• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Liang, Wang Jianmin, Sun Jiaguang. A Study of Software Test Criterion Effectiveness Measure[J]. Journal of Computer Research and Development, 2006, 43(8): 1457-1463.
Citation: Zhao Liang, Wang Jianmin, Sun Jiaguang. A Study of Software Test Criterion Effectiveness Measure[J]. Journal of Computer Research and Development, 2006, 43(8): 1457-1463.

A Study of Software Test Criterion Effectiveness Measure

More Information
  • Published Date: August 14, 2006
  • How to measure the effectiveness of test criterion is an important problem for software quality assurance. Till now, no consistent measures have been achieved. In this paper, potential failure distance (pfd) is proposed as an indication of the effectiveness of test criterion. It regards the effectiveness of test criterion on particular software as the function of specification, program, fault type and criterion. It proceeds measure from the point of interaction between software and test criterion. Compared with other related work, it reflects the achieved confidence on the correctness or reliability about the software after testing. The measure provides a feasible comparison of the effectiveness of test criteria on software. The measure can help to design more testable software.
  • Related Articles

    [1]Liu Yongzhi, Qin Guiyun, Liu Pengtao, Hu Chengyu, Guo Shanqing. Provably Secure Public Key Authenticated Encryption with Keyword Search Based on SGX[J]. Journal of Computer Research and Development, 2023, 60(12): 2709-2724. DOI: 10.7544/issn1000-1239.202220478
    [2]Yang Ningbin, Zhou Quan, Xu Shumei. Public-Key Authenticated Encryption with Keyword Search Without Pairings[J]. Journal of Computer Research and Development, 2020, 57(10): 2125-2135. DOI: 10.7544/issn1000-1239.2020.20200318
    [3]Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902
    [4]Chen Zhigang, Song Xinxia, Zhao Xiufeng. A Multi-Bit Fully Homomorphic Encryption with Better Key Size from LWE[J]. Journal of Computer Research and Development, 2016, 53(10): 2216-2223. DOI: 10.7544/issn1000-1239.2016.20160431
    [5]Zhong Ting, Han Xiao, Zhao Yulong. Provable Data Possession by Partial Delegation[J]. Journal of Computer Research and Development, 2015, 52(10): 2422-2430. DOI: 10.7544/issn1000-1239.2015.20150515
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Fu Wei, Wu Xiaoping, Ye Qing, Xiao Nong, Lu Xicheng. A Multiple Replica Possession Proving Scheme Based on Public Key Partition[J]. Journal of Computer Research and Development, 2015, 52(7): 1672-1681. DOI: 10.7544/issn1000-1239.2015.20140353
    [8]Yang Chao, Zhang Junwei, Dong Xuewen, Ma Jianfeng. Proving Method of Ownership of Encrypted Files in Cloud De-Duplication Deletion[J]. Journal of Computer Research and Development, 2015, 52(1): 248-258. DOI: 10.7544/issn1000-1239.2015.20130544
    [9]Ren Yongjun, Wang Jiandong, Xu Dazhuan, Zhuang Yi, Wang Jian. Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System[J]. Journal of Computer Research and Development, 2012, 49(2): 304-311.
    [10]Xu Peng, Cui Guohua, and Lei Fengyu. An Efficient and Provably Secure IBE Scheme Without Bilinear Map[J]. Journal of Computer Research and Development, 2008, 45(10): 1687-1695.

Catalog

    Article views (834) PDF downloads (1322) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return