共查询到19条相似文献,搜索用时 328 毫秒
1.
2.
基于通信扩展有限状态机的测试集生成技术 总被引:1,自引:0,他引:1
在协议一致性测试中,选择恰当的测试例至关重要。文章介绍协议一致性测试的基本概念及有限状态机和扩展有限状态机的测试模型,重点探讨基于通信扩展有限状态机的测试集生成技术。 相似文献
3.
专有通信协议一致性的实现是保证项目系统通信质量的关键。本文采用有限状态机FSM对通信协议进行建模。并依据产生的UIO序列生成相应的一致性测试序列,并对一个实际项目进行协议的一致性测试,发现使用了一致性测试方法的测试比没有使用此方法的测试更有效。 相似文献
4.
本文重点介绍基于有限状态机(FSM)测试序列生成方法,并以现场设备安全入网为例,利用该方法生成测试序列。为构建WIA-PA协议测试FSM模型,文中分析了WIA-PA协议测试中的安全入网的设备状态、事件、输出和转移输出,在此基础上建立了现场设备安全入网测试的FSM模型。然后在FSM模型基础上,采用UIO方法生成测试序列。 相似文献
5.
6.
7.
回归测试对修改后的软件重新进行测试,确认修改没有引入新的错误或导致其他代码产生错误。研究GUI回归测试脚本的自动化修复技术,采用有限状态机描述GUI的交互行为,并基于FSM产生测试用例集;使用自动化测试工具生成测试脚本,建立状态迁移和测试脚本的映射关系表;通过比较GUI新、旧版本的FSM得到GUI的变化信息,根据变化信息和映射表对原测试脚本自动修复。实例验证了脚本修复方法的可行性和有效性。 相似文献
8.
B itTorrent(BT)是基于Peer-to-Peer(P2P)技术的比较流行文件共享软件,BT protoco l是其相关软件实现的一个基本协议.本文对BT协议进行深入的分析,采用有限状态机(FSM,F inite S tate M achine)对BT协议进行形式化建模,描述了正常的共享流程及部分异常处理.然后使用U IO方法生成了BT协议基于FSM模型的一致性测试序列,包括各个状态的U IO序列及各个变迁的测试序列,最后是本文的结论及下一步将要做的研究工作. 相似文献
9.
本文采用通信有限状态机模型描述通信协议,基于通信有限状态机模型提出了协议一致性测试的测试序列生成方法,解决了构件化协议的测试序列生成的问题。本文实现了测试序列的生成算法,通过实例说明了采用测试序列生成算法生成了比传统算法更少的测试序列。同时本算法还可以用于多层协议测试。 相似文献
10.
本文采用通信有限状态机模型描述通信协议,基于通信有限状态机模型提出了协议一致性测试的测试序列生成方法,解决了构件化协议的测试序列生成的问题。本文实现了测试序列的生成算法,通过实例说明了采用测试序列生成算法生成了比传统算法更少的测试序列。同时本算法还可以用于多层协议测试。 相似文献
11.
Extended finite state machines (EFSMs) are widely used when deriving tests for checking the functional requirements for software implementations. However, the fault coverage of EFSMbased tests covering appropriate paths, variables, etc., remains rather obscure. Furthermore, these tests are known be incapable of detecting many functional faults frequently occurring in EFSM-based implementations. In this paper, an approach is proposed for deriving complete tests with the help of a proper Java EFSM implementation. Since the software is based on a template, the faults turn directly into EFSM faults. The method proposed here makes it possible to derive test suites that can detect functional faults. In the first step, the EFSM-based test suite derived by a well-known method is checked for completeness with respect to the faults generated by the μJava tool. Then, each undetected fault is easily mapped into an EFSM mutant. In the next step, some FSM abstraction is used to derive a distinguishing sequence for two finite-state machines (if such a sequence exists), which is added to the current test suite. The test derived in this way is complete with respect to the faults generated by μJava. If the corresponding FSM derived by EFSM modeling is too complex or no such FSM can be derived, the resulting test suite can be incomplete. However, the experiments performed by us clearly show that the original test suite extended by distinguishing sequences can detect many functional faults in software implementations when the given EFSM is used as a specification for the system. 相似文献
12.
13.
14.
15.
Masood A. Bhatti R. Ghafoor A. Mathur A.P. 《IEEE transactions on pattern analysis and machine intelligence》2009,35(5):654-668
Conformance testing procedures for generating tests from the finite state model representation of Role-Based Access Control (RBAC) policies are proposed and evaluated. A test suite generated using one of these procedures has excellent fault detection ability but is astronomically large. Two approaches to reduce the size of the generated test suite were investigated. One is based on a set of six heuristics and the other directly generates a test suite from the finite state model using random selection of paths in the policy model. Empirical studies revealed that the second approach to test suite generation, combined with one or more heuristics, is most effective in the detection of both first-order mutation and malicious faults and generates a significantly smaller test suite than the one generated directly from the finite state models. 相似文献
16.
17.
18.