CN101231614A - Method for locating software unsoundness base on execution track block semblance - Google Patents

Method for locating software unsoundness base on execution track block semblance Download PDF

Info

Publication number
CN101231614A
CN101231614A CNA2008100189817A CN200810018981A CN101231614A CN 101231614 A CN101231614 A CN 101231614A CN A2008100189817 A CNA2008100189817 A CN A2008100189817A CN 200810018981 A CN200810018981 A CN 200810018981A CN 101231614 A CN101231614 A CN 101231614A
Authority
CN
China
Prior art keywords
test case
test
similarity
ntp
sus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008100189817A
Other languages
Chinese (zh)
Other versions
CN101231614B (en
Inventor
王新平
顾庆
陈翔
陈道蓄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University
Original Assignee
Nanjing University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University filed Critical Nanjing University
Priority to CN2008100189817A priority Critical patent/CN101231614B/en
Publication of CN101231614A publication Critical patent/CN101231614A/en
Application granted granted Critical
Publication of CN101231614B publication Critical patent/CN101231614B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a software defect locating method which is based on the lump similarity of execution traces, and the method comprises the following steps that: firstly, the executive information of test cases are collected and arranged, and the execution traces are generated; secondly, a test case set which has defects is positioned according to the lump similarity selection of the execution traces; thirdly, the system comparison is carried out to the execution traces of the selected test cases, and the suspecting rate of the operation part is calculated; fourthly, the suspecting rate of the operation part is mapped to the source program to generate a defect locating report. The invention can be widely applied to the automatic test environment of a large-scale software system, and relates to the stage and the work of an integrated test, a system test, an acceptance test, a user problem report analysis, etc.; the existing test data are fully utilized, and the lump similarity of the execution traces is based on to carry out the position to the software defect, thereby effectively reducing the searching range and improving the defect positioning efficiency. The invention can be used in each period and stage of the test, the selected test case set has higher pertinence, the calculation method of the suspecting rate of the operation part is simple and effective, and the expansibility is better.

