請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/25441完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 王凡 | |
| dc.contributor.author | Che-Jung Wu | en |
| dc.contributor.author | 吳哲榮 | zh_TW |
| dc.date.accessioned | 2021-06-08T06:13:33Z | - |
| dc.date.copyright | 2011-08-10 | |
| dc.date.issued | 2011 | |
| dc.date.submitted | 2011-08-04 | |
| dc.identifier.citation | [1] S. Schach, Software engineering, 7th edition, McGraw Hill, 1992.
[2] Mary J. Harrold, “Architecture-based regression testing of evolving systems,” in InProc. Int.Workshop on the Roleof SoftwareArchitectureinTesting and Analysis (ROSATEA), July 1998, pp. 73–77. [3] B. Beizer, SoftwareTestingTechniques, 2nd ed.,Van Nostrand Reinhold,NewYork, 1990. [4] M. Last, A. Kandel, and H. Bunke, Artificial intelligence methods in software testi ng,vol. Machine Perception Artificial Intelligence 56,World Scientific Pub., 2004. [5] F.Redmill, “Whysystems go up in smoke,” The Computer Bulletin, vol. 41, no. 5, pp. 26–28, September 1999. [6] C. Kaner,J.Falk,andH.Q. Nguyen, Testing Computer Software, 2nd Edition, John Wiley, 1999. [7] D.Sisson, “Types of tests,” http://www.philosophe.com/testing/tests.html. [8]K.Onoma,W.-T.Tsai,M. Poonawala,andH.Suganuma,“Regression testinginan industrial environment,” Comm.ACM, vol. 41, no. 5, May 1988. [9] Mary Jean Harrold, “Testing: A roadmap,” in In The Future of Software Engin eering, 22nd International Conference on Software Engineering. 2000, pp. 61–72, ACM Press. [10] ElaineJ.Weyuker, “Theevaluationof program-based software test data adequacy criteria,” Comm.ACM, vol. 31, pp. pp.668–675, 1988. [11] Elaine J.Weyuker, “In defense of coverage criteria.,” in Proceedings of the 11th ACM/IEEE International Conf. on Software Engineering(ICSE), May, 1989. [12] E. Allen Emerson and Edmund M. Clarke, “Characterizing correctness properties of parallel programs as fixpoints,” in 7th Colloquium onAutomata, Language, and Programming. 1981, vol. LNCS 85, Springer-Verlag. [13] E. Allen Emerson and Edmund M. Clarke, “Using branching time temporal logic to synthesize synchronization skeletons,” Science of Computer Programming, vol. 2, pp. 241–266, Dec. 1982. [14] Elaine J.Weyuker, “How to judge testing progress,” Journal of Information and SoftwareTechnology, vol. 45, no. 5, 2004. [15] Gordon Fraser,FranzWotawa,andPaulE. Ammann,“Testingwith model checkers: a survey,” SoftwareTesting,Verification and Reliability, vol. 19, no. 3, pp. 215– V261, 2009. [16] Nils Nilsson, Artificial Intelligence:ANew Synthesis, Morgan Kaufmann Publishers, 1998. [17]T.B‥ack and H-P Schwefel, “Anoverviewofevolutionary algorithms for parameter optimization,” Evolutionary computation, vol. 1, no. 1, pp. p.1–24, 1993. [18] DavidB.Fogel, Evolutionary Computation, IEEE Press, 1995. [19]FarnWang, “Efficientverificationof timed automata with bdd-like data-structures,” STTT (SoftwareTools forTechnologyTransfer), vol. 6, no. 1, 2004, special issue for the 4th VMCAI, Jan. 2003, LNCS 2575, Springer-Verlag. [20]FarnWang, “Symbolic simulation checkingof dense-time automata,” in 5th FORMATS (International Conference onFormal Modelling and Analysis ofTimed Systems). October 2007, vol. LNCS 4763, Springer-Verlag. [21] M. Bozga, Suzanne Graf, Ileana Ober, Iulian Ober, and Joseph Sifakis, “The if toolset,” in Formal Methods fo the Design of Real-Time Systems. 