By Topic

Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on

Date 1-4 April 2009

Filter Results

Displaying Results 1 - 25 of 46
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (819 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • ICST Organizing Committees

    Publication Year: 2009, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • ICST Workshop Organizers

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Automated Evaluation of Runtime Object States against Model-Level States for State-Based Test Execution

    Publication Year: 2009, Page(s):3 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    Evaluation of runtime object states against the model-level states defined in a state model is critical to state based test automation. This paper presents a state mapping framework to support the automated state-based test execution process. The framework automatically keeps track of runtime object states and maps these states to model-level abstract states. It also includes a comparator to deter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IPO-s: Incremental Generation of Combinatorial Interaction Test Data Based on Symmetries of Covering Arrays

    Publication Year: 2009, Page(s):10 - 18
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Verification and validation of highly-configurable software systems, such as those supporting many optional or customizable features, is a challenging activity. In fact, due to its intrinsic complexity, formal modeling of the whole system may require a great effort. Modeling activities may become extremely expensive and time consuming, and the tester may decide to model (at least initially) only t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model for the Measurement of the Runtime Testability of Component-Based Systems

    Publication Year: 2009, Page(s):19 - 28
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (461 KB) | HTML iconHTML

    Runtime testing is emerging as the solution for the integration and validation of software systems where traditional development-time integration testing cannot be performed, such as systems of systems or service oriented architectures.However, performing tests during deployment or in-service time introduces interference problems, such as undesired side-effects in the state of the system or the ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Industrial Strength Process for Timed Testing

    Publication Year: 2009, Page(s):29 - 38
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    Timed model-based testing is a technique which allows for the specification of timing in the model as well as in the test cases. As such, it is well suited for the testing of embedded systems, which usually puts a much higher demand on the amount of test cases and quality of the test process than other software systems do. While the theory of timed testing is well established over the last years, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating System Models for a Highly Configurable Train Control System Using a Domain-Specific Language: A Case Study

    Publication Year: 2009, Page(s):39 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    In this work, we present a results from case study on testing a highly configurable, safety-critical system from the railway domain using model-based risk-oriented testing. In the construction of the system and test models, we face the following problems: (i) A domain expert will usually not be knowledgeable in the construction of system models, but has very detailed knowledge which configurations... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Checking Sequence Generation Using State Distinguishing Subsequences

    Publication Year: 2009, Page(s):48 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    A checking sequence generated from a finite state machine (FSM) is used in testing to demonstrate correctness of an implementation under test. It can be obtained by concatenating inputs triggering state transitions followed by final state verification sequences. Usually, the latter are derived from a distinguishing set or sequence, assuming that a given FSM possesses it. It has been suggested that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test Case Generation Using Model Checking for Software Components Deployed into New  Environments

    Publication Year: 2009, Page(s):57 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    In this paper, we show how to generate test cases for a component deployed into a new software environment. This problem is important for software engineers who need to deploy a component into a new environment. Most existing model based testing approaches generate models from high level specifications. This leaves a semantic gap between the high level specification and the actual implementation. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal Correctness of a Passive Testing Approach for Timed Systems

    Publication Year: 2009, Page(s):67 - 76
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    In this paper we extend our previous work on passive testing of timed systems to establish a formal criterion to determine correctness of an implementation under test. In our framework, an invariant expresses the fact that if the implementation under test performs a given sequence of actions, then it must exhibit a behavior in a lapse of time reflected in the invariant. In a previous paper we gave... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Comparison of Code-Based and Model-Based Test Prioritization

    Publication Year: 2009, Page(s):77 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    During regression testing, a modified system needs to beretested using the existing test suite. Since test suites may be very large, developers are interested in detecting faults in the system as early as possible. Test prioritization orders test cases for execution to increase potentially the chances of early fault detection during retesting. Code-based test prioritization methods are based on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Paper: Search Based Software Testing for Software Security: Breaking Code to Make it Safer

    Publication Year: 2009, Page(s):87 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    Ensuring security of software and computerized systems is a pervasive problem plaguing companies and institutions and affecting many areas of modern life. Software vulnerability may jeopardize information confidentiality and cause software failure leading tocatastrophic threats to humans or severe economic losses. Size, complexity, extensibility, connectivity and the search for cheap systems make ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring and Improving Latency to Avoid Test Suite Wear Out

    Publication Year: 2009, Page(s):101 - 110
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    This paper introduces the concept of test suite latency. The more latent a test suite, the more it is possible to repeatedly select subsets that achieve a test goal (such as coverage) without re-applying test cases. Where a test case is re-applied it cannot reveal new information. The more a test suite is forced to re-apply already applied test cases in order to achieve the test goal, the more it ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolutionary White-Box Software Test with the EvoTest Framework: A Progress Report

    Publication Year: 2009, Page(s):111 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Evolutionary white-box software testing has been extensively researched but is not yet applied in industry. In order to investigate the reasons for this, we evaluated a prototype version of a tool, representing the state-of-the-art for evolutionary structural testing, which is targeted at industrial use. The focus was on the applicability of the structural test tool in the industrial context and n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signal Generation for Search-Based Testing of Continuous Systems

    Publication Year: 2009, Page(s):121 - 130
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1292 KB) | HTML iconHTML

    Test case generation constitutes a critical activity in software testing that is cost-intensive, time-consuming and error-prone when done manually. Hence, an automation of this process is required. One automation approach is search-based testing for which the task of generating test data is transformed into an optimization problem which is solved using metaheuristic search techniques. However, onl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A First Approach to Test Case Generation for BPEL Compositions of Web Services Using Scatter Search

    Publication Year: 2009, Page(s):131 - 140
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    A challenging part of software testing entails the generation of test cases, which cost can be reduced by means of the use of techniques for automating this task. In this paper we present an approach based on the metaheuristic technique scatter search for the automatic test case generation of the BPEL business process. A transition coverage criterion is used as adequacy criterion. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving the Quality of a Model Based Test Suite

    Publication Year: 2009, Page(s):141 - 149
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    Redundant test cases in newly generated test suites often remain undetected until execution and waste scarce project resources. In model-based testing, the testing process starts early on in the developmental phases and enables early fault detection. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The article presents a no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Temporal White-Box Testing Using Evolutionary Algorithms

    Publication Year: 2009, Page(s):150 - 151
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (102 KB) | HTML iconHTML

    Embedded computer systems should fulfill real-time requirements which need to be checked in order to assure system quality. This paper stands to propose some ideas for testing the temporal behavior of real-time systems. The goal is to achieve white-box temporal testing using evolutionary techniques to detect system failures in reasonable time and little effort. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Execution Paths to Evolve Software Patches

    Publication Year: 2009, Page(s):152 - 153
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    We present an evolutionary approach using genetic programming (GP) to automatically create software repairs. By concentrating the modifications on regions related to where the bug occurs, we effectively minimize the search space complexity and hence increase the performance of the GP process. To preserve the core functionalities of the program, we evolve programs only from code in the original pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mutation/Injection-Based Automatic Framework for Evaluating Code Clone Detection Tools

    Publication Year: 2009, Page(s):157 - 166
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    In recent years many methods and tools for software clone detection have been proposed. While some work has been done on assessing and comparing performance of these tools, very little empirical evaluation has been done. In particular, accuracy measures such as precision and recall have only been roughly estimated, due both to problems in creating a validated clone benchmark against which tools ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.