Description

A kind of based on the software defect positioning method of carrying out the track block similarity
Technical field
The present invention relates to the defect location in the software automated testing, particularly exist under the situation of substantive test use-case, effectively utilize that pass through and unsanctioned test case, it is carried out track compare and come defective in the positioning software.
Background technology
Software defect positioning method is widely used in stage such as integration testing, system testing, Acceptance Test and the customer problem report analysis of large software system and the work at present.Test is a requisite link in the software development process, and its final goal is the quality that guarantees software.Along with software becomes increasingly complex, the use of automation software testing more and more widely.Automatic test can produce a large amount of test cases, and can write down the execution information of test case, and therefore existing a large amount of test datas before repair-deficiency can utilize.Traditional adjustment method is just carried out defective to unsanctioned single test case and is followed the tracks of, under the environment of automatic test, be difficult on the one hand so simultaneously a plurality of unsanctioned test cases be followed the tracks of, only consider unsanctioned test case on the other hand and ignored the information that the test case passed through can provide.Software defect positioning method can fully utilize test execution information and come the positioning software defective under the automatic test environment, improve the quality of software.
Can be based on the software defect positioning method of carrying out track by test data being analyzed the defective that exists in the automatic positioning software.This method need be collected and put in order test case and be carried out information, degree under a cloud (suspicion rate) by Accounting Legend Code that the execution track is compared, the developer can examine code under a cloud according to suspicion rate order from big to small, reduce code quantity and the scope that defective must be examined that remove, improve the efficient of searching defective.Existent method is considered separately to pass through and unsanctioned test case usually, fails fine comprehensive; And only compare, be unsuitable for the defect location of large software system at statement level.
Summary of the invention
Fundamental purpose of the present invention is the problem that makes full use of existing test data at traditional software defect positioning method workload greatly and not, propose a kind of based on the software defect positioning method of carrying out the track block similarity, dwindle the hunting zone of defective in developer's positioning software, improve the efficient of defect location.
For realizing purpose of the present invention, the present invention adopts following step:
1) at first to source program plug-in mounting collected metadata, generate the driving file of each test case, specified configuration information hereof, the execution information of test case is collected in implementation of test cases then, and to test case according to by whether dividing into groups;
2) the execution track of test case is assembled, scale and complexity according to software can arrive method layer or class layer by selective aggregation, calculate the similarity between unsanctioned test case and all the other test cases then respectively, select a plurality of test cases the most similar according to similarity with unsanctioned test case, test case is divided into several groups according to similarity like this, according to the test case in every group the implicit defective of this group is positioned respectively;
3) test case of selecting is carried out system's comparison, the suspicion rate of Accounting Legend Code piece;
4) be mapped to source program according to metadata at last and generate the defect location report.
Above-mentioned steps 2) similarity in is with the included angle cosine value representation between two vectors, and whether test case is selected is determined by threshold alpha, for test case t FiIf, use-case t jWith its similarity greater than α, test case t then jSelected and test case t FiOne group.
Above-mentioned steps 2) test case is divided into 3 kinds of situations according to 3 kinds of different grouping types of similarity, wherein:
1,1 unsanctioned test case of situation and the test case of passing through more than 1 and 1;
Situation is unsanctioned test case and 0 test case of passing through more than 2,1;
Situation is unsanctioned test case and the test case passed through more than 1 and 1 more than 3,1.
Suspicion rate calculation process by the test case of situation 1 grouping is: at first at unsanctioned test case t Fi, same t FiThe similar test use cases TpList that passes through Fi, statistics TpList FiIn the coverage condition of test case, then according to code block s whether by t FiCovering checks that it is by TpList FiIn each test case t PkThe ratio that covers.If code block s is by t FiCover.Its suspicion rate is tried to achieve by following formula:
