Detecting equivalent mutants and the feasible path problem
暂无分享,去创建一个
[1] William E. Howden,et al. Weak Mutation Testing and Completeness of Test Sets , 1982, IEEE Transactions on Software Engineering.
[2] Keith E. Williamson,et al. Test data generation and feasible path analysis , 1994, ISSTA '94.
[3] J. A. Acree. On mutation , 1980 .
[4] A. Jefferson Offutt,et al. Using compiler optimization techniques to detect equivalent mutants , 1994, Softw. Test. Verification Reliab..
[5] Vi Andrew Jefferson Offutt,et al. Automatic test data generation , 1988 .
[6] Jie Pan,et al. Using Constraints to Detect Equivalent Mutants , 1994 .
[7] Richard J. Lipton,et al. Hints on Test Data Selection: Help for the Practicing Programmer , 1978, Computer.
[8] Elaine J. Weyuker,et al. An Applicable Family of Data Flow Testing Criteria , 1988, IEEE Trans. Software Eng..
[9] Richard G. Hamlet,et al. Testing Programs with the Aid of a Compiler , 1977, IEEE Transactions on Software Engineering.
[10] R.A. DeMillo,et al. An extended overview of the Mothra software testing environment , 1988, [1988] Proceedings. Second Workshop on Software Testing, Verification, and Analysis.
[11] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[12] Douglas Baldwin,et al. Heuristics for Determining Equivalence of Program Mutations. , 1979 .
[13] Allen Goldberg,et al. Applications of feasible path analysis to program testing , 1994, ISSTA '94.
[14] A. Jefferson Offutt,et al. Constraint-Based Automatic Test Data Generation , 1991, IEEE Trans. Software Eng..
[15] Jeffrey M. Voas,et al. Predicting where faults can hide from testing , 1991, IEEE Software.
[16] A. Jefferson Offutt,et al. Mutation analysis using mutant schemata , 1993, ISSTA '93.
[17] Gregg Rothermel,et al. An experimental determination of sufficient mutant operators , 1996, TSEM.