首页 > 最新文献

Software Testing Verification & Reliability最新文献

英文 中文
CSSG: A cost‐sensitive stacked generalization approach for software defect prediction CSSG:一种成本敏感的软件缺陷预测的堆叠泛化方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-02-08 DOI: 10.1002/stvr.1761
Z. Eivazpour, M. Keyvanpour
The prediction of software artifacts on defect‐prone (DP) or non‐defect‐prone (NDP) classes during the testing phase helps minimize software business costs, which is a classification task in software defect prediction (SDP) field. Machine learning methods are helpful for the task, although they face the challenge of data imbalance distribution. The challenge leads to serious misclassification of artifacts, which will disrupt the predictor's performance. The previously developed stacking ensemble methods do not consider the cost issue to handle the class imbalance problem (CIP) over the training dataset in the SDP field. To bridge this research gap, in the cost‐sensitive stacked generalization (CSSG) approach, we try to combine the staking ensemble learning method with cost‐sensitive learning (CSL) since the CSL purpose is to reduce misclassification costs. In the cost‐sensitive stacked generalization (CSSG) approach, logistic regression (LR) and extremely randomized trees classifiers in cases of CSL and cost‐insensitive are used as a final classifier of stacking scheme. To evaluate the performance of CSSG, we use six performance measures. Several experiments are carried out to compare the CSSG with some cost‐sensitive ensemble methods on 15 benchmark datasets with different imbalance levels. The results indicate that the CSSG can be an effective solution to the CIP than other compared methods.
在测试阶段对软件工件进行缺陷易感性(DP)或非缺陷易感性(NDP)类的预测有助于最小化软件业务成本,这是软件缺陷预测(SDP)领域的一项分类任务。机器学习方法虽然面临着数据分布不平衡的挑战,但对这项任务是有帮助的。挑战会导致工件的严重错误分类,这将破坏预测器的性能。在SDP领域中,现有的叠加集成方法在处理训练数据集的类不平衡问题时没有考虑成本问题。为了弥补这一研究缺口,在代价敏感的堆叠泛化(CSSG)方法中,我们尝试将赌注集成学习方法与代价敏感学习(CSL)相结合,因为CSL的目的是减少错误分类成本。在代价敏感的堆叠泛化(CSSG)方法中,在CSL和代价不敏感的情况下,使用逻辑回归(LR)和极端随机树分类器作为堆叠方案的最终分类器。为了评估CSSG的绩效,我们使用了六项绩效指标。在15个不同不平衡程度的基准数据集上进行了CSSG与一些成本敏感集成方法的比较实验。结果表明,与其他比较方法相比,CSSG可以有效地解决CIP问题。
{"title":"CSSG: A cost‐sensitive stacked generalization approach for software defect prediction","authors":"Z. Eivazpour, M. Keyvanpour","doi":"10.1002/stvr.1761","DOIUrl":"https://doi.org/10.1002/stvr.1761","url":null,"abstract":"The prediction of software artifacts on defect‐prone (DP) or non‐defect‐prone (NDP) classes during the testing phase helps minimize software business costs, which is a classification task in software defect prediction (SDP) field. Machine learning methods are helpful for the task, although they face the challenge of data imbalance distribution. The challenge leads to serious misclassification of artifacts, which will disrupt the predictor's performance. The previously developed stacking ensemble methods do not consider the cost issue to handle the class imbalance problem (CIP) over the training dataset in the SDP field. To bridge this research gap, in the cost‐sensitive stacked generalization (CSSG) approach, we try to combine the staking ensemble learning method with cost‐sensitive learning (CSL) since the CSL purpose is to reduce misclassification costs. In the cost‐sensitive stacked generalization (CSSG) approach, logistic regression (LR) and extremely randomized trees classifiers in cases of CSL and cost‐insensitive are used as a final classifier of stacking scheme. To evaluate the performance of CSSG, we use six performance measures. Several experiments are carried out to compare the CSSG with some cost‐sensitive ensemble methods on 15 benchmark datasets with different imbalance levels. The results indicate that the CSSG can be an effective solution to the CIP than other compared methods.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"89 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83876252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Entropy based enhanced particle swarm optimization on multi‐objective software reliability modelling for optimal testing resources allocation 基于熵的增强粒子群算法的多目标软件可靠性模型优化测试资源分配
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-02-05 DOI: 10.1002/stvr.1765
P. Rani, G. Mahapatra
This paper proposes a generalization of the exponential software reliability model to characterize several factors including fault introduction and time‐varying fault detection rate. The software life cycle is designed based on module structure such as testing effort spent during module testing and detected software faults etc. The resource allocation problem is a critical phase in the testing stage of software reliability modelling. It is required to make decisions for optimal resource allocation among the modules to achieve the desired level of reliability. We formulate a multi‐objective software reliability model of testing resources for a new generalized exponential reliability function to characterizes dynamic allocation of total expected cost and testing effort. An enhanced particle swarm optimization (EPSO) is proposed to maximize software reliability and minimize allocation cost. We perform experiments with randomly generated testing‐resource sets and varying the performance using the entropy function. The multi‐objective model is compared with modules according to weighted cost function and testing effort measures in a typical modular testing environment.
