Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Experimental comparison of three system test strategies preliminary report

Published: 01 November 1989 Publication History
  • Get Citation Alerts
  • Abstract

    This paper reports on some experiments which compare three system test strategies which were applied to artificial software systems. The artificial systems were seeded with known defects and then tested according to the three strategies which involved random system level input, random system level input with defect removal, and modified module coverage. The results suggests that of the three strategies considered here, the modified module coverage exposes a higher number of defects, especially for large systems.

    References

    [1]
    B. Beizer, Software System Testing and Quality Assurance, Van Nostrand Reinhold, New York, 1984.
    [2]
    F. P. Brooks, Jr., The Mythical Man-Month, Addison-Wesley, Reading, Mass., 1975.
    [3]
    G. Collins and G. Blay, Structured Systems Development Techniques: Strategic Planning to System Testing, Wiley, New York, 1982.
    [4]
    A. Currit, M. Dyer, and H. D. Mills, Certifying the reliability of software, IEEE Trans. Software Eng., SE12, 1986, pp.3-11.
    [5]
    J. W. Duran and S. C. Ntafos, An evaluation of random testing, IEEE Trans. Software Eng. SE- 10, 1984, pp.438444.
    [6]
    D. Hamlet, Testing for probable correctness, Proc. Workshop on Software Testing, Banff, Canada, July, 1986, IEEE Computer Society Press, Washington D.C., 1986, pp.92-97.
    [7]
    W. Hetzel, The Complete Guide to Software Testing, QED Information Sciences, Wellesley, Mass., 1984.
    [8]
    IEEE, Software Engineering Standards, IEEE, New York, 1987.
    [9]
    H. D. Mills, Structured programming: retrospect and prospect, IEEE Software, 3 (no. 6), 1986, pp.58-66.
    [10]
    G. J. Myers, The Art of Software Testing, Wiley Interscience, New York, 1979.
    [11]
    R. M. Poston and M. W. Bruen, Counting down to zero software failures, IEEE Software, 4 (no. 5), 1987, pp. 54-61.
    [12]
    J. H. Rowland, Artificial systems for software engineering studies, Proc. Workshop on Software Testing, Verification, and Analysis, Banff, Canada, July 1988, IEEE Computer Society Press, Washington, D. C., 1988, pp. 80-88.
    [13]
    J. H. Rowland and N. A. Sendek, Software Testing: Introduction to System Level-Complez Application Testing, IBM Corporation, Austin, TX 1986.
    [14]
    R. W. Selby, V. R. Basili, and F. T. Baker, Cleanroom software development: an empirical evaluation, IEEE Trans. Software Eng., SEl3, 1987, pp. 1027-1037.
    [15]
    M. A. Vouk, D. F. McAllister, and K. C. Tai, An experimental evaluation of the effectiveness of random testing of fault-tolerant software, Proc. Workshop on Software Testing, Banff, Canada, July 1986, IEEE Computer Society Press, Washington, D. C., 1986, pp. 74-81.
    [16]
    E. Yourdon, Managing the Structured Techniques, Prentice-Hall, Englewood Cliffs, N.J., 1979.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGSOFT Software Engineering Notes
    ACM SIGSOFT Software Engineering Notes  Volume 14, Issue 8
    Dec. 1989
    213 pages
    ISSN:0163-5948
    DOI:10.1145/75309
    Issue’s Table of Contents
    • cover image ACM Conferences
      TAV3: Proceedings of the ACM SIGSOFT '89 third symposium on Software testing, analysis, and verification
      November 1989
      229 pages
      ISBN:0897913426
      DOI:10.1145/75308
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 November 1989
    Published in SIGSOFT Volume 14, Issue 8

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)32
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (1999)Generating test data from SOFL specificationsJournal of Systems and Software10.1016/S0164-1212(99)00066-749:1(49-62)Online publication date: 15-Dec-1999
    • (1999)Generating test data from SOFL specificationsJournal of Systems and Software10.1016/S0164-1212(99)00066-749:1(49-62)Online publication date: 15-Dec-1999
    • (1993)Can we measure software testing effectiveness?[1993] Proceedings First International Software Metrics Symposium10.1109/METRIC.1993.263796(100-107)Online publication date: 1993
    • (1993)An Empirical Study of Testing and Integration Strategies Using Artificial Software SystemsIEEE Transactions on Software Engineering10.1109/32.24573619:10(941-949)Online publication date: 1-Oct-1993
    • (1993)An Experimental Comparison of the Effectiveness of Branch Testing and Data Flow TestingIEEE Transactions on Software Engineering10.1109/32.23858119:8(774-787)Online publication date: 1-Aug-1993
    • (1991)An experimental comparison of the effectiveness of the all-uses and all-edges adequacy criteriaProceedings of the symposium on Testing, analysis, and verification10.1145/120807.120821(154-164)Online publication date: 1-Oct-1991
    • (1991)Comparison of program testing strategiesProceedings of the symposium on Testing, analysis, and verification10.1145/120807.120808(1-10)Online publication date: 1-Oct-1991
    • (1990)Methods of comparing test data adequacy criteriaProceedings., Fourteenth Annual International Computer Software and Applications Conference10.1109/CMPSAC.1990.139305(1-6)Online publication date: 1990

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media