[22] Glenford J. Myers, \The art of Software Testing," John Wiley & Sons, Inc., New York,

Size: px
Start display at page:

Download "[22] Glenford J. Myers, \The art of Software Testing," John Wiley & Sons, Inc., New York,"

Transcription

1 [22] Glenford J. Myers, \The art of Software Testing," John Wiley & Sons, Inc., New York, [23] A. J. Outt, \Investigations of the software testing coupling eect," ACM Trans. on Software Engineering Methodology, 1(1):3{18, January [24] A. J. Outt, G. Rothermel, and C. Zapf, \An experimental evaluation of selective mutation," in Proceedings of the 15th International Conference on Software Engineering, pages 100{107, Baltimore, MD, May [25] E. J. Weyuker, S. N. Weiss, and R. G. Hamlet, \Comparison of program testing strategies," in Proceedings of the Fourth Symposium on Software Testing, Analysis and Verication, pages 154{164, Victoria, British Columbia, Canada, October [26] W. E. Wong, \On Mutation and Data Flow," PhD thesis, Department of Computer Science, Purdue University, West Lafayette, IN, December (available as SERC-TR- 149-P) 11

2 [11] P. G. Frankl and S. N. Weiss, \An experimental comparison of the eectiveness of branch testing and data ow testing," IEEE Trans. on Software Engineering, 19(8):774{787, October [12] P. G. Frankl and E. J. Weyuker, \A formal analysis of the fault-detecting ability of testing methods," IEEE Trans. on Software Engineering, 19(3):202{213, March [13] P. G. Frankl and E. J. Weyuker, \Provable improvements on branch testing," IEEE Trans. on Software Engineering, 19(10):962{975, October [14] J. R. Horgan and S. A. London, \Data ow coverage and the C language," in Proceedings of the Fourth Symposium on Software Testing, Analysis, and Verication, pages 87{97, Victoria, British Columbia, Canada, October [15] J. C. Maldonado, M. E. Delamaro, M. Jino, and M. Chaim, \PROTEUM: A testing tool based on mutant analysis". in Proceedings of the Seventh Brazilian Symposium on Software Engineering, Rio de Janiero, Brazil, October [16] A. P. Mathur, \Performance, eectiveness, and reliability issues in software testing," in Proceedings of the Fifteenth Annual International Computer Software and Applications Conference, pages 604{605, Tokyo, Japan, September [17] A. P. Mathur, \Mutation testing," Encyclopedia of Software Engineering, pages 707{713, [18] A. P. Mathur and W. E. Wong, \Comparing the fault detection eectiveness of mutation and data ow testing: An empirical study," Technical Report SERC-TR-146-P, Software Engineering Research Center, Purdue University, September [19] A. P. Mathur and W. E. Wong, \Evaluation of the cost of alternate mutation testing strategies," in Proceedings of the Seventh Brazilian Symposium on Software Engineering, Rio de Janiero, Brazil, October [20] A. P. Mathur and W. E. Wong, \A theoretical comparison between mutation and data ow based test adequacy criteria," in Proceedings of 1994 ACM Computer Science Conference, Phoenix, Arizona, March [21] A. P. Mathur and W. E. Wong, \An empirical comparison of data ow and mutation-based test adequacy criteria," The Journal of Software Testing, Verication, and Reliability, 4(1), June (To appear) 10

3 References [1] A. T. Acree, \On mutation," PhD thesis, School of Information and Computer Science, Georgia Institute of Technology, Atlanta, GA, (available as GIT-ICS-80/12) [2] H. Agrawal, R. A. DeMillo, R. Hathaway, Wm. Hsu, Wynne Hsu, E. W. Krauser, R. J. Martin, A. P. Mathur, and E. H. Spaord, \Design of mutant operators for the C programming language," Technical Report SERC-TR-41-P, Software Engineering Research Center, Purdue University, March [3] T. A. Budd, \Mutation Analysis of Program Test Data," PhD thesis, Yale University, New Haven, CT, [4] T. A. Budd, \Mutation analysis: Ideas, examples, problems and prospect," in Computer Program Testing, B. Chandrasekaran and S. Radicchi, Eds. Amsterdam, North Holland, July [5] T. A Budd, R. A. DeMillo, R. J. Lipton, and F. G. Sayward, \The design of a prototype mutation system for program testing," in Proceedings 1978 National Computer Conference, Alexandria, VA, [6] T. A Budd, R. A. DeMillo, R. J. Lipton, and F. G. Sayward, \Theoretical and empirical studies on using program mutation to test the functional correctness of programs," in Proceedings of the Seventh ACM Symposium on Principles of Programming Languages, Las Vegas, [7] B. J. Choi, R. A. DeMillo, E. W. Krauser, A. P. Mathur, R. J. Martin, A. J. Outt, H. Pan, and E. H. Spaord, \The Mothra toolset," in Proceedings of the Twenty-Second Annual Hawaii International Conference on System Sciences, HI, January [8] R. A. DeMillo, D. S. Guindi, K. N. King, W. M. McCracken, and A. J. Outt, \An extended overview of the Mothra software testing environment," in Proceedings of the Second Workshop on Software Testing, Verication and Analysis, pages 142{151, Ban, Alberta, Canada, July IEEE Computer Society Press. [9] R. A. DeMillo, R. J. Lipton, and F. G. Sayward, \Hints on test data selection: Help for the practicing programmer," IEEE Computer, 11(4):34{41, April [10] R. A. DeMillo and A. J. Outt, \Constraint based automatic test data generation," IEEE Trans. on Software Engineering, 17(9):900{910, September