本文提出了指数软件可靠性模型的一种推广方法,以表征故障引入和时变故障检出率等因素。软件生命周期是基于模块结构设计的,如模块测试期间的测试工作量和检测到的软件故障等。资源分配问题是软件可靠性建模测试阶段的关键问题。为了达到期望的可靠性水平,需要在模块之间做出最优的资源分配决策。本文提出了一种新的广义指数可靠性函数,建立了测试资源的多目标软件可靠性模型,以表征总期望成本和测试工作量的动态分配。提出了一种增强粒子群优化算法(EPSO),以实现软件可靠性最大化和分配成本最小化。我们使用随机生成的测试资源集进行实验,并使用熵函数改变性能。在典型的模块化测试环境中,根据加权成本函数和测试工作量度量,将多目标模型与模块模型进行了比较。
{"title":"Entropy based enhanced particle swarm optimization on multi‐objective software reliability modelling for optimal testing resources allocation","authors":"P. Rani, G. Mahapatra","doi":"10.1002/stvr.1765","DOIUrl":"https://doi.org/10.1002/stvr.1765","url":null,"abstract":"This paper proposes a generalization of the exponential software reliability model to characterize several factors including fault introduction and time‐varying fault detection rate. The software life cycle is designed based on module structure such as testing effort spent during module testing and detected software faults etc. The resource allocation problem is a critical phase in the testing stage of software reliability modelling. It is required to make decisions for optimal resource allocation among the modules to achieve the desired level of reliability. We formulate a multi‐objective software reliability model of testing resources for a new generalized exponential reliability function to characterizes dynamic allocation of total expected cost and testing effort. An enhanced particle swarm optimization (EPSO) is proposed to maximize software reliability and minimize allocation cost. We perform experiments with randomly generated testing‐resource sets and varying the performance using the entropy function. The multi‐objective model is compared with modules according to weighted cost function and testing effort measures in a typical modular testing environment.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"137 3 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91098177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Verification algebra for multi‐tenant applications in VaaS architecture VaaS体系结构中多租户应用的验证代数
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-02-01 DOI: 10.1002/stvr.1763
Kai Hu, Ji Wan, Kan Luo, Yuzhuang Xu, Zijing Cheng, W. Tsai
This paper proposes an algebraic system, verification algebra (VA), for reducing the number of component combinations to be verified in multi‐tenant architecture (MTA). MTA is a design architecture used in SaaS (Software‐as‐a‐Service) where a tenant can customize its applications by integrating services already stored in the SaaS databases or newly supplied services. Similar to SaaS, VaaS (Verification‐as‐a‐Service) is a verification service in a cloud that leverages the computing power offered by a cloud environment with automated provisioning, scalability and service composition. In VaaS architecture, however, there is a challenging problem called ‘combinatorial explosion’ that it is difficult to verify a large number of compositions constructed by both quantities of components and various combination structures even with computing resources in cloud. This paper proposes rules to emerge combinations status for future verification, on the basis of the existing results. Both composition patterns and properties are considered and analysed in VA rules.
