{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:24:57Z","timestamp":1747578297329},"reference-count":21,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"vor","delay-in-days":5235,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Testing Verif &amp; Rel"],"published-print":{"date-parts":[[1992,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Most testing methods generate test descriptions which define the desired characteristics of the input data in a test case. This paper describes the use of accumulated knowledge about a problem domain to refine these test descriptions, with the goal of increasing the probability that the input data generated from the refined test descriptions will reveal faults in a software system. A knowledge base is introduced to hold information about object semantics and object class\/subclass relationships. Knowledge accumulates with experience in a particular domain and can be focused on those objects and relationships in that domain which experience has shown to be error\u2010prone. This paper also defines a knowledge\u2010driven functional testing (KDFT) method which derives test descriptions from a formal specification and refines these descriptions using that knowledge base. A case study of the KDFT method using data from a previous study of the launch intercept control problem is described. These preliminary results indicate that knowledge\u2010based refinement of test descriptions can dramatically improve their ability to detect certain classes of faults.<\/jats:p>","DOI":"10.1002\/stvr.4370020203","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T07:31:31Z","timestamp":1163835091000},"page":"53-68","source":"Crossref","is-referenced-by-count":9,"title":["Employing accumulated knowledge to refine test descriptions"],"prefix":"10.1002","volume":"2","author":[{"given":"Christian","family":"Wild","sequence":"first","affiliation":[]},{"given":"Steven","family":"Zeil","sequence":"additional","affiliation":[]},{"given":"Gao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/356876.356879"},{"key":"e_1_2_1_3_1","volume-title":"Software Testing Techniques","author":"Beizer B.","year":"1990"},{"key":"e_1_2_1_4_1","volume-title":"Software Engineering Economics","author":"Boehm B. W.","year":"1981"},{"key":"e_1_2_1_5_1","unstructured":"Brilliant S.(1985) \u2018Analysis of faults in a multi\u2010version software experiment\u2019 Master's thesis University of Virginia."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.41339"},{"key":"e_1_2_1_7_1","unstructured":"Caglayan A.andLorczak P.(1988) \u2018An experimental investigation of enforced diversity in multiversion programming for flight software\u2019 Technical Report Charles River Analytics Inc. TR No. R8802."},{"key":"e_1_2_1_8_1","unstructured":"Chen J.(1989) \u2018Automatically generating functional tests from specifications\u2014a knowledge based constraint logical programming approach\u2019 Master's thesis Old Dominion University."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/79204.79209"},{"key":"e_1_2_1_10_1","unstructured":"Dunham J. R.andPierce J. L.(1985) \u2018An experiment in software reliability\u2019 Technical Report NASA Contractor Report 172553 Research Triangle Institute."},{"key":"e_1_2_1_11_1","unstructured":"Duran J. W.andNtafos S.(1981) \u2018A report on random testing\u2019 Proceedings of the 5th International Conference on Software Engineering IEEE pp.179\u2013183."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234487"},{"key":"e_1_2_1_13_1","unstructured":"Gourlay J. S.(1981) \u2018Theory of testing computer programs\u2019 Ph.D. thesis University of Michigan."},{"key":"e_1_2_1_14_1","unstructured":"Knight J.(1989) Private correspondence."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_2_1_16_1","volume-title":"The Art of Software Testing","author":"Myers G. J.","year":"1979"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62964"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231892"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234485"},{"key":"e_1_2_1_20_1","first-page":"335","volume-title":"Advances in Computers","author":"White L. J.","year":"1987"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Wild C.(1988) \u2018Generic constraint logic programming and incompleteness in the analysis of software\u2019.Proceedings of the 2nd Workshop on Software Testing Verification and Analysis IEEE p.140.","DOI":"10.1109\/WST.1988.5368"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Wild C. Chen J.andEckhardt D.(1989) \u2018Reasoning about software specifications: a case study\u2019 Proceedings of the AIAA Computers in Aerospace VII Conference pp.297\u2013306.","DOI":"10.2514\/6.1989-3129"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fstvr.4370020203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.4370020203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T20:48:31Z","timestamp":1698094111000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.4370020203"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,7]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1992,7]]}},"alternative-id":["10.1002\/stvr.4370020203"],"URL":"https:\/\/doi.org\/10.1002\/stvr.4370020203","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"value":"0960-0833","type":"print"},{"value":"1099-1689","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,7]]}}}