Abstract
Software testing is an integral part of software development life cyclewhich ensures the quality of the software. An exhaustive testing is not alwayspossible because of combinatorial optimisation problem. Thus, in the softwaretesting phase, generation of optimal number of test data accelerate the overallsoftware testing process. We identified that the reduction of interactions amongthe input parameters significantly reduces the number of test data and generatean optimal test data set. This interaction is known as ‘t’-way interaction. Overthe last decade, a large number of ‘t’-way test data generation strategies havebeen developed. However, generating optimum number of test data appears tobe a NP-hard problem where the test data generation time becomes significantlyhigher. This paper proposes an effective test data generation strategy based on‘Kids Card’ game known as MTTG. The proposed strategy significantly reducesthe test data generation time. The result and discussion section shows that,MTTG outperforms all other strategies.
Original language | English |
---|---|
Title of host publication | Security and Privacy in Communication Networks |
Subtitle of host publication | 11th International Conference, SecureComm 2015 |
Place of Publication | Belgium |
Publisher | European Alliance for Innovation |
Pages | 633-648 |
Number of pages | 16 |
DOIs | |
Publication status | Published - 2015 |
Event | International Conference Security and Privacy in Communication Networks: SecureComm 2015 - Wyndham Garden Dallas North Hotel, Dallas, United States Duration: 26 Oct 2015 → 29 Oct 2015 http://archive.securecomm.org/2015/show/home |
Conference
Conference | International Conference Security and Privacy in Communication Networks |
---|---|
Country/Territory | United States |
City | Dallas |
Period | 26/10/15 → 29/10/15 |
Other | SecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. |
Internet address |