为了减少多租户体系结构(MTA)中需要验证的组件组合的数量,本文提出了一个代数系统——验证代数(VA)。MTA是一种用于SaaS (Software - as - a - Service)的设计架构,租户可以通过集成已经存储在SaaS数据库中的服务或新提供的服务来定制其应用程序。与SaaS类似,VaaS (Verification - as - a - Service)是一种云中的验证服务,它利用云环境提供的自动配置、可扩展性和服务组合的计算能力。然而,在VaaS体系结构中,存在一个具有挑战性的问题,即“组合爆炸”,即即使使用云计算资源,也难以验证由大量组件和各种组合结构构成的大量组合。本文在已有结果的基础上,提出了组合状态显现规则,以备将来验证。在VA规则中考虑和分析了组合模式和性能。
{"title":"Verification algebra for multi‐tenant applications in VaaS architecture","authors":"Kai Hu, Ji Wan, Kan Luo, Yuzhuang Xu, Zijing Cheng, W. Tsai","doi":"10.1002/stvr.1763","DOIUrl":"https://doi.org/10.1002/stvr.1763","url":null,"abstract":"This paper proposes an algebraic system, verification algebra (VA), for reducing the number of component combinations to be verified in multi‐tenant architecture (MTA). MTA is a design architecture used in SaaS (Software‐as‐a‐Service) where a tenant can customize its applications by integrating services already stored in the SaaS databases or newly supplied services. Similar to SaaS, VaaS (Verification‐as‐a‐Service) is a verification service in a cloud that leverages the computing power offered by a cloud environment with automated provisioning, scalability and service composition. In VaaS architecture, however, there is a challenging problem called ‘combinatorial explosion’ that it is difficult to verify a large number of compositions constructed by both quantities of components and various combination structures even with computing resources in cloud. This paper proposes rules to emerge combinations status for future verification, on the basis of the existing results. Both composition patterns and properties are considered and analysed in VA rules.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"30 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83537980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How detrimental is coincidental correctness to coverage‐based fault detection and localization? An empirical study 巧合正确性对基于覆盖率的故障检测和定位有多大危害?实证研究
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-09 DOI: 10.1002/stvr.1762
R. A. Assi, Wes Masri, Chadi Trad
According to the reachability–infection–propagation (RIP) model, three conditions must be satisfied for program failure to occur: (1) the defect's location must be reached, (2) the program's state must become infected and (3) the infection must propagate to the output. Weak coincidental correctness (or weak CC) occurs when the program produces the correct output, while condition (1) is satisfied but conditions (2) and (3) are not satisfied. Strong coincidental correctness (or strong CC) occurs when the output is correct, while both conditions (1) and (2) are satisfied but not (3). The prevalence of CC was previously recognized. In addition, the potential for its negative effect on spectrum‐based fault localization (SBFL) was analytically demonstrated; however, this was not empirically validated. Using Defects4J, this paper empirically studies the impact of weak and strong CC on three well‐researched coverage‐based fault detection and localization techniques, namely, test suite reduction (TSR), test case prioritization (TCP) and SBFL. Our study, which involved 52 SBFL metrics, provides the following empirical evidence. (i) The negative impact of CC tests on TSR and TCP is very significant. In addition, cleansing the CC tests was observed to yield (a) a 100% TSR defect detection rate for all subject programs and (b) an improvement of TCP for over 92% of the subjects. (ii) The impact of CC tests on SBFL varies widely w.r.t. the metric used. The negative impact was strong for 11 metrics, mild for 37, non‐measurable for 1 and non‐existent for 3 metrics. Interestingly, the negative impact was mild for the 9 most popular and/or most effective SBFL metrics. In addition, cleansing the CC tests resulted in the deterioration of SBFL for a considerable number of subject programs. (iii) Increasing the proportion of CC tests has a limited impact on TSR, TCP and SBFL. Interestingly, for TSR and TCP and 11 SBFL metrics, small and large proportions of CC tests are strongly harmful. (iv) Lastly, weak and strong CC are equally detrimental in the context of TSR, TCP and SBFL.
