Reliability of the Path Analysis Testing Strategy
- 1 September 1976
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. SE-2 (3) , 208-215
- https://doi.org/10.1109/tse.1976.233816
Abstract
A set of test data T for a program P is reliable if it reveals that P contains an error whenever P is incorrect. If a set of tests T is reliable and P produces the correct output for each element of T then P is a correct program. Test data generation strategies are procedures for generating sets of test data. A testing strategy is reliable for a program P if it produces a reliable set of test data for P. It is proved that an effective testing strategy which is reliable for all programs cannot be constructed. A description of the path analysis testing strategy is presented. In the path analysis strategy data are generated which cause different paths in a program to be executed. A method for analyzing the reliability of path testing is introduced. The method is used to characterize certain classes of programs and program errors for which the path analysis strategy is reliable. Examples of published incorrect programs are included.Keywords
This publication has 7 references indexed in Scilit:
- Methodology for the Generation of Program Test DataIEEE Transactions on Computers, 1975
- Some experience with automated aids to the design of large-scale reliable softwareIEEE Transactions on Software Engineering, 1975
- Toward a theory of test data selectionPublished by Association for Computing Machinery (ACM) ,1975
- A new approach to program testingPublished by Association for Computing Machinery (ACM) ,1975
- SELECT---a formal system for testing and debugging programs by symbolic executionPublished by Association for Computing Machinery (ACM) ,1975
- An analysis of errors and their causes in system programsPublished by Association for Computing Machinery (ACM) ,1975
- Types, distribution, and test and correction times for programming errorsPublished by Association for Computing Machinery (ACM) ,1975