sus ( s ) = NTp 0 ( s ) NTp
Wherein NTp represents TpList FiThe quantity of middle test case, NTp 0(s) expression TpList FiIn do not cover the test case quantity of s;
If code block s is not by t FiCover, its suspicion rate sus (s) is tried to achieve by following formula:
sus ( s ) = NTp 1 ( s ) NTp
NTp wherein 1(s) expression TpList FiThe middle test case quantity that covers s.
Suspicion rate calculation process by the test case of situation 2 grouping is: consider same t FiSimilar unsanctioned test use cases TfList Fi, to code block s statistics TfList FiIn covered the test case number NTf of s 1(s), the suspicion rate sus (s) of code block s is tried to achieve by following formula:
sus ( s ) = NTf 1 ( s ) NTf
Wherein NTf represents TfList FiThe number of middle test case.
Suspicion rate calculation process by the test case of situation 3 grouping is: if code block s is by TfList FiIn each test case all covered, then in the calculating of s rate under a cloud and the situation 1 s by t FiThe calculating that covers is identical.If code block s is not by TfList FiIn any one test case cover, then in the calculating of s rate under a cloud and the situation 1 s not by t FiThe calculating that covers is identical.If s is by TfList FiIn the partial test use-case cover, then calculate the suspicion rate sus of s respectively by following two formula 1(s) and sus 2(s), NTf wherein 0(s) be TfList FiIn do not cover the test case number of s, other variable-definitions are the same, get two the greater in the value then, i.e. sus (s)=Max (sus1 (s), sus2 (s)); Formula is as follows:
sus 1 ( s ) = NTp 0 ( s ) NTp × NTf 1 ( s ) NTf
sus 2 ( s ) = NTp 1 ( s ) NTp × NTf 0 ( s ) NTf
The present invention can make full use of existing test data, based on carrying out the track block similarity software defect is positioned, and can effectively dwindle the hunting zone, improves the efficient of defect location.The present invention can be widely used in the automatic test environment of large software system, relates to stage and work such as integration testing, system testing, Acceptance Test and customer problem report analysis.With traditional method relatively, at given defective (or inefficacy), the this patent method can be found out similar passing through and unsanctioned test use cases fast and accurately, and the execution track of each test case is carried out system's comparison, and may there be the code range of defective in the location automatically.Its advantage comprises: each period and the stage that can be used for testing; Make the set of uses case of selection have higher specific aim by the calculating of piece similarity, effectively dwindle the defective seek scope; Has extendability preferably, by aggregation algorithms being improved and replaced test applicable to dissimilar systems; The suspicion rate computing method are simple, be convenient to implement with lower time and space cost, and validity are better than existing defect positioning method through the example proof.
Be elaborated below in conjunction with accompanying drawing.
Description of drawings
Fig. 1 is based on the structural drawing of the software defect positioning method of carrying out the track block similarity;
Fig. 2 is that test case is carried out the track organization chart;
Fig. 3 is based on the workflow diagram of the software defect positioning method of carrying out the track block similarity;
Fig. 4 is the process flow diagram of test case selection algorithm;
Fig. 5 is the algorithm flow chart of the coverage condition of statistical test use-case;
Fig. 6 is the suspicion rate calculation flow chart of situation 1;
Fig. 7 is the suspicion rate calculation flow chart of situation 2;
Fig. 8 is the suspicion rate calculation flow chart of situation 3;
Fig. 9 is based on the instrument master interface of the software defect positioning method of carrying out the track block similarity.
Embodiment
As shown in Figure 1, software defect location by detecting information compile, test case is selected, suspicion rate calculates and generate the architecture tissue of four modules of defect location report according to pipeline or stream.The detecting information collection module is collected and the arrangement test case carries out information and track is carried out in generation; Test case selects module to select to be used to locate the test use cases of defective according to the execution track block similarity of test case.The suspicion rate computing module is compared to the execution track of selected test case, the suspicion rate of Accounting Legend Code piece.The generation reporting modules is mapped to the report of source program generation defect location according to the suspicion rate of code block.Fig. 2 is that test case is carried out the track organization chart.
