The invention provides a software testing method based on the combination of control flow graph traversal and slice forward traversal. The method improves the traversal strategy of the selective regression testing method based on control flow graph traversal, changes the definitions of variables in ...
Coverage-Based Software Testing W.Masri,F.A.Zaraket, inAdvances in Computers, 2016 3.2Statement Coverage and Basic Block Coverage Control flow is a relation that describes the possible flow of execution in a program. Acontrolflow graph(CFG) is adirected graphin which each node represents a stat...
Control flow graphs and code coverage control flow graphgraph reductionsoftware testingstatement coveragebranch coverageThe control flow of programs can be represented by directed graphs. In this ... Robert,Gold - 《International Journal of Applied Mathematics & Computer Science》 被引量: 33发表: 2010...
This paper presents a new signature monitoring technique, CFCSSn(control flow checking by software signatures); CFCSS is a pure softwarenmethod that checks the control flow of a program using assignednsignatures. An algorithm assigns a unique signature to each node in thenprogram graph and adds ...
In this paper, we propose a direct testing technique on FBD without generating intermediate code. In order to test FBD, we define testing granularity in terms of function blocks and propose an algorithm that transforms an FBD network to a flow graph. We apply existing control and data flow ...
Control-Flow Analysis is defined as a technique that illustrates the hierarchical sequencing of control within a program, enabling the analysis of all possible execution paths through the use of a control-flow graph. AI generated definition based on: Information and Software Technology, 2017 ...
This paper presents a selective regression testing technique and an associated tool for object-oriented software. The technique is based on the concept of Control Call Graphs, which are a reduced form of traditional Control Flow Graphs. It uses static analysis of the source code of the program....
In addition, a graph-based application model is also presented to model the behavior of web-based applications. With the graphic presentation, several traditional software testing techniques are extended to test Web-based applications. 展开 被引量: 9 ...
forget launches. Although not shown in this example, the graphs that are decompressing the file data could dispatch more graphs to do further processing on that data after it is fully decompressed (image processing, for example). Device graph flow is hierarchical, just like the graphs themselves...
Mall. "An approach to convert XMI representation of UML 2. x interaction dia- gram into control ow graph". ISRN Software Engineering, pp. 1-22, 2012.Mall, Rajib. "An approach to convert XMI representation of UML 2. x interaction diagram into control flow graph." ISRN Software Engineering...