{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:25:45Z","timestamp":1753921545513,"version":"3.32.0"},"reference-count":21,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"vor","delay-in-days":4992,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Testing Verif &amp; Rel"],"published-print":{"date-parts":[[1993,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A commonly used approach for detecting defects in a program is to generate a suite of test inputs which exercises the entire program under a given testing criterion. Current techniques to generate test cases automatically that satisfy a testing criterion choose test input data by considering the testing requirements in an arbitrary order. In this paper, a technique is presented that groups the requirements and orders the generation of the test cases to reduce the number of test cases generated. The grouping is based on the statically determined property of post\u2010dominance. Test cases for each group are generated taking into account requirements for other groups. The use of this technique to generate test cases can be expected to produce fewer test cases that have to be retained with the software. A smaller number of test cases will require less effort and resources to test the software. The technique is especially useful in the maintenance environment, whether retesting of a changed program is done exhaustively or incrementally. The technique not only attempts to minimize the number of test cases generated but also reduces the effort to generate the test cases using the concept of a program slice.<\/jats:p>","DOI":"10.1002\/stvr.4370030104","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T18:28:02Z","timestamp":1163788082000},"page":"29-48","source":"Crossref","is-referenced-by-count":26,"title":["Employing static information in the generation of test cases"],"prefix":"10.1002","volume":"3","author":[{"given":"Rajiv","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Mary Lou","family":"Soffa","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"volume-title":"Compilers, Principles, Techniques, and Tools","year":"1986","author":"Aho A. V.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Alberts D.(1976) \u2018The economics of software quality assurance \u2019 in Proceedings of the AFIPS 1976 National Computer Conference Vol. 45 pp.433\u2013442.","DOI":"10.1145\/1499799.1499863"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75329"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"e_1_2_1_7_1","unstructured":"Gupta R. Harrold M. J.andSoffa M. L.(1992) \u2018An approach to regression testing using slicing\u2019 inProceedings of the Conference on Software Maintenance pp.299\u2013308."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.89060"},{"key":"e_1_2_1_9_1","unstructured":"Harrold M. J. Gupta R.andSoffa M. L.(1990) \u2018A methodology for controlling the size of a test suite\u2019 Proceedings of the Conference on Software Maintenance San Diego California pp.302\u2013310."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Harrold M. J.andSoffa M. L.(1988) \u2018An incremental approach to unit testing during maintenance\u2019 inProceedings of the Conference on Software Maintenance Phoenix Arizona.","DOI":"10.1109\/ICSM.1988.10188"},{"issue":"1","key":"e_1_2_1_11_1","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","article-title":"Interprocedural slicing using dependence graphs","volume":"12","author":"Horwitz S.","year":"1990","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Korel B.(1990a) \u2018A dynamic approach of test data generation \u2019 inProceedings of the Conference on Software Maintenance San Diego California pp.311\u2013317.","DOI":"10.1109\/ICSM.1990.131379"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.57624"},{"key":"e_1_2_1_14_1","unstructured":"Leung H. K. N.andWhite L. (1989) \u2018A study of regression testing\u2019 Proceedings of the Sixth International Conference on Testing Computer Software Washington DC."},{"volume-title":"The Art of Software Testing","year":"1979","author":"Myers G.","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","unstructured":"Ostrand T. J.andWeyuker E. J.(1988) \u2018Using data flow analysis for regression testing\u2019 inSixth Annual Pacific Northwest Software Quality Conference Portland Oregon."},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ottenstein K. J.andOttenstein L. M.(1984) \u2018The program dependence graph in a software development environment \u2019 in Symposium on Practical Software Development Environments pp.177\u2013184.","DOI":"10.1145\/390010.808263"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58766"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/361532.361566"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(89)90062-9"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(84)90106-6"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fstvr.4370030104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.4370030104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T23:54:18Z","timestamp":1736639658000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.4370030104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,3]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1993,3]]}},"alternative-id":["10.1002\/stvr.4370030104"],"URL":"https:\/\/doi.org\/10.1002\/stvr.4370030104","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"type":"print","value":"0960-0833"},{"type":"electronic","value":"1099-1689"}],"subject":[],"published":{"date-parts":[[1993,3]]}}}