2005
DOI: 10.1016/j.comnet.2004.09.009
|View full text |Cite
|
Sign up to set email alerts
|

A passive testing approach based on invariants: application to the WAP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
75
0
2

Year Published

2005
2005
2015
2015

Publication Types

Select...
3
3
1

Relationship

5
2

Authors

Journals

citations
Cited by 93 publications
(77 citation statements)
references
References 7 publications
0
75
0
2
Order By: Relevance
“…the observation of the system traces without interfering with the system's normal operation [8,3]. Monitoring is also close to run time verification [46].…”
Section: Passive Testingmentioning
confidence: 76%
See 2 more Smart Citations
“…the observation of the system traces without interfering with the system's normal operation [8,3]. Monitoring is also close to run time verification [46].…”
Section: Passive Testingmentioning
confidence: 76%
“…In order to do so, a simple adaptation of the classical algorithms for pattern matching on strings was implemented. This work was extended [8] to study a new type of invariants (obligation), to present a tool that implements the approach and to give a complete case study on the Wireless Application Protocol. It is worth pointing out that this protocol represents a typical example where active testing cannot be applied because, in general, there is no direct access to the interfaces between the different layers.…”
Section: Passive Testingmentioning
confidence: 99%
See 1 more Smart Citation
“…Passive testing consists in analyzing the traces recorded from the IUT and trying to find a fault by comparing these traces with either the complete specification or with some specific requirements (see, for example, [7], [8], [9], [10], [11]). A new methodology to perform passive testing was presented in [12], [13], [14]. The main novelty is that a set of invariants is used to represent the most relevant properties of a system.…”
Section: Introductionmentioning
confidence: 99%
“…Taking as initial step [14], the approach presented in [25], [26] included the possibility of adding time constraints as properties that traces extracted from the IUT must hold. Even though this framework was very appropriate to analyze a large variety of timed systems, we observed that our invariants become large and complicated when there is a big number of nodes in the environment.…”
Section: Introductionmentioning
confidence: 99%