{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:13:24Z","timestamp":1769728404931,"version":"3.49.0"},"reference-count":46,"publisher":"World Scientific Pub Co Pte Lt","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Soft. Eng. Knowl. Eng."],"published-print":{"date-parts":[[2015,5]]},"abstract":"<jats:p> Model-based testing has been intensively and extensively studied in the past decades. Extended Finite State Machine (EFSM) is a widely used model of software testing in both academy and industry. This paper provides a survey on EFSM-based test case generation techniques in the last two decades. All techniques in EFSM-based test case generation are mainly classified into three parts: test sequence generation, test data generation, and test oracle construction. The key challenges, such as coverage criterion and feasibility analysis in EFSM-based test case generation are discussed. Finally, we summarize the research work and present several possible research areas in the future. <\/jats:p>","DOI":"10.1142\/s0218194015300018","type":"journal-article","created":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T05:58:43Z","timestamp":1442555923000},"page":"633-667","source":"Crossref","is-referenced-by-count":17,"title":["EFSM-Based Test Case Generation: Sequence, Data, and Oracle"],"prefix":"10.1142","volume":"25","author":[{"given":"Rui","family":"Yang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Nanjing University, Nanjing 210046, China"},{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]},{"given":"Zhiyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Nanjing University, Nanjing 210046, China"},{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210046, China"}]}],"member":"219","published-online":{"date-parts":[[2015,9,17]]},"reference":[{"key":"rf1","volume-title":"Software Testing Techniques","author":"Beizer Z.","year":"1990"},{"key":"rf2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"rf4","doi-asserted-by":"publisher","DOI":"10.1109\/5.533956"},{"key":"rf5","doi-asserted-by":"publisher","DOI":"10.1145\/1459352.1459354"},{"key":"rf6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.07.001"},{"key":"rf13","volume-title":"Practical Model-Based Testing: A Tools Approach","author":"Utting M.","year":"2006"},{"key":"rf14","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.08.004"},{"key":"rf15","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(91)90024-6"},{"key":"rf18","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2009.0092"},{"key":"rf19","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00132-7"},{"key":"rf21","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxl003"},{"key":"rf25","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(03)00116-6"},{"key":"rf26","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(98)00172-8"},{"key":"rf27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233197"},{"key":"rf28","first-page":"48","volume":"21","author":"Zhou X.","year":"2000","journal-title":"Journal of China Institute of Communications"},{"key":"rf29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265734"},{"key":"rf30","doi-asserted-by":"publisher","DOI":"10.1109\/26.81739"},{"key":"rf33","first-page":"367","author":"Weyuker E.","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"key":"rf36","unstructured":"C. M.\u00a0Huang, Y. C.\u00a0Lin and M. Y.\u00a0Jang, IFIP Transactions C: Communication Systems \u2014 Protocol Test Systems (1995)\u00a0pp. 20\u201335."},{"key":"rf37","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.1999.9670497"},{"key":"rf39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.06.001"},{"key":"rf40","first-page":"37","volume":"18","author":"Pang Q.","year":"1997","journal-title":"Journal of China Insititue of Communications"},{"key":"rf41","first-page":"1096","volume":"37","author":"Zhao B. H.","year":"2007","journal-title":"Journal of University of Science and Technology of China"},{"key":"rf43","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2004.1275300"},{"key":"rf44","volume-title":"Linear Programming: An Introduction to Finite Improvement Algorithms","author":"Solow D.","year":"1984"},{"key":"rf46","first-page":"1197","volume":"12","author":"Wang J.","year":"2001","journal-title":"Journal of Software"},{"key":"rf48","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.06.005"},{"key":"rf49","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194001000487"},{"key":"rf50","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-009-0057-9"},{"key":"rf63","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"key":"rf64","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"rf69","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"rf70","first-page":"1295","volume":"26","author":"Zhang Y.","year":"2003","journal-title":"Chinese Journal of Computers"},{"key":"rf72","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.06.004"},{"key":"rf73","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"rf74","first-page":"588","volume":"44","author":"Yang R.","year":"2014","journal-title":"Science China-F"},{"key":"rf77","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233818"},{"key":"rf78","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.913109"},{"key":"rf80","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.026"},{"key":"rf85","doi-asserted-by":"publisher","DOI":"10.1109\/32.87284"},{"key":"rf87","doi-asserted-by":"publisher","DOI":"10.1145\/1538942.1538944"},{"key":"rf88","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00063-6"},{"key":"rf89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73066-8_23"},{"key":"rf98","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.72"},{"key":"rf99","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4746-9"},{"key":"rf100","first-page":"1","volume":"57","author":"Zhang W.","year":"2014","journal-title":"Science China Information Science"}],"container-title":["International Journal of Software Engineering and Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218194015300018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T16:45:44Z","timestamp":1565109944000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218194015300018"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":46,"journal-issue":{"issue":"04","published-online":{"date-parts":[[2015,9,17]]},"published-print":{"date-parts":[[2015,5]]}},"alternative-id":["10.1142\/S0218194015300018"],"URL":"https:\/\/doi.org\/10.1142\/s0218194015300018","relation":{},"ISSN":["0218-1940","1793-6403"],"issn-type":[{"value":"0218-1940","type":"print"},{"value":"1793-6403","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5]]}}}