Computer Science ›› 2016, Vol. 43 ›› Issue (10): 57-62.doi: 10.11896/j.issn.1002-137X.2016.10.010

Previous Articles     Next Articles

Testing and Invalid Testing Case Localization Model Based on Metamorphic Relation

HUI Zhan-wei, HUANG Song, ZHANG Ting-ting and LIU Jian-hao   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Aiming at the limitations of traditional metamorphic testing model MTM,this paper proposed a testing model MRTM based on metamorphic relation.Through comparative analysis,firstly,characteristics such as scope of its application are pointed out.Secondly,in view of the problem that the invalid testing case is hard to determine that both MTM and MRTM are facing,a failed test case localization method of metamorphic testing (FTCL-MT) based on dubiety computation was proposed.As a supplement to the existing testing model,FTCL-MT is helpful to achieve precise positioning of invalid test cases in the case that CMR is not satisfied,so that it can provide support for existing fault location technologies.Finally,experiments show the effectiveness of FTCL-MT.

Key words: Metamorphic relation,Test model,Metamorphic testing,Invalid testing case

[1] Feng Jian-qiang .On the Effectiveness of Metamorphic Testing for Numerical Programs[D].The University of Hong Kong,2003
[2] Weyuker E J.On testing non-testable programs[J].The Computer Journal,1982,25(4):465-470
[3] Baresi L,Young M.Test oracles[R].Technical Report CIS-TR01-02,Department of Computer and Information Science University of Oregon,Eugene,OR,2001:9
[4] Chen T Y,Kuo Fei-ching ,Tam W K,et al.Testing a software-based PID controller using metamorphic testing[C]∥Procee-dings of the 1st International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2011).Vilamoura,Algarve,Portugal,2011:387-396
[5] Zhan Wei-hui,Huang Song.Achievements and Challenges ofMetamorphic Testing[C]∥2013 Fourth World Congress on Software Engineering.Hong Kong,China,2013:73-77
[6] Chen T Y,Cheung S C,Yiu S M.Metamorphic testing:a new approach for generating next test cases[R].Department of Computer Science,Hong Kong University of Science and Technology,Tech.Rep.HKUST-CS98-01,1998
[7] Chen T Y,Yu Y T.On the relationship between partition and random testing[J].IEEE Transactions on Software Enginee-ring,1994,20(12):977-980
[8] DeMillio R A,Offutt A J.Constraint-based automatic test data generation[J].IEEE Transactions on Software Engineering,1991,17(9):900-910
[9] Offutt J,Liu Shao-ying,Abdurazik A,et al.Generating test data from state-based specifications[J].Software Testing,Verification and Reliability,2003,13(1):25-53
[10] Jia Yue,Harman M.An analysis and survey of the development of mutation testing[J].IEEE Transactions on Software Engineering,2011,37(5):649-678
[11] Jones J A,Harrold M J.Empirical Evaluation of the Tarantula Automatic Fault-Localization Technique[C]∥ASE 2005.2005:273-282
[12] Wong W E,Qi Yu,Zhao Lei,et al.Effective Fault Localization using Code Coverage[C]∥ International Computer Softwrae and Applications Conference.2007:449-456
[13] Weyuker E J.The Oracle Assumption of Program Testing[C]∥Proceedings of the 13th International Conference on System Scien-ces (ICSS).Honolulu,HI,1980
[14] Baker J,Thornton J.Software engineering challenges in bioinformatics[C]∥International Conference on Software Enginee-ring.2004:12-15
[15] Xie Xiao-yuan,Ho J,Murphy C,et al.Improving the quality of computational science software by using metamorphic relations to test machine learning applications[J].Department of Computer Science Columbia University,2009,12(1):1-80
[16] Ho J W K,Lin M W,Adelstein S,et al.Erratum:customising an antibody leukocyte capture microarray for systemic lupus erythematosus:beyond biomarker discovery[J].Proteomics-Clinical Applications,2010,4(6/7):679-679
[17] Ho J W K,Stefani M,Remedios C G,et al.Differential variability analysis of gene expression and its application to human di-seases[J].Bioinformatics,2008,24:390-398
[18] Xie Xiao-yuan,Ho J W K,Murphy C,et al.Testing and validating machine learning classifiers by metamorphic testing[J].Journal of Systems and Software,2011,84(4):544-558
[19] Xie Xiao-yuan,Ho J,Murphy C,et al.Application of metamorphic testing to supervised classifiers[C]∥ International Confe-rence on Quality Software.IEEE,2010:135-144
[20] Jones J A,Harrold M J,Stasko J.Visualization of test information to assist fault localization[C]∥ICSE 2002.2002:467-477
[21] Jia Y,Harman M.A Custimizable,Runtime-Optimized Higher Order Mutation Testing Tool for the Full C Language[C]∥ Practice and Research Techniques.2008:94-98
[22] Ma Y S,Offutt J,Kwon Y R.MuJava:An Automated Class Mutation System[J].Journal of Software Testing,Verification and Reliability,2005,15(2):97-133
[23] Chen T Y,Kuo F C,Liu Ying,et al.Metamorphic Testing and Testing with Special Values[C]∥ Acis International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.2004:128-134
[24] Dong Guo-wei.Metamorphic testing techniques for error detection efficiency[D].Southeast University,2009
[25] Chen T Y,Tse T H,Zhou Zhi-quan.Semi-proving:an integrated method based on global symbolic evaluation and metamorphic testing[C]∥ACM Sigsoft Software Engineering Notes,2002,7(4):191-195
[26] Hutchins M,Foster H,Goradia T,et al.Experiments of the effectiveness of dataflow-and controlflow-based test adequacy criteria[C]∥ International Conference on Software Engineering.IEEE Computer Society Press,1994:191-200

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .