{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:51:43Z","timestamp":1755795103946,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006012","name":"Christian Doppler Forschungsgesellschaft","doi-asserted-by":"publisher","award":["QAMCAS"],"award-info":[{"award-number":["QAMCAS"]}],"id":[{"id":"10.13039\/501100006012","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008332","name":"Graz University of Technology","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100008332","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Testing is an important activity to detect faults before software deployment. We focus on black-box combinatorial testing, where fault detection is one of the main objectives. In this paper, we argue that input model abstraction notably impacts the fault detection capability of a combinatorial test suite. First, we present experiments from previous work that support this argument. We then perform new experiments on a more diverse set of programs. These experiments use mutation testing to estimate fault detection capability, but we also include structural coverage measures in the new experiments. Finally, we elaborate on two possible improvements to obtain an optimal input abstraction strategy for not just continuous but all input domains. Both experiments suggest that input abstraction affects the fault detection capability. We claim that the improvements will produce a better input abstraction with which we can achieve better fault detection capability without increasing the test suite size.<\/jats:p>","DOI":"10.1007\/s42979-024-03134-3","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T14:46:41Z","timestamp":1724770001000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Impact of Input Models on the Fault Detection Capabilities of Combinatorial Testing"],"prefix":"10.1007","volume":"5","author":[{"given":"Carmen","family":"Baumann","sequence":"first","affiliation":[]},{"given":"Yavuz","family":"Koroglu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0462-2283","authenticated-orcid":false,"given":"Franz","family":"Wotawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"3134_CR1","volume-title":"Practical model-based testing: a tools approach","author":"M Utting","year":"2010","unstructured":"Utting M, Legeard B. Practical model-based testing: a tools approach. Burlington: Morgan Kaufmann; 2010."},{"key":"3134_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MS.2012.13","volume":"29","author":"I Schieferdecker","year":"2012","unstructured":"Schieferdecker I. Model-based testing. IEEE Softw. 2012;29:14\u20138.","journal-title":"IEEE Softw"},{"key":"3134_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1883612.1883618","volume":"43","author":"C Nie","year":"2011","unstructured":"Nie C, Leung H. A survey of combinatorial testing. ACM Comput Surv (CSUR). 2011;43:1\u201329.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"3134_CR4","volume-title":"Introduction to combinatorial testing Chapman & Hall\/CRC innovations in software engineering and software development series","author":"D Kuhn","year":"2013","unstructured":"Kuhn D, Kacker R, Lei Y. Introduction to combinatorial testing Chapman & Hall\/CRC innovations in software engineering and software development series. Milton Park: Taylor & Francis; 2013."},{"key":"3134_CR5","doi-asserted-by":"crossref","unstructured":"Ali A, Maghawry HA, Badr N. Model-based test case generation approach for mobile applications load testing using ocl enhanced activity diagrams. In: 2021 tenth international conference on intelligent computing and information systems (ICICIS). 2021. p. 493\u201399.","DOI":"10.1109\/ICICIS52592.2021.9694216"},{"key":"3134_CR6","doi-asserted-by":"crossref","unstructured":"Vilkomir S, Amstutz B. Using combinatorial approaches for testing mobile applications. In: 2014 IEEE seventh international conference on software testing, verification and validation workshops. 