首页 > 最新文献

29th Annual International Computer Software and Applications Conference (COMPSAC'05)最新文献

英文 中文
Component security - issues and an approach 组件安全-问题和方法
N. Nissanke
Security vulnerabilities posed by third-party software components in component based development (CBD) is a serious impediment to its adoption in areas that offer great economic potential, particularly in areas such as embedded software and large-scale enterprise software. They raise questions about reliability and integrity of components, as well as the risks posed by any malicious code. This paper is a discussion of factors that affect component security and ways of assuring component security. Using a simplified model of sendmail, it also outlines a formal framework that fits in with communicating sequential processes (CSP) for modelling and analysis of component security.
基于组件的开发(CBD)中第三方软件组件带来的安全漏洞严重阻碍了其在具有巨大经济潜力的领域的采用,特别是在嵌入式软件和大型企业软件等领域。它们对组件的可靠性和完整性以及任何恶意代码带来的风险提出了质疑。本文讨论了影响组件安全的因素和保证组件安全的方法。使用简化的sendmail模型,它还概述了一个正式框架,该框架适合用于组件安全性建模和分析的通信顺序过程(CSP)。
{"title":"Component security - issues and an approach","authors":"N. Nissanke","doi":"10.1109/COMPSAC.2005.58","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.58","url":null,"abstract":"Security vulnerabilities posed by third-party software components in component based development (CBD) is a serious impediment to its adoption in areas that offer great economic potential, particularly in areas such as embedded software and large-scale enterprise software. They raise questions about reliability and integrity of components, as well as the risks posed by any malicious code. This paper is a discussion of factors that affect component security and ways of assuring component security. Using a simplified model of sendmail, it also outlines a formal framework that fits in with communicating sequential processes (CSP) for modelling and analysis of component security.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116041939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Iterative Metamorphic Testing 迭代变形测试
Peng Wu
An enhanced version of metamorphic testing, namely n-iterative metamorphic testing, is proposed to systematically exploit more information out of metamorphic tests by applying metamorphic relations in a chain style. A contrastive case study, conducted within an integrated testing environment MTest, shows that n-iterative metamorphic testing exceeds metamorphic testing and special case testing in terms of their fault detection capabilities. Another advantage of n-iterative metamorphic testing is its high efficiency in test case generation.
提出了一种改进版的变质测试,即n迭代的变质测试,通过链式的变质关系,系统地从变质测试中挖掘出更多的信息。在集成测试环境MTest中进行的对比案例研究表明,n迭代变质测试在故障检测能力方面超过了变质测试和特殊案例测试。n迭代变形测试的另一个优点是它在测试用例生成方面的高效率。
{"title":"Iterative Metamorphic Testing","authors":"Peng Wu","doi":"10.1109/COMPSAC.2005.93","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.93","url":null,"abstract":"An enhanced version of metamorphic testing, namely n-iterative metamorphic testing, is proposed to systematically exploit more information out of metamorphic tests by applying metamorphic relations in a chain style. A contrastive case study, conducted within an integrated testing environment MTest, shows that n-iterative metamorphic testing exceeds metamorphic testing and special case testing in terms of their fault detection capabilities. Another advantage of n-iterative metamorphic testing is its high efficiency in test case generation.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Software reliability growth model considering testing profile and operation profile 考虑测试剖面和运行剖面的软件可靠性增长模型
Jing Zhao, Hongwei Liu, G. Cui, Xiaozong Yang
The testing and operation environments may be essentially different, thus the fault detection rate (FDR) of testing phase is different from that of the operation phase. In this paper, based on the representative model, G-O model, of nonhomogeneous Poisson process (NHPP), a transformation is performed between the FDR of the testing phase to that of the operation considering the profile differences of the two phases, and then a software reliability growth model (SRGM) called TO-SRGM describing the differences of the FDR between the testing phase and the operation phase is proposed. Finally, the parameters of the model are estimated using the least squares estimate (LSE) based on normalized failure data. Experiment results show that the goodness-of-fit of the TO-SRGM is better than that of the G-0 model and the PZ-SRGM on the normalized failure data set.