4 When mutation operators are excluded from MO such that the resulting mutation covers some criterion R, then there exists some program-specication pair P and S such that M(mutation, P, S) < M(R, P, S) and E(mutation, P, S) < E(R, P, S) However, in attempting to nd a more positive interpretation of Frankl-Weyuker's result, we turned to the description of the test case selection model dened by the authors at the beginning of their paper. In this regard Frankl-Weyuker are correct only in the following combinatorial and thus not very interesting sense. Mutation analysis only requires polynomially many test cases as a function of program size. Therefore, any test criterion that can in the worst case require exponentially many subdomains may also include subdomains that cannot be covered by polynomially bounded methods. This in itself does not automatically imply the dominance of such methods in either the M or E hierarchies since there does not appear to be any way to guarantee a priori that exponentially many products of relative frequencies has a rate of convergence that is more favorable than M(mutation; P; S). Even if such a dominance were to be established mathematically, the intractability of criteria that require exponentially many test cases should be obvious. This observation works in both directions, however. It seems rather farfetched for Frankl- Weyuker to claim their test selection model is not biased in favor of some criterion because any criterion that is insensitive to test case redundancy can gain unexpected fault detection ability when compared to a method like mutation. Redundant test cases will by sheer chance eventually detect some faults. In this respect, weaker adequacy criteria can enjoy a larger marginal benet than a stronger one. Without relating the eectiveness of a criterion to a measurement of test eort, all such theoretical studies are bound to be awed. What conclusions can be drawn from this counterpoint to the analysis in [?] beyond the obvious conclusion that there is little to be gained in setting up straw-man criteria to bolster a preconceived notion of relative fault detecting ability? We suspect that the Frankl-Weyuker hierarchy is of no practical signicance at least insofar as it attempts to nd analytical comparisons between such widely disparate methods as mutation-based and structurally-based test criteria. It is our belief that simple and elegant hierarchies of test criteria are interesting academic artifacts that ultimately have little to do with what engineers do in practice. In practical situations, the important factors have less to do with orderings over grossly simplied models of reality and more to to with the immeasurably harder tasks of analyzing the cost and eectiveness of specic test methods for specic environments, tasks and risk factors. In such a world it is unlikely that Figure 4 of the [?] even if it were correct 00 would lead to increased or better usage of existing test criteria. 8

5 of mutation systems have processed increasingly structured programs, the need for (3') has decreased. In the Mothra system for example which processes Fortran 77, (3') is represented only by an operator called ONETRIP that ensures loop traversal. The application of mutation to the programming language C increases the possibility of unstructured branches into conditionals, but the mutation operators set for C does not include an operator (3') [?,?]. This is because in C every boolean expression is also an arithmetic expression. There is already an operator ZPUSH (NZPUSH) that when applied to an expression returns TRAP only if the expression evaluates to zero (nonzero). This operator applied to expressions controlling loops and if statements is obviously sucient to guarantee branch coverage. Based on suggestions made by Budd and Acree [?,?]; Mathur, Wong [?], as well as Outt and his co-workers [?] have discovered some complex relationships between selected subsets of standard MO's through experimentation. This short historical sketch serves to remind us of the danger in the Frankl-Weyuker assertion that one can by inspection determine \the only mutation operators that are relevant..." for some comparison. 3 Mutation and DataFlow There is a growing body of evidence that the fault detecting ability of mutation testing methods are at least as strong as any of the other methods mentioned in [?] provided the analysis exploits one of the crucial features of mutation testing: the inclusion of robust sets of mutation operators accounts for the ability of mutation analysis to detect errors through operator, domain and operand mutations that are not related in an obvious way to structurally based test case selection criteria [?,?]. For example, one of us [?] has shown that for the most general class of programs with at least one variable of multiple denitions and multiple uses, mutation is incomparable with c-use, p-use and all-uses criteria with respect to the weaker subsumption relation [?]. This is true in particular for the class of mutation operators dened in the Mothra environment. On the other hand, in the same work, Wong has also demonstrated experimentally that for an interesting range of seeded faults, mutation dominates the fault detecting ability of dataow testing criteria [?], a result that appears to be dicult to reconcile with Figure 4 of [?] 4 Concluding Remarks It is not a far stretch to paraphrase Theorem 4 from [?] as follows: 7

6 Now let P 000 be the mutant of P in which y := x div 2 is replaced by TRAP and let P 0000 be the mutant in which y := x/2 is replaced by TRAP. Then D C=T = fx j C(x)g = D(P 000 ) and D C=F = fx jnot C(x)g = D(P 0000 ). In other words any set of limited mutation operators that includes (3) properly covers branch testing for this program. In particular, if S is any specication for P then M(limited mutation; P; S) M(decision; P; S) and E(limited mutation; P; S) E(decision; P; S). Therefore, Frankl-Weyuker's proof is incorrect, since there are sets of mutation operators that obviously universally cover branch testing. As Frankl-Weyuker hint, mutation testing limited to operators (1)-(3) is sucient to properly cover branch testing for any structured program P. This, of course, does not help if the program contains control transfers like BREAK or GOTO that allow conditional backward control transfers into THEN or ELSE branches of decisions or into the body of a loop. Historically, this problem was especially severe in early mutation testing tools [?,?,?] which processed Fortran II, Fortran IV and Cobol. It was solved by adding a variant of (3) to the list of mutation operators: (3') replace each conditional control transfer point by TRAP. When (3') is applied in Fortran DO loops, for example, it insures that each loop is traversed exactly once. When applied to the THEN clause of an IF statement it produces a mutant containing THEN TRAP which can be distinguished only if the controlling boolean expression evaluates to true. By the same token when applied to the ELSE clause of an IF statement, it produces a mutant is distinguished only when the controlling expression evaluates to false. Thus, for any pair of subdomains D C=T and D C=F where C controls a conditional statement of the form if C then... else... there are mutants resulting from the application of (3') which have D C=T and D C=F as subdomains. We therefore have the following theorem: Theorem 1 Let MO be any set of mutation operators containing (3') and let mutation represent the mutation-adequacy criterion relative to MO, then (i) mutation universally covers branch testing, and (ii) for any program-specication pair (P, S), we have M(mutation,P,S) M(decision,P,S), and E(mutation,P,S) E(decision,P,S). The somewhat inelegant formulation of (3') given above was rened in the EXPER system [?] as a pair of operators that take a boolean expression as an argument and are distinguished exactly when the expression evaluates to true and false, respectively. As successive generations 6