2014. p. 493\u201399.","DOI":"10.1109\/ICSTW.2014.9"},{"key":"3134_CR7","doi-asserted-by":"crossref","unstructured":"Schieferdecker I. Model-based fuzz testing. In: Proceedings of the 2012 IEEE fifth international conference on software testing, verification and validation (ICST). 2012. p. 814.","DOI":"10.1109\/ICST.2012.180"},{"key":"3134_CR8","doi-asserted-by":"crossref","unstructured":"Schieferdecker I, Grossmann J, Schneider M. Model-based security testing. In: Proceedings of the model-based testing workshop at ETAPS 2012. EPTCS. 2012. p. 1\u201312.","DOI":"10.4204\/EPTCS.80.1"},{"key":"3134_CR9","doi-asserted-by":"crossref","unstructured":"Bozic J, Garn B, Simos DE, Wotawa F. Evaluation of the ipo-family algorithms for test case generation in web security testing, 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 1\u201310 (2015).","DOI":"10.1109\/ICSTW.2015.7107436"},{"key":"3134_CR10","doi-asserted-by":"crossref","unstructured":"Liu G, Liu Q, Zhang W. Model-based testing and validation on artificial intelligence systems. In: Second international multi-symposiums on computer and computational sciences (IMSCCS 2007). 2007. p. 445\u201349.","DOI":"10.1109\/IMSCCS.2007.37"},{"key":"3134_CR11","doi-asserted-by":"crossref","unstructured":"Chandrasekaran J, Feng H, Lei Y, Kuhn DR, Kacker R. Applying combinatorial testing to data mining algorithms. In: 2017 IEEE international conference on software testing, verification and validation workshops (ICSTW). 2017. p. 253\u201361.","DOI":"10.1109\/ICSTW.2017.46"},{"key":"3134_CR12","doi-asserted-by":"crossref","unstructured":"Bringmann E, Kr\u00e4mer A. Model-based testing of automotive systems. In: 2008 1st international conference on software testing, verification, and validation. 2008. p. 485\u201393.","DOI":"10.1109\/ICST.2008.45"},{"key":"3134_CR13","doi-asserted-by":"crossref","unstructured":"Tao J, Li Y, Wotawa F, Felbinger H, Nica M. On the industrial application of combinatorial testing for autonomous driving functions. In: Proceedings of the international workshop on combinatorial testing (IWCT). IEEE; 2019.","DOI":"10.1109\/ICSTW.2019.00058"},{"key":"3134_CR14","doi-asserted-by":"crossref","unstructured":"Borazjany MN, Yu L, Lei Y, Kacker R, Kuhn R. Combinatorial testing of acts: a case study. In: 2012 IEEE fifth international conference on software testing, verification and validation. IEEE; 2012. p. 591\u2013600.","DOI":"10.1109\/ICST.2012.146"},{"key":"3134_CR15","doi-asserted-by":"crossref","unstructured":"Segall I, Tzoref-Brill R, Zlotnick A. Common patterns in combinatorial models. In: 2012 IEEE fifth international conference on software testing, verification and validation. 2012. p. 624\u201329.","DOI":"10.1109\/ICST.2012.150"},{"key":"3134_CR16","doi-asserted-by":"crossref","unstructured":"Koroglu Y, Wotawa F. Continuous domain input abstraction and fault detection capability in combinatorial testing. In: 2023 38th IEEE\/ACM international conference on automated software engineering workshops (ASEW). 2023. p. 167\u201370.","DOI":"10.1109\/ASEW60602.2023.00027"},{"key":"3134_CR17","doi-asserted-by":"crossref","unstructured":"Grindal M., Offutt J. Input parameter modeling for combination strategies. In: Proceedings of the 25th conference on IASTED international multi-conference: software engineering. ACTA Press; 2007. p. 255\u201360.","DOI":"10.1109\/ASWEC.2007.27"},{"key":"3134_CR18","doi-asserted-by":"crossref","unstructured":"Kl\u00fcck F, Li Y, Nica M, Tao J, Wotawa F. Using ontologies for test suites generation for automated and autonomous driving functions. In: Proceedings of the IEEE international symposium on software reliability engineering\u2014industrial session. IEEE; 2018.","DOI":"10.1109\/ISSREW.2018.00-20"},{"key":"3134_CR19","unstructured":"Wotawa F, Li Y. From ontologies to input models for combinatorial testing. In: 30th IFIP international conference on testing software and systems, ICTSS 2018; Conference date: 01-10-2018 Through 03-10-2018 (2018)."