2015
DOI: 10.1145/2818639
|View full text |Cite
|
Sign up to set email alerts
|

The Effectiveness of Test Coverage Criteria for Relational Database Schema Integrity Constraints

Abstract: Despite industry advice to the contrary, there has been little work that has sought to test that a relational database's schema has correctly specified integrity constraints. These critically important constraints ensure the coherence of data in a database, defending it from manipulations that could violate requirements such as “usernames must be unique” or “the host name cannot be missing or unknown.” This article is the first to propose coverage criteria, derived from logic coverage criteria, that establish … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
81
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 31 publications
(81 citation statements)
references
References 55 publications
0
81
0
Order By: Relevance
“…In 2007, Harman and McMinn [7] reported its effectiveness and efficiency for a series of C programs, and combined it with a GA to provide a "best of" Memetic Algorithm approach [8]. It has since been implemented into tools to generate test data for C programs (e.g., IGUANA [17] and AUSTIN [14,15]); generate Java test suites with EvoSuite [3,4]; create relational database data with the SchemaAnalyst tool [9,18]; and combined with dynamic symbolic execution in Microsoft's Pex tool [16]. The AVM has also found application to additional problems, including decision ordering for software product lines [22], balancing workload in requirements assignment [21], solving reliability-redundancy-allocation problems [20], as well as test case selection [19] and test suite prioritization [2].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…In 2007, Harman and McMinn [7] reported its effectiveness and efficiency for a series of C programs, and combined it with a GA to provide a "best of" Memetic Algorithm approach [8]. It has since been implemented into tools to generate test data for C programs (e.g., IGUANA [17] and AUSTIN [14,15]); generate Java test suites with EvoSuite [3,4]; create relational database data with the SchemaAnalyst tool [9,18]; and combined with dynamic symbolic execution in Microsoft's Pex tool [16]. The AVM has also found application to additional problems, including decision ordering for software product lines [22], balancing workload in requirements assignment [21], solving reliability-redundancy-allocation problems [20], as well as test case selection [19] and test suite prioritization [2].…”
Section: Introductionmentioning
confidence: 99%
“…The AVM has also found application to additional problems, including decision ordering for software product lines [22], balancing workload in requirements assignment [21], solving reliability-redundancy-allocation problems [20], as well as test case selection [19] and test suite prioritization [2]. Since Korel's original work, the AVM has been extended and improved for problems in SBSE: now it can handle more variable types, including fixed-point numbers [7] and strings [9,18], and can leverage new strategies proven to speed up the search for certain common types of objective function landscape [10,11].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…As studying the mutant data retrospectively removes the need to comprehend the complexities of a target environment, mutant reduction methods can be extended to new domains such as that of relational database schemas [19], [20], [21]. Ensuring that a database's schema has correctly specified integrity constraints is important because these entities ensure that only valid data enters the database.…”
Section: Introductionmentioning
confidence: 99%