An approach for detecting infeasible paths based on sub-path expansion

被引:0
|
作者
Wang, Hong-Yang [1 ]
Jiang, Shu-Juan [1 ]
Wang, Xing-Ya [1 ]
Ju, Xiao-Lin [1 ,2 ]
Zhang, Yan-Mei [1 ]
机构
[1] School of Computer Science and Technology, China University of Mining and Technology, Xuzhou,Jiangsu,221116, China
[2] School of Computer Science and Technology, Nantong University, Nantong,Jiangsu,226019, China
来源
关键词
Codes (symbols) - Logic programming;
D O I
10.3969/j.issn.0372-2112.2015.08.013
中图分类号
学科分类号
摘要
Infeasible paths are one of the most important parts to cost the test resources. Before path testing, infeasible paths detecting in a program can save test resources efficiently. This paper presents a static method to detect infeasible paths which is based on sub-path expansion. First, the proposed method generates sub-path set, and the feasibility issues will be converted into inequalities. Second, the constraint solver is used to solve the inequalities, and then we can distinguish the sub-paths into three parts: one part is infeasible sub-paths, the second part is feasible sub-paths, and the third part is undetermined. The paths that are expanded from the latter two parts will be tested again to determine their feasibility. Eventually, the feasibility of all the paths is detected. Most of the detecting work is on sub-path set, so our method makes an effective solution to the path-explosion problem. Experimental results show that the proposed method can detect infeasible paths more accurately and effectively. ©, 2015, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1555 / 1560
相关论文
共 50 条
  • [21] Load balanced sub-path protection with restoration time constraints in optical networks
    Wang, Xingwei
    Guo, Lei
    Du, Juan
    Pang, Lan
    OPTICAL FIBER TECHNOLOGY, 2008, 14 (03) : 242 - 246
  • [22] Generating Critical Nodes for Sub-path Planning with a Deep Neural Network Based on Resnet50
    Zou, Fei
    Jia, Shengde
    Liu, Tianqing
    Wang, Chang
    Niu, Yifeng
    PROCEEDINGS OF 2022 INTERNATIONAL CONFERENCE ON AUTONOMOUS UNMANNED SYSTEMS, ICAUS 2022, 2023, 1010 : 811 - 822
  • [23] An Catholic and Enhanced Study on Basis Path Testing to Avoid Infeasible Paths in CFG
    Kumar, T. Bharat
    Harish, N.
    Kumar, V. Sravan
    GLOBAL TRENDS IN INFORMATION SYSTEMS AND SOFTWARE APPLICATIONS, PT 2, 2012, 270 : 386 - +
  • [24] A shared sub-path protection strategy in multi-domain optical networks
    Xie, Xuejuan
    Sun, Weiqiang
    Hu, Weisheng
    Wang, Jun
    AOE 2007: ASIA OPTICAL FIBER COMMUNICATION & OPTOELECTRONIC EXPOSITION & CONFERENCE, CONFERENCE PROCEEDINGS, 2008, : 418 - 420
  • [25] Dynamic sub-path protection with hop constraint routing algorithm in WDM networks
    Cao, J
    Yu, HF
    Li, LM
    NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS III, PTS 1 AND 2, 2005, 6022
  • [26] Detecting Infeasible Branches Based on Code Patterns
    Ding, Sun
    Zhang, Hongyu
    Tan, Hee Beng Kuan
    2014 SOFTWARE EVOLUTION WEEK - IEEE CONFERENCE ON SOFTWARE MAINTENANCE, REENGINEERING, AND REVERSE ENGINEERING (CSMR-WCRE), 2014, : 74 - +
  • [27] Analysis of the infeasible path based on key branch
    Pan, Li-Li
    Zou, Bei-Ji
    Wang, Tian-E
    Chen, Hao
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 716 - 720
  • [28] Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks
    Guo, Lei
    Wang, Xingwei
    Cao, Jin
    Lie, Lemin
    Yang, Ting
    Yang, Fei
    FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICNS 2008), PROCEEDINGS, 2008, : 153 - +
  • [29] A dynamic partitioning sub-path protection routing technique in WDM mesh networks
    Todimala, A
    Ramamurthy, B
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 327 - 340
  • [30] Optimal Sub-Path Selection for Maximum Data Gathering Using Mobile Sink in WSN
    Kumar, Naween
    Dash, Dinesh
    Kumar, Prabhat
    7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT - 2017), 2017, : 66 - 71