• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Sun Chang’ai, Wang Zhen, Pan Lin. Optimized Mutation Testing Techniques for WS-BPEL Programs[J]. Journal of Computer Research and Development, 2019, 56(4): 895-905. DOI: 10.7544/issn1000-1239.2019.20180037
Citation: Sun Chang’ai, Wang Zhen, Pan Lin. Optimized Mutation Testing Techniques for WS-BPEL Programs[J]. Journal of Computer Research and Development, 2019, 56(4): 895-905. DOI: 10.7544/issn1000-1239.2019.20180037

Optimized Mutation Testing Techniques for WS-BPEL Programs

More Information
  • Published Date: March 31, 2019
  • Business process execution language for Web service (WS-BPEL) is an executable XML-based and process-oriented service composition language. Due to unique features of Web services, such as dynamics, loose coupling, and open deployment and execution environment, it is an important issue how to assure the quality of WS-BPEL programs. Although mutation testing has a strong fault detection capability, it fails to be widely practiced due to the large number of mutants, the long execution period, and the high computation cost. In order to improve the practicability of mutation testing, we investigate how to decrease the cost of mutation testing for WS-BPEL programs, and propose two kinds of optimization techniques from the perspectives of second-order mutation and prioritization of operators. We also develop an integrated tool named μBPEL to support the mutant generation, optimization, and execution of the proposed optimization techniques. Finally, an empirical study has been conducted where six representative WS-BPEL programs are used to validate and evaluate the effectiveness of the proposed optimized mutation testing techniques. Experimental results show that the proposed optimization techniques for WS-BPEL programs are able to reduce the number of mutants without significantly jeopardizing their fault detection effectiveness and thus improve the efficiency of mutation testing.
  • Related Articles

    [1]Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066
    [2]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [3]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [4]Xue Kaiping, Zhu Bin, Hong Peilin, and Lu Hancheng. An Energy Efficient Scheduling Mechanism for Real-time Services in 802.16e[J]. Journal of Computer Research and Development, 2011, 48(9): 1608-1615.
    [5]Fu Xiong, Wang Ruchuan, and Deng Song. An EnergyEfficient Data Storage Method in Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2111-2116.
    [6]Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui. A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy[J]. Journal of Computer Research and Development, 2009, 46(3): 498-504.
    [7]Wang Dashan, Huang Liusheng, Xu Hongli, Wu Junmin, Zhang Junxia. Wireless Sensor Network Energy-Efficient Placement Algorithm Based on Vector[J]. Journal of Computer Research and Development, 2008, 45(4): 626-635.
    [8]Sun Dayang, Liu Yanheng, Wang Aimin. An Aggregation Tree Constructing Algorithm Based on Energy Consumption Assessment[J]. Journal of Computer Research and Development, 2008, 45(1): 104-109.
    [9]Liu Xin, Wang Quanyu, and Jin Xuliang. An Energy-Aware Data Gathering and Routing Protocol for WSN[J]. Journal of Computer Research and Development, 2008, 45(1): 83-89.
    [10]Luo Yuhong, Chen Songqiao, and Wang Jianxin. An Algorithm Based on Mobility Prediction and Probability for Energy-Efficient Multicasting in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(2): 231-237.

Catalog

    Article views (1103) PDF downloads (332) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return