根据可达性-感染-传播(RIP)模型,程序发生故障必须满足三个条件:(1)必须达到缺陷的位置,(2)程序的状态必须被感染,(3)感染必须传播到输出。当程序产生正确的输出,而满足条件(1)而不满足条件(2)和(3)时,发生弱巧合正确性(或弱CC)。当输出是正确的,同时满足条件(1)和条件(2),但不满足条件(3)时,就会出现强巧合正确性(或强CC)。CC的普遍存在是以前认识到的。此外,还分析了其对基于频谱的故障定位(SBFL)的潜在负面影响;然而,这并没有得到实证的验证。利用缺陷4j,本文实证研究了弱CC和强CC对三种基于覆盖率的故障检测和定位技术的影响,即测试套件缩减(TSR)、测试用例优先级(TCP)和SBFL。我们的研究涉及52个SBFL指标,提供了以下经验证据。(i) CC测试对TSR和TCP的负面影响非常显著。此外,清理CC测试被观察到产生(a)所有受试者程序的100% TSR缺陷检出率和(b)超过92%的受试者的TCP改进。(二)CC试验对sffl的影响因所使用的度量而有很大差异。11个指标的负面影响较强,37个指标的负面影响较轻,1个指标的负面影响不可测量,3个指标的负面影响不存在。有趣的是,对9个最流行和/或最有效的SBFL指标的负面影响是温和的。此外,清除CC测试导致相当数量的受试者项目的SBFL恶化。(三)增加CC测试的比例对TSR、TCP和sffl的影响有限。有趣的是,对于TSR、TCP和11个SBFL指标,CC测试的大小比例都是非常有害的。(iv)最后,在TSR、TCP和sffl的背景下,弱CC和强CC同样有害。
{"title":"How detrimental is coincidental correctness to coverage‐based fault detection and localization? An empirical study","authors":"R. A. Assi, Wes Masri, Chadi Trad","doi":"10.1002/stvr.1762","DOIUrl":"https://doi.org/10.1002/stvr.1762","url":null,"abstract":"According to the reachability–infection–propagation (RIP) model, three conditions must be satisfied for program failure to occur: (1) the defect's location must be reached, (2) the program's state must become infected and (3) the infection must propagate to the output. Weak coincidental correctness (or weak CC) occurs when the program produces the correct output, while condition (1) is satisfied but conditions (2) and (3) are not satisfied. Strong coincidental correctness (or strong CC) occurs when the output is correct, while both conditions (1) and (2) are satisfied but not (3). The prevalence of CC was previously recognized. In addition, the potential for its negative effect on spectrum‐based fault localization (SBFL) was analytically demonstrated; however, this was not empirically validated. Using Defects4J, this paper empirically studies the impact of weak and strong CC on three well‐researched coverage‐based fault detection and localization techniques, namely, test suite reduction (TSR), test case prioritization (TCP) and SBFL. Our study, which involved 52 SBFL metrics, provides the following empirical evidence. (i) The negative impact of CC tests on TSR and TCP is very significant. In addition, cleansing the CC tests was observed to yield (a) a 100% TSR defect detection rate for all subject programs and (b) an improvement of TCP for over 92% of the subjects. (ii) The impact of CC tests on SBFL varies widely w.r.t. the metric used. The negative impact was strong for 11 metrics, mild for 37, non‐measurable for 1 and non‐existent for 3 metrics. Interestingly, the negative impact was mild for the 9 most popular and/or most effective SBFL metrics. In addition, cleansing the CC tests resulted in the deterioration of SBFL for a considerable number of subject programs. (iii) Increasing the proportion of CC tests has a limited impact on TSR, TCP and SBFL. Interestingly, for TSR and TCP and 11 SBFL metrics, small and large proportions of CC tests are strongly harmful. (iv) Lastly, weak and strong CC are equally detrimental in the context of TSR, TCP and SBFL.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"44 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85100701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysing the combination of cost reduction techniques in Android mutation testing 分析降低成本技术在Android突变检测中的结合
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.1002/stvr.1769
Macario Polo, Isyed Rodriguez
{"title":"Analysing the combination of cost reduction techniques in Android mutation testing","authors":"Macario Polo, Isyed Rodriguez","doi":"10.1002/stvr.1769","DOIUrl":"https://doi.org/10.1002/stvr.1769","url":null,"abstract":"","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"112 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87713233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue: IEEE International Conference on Software Testing, Validation & Verification 2018 特刊:2018年IEEE软件测试、验证与验证国际会议
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-01-01 DOI: 10.1002/stvr.1764
R. Feldt, S. Yoo