由于测试和运行环境可能存在本质上的差异,因此测试阶段的故障检出率(FDR)与运行阶段的故障检出率是不同的。本文在非齐次泊松过程(NHPP)的代表模型G-O模型的基础上,考虑两阶段的轮廓差异,将测试阶段的FDR转换为运行阶段的FDR,并提出了描述测试阶段和运行阶段FDR差异的软件可靠性增长模型to -SRGM。最后,利用归一化失效数据的最小二乘估计(LSE)对模型参数进行估计。实验结果表明,TO-SRGM模型在归一化失效数据集上的拟合优度优于G-0模型和PZ-SRGM模型。
{"title":"Software reliability growth model considering testing profile and operation profile","authors":"Jing Zhao, Hongwei Liu, G. Cui, Xiaozong Yang","doi":"10.1109/COMPSAC.2005.142","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.142","url":null,"abstract":"The testing and operation environments may be essentially different, thus the fault detection rate (FDR) of testing phase is different from that of the operation phase. In this paper, based on the representative model, G-O model, of nonhomogeneous Poisson process (NHPP), a transformation is performed between the FDR of the testing phase to that of the operation considering the profile differences of the two phases, and then a software reliability growth model (SRGM) called TO-SRGM describing the differences of the FDR between the testing phase and the operation phase is proposed. Finally, the parameters of the model are estimated using the least squares estimate (LSE) based on normalized failure data. Experiment results show that the goodness-of-fit of the TO-SRGM is better than that of the G-0 model and the PZ-SRGM on the normalized failure data set.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127135863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adapting single-request/multiple-response messaging to Web services 使单请求/多响应消息传递适应于Web服务
Michael Ruth, Feng Lin, S. Tu
In this paper, we will focus on providing a solution to using the message exchange pattern, single-request/multiple-response (SRMR) in the context of Web services and secured enterprise environments. SRMR messaging is important because it can be used to model real world problems elegantly. However, SRMR messaging is not directly supported by Web services, and is hampered by current in-practice security schemes, such as firewalls and proxy servers. We have proposed a client-side framework to utilize SRMR Web services with the realities of network security in mind. The central component of our framework is a Web service clearinghouse, which serves as both a communication proxy and a message manager that realizes the correlation between clients' calls and the services' responses. Using our framework and the code generation utilities, we have implemented a number of nontrivial systems that use SRMR Web services.
在本文中,我们将重点提供在Web服务和安全企业环境上下文中使用消息交换模式单请求/多响应(SRMR)的解决方案。SRMR消息传递很重要,因为它可以用来优雅地对现实世界的问题建模。然而,Web服务并不直接支持SRMR消息传递,并且受到当前实际安全方案(如防火墙和代理服务器)的阻碍。我们提出了一个客户端框架来利用SRMR Web服务,同时考虑到网络安全的现实情况。我们框架的中心组件是Web服务交换中心,它既充当通信代理,又充当消息管理器,实现客户机调用与服务响应之间的相关性。使用我们的框架和代码生成实用程序,我们已经实现了许多使用SRMR Web服务的重要系统。
{"title":"Adapting single-request/multiple-response messaging to Web services","authors":"Michael Ruth, Feng Lin, S. Tu","doi":"10.1109/COMPSAC.2005.39","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.39","url":null,"abstract":"In this paper, we will focus on providing a solution to using the message exchange pattern, single-request/multiple-response (SRMR) in the context of Web services and secured enterprise environments. SRMR messaging is important because it can be used to model real world problems elegantly. However, SRMR messaging is not directly supported by Web services, and is hampered by current in-practice security schemes, such as firewalls and proxy servers. We have proposed a client-side framework to utilize SRMR Web services with the realities of network security in mind. The central component of our framework is a Web service clearinghouse, which serves as both a communication proxy and a message manager that realizes the correlation between clients' calls and the services' responses. Using our framework and the code generation utilities, we have implemented a number of nontrivial systems that use SRMR Web services.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Agent oriented programming based on SLABS 基于slab的面向Agent的编程
Ji Wang, R. Shen, Hong Zhu
SLABS is a formal specification language designed for modular and composable specification of multi-agent systems. This paper reports our attempts to support SLABS at the level of programming languages. A programming language, SLABSp, is presented to support two distinguished mechanisms, namely caste and scenario, in caste-centric methodology of agent-oriented software development. Based on Java platform, the SLABSp has been implemented by compiling the programs into Java with the multi-agent runtime environment.