General flow chart of the present invention as shown in Figure 3, in the detecting information collection module, the 1.1st step was at first carried out plug-in mounting to source program, collect the source program metadata, promptly about the data of source program structure: comprise which class in the source program, which method is each class comprise, each method which code block is made of etc.The execution that the 1.2nd step generated each test case drives file, represents with XML document, and some of collecting comprising detecting information are provided with as execution environment, carry out information storing path etc.The 1.3rd step carry out to drive file, and the execution track of test case, information such as whether pass through are kept under the designated directory.The execution track of test case is organized according to the level of class, method, code block as shown in Figure 2.Wherein code block refers under any input, the code collection that implementation status is all identical.A class comprises a plurality of methods, and a method comprises a plurality of code blocks.Whether the 1.4th go on foot according to test case by test use cases T being divided into test use cases Tp and the unsanctioned test use cases Tf that passes through.For example existing test use cases T={t 1... t 15, carry out back test case t 3, t 5, t 8, t 9, t 10Do not pass through, remaining has all passed through, so Tf={t 3, t 5, t 8, t 9, t 10, Tp={t 1, t 2, t 4, t 6, t 7, t 11, t 12, t 13, t 14, t 15.
Test case selects module to select to be used for the test case of defect location, and this part is that the present invention is peculiar.The 2.1st step was assembled the execution track of test case, different according to scale and complexity, can selective aggregation to method layer or class layer.Fig. 5 is the coverage condition of statistical test use-case and the algorithm flow chart that the execution track is assembled.If gather the method layer, then total code block is counted totalNum (m) in the number coverNum (m) of the code block that at first tested use-case covers in the statistical method and the method, then by formula the ratio cover (m) that is capped of (1) computing method; If gather the class layer, then at first add up in the number coverNum (c) of the code block that tested use-case covers in the class and the class total code block and count totalNum (c), then by formula the ratio cover (c) that is capped of (2) compute classes.The execution track of assembling each test case of back is expressed as a many-valued vector
cover ( m ) = coverNum ( m ) totalNum ( m ) - - - ( 1 )
cover ( c ) = coverNum ( c ) totalNum ( c ) - - - ( 2 )
The 2.2nd step computing block similarity, at certain unsanctioned test case with calculate it with the similarity between all the other test cases, and according to threshold value select with this by the similar test case of test case.The test case selection algorithm is as shown in Figure 4: the 2.2.1 step judges whether unsanctioned test case is arranged among the Tf, if for sky then finish, otherwise from Tf certain unsanctioned test case of selection
Figure S2008100189817D00054
Put into TfList FiIn and with t FiFrom Tf, remove.The 2.2.2 step is taken out remaining unsanctioned test case t among the Tf respectively Fi, calculate t FiAnd t FiSimilarity sim (t Fi, t Fi).If sim is (t Fi, t Fi)>α (α is a threshold value) is then t FiPut into TfList FiIn, and with t FiFrom Tf, remove.The 2.2.3 step is taken out each the test case t that passes through among the Tp respectively Pk, calculate t FiWith t PkBetween similarity sim (t Fi, t Pk), if sim is (t Fi, t Pk)>α is then t PkPut into TpList FiIn.2.2.4 goes on foot output<TfList Fi, TpList FiAnd jump to the 2.2.1 step.Similarity is calculated by formula (3).This formula calculates under polar coordinates the cosine value of angle between two vectors, and two vectors of the big more expression of included angle cosine value are similar more.Wherein vectorial
Figure S2008100189817D00055
Be respectively test case t i, t jCarry out the vector representation of track. With
Figure S2008100189817D00057
Expression is vectorial respectively Mould,
Figure S2008100189817D00059
The expression vector
Figure S2008100189817D000510
Scalar product.
sim ( t i , t j ) = cos ( t → i , t → j ) = t → i · t → j | t → i | × | t → j | = Σ k = 0 n ( t ik × t jk ) Σ k = 0 n t ik 2 × Σ k = 0 n t jk 2 - - - ( 3 )
For example calculate according to similarity, the possible outcome that test use cases is selected in the last example is as follows:
<TfList F3, TpList F3, TfList wherein F3={ t 3, t 5, TpList F3={ t 1, t 2, t 4, t 6, t 7;
<TfList F8, TpList F8, TfList wherein F8={ t 8, TpList F8={ t 11, t 12, t 15;
<TfList F9, TpList F9, TfList wherein F9={ t 9, t 10, TpList F9=Φ;
