2006
DOI: 10.1007/11902140_110
|View full text |Cite
|
Sign up to set email alerts
|

Coverage-Based, Prioritized Testing Using Neural Network Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…18. Priority values assigned to the CESs generated from the INC3 module are also given in Table A.19 in the Appendix.…”
Section: Experimental Results and The Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…18. Priority values assigned to the CESs generated from the INC3 module are also given in Table A.19 in the Appendix.…”
Section: Experimental Results and The Discussionmentioning
confidence: 99%
“…One of the benefits of the proposed approach is that it can be deployed in any stage of software development to reflect the preferences of the tester wherever he/she needs to select a subset among all possible/available test cases in favor of the total testing cost. Although the authors' previous works [13,[18][19][20][21][22][23] also defined similar attributes for events and assigned values to them in order to determine the degree of preference by means of cluster analysis [24], the approach presented in this article is different in that it classifies the events using two techniques adapted from soft computing, namely neural networks and fuzzy logic [22,23]. Details and the theoretical basis of the aforementioned clustering-based prioritization approaches are given in the authors' previous works [21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…The principle underlying the RSC is to first employ the SC algorithm to generate the test set satisfying the Prime Path Coverage (denoted as P ). Then, from P , the test cases that cover the maximal number of priority edges that must be present in the test cases are utilized to build test set T 18 if e / ∈ any t ∈ T then 19 T is invalid 20 end 21 end incrementally.…”
Section: ) Rsc Algorithmmentioning
confidence: 99%
“…Regarding the work by Dwarakanath and Jankiti [15], they focus on prime-path coverage, which is out of the scope of the paper. The approach by Gke et al [17] (also presented in Belli et al [18]) is aimed at minimization of the test set for complete coverage, which is also out of the scope of the paper. Moreover, prioritization by individual parts of the SUT as discussed in this paper is not the subject of the study.…”
Section: Experimental Evaluationmentioning
confidence: 99%
“…In addition, alternative strategies and algorithms for prioritizing the path-based test cases have been studied and developed. For instance, approaches based on neural network clustering [17], fuzzy clustering [18] and the firefly optimization algorithm [19] have been implemented. In contrast to algorithms based on an SUT model and a set of test requirements only, in these techniques, information about the SUT internal structure is also used as an input to the prioritization.…”
Section: Related Workmentioning
confidence: 99%