A number of path selection criteria have been proposed throughout the years. Unfortunately, little work has been done on comparing these criteria. To determine what would be an effective path selection criterion for revealing errors in programs, we have undertaken an evaluation of these criteria. This paper reports on the results of our evaluation of path selection criteria based on data flow relationships. We show how these criteria relate to each other, thereby demonstrating some of their strengths and weaknesses. In addition, we suggest minor changes to some criteria that improve their performance. We conclude with a discussion of the major limitations of these criteria and directions for future research
Many program verification, testing and performance prediction techniques rely on analysis of statica...
RELAY, a model for error detection, defines revealing conditions that guarantee that a fault origina...
System Area Networks (SANs), which usually accept irregular topologies, have been used to connect no...
A number of path selection criteria have been proposed throughout the years. Unfortunately, little w...
This paper examines a family of program test data selection criteria derived from data flow analysis...
Infeasible paths constitute a bottleneck for the complete automation of software testing, one of the...
The utilization is described of a data Howpath selection criterion in a symbolic execution system. T...
Data-flow analysis computes its solutions over the paths in a control-flow graph. These paths---whet...
An unfortunate characteristic of current static analysis algorithms is their apparent inability to d...
In this thesis, we present an automatic test case selection system, which aims at selecting test cas...
Abstract—This paper investigates the limits of current data flow testing approaches from a radically...
This paper describes a new approach to performing data flow testing on programs that use pointer var...
Software testing is one of the most widely used quality assurance methodologies. A large software sy...
[[abstract]]Software testing is an important process in software quarlity assurance. A number of tes...
With the sensor technology in-place today, it is difficult to correctly predict path utilization coe...
Many program verification, testing and performance prediction techniques rely on analysis of statica...
RELAY, a model for error detection, defines revealing conditions that guarantee that a fault origina...
System Area Networks (SANs), which usually accept irregular topologies, have been used to connect no...
A number of path selection criteria have been proposed throughout the years. Unfortunately, little w...
This paper examines a family of program test data selection criteria derived from data flow analysis...
Infeasible paths constitute a bottleneck for the complete automation of software testing, one of the...
The utilization is described of a data Howpath selection criterion in a symbolic execution system. T...
Data-flow analysis computes its solutions over the paths in a control-flow graph. These paths---whet...
An unfortunate characteristic of current static analysis algorithms is their apparent inability to d...
In this thesis, we present an automatic test case selection system, which aims at selecting test cas...
Abstract—This paper investigates the limits of current data flow testing approaches from a radically...
This paper describes a new approach to performing data flow testing on programs that use pointer var...
Software testing is one of the most widely used quality assurance methodologies. A large software sy...
[[abstract]]Software testing is an important process in software quarlity assurance. A number of tes...
With the sensor technology in-place today, it is difficult to correctly predict path utilization coe...
Many program verification, testing and performance prediction techniques rely on analysis of statica...
RELAY, a model for error detection, defines revealing conditions that guarantee that a fault origina...
System Area Networks (SANs), which usually accept irregular topologies, have been used to connect no...