A REVIEW ON CODE COVERAGE ANALYSIS
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 10
Abstract
The quality of any software predominantly depends upon the software testing. Code coverage testing is one such technique that plays an important role to achieve the software for better quality and maintenance. The code coverage evaluates the testing effectiveness and provides data on different coverage items. Code coverage analysis measure what amount of source is covered by text execution. Using structural coverage, architectural coverage and requirement coverage the complete software testing can be measured. This review focus on techniques of structural coverage testing that is also known as code coverage testing. The code coverage can be done by some special analysis tools which are known as code coverage tools.
Authors and Affiliations
SARITA PATHY , SANTOSH PANDA , SARADA BABOO
Novel Approach for Detection of Brain Tumor using Segmentation Techniques
Medical Image Processing is one of the standard method to detect the abnormal tissue. The key benefit of this field is reduction of manual work and early detection of the disease. Various types of medical imaging modalit...
A Survey on Quality of Service and Congestion Control
Several techniques have been developed to meet the demand for faster and more efficient access to the Internet. Different applications have different networking requirements. For example, realtime interactive voice requi...
BASE STATION DRIVEN ROUTING PROTOCOL EVALUATION USING TOSSIM
Routing protocols play an important role in wireless sensor networks. There are primarily two types of protocols viz. data collection and data dissemination protocols. This paper compares two collection protocols: Base S...
A Secure Image Steganography Method Based on Neural Network
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...
Efficient Data Sharing with Unbounded Ciphertext Classes in Cloud Storage using Single key
Cloud computing is an emerging paradigm in which resources of the computing infrastructure can be able to share over the internet. As this paradigm also have many challenges for data security and access control when user...