slab是一种为多智能体系统的模块化和可组合性规范而设计的形式化规范语言。本文报告了我们在编程语言级别支持slab的尝试。在面向代理的软件开发的以种姓为中心的方法中,提出了一种编程语言SLABSp来支持两种不同的机制,即种姓和场景。基于Java平台,在多代理运行环境下,将程序编译成Java语言实现了SLABSp。
{"title":"Agent oriented programming based on SLABS","authors":"Ji Wang, R. Shen, Hong Zhu","doi":"10.1109/COMPSAC.2005.41","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.41","url":null,"abstract":"SLABS is a formal specification language designed for modular and composable specification of multi-agent systems. This paper reports our attempts to support SLABS at the level of programming languages. A programming language, SLABSp, is presented to support two distinguished mechanisms, namely caste and scenario, in caste-centric methodology of agent-oriented software development. Based on Java platform, the SLABSp has been implemented by compiling the programs into Java with the multi-agent runtime environment.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115819780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A tool and case study for specification-based program review 基于规范的程序审查的工具和案例研究
Fumiko Nagoya, Shaoying Liu, Yuting Chen
Effective tool support is crucial for successfully applying software review techniques in practice. In this paper, we describe the design and implementation of a software tool to support an approach to reviewing programs on the basis of their formal specifications. The approach was initially proposed in our previous publication to improve the rigor, repeatability, and effectiveness of existing code review methods. We also present a case study in which we reviewed an ATM system to assess the performance of the review approach when used with the software tool. The results of the case study show that the approach is effective in detecting errors in programs and the tool is helpful in enhancing the efficiency of the review process.
有效的工具支持对于在实践中成功应用软件评审技术是至关重要的。在本文中,我们描述了一个软件工具的设计和实现,以支持一种基于正式规范审查程序的方法。该方法最初是在我们之前的出版物中提出的,旨在提高现有代码审查方法的严谨性、可重复性和有效性。我们还提供了一个案例研究,在这个案例研究中,我们审查了一个ATM系统,以评估与软件工具一起使用时审查方法的性能。实例研究结果表明,该方法能够有效地检测程序中的错误,并有助于提高评审过程的效率。
{"title":"A tool and case study for specification-based program review","authors":"Fumiko Nagoya, Shaoying Liu, Yuting Chen","doi":"10.1109/COMPSAC.2005.36","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.36","url":null,"abstract":"Effective tool support is crucial for successfully applying software review techniques in practice. In this paper, we describe the design and implementation of a software tool to support an approach to reviewing programs on the basis of their formal specifications. The approach was initially proposed in our previous publication to improve the rigor, repeatability, and effectiveness of existing code review methods. We also present a case study in which we reviewed an ATM system to assess the performance of the review approach when used with the software tool. The results of the case study show that the approach is effective in detecting errors in programs and the tool is helpful in enhancing the efficiency of the review process.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132797090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Protecting users against phishing attacks with AntiPhish 使用AntiPhish保护用户免受网络钓鱼攻击
E. Kirda, Christopher Krügel
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, 51 million US Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed Web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a Web site that is considered un-trusted.
网络钓鱼是一种网络身份盗窃,目的是窃取用户的敏感信息,如网上银行密码和信用卡信息。网络钓鱼诈骗已经得到了广泛的新闻报道,因为这种攻击在数量和复杂程度上都在不断升级。根据Gartner的一项研究,5100万美国互联网用户确认收到过与网络钓鱼诈骗有关的电子邮件,其中约有200万人被骗泄露了敏感信息。本文提出了一种新的浏览器扩展,AntiPhish,旨在保护用户免受基于欺骗网站的网络钓鱼攻击。为此,AntiPhish跟踪用户的敏感信息,并在用户试图将这些信息泄露给被认为不受信任的网站时生成警告。
{"title":"Protecting users against phishing attacks with AntiPhish","authors":"E. Kirda, Christopher Krügel","doi":"10.1109/COMPSAC.2005.126","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.126","url":null,"abstract":"Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, 51 million US Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed Web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a Web site that is considered un-trusted.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 169
A framework for efficient contract-based testing of software components 一个有效的基于契约的软件组件测试框架
E. Valentini, Gerhard Fliess, Edmund Haselwanter
Component based frameworks become more and more state-of-the art but without verifying the components and their interaction it is nearly impossible to build correct and robust systems. Testing of such systems requires a combination of unit- and integration tests, and must deal with verifying the contracts that enables the interaction of components. In this article we present CrashIt - a test framework for component-based testing. A main concept of CrashIt is the introduction of expandable contract-checkers that verify the communication between a client and a supplier component. These checkers are able to communicate with each other and with other modules of CrashIt. Thus, CrashIt is able to check the state of each component at every time.