This special issue contains extended versions of two papers from the 11th IEEE International Conference on Software Testing, Validation & Verification (ICST 2018). ICST strives to provide an open forum for researchers, scientists, engineers, and practitioners working on software testing to present and discuss the latest research findings, ideas and developments. This was no exception at ICST 2018, where the collocation with the quarterly meeting of Swedish Association of Software Testing (SAST) led to strong industry presence and cross pollination of ideas. Based on the reviews from the program committee members, as well as the discussion with the Editors-in-Chief about their relevance to STVR, we invited authors of three papers to extend their papers and submit to the special section. The submitted manuscript went through a rigorous reviewing process by a panel of experts that included, but was not limited to, the members of the ICST 2018 program committee. During the process, two of the three papers were handled by one of us (Prof. Feldt) due to conflicts of interest. After finalizing the review and revision process two papers were accepted for publication in this special issue. The first paper, “DeMiner: Test Generation for High Test Coverage through Mutant Exploration” by Shin Hong, Yunho Kim, and Moonzoo Kim, introduces a way of using mutation analysis to improve the code coverage achieved by concolic testing. Called “Invasive Software Testing”, the proposed technique exploits additional information about the concrete and dynamic behaviour of the System Under Test, via mutation testing, to set goalposts for improved concolic testing. The second paper, “Effective Repair of Internationalization Presentation Failures in Web Applications Using Style Similarity Clustering and Search-Based Techniques” by Sonal Mahajan, Abdulmajeed Alameer, Phil McMinn, and William Halfond, introduces an automated repair technique for presentation failures in web pages regarding internationalization. The proposed technique, IFix+, can address presentation failures that stem from interactions of multiple style components by clustering DOM elements based on their visual appearances. Subsequently, IFix+ uses a search based approach to find a CSS patch that avoids introduction of any new failures. We express our thanks to everyone who contributed to the success of ICST 2018, as well as to this special section. We are grateful to the authors for extending their paper and submitting their valuable work to STVR. We would also like to express our gratitude to everyone who worked hard to make ICST 2018 the great success it was: in the midst of a global pandemic, the memory of the conference is something we all cherish deeply. In particular, we thank the general chair, Hans Hansson. Finally, we would like to thank both Robert Hierons and Tao Xie, for their support and guidance for this special issue.
本特刊包含来自第11届IEEE软件测试,验证与验证国际会议(ICST 2018)的两篇论文的扩展版本。ICST致力于为从事软件测试的研究人员、科学家、工程师和实践者提供一个开放的论坛,以展示和讨论最新的研究成果、想法和发展。这在ICST 2018上也不例外,与瑞典软件测试协会(SAST)季度会议的搭配导致了强大的行业存在和思想的交叉授粉。根据项目委员会成员的意见,以及与总编辑讨论了他们与STVR的相关性,我们邀请了三篇论文的作者扩展他们的论文并提交到专区。提交的手稿经过了包括但不限于ICST 2018项目委员会成员在内的专家小组的严格审查。在此过程中,由于利益冲突,我们其中一人(Feldt教授)处理了三篇论文中的两篇。在完成审查和修订过程后,两篇论文被接受在本期特刊上发表。第一篇论文,由Shin Hong, Yunho Kim和Moonzoo Kim撰写的“DeMiner:通过突变探索实现高测试覆盖率的测试生成”,介绍了一种使用突变分析来提高通过聚合测试实现的代码覆盖率的方法。这种被称为“侵入式软件测试”的技术,通过突变测试,利用关于被测系统的具体和动态行为的额外信息,为改进的整体测试设定目标。第二篇论文“使用风格相似聚类和基于搜索的技术有效修复Web应用程序中的国际化表示失败”,作者是Sonal Mahajan、Abdulmajeed Alameer、Phil McMinn和William Halfond,介绍了一种针对国际化页面中表示失败的自动修复技术。所提出的技术IFix+可以通过基于视觉外观对DOM元素进行聚类来解决由于多个样式组件的交互而导致的表示失败。随后,IFix+使用基于搜索的方法来查找CSS补丁,从而避免引入任何新的故障。我们感谢所有为ICST 2018的成功举办做出贡献的人,以及这个特别版块。我们非常感谢作者将他们的论文延伸到STVR并提交他们的宝贵工作。我们还要感谢为2018年ICST取得巨大成功而努力工作的每一个人:在全球大流行的背景下,对会议的记忆是我们都深深珍惜的。我们特别感谢总主席汉斯·汉森。最后,我们要感谢Robert Hierons和Tao Xie对本期特刊的支持和指导。
{"title":"Special Issue: IEEE International Conference on Software Testing, Validation & Verification 2018","authors":"R. Feldt, S. Yoo","doi":"10.1002/stvr.1764","DOIUrl":"https://doi.org/10.1002/stvr.1764","url":null,"abstract":"This special issue contains extended versions of two papers from the 11th IEEE International Conference on Software Testing, Validation & Verification (ICST 2018). ICST strives to provide an open forum for researchers, scientists, engineers, and practitioners working on software testing to present and discuss the latest research findings, ideas and developments. This was no exception at ICST 2018, where the collocation with the quarterly meeting of Swedish Association of Software Testing (SAST) led to strong industry presence and cross pollination of