• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Junyi, Li Renfa, Sun Jiaguang. An Automated Test Data Generation Algorithm Based on Selective Redundancy[J]. Journal of Computer Research and Development, 2009, 46(8): 1371-1377.
Citation: Li Junyi, Li Renfa, Sun Jiaguang. An Automated Test Data Generation Algorithm Based on Selective Redundancy[J]. Journal of Computer Research and Development, 2009, 46(8): 1371-1377.

An Automated Test Data Generation Algorithm Based on Selective Redundancy

More Information
  • Published Date: August 14, 2009
  • Automated test data generation has become a hot point in the research of software tests, and lots of useful models and methods have been proposed by researchers, but the performances of these existing schemes are not very satisfactory. So, it is very important to study how to design new automated methods with high performances for test data generation. Based on selective redundancy, a new automated test data generation algorithm is proposed, which firstly adopts methods such as linear approximation and minimization of branch functions to find out all feasible paths and automatically generate original test data suite for partly feasible paths and then subjoins test data based on selective redundancy for predicates and sub-path pairs that have not been covered by the original test data suite when test data suite cannot be obtained by using linear approximation and minimization of branch function methods. This new algorithm, combined with predicate slice and DUC expression of functions, can determine whether the sub-path is feasible from the source point. It can also effectively decrease the adverse influence of infeasible path on the algorithm performance. Algorithm analysis and experiment results show that the new algorithm can reduce the size of test data suite effectively and improve the test performance.
  • Related Articles

    [1]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [2]Geng Pu, Zhu Yuefei. A Code Encrypt Technique Based on Branch Condition Obfuscation[J]. Journal of Computer Research and Development, 2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
    [3]Wang Rongquan, Ouyang Dantong, Wang Yiyuan, Liu Siguang, Zhang Liming. Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization[J]. Journal of Computer Research and Development, 2018, 55(6): 1273-1281. DOI: 10.7544/issn1000-1239.2018.20160809
    [4]Jiang Shujuan, Han Han, Shi Jiaojiao, Zhang Yanmei, Ju Xiaolin, Qian Junyan. Detecting Infeasible Paths Based on Branch Correlations Analysis[J]. Journal of Computer Research and Development, 2016, 53(5): 1072-1085. DOI: 10.7544/issn1000-1239.2016.20148031
    [5]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [6]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [7]Mao Chengying, Yu Xinxin, Xue Yunzhi. Algorithm Design and Empirical Analysis for Particle Swarm Optimization-Based Test Data Generation[J]. Journal of Computer Research and Development, 2014, 51(4): 824-837.
    [8]Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang. Study of Ahead Branch Prediction Architecture and Algorithm[J]. Journal of Computer Research and Development, 2013, 50(10): 2228-2238.
    [9]Zhou Lian, Wang Guojin. Piecewise Linear Approximation of Rational Triangular Surfaces[J]. Journal of Computer Research and Development, 2012, 49(5): 1116-1122.
    [10]Zhao Chuanshen, Sun Zhihui, and Zhang Jing. Frequent Subtree Mining Based on Projected Branch[J]. Journal of Computer Research and Development, 2006, 43(3): 456-462.

Catalog

    Article views (634) PDF downloads (487) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return