An approach for detecting infeasible paths based on sub-path expansion

被引:0
|
作者
Wang, Hong-Yang [1 ]
Jiang, Shu-Juan [1 ]
Wang, Xing-Ya [1 ]
Ju, Xiao-Lin [1 ,2 ]
Zhang, Yan-Mei [1 ]
机构
[1] School of Computer Science and Technology, China University of Mining and Technology, Xuzhou,Jiangsu,221116, China
[2] School of Computer Science and Technology, Nantong University, Nantong,Jiangsu,226019, China
来源
关键词
Codes (symbols) - Logic programming;
D O I
10.3969/j.issn.0372-2112.2015.08.013
中图分类号
学科分类号
摘要
Infeasible paths are one of the most important parts to cost the test resources. Before path testing, infeasible paths detecting in a program can save test resources efficiently. This paper presents a static method to detect infeasible paths which is based on sub-path expansion. First, the proposed method generates sub-path set, and the feasibility issues will be converted into inequalities. Second, the constraint solver is used to solve the inequalities, and then we can distinguish the sub-paths into three parts: one part is infeasible sub-paths, the second part is feasible sub-paths, and the third part is undetermined. The paths that are expanded from the latter two parts will be tested again to determine their feasibility. Eventually, the feasibility of all the paths is detected. Most of the detecting work is on sub-path set, so our method makes an effective solution to the path-explosion problem. Experimental results show that the proposed method can detect infeasible paths more accurately and effectively. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1555 / 1560
相关论文
共 50 条
  • [1] An Approach for Detecting Infeasible Paths Based on a SMT Solver
    Jiang, Shujuan
    Wang, Hongyang
    Zhang, Yanmei
    Xue, Meng
    Qian, Junyan
    Zhang, Miao
    IEEE ACCESS, 2019, 7 : 68058 - 68069
  • [2] Detecting Interprocedural Infeasible Paths Based on Unsatisfiable Path Constraint Patterns
    Zhu, Honglei
    Jin, Dahai
    Gong, Yunzhan
    Xing, Ying
    Zhou, Mingnan
    IEEE ACCESS, 2019, 7 : 15040 - 15055
  • [3] Sub-path delay estimation for reconvergent path
    Nagatsuka, Seiya
    Takashima, Yasuhiro
    2012 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS (APCCAS), 2012, : 675 - 678
  • [4] Sub-Path Congestion Control In CMT
    Liu, Jiemin
    Ma, Yuchun
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4034 - 4037
  • [5] Automatically detecting equivalent mutants and infeasible paths
    George Mason Univ, Fairfax, United States
    J Software Test Verif Reliab, 3 (165-192):
  • [6] A UML model-based approach to detect infeasible paths
    Kundu, Debasish
    Sarma, Monalisa
    Samanta, Debasis
    JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 71 - 92
  • [7] Retransmission Reduction using Checkpoint based Sub-Path Routing for Wireless IoT
    Jainulabudeen, A.
    Surputheen, M. Mohamed
    JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH, 2023, 5 (04): : 1 - 11
  • [8] Research Progress on Infeasible Path Detecting Problem
    Zhang, Yanmei
    Jiang, Shujuan
    Han, Han
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (08) : 1931 - 1935
  • [9] Accelerating Image Generation with Sub-path Linear Approximation Model
    Xu, Chen
    Song, Tianhui
    Feng, Weixin
    Liz, Xubin
    Ge, Tiezheng
    Zheng, Bo
    Wang, Limin
    COMPUTER VISION - ECCV 2024, PT LIII, 2025, 15111 : 323 - 339
  • [10] A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks
    Wang, Xingwei
    Guo, Lei
    Wang, Xuekui
    Zhang, Yu
    Zheng, Xiaobing
    Hou, Weigang
    Li, Hongming
    Wang, Hongpeng
    COMPUTER COMMUNICATIONS, 2009, 32 (04) : 777 - 781