0% Complete
فارسی
Home
/
دوازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
SBST challenges from the perspective of the test techniques
Authors :
Sepideh Kashefi Gargari
1
Mohammad Reza Keyvanpour
2
1- دانشگاه الزهرا(س)
2- دانشگاه الزهرا(س)
Keywords :
test case generation ، search-based software test ، evolutionary algorithms ، SBST challenges ، structural testing ، functional testing ، non-functional testing
Abstract :
Despite several decades of work on software quality assurance methods, the test still has a special place. A process that can detect possible software errors with minimum budget and effort is important. Search-based software testing(SBST) is an approach to automated software testing and is an attempt to find a suitable alternative to manual testing. SBST is trying to transform the test problem into an optimization problem and obtain better solutions by searching the problem space. Search-based testing has its challenges as well as its advantages. In this article, considering the importance of SBST in the test area, an attempt has been made to collect the search-based test challenges from the perspective of the test techniques. This article also suggests different research subjects and makes a guideline for researchers interested in SBST and can be used for the aim of comparing the existing test techniques, selecting the best one, and representing the challenges of each.
Papers List
List of archived papers
Embedded speech encoder for low-resource languages
Alireza A.Tabatabaei - Pouria Sameti - Ali Bohlooli
LuckyAgent2022: A Stop-Learning Multi-Armed Bandit Automated Negotiating Agent
Arash Ebrahimnezhad - Faria Nassiri-Mofakham
بررسی تأثیر استقرار استاندارد COBIT در افزایش بهره وری سازمانها (مطالعه موردی: شعب نمایندگیهای همراه اول، ایرانسل، رایتل)
دکتر محمد ابراهیم سمیع - ساره رحمانیان محمد ابراهیم سمیع - ساره رحمانیان -
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
Statistical Disorder Parameters Computing For Hyperspectral Image Anomaly Detection
Dr Maryam Imani
Extending Interaction Flow Modeling Language as a Profile for Form-making Systems
Ghazaleh Shahin - Dr Bahman Zamani
Violence detection using one-dimensional convolutional networks
Narges Honarjoo - Ali Abdari - Dr Azadeh Mansouri
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
یک سیستم پاسخ به نفوذ در شبکه های اینترنت اشیاء با استفاده از شبکه های مبتنی بر نرم افزار
احسان شاهرخی مینا - رضا محمدی - محمد نصیری
Securing the Internet of Things via Blockchain-Aided Smart Contracts
S. Mohammadali Zanjani - Hossein Shahinzadeh - Jalal Moradi - Zohreh Rezaei - Bahareh Kaviani-Baghbaderani - Sudeep Tanwar
Samin Hamayesh - Version 40.3.1