Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Christopher Henard"'
Autor:
Mike Papadakis, Thomas Laurent, Anthony Ventresque, Christopher Henard, Yves Le Traon, Marinos Kintis
Publikováno v:
ICST
Mutation testing is extensively used in software testing studies. However, popular mutation testing tools use a restrictive set of mutants which does not conform to the community standards and mutation testing literature. This can be problematic sinc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6e08d933b36cbc9e9ac72a0c2223424b
http://orbilu.uni.lu/handle/10993/29779
http://orbilu.uni.lu/handle/10993/29779
Publikováno v:
ISSTA
Mutation testing introduces artificial defects to measure the adequacy of testing. In case candidate tests can distinguish the behaviour of mutants from that of the original program, they are considered of good quality -- otherwise developers need to
Publikováno v:
38th International Conference on Software Engineering (ICSE'16). (2016).
ICSE
ICSE
Although white-box regression test prioritization has been well-studied, the more recently introduced black-box prioritization approaches have neither been compared against each other nor against more well-established white-box techniques. We present
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c2fb07201f766ca2538dc9fd6dbab255
http://orbilu.uni.lu/handle/10993/25175
http://orbilu.uni.lu/handle/10993/25175
Publikováno v:
International Symposium on Software Testing and Analysis, ISSTA 2016. (2016).
ISSTA
ISSTA
Much research on software testing and test techniques relies on experimental studies based on mutation testing. In this paper we reveal that such studies are vulnerable to a potential threat to validity, leading to possible Type I errors; incorrectly
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4c3d026752a0df586ddf26c997009dda
http://orbilu.uni.lu/handle/10993/28927
http://orbilu.uni.lu/handle/10993/28927
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines
Publikováno v:
37th International Conference on Software Engineering (ICSE 2015). (2015).
Publikováno v:
Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops (pp. 1-4). IEEE (2015).
ICST Workshops
ICST Workshops
Combinatorial Interaction Testing (CIT) requires the use of models that represent the interactions between the features of the system under test. In most cases, CIT models involve Boolean or integer options and constraints among them. Thus, applying
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bf87cd8ca866dd473440d99a5c60c1bb
http://orbilu.uni.lu/handle/10993/24172
http://orbilu.uni.lu/handle/10993/24172
Autor:
Yves Le Traon, Francesca Lonetti, Said Daoudagh, Eda Marchetti, Mike Papadakis, Christopher Henard, Antonia Bertolino, Tejeddine Mouelhi, Donia El Kateb
Publikováno v:
Information and software technology 58 (2015): 355–372. doi:10.1016/j.infsof.2014.07.003
info:cnr-pdr/source/autori:Bertolino A.; Daoudagh S.; El Kateb D.; Henard C.; Le Traon Y.; Lonetti F.; Marchetti E.; Mouelhi T.; Papadakis M./titolo:Similarity testing for access control/doi:10.1016%2Fj.infsof.2014.07.003/rivista:Information and software technology/anno:2015/pagina_da:355/pagina_a:372/intervallo_pagine:355–372/volume:58
info:cnr-pdr/source/autori:Bertolino A.; Daoudagh S.; El Kateb D.; Henard C.; Le Traon Y.; Lonetti F.; Marchetti E.; Mouelhi T.; Papadakis M./titolo:Similarity testing for access control/doi:10.1016%2Fj.infsof.2014.07.003/rivista:Information and software technology/anno:2015/pagina_da:355/pagina_a:372/intervallo_pagine:355–372/volume:58
Context: Access control is among the most important security mechanisms, and XACML is the de facto standard for specifying, storing and deploying access control policies. Since it is critical that enforced policies are correct, policy testing must be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c8eb615fb0bd525a7af13a87ed340c44
Publikováno v:
29th Symposium On Applied Computing, SAC 2014
29th Symposium On Applied Computing, SAC 2014, Mar 2014, Gyeongju, South Korea. pp.1064--1071, ⟨10.1145/2554850.2554874⟩
SAC
29th Symposium on Applied Computing (SAC 2014). (2014).
29th Symposium On Applied Computing, SAC 2014, Mar 2014, Gyeongju, South Korea. pp.1064--1071, ⟨10.1145/2554850.2554874⟩
SAC
29th Symposium on Applied Computing (SAC 2014). (2014).
International audience; Common industrial practices lead to the development of similar software products. These products are usually managed in an ad-hoc way which gradually results in a low product quality. To overcome this problem, it is essential
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a3544ecfd9d009b452dc87dfb1839a7
https://hal.science/hal-01217489
https://hal.science/hal-01217489
Publikováno v:
ICST
7th International Conference on Software Testing, Verification and Validation (ICST 2014). (2014).
7th International Conference on Software Testing, Verification and Validation (ICST 2014). (2014).
Modern systems tend to be highly configurable. Testing such systems requires selecting test cases from a large input space. Thus, there is a need to systematically sample program inputs in order to reduce the testing effort. In such cases, testing th
Publikováno v:
ICST Workshops
Assessing the quality of a test suite is an important step of the testing process. Indeed, it is necessary to ensure that the different test cases target all the critical parts of the system. Model-based testing is a famous technique to perform testi