ideas. Based on the reviews from the program committee members, as well as the discussion with the Editors-in-Chief about their relevance to STVR, we invited authors of three papers to extend their papers and submit to the special section. The submitted manuscript went through a rigorous reviewing process by a panel of experts that included, but was not limited to, the members of the ICST 2018 program committee. During the process, two of the three papers were handled by one of us (Prof. Feldt) due to conflicts of interest. After finalizing the review and revision process two papers were accepted for publication in this special issue. The first paper, “DeMiner: Test Generation for High Test Coverage through Mutant Exploration” by Shin Hong, Yunho Kim, and Moonzoo Kim, introduces a way of using mutation analysis to improve the code coverage achieved by concolic testing. Called “Invasive Software Testing”, the proposed technique exploits additional information about the concrete and dynamic behaviour of the System Under Test, via mutation testing, to set goalposts for improved concolic testing. The second paper, “Effective Repair of Internationalization Presentation Failures in Web Applications Using Style Similarity Clustering and Search-Based Techniques” by Sonal Mahajan, Abdulmajeed Alameer, Phil McMinn, and William Halfond, introduces an automated repair technique for presentation failures in web pages regarding internationalization. The proposed technique, IFix+, can address presentation failures that stem from interactions of multiple style components by clustering DOM elements based on their visual appearances. Subsequently, IFix+ uses a search based approach to find a CSS patch that avoids introduction of any new failures. We express our thanks to everyone who contributed to the success of ICST 2018, as well as to this special section. We are grateful to the authors for extending their paper and submitting their valuable work to STVR. We would also like to express our gratitude to everyone who worked hard to make ICST 2018 the great success it was: in the midst of a global pandemic, the memory of the conference is something we all cherish deeply. In particular, we thank the general chair, Hans Hansson. Finally, we would like to thank both Robert Hierons and Tao Xie, for their support and guidance for this special issue.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"402 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84852301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology and politics 技术与政治
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2020-11-19 DOI: 10.4324/9781003057529-4
A. Krass
{"title":"Technology and politics","authors":"A. Krass","doi":"10.4324/9781003057529-4","DOIUrl":"https://doi.org/10.4324/9781003057529-4","url":null,"abstract":"","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"4 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82619632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusion 结论
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2020-11-19 DOI: 10.4324/9781003057529-5
A. Krass
{"title":"Conclusion","authors":"A. Krass","doi":"10.4324/9781003057529-5","DOIUrl":"https://doi.org/10.4324/9781003057529-5","url":null,"abstract":"","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"29 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81586217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial for the special issue of STVR on the 10th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2017) 第10届IEEE软件测试、验证与验证国际会议(ICST 2017) STVR专刊社论
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2020-11-02 DOI: 10.1002/stvr.1757
I. Schieferdecker, A. Memon, H. Washizaki
