Proceedings 7th International Conference on Computer Communications and Networks (Cat. No.98EX226)
DOI: 10.1109/icccn.1998.998798
|View full text |Cite
|
Sign up to set email alerts
|

On the fly test generation for real time protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…This also disables a reasonable prediction of test suite coverage. Meanwhile, an explicit test suite selection strategy can be performed when using test purposes to characterize the expected tests [8,6,7] and, above all, "to guide" the test selection process, "off line", before test execution. This is a different and now classical basis for test selection against combinatory explosion.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This also disables a reasonable prediction of test suite coverage. Meanwhile, an explicit test suite selection strategy can be performed when using test purposes to characterize the expected tests [8,6,7] and, above all, "to guide" the test selection process, "off line", before test execution. This is a different and now classical basis for test selection against combinatory explosion.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, the "on the fly traversal" consists of searching the test pattern from the system model, while avoiding the whole exploration of the model. For timed systems, the principles of on the fly test selection from test purposes were presented a few years ago [6,15]. The new features and improvements here are the combination of on-the-fly traversal and modern symbolic abstractions together with enhanced real-time observers, for improving the efficiency of test case selection.…”
Section: Introductionmentioning
confidence: 99%
“…We consider the access control-based vulnerabilities expressed in OWASP (2003) Castanet et al (1998).…”
Section: Web Services Security Overviewmentioning
confidence: 99%
“…Castanet et al presents in [10] an approach where timed test traces can be generated from timed automata specifications. Test selection must be done manually through engineerer specified test purposes (one for each test) themselves given as deterministic acyclic timed automata.…”
Section: Related Workmentioning
confidence: 99%