• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiang Shujuan, Han Han, Shi Jiaojiao, Zhang Yanmei, Ju Xiaolin, Qian Junyan. Detecting Infeasible Paths Based on Branch Correlations Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 1072-1085. DOI: 10.7544/issn1000-1239.2016.20148031
Citation: Jiang Shujuan, Han Han, Shi Jiaojiao, Zhang Yanmei, Ju Xiaolin, Qian Junyan. Detecting Infeasible Paths Based on Branch Correlations Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 1072-1085. DOI: 10.7544/issn1000-1239.2016.20148031

Detecting Infeasible Paths Based on Branch Correlations Analysis

More Information
  • Published Date: April 30, 2016
  • The existence of infeasible paths causes a waste of test resources in software testing. Detecting these infeasible paths effectively can save test resources and improve test efficiency. Since the correlation of different conditional statements is the main reason of causing infeasible paths of a program and it costs effort for attempting to cover these paths which are never executed during software testing, the determination of branch correlations plays an important role in detecting infeasible paths. The paper proposes a new approach for detecting the infeasible paths based on association analysis and data flow analysis. Firstly, it builds the data-sets that reflect the static dependencies and the dynamic execution information of conditional statements by combining static analysis with dynamic analysis; then, with two types of branch correlations (called A-B correlation and B-B correlation) defined, it determines the branch correlations respectively with two introduced algorithms which are based on association analysis and data flow analysis; finally, it detects the infeasible paths in accordance with the obtained and refined branch correlations. The paper applies the proposed approach to some benchmarks programs and industry programs to validate its efficiency and effectiveness. The experimental results indicate that our approach can detect infeasible paths accurately and improve the efficiency of software testing.
  • Related Articles

    [1]Zhang Shaobo, Wang Guojun, Liu Qin, Liu Jianxun. Trajectory Privacy Protection Method Based on Multi-Anonymizer[J]. Journal of Computer Research and Development, 2019, 56(3): 576-584. DOI: 10.7544/issn1000-1239.2019.20180033
    [2]Zhu Weijun, You Qingguang, Yang Weidong, Zhou Qinglei. Trajectory Privacy Preserving Based on Statistical Differential Privacy[J]. Journal of Computer Research and Development, 2017, 54(12): 2825-2832. DOI: 10.7544/issn1000-1239.2017.20160647
    [3]Xia Zhuoqun, Hu Zhenzhen, Luo Junpeng, Chen Yueyue. Adaptive Trajectory Prediction for Moving Objects in Uncertain Environment[J]. Journal of Computer Research and Development, 2017, 54(11): 2434-2444. DOI: 10.7544/issn1000-1239.2017.20170309
    [4]Li Yang, Wang Zhe, Zhang Chuwen, Dai Huichen, Xu Wenquan, Ji Xuefeng, Wan Ying, Liu Bin. Trajectory Prediction Algorithm in VANET Routing[J]. Journal of Computer Research and Development, 2017, 54(11): 2421-2433. DOI: 10.7544/issn1000-1239.2017.20170359
    [5]Zhang Fengjun, Zhao Ling, An Guocheng, Wang Hongan, Dai Guozhong. Mean Shift Tracking Algorithm with Scale Adaptation[J]. Journal of Computer Research and Development, 2014, 51(1): 215-224.
    [6]Li Shanqing, Tang Liang, Liu Keyan, Wang Lei. A Fast and Adaptive Object Tracking Method[J]. Journal of Computer Research and Development, 2012, 49(2): 383-391.
    [7]Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
    [8]An Guocheng, Zhang Fengjun, Wang Hongan, and Dai Guozhong. Multi-Window Target Tracking[J]. Journal of Computer Research and Development, 2011, 48(11): 2023-2030.
    [9]Guo Kangde, Zhang Mingmin, Sun Chao, Li Yang, Tang Xing. 3D Fingertip Tracking Algorithm Based on Computer Vision[J]. Journal of Computer Research and Development, 2010, 47(6): 1013-1019.
    [10]Li Guohui and Zhong Xiya. Indexing Moving Objects Trajectories on Fixed Networks[J]. Journal of Computer Research and Development, 2006, 43(5): 828-833.

Catalog

    Article views (1327) PDF downloads (662) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return