Computer Science ›› 2016, Vol. 43 ›› Issue (10): 182-189.doi: 10.11896/j.issn.1002-137X.2016.10.034

Previous Articles     Next Articles

Regression Testing Prioritization Fault Localization Method Based on Influence Analysis

ZHANG Hui   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Since the fault localization method based on programs’ behavior characteristics sees every program entity isolated,the efficiency of fault localization is influenced.And since the regression test fault localization needs to execute all test cases,the developing and testing costs increase largely.In view of the above problems,this paper put up a regression testing prioritization fault localization method based on influence analysis,which organically integrates the joint dependency graph,the fault localization method based on programs’ behavior characteristics and the regression testing prioritization.The experimental results show that compared with classical methods such as Ochiai,Tarantula,PPDG,CP and Naish,this method can more efficiently position software errors.

Key words: Fault localization,Test case,Regression testing prioritization,Joint dependency graph

[1] Zhang X,Tallam S,Gupta N,et al.Towards locating execution omission errors[C]∥Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation(PLDI’07).San Diego.California,USA,2007:415-424
[2] Gupta N,He H,Zhang X,et al.Locating faulty code using fai-lure inducing chops[C]∥Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering(ASE’05).Long Beach,CA,USA,2005:263-272
[3] Zhang X,Gupta N,Gupta R.Pruning dynamic slices with confidence[C]∥Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation(PLDI’06).Ottawa,Ontario,Canada,2006:169-180
[4] Baah G K,Podgurski A,Harrold M J.The probabilistic program dependence graph and its application to fault diagnosis[J].IEEE Transactions on Software Engineering,2010,361:528-545
[5] Zeller.Isolating cause—Effect chains from computer programs[C]∥Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering(SlGSOFT’02/FSE-10).Charleston,South Carolina,USA,2002,1:1-10
[6] Renieres M,Reiss S P.Fault localization with nearest neighbor queries[C]∥Proceedings of the 18th IEEE/ACM International Conference on Automated Software Engineering (ASE’03).Montreal,Canada,2003:30-39
[7] Jeffrey D,Gupta N,Gupta R.Fault localization using value replacement[C]∥Proceedings of the 2008 International Symposium on Software Testing and Analysis(ISSTA’08).Seattle,WA,USA,2008:167-178
[8] Zhang X,Gupta N,Gupta R.Locating faults through automated predicate switching[C]∥Proceedings of the 28th International Conference on Software Engineering(ICSE’06).Shanghai,China,2006:272-281
[9] Renieres M,Reiss S P.Fault localization with nearest neighbor queries[C]∥Proceedings of the 18th IEEE/ACM International Conference on Automated Software Engineering(ASE’03).Montreal,Canada,2003:30-39
[10] Jones J A,Harrold M J.Empirical evaluation of the Tarantula automatic fault—localization technique[C]∥Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering(ASE’05).Long Beach,CA,USA,2005:273-282
[11] Abreu R,Zoeteweij P,Arjan J C,et al.On the Accuracy of Spectrum-Based Fault Localization[C]∥In Proceedings of Testing:Academic and Industrial Conference-Practice and Research Techniques.2007:89-98
[12] Zhang Z Y,Chan W K,Tse T H.Capturing Propagation of Infected Program States[C]∥Proceedings of the 7th Joint Mee-ting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE).ACM,2009:43-52
[13] 在软件开发中的应用80:20原则[EB/OL].http://www.kuqin.com/shuoit/20131120/336423.html.2013
[14] Naish L,Lee H J,Ramamohanarao K.A model for spectra-basedsoftware diagnosis [J].ACM Transactions on Software Engineering and Methodology,2011,20(3):1-32
[15] Chen Xiang,Ju Xiao-lin,Wen Wan-zhi,et al.Study on Dynamic Defect Location Method Based on Program Spectrum [J].Journal of Software,2015,26(2):390-412(in Chinese) 陈翔,鞠小林,文万志,等.基于程序频谱的动态缺陷定位方法研究[J].软件学报,2015,6(2):390-412
[16] Chen Xiang,Chen Ji-hong,Ju Xiao-lin,et al.Review of Priority Ranking of Test Cases in Regression Test[J].Journal of Software,2013,24(8):1695-1712(in Chinese) 陈翔,陈继红,鞠小林,等.回归测试中的测试用例优先排序技术述评[J].软件学报,2013,4(8):1695-1712
[17] 李博.软件调试中多错误定位的算法研究[D].大连:大连海事大学计算机专业,2012

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .