Username   Password       Forgot your password?  Forgot your username? 


Software Reliability Test Case Generation using Temporal Motifs Recovery and Configuration

Volume 14, Number 6, June 2018, pp. 1181-1189
DOI: 10.23940/ijpe.18.06.p9.11811189

Xuetao Tian, Feng Liu, and Honghui Li

aSchool of Computer and Information Technology, Beijing Jiaotong University, Beijing, 100044, China
bEngineering Research Center of Network Management Technology for High Speed Railway of MOE, Beijing, 100044, China

(Submitted on February 27, 2018; Revised on April 1, 2018; Accepted on May 21, 2018)


In software updating process, software reliability test plays an important role. Test cases are the key to software test. To match real usage habit, log analysis becomes a hot way to generate reliability test cases. However, using log analysis can’t cover new operations arising from software updating. In this paper, a reliability test cases generation method for updating software using temporal motifs recovery and configuration is presented in this paper. We tentatively introduce temporal network idea to abstract software usage log. Test cases adapting to software updating are generated using temporal motifs recovery and configuration. As a case study, the method is applied to an online application. The coverage frequency comparison experiment is designed. The proposed method can obtain similar results as log and Markov model. Thereby, the usability of the method is validated.


References: 14

        1. American National Standards Institute IEEE Standards Board, “IEEE Standard Dictionary of Measures to Produce Reliable Software” IEEE Std 982.1-1988
        2. Mette Arleth, “Using Log-File Analysis for Testing Cartographic WebBased Applications” in 4 of the International Cartographic Conference, Scientific and Technical Program Committee, 2008
        3. M. Cavers and K. Vasudevan, “Spatio-temporal complex markov chain (scmc) model using directed graphs: earthquake sequencing,” Pure & Applied Geophysics, vol. 172, no. 2, pp. 225-241, 2015
        4. GB/T 11457-95. The national standard of the People’s Republic of China - software engineering terms
        5. P. Holme and J. Saramäki, Temporal Networks. Physics Reports, vol. 519, no. 3, pp. 97-125, 2016
        6. H. Li, A. Zhao, D. Zhang and J. Zhang, “Research on building software usage model based on UML model,” International Journal of System Assurance Engineering & Management, no. 10, pp. 1-9, 2017
        7. Y. Lin, C. Wang, J. Wang and Z. Dou, “A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks,” Sensors, vol. 16, no. 10, pp. 1-22, 2016 (DOI: 10.3390/s16101675)
        8. Y. Lin, X. Zhu and Z. Zheng, “The individual identification method of wireless device based on dimensionality reduction and machine learning,” Journal of Supercomputing, no. 5, pp. 1-18, 2017 (DOI: 10.1007/s11227-017-2216-2)
        9. HD. Mills, M. Dyer and RC. Linger, “Cleanroom software engineering,” IEEE Software, vol. 4, no. 4, pp. 19-25, 1987
        10. R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii and U. Alon, “Network motifs: simple building blocks of complex networks,” Science, vol. 298, no. 5594, pp. 824-827, 2002lo
        11. J. Musa, “Operational profiles in software-reliability engineering,” IEEE Software, vol. 10, no. 2, pp. 14-32, 1993
        12. A. Paranjape, A. R. Benson and J. Leskovec, “Motifs in temporal networks,” pp. 601-610, 2016
        13. X. Tian, H. Li, and F. Liu, “Web Service Reliability Test Method Based on Log Analysis” in IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 195-199, Prague, Czech Republic, July 2017
        14. S. Zhang and J. Huang, “Reliability Test Cases Generation of Web Application Based On Log Analysis” in International Conference on Computer Engineering, Information Science & Application Technology, 2016


              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

              This site uses encryption for transmitting your passwords.