{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:10:24Z","timestamp":1760202624454},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2011,7,1]],"date-time":"2011-07-01T00:00:00Z","timestamp":1309478400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Form. Asp. Comput."],"published-print":{"date-parts":[[2011,7]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>For model-based black-box testing, test cases are often selected from the syntactic appearance of the specification of the system under test, according to a pre-given test data adequacy criterion. We introduce a novel approach that is semantics-based, independent of the syntactic appearance of the system specification. Basically, we model the system under test as a random variable, whose sample space consists of all possible behavior sets (with respect to the specification) over the known interface of the black-box. The entropy of the system is measured as the (Shannon) entropy of the random variable. In our criterion, the coverage of a test set is measured as the expected amount of entropy decrease (i.e. the expected amount of information gained) once the test set is run. Since our criterion is syntactic independent, we study the notion of information-optimal software testing where, within a given constraint, a test set is selected to gain the most information.<\/jats:p>","DOI":"10.1007\/s00165-011-0175-6","type":"journal-article","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T09:19:54Z","timestamp":1300094394000},"page":"513-539","source":"Crossref","is-referenced-by-count":6,"title":["Information gain of black-box testing"],"prefix":"10.1145","volume":"23","author":[{"given":"Linmin","family":"Yang","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Washington State University, 99164, Pullman, WA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhe","family":"Dang","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Washington State University, 99164, Pullman, WA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas R.","family":"Fischer","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, Washington State University, 99164, Pullman, WA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","reference":[{"key":"e_1_2_1_2_1_2","doi-asserted-by":"publisher","DOI":"10.5555\/1355340"},{"key":"e_1_2_1_2_2_2","unstructured":"Ammann P Offutt J Huang H (2003) Coverage criteria for logical expressions. In: ISSRE \u201903: Proceedings of the 14th International Symposium on Software Reliability Engineering. IEEE Computer Society USA pp 99\u2013107"},{"key":"e_1_2_1_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2009.01.003"},{"key":"e_1_2_1_2_4_2","volume-title":"Black-box testing: techniques for functional testing of software and systems","author":"Beizer B","year":"1995"},{"key":"e_1_2_1_2_5_2","doi-asserted-by":"crossref","unstructured":"Broy M Jonsson B Katoen J-P Leucker M Pretschner A (2005) Model-based testing of reactive systems: advanced lectures. In: Lecture notes in computer science vol 3472. Springer Berlin","DOI":"10.1007\/b137241"},{"key":"e_1_2_1_2_6_2","volume-title":"Model checking","author":"Clarke EM","year":"1999"},{"key":"e_1_2_1_2_7_2","volume-title":"Elements of information theory","author":"Cover TM","year":"2006","edition":"2"},{"key":"e_1_2_1_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010257"},{"key":"e_1_2_1_2_9_2","doi-asserted-by":"crossref","unstructured":"Gaudel MC (1995) Testing can be formal too. In: TAPSOFT \u201995: Proceedings of the 6th international joint conference CAAP\/FASE on theory and practice of software development 1995. Lecture notes in computer science vol 915. Springer Berlin pp 82\u201396","DOI":"10.1007\/3-540-59293-8_188"},{"key":"e_1_2_1_2_10_2","doi-asserted-by":"crossref","unstructured":"Goodenough JB Gerhart SL (1975) Toward a theory of test data selection. In: Proceedings of the international conference on reliable software. ACM New York pp 493\u2013510","DOI":"10.1145\/390016.808473"},{"key":"e_1_2_1_2_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"e_1_2_1_2_12_2","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/978-3-642-82453-1_17","volume-title":"Logics and models of concurrent systems, vol 13. NATO ASI Series","author":"Harel D","year":"1985"},{"key":"e_1_2_1_2_13_2","doi-asserted-by":"crossref","DOI":"10.21236\/ADA465161","volume-title":"Software cost reduction. Encyclopedia of software engineering","author":"Heitmeyer C","year":"2002","edition":"2"},{"key":"e_1_2_1_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_2_1_2_15_2","doi-asserted-by":"publisher","DOI":"10.5555\/1454320"},{"key":"e_1_2_1_2_16_2","doi-asserted-by":"crossref","unstructured":"Ladyman J (2007) Physics and computation: the status