
The Library
Masking boundary value coverage : effectiveness and efficiency
Tools
Pasupuleti, Vijay S., Muske, Tukaram, Bokil, Prasad, Shrotri, Ulka and Venkatesh, R. (2010) Masking boundary value coverage : effectiveness and efficiency. In: Bottaci , Leonardo and Fraser , Gordon , (eds.) Testing – Practice and Research Techniques : 5th International Academic and Industrial Conference, TAIC PART 2010, Windsor, UK, September 3-5, 2010. Proceedings. Lecture Notes in Computer Science, 6303 . Berlin Heidelberg: Springer , pp. 8-22. ISBN 9783642155840
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1007/978-3-642-15585-7_4
Abstract
Boundary value testing in the white-box setting tests relational expressions with boundary values. These relational expressions are often a part of larger conditional expressions or decisions. It is therefore important, for effective testing that the outcome of a relational expression independently influences the outcome of the expression or decision in which it is embedded. Extending MC/DC to boundary value testing was proposed in the literature as a technique to achieve this independence. Based on this idea, in this paper we formally define a new coverage criterion - masking boundary value coverage (MBVC). MBVC is an adaptation of masking of conditions to boundary value testing. Mutation based analysis is used to show that test data satisfying MBVC is more effective in detecting relational mutants than test data satisfying BVC.
In this paper, we give a formal argument justifying why test data for MBVC is more effective compared to that for BVC in detecting relational mutants. We performed an experiment to evaluate effectiveness and efficiency of MBVC test data relative to that for BVC, in detecting relational mutants. Firstly, mutation adequacy of the test set for MBVC was higher than that for BVC in 56% of cases, and never lower. Secondly, the test data for MBVC killed 80.7% of the total number of mutants generated, whereas the test data for BVC killed only 70.3% of them. A further refined analysis revealed that some mutants are such that they cannot be killed. We selected a small set of mutants randomly to get an estimate of percentage of such mutants. Then the extrapolated mutation adequacies were 92.75% and 80.8% respectively. We summarize the effect of masking on efficiency. Details of the experiment, tools developed for automation and analysis of the results are also provided in this paper.
Item Type: | Book Item | ||||
---|---|---|---|---|---|
Subjects: | Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software | ||||
Divisions: | Faculty of Science, Engineering and Medicine > Engineering > WMG (Formerly the Warwick Manufacturing Group) | ||||
Library of Congress Subject Headings (LCSH): | Computer software -- Testing, Academic-industrial collaboration, Software engineering | ||||
Series Name: | Lecture Notes in Computer Science | ||||
Journal or Publication Title: | Practice and Research Techniques | ||||
Publisher: | Springer | ||||
Place of Publication: | Berlin Heidelberg | ||||
ISBN: | 9783642155840 | ||||
ISSN: | 978-3-642 | ||||
Book Title: | Testing – Practice and Research Techniques : 5th International Academic and Industrial Conference, TAIC PART 2010, Windsor, UK, September 3-5, 2010. Proceedings | ||||
Editor: | Bottaci , Leonardo and Fraser , Gordon | ||||
Official Date: | 2010 | ||||
Dates: |
|
||||
Volume: | 6303 | ||||
Page Range: | pp. 8-22 | ||||
DOI: | 10.1007/978-3-642-15585-7_4 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |