<< Chapter < Page
  Software engineering     Page 11 / 15
Chapter >> Page >

Data flow-based criteria

In data-flow-based testing, the control flowgraph is annotated with information about how the program variables are defined, used, and killed (undefined). The strongest criterion, all definition-use paths, requires that, for each variable, every control flow path segment from a definition of that variable to a use of that definition is executed. In order to reduce the number of paths required, weaker strategies such as all-definitions and all-uses are employed.

Reference models for code-based testing

Although not a technique in itself, the control structure of a program is graphically represented using a flowgraph in code-based testing techniques. A flowgraph is a directed graph the nodes and arcs of which correspond to program elements. For instance, nodes may represent statements or uninterrupted sequences of statements, and arcs the transfer of control between nodes.

Fault-based techniques

With different degrees of formalization, fault-based testing techniques devise test cases specifically aimed at revealing categories of likely or predefined faults.

Error guessing

In error guessing, test cases are specifically designed by software engineers trying to figure out the most plausible faults in a given program. A good source of information is the history of faults discovered in earlier projects, as well as the software engineer’s expertise.

Mutation testing

A mutant is a slightly modified version of the program under test, differing from it by a small, syntactic change. Every test case exercises both the original and all generated mutants: if a test case is successful in identifying the difference between the program and a mutant, the latter is said to be “killed.” Originally conceived as a technique to evaluate a test set, mutation testing is also a testing criterion in itself: either tests are randomly generated until enough mutants have been killed, or tests are specifically designed to kill surviving mutants. In the latter case, mutation testing can also be categorized as a code-based technique. The underlying assumption of mutation testing, the coupling effect, is that by looking for simple syntactic faults, more complex but real faults will be found. For the technique to be effective, a large number of mutants must be automatically derived in a systematic way.

Usage-based techniques

Operational profile

In testing for reliability evaluation, the test environment must reproduce the operational environment of the software as closely as possible. The idea is to infer, from the observed test results, the future reliability of the software when in actual use. To do this, inputs are assigned a probability distribution, or profile, according to their occurrence in actual operation.

Software reliability engineered testing

Software Reliability Engineered Testing (SRET) is a testing method encompassing the whole development process, whereby testing is “designed and guided by reliability objectives and expected relative usage and criticality of different functions in the field.”

Questions & Answers

how did you get the value of 2000N.What calculations are needed to arrive at it
Smarajit Reply
Privacy Information Security Software Version 1.1a
Good
configration management
Ravi Reply
what is a computer software
Chinaza Reply
Computer software is programming code executed on a computer processor at either the machine-level or the level of the operating system. ... The physical components of a computer are the hardware, and the digital programs running on the hardware are the software.
SATYAM
what is sofftware
Mohammed Reply
Software, in its most general sense, is a set of instructions or programs instructing a computer to do specific tasks. Software is a generic term used to describe computer programs. Scripts, applications, programs and a set of instructions are all terms often used to describe software.
SATYAM
how to open a software company
SATYAM Reply
draw context model for a patient information system in a hospital
shruti Reply
how to activate Microsoft word
Matthew Reply
To activate Microsoft word, please follow these steps below: 1. On windows 8.1 or Windows 10, choose start. 2. Scroll down through your apps and choose Microsoft office- the tile with the Office logo. 3. In the windows that open, choose Activate. 4. Do one of the following:
Abdul
. If you are asked to sign in with your Microsoft account, that means you do not need a product key. proceed to the next step below and enter your Microsoft account. OR . If you are asked to enter a product key, this means a key was included with your purchase.
Abdul
Look for it on your Certificate of Authenticity or a card in the packaging. If you cannot find it, contact your reseller. The key uses a combination of 25 letters and numbers and looks this: xxxxx-xxxxx-xxxxx-xxxxx-xxxxx. Enter your key in the space provided. 5. Sign in with your Microsoft account
Abdul
to activate the Office product that came with your device.
Abdul
What can we do with cmd
Ibrahim Reply
what is software
Igho Reply
is set of instructions (generally referred to as code), that is positioned between you and the device hardware, enable you to use it .
Abdul
that's what a software can be defined as.
Abdul
what is white box testing
MUNEIAH Reply
What is software life cycle model? Why is it important during the development of a large softwre products
ramsahay Reply
explain About various types of software quality metrics
vijay Reply
I study software assignment course
Raza Reply
what is re process
naveen Reply
how to make software development projects
suresh Reply

Get the best Software engineering course in your pocket!





Source:  OpenStax, Software engineering. OpenStax CNX. Jul 29, 2009 Download for free at http://cnx.org/content/col10790/1.1
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Software engineering' conversation and receive update notifications?

Ask