1997
DOI: 10.1002/(sici)1096-908x(199707/08)9:4<217::aid-smr152>3.0.co;2-2
|View full text |Cite
|
Sign up to set email alerts
|

A technique for the selective revalidation of OO software

Abstract: The object‐orientated paradigm provides the power for software development but at the same time introduces some brand new problems. One of these problems is that the relationships among classes are more complex and difficult to identify than those in the traditional paradigm. This problem becomes a major obstacle for regression testing of OO software, in which the relationships among classes as well as those between test cases and classes, must be determined a priori. In this paper we propose a new method to s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

1999
1999
2017
2017

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(24 citation statements)
references
References 0 publications
0
23
0
1
Order By: Relevance
“…The second loop of Algorithm 1 (lines [13][14][15][16][17][18][19][20][21][22][23][24][25] iterates through the class and activity diagram differences. In the worst case, (1) every statement is represented as a separate action node, in the activity diagram, (2) all original nodes are modified/deleted, (3) all transition flows between all nodes are modified/deleted, (4) all constructors are modified/deleted, and (5) all fields in the class diagram are modified/deleted.…”
Section: Time Complexity For the Extended Martsmentioning
confidence: 99%
See 1 more Smart Citation
“…The second loop of Algorithm 1 (lines [13][14][15][16][17][18][19][20][21][22][23][24][25] iterates through the class and activity diagram differences. In the worst case, (1) every statement is represented as a separate action node, in the activity diagram, (2) all original nodes are modified/deleted, (3) all transition flows between all nodes are modified/deleted, (4) all constructors are modified/deleted, and (5) all fields in the class diagram are modified/deleted.…”
Section: Time Complexity For the Extended Martsmentioning
confidence: 99%
“…Firewall approaches [22,24,35] are based on the concept of defining the entities of the system that need to be retested, i.e., drawing a conceptual firewall around these entities. These approaches select all the test cases that exercise at least one entity from the firewall.…”
Section: Code-based Approachesmentioning
confidence: 99%
“…This technique is proposed by Kung [5], Hsia [6], Abdullah and White [7] and Jang [16]. It was originally given by Leung and White [17].…”
Section: Rts Technique For Object Oriented Programs 31 Firewall Techmentioning
confidence: 99%
“…A safe-regressiontest selection selects all the test cases that contain faults in the modified software [1]. Various selection techniques have been described for procedural languages[2,3,4], object oriented languages [5,6,7] and aspect oriented languages [8,9,10]. Aspect oriented programming is a way of modularizing the crosscutting concerns and aspect-J is an implementation of aspect oriented programming as in the same way java is a way of modularizing common concerns for object oriented programming.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of these techniques are presented in [5][6][7][8][9]. Also, object oriented firewall techniques have been proposed in [10]. Extended firewalls are proposed for Object Oriented Regression Testing in [11].…”
Section: Introductionmentioning
confidence: 99%