The 3rd step suspected to the suspicion rate of the test case systematic calculation code block of selection that considering calculating section also was that the present invention is peculiar.The main thought of the computing method that the present invention adopts be judge unsanctioned test case and the test case passed through between the consistance that covers, if unsanctioned test case t FiCovered code block s, but the similar test case of passing through does not all have covering, s causes t so FiUnsanctioned reason has higher suspicion rate.On the other hand, if t FiDo not cover code block s, but the similar test case of passing through covered all, code block s is likely the protection code, but t FiDo not cause it not pass through thereby carry out, have higher suspicion rate equally.The result who selects according to the 2nd step can distinguish three kinds of situations:
1,1 unsanctioned test case of situation and a plurality of test case of passing through (comprising 1);
Situation 2, a plurality of unsanctioned test cases (greater than 1) and 0 test case of passing through;
Situation 3, a plurality of unsanctioned test cases (greater than 1) and a plurality of test case of passing through (comprising 1).Introduce the computation model of three kinds of situations below in detail.
1, one unsanctioned test case t of situation FiWith a plurality of test case TpList that pass through FiAccording to code block s whether by t FiCover and calculate it by TpList FiIn each test case t PkThe ratio that covers: if code block s is by t FiCover, then add up TpList FiIn do not cover the number NTp of the test case of s 0(s), calculate the suspicion rate sus (s) of s by formula (4).If code block s is not by t FiCover, then add up TpList FiIn covered the number NTp of the test case of s 1(s), calculate the suspicion rate sus (s) of s by formula (5).Wherein the NTp in formula (4) and (5) represents TpList FiThe quantity of middle test case.Computation process can be divided into for two steps and finishes as shown in Figure 6: 3.1.1 step statistics TpList FiIn the coverage condition of test case, 3.1.2 is according to t FiCoverage condition calculate the suspicion rate of each code block.
sus ( s ) = NTp 0 ( s ) NTp - - - ( 4 )
sus ( s ) = NTp 1 ( s ) NTp - - - ( 5 )
Situation 2, a plurality of unsanctioned test case TfList FiBut the similar test case of not passing through.The Accounting Legend Code piece is by the ratio of these unsanctioned test cases coverings in such cases, and the high more suspicion rate of ratio is big more.To code block s statistics TfList FiIn covered the number NTf of the test case of s 1(s), by the suspicion rate sus (s) of formula (6) calculating s, wherein NTf is TfList FiThe number of middle test case.As shown in Figure 7, computation process can be finished in two steps, 3.2.1 step, statistics TfList FiThe coverage condition of middle test case, 3.2.2 step, the suspicion rate of Accounting Legend Code piece.
sus ( s ) = NTf 1 ( s ) NTf - - - ( 6 )
Situation 3, a plurality of unsanctioned test case TfList FiWith a plurality of test case TpList that pass through FiThis kind situation is the comprehensive of situation 1 and situation 2, if code block s is by TfList FiIn each test case all covered, then calculate the suspicion rate of s by formula (4) in the situation 1.If s is not by TfList FiIn any one test case cover, then calculate the suspicion rate of s, if s is by TfList by the formula (5) in the situation 1 FiIn the partial test use-case cover the suspicion rate sus by formula (7) and formula (8) calculating s respectively then 1(s) and sus 2(s), get two the greater between value then, i.e. sus (s)=Max (sus 1(s), sus 2(s)), wherein NTf is TfList FiThe number of middle test case, NTp is TpList FiThe number of middle test case, NTf 0(s), NTf 1(s) NTp of the same joint 0(s), NTp 1(s) definition is identical.As shown in Figure 8, computation process can be divided into for 3 steps, 3.3.1 step statistics TfList FiThe coverage condition of middle test case, concrete operations are identical with the 3.3.1 step in the situation 2,3.3.2 step statistics TpList FiIn the coverage condition of test case, concrete operations are identical with the 3.1.1 step in the situation 1,3.3.3 step Accounting Legend Code suspicion rate.
sus ( s ) = NTp 0 ( s ) NTp × NTf 1 ( s ) NTf - - - ( 7 )
sus ( s ) = NTp 1 ( s ) NTp × NTf 0 ( s ) NTf - - - ( 8 )
The 4th step metadata of collecting according to the 1st step is mapped to source program with the suspicion rate of code block, generates the defect location report of html format.
In sum, the selection of test case and suspicion rate computation model are cores of the present invention. Fig. 9 uses The software defect orientation tool interface of this patented method. Realize based on Java language and XML technology. The Java language Speech has complete object-oriented, the portable characteristics such as strong, by corresponding Java Virtual Machine is installed, and can Guarantee that the method may operate on the operating system platform of present main flow. The XML technology then has extensibility , the characteristics such as flexibility, self descriptiveness. The user can make amendment to realize to the XML document of describing operation Different detecting information collecting functions.

