메뉴 건너뛰기




Volumn , Issue , 2013, Pages 488-493

Research on metamorphic testing: A case study in integer bugs detection

Author keywords

Integer Bugs; Metamorphic Relationship; Metamorphic testing; Test Oracle

Indexed keywords

APPLICATIONS; ERRORS; INTELLIGENT SYSTEMS; RESEARCH; SYSTEMS ANALYSIS;

EID: 84904506406     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISDEA.2013.516     Document Type: Conference Paper
Times cited : (4)

References (10)
  • 3
    • 0002908054 scopus 로고    scopus 로고
    • TACCLE: A methodology for objectoriented software testing at the class and cluster levels
    • Chen, H.Y., Tse, T.H. 2001, TACCLE: a methodology for objectoriented software testing at the class and cluster levels, ACM Transactions on Software Engineering and Methodology, Vol. 10, pp.56-109.
    • (2001) ACM Transactions on Software Engineering and Methodology , vol.10 , pp. 56-109
    • Chen, H.Y.1    Tse, T.H.2
  • 4
    • 63149180343 scopus 로고    scopus 로고
    • An innovative approach for testing bioinformatics programs using metamorphic testing
    • Chen, T.Y., Ho. J. W.K., Liu H., and Xie, X. 2009, An innovative approach for testing bioinformatics programs using metamorphic testing. BMC Bioinformatics. Vol. 10, pp.24-35.
    • (2009) BMC Bioinformatics , vol.10 , pp. 24-35
    • Chen, T.Y.1    Ho, J.W.K.2    Liu, H.3    Xie, X.4
  • 7
    • 84862940496 scopus 로고    scopus 로고
    • Testing embedded software by metamorphic testing: A wireless metering system case study
    • Bonn
    • Kuo, F.C., Chen, T.Y., Tam,.W.K. 2011, Testing embedded software by metamorphic testing: A wireless metering system case study. 2011 IEEE 36th Conference on Local Computer Networks. Bonn, pp.291-294.
    • (2011) 2011 IEEE 36th Conference on Local Computer Networks , pp. 291-294
    • Kuo, F.C.1    Chen, T.Y.2    Tam, W.K.3
  • 9
    • 0020204093 scopus 로고
    • On testing non-testable programs
    • Weyuker, E. J. 1982, On testing non-testable programs. Computer Journal, Vol. 25, pp.465-470.
    • (1982) Computer Journal , vol.25 , pp. 465-470
    • Weyuker, E.J.1
  • 10
    • 84904478760 scopus 로고    scopus 로고
    • Applying practical formal methods to the specification and analysis of security properties
    • St. Petersburg
    • St. Petersburg. 2001, Applying Practical Formal Methods to the Specification and Analysis of Security Properties. Information Assurance in Computer Networks, LCNS 2052, pp.907-918.
    • (2001) Information Assurance in Computer Networks, LCNS , vol.2052 , pp. 907-918


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.