2015
DOI: 10.1016/j.jss.2015.05.007
|View full text |Cite
|
Sign up to set email alerts
|

A UML model-based approach to detect infeasible paths

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 29 publications
0
3
0
1
Order By: Relevance
“…Instead of detecting one infeasible path at a time by examining path constraint, recognizing infeasible code pattern can detect a group of infeasible paths. e infeasible code pattern [4,44] can be extracted from empirical study on the common properties of infeasible paths. Paths containing infeasible code pattern can be reported as infeasible immediately.…”
Section: Static Techniquementioning
confidence: 99%
“…Instead of detecting one infeasible path at a time by examining path constraint, recognizing infeasible code pattern can detect a group of infeasible paths. e infeasible code pattern [4,44] can be extracted from empirical study on the common properties of infeasible paths. Paths containing infeasible code pattern can be reported as infeasible immediately.…”
Section: Static Techniquementioning
confidence: 99%
“…Modelbased approaches [10], [17] differ in terms of the model types they process and generate. Approaches targeting UML activity diagrams aim at identifying sequences of actions that satisfy certain properties, such as guaranteeing some form of structural coverage [18], [19] or exercising concurrent behaviors [20], [21]. Approaches that generate test cases directly from textual descriptions [16], [22]- [25] seek to minimize the use of models, by relying mostly on requirements specifications in natural language.…”
Section: Related Workmentioning
confidence: 99%
“…However, there are also some cases that do not follow any of the four proposed code patterns, and the prototype tool only implements a simple constant substitution for predicates with arithmetic and bitwise operations. Kundu et al [23] construct a graph model (called SIG), from which MM paths, execution sequences of model elements from the start to end of a method scope, are generated. Subsequently, they determine infeasibility of the MM paths by the Mutually Exclusive (MUX) and Null Reference Check (NLC) patterns.…”
Section: A Static Techniquementioning
confidence: 99%