},{"key":"3134_CR20","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1145\/62959.62964","volume":"31","author":"TJ Ostrand","year":"1988","unstructured":"Ostrand TJ, Balcer MJ. The category-partition method for specifying and generating functional tests. Commun ACM. 1988;31:676\u201386.","journal-title":"Commun ACM"},{"key":"3134_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1002\/stvr.4370030203","volume":"3","author":"M Grochtmann","year":"1993","unstructured":"Grochtmann M, Grimm K. Classification trees for partition testing. Softw Test Verif Reliab. 1993;3:63\u201382.","journal-title":"Softw Test Verif Reliab"},{"key":"3134_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2023.107225","volume":"160","author":"F Kl\u00fcck","year":"2023","unstructured":"Kl\u00fcck F, Li Y, Tao J, Wotawa F. An empirical comparison of combinatorial testing and search-based testing in the context of automated and autonomous driving systems. Inf Softw Technol. 2023;160: 107225. https:\/\/doi.org\/10.1016\/j.infsof.2023.107225.","journal-title":"Inf Softw Technol"},{"key":"3134_CR23","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1002\/stvr.381","volume":"18","author":"Y Lei","year":"2008","unstructured":"Lei Y, Kacker R, Kuhn DR, Okun V, Lawrence J. Ipog\/ipog-d: efficient test generation for multi-way combinatorial testing. Softw Test Verif Reliab. 2008;18:125\u201348.","journal-title":"Softw Test Verif Reliab"},{"key":"3134_CR24","doi-asserted-by":"crossref","unstructured":"Yu L, Lei Y, Kacker RN, Kuhn DR. Acts: a combinatorial test generation tool. In: 2013 IEEE sixth international conference on software testing, verification and validation. IEEE; 2013. p. 370\u201375.","DOI":"10.1109\/ICST.2013.52"},{"key":"3134_CR25","doi-asserted-by":"crossref","unstructured":"Tzoref-Brill R, Maoz S, Finkbeiner B, Pu G, Zhang L, editors. Lattice-based semantics for combinatorial model evolution. Automated technology for verification and analysis Cham: Springer International Publishing; 2015. p. 276\u201392.","DOI":"10.1007\/978-3-319-24953-7_22"},{"key":"3134_CR26","doi-asserted-by":"crossref","unstructured":"Tzoref-Brill R, Maoz S. Syntactic and semantic differencing for combinatorial models of test designs. 2017. p. 621\u201331.","DOI":"10.1109\/ICSE.2017.63"},{"key":"3134_CR27","doi-asserted-by":"crossref","unstructured":"Budd T, DeMillo R, Lipton R, Sayward F. Theoretical and empirical studies on using program mutation to test the functional correctness of programs. In: Proc. seventh ACM symp. on princ. of prog. lang. (POPL). ACM; 1980.","DOI":"10.21236\/ADA083078"},{"key":"3134_CR28","doi-asserted-by":"crossref","unstructured":"Coles H, Laurent T, Henard C, Papadakis M, Ventresque A. Pit: a practical mutation testing tool for java. In: Proceedings of the 25th international symposium on software testing and analysis. ACM; 2016. p. 449\u201352.","DOI":"10.1145\/2931037.2948707"},{"key":"3134_CR29","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/stvr.308","volume":"15","author":"Y-S Ma","year":"2005","unstructured":"Ma Y-S, Offutt J, Kwon YR. Mujava: an automated class mutation system. Softw Test Verif Reliab. 2005;15:97\u2013133.","journal-title":"Softw Test Verif Reliab."},{"key":"3134_CR30","doi-asserted-by":"crossref","unstructured":"Groce A, Holmes J, Marinov D, Shi A, Zhang L. An extensible, regular-expression-based tool for multi-language mutant generation. In: 2018 IEEE\/ACM 40th international conference on software engineering: companion (ICSE-Companion). IEEE; 2018. p. 25\u20138.","DOI":"10.1145\/3183440.3183485"},{"key":"3134_CR31","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/32.286422","volume":"20","author":"JA Offutt","year":"1994","unstructured":"Offutt JA, Lee SD. An empirical evaluation of weak mutation. IEEE Trans Softw Eng. 1994;20:337\u201344.","journal-title":"IEEE Trans Softw Eng"},{"key":"3134_CR32","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/227607.227610","volume":"5","author":"AJ Offutt","year":"1996","unstructured":"Offutt AJ, Lee A, Rothermel G, Untch R, Zapf C. An experimental determination of sufficient mutation operators. ACM Trans Softw Eng Methodol. 