1989
DOI: 10.1109/32.41326
|View full text |Cite
|
Sign up to set email alerts
|

A formal evaluation of data flow path selection criteria

Abstract: A number of path selection criteria have been proposed throughout the years. Unfortunately, little work has been done on comparing these criteria. To determine what would be an effective path selection criterion for revealing errors in programs, we have undertaken an evaluation of these criteria. This paper reports on the results of our evaluation of path selection criteria based on data flow relationships. We show how these criteria relate to each other, thereby demonstrating some of their strengths and weakn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
98
0
6

Year Published

1995
1995
2012
2012

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 189 publications
(106 citation statements)
references
References 19 publications
2
98
0
6
Order By: Relevance
“…The ESG model of the example firewall rules is given in Figure 5. It can be seen in the figure that the node r 7 subsumes r 1 , r 6 subsumes r 2 , r 3 , r 4 and r 5 and r 8 subsumes r 6 , r 7 .…”
Section: Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…The ESG model of the example firewall rules is given in Figure 5. It can be seen in the figure that the node r 7 subsumes r 1 , r 6 subsumes r 2 , r 3 , r 4 and r 5 and r 8 subsumes r 6 , r 7 .…”
Section: Case Studymentioning
confidence: 99%
“…The studies based on data flow testing [7,8,10,11] have been restricted to testing data dependencies that exist within a procedure which requires information about the flow of data including calls and returns across procedure boundaries. Intra-procedural data flow tests focus on source code by building and searching program's def-use graph and determine the dependencies or definition use pairs.…”
Section: Related Workmentioning
confidence: 99%
“…Logical relationships among coverage measures have been derived statically in the form of subsumption hierarchies [6]. The dynamic characteristics of code coverage measures which are manifested upon code execution have also been examined by some researchers.…”
Section: Introductionmentioning
confidence: 99%
“…They analyze techniques based on their theoretical groundwork, studying the effectiveness of codebased [9], [10], [13], [19], [23], [24], [36], [37] Empirical studies without subjects aim to investigate techniques from the angle of practice and inductive reasoning by simulating technique application. They address different aspects of V&V techniques [27].…”
Section: Introductionmentioning
confidence: 99%