2011
DOI: 10.1016/j.infsof.2011.03.009
|View full text |Cite
|
Sign up to set email alerts
|

A logic mutation approach to selective mutation for programs and queries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 44 publications
0
15
0
Order By: Relevance
“…Wright's dissertation presented a unified treatment of these approaches to efficient schema mutation testing [47]. While this dissertation, and the author's aforementioned work (e.g., [12], [14], [15]), focused on mutating the CREATE TABLE statements that produce the schema, other prior work has proposed mutation operators for the SQL SELECT statements used by applications to retrieve data stored in a database [46], [79]. The idea of mutation analysis for database queries was later incorporated into a tool for instrumenting and testing database applications written in the Java programming language, potentially mutating any executed SELECT statement [80].…”
Section: Related Workmentioning
confidence: 99%
“…Wright's dissertation presented a unified treatment of these approaches to efficient schema mutation testing [47]. While this dissertation, and the author's aforementioned work (e.g., [12], [14], [15]), focused on mutating the CREATE TABLE statements that produce the schema, other prior work has proposed mutation operators for the SQL SELECT statements used by applications to retrieve data stored in a database [46], [79]. The idea of mutation analysis for database queries was later incorporated into a tool for instrumenting and testing database applications written in the Java programming language, potentially mutating any executed SELECT statement [80].…”
Section: Related Workmentioning
confidence: 99%
“…In the fault-based category the existing works range from the development of sets of mutants for SQL queries [17], [18] or schemas [19], [20], [21] to the evaluation of the fault-detection effectiveness with tools [22], [23], [24], [25], fault-localization [26] and empirical studies [27]. Others are application specific, mainly with the goal of detecting SQL injection vulnerabilities [28], [29], [30] and preventing them [31].…”
Section: Test Coverage For Database Applicationsmentioning
confidence: 99%
“…The approach was also applied to programs and queries [15], as well as at the system level based on Java programs [12]. To the best of our knowledge, it has not been studied for dynamically typed languages, including Python.…”
Section: B Higher Order Mutationmentioning
confidence: 99%