7 refer to mutation testing with only these two operators." As we see below this assumption is incorrect. When coupled with a corresponding misunderstanding of mutation testing itself, it leads the authors to both the following claim (Theorem 4 in [?]): \Limited mutation testing does not universally cover decision-coverage." and its Corollary (Example 3 in [?]): \There is a program-specication pair P and S such that 0 = M(mutation; P; S) < M (decision; P; S) and 0 = E(mutation; P; S) < E (decision; P; S)." Let us rst describe the specic error that invalidates the proofs of these results: it is incorrect that only the operators (1) and (2) above are directly related to branch testing. As Budd explicitly points out in [?] and has been armed in several studies since then [?,?,?,?,?] it is the combination of operators that is important. In [?] for example, Budd's intent was to describe a mutation analysis that included (1) and (2), not one that was limited to just these two. To see why this is important, consider the following mutation operator that has been a member of every MO of which we are aware: (3) replace a statement by TRAP where TRAP is a special statement that upon execution causes the mutant to be distinguished immediately. As described in [?], and several other places, the TRAP mutations are used to insure statement coverage. Since it is not possible to insure branch coverage and exclude statement coverage, it seems to us that (3) is directly related to branch coverage. So let us assume that limited mutation includes (3) (at the very least including (3) seems no more arbitrary than excluding it). The proof of Frankl-Weyuker's claim hinges on constructing the following program P containing a decision C such that the even elements of D C=T and D C=F are excluded from the mutation subdomains: var x: integer; y: real; begin read(x); if C(x) then y := x div 2 else y := x/2; write(y); end; 5

8 Theorems (1) and (2) in [?] state that if C1 properly covers C2 with respect to program P and specication S then M(C1; P; S) M(C2; P; S) and E(C1; P; S) E(C2; P; S). This notion is contrasted with the somewhat weaker concept of subsumption of C2 by C1 which occurs when satisfaction of C2 implies satisfaction of C1. As Frankl-Weyuker point out, the fact that a criterion C1 subsumes C2 does not necessarily imply that C1 has greater fault detecting ability. 2 Mutation Testing and Decision Coverage Frankl-Weyuker use more or less standard denitions of mutation adequate test coverage and decision coverage. A mutant of a program P is a variant of P dened by applying exactly one mutation operator to P [?] at exactly one point. Each mutation operator is a rule for making a simple syntactic transformation of P. A test set satises a mutation criterion relative to a set of mutation operators MO if it distinguishes P from all non-equivalent mutants of P that can be formed using MO. In practice, a \standard" (but language dependent) set of mutation operators is supplied by a mutation testing tool [?,?,?,?]. In these cases explicit reference to MO is omitted. Mathur, Wong [?], as well as Outt and his colleagues [?] have recently begun to explore the eects of various schemes for selecting subsets of MO. Mutation testing can be easily seen to be a subdomain-based criterion by dening for each mutant program m the subdomain fx j P (x) 6= m(x)g. Decision coverage corresponds to simple decision-to-decision branch coverage, a common structural test coverage criterion [?,?]. The subdomains for decision coverage consist for each program decision controlled by a predicate p(x), the set of all input values t that cause p(x) to evaluate to true at some point during program execution (denoted D p=t ) and the set of all input values t that cause p(x) to evaluate to false at some point during program execution (denoted D p=f ). As a single input t can cause p to evaluate to true and at some later point during execution to evaluate to false, D p=t and D p=f are not necessarily disjoint. We follow [?] and use the terms decision coverage and branch testing interchangeably. Frankl-Weyuker in [?] recall an observation due to Budd [?], if MO includes: (1) replace a decision by true (2) replace a decision by false then mutation testing subsumes decision coverage. From this, Frankl-Weyuker conclude that limiting mutation to just these operators would result in an interesting comparison under M and E and justify the denition of limited mutation as follows: \Since these are the only mutation operators that are directly relevant to branch testing, we will use the term limited mutation to 4

9 derstanding or other inadvertent misuse of one of the mutation operators, the eect is clear: Frankl-Weyuker have set up a straw-man testing criterion specically to support a desired result. The remainder of this note will be devoted to establishing our claims. We will conclude with some observations on the feasibility of the Frankl-Weyuker hierarchy. 1 The Frankl-Weyuker Model We assume as in [?] a suitable denition of test criteria C, programs P and specications S. In particular, we assume standard notions for determining whether or not P is correct with respect to S for a given input called a test case, whether or not a set of test cases satisfy the criterion C and whether or not a fault that for a given input causes P to be incorrect with respect to S. Inputs that satisfy this latter condition are said to be failure-causing. Finally, we assume as in [?] that each candidate criterion C denes a multiset, say SD C (P,S ), of not necessarily disjoint subsets of P 's domain called subdomains. Subdomains have the property that C can only be satised by test sets whose intersection with each of the subdomains is nonempty. Now, let C, P, and S be xed and for each subdomain D i induced on the domain of P, d i =j D i j and m i =j fx j x in D i and x causes a failure in P with respect to Sg j, then dene: and ny M(C; P; S) = 1 0 (1 m i 0 ) (1) i=1 d i nx E(C; P; S) = i=1 m i d i (2) M(C,P,S ) is the probability that a test set satisfying C induces at least one failure when test cases are chosen randomly from each subdomain induced by C. Frankl-Weyuker call E(C,P,S ) the expected number of failures detected by C with respect to P and S. 2 The authors use the notion of proper coverage of criterion C2 by criterion C1 as the basis for their hierarchy cased in M and E. Roughly speaking C1 properly covers C2 with respect to P and S just in case each subdomain of SD C2 (P; S ) can be written as a union in SD C1(P; S) so that the multiplicity of no subdomain of C1 is increased. If C1 properly covers C2 for every program-specication pair (P; S) then C1 is said to universally properly cover C2. 2 It is not entirely clear why the authors view Equation (??), which is clearly a sum of ratios, as the expected number of failures detected. This confusion with terminology, however, does not aect their results. 3

