Generating Test Cases Through Markov Models for Undertaking Comprehensive Testing of Embedded Systems
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 10
Abstract
Cleanroom Software Engineering (CRSE) methodology has incorporated in it, the Markov models based on which the number of test cases that should be used for testing can be determined. Model based statistics are developed based on Markov model and the same are used for determining the number of test cases that should be used for testing each path contained in a Usage model. A very few methods have been presented in literature which define the actual process to be used for generating the test cases especially considering the testing of embedded systems. Every embedded system should be tested comprehensively and testing must include both hardware and software states that exist in every path of the Markov model. Testing embedded systems comprehensively requires usage of many methods which include Scaffolding, Logical analysis, etc. and undertaking testing at different locations. In this paper, a formal method has been presented which generates test cases using Markov model for achieving comprehensive testing of an embedded system.
Authors and Affiliations
D. Bala Krishna Kamesh , Dr. A. K. Vasishtha , Dr. JKR Sastry , Dr. V Chandra Prakash
Multicast Routing Techniques To Make Optical Network Survivable Against Single Link/Node Failure.
Link/Node failures are very common in any networks but these failures have a huge impact on the overall performance of the network. Due to these link/node failures sometimes it is impossible to communicate in b/w t...
A Survey on Hierarchical Routing Protocols in Wireless Sensor Networks
There is several issues in Wireless Sensor Networks from which routing are also a major issue which is directly related to energy consumption. In order to increase the lifetime of network energy must be consumed...
‘On Demand Service Management’ For Next Generation Mobile Networks [LTE] Using Agents
The novelty of our work is the development of an optimal service provisioning and customer experience management framework, adding value to the mobile user community and also to the business development of network servic...
A Study on Network Security Aspects and Attacking Methods
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better u...
Fake Access Point Detection and Prevention Techniques
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...