During the testing of context-sensitive middleware-based software, the middleware checks the current situation to invoke the appropriate functions of the applications. Since the middleware remains active and the situation may continue to evolve, however, the conclusion of some test cases may not easily be identified. Moreover, failures appearing in one situation may be superseded by subsequent correct outcomes and, therefore, be hidden. We alleviate the above problems by making use of a special kind of situation, which we call checkpoints, such that the middleware will not activate the functions under test. We recommend testers to generate test cases that start at a checkpoint and end at another. Testers may identify relations that associat...
Mutation testing and adequacy testing are two major technologies to assure the quality of software. ...
First, we will present an approach called Automated Metamorphic System Testing. This will involve au...
Proceedings of the International Conference on Quality Software, 2010, p. 151-160Pervasive computing...
During the testing of context-sensitive middleware-based software, the middleware identifies the cur...
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application....
The incorporation of context-awareness capabilities into pervasive applications allows them to lever...
The incorporation of context-awareness capabilities into pervasive applications allows them to lever...
In software industry the greatest amount of expenditure is in maintaining software developed poorly ...
Context aware applications are starting to be utilized more to build autonomic systems. Therefore, i...
In this paper, we present our experience of testing wireless embedded software. We used a wireless m...
Their highly adaptive nature and the combinatorial explosion of possible configurations makes testin...
The context of a modular system through which its embedded components interact with the user is the ...
NOVELTY - The method involves generating observation and validation code in response to defined even...
he development of context-aware applications is a difficult and error-prone task. The dynamics of th...
Testing applications in service-oriented architecture (SOA) environments needs to deal with issues l...
Mutation testing and adequacy testing are two major technologies to assure the quality of software. ...
First, we will present an approach called Automated Metamorphic System Testing. This will involve au...
Proceedings of the International Conference on Quality Software, 2010, p. 151-160Pervasive computing...
During the testing of context-sensitive middleware-based software, the middleware identifies the cur...
Context-sensitive middleware-based software is an emerging kind of ubiquitous computing application....
The incorporation of context-awareness capabilities into pervasive applications allows them to lever...
The incorporation of context-awareness capabilities into pervasive applications allows them to lever...
In software industry the greatest amount of expenditure is in maintaining software developed poorly ...
Context aware applications are starting to be utilized more to build autonomic systems. Therefore, i...
In this paper, we present our experience of testing wireless embedded software. We used a wireless m...
Their highly adaptive nature and the combinatorial explosion of possible configurations makes testin...
The context of a modular system through which its embedded components interact with the user is the ...
NOVELTY - The method involves generating observation and validation code in response to defined even...
he development of context-aware applications is a difficult and error-prone task. The dynamics of th...
Testing applications in service-oriented architecture (SOA) environments needs to deal with issues l...
Mutation testing and adequacy testing are two major technologies to assure the quality of software. ...
First, we will present an approach called Automated Metamorphic System Testing. This will involve au...
Proceedings of the International Conference on Quality Software, 2010, p. 151-160Pervasive computing...