10 to establish that mutation testing is less eective than branch testing in terms of its ability to detect faults. Using arguments presented below we claim that any reasonable interpretation of the Frankl- Weyuker's result can be invalidated by simple counter-examples. The collapse of one segment of their hierarchy does not invalidate the remainder of the results. It does, however, cast considerable doubt on its signicance. Frankl-Weyuker initially frame their comparison narrowly in terms of a mutation criterion which appears to have been invented especially for their work. They refer to this criterion as limited mutation. We are not aware of any literature on limited mutation prior to the Frankl- Weyuker's work. After establishing their comparison for limited mutation, the authors go on to conjecture that their hierarchy results obtain for all extensions of limited mutation, including those criteria studied in the past [?,?,?,?,?,?,?,?,?,?,?]. In particular, Frankl-Weyuker claim that \...most mutation operators proposed in the literature do not necessarily lead to proper coverage of branch testing." They go on to make the following conjecture: \We therefore believe that, even with the addition of other mutation operators, it will be possible to construct programs for which mutation is less likely to detect faults than branch testing...". The claim and conjecture are both false. Furthermore since they essentially identify the eectiveness of a set of mutation operators with the least powerful operator in the set, they, when taken together, indicate a misunderstanding of the way in which mutation analysis is used to test programs. At various points in their work (such as in the abstract) the appellation limited is dropped from the exposition. Casual readers are thus left with the impression that a provable hierarchy of fault detecting ability has been established in which mutation testing is less eective than branch testing. As will be shown below, this impression is based on a false assumption and leads to conclusions that are contradicted by experimental and analytical results. Not only is their specic result concerning limited mutation ill-formulated, it can be shown that no reasonable interpretation of Frankl-Weyuker's broad and completely unsupported speculation can be true since mutation testing has, since its rst introduction in 1976 [?], incorporated mutation operators that include branch coverage as a special case. Even more importantly, recent results by one of us [?,?] demonstrate: (1) a provable incomparability between mutation testing and the all-uses criterion, and (2) the superiority of mutation testing, as demonstrated experimentally, in the fault detecting arena studied by Frankl and Weyuker. While it is unclear from [?] whether or not this particular error resulted from a misun- 2

11 Some Critical Remarks on a Hierarchy of the Fault-Detecting Ability of Test Methods 3 Richard A. DeMillo, Aditya P. Mathur, and W. Eric Wong September 28, 1994 Abstract In a recent article Frankl and Weyuker report results that appear to establish a hierarchy of abilities of software testing methods to detect faults. A key result of this hierarchy is a relationship between decision coverage and mutation testing, a fault-based testing criterion, that appears to establish that mutation testing is less eective than branch testing in terms of its ability to detect faults. In this note we argue that any reasonable interpretation of this result can be invalidated by simple counter-examples. In a recent article [?], Frankl and Weyuker report results that appear to establish a hierarchy of abilities of software testing methods to detect faults. 1 The methods used by Frankl-Weyuker to obtain this hierarchy constitute a new and important addition to their arsenal of tools aimed at establishing simple, useful comparisons of test data generation methods. This is the latest step in an ambitious classication programme undertaken by the authors of [?] collaborators (see e.g., [?,?,?]). and their A signicant aspect of the Frankl-Weyuker method is the utilization of a probabilistic measure of test eectiveness intended to support a model of test selection that is \well-dened, not obviously biased in some criterion's favor and not too far from reality." [?]. Such a hierarchy, if valid, would be of great theoretical interest since it would (as the title of [?] suggests) establish a provable ordering of test criteria based on the inherent and universal properties of the criteria and not some artifact related to how the criteria might be applied in practice. A key result of Frankl-Weyuker's hierarchy is a relationship between decision coverage and mutation testing, a fault-based testing criterion, (see e.g., [?] for a recent survey) that appears 3 Richard A. DeMillo is the Director of Software Engineering Research Center, Department of Computer Sciences, Purdue University. He is aliated with the Dipartimento di Elettronica e Informatica, University of Padova, Padova, Italy on his sabbatical leave until July Aditya P. Mathur is an associate professor at the Department of Computer Sciences, Purdue University. W. Eric Wong is a member of technical sta at the Department of Software Technology, Hughes Network Systems, Germantown, MD Unless specied otherwise all our references to Frankl-Weyuker are references to their work reported in [?]. 1

TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING

TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING TEST CASE EFFECTIVENESS OF HIGHER ORDER MUTATION TESTING Shalini Kapoor CSE Deptt, GNI, Mullana get_shalini@rediffmail.com Abstract--- Effectiveness means how good a test case is in finding faults. Traditional

More information

Eect of Test Set Size and Block Coverage on the. Fault Detection Eectiveness. W. Eric Wong, Joseph R. Horgan, Saul London, and Aditya P.

Eect of Test Set Size and Block Coverage on the. Fault Detection Eectiveness. W. Eric Wong, Joseph R. Horgan, Saul London, and Aditya P. Eect of Test Set Size and Block Coverage on the Fault Detection Eectiveness W Eric Wong, Joseph R Horgan, Saul London, and Aditya P Mathur April 27, 1994 Abstract Size and code coverage are two important

More information

Incremental Regression Testing. Hiralal Agrawal. Joseph R. Horgan. Edward W. Krauser. Saul A. London. Bellcore. 445 South Street. Morristown, NJ 07960

Incremental Regression Testing. Hiralal Agrawal. Joseph R. Horgan. Edward W. Krauser. Saul A. London. Bellcore. 445 South Street. Morristown, NJ 07960 Incremental Regression Testing Hiralal Agrawal Joseph R. Horgan Edward W. Krauser Saul A. London Bellcore 445 South Street Morristown, NJ 07960 fhira,jrh,ewk,saulg@bellcore.com Abstract The purpose of

More information

Formal Approach in Software Testing

Formal Approach in Software Testing Formal Approach in Software Testing #Abhishek Dixit, #Shivani Goel 1 csed, TIET biodatadixit@yahoo.co.in 2 csed, TIET shivani@tiet.ac.in Abstract Testing is an important activity for checking the correctness

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Algorithms for Learning and Teaching. Sets of Vertices in Graphs. Patricia A. Evans and Michael R. Fellows. University of Victoria

Algorithms for Learning and Teaching. Sets of Vertices in Graphs. Patricia A. Evans and Michael R. Fellows. University of Victoria Algorithms for Learning and Teaching Sets of Vertices in Graphs Patricia A. Evans and Michael R. Fellows Department of Computer Science University of Victoria Victoria, B.C. V8W 3P6, Canada Lane H. Clark