Claims (6)

1. one kind based on the software defect positioning method of carrying out the track block similarity, it is characterized in that may further comprise the steps:
1) at first to source program plug-in mounting collected metadata, generate the driving file of each test case, specified configuration information hereof, the execution information of test case is collected in implementation of test cases then, and to test case according to by whether dividing into groups;
2) the execution track of test case is assembled, scale and complexity selective aggregation according to software arrive method layer or class layer, calculate the similarity between unsanctioned test case and all the other test cases then respectively, select a plurality of test cases the most similar according to similarity with unsanctioned test case, test case is divided into several groups according to similarity, according to the test case in every group the implicit defective of this group is positioned respectively;
3) test case of selecting is carried out system's comparison, the suspicion rate of Accounting Legend Code piece;
4) be mapped to source program according to metadata at last and generate the defect location report.
2. according to claim 1 based on the software defect positioning method of carrying out the track block similarity, it is characterized in that step 2) in similarity with the included angle cosine value representation between two vectors, whether test case selected definite by threshold alpha, for test case t FiIf, use-case t jWith its similarity greater than α, test case t then jSelected and test case t FiOne group.
3. according to claim 1 and 2 based on the software defect positioning method of carrying out the track block similarity, it is characterized in that step 2) test case is divided into 3 kinds of situations according to 3 kinds of different grouping types of similarity, wherein:
1,1 unsanctioned test case of situation and the test case of passing through more than 1 and 1;
Situation is unsanctioned test case and 0 test case of passing through more than 2,1;
Situation is unsanctioned test case and the test case passed through more than 1 and 1 more than 3,1.
4. according to claim 3 based on the software defect positioning method of carrying out the track block similarity, it is characterized in that in the step 3) by the suspicion rate calculation process of the test case of situation 1 grouping being: at first at unsanctioned test case t Fi, same t FiThe similar test use cases TpList that passes through Fi, statistics TpList FiIn the coverage condition of test case, then according to code block s whether by t FiCovering checks that it is by TpList FiIn each test case t PkThe ratio that covers is if code block s is by t FiCover, its suspicion rate sus (s) is tried to achieve by following formula:
sus ( s ) = NTp 0 ( s ) NTp
Wherein NTp represents TpList FiThe quantity of middle test case, NTp 0(s) expression TpList FiIn do not cover the test case quantity of s;
If code block s is not by t FiCover, its suspicion rate sus (s) is tried to achieve by following formula:
sus ( s ) = NTp 1 ( s ) NTp
NTp wherein 1(s) expression TpList FiThe middle test case quantity that covers s.
5. according to claim 3 based on the software defect positioning method of carrying out the track block similarity, it is characterized in that in the step 3) by the suspicion rate calculation process of the test case of situation 2 groupings being: consider same t FiSimilar unsanctioned test use cases TfList Fi, to code block s statistics TfList FiIn covered the test case number NTf of s 1(s), the suspicion rate sus (s) of code block s is tried to achieve by following formula:
sus ( s ) = NTf 1 ( s ) NTf
Wherein NTf represents TfList FiThe number of middle test case.
6. according to claim 3 based on the software defect positioning method of carrying out the track block similarity, it is characterized in that in the step 3) by the suspicion rate calculation process of the test case of situation 3 groupings being: if code block s is by TfList FiIn each test case all covered, then in the calculating of s rate under a cloud and the situation 1 s by t FiThe calculating that covers is identical; If code block s is not by TfList FiIn any one test case cover, then in the calculating of s rate under a cloud and the situation 1 s not by t FiThe calculating that covers is identical; If s is by TfList FiIn the partial test use-case cover, then calculate the suspicion rate sus of s respectively by following two formula 1(s) and sus 2(s), NTf wherein 0(s) be TfList FiIn do not cover the test case number of s, other variable-definitions are the same, get two the greater in the value then, i.e. sus (s)=Max (sus1 (s), sus2 (s)); Formula is as follows:
sus 1 ( s ) = NTp 0 ( s ) NTp × NTf 1 ( s ) NTf
sus 2 ( s ) = NTp 1 ( s ) NTp × NTf 0 ( s ) NTf .
CN2008100189817A 2008-02-02 2008-02-02 Method for locating software unsoundness based on execution track block semblance Expired - Fee Related CN101231614B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100189817A CN101231614B (en) 2008-02-02 2008-02-02 Method for locating software unsoundness based on execution track block semblance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100189817A CN101231614B (en) 2008-02-02 2008-02-02 Method for locating software unsoundness based on execution track block semblance