1996;5:99\u2013118.","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"3134_CR33","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia Y, Harman M. An analysis and survey of the development of mutation testing. IEEE Trans Softw Eng. 2011;37:649\u201378.","journal-title":"IEEE Trans Softw Eng"},{"key":"3134_CR34","doi-asserted-by":"crossref","unstructured":"Hossain SB, Dwyer MB, Elbaum S, Nguyen-Tuong A. Measuring and mitigating gaps in structural testing. In: 2023 IEEE\/ACM 45th international conference on software engineering (ICSE). 2023. p. 1712\u201323.","DOI":"10.1109\/ICSE48619.2023.00147"},{"key":"3134_CR35","doi-asserted-by":"publisher","unstructured":"Fraser G, Arcuri A. Evosuite: automatic test suite generation for object-oriented software. In: ESEC\/FSE \u201911. New York: Association for Computing Machinery; 2011. p. 416\u201319. https:\/\/doi.org\/10.1145\/2025113.2025179.","DOI":"10.1145\/2025113.2025179"},{"key":"3134_CR36","unstructured":"Sarfraz\u00a0Khurshid GR, Darko\u00a0Marinov. Software-artifact infrastructure repository. 2023. https:\/\/sir.csc.ncsu.edu\/portal\/index.php. Accessed 30 July 2023."},{"key":"3134_CR37","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1869\/1\/012072","volume":"1869","author":"JL Min","year":"2021","unstructured":"Min JL, Rajabi N, Rahmani A. Comprehensive study of sir: leading sut repository for software testing. J Phys Conf Ser. 2021;1869: 012072. https:\/\/doi.org\/10.1088\/1742-6596\/1869\/1\/012072.","journal-title":"J Phys Conf Ser"},{"key":"3134_CR38","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stvr.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo S, Harman M. Regression testing minimization, selection and prioritization: a survey. Softw Test Verif Reliab. 2012;22:67\u2013120.","journal-title":"Softw Test Verif Reliab"},{"key":"3134_CR39","doi-asserted-by":"crossref","unstructured":"Lei Y, Kacker R, Kuhn DR, Okun V, Lawrence J. Ipog: a general strategy for t-way software testing. In: 14th annual IEEE international conference and workshops on the engineering of computer-based systems (ECBS\u201907). IEEE; 2007. p. 549\u201356.","DOI":"10.1109\/ECBS.2007.47"},{"key":"3134_CR40","doi-asserted-by":"crossref","unstructured":"Reid S. An empirical analysis of equivalence partitioning, boundary value analysis and random testing. 1997. p. 64\u201373.","DOI":"10.1109\/METRIC.1997.637166"},{"key":"3134_CR41","doi-asserted-by":"crossref","unstructured":"Yandrapally R, Sinha S, Tzoref-Brill R, Mesbah A. Carving ui tests to generate api tests and api specification. 2023. p. 1971\u201382.","DOI":"10.1109\/ICSE48619.2023.00167"},{"key":"3134_CR42","doi-asserted-by":"publisher","unstructured":"Kim M, et al. Enhancing rest api testing with nlp techniques. In: ISSTA 2023. New York: Association for Computing Machinery; 2023. p. 1232\u201343. https:\/\/doi.org\/10.1145\/3597926.3598131.","DOI":"10.1145\/3597926.3598131"},{"key":"3134_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.106200","volume":"117","author":"Y Li","year":"2020","unstructured":"Li Y, Tao J, Wotawa F. Ontology-based test generation for automated and autonomous driving functions. Inf Softw Technol. 2020;117: 106200.","journal-title":"Inf Softw Technol"},{"key":"3134_CR44","doi-asserted-by":"crossref","unstructured":"Laurent T, et\u00a0al. Assessing and improving the mutation testing practice of pit. 2017. p. 430\u201335.","DOI":"10.1109\/ICST.2017.47"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03134-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03134-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03134-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T09:30:38Z","timestamp":1732699838000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03134-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":44,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["3134"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03134-3","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2024,8,27]]},"assertion":[{"value":"21 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Research Involving Human and \/or Animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"821"}}