2004, vol. LNCS 3185, Springer-Verlag. [22] Loic Correnson,Pascal Cuoq, Armand Puccetti, and Julien Signoles, “Frama-c user manual,” . [23] Cristian Cadar, Daniel Dunbar, and Dawson Engler, “Klee: Unassisted and automatic generation of high-coverage tests for complexsystems programs,” in USENIX Symposium on Operating Systems Design and Implementation (OSDI), December 2008. [24] J. A. Jones and M. J. Harrold, “Test-suite reduction and prioritization for modified condition/decision coverage,” in In Proceedings of the International Conference on Software Maintenance, October 2001, pp. 92–101. [25] H. Srikanth, “Requirements-based test case prioritization,” in Student Research Forumin 12thACM SIGSOFT International SymposiumontheFoundationsof Software Engineering, 2004. [26] A. Srivastava and J. Thiagarajan, “Effectively prioritizing tests in development environment,” in In Proceedings of the International Symposium on SoftwareTesting and Analysis (ISSTA), 2002, pp. 97–106. [27] T. Xie and D. Notkin, “Checking inside the black box: Regression testing based on value spectra differences,” in 20th IEEE International Conference on Software Maintenance (ICSM’04), 2004. [28] Ferenc Belina and Dieter Hogrefe, “The ccitt-specification and description language sdl,” Computer Networks and ISDN Systems, vol. 16, no. 4, pp. 311–341, March 1989. [29] Matthew Hennessy, Semantics of Programming Languages, Wiley, 1990. [30] J.R. Burch, Edmund M. Clarke,Kenneth Lawrence McMillan, David L. Dill, and L.J. Hwang, “Symbolic model checking: 1020 states and beyond,” in IEEE LICS, 1990. [31] David Gries, The Science of Programming, Springer-Verlag, 1981. [32] Glenford J. Myers, The Artof SoftwareTesting, 2nd edition, Wiley, 2004. [33] G. Rothermel, R.H. Untch, C. Chu, and M. J. Harrold, “Prioritizing test cases for regression testing,” IEEETrans. on Software Eng., vol. 27, no. 10, pp. 929–948, October 2001. [34] D. Lewis, “Naive (bayes) at forty: The independence assumption in information retrieval,” in 10th European conference on machine learning, 1998. [35] David D. Lewis, Robert E. Shapire, JamesP. Callan, and Ron Rapka, “Training algorithm for linear text classifiers,” in 19th Annual InternationalACM SIGIR Conference on Researchand Development in Information Retrival. 1996, pp. 298–306, ACM. [36] J. Ross Quinlan, C4.5: Programs for machine learning, Morgan Kaufmann, 1993. [37] J.J. Jr. Rocchio, The SMART retrieval system: Experiments in automatic document processing, Prentice-Hall, 1971. [38] V.Vapnic, The nature of statistical learning theory, Springer-Verlag, 1995. [39] B.Widrow and S.D. Stearns, Adaptive Signal Processing, Prentice-Hall, 1985. [40]Y.Yang, “Expertnetwork:effectiveandefficientlearningfromhuman decisionsin text categorization and retrieval,” in ACM SIGIR, 1994. [41] D. Maier, “The complexity of some problems on subsequences and supersequences,” Journal ofACM, vol. 25, no. 2, pp. 322–336, 1978. [42] T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein, Introduction to Algorithms, Second Edition, MIT Press and McGraw-Hill, 2001. [43] Isabelle Guyon and Andr` e Elisseeff, “An introduction to variable and feature selection,” Journal of Machine Learning Research, vol. 3, pp. 1157–1182, 2003. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/25441 | - |
| dc.description.abstract | 軟體規模愈趨龐大的現在,軟體測試的工作已變得越來越複雜且龐大;而模型驗證也無法完全滿足軟體自動驗證的需求。目前已有使用小量的人工智慧技術在上述的兩種技術之中,但亦無法滿足軟體驗證中各式各樣的挑戰。