Publications (2)

Publication Number Publication Date
CN101231614A true CN101231614A (en) 2008-07-30
CN101231614B CN101231614B (en) 2010-06-02

Family

ID=39898109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100189817A Expired - Fee Related CN101231614B (en) 2008-02-02 2008-02-02 Method for locating software unsoundness based on execution track block semblance

Country Status (1)

Country Link
CN (1) CN101231614B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866316A (en) * 2010-06-23 2010-10-20 南京大学 Software defect positioning method based on relative redundant test set reduction
CN101883024A (en) * 2010-06-23 2010-11-10 南京大学 Dynamic detection method for cross-site forged request
CN101901185A (en) * 2010-06-01 2010-12-01 南京大学 Method for locating defects in object-oriented programs, characterized by organizing execution traces by categories
CN101950271A (en) * 2010-10-22 2011-01-19 中国人民解放军理工大学 Modeling technology-based software security test method
CN102708052A (en) * 2012-04-27 2012-10-03 北京邮电大学 Automatic positioning method of software failures in unit test
CN101859273B (en) * 2009-04-07 2013-10-02 西门子(中国)有限公司 Method and device for generating test cases
CN105095091A (en) * 2015-09-23 2015-11-25 南京大学 Software defect code file locating method based on reverse index technology
CN106886490A (en) * 2016-12-30 2017-06-23 浙江理工大学 A kind of program error localization method based on failure track
CN107515822A (en) * 2017-08-16 2017-12-26 南京大学 Software defect positioning method based on multiple-objection optimization
CN108717459A (en) * 2018-05-24 2018-10-30 哈尔滨工程大学 A kind of mobile application defect positioning method of user oriented comment information
CN108959090A (en) * 2018-07-05 2018-12-07 北方工业大学 Influence analysis device between debugging behavior of developer and software debugging
CN111258901A (en) * 2020-01-17 2020-06-09 北京科技大学 Fault positioning method and system for micro-service combination program
CN111737107A (en) * 2020-05-15 2020-10-02 南京航空航天大学 Repeated defect report detection method based on heterogeneous information network
CN113687825A (en) * 2021-08-25 2021-11-23 恒安嘉新(北京)科技股份公司 Software module construction method, device, equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH022419A (en) * 1988-06-10 1990-01-08 Hitachi Ltd Program information control system
CN1115628C (en) * 1999-09-30 2003-07-23 深圳市中兴通讯股份有限公司 Software simulation test method
US6978401B2 (en) * 2002-08-01 2005-12-20 Sun Microsystems, Inc. Software application test coverage analyzer
CN1248116C (en) * 2002-09-23 2006-03-29 上海贝尔有限公司 General purpose testing arrangement for embedded module and subsystem based on host machine platform
CN101030163A (en) * 2006-03-01 2007-09-05 李春芳 Method for deciding human-machine interface testing covering rate

