testing approach that combines information from UML sequence models and state machine models. Current approaches that rely solely on sequence models do not consider the effects of the message path under test on the states of the participating objects. Dinh-Trong et al. proposed an approach to test input generation using information from class and sequence models.We extend their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation

    Publication Year: 2009 , Page(s): 131 - 140
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (378 KB) |  | HTML iconHTML  

    A software development process is conceptually an abstract form of model transformation, starting from an enduser model of requirements, through to a system model for which code can be automatically generated. The success (or failure) of such a transformation depends substantially on obtaining a correct, well-formed initial model that captures user concerns. Model-based testing automates black box... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction

    Publication Year: 2009 , Page(s): 141 - 150
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (231 KB) |  | HTML iconHTML  

    Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software defects at early stages and produce more reliable software at a lower cost. Determining the effectiveness of ASA tools requires empirical evaluation. This study evaluates coding concerns reported by three ASA tools on tw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Euclide: A Constraint-Based Testing Framework for Critical C Programs

    Publication Year: 2009 , Page(s): 151 - 160
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (402 KB) |  | HTML iconHTML  

    Euclide is a new Constraint-Based Testing tool for verifying safety-critical C programs. By using a mixture of symbolic and numerical analyses (namely static single assignment form, constraint propagation, integer linear relaxation and search-based test data generation), it addresses three distinct applications in a single framework: structural test data generation, counter-example generation and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.