2019
DOI: 10.1049/iet-sen.2018.5005
|View full text |Cite
|
Sign up to set email alerts
|

Adapting the elitism on greedy algorithm for variable strength combinatorial test cases generation

Abstract: A combinatorial testing (CT) is an important technique usually employed in the generation of test cases. The generation of an optimal sized test case is a non-deterministic polynomial hard problem. In recent times, many researchers had developed various strategies based on the search-based approach to address the CT issues. This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. Hence, they are referred to as variable strength modif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…In general, existing state-of-the-art strategies for generating the optimal or best test set sizes are divided into two approaches: Algebraic and Computational [17,32]. Mathematicians have typically utilized the Algebraic approach, where a test set is constructed based on the construction of OA.…”
Section: Related Workmentioning
confidence: 99%
“…In general, existing state-of-the-art strategies for generating the optimal or best test set sizes are divided into two approaches: Algebraic and Computational [17,32]. Mathematicians have typically utilized the Algebraic approach, where a test set is constructed based on the construction of OA.…”
Section: Related Workmentioning
confidence: 99%
“…Implementation of graph theory in the case of finding the shortest distance can be solved using the shortest path search algorithm, which is classified into a single source and multisource [10] where the single source algorithm is the shortest path search algorithm from one source node to various other destination nodes. These algorithms are among the Greedy [11], Dijkstra, and Bellman-Ford algorithms. Meanwhile, multi-source algorithms look for the shortest path by calculating all pairs of vertices in a graph, including the Floyd Warshall, Ant Colony, and Johnson algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…t ≤ 3), it can cover most flaws in a typical software system [7][8][9][10][11][12]. Subsequent research studies although, have proposed the need to support the higher strength interaction, particularly for complex systems [2,4,[13][14][15].…”
Section: Introductionmentioning
confidence: 99%