在本篇論文中提出了一個模型測試的架構包含了集成測試與模型驗證和自動推演的演算法兩部分。這個架構以一個有限自動機來代表軟體,以及一組測試用例和使用者可自訂的優先排序準則,使用者可透過修改優先排序準則來實現各種人工智慧。 這個架構的核心是以一個模擬器來模擬程式,並具有在程式的各個步驟依要求前進或後退的功能,我們會展示在此架構中如何透過優先排序準則來達成錯誤回報的回歸化測試。回歸化測試的關鍵在於利用優先排序準則來選定測試用例,而優先排序準則可依據測試用例的相似度與上一次執行的測試用例所走路徑來選擇下一個測試用例,並能依照執行的結果一邊自我調整其準則。我們還會展示使用LCS(Longest Common Sequence)的技術來比對測試用例之間各種細部變數的相似程度。最後的實驗結果也證明了此種技術的成果。 | zh_TW |
| dc.description.provenance | Made available in DSpace on 2021-06-08T06:13:33Z (GMT). No. of bitstreams: 1 ntu-100-R98921074-1.pdf: 1169003 bytes, checksum: 56d7880253848a9cc5d510b51122a374 (MD5) Previous issue date: 2011 | en |
| dc.description.tableofcontents | 誌謝
.......................................... i 中文摘要 ....................................... ii Abstract ........................................ iii 1 Introduction .................................... 1 1.1 Background................................. 1 1.2 Motivation.................................. 2 1.3 Softwaretesting ............................... 3 1.4 Model checking ............................... 3 1.5 Our simulator ................................ 4 1.6 Ourframeworkofsoftwaremodeltesting ................. 5 1.7 RegressionTesting ............................. 6 1.8 ThesisFramework.............................. 7 2 RelatedWork ................................... 9 3 Modeling language,EFSM ............................ 10 4Path generator(PATHG) ............................. 13 5 Modeltestingwitha fitness function ....................... 16 5.1 Componemtoftest case ........................... 16 5.2 Capabilityof backtrack ........................... 17 5.3 Fitness function ............................... 17 5.4 Ourworkflow................................ 18 6 Adaptiveregressionmodeltesting ........................ 21 6.1 Longest common subsequences(LCS) ................... 22 6.2 Designofthe fitness function ........................ 22 6.2.1 Similarity Estimation ........................ 23 6.2.2Testexecutionsharing ....................... 26 6.2.3 FitnessFormulation ........................ 27 6.3 Supervised learningofthe weighting ................... 28 7 Implementationandexperiment ......................... 30 7.1 OurSUT................................... 31 7.2 Performance Analysis ............................ 32 8 Conclusionsand futurework ........................... 37 Reference ....................................... 38 | |
| dc.language.iso | en | |
| dc.subject | 軟體測試 | zh_TW |
| dc.subject | aritificial intelligence | en |
| dc.subject | bug-fix | en |
| dc.subject | test plan | en |
| dc.subject | regression testing | en |
| dc.subject | software testing | en |
| dc.subject | model testing | en |
| dc.title | 使用LCS計數的錯誤更正回歸測試 | zh_TW |
| dc.title | Using LCS techniques for the regression testing of bug-fixes | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 99-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 戴顯權,劉志文,陳郁方,陳銘憲,顏嘉志 | |
| dc.subject.keyword | 軟體測試, | zh_TW |
| dc.subject.keyword | bug-fix,test plan,regression testing,model testing,software testing,aritificial intelligence, | en |
| dc.relation.page | 42 | |
| dc.rights.note | 未授權 | |
| dc.date.accepted | 2011-08-04 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
| 顯示於系所單位: | 電機工程學系 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-100-1.pdf 未授權公開取用 | 1.14 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
