Objective: Test cases tend to be large in number as redundant test cases are generated due to the presence of code smells, hence the need to reduce these smells. Methods/Statistical Analysis: This research adopts a proactive approach of reducing test cases by detecting the lazy class code smells based on the cohesion and dependency of the code and applying the inline class refactoring practices before test case generation thereby significantly avoiding redundant test cases from being generated Findings: The test cases generated from the original source code is compared to test cases from the refactored code. Test cases from the refactored code show a reduction of up to 33.3% in cyclomatic complexity compared to the original source cod...
10.1007/978-3-642-38977-1_4Lecture Notes in Computer Science (including subseries Lecture Notes in A...
The widespread adoption of mobile devices, coupled with the ease of developing mobile-based applicat...
Reverse engineering an application requires attackers to invest time and effort doing manual and aut...
Objective: Test cases tend to be large in number as redundant test cases are generated due to the pr...
The vast increase in demand for android applications has made android application testing inevitable...
In software development life cycle (SDLC), the testing phase is important to test the functionalitie...
The vast increase in demand for android applications has made android application testing inevitabl...
Refactoring simplifies the internal aspects of the software without modifying its external behavior,...
This work aims at defining a procedure and a set of mechanisms able to improve the quality of the co...
Test smells are considered bad practices for developing the test code. Their presence can reduce the...
There are various stages in the development of Android mobile applications. Refactoring is one of th...
Part 3: Mobile SecurityInternational audienceRecently smartphones and mobile devices have gained inc...
International audienceContext: Developers design test suites to verify that software meets its expec...
In the recent years, studies of design and programming prac-tices in mobile development are gaining ...
International audienceAndroid code smells are bad implementation practices withinAndroid application...
10.1007/978-3-642-38977-1_4Lecture Notes in Computer Science (including subseries Lecture Notes in A...
The widespread adoption of mobile devices, coupled with the ease of developing mobile-based applicat...
Reverse engineering an application requires attackers to invest time and effort doing manual and aut...
Objective: Test cases tend to be large in number as redundant test cases are generated due to the pr...
The vast increase in demand for android applications has made android application testing inevitable...
In software development life cycle (SDLC), the testing phase is important to test the functionalitie...
The vast increase in demand for android applications has made android application testing inevitabl...
Refactoring simplifies the internal aspects of the software without modifying its external behavior,...
This work aims at defining a procedure and a set of mechanisms able to improve the quality of the co...
Test smells are considered bad practices for developing the test code. Their presence can reduce the...
There are various stages in the development of Android mobile applications. Refactoring is one of th...
Part 3: Mobile SecurityInternational audienceRecently smartphones and mobile devices have gained inc...
International audienceContext: Developers design test suites to verify that software meets its expec...
In the recent years, studies of design and programming prac-tices in mobile development are gaining ...
International audienceAndroid code smells are bad implementation practices withinAndroid application...
10.1007/978-3-642-38977-1_4Lecture Notes in Computer Science (including subseries Lecture Notes in A...
The widespread adoption of mobile devices, coupled with the ease of developing mobile-based applicat...
Reverse engineering an application requires attackers to invest time and effort doing manual and aut...