基于组件的框架变得越来越先进,但如果不验证组件及其交互,则几乎不可能构建正确且健壮的系统。这类系统的测试需要单元测试和集成测试的结合,并且必须验证允许组件交互的契约。在本文中,我们介绍了CrashIt——一个用于基于组件的测试的测试框架。CrashIt的一个主要概念是引入可扩展的契约检查器,用于验证客户端和供应商组件之间的通信。这些检查器能够相互通信,并与其他模块的CrashIt。因此,CrashIt能够每次检查每个组件的状态。
{"title":"A framework for efficient contract-based testing of software components","authors":"E. Valentini, Gerhard Fliess, Edmund Haselwanter","doi":"10.1109/COMPSAC.2005.24","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.24","url":null,"abstract":"Component based frameworks become more and more state-of-the art but without verifying the components and their interaction it is nearly impossible to build correct and robust systems. Testing of such systems requires a combination of unit- and integration tests, and must deal with verifying the contracts that enables the interaction of components. In this article we present CrashIt - a test framework for component-based testing. A main concept of CrashIt is the introduction of expandable contract-checkers that verify the communication between a client and a supplier component. These checkers are able to communicate with each other and with other modules of CrashIt. Thus, CrashIt is able to check the state of each component at every time.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133576366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A control approach for agile processes 敏捷过程的控制方法
João W. Cangussu, R. Karcich
Agile processes can provide early defect information on all the stages of the development process. The use of a feedback control model to regulate the process based on this information is proposed here. The model was originally designed to regulate the testing process and has proven to be effective. Additionally, an ODC filter is proposed to properly interconnect the models associated with each development phase. The approach appears to be a reasonable solution for the control and prediction of agile processes.
敏捷过程可以在开发过程的所有阶段提供早期缺陷信息。本文提出利用反馈控制模型根据这些信息对过程进行调节。该模型最初是为了规范测试过程而设计的,并已被证明是有效的。此外,建议使用ODC过滤器来正确地连接与每个开发阶段相关联的模型。该方法似乎是控制和预测敏捷过程的合理解决方案。
{"title":"A control approach for agile processes","authors":"João W. Cangussu, R. Karcich","doi":"10.1109/COMPSAC.2005.18","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.18","url":null,"abstract":"Agile processes can provide early defect information on all the stages of the development process. The use of a feedback control model to regulate the process based on this information is proposed here. The model was originally designed to regulate the testing process and has proven to be effective. Additionally, an ODC filter is proposed to properly interconnect the models associated with each development phase. The approach appears to be a reasonable solution for the control and prediction of agile processes.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards describing black-box testing methods as atomic rules 将黑盒测试方法描述为原子规则
T. Murnane, R. Hall, K. Reed
Ideally, all black-box testing methods should be interpreted in the same way by different testers. In reality however, inconsistencies and ambiguities in original method descriptions may lead to differing interpretations and varying test set quality. In this paper, we decompose these methods into atomic rules for selecting test data and constructing test cases. We validate the rules via a worked example and discuss a pilot experiment to determine whether atomic rules are simpler to learn and use. Our approach also enables method tailoring and may simplify method comparison.
理想情况下,所有的黑盒测试方法都应该由不同的测试人员以相同的方式进行解释。然而在现实中,原始方法描述的不一致性和模糊性可能导致不同的解释和不同的测试集质量。在本文中,我们将这些方法分解为原子规则,用于选择测试数据和构造测试用例。我们通过一个工作示例验证了这些规则,并讨论了一个试点实验,以确定原子规则是否更易于学习和使用。我们的方法还支持方法裁剪,并且可以简化方法比较。
{"title":"Towards describing black-box testing methods as atomic rules","authors":"T. Murnane, R. Hall, K. Reed","doi":"10.1109/COMPSAC.2005.157","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.157","url":null,"abstract":"Ideally, all black-box testing methods should be interpreted in the same way by different testers. In reality however, inconsistencies and ambiguities in original method descriptions may lead to differing interpretations and varying test set quality. In this paper, we decompose these methods into atomic rules for selecting test data and constructing test cases. We validate the rules via a worked example and discuss a pilot experiment to determine whether atomic rules are simpler to learn and use. Our approach also enables method tailoring and may simplify method comparison.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130095775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
29th Annual International Computer Software and Applications Conference (COMPSAC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1