Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2016
DOI: 10.1145/2950290.2950322
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the validity of selective mutation with dominator mutants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
96
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 75 publications
(100 citation statements)
references
References 31 publications
1
96
0
3
Order By: Relevance
“…We then select and prioritise our mutants. To evaluate and compare the studied approaches with respect to fault revelation, we follow a typical procedures (Titcheu Chekam et al 2017;Kurtz et al 2016;Namin et al 2008) by randomly selecting test cases, from the formed test pools, that kill the selected mutants. In case none of the available test cases on our test pool kills the mutant we treat it as equivalent.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We then select and prioritise our mutants. To evaluate and compare the studied approaches with respect to fault revelation, we follow a typical procedures (Titcheu Chekam et al 2017;Kurtz et al 2016;Namin et al 2008) by randomly selecting test cases, from the formed test pools, that kill the selected mutants. In case none of the available test cases on our test pool kills the mutant we treat it as equivalent.…”
Section: Methodsmentioning
confidence: 99%
“…In the literature many mutant selection methods have been proposed (Papadakis et al 2018a;Ferrari et al 2018) by restricting the considered mutants according to their types, i.e., applying one or more mutant operators. Empirical studies (Kurtz et al 2016;Deng et al 2013), have shown that the most successful strategies are the statement deletion (Deng et al 2013) and the E-Selective mutant set (Offutt et al 1993(Offutt et al , 1996a. We therefore compare our approach with these methods.…”
Section: Mutant Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, most of the articles are not supported by empirical or theoretical studies that show a certain subset of mutation operators can represent the whole mutation operator set. As far as we know, most studies on selective mutation are merely based on Fortran [27,30,31] and C [32,193,194,195] programs. Thereby, we recommend more empirical studies on selective mutation in programming languages other than Fortran).…”
Section: Observationsmentioning
confidence: 99%
“…• R6: More empirical studies on the selective mutation method can pay attention to programming languages other than Fortran and C. As mentioned in Section 4.2.4, selective mutation is used by all the studies in our research scope. However, the selection of a subset of mutation operators in most papers is not well supported by existing empirical studies, except for Fortran [27,30,31] and C [32,193,194,195]. Selective mutation requires more empirical studies to explore whether a certain subset of mutation operators can be applied in different programming languages.…”
Section: Recommendation For Future Researchmentioning
confidence: 99%