Abstract—Models inferred from execution traces (logs) may admit more behaviours than those possible in the real system (over-approximation) or may exclude behaviours that can indeed occur in the real system (under-approximation). Both problems negatively affect model based testing. In fact, over-approximation results in infeasible test cases, i.e., test cases that cannot be activated by any input data. Under-approximation results in missing test cases, i.e., system behaviours that are not represented in the model are also never tested. In this paper we balance over- and under-approximation of inferred models by resorting to multi-objective optimization achieved by means of two search-based algorithms: A multi-objective Genetic Algorithm (GA...
Abstract—System monitors need oracles to determine whether observed traces are acceptable. One metho...
Abstract. Testing is the process of stimulating a system with inputs in order to reveal hidden parts...
Abstract—Modern applications (e.g., the so called Future Internet applications) exhibit properties t...
Models inferred from execution traces (logs) may admit more behaviours than those possible in the re...
Bug reports are used by software testers to identify abnormal software behaviour. In this paper, we ...
Bug reports are used by software testers to identify abnormal software behaviour. In this paper, we ...
A web application model offers a high-level description of a web application’s behaviour. Using the ...
Part 5: Test OptimizationInternational audienceWhere a software component is updated or replaced reg...
Bug prediction is a technique that strives to identify where defects will appear in a software syste...
Machine learning models have many applications, being used for example in pattern analysis, image cl...
Chapter 3International audienceFor software systems, models can be learned from behavioral traces, a...
Abstract—Using aspects of model checking to analyse multi-threaded software is a promising method fo...
Software tests are fundamental in the reliability and quality of systems, contributing to their posi...
Abstract—Checking the output of a test case for correctness— applying a test oracle—is challenging f...
When a program is compiled and run on a modern architecture, different optimizations may be applied ...
Abstract—System monitors need oracles to determine whether observed traces are acceptable. One metho...
Abstract. Testing is the process of stimulating a system with inputs in order to reveal hidden parts...
Abstract—Modern applications (e.g., the so called Future Internet applications) exhibit properties t...
Models inferred from execution traces (logs) may admit more behaviours than those possible in the re...
Bug reports are used by software testers to identify abnormal software behaviour. In this paper, we ...
Bug reports are used by software testers to identify abnormal software behaviour. In this paper, we ...
A web application model offers a high-level description of a web application’s behaviour. Using the ...
Part 5: Test OptimizationInternational audienceWhere a software component is updated or replaced reg...
Bug prediction is a technique that strives to identify where defects will appear in a software syste...
Machine learning models have many applications, being used for example in pattern analysis, image cl...
Chapter 3International audienceFor software systems, models can be learned from behavioral traces, a...
Abstract—Using aspects of model checking to analyse multi-threaded software is a promising method fo...
Software tests are fundamental in the reliability and quality of systems, contributing to their posi...
Abstract—Checking the output of a test case for correctness— applying a test oracle—is challenging f...
When a program is compiled and run on a modern architecture, different optimizations may be applied ...
Abstract—System monitors need oracles to determine whether observed traces are acceptable. One metho...
Abstract. Testing is the process of stimulating a system with inputs in order to reveal hidden parts...
Abstract—Modern applications (e.g., the so called Future Internet applications) exhibit properties t...