More information

Solve the Data Flow Problem

Solve the Data Flow Problem Gaining Condence in Distributed Systems Gleb Naumovich, Lori A. Clarke, and Leon J. Osterweil University of Massachusetts, Amherst Computer Science Department University of Massachusetts Amherst, Massachusetts

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

of m clauses, each containing the disjunction of boolean variables from a nite set V = fv 1 ; : : : ; vng of size n [8]. Each variable occurrence with

of m clauses, each containing the disjunction of boolean variables from a nite set V = fv 1 ; : : : ; vng of size n [8]. Each variable occurrence with A Hybridised 3-SAT Algorithm Andrew Slater Automated Reasoning Project, Computer Sciences Laboratory, RSISE, Australian National University, 0200, Canberra Andrew.Slater@anu.edu.au April 9, 1999 1 Introduction

More information

A Nim game played on graphs II

A Nim game played on graphs II Theoretical Computer Science 304 (2003) 401 419 www.elsevier.com/locate/tcs A Nim game played on graphs II Masahiko Fukuyama Graduate School of Mathematical Sciences, University of Tokyo, 3-8-1 Komaba,

More information

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD

Localization in Graphs. Richardson, TX Azriel Rosenfeld. Center for Automation Research. College Park, MD CAR-TR-728 CS-TR-3326 UMIACS-TR-94-92 Samir Khuller Department of Computer Science Institute for Advanced Computer Studies University of Maryland College Park, MD 20742-3255 Localization in Graphs Azriel

More information

Clemson University. January 21, Abstract. The Godzilla automatic test data generator is an integrated collection of tools that implements a

Clemson University. January 21, Abstract. The Godzilla automatic test data generator is an integrated collection of tools that implements a An Integrated Automatic Test Data Generation System A. Jeerson Outt Department of Computer Science Clemson University Clemson, SC 29634 January 21, 1996 Abstract The Godzilla automatic test data generator

More information

We dene the fault revealing ability of a test case to be a measure of the likelihood that the test case will produce a failure if a fault were to exis

We dene the fault revealing ability of a test case to be a measure of the likelihood that the test case will produce a failure if a fault were to exis The Revealing Power of a Test Case Jerey M. Voas y Keith W. Miller z Abstract \Propagation, infection, and execution analysis" (termed PIE) is used for predicting where faults can more easily hide in software.

More information

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations. A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department

More information

Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C

Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of C Optimum Alphabetic Binary Trees T. C. Hu and J. D. Morgenthaler Department of Computer Science and Engineering, School of Engineering, University of California, San Diego CA 92093{0114, USA Abstract. We

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

Constraint-Based Automatic Test Data Generation. Department of Computer Science Clemson University. February 21, Abstract

Constraint-Based Automatic Test Data Generation. Department of Computer Science Clemson University. February 21, Abstract Constraint-Based Automatic Test Data Generation Richard A. DeMillo Software Engineering Research Center Department of Computer Sciences Purdue University West Lafayette, IN 47907 A. Jeerson Outt Department

More information

Exact Algorithms Lecture 7: FPT Hardness and the ETH

Exact Algorithms Lecture 7: FPT Hardness and the ETH Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,

More information

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst An Evaluation of Information Retrieval Accuracy with Simulated OCR Output W.B. Croft y, S.M. Harding y, K. Taghva z, and J. Borsack z y Computer Science Department University of Massachusetts, Amherst

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

Dataflow-based Coverage Criteria

Dataflow-based Coverage Criteria Dataflow-based Coverage Criteria W. Eric Wong Department of Computer Science The University of Texas at Dallas ewong@utdallas.edu http://www.utdallas.edu/~ewong Dataflow-based Coverage Criteria ( 2012

More information

Class-Component Testability Analysis

Class-Component Testability Analysis Class-Component Testability Analysis SUPAPORN KANSOMKEAT Faculty of Engineering, Chulalongkorn University Bangkok, 10330, THAILAND WANCHAI RIVEPIBOON Faculty of Engineering, Chulalongkorn University Bangkok,

More information

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis 1

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis 1 ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis 1 Jeremy S. Bradbury, James R. Cordy, Juergen Dingel School of Computing, Queen s University Kingston, Ontario, Canada {bradbury,

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Extending Mutation Testing to Find Environmental Bugs *

Extending Mutation Testing to Find Environmental Bugs * Extending Mutation Testing to Find Environmental Bugs * Technical Report SER-TR-21-P Eugene H. Spafford Software Engineering Research enter Department of omputer Sciences Purdue University W. Lafayette,

More information

An Improved Upper Bound for the Sum-free Subset Constant

An Improved Upper Bound for the Sum-free Subset Constant 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin

More information

Generating Minimal Fault Detecting Test Suites for General Boolean Specications

Generating Minimal Fault Detecting Test Suites for General Boolean Specications Generating Minimal Fault Detecting Test Suites for General Boolean Specications Angelo Gargantini a,, Gordon Fraser b a Dip. di Ing. dell'informazione e Metodi Mat., University of Bergamo, Dalmine, Italy

More information

Issues in Testing Distributed Component-Based. Systems. Sudipto Ghosh. Aditya P. Mathur y. Software Engineering Research Center

Issues in Testing Distributed Component-Based. Systems. Sudipto Ghosh. Aditya P. Mathur y. Software Engineering Research Center Issues in Testing Distributed Component-Based Systems Sudipto Ghosh Aditya P. Mathur y Software Engineering Research Center 1398 Department of Computer Sciences Purdue University West Lafayette, IN 47907

More information

ON SOFTWARE TESTING AND SUBSUMING MUTANTS An empirical study. Master Degree Project in Computer Science Advanced level 15 credits Spring term 2014

ON SOFTWARE TESTING AND SUBSUMING MUTANTS An empirical study. Master Degree Project in Computer Science Advanced level 15 credits Spring term 2014 ON SOFTWARE TESTING AND SUBSUMING MUTANTS An empirical study Master Degree Project in Computer Science Advanced level 15 credits Spring term 2014 András Márki Supervisor: Birgitta Lindström Examiner: Gunnar

