1996
DOI: 10.1109/ms.1996.536464
|View full text |Cite
|
Sign up to set email alerts
|

Black Box Testing: Techniques for Functional Testing of Software and Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
219
0
33

Year Published

2000
2000
2018
2018

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 294 publications
(252 citation statements)
references
References 0 publications
0
219
0
33
Order By: Relevance
“…Again-I do not go deeply into technical details of particular techniques, although I present here some concrete approaches. There are many books on particular test design techniques, like [10], [14], [15], [16], [17] or [18] to mention the most important ones. I rather focus on the ideas that underlie the concrete test techniques.…”
Section: What Is This Book About?mentioning
confidence: 99%
“…Again-I do not go deeply into technical details of particular techniques, although I present here some concrete approaches. There are many books on particular test design techniques, like [10], [14], [15], [16], [17] or [18] to mention the most important ones. I rather focus on the ideas that underlie the concrete test techniques.…”
Section: What Is This Book About?mentioning
confidence: 99%
“…Manual testing is laborious and error-prone; therefore emphasis is to use automated testing that significantly reduces the cost of software development process and its maintenance [1]. Most of the modern black-box testing techniques execute the SUT with specific input and compare the obtained results against the test oracle.…”
Section: Introductionmentioning
confidence: 99%
“…For example, black-box testing [2] regards the unknown procedures as black-boxes to test their functionality, which cannot formally prove the absence of program bugs, therefore may not be enough for safety-critical systems. Likewise, specification mining [1] discovers possible specifications for the (unknown part of the) program by observing its execution and traces, which is also dynamically performed and bears the same problem.…”
Section: Introductionmentioning
confidence: 99%