期刊文献+

探索性软件测试解析 被引量:7

Research and Analysis of Exploratory Software Testing
下载PDF
导出
摘要 探索性测试是一种完全不同于传统测试方法的测试技术,它提出将学习被测系统、设计测试用例、执行测试同时进行的策略,以及拥抱变化的口号。探索性测试由于其高效的发现软件缺陷的能力而越来越受到人们的重视。文章由传统软件测试方法模型理论的不足,引出探索性软件测试这种前沿的软件测试理论,对其定义、模型方法及优缺点等进行了全面的研究分析。研究表明探索性软件测试方法是对传统软件测试理论的很好补充,合理的利用探索性测试,能够显著提高软件的测试效率。 Exploratory testing is a new software test technology which is totally different from traditional software test methods. Exploratory Testing is defined as concurrent product exploration test design and test execution, and it claims to embrace change. Since the exploratory testing can find software Bugs with high efficiency, it is widely researched. This pa- per from the shortage of the traditional software test method model theories, carried on overall researching and analysis to the exploratory testing's definition, model,method, merit and shortcoming etc. The researching shows that exploratory testing method is to the very good complement of the theories of the traditional software test, making use of exploratory testing rationally, can enhance the software testing efficiency evidently.
作者 李军锋 栾静
机构地区 [
出处 《计算机与数字工程》 2011年第8期39-42,共4页 Computer & Digital Engineering
关键词 软件测试 测试用例 测试方法 探索性 software test, test case, test method, exploratory
  • 相关文献

参考文献7

  • 1谢经纬,吴昊.探索性方法在面向故障软件测试中的应用[J].微计算机信息,2010,26(25):145-146. 被引量:7
  • 2JamesA.Whittaker.探索式软件测试[M].方敏,张胜,等译.北京:清华大学出版社,2010,4:9-15.
  • 3段念.探索性软件概述[EB/OL].http://sitwithwhom.51.net,2006,07.
  • 4关河.探索性测试介绍[EB/OL].http://guanhe.cnblogs.com,2006.
  • 5James Bach. Exploratory Testing. ppt[EB/OL], http://www, testingeducation, org, 2004.
  • 6Cem Kaner, James Bach. The Nature of Exploratory Testing[EB/OL]. http://www, testingedueation, org, 2004.
  • 7Jorg Denzinger. Exploratory testing for unwanted be havior using evolutionary learning techniques[R]. Technical Report. 2007-868-20,2007,8.

二级参考文献4

共引文献6

同被引文献75

  • 1郑玉彤.库函数调用的安全性分析[J].微计算机应用,2006,27(3):319-322. 被引量:2
  • 2陆永忠,宋骏礼,谷希谦.基于行为的软件测试过程模型及其应用研究[J].计算机应用,2007,27(5):1238-1240. 被引量:10
  • 3. Patterson, Jason R. C. Accurate static branch prediction by value range propagation[-C. In SIGPLAN conference on pro- gramming language design and implementation, 1995:67-78.
  • 4A. I SOTIROV. Automatic vulnerability detection using static source code analysis Final thesis Department of Computer Sci- ence in the Graduate School of University of Alabama. April 2007, http://gcc, vulncheck, org/sotirov05automatic, pdf.
  • 5Kamran Zafar, Asad Ali; Static Techniques for Vulnerability Detection; Link6pings university, October 2007, http//www. ida. liu. se/TDDCO3/oldprojects/2OO7/projects/4, pdf.
  • 6David A. Wheeler. Flawfinder, April 2007, http://www. dwheeler, com/flawfinder/.
  • 7J. Viega, J. T. Bloch, T. Kohno, and G. McGraw,. ITS4 : A static vulnerability scanner for C and Cq-q- codeC]// 16th Annual Computer Security Applications Conference. ACM, Dec, 2000.. 101-116.
  • 8J. Wilander, M. Kamkar. A comparative study of publicly avail able tools for static intrusion preventionJ-C]// Proceedings of the 7th Nordic Workshop on Secure IT Systems, Karlstad, Sweden, November, 2002 .. 82-90.
  • 9AlephOne. Smashing The Stack For Fun And Profit, Phrack, 1996, (49) : 1-5.
  • 10Novillo, Diego. Tree SSA-A new optimization infrastructure for GCCI-C. In Proceedings of the 2003 gcc developers, Otta- wa, Canada, 2003 : 181-195.

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部