More information

Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University

Hyperplane Ranking in. Simple Genetic Algorithms. D. Whitley, K. Mathias, and L. Pyeatt. Department of Computer Science. Colorado State University Hyperplane Ranking in Simple Genetic Algorithms D. Whitley, K. Mathias, and L. yeatt Department of Computer Science Colorado State University Fort Collins, Colorado 8523 USA whitley,mathiask,pyeatt@cs.colostate.edu

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

6. Concluding Remarks

6. Concluding Remarks [8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

More information

if for every induced subgraph H of G the chromatic number of H is equal to the largest size of a clique in H. The triangulated graphs constitute a wid

if for every induced subgraph H of G the chromatic number of H is equal to the largest size of a clique in H. The triangulated graphs constitute a wid Slightly Triangulated Graphs Are Perfect Frederic Maire e-mail : frm@ccr.jussieu.fr Case 189 Equipe Combinatoire Universite Paris 6, France December 21, 1995 Abstract A graph is triangulated if it has

More information

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have been red in the sequence up to and including v i (s) is deg(v)? s(v), and by the induction hypothesis this sequence

More information

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AUTOMATIC TEST CASE GENERATION FOR PERFORMANCE ENHANCEMENT OF SOFTWARE THROUGH GENETIC ALGORITHM AND RANDOM TESTING Bright Keswani,

More information

On a conjecture of Keedwell and the cycle double cover conjecture

On a conjecture of Keedwell and the cycle double cover conjecture Discrete Mathematics 216 (2000) 287 292 www.elsevier.com/locate/disc Note On a conjecture of Keedwell and the cycle double cover conjecture M. Mahdian, E.S. Mahmoodian, A. Saberi, M.R. Salavatipour, R.

More information

For the hardest CMO tranche, generalized Faure achieves accuracy 10 ;2 with 170 points, while modied Sobol uses 600 points. On the other hand, the Mon

For the hardest CMO tranche, generalized Faure achieves accuracy 10 ;2 with 170 points, while modied Sobol uses 600 points. On the other hand, the Mon New Results on Deterministic Pricing of Financial Derivatives A. Papageorgiou and J.F. Traub y Department of Computer Science Columbia University CUCS-028-96 Monte Carlo simulation is widely used to price

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

Graphical Models. David M. Blei Columbia University. September 17, 2014

Graphical Models. David M. Blei Columbia University. September 17, 2014 Graphical Models David M. Blei Columbia University September 17, 2014 These lecture notes follow the ideas in Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. In addition,

More information

An Empirical Evaluation of Test Adequacy Criteria for Event-Driven Programs

An Empirical Evaluation of Test Adequacy Criteria for Event-Driven Programs An Empirical Evaluation of Test Adequacy Criteria for Event-Driven Programs Jaymie Strecker Department of Computer Science University of Maryland College Park, MD 20742 November 30, 2006 Abstract In model-based

More information

A Visualization Program for Subset Sum Instances

A Visualization Program for Subset Sum Instances A Visualization Program for Subset Sum Instances Thomas E. O Neil and Abhilasha Bhatia Computer Science Department University of North Dakota Grand Forks, ND 58202 oneil@cs.und.edu abhilasha.bhatia@my.und.edu

More information

Gen := 0. Create Initial Random Population. Termination Criterion Satisfied? Yes. Evaluate fitness of each individual in population.

Gen := 0. Create Initial Random Population. Termination Criterion Satisfied? Yes. Evaluate fitness of each individual in population. An Experimental Comparison of Genetic Programming and Inductive Logic Programming on Learning Recursive List Functions Lappoon R. Tang Mary Elaine Cali Raymond J. Mooney Department of Computer Sciences

More information

Lecture 1 Contracts. 1 A Mysterious Program : Principles of Imperative Computation (Spring 2018) Frank Pfenning

Lecture 1 Contracts. 1 A Mysterious Program : Principles of Imperative Computation (Spring 2018) Frank Pfenning Lecture 1 Contracts 15-122: Principles of Imperative Computation (Spring 2018) Frank Pfenning In these notes we review contracts, which we use to collectively denote function contracts, loop invariants,

More information

The Basics of Graphical Models

The Basics of Graphical Models The Basics of Graphical Models David M. Blei Columbia University September 30, 2016 1 Introduction (These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan.

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Requirements satisfied : Result Vector : Final : Matrix M. Test cases. Reqmts

Requirements satisfied : Result Vector : Final : Matrix M. Test cases. Reqmts Introduction Control flow/data flow widely studied No definitive answer to effectiveness Not widely accepted Quantitative measure of adequacy criteria Effectiveness Whether cost of testing methods is justified

More information

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis Technical Report 2006-519 Jeremy S. Bradbury, James R. Cordy, Juergen Dingel School of Computing, Queen s University Kingston,

More information

Finding a winning strategy in variations of Kayles

Finding a winning strategy in variations of Kayles Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

AUTOMATIC TEST DATA GENERATION USING DATA FLOW INFORMATION

AUTOMATIC TEST DATA GENERATION USING DATA FLOW INFORMATION AUTOMATIC TEST DATA GENERATION USING DATA FLOW INFORMATION Abdelaziz Khamis Dept of Comp. & Inf. Sciences, Cairo University Reem Bahgat Dept of Computer Science, Cairo University Rana Abdelaziz Dept of

More information

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong.

Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee. The Chinese University of Hong Kong. Algebraic Properties of CSP Model Operators? Y.C. Law and J.H.M. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR, China fyclaw,jleeg@cse.cuhk.edu.hk

More information

APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES

APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES APPLICATION OF THE FUZZY MIN-MAX NEURAL NETWORK CLASSIFIER TO PROBLEMS WITH CONTINUOUS AND DISCRETE ATTRIBUTES A. Likas, K. Blekas and A. Stafylopatis National Technical University of Athens Department

More information

A Note on Fairness in I/O Automata. Judi Romijn and Frits Vaandrager CWI. Abstract

A Note on Fairness in I/O Automata. Judi Romijn and Frits Vaandrager CWI. Abstract A Note on Fairness in I/O Automata Judi Romijn and Frits Vaandrager CWI P.O. Box 94079, 1090 GB Amsterdam, The Netherlands judi@cwi.nl, fritsv@cwi.nl Abstract Notions of weak and strong fairness are studied

