Ask Software Engineering Expert

Project title: A study on dissimilarities between test case executions

Note: In students' assignments and project reports, if any part (including sentences, figures/diagrams, tables, definitions, descriptions, data, and so on) are copied from other people's work (including both published and unpublished papers, reports, Web articles, etc), or if any idea is from other people, such work or people must be acknowledged explicitly. If you directly "copy and paste" sentences from other people's work to your report, you must use quotation marks to enclose the copied sentences and make a citation immediately. It is otherwise plagiarism.

1. Size of a group: minimum four, maximum six.

2. Progress report: Each group is required to give a 3-minute oral report to the tutor in Week 4 lab, and submit a two-page progress report. All team members are required to attend. The progress report should cover the following points:
i. Every team member's name, email address and student number.
ii. What is your progress so far?
iii. Did you encounter any problems?
iv. Your future plan and timetable.
v. A summary of the paper "On the correlation between the effectiveness of metamorphic relations and dissimilarities of test case executions" (available under "Reading material -> Research papers" in Moodle.)

(1) Progress report:

(2) Final presentation:

Submit a hardcopy of your presentation slides to the lecturer/tutor immediately before your group's presentation. It is not compulsory for all team members to speak, but all team members must stand in front of the class during their group's presentation. If a student is absent from his/her group presentation, the student will receive 0 presentation marks.

(3) Did you use a folder to enclose all submitted materials when you submit the final report in week 12 lecture?

(4) Technical value and writing of the final project report

6. Technical tasks

Step 1: Paper reading

Conduct in-depth study of the following paper (available in Moodle site under "Reading material -> Research papers").

[1] Y. Cao, Z. Q. Zhou, and T. Y. Chen, "On the correlation between the effectiveness of metamorphic relations and dissimilarities of test case executions," in Proceedings of the 13th International Conference on Quality Software (QSIC'13). IEEE, 2013, pp. 153-162.

Write a one-page summary of the above paper using your own word --- you are not allowed to copy any sentence from the paper when writing the summary.

Read the following related papers, summarize each of them, and explain their relationship and difference to [1] (one page each):

[2] "Comparing white-box and black-box test prioritization".

[3] "Measurable Metrics for Qualitative Guidelines of Metamorphic Relation". In COMPSAC 2015,

[4] Metamorphic Relations Ranking for Reducing Testing Cost in Scientific Software. Master Thesis.

Step 2: Conduct an empirical study similar to [1] by using different subject programs.

Identify 9 (or more) subject programs, each of which has a size similar to (or larger than) the grep, sed, or bash programs listed in Table 1 of [1]. These programs should have characteristics similar to the above grep, sed, and bash programs in the sense that (1) each of them have multiple faulty versions (preferably with real faults, but systematically seeded faults are also acceptable) and (2) you can apply the GCOV tool to record the coverage data for each test case execution. Do the following:

(1) For each subject program, identify 10 or more metamorphic relations (MRs).

(2) For each MR, generate a large number of (minimum 1000) source test cases. You can use existing test suites or test case generation tools or random generation for this purpose. Different MRs can share the same set of source test cases.

(3) Conduct experiments using the faulty versions of the subject programs, the MRs, and the test cases, in concert with GCC and the GCOV tool, to validate the statement "there is a significant strong positive correlation between BCMD and the fault-detection effectiveness of MRs [1, p161]." You can also use tools other than GCC and GCOV for this study.

(4) Report your findings.

Step 3: Try other distance metrics other than those reported in [1], and conduct similar empirical study to see which one is better

Frequently asked question: Where can I get the subject programs and their faulty versions?

Answer: From all possible sources, such as from open source projects or your past software development projects. Another source is the Software-artifact Infrastructure Repository (SIR).

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M92810967
  • Price:- $110

Guranteed 48 Hours Delivery, In Price:- $110

Have any Question?


Related Questions in Software Engineering

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Overviewyou are required to modify and logically extend

Overview You are required to modify and logically extend the functionality of a provided code base to implement a game. This requires you to modify the code base as well as create documentation and implement various user ...

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

Write reply to this article with references with apa

Write reply to this article with references with APA bibliography. Hate Crimes Over the past couple of years, hate crimes have been on the rise in America's largest cities. Studies show that there were sharp spikes in th ...

Reply to this article with apa referencehate crimes

Reply to this article with APA reference. Hate crimes According to Merriam-Webster, hate crime is any of various crimes (such as assault or defacement of property) when motivated by hostility to the victim as a member of ...

Proposaldesign of an efficient gps tracking system tag for

Proposal Design of an efficient GPS Tracking System (tag) for monitoring small species IMPLEMENTING EMBEDDED SYSTEMS USING SYSML Task Using PapyrusSysML Software (Downloadable online - Evaluation Copy- Latest Version) Mo ...

Write review on this article with apa formatgovernment

Write review on this article with APA format. Government surveillance is a major issue in the United States and globally. Surveillance refers to any collection and processing of personal data, whether, identifiable or no ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As