of landauer\u2019s principle. In: CiE \u201907: Proceedings of the 3rd conference on computability in Europe 2007. Lecture notes in computer science vol 4497. Springer Berlin pp 446\u2013454","DOI":"10.1007\/978-3-540-73001-9_46"},{"key":"e_1_2_1_2_17_2","doi-asserted-by":"publisher","DOI":"10.1147\/rd.53.0183"},{"key":"e_1_2_1_2_18_2","doi-asserted-by":"crossref","unstructured":"Last M Friedman M Kandel A (2003) The data mining approach to automated software testing. In: KDD \u201903: Proceedings of the 9th ACM SIGKDD international conference on knowledge discovery and data mining. ACM New York pp 388\u2013396","DOI":"10.1145\/956750.956795"},{"issue":"3","key":"e_1_2_1_2_19_2","first-page":"219","article-title":"An introduction to input\/output automata","volume":"2","author":"Lynch NA","year":"1989","journal-title":"CWI-Q"},{"key":"e_1_2_1_2_20_2","doi-asserted-by":"publisher","DOI":"10.5555\/983238"},{"key":"e_1_2_1_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1013886.1007520"},{"issue":"2","key":"e_1_2_1_2_22_2","first-page":"225","article-title":"Black box checking","volume":"7","author":"Peled D","year":"2001","journal-title":"J Autom Lang Comb"},{"key":"e_1_2_1_2_23_2","doi-asserted-by":"crossref","unstructured":"Petrenko A Yevtushenko N Huo J (2003) Testing transition systems with input and output testers. In: TestCom \u201903 2003. Lecture notes in computer science vol 2644. Springer Berlin pp 129\u2013145","DOI":"10.1007\/3-540-44830-6_11"},{"key":"e_1_2_1_2_24_2","doi-asserted-by":"crossref","unstructured":"Pnueli A (1977) The temporal logic of programs. In: SFCS \u201977: Proceedings of the 18th annual symposium on foundations of computer science. IEEE Computer Society USA pp 46\u201357","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_2_1_2_25_2","doi-asserted-by":"publisher","DOI":"10.5555\/1102016"},{"key":"e_1_2_1_2_26_2","unstructured":"Tan L Sokolsky O Lee I (2004) Specification-based testing with linear temporal logic. In: IRI\u201904: proceedings of IEEE internation conference on information reuse and integration. IEEE Computer Society USA pp 483\u2013498"},{"key":"e_1_2_1_2_27_2","doi-asserted-by":"crossref","unstructured":"Tretmans J (2008) Model based testing with labelled transition systems. In: Formal methods and testing 2008. Lecture notes in computer science vol 4949. Springer Berlin pp 1\u201338","DOI":"10.1007\/978-3-540-78917-8_1"},{"key":"e_1_2_1_2_28_2","unstructured":"Tretmans J Brinksma E (2003) Torx: automated model-based testing. In: First European conference on model-driven software engineering. N\/A pp 31\u201343"},{"key":"e_1_2_1_2_29_2","doi-asserted-by":"crossref","unstructured":"van der Bijl M Peureux F (2005) I\/O-automata based testing. In: Model-based testing of reactive systems Chapt. 7. Lecture notes in computer science vol 3472 Springer Berlin pp 173\u2013200","DOI":"10.1007\/11498490_9"},{"key":"e_1_2_1_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.83906"},{"key":"e_1_2_1_2_31_2","unstructured":"Xie G (2005) Fundamental studies on automatic verification of component-based systems\u2014a decompositional and hybrid approach. PhD thesis Washington State University"},{"key":"e_1_2_1_2_32_2","doi-asserted-by":"crossref","unstructured":"Xie G Dang Z (2006) Testing systems of concurrent black-boxes\u2014an automata-theoretic and decompositional approach. In: FATES\u201905: Proceedings of the 5th international workshop on formal approaches to software testing 2006. Lecture notes in computer science vol 3997. Springer Berlin pp 170\u2013186","DOI":"10.1007\/11759744_12"},{"key":"e_1_2_1_2_33_2","unstructured":"Yang L Dang Z Fischer TR (2009) Optimal software testing\u2014a cooling down process. In: FCS\u201909: Proceedings of the international conference on foundations of computer science. CSREA Press pp 162\u2013168"},{"key":"e_1_2_1_2_34_2","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0004"},{"key":"e_1_2_1_2_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"}],"container-title":["Formal Aspects of Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00165-011-0175-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00165-011-0175-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1007\/s00165-011-0175-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,6]],"date-time":"2022-01-06T16:03:01Z","timestamp":1641484981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1007\/s00165-011-0175-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["10.1007\/s00165-011-0175-6"],"URL":"https:\/\/doi.org\/10.1007\/s00165-011-0175-6","relation":{},"ISSN":["0934-5043","1433-299X"],"issn-type":[{"value":"0934-5043","type":"print"},{"value":"1433-299X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7]]}}}