TUGEN: An automatic test suite generator integrating data-flow and control-flow methods

被引:0
|
作者
Wang, JG [1 ]
Hao, RB [1 ]
Wu, JP [1 ]
机构
[1] Tsing Hua Univ, Dept Comp Sci, Beijing 100084, Peoples R China
关键词
protocol conformance testing; test suite; external behavior expression;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presentes a new method and its implementation called TUGEN. This method integrates the features of data-flow and control-flow test. TUGEN is based on a formal model called EBE that specifies only the external behavior of a protocol. We introduce the UIO sequence algorithm to determine the state and the concept of AIO tree to solve the nondeteminism of a protocol. We also use the protocol constraint set to control the complexity of exploring space. Furthermore, we can optimally generate the test suite by simulant testing.
引用
收藏
页码:286 / 290
页数:5
相关论文
共 50 条
  • [1] TUGEN: An automatic test suite generator integrating data-flow and control-flow methods
    Wang, JG
    Hao, RB
    Wu, JP
    [J]. NEW TECHNOLOGIES ON COMPUTER SOFTWARE, 1997, : 212 - 217
  • [2] Adding control-flow to a visual data-flow representation
    Dearman, D
    Cox, A
    Fisher, M
    [J]. 13TH INTERNATIONAL WORKSHOP ON PROGRAM COMPREHENSION, PROCEEDINGS, 2005, : 297 - 306
  • [3] Data-Flow vs Control-Flow for Extreme Level Computing
    Evripidou, Paraskevas
    Kyriacou, Costas
    [J]. 2013 DATA-FLOW EXECUTION MODELS FOR EXTREME SCALE COMPUTING (DFM), 2014, : 9 - 13
  • [4] Control-flow semantics for assembly-level data-flow graphs
    Kahl, Wolfram
    Anand, Christopher K.
    Carette, Jacques
    [J]. RELATIONAL METHODS IN COMPUTER SCIENCE, 2005, 2006, 3929 : 147 - 160
  • [5] SOFTWARE-VALIDATION .1. CONTROL-FLOW AND DATA-FLOW ANALYSIS
    CARRE, BA
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 1980, 4 (10) : 395 - 406
  • [6] Testing the Control-Flow, Data-Flow, and Time Aspects of Communication Systems: A Survey
    Dssouli, Rachida
    Khoumsi, Ahmed
    Elqortobi, Mounia
    Bentahar, Jamal
    [J]. ADVANCES IN COMPUTERS, VOL 107, 2017, 107 : 95 - 155
  • [7] Bridging the Gap between Data-flow and Control-flow Analysis for Anomaly Detection
    Li, Peng
    Park, Hyundo
    Gao, Debin
    Fu, Jianming
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 392 - +
  • [8] Transaction execution models in partially replicated transactional memory: The case for data-flow and control-flow
    Palmieri, Roberto
    Peluso, Sebastiano
    Ravindran, Binoy
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 8913 : 341 - 366
  • [9] FROM CONTROL FLOW TO DATA-FLOW
    BECK, M
    JOHNSON, R
    PINGALI, K
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1991, 12 (02) : 118 - 129
  • [10] Automatic Synthesis of Data-Flow Analyzers
    Xu, Xuezheng
    Wang, Xudong
    Xue, Jingling
    [J]. STATIC ANALYSIS, SAS 2021, 2021, 12913 : 453 - 478