More information

Lecture 5: The Halting Problem. Michael Beeson

Lecture 5: The Halting Problem. Michael Beeson Lecture 5: The Halting Problem Michael Beeson Historical situation in 1930 The diagonal method appears to offer a way to extend just about any definition of computable. It appeared in the 1920s that it

More information

size, runs an existing induction algorithm on the rst subset to obtain a rst set of rules, and then processes each of the remaining data subsets at a

size, runs an existing induction algorithm on the rst subset to obtain a rst set of rules, and then processes each of the remaining data subsets at a Multi-Layer Incremental Induction Xindong Wu and William H.W. Lo School of Computer Science and Software Ebgineering Monash University 900 Dandenong Road Melbourne, VIC 3145, Australia Email: xindong@computer.org

More information

Measuring the Effectiveness of Method Test Sequences Derived from Sequencing Constraints

Measuring the Effectiveness of Method Test Sequences Derived from Sequencing Constraints Measuring the Effectiveness of Method Test Sequences Derived from Sequencing Constraints F.J. Daniels Bell Laboratories fdaniels@lucent.com K.C. Tai North Carolina State University kct@csc.ncsu.edu Abstract

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences

An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences Theory and Applications of Graphs Volume 5 Issue 2 Article 2 July 2018 An Efficient Algorithm to Test Forciblyconnectedness of Graphical Degree Sequences Kai Wang Georgia Southern University, kwang@georgiasouthern.edu

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

Theoretical Foundations of SBSE. Xin Yao CERCIA, School of Computer Science University of Birmingham

Theoretical Foundations of SBSE. Xin Yao CERCIA, School of Computer Science University of Birmingham Theoretical Foundations of SBSE Xin Yao CERCIA, School of Computer Science University of Birmingham Some Theoretical Foundations of SBSE Xin Yao and Many Others CERCIA, School of Computer Science University

More information

ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES. Nikolay Kosovskiy

ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES. Nikolay Kosovskiy International Journal Information Theories and Applications, Vol. 20, Number 2, 2013 131 ALGORITHMIC DECIDABILITY OF COMPUTER PROGRAM-FUNCTIONS LANGUAGE PROPERTIES Nikolay Kosovskiy Abstract: A mathematical

More information

Critique for CS 448B: Topics in Modeling The Voronoi-clip Collision Detection Algorithm

Critique for CS 448B: Topics in Modeling The Voronoi-clip Collision Detection Algorithm Critique for CS 448B: Topics in Modeling The Voronoi-clip Collision Detection Algorithm 1. Citation Richard Bragg March 3, 2000 Mirtich B. (1997) V-Clip: Fast and Robust Polyhedral Collision Detection.

More information

Framework for Design of Dynamic Programming Algorithms

Framework for Design of Dynamic Programming Algorithms CSE 441T/541T Advanced Algorithms September 22, 2010 Framework for Design of Dynamic Programming Algorithms Dynamic programming algorithms for combinatorial optimization generalize the strategy we studied

More information

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction

Rearrangement of DNA fragments: a branch-and-cut algorithm Abstract. In this paper we consider a problem that arises in the process of reconstruction Rearrangement of DNA fragments: a branch-and-cut algorithm 1 C. E. Ferreira 1 C. C. de Souza 2 Y. Wakabayashi 1 1 Instituto de Mat. e Estatstica 2 Instituto de Computac~ao Universidade de S~ao Paulo e-mail:

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

Automatically Detecting Equivalent Mutants and Infeasible Paths. Mail Stop C204. phone: October 6, Abstract

Automatically Detecting Equivalent Mutants and Infeasible Paths. Mail Stop C204. phone: October 6, Abstract Automatically Detecting Equivalent Mutants and Infeasible Paths A. Jeerson Outt ISSE Department George Mason University Fairfax, VA 22030 phone: 703-993-1654 fax: 703-993-1638 email: ofut@isse.gmu.edu

More information

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1

Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanfordedu) February 6, 2018 Lecture 9 - Matrix Multiplication Equivalences and Spectral Graph Theory 1 In the

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

1 Introduction Testing seeks to reveal software faults by executing a program and comparing the output expected to the output produced. Exhaustive tes

1 Introduction Testing seeks to reveal software faults by executing a program and comparing the output expected to the output produced. Exhaustive tes Using Dynamic Sensitivity Analysis to Assess Testability Jerey Voas, Larry Morell y, Keith Miller z Abstract: This paper discusses sensitivity analysis and its relationship to random black box testing.

More information

Lecture 1 Contracts : Principles of Imperative Computation (Fall 2018) Frank Pfenning

Lecture 1 Contracts : Principles of Imperative Computation (Fall 2018) Frank Pfenning Lecture 1 Contracts 15-122: Principles of Imperative Computation (Fall 2018) Frank Pfenning In these notes we review contracts, which we use to collectively denote function contracts, loop invariants,

More information

On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

More information

Labelling Wheels for Minimum Sum Number. William F. SMYTH. Abstract. A simple undirected graph G is called a sum graph if there exists a

Labelling Wheels for Minimum Sum Number. William F. SMYTH. Abstract. A simple undirected graph G is called a sum graph if there exists a Labelling Wheels for Minimum Sum Number Mirka MILLER Department of Computer Science University of Newcastle, NSW 308, Australia e-mail: mirka@cs.newcastle.edu.au SLAMIN Department of Computer Science University

More information

Adaptive Estimation of Distributions using Exponential Sub-Families Alan Gous Stanford University December 1996 Abstract: An algorithm is presented wh

Adaptive Estimation of Distributions using Exponential Sub-Families Alan Gous Stanford University December 1996 Abstract: An algorithm is presented wh Adaptive Estimation of Distributions using Exponential Sub-Families Alan Gous Stanford University December 1996 Abstract: An algorithm is presented which, for a large-dimensional exponential family G,

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

PCP and Hardness of Approximation

PCP and Hardness of Approximation PCP and Hardness of Approximation January 30, 2009 Our goal herein is to define and prove basic concepts regarding hardness of approximation. We will state but obviously not prove a PCP theorem as a starting

