default search action
Software Testing, Verification & Reliability, Volume 25
Volume 25, Number 1, January 2015
- Jeff Offutt:
Editorial: Plagiarism Is For Losers. 1-3
- Jan Friso Groote, Tim W. D. M. Kouters, Ammar Osaiweran:
Specification guidelines to avoid the state space explosion problem. 4-33 - Achim D. Brucker, Lukas Brügger, Burkhart Wolff:
Formal firewall conformance testing: an application of test and proof techniques. 34-71
Volume 25, Number 2, March 2015
- Jeff Offutt:
Editorial: Who Is An Author? 73-76
- Zhihong Xu, Yunho Kim, Moonzoo Kim, Myra B. Cohen, Gregg Rothermel:
Directed test suite augmentation: an empirical investigation. 77-114 - Joan Farjo, Rawad Abou Assi, Wes Masri:
Reducing execution profiles: techniques and benefits. 115-137 - Sergio Segura, Amador Durán, Ana Belén Sánchez, Daniel Le Berre, Emmanuel Lonca, Antonio Ruiz Cortés:
Automated metamorphic testing of variability analysis tools. 138-163
Volume 25, Number 3, May 2015
Editorial
- Eitan Farchi, Robert M. Hierons, João Lourenço:
Special issue on testing, analysis and debugging of concurrent programs. 165-166
- Sangmin Park, Richard W. Vuduc, Mary Jean Harrold:
UNICORN: a unified approach for localizing non-deadlock concurrency bugs. 167-190 - Shin Hong, Moonzoo Kim:
A survey of race bug detection techniques for multithreaded programmes. 191-217 - Elvira Albert, Puri Arenas, Jesús Correas Fernández, Samir Genaim, Miguel Gómez-Zamalloa, Germán Puebla, Guillermo Román-Díez:
Object-sensitive cost analysis for concurrent objects. 218-271 - Jan Fiedor, Vendula Hrubá, Bohuslav Krena, Zdenek Letko, Shmuel Ur, Tomás Vojnar:
Advances in noise-based testing of concurrent software. 272-309 - Simone R. S. Souza, Paulo S. L. Souza, Maria A. S. Brito, Adenilso da Silva Simão, Ed Zaluska:
Empirical evaluation of a new composite approach to the coverage criteria and reachability testing of concurrent programs. 310-332
Volume 25, Number 4, June 2015
Editorial
- Benoit Baudry, Alessandro Orso:
Special issue for the ICST 2013 conference. 333
- Shin Hong, Matt Staats, Jaemin Ahn, Moonzoo Kim, Gregg Rothermel:
Are concurrency coverage metrics effective for testing: a comprehensive empirical investigation. 334-370 - Daniel Di Nardo, Nadia Alshahwan, Lionel C. Briand, Yvan Labiche:
Coverage-based regression test case selection, minimization and prioritization: a case study on an industrial system. 371-396 - Yu Lin, Danny Dig:
A study and toolkit of CHECK-THEN-ACT idioms of Java concurrent collections. 397-425 - Gerardo Canfora, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Annibale Panichella, Sebastiano Panichella:
Defect prediction as a multiobjective optimization problem. 426-459
Volume 25, Numbers 5-7, August - November 2015
Editorial
- Yue Jia, Mercedes G. Merayo, Mark Harman:
Introduction to the special issue on Mutation Testing. 461-463
- Pedro Reales Mateo, Macario Polo Usaola:
Reducing mutation costs through uncovered mutants. 464-489 - René Just, Franz Schweiggert:
Higher accuracy and lower run time: efficient mutation analysis using non-redundant mutation operators. 490-507 - Marinos Kintis, Mike Papadakis, Nicos Malevris:
Employing second-order mutation for isolating first-order equivalent mutants. 508-535 - Antonia Estero-Botaro, Francisco Palomo-Lozano, Inmaculada Medina-Bulo, Juan José Domínguez-Jiménez, Antonio García-Domínguez:
Quality metrics for mutation testing with applications to WS-BPEL compositions. 536-571 - Akbar Siami Namin, Xiaozhen Xue, Omar Rosas, Pankaj Sharma:
MuRanker: a mutant ranking tool. 572-604 - Mike Papadakis, Yves Le Traon:
Metallaxis-FL: mutation-based fault localization. 605-628 - Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene:
Using mutation to assess fault detection capability of model review. 629-652 - Vincent Aranega, Jean-Marie Mottu, Anne Etien, Thomas Degueule, Benoit Baudry, Jean-Luc Dekeyser:
Towards an automation of the mutation analysis dedicated to model transformation. 653-683 - Frédéric Dadeau, Pierre-Cyrille Héam, Rafik Kheddam, Ghazi Maatoug, Michaël Rusinowitch:
Model-based mutation testing from security protocols in HLPSL. 684-711
Volume 25, Number 8, December 2015
- Jeff Offutt:
How the web resuscitated evolutionary design. 713-715
- Bernhard K. Aichernig, Harald Brandl, Elisabeth Jöbstl, Willibald Krenn, Rupert Schlick, Stefan Tiran:
Killing strategies for model-based mutation testing. 716-748 - Gordon Fraser, Neil Walkinshaw:
Assessing and generating test sets in terms of behavioural adequacy. 749-780
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.