The 10th International Conference on Software Testing, Verification, and Validation (ICST 2017) was held on March 13 to 17, 2017, in Tokyo, Japan. The aim of the ICST conference is to bring together researchers and practitioners who study the theory, techniques, technologies, and applications that concern all aspects of software testing, verification, and validation of software systems. In the main research program, the ICST 2017 program chairs, Ina Schieferdecker and Hironori Washizaki selected 36 full papers and 8 short papers for inclusion in the proceedings from among 135 submissions based on the recommendation of the program committee. All papers were refereed by at least three program committee members. Of the 36 full papers accepted, we selected seven papers for consideration for this special issue of STVR. These papers were extended from their conference version by the authors and were reviewed according to the standard STVR reviewing process. We thank all the ICST and STVR reviewers for their hard work. Three papers successfully completed the review process and are contained in this special issue. The rest of this editorial provides a brief overview of these three papers. The first paper ‐ “Choosing The Fitness Function for the Job: Automated Generation of Test Suites that Detect Real Faults” by Alireza Salahirad, Hussein Almulla, and Gregory Gay ‐ studies the effectiveness of different fitness functions in search‐based unit test generation for detecting faults. Experiment results on real faults from the Defects4J database reveal that the branch coverage fitness function is the most effective. The study also reveals that the most important factor related to the likelihood of detection is the satisfaction of the chosen criterion’s test obligations. The second paper ‐ “Complexity Vulnerability Analysis using Symbolic Execution” ‐ Kasper Luckow, Rody Kersten, and Corina Pasareanu ‐ presents a symbolic execution technique for analyzing the worst‐case complexity of programs. The technique uses path policies to guide the symbolic execution towards worst‐case paths. The evaluation shows that the technique can detect complexity vulnerabilities in realistic software as well as standard implementations of classic algorithms. The third paper ‐ “Model‐based Testing of Apache ZooKeeper: Fundamental API Usage and Watchers” by Cyrille Artho, Kazuaki Banzai, Quentin Gros, Guillaume Rousset, Lei Ma, Takashi Kitamura, Masami Hagiya, Yoshinori Tanabe, and Mitsuharu Yamamoto ‐ presents a model‐based testing technique to generate test cases for concurrent client sessions executing against ZooKeeper. The technique defines the semantics of watchers in ZooKeeper and the test oracle to handle the chain of events that eventually leads to the watcher being triggered. The evaluation shows that the technique can detect known defects as well as seeded mutations that implement possible flaws.
第十届软件测试、验证和确认国际会议(ICST 2017)于2017年3月13日至17日在日本东京举行。ICST会议的目的是将研究理论、技术、技术和应用的研究人员和实践者聚集在一起,这些理论、技术、技术和应用涉及软件测试、验证和软件系统验证的各个方面。在主要研究项目中,ICST 2017项目主席Ina Schieferdecker和Hironori Washizaki根据项目委员会的推荐,从135份提交的论文中选择了36篇全文论文和8篇短文纳入论文集。所有论文均由至少三名项目委员会成员审阅。在收到的36篇全文中,我们选择了7篇论文作为本期《科学与现实》特刊的参考。这些论文是作者从会议版本中扩展出来的,并按照标准的STVR审查程序进行了审查。我们感谢所有ICST和STVR审稿人的辛勤工作。三篇论文成功地完成了审查过程,并包含在本期特刊中。这篇社论的其余部分提供了这三篇论文的简要概述。第一篇论文——Alireza Salahirad、Hussein Almulla和Gregory Gay撰写的“为工作选择适应度函数:自动生成检测实际故障的测试套件”——研究了不同适应度函数在基于搜索的单元测试生成中检测故障的有效性。对来自Defects4J数据库的真实故障的实验结果表明,分支覆盖适应度函数是最有效的。研究还表明,与检测可能性有关的最重要因素是所选标准的测试义务的满足。第二篇论文——“使用符号执行的复杂性漏洞分析”——Kasper Luckow、Rody Kersten和Corina Pasareanu提出了一种用于分析程序最坏情况复杂性的符号执行技术。该技术使用路径策略将符号执行引导到最坏情况路径。评估结果表明,该技术既能检测出现实软件中的复杂漏洞,又能检测出经典算法的标准实现。第三篇论文——“基于模型的Apache ZooKeeper测试:基本API使用和观察者”,作者是Cyrille Artho、Kazuaki Banzai、Quentin Gros、Guillaume Rousset、Lei Ma、Takashi Kitamura、Masami Hagiya、Yoshinori Tanabe和Mitsuharu Yamamoto——提出了一种基于模型的测试技术,用于生成对ZooKeeper执行并发客户端会话的测试用例。该技术在ZooKeeper和测试oracle中定义了观察者的语义,以处理最终导致观察者被触发的事件链。评估表明,该技术可以检测已知缺陷以及实现可能缺陷的种子突变。
{"title":"Editorial for the special issue of STVR on the 10th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2017)","authors":"I. Schieferdecker, A. Memon, H. Washizaki","doi":"10.1002/stvr.1757","DOIUrl":"https://doi.org/10.1002/stvr.1757","url":null,"abstract":"The 10th International Conference on Software Testing, Verification, and Validation (ICST 2017) was held on March 13 to 17, 2017, in Tokyo, Japan. The aim of the ICST conference is to bring together researchers and practitioners who study the theory, techniques, technologies, and applications that concern all aspects of software testing, verification, and validation of software systems. In the main research program, the ICST 2017 program chairs, Ina Schieferdecker and Hironori Washizaki selected 36 full papers and 8 short papers for inclusion in the proceedings from among 135 submissions based on the recommendation of the program committee. All papers were refereed by at least three program committee