More information

arxiv:cs/ v1 [cs.dl] 11 Feb 1999

arxiv:cs/ v1 [cs.dl] 11 Feb 1999 arxiv:cs/9902023v1 [cs.dl] 11 Feb 1999 A New Ranking Principle for Multimedia Information Retrieval Martin Wechsler, Peter Schäuble Eurospider Information Technology AG, Zürich www.eurospider.com Abstract

More information

What is Mutation Testing? Mutation Testing. Test Case Adequacy. Mutation Testing. Mutant Programs. Example Mutation

What is Mutation Testing? Mutation Testing. Test Case Adequacy. Mutation Testing. Mutant Programs. Example Mutation What is Mutation Testing? Mutation Testing Breaking the application to test it n Mutation Testing is a testing technique that focuses on measuring the adequacy of test cases n Mutation Testing is NOT a

More information

detected inference channel is eliminated by redesigning the database schema [Lunt, 1989] or upgrading the paths that lead to the inference [Stickel, 1

detected inference channel is eliminated by redesigning the database schema [Lunt, 1989] or upgrading the paths that lead to the inference [Stickel, 1 THE DESIGN AND IMPLEMENTATION OF A DATA LEVEL DATABASE INFERENCE DETECTION SYSTEM Raymond W. Yip and Karl N. Levitt Abstract: Inference is a way tosubvert access control mechanisms of database systems.

More information

Enumeration of Full Graphs: Onset of the Asymptotic Region. Department of Mathematics. Massachusetts Institute of Technology. Cambridge, MA 02139

Enumeration of Full Graphs: Onset of the Asymptotic Region. Department of Mathematics. Massachusetts Institute of Technology. Cambridge, MA 02139 Enumeration of Full Graphs: Onset of the Asymptotic Region L. J. Cowen D. J. Kleitman y F. Lasaga D. E. Sussman Department of Mathematics Massachusetts Institute of Technology Cambridge, MA 02139 Abstract

More information

The External Network Problem

The External Network Problem The External Network Problem Jan van den Heuvel and Matthew Johnson CDAM Research Report LSE-CDAM-2004-15 December 2004 Abstract The connectivity of a communications network can often be enhanced if the

More information

Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem

Genetic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem etic Algorithm Performance with Different Selection Methods in Solving Multi-Objective Network Design Problem R. O. Oladele Department of Computer Science University of Ilorin P.M.B. 1515, Ilorin, NIGERIA

More information

loop m=5 d:m=x+y loop wait post u:z=3*m 7 20 end end

loop m=5 d:m=x+y loop wait post u:z=3*m 7 20 end end All-uses Testing of Shared Memory Parallel Programs Cheer-Sun D. Yang Lori L. Pollock Computer Science Department Computer and Information Sciences West Chester University of PA University of Delaware

More information

Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming

Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming Höllische Programmiersprachen Hauptseminar im Wintersemester 2014/2015 Determinism and reliability in the context of parallel programming Raphael Arias Technische Universität München 19.1.2015 Abstract

More information

Symmetric Product Graphs

Symmetric Product Graphs Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-20-2015 Symmetric Product Graphs Evan Witz Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

Distributed Objects with Sense of Direction

Distributed Objects with Sense of Direction Distributed Objects with Sense of Direction G. V. BOCHMANN University of Ottawa P. FLOCCHINI Université de Montréal D. RAMAZANI Université de Montréal Introduction An object system consists of a collection

More information

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

More information

Test Case Selection and Adequacy

Test Case Selection and Adequacy Chapter 9 Test Case Selection and Adequacy A key problem in software testing is selecting and evaluating test cases. This chapter introduces basic approaches to test case selection and corresponding adequacy

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

A new analysis technique for the Sprouts Game

A new analysis technique for the Sprouts Game A new analysis technique for the Sprouts Game RICCARDO FOCARDI Università Ca Foscari di Venezia, Italy FLAMINIA L. LUCCIO Università di Trieste, Italy Abstract Sprouts is a two players game that was first

More information

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

More information

An Anonymous Self-Stabilizing Algorithm For 1-Maximal Matching in Trees

An Anonymous Self-Stabilizing Algorithm For 1-Maximal Matching in Trees An Anonymous Self-Stabilizing Algorithm For 1-Maximal Matching in Trees Wayne Goddard, Stephen T. Hedetniemi Department of Computer Science, Clemson University {goddard,hedet}@cs.clemson.edu Zhengnan Shi

More information

MATH 682 Notes Combinatorics and Graph Theory II

MATH 682 Notes Combinatorics and Graph Theory II 1 Matchings A popular question to be asked on graphs, if graphs represent some sort of compatability or association, is how to associate as many vertices as possible into well-matched pairs. It is to this

More information

Software Testing. 1. Testing is the process of demonstrating that errors are not present.

Software Testing. 1. Testing is the process of demonstrating that errors are not present. What is Testing? Software Testing Many people understand many definitions of testing :. Testing is the process of demonstrating that errors are not present.. The purpose of testing is to show that a program

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

SAT solver of Howe & King as a logic program

SAT solver of Howe & King as a logic program SAT solver of Howe & King as a logic program W lodzimierz Drabent June 6, 2011 Howe and King [HK11b, HK11a] presented a SAT solver which is an elegant and concise Prolog program of 22 lines. It is not

More information

Provably Efficient Non-Preemptive Task Scheduling with Cilk

Provably Efficient Non-Preemptive Task Scheduling with Cilk Provably Efficient Non-Preemptive Task Scheduling with Cilk V. -Y. Vee and W.-J. Hsu School of Applied Science, Nanyang Technological University Nanyang Avenue, Singapore 639798. Abstract We consider the

More information

CS103 Spring 2018 Mathematical Vocabulary

CS103 Spring 2018 Mathematical Vocabulary CS103 Spring 2018 Mathematical Vocabulary You keep using that word. I do not think it means what you think it means. - Inigo Montoya, from The Princess Bride Consider the humble while loop in most programming

More information

Induction and Semantics in Dafny

Induction and Semantics in Dafny 15-414 Lecture 11 1 Instructor: Matt Fredrikson Induction and Semantics in Dafny TA: Ryan Wagner Encoding the syntax of Imp Recall the abstract syntax of Imp: a AExp ::= n Z x Var a 1 + a 2 b BExp ::=

More information