Abstract

Software testing is an integral part of software development life cyclewhich ensures the quality of the software. An exhaustive testing is not alwayspossible because of combinatorial optimisation problem. Thus, in the softwaretesting phase, generation of optimal number of test data accelerate the overallsoftware testing process. We identified that the reduction of interactions amongthe input parameters significantly reduces the number of test data and generatean optimal test data set. This interaction is known as ‘t’-way interaction. Overthe last decade, a large number of ‘t’-way test data generation strategies havebeen developed. However, generating optimum number of test data appears tobe a NP-hard problem where the test data generation time becomes significantlyhigher. This paper proposes an effective test data generation strategy based on‘Kids Card’ game known as MTTG. The proposed strategy significantly reducesthe test data generation time. The result and discussion section shows that,MTTG outperforms all other strategies.
Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks
Subtitle of host publication11th International Conference, SecureComm 2015
Place of PublicationBelgium
PublisherEuropean Alliance for Innovation
Pages633-648
Number of pages16
DOIs
Publication statusPublished - 2015
EventInternational Conference Security and Privacy in Communication Networks: SecureComm 2015 - Wyndham Garden Dallas North Hotel, Dallas, United States
Duration: 26 Oct 201529 Oct 2015
http://archive.securecomm.org/2015/show/home

Conference

ConferenceInternational Conference Security and Privacy in Communication Networks
Country/TerritoryUnited States
CityDallas
Period26/10/1529/10/15
OtherSecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.
Internet address

Fingerprint

Dive into the research topics of 'An effective T-way test data generation strategy'. Together they form a unique fingerprint.

Cite this