members. Of the 36 full papers accepted, we selected seven papers for consideration for this special issue of STVR. These papers were extended from their conference version by the authors and were reviewed according to the standard STVR reviewing process. We thank all the ICST and STVR reviewers for their hard work. Three papers successfully completed the review process and are contained in this special issue. The rest of this editorial provides a brief overview of these three papers. The first paper ‐ “Choosing The Fitness Function for the Job: Automated Generation of Test Suites that Detect Real Faults” by Alireza Salahirad, Hussein Almulla, and Gregory Gay ‐ studies the effectiveness of different fitness functions in search‐based unit test generation for detecting faults. Experiment results on real faults from the Defects4J database reveal that the branch coverage fitness function is the most effective. The study also reveals that the most important factor related to the likelihood of detection is the satisfaction of the chosen criterion’s test obligations. The second paper ‐ “Complexity Vulnerability Analysis using Symbolic Execution” ‐ Kasper Luckow, Rody Kersten, and Corina Pasareanu ‐ presents a symbolic execution technique for analyzing the worst‐case complexity of programs. The technique uses path policies to guide the symbolic execution towards worst‐case paths. The evaluation shows that the technique can detect complexity vulnerabilities in realistic software as well as standard implementations of classic algorithms. The third paper ‐ “Model‐based Testing of Apache ZooKeeper: Fundamental API Usage and Watchers” by Cyrille Artho, Kazuaki Banzai, Quentin Gros, Guillaume Rousset, Lei Ma, Takashi Kitamura, Masami Hagiya, Yoshinori Tanabe, and Mitsuharu Yamamoto ‐ presents a model‐based testing technique to generate test cases for concurrent client sessions executing against ZooKeeper. The technique defines the semantics of watchers in ZooKeeper and the test oracle to handle the chain of events that eventually leads to the watcher being triggered. The evaluation shows that the technique can detect known defects as well as seeded mutations that implement possible flaws.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"11 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2020-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85264577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model‐based testing of Apache ZooKeeper: Fundamental API usage and watchers 基于模型的Apache ZooKeeper测试:基本API使用和观察者
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2020-11-01 DOI: 10.1002/stvr.1720
Cyrille Artho, Kazuaki Banzai, Quentin Gros, Guillaume Rousset, L. Ma, Takashi Kitamura, M. Hagiya, Yoshinori Tanabe, M. Yamamoto
In this paper, we extend work on model‐based testing for Apache ZooKeeper, to handle watchers (triggers) and improve scalability. In a distributed asynchronous shared storage like ZooKeeper, watchers deliver notifications on state changes. They are difficult to test because watcher notifications involve an initial action that sets the watcher, followed by another action that changes the previously seen state.
在本文中,我们扩展了基于模型的Apache ZooKeeper测试工作,以处理观察者(触发器)并提高可扩展性。在像ZooKeeper这样的分布式异步共享存储中,观察者会在状态变化时发送通知。它们很难测试,因为监视程序通知涉及设置监视程序的初始操作,然后是更改先前看到的状态的另一个操作。
{"title":"Model‐based testing of Apache ZooKeeper: Fundamental API usage and watchers","authors":"Cyrille Artho, Kazuaki Banzai, Quentin Gros, Guillaume Rousset, L. Ma, Takashi Kitamura, M. Hagiya, Yoshinori Tanabe, M. Yamamoto","doi":"10.1002/stvr.1720","DOIUrl":"https://doi.org/10.1002/stvr.1720","url":null,"abstract":"In this paper, we extend work on model‐based testing for Apache ZooKeeper, to handle watchers (triggers) and improve scalability. In a distributed asynchronous shared storage like ZooKeeper, watchers deliver notifications on state changes. They are difficult to test because watcher notifications involve an initial action that sets the watcher, followed by another action that changes the previously seen state.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"134 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80462204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Software Testing Verification & Reliability
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1