References

  1. J. H. Andrews, L. C. Briand & Y. Labiche (2005): Is Mutation an Appropriate Tool for Testing Experiments?. In: Proceedings of the 27th International Conference on Software Engineering (ICSE'05), St Louis, Missouri, pp. 402–411, doi:10.1145/1062455.1062530.
  2. M. M. Brandis & H. Mössenböck (1994): Single-pass generation of static assignment form for structured languages. ACM TOPLAS 16(6), pp. 1684–1698, doi:10.1145/197320.197331.
  3. Hélène Collavizza, Michel Rueher & Pascal Hentenryck (2010): CPBPV: a constraint-programming framework for bounded program verification. Constraints 15, pp. 238–264, doi:10.1007/s10601-009-9089-9.
  4. Tristan Denmat, Arnaud Gotlieb & Mireille Ducassé (2007): Improving constraint-based testing with dynamic linear relaxations. In: In 18th IEEE International Symposium on Software Reliability Engineering (ISSRE’ 2007, doi:10.1109/ISSRE.2007.12.
  5. I.P. Gent, C. Jefferson & I. Miguel (2006): Minion: A fast, scalable, constraint solver. In: 17th European Conference on Artificial Intelligence ECAI-06, Trento, Italy, pp. 98–102.
  6. A. Gotlieb (2009): Euclide: A Constraint-Based Testing Framework for Critical C Programs. In: Software Testing Verification and Validation, 2009. ICST '09. International Conference on, pp. 151 –160, doi:10.1109/ICST.2009.10.
  7. Arnaud Gotlieb, Bernard Botella & Michel Rueher (1998): Automatic test data generation using constraint solving techniques. In: Proceedings of the 1998 ACM SIGSOFT international symposium on Software testing and analysis, ISSTA '98. ACM, New York, NY, USA, pp. 53–62, doi:10.1145/271775.271790.
  8. Robert Hierons, Mark Harman & Sebastian Danicic (1999): Using Program Slicing to Assist in the Detection of Equivalent Mutants. Software Testing, Verification and Reliability 9, pp. 233–262.
  9. Y. Jia & Mark Harman (2010): An Analysis and Survey of the Development of Mutation Testing. IEEE Transactions of Software Engineering 99, pp. 1, doi:10.1109/TSE.2010.62.
  10. Mihai Nica, Simona Nica & Franz Wotawa (2010): Does testing help to reduce the number of potentially faulty statement in debugging?. In: Testing: Academic & Industrial Conference Practice and Research Techniques (TAIC PART). Springer LNCS.
  11. S. Nica & B. Peischl (2009): Challenges in Applying Mutation Analysis on EJB-based Business Applications. In: Proceedings of Metrikon 2009, Kaiserslautern, Germany.
  12. A. J. Offutt & W. M. Craft (1994): Using compiler optimization techniques to detect equivalent mutants. Software Testing, Verification, and Reliability, pp. 131–154, doi:10.1002/stvr.4370040303.
  13. Jie Pan (1994): Using Constraints to Detect Equivalent Mutants. George Mason University, Fairfax, VA.
  14. G. Rothermel & M.J. Harrold (1990): Empirical studies of a safe regression test selection technique. IEEE Transactions on Software Engineering 24(6), pp. 401––419, doi:10.1145/367008.367020.
  15. David Schuler & Andreas Zeller (2010): (Un-)Covering Equivalent Mutants. In: ICST '10: Third International Conference on Software Testing, Verification and Validation. IEEE Computer Society, pp. 45–54, doi:10.1109/ICST.2010.30.
  16. Y.S.Ma, J. Offutt & Y. R. Kwon (2005): MuJava : An Automated Class Mutation System. Software Testing, Verification and Reliability 15, pp. 97–133, doi:10.1002/stvr.308.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org