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859273B (en) * 2009-04-07 2013-10-02 西门子(中国)有限公司 Method and device for generating test cases
CN101901185A (en) * 2010-06-01 2010-12-01 南京大学 Method for locating defects in object-oriented programs, characterized by organizing execution traces by categories
CN101883024A (en) * 2010-06-23 2010-11-10 南京大学 Dynamic detection method for cross-site forged request
CN101866316A (en) * 2010-06-23 2010-10-20 南京大学 Software defect positioning method based on relative redundant test set reduction
CN101950271A (en) * 2010-10-22 2011-01-19 中国人民解放军理工大学 Modeling technology-based software security test method
CN102708052B (en) * 2012-04-27 2017-10-20 北京邮电大学 Software fault automatic positioning method in a kind of unit testing
CN102708052A (en) * 2012-04-27 2012-10-03 北京邮电大学 Automatic positioning method of software failures in unit test
CN105095091B (en) * 2015-09-23 2018-01-09 南京大学 A kind of software defect code file localization method based on Inverted Index Technique
CN105095091A (en) * 2015-09-23 2015-11-25 南京大学 Software defect code file locating method based on reverse index technology
CN106886490B (en) * 2016-12-30 2019-09-20 浙江理工大学 A kind of program error localization method based on failure track
CN106886490A (en) * 2016-12-30 2017-06-23 浙江理工大学 A kind of program error localization method based on failure track
CN107515822A (en) * 2017-08-16 2017-12-26 南京大学 Software defect positioning method based on multiple-objection optimization
CN107515822B (en) * 2017-08-16 2019-09-03 南京大学 Software defect positioning method based on multiple-objection optimization
CN108717459A (en) * 2018-05-24 2018-10-30 哈尔滨工程大学 A kind of mobile application defect positioning method of user oriented comment information
CN108959090A (en) * 2018-07-05 2018-12-07 北方工业大学 Influence analysis device between debugging behavior of developer and software debugging
CN111258901A (en) * 2020-01-17 2020-06-09 北京科技大学 Fault positioning method and system for micro-service combination program
CN111737107A (en) * 2020-05-15 2020-10-02 南京航空航天大学 Repeated defect report detection method based on heterogeneous information network
CN113687825A (en) * 2021-08-25 2021-11-23 恒安嘉新(北京)科技股份公司 Software module construction method, device, equipment and storage medium
CN113687825B (en) * 2021-08-25 2023-12-12 恒安嘉新(北京)科技股份公司 Method, device, equipment and storage medium for constructing software module

Also Published As

Publication number Publication date
CN101231614B (en) 2010-06-02

Similar Documents

Publication Publication Date Title
CN101231614B (en) Method for locating software unsoundness based on execution track block semblance
CN105893256B (en) software fault positioning method based on machine learning algorithm
CN101866316B (en) Software defect positioning method based on relative redundant test set reduction
CN101650687B (en) Large-scale parallel program property-predication realizing method
CN104765683B (en) Regression test case Multipurpose Optimal Method based on MOEA/D algorithms
CN104239219B (en) Software defect positioning technology on-line evaluating and experimenting platform and method based on coverage
CN103294594A (en) Test based static analysis misinformation eliminating method
CN103995780B (en) A kind of program error localization method based on sentence frequency statistics
CN102750223A (en) Error positioning method based on object-oriented program slice spectrum
Guo et al. Automated software test data generation with generative adversarial networks
US7373618B1 (en) Method and system for selection and replacement of subcircuits in equivalence checking
CN108304317A (en) A kind of single process procedures static slicing method and system executing frequency based on path
Saglietti et al. Automated unit and integration testing for component-based software systems
CN103136103A (en) Test case reduction method for error locating demand
CN106933572A (en) A kind of measurement model based on the section of LLVM intermediate representation programs
Swain et al. Minimal testcase generation for object-oriented software with state charts
CN101894073B (en) Defect automatic positioning device based on control flow intersection and automatic positioning method thereof
CN102521130B (en) Error location method based on cluster invariant analysis
Bashir et al. A fitness function for evolutionary mutation testing of object-oriented programs
KR20170123389A (en) System and method for human error probability calculation of nuclear generating station
Lawrance et al. Sharing reasoning about faults in spreadsheets: An empirical study
Uddin et al. Collecting signatures to model latency tolerance in high-level simulations of microthreaded cores
CN109814924A (en) A kind of software complexity calculation method
Qian et al. A strategy for multi-target paths coverage by improving individual information sharing
CN113282495A (en) Java software fault positioning method based on track monitoring

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100602

Termination date: 20130202