Prioritizing Test Cases Using Business CriticalityTest Value
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 5
Abstract
Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems can be handled using a good test case prioritization technique. A prioritization technique schedules the test cases for execution so that the test cases with higher priority executed before lower priority. The objective of test case prioritization is to detect fault as early as possible. Early fault detection can provide a faster feedback generating a scope for debuggers to carry out their task at an early stage. Model Based Prioritization has an edge over Code Based Prioritization techniques. The issue of dynamic changes that occur during the maintenance phase of software development can only be addressed by maintaining statistical data for system models, change models and fault models. In this paper we present a novel approach for test case prioritization by evaluating the Business Criticality Value (BCV) of the various functions present in the software using the statistical data. Then according to the business criticality value of various functions present in the change and fault model we prioritize the test cases are prioritized
Authors and Affiliations
Sonali Khandai, Arup Abhinna Acharya, Durga Prasad Mohapatra
Development of Purchasing Module for Agriculture E-Commerce using Dynamic System Development Model
Trading model has been changing since the vast implementation of Information and Communication Technology in every sector. This model is known as e-Commerce. Unlikely, there is still limited company which specifically tr...
Improved Cryptanalysis of Provable Certificateless Generalized Signcryption
Certificateless generalized signcryption adaptively work as certificateless signcryption, signature or encryption scheme having single algorithm for suitable storage-constrained environments. Recently, Zhou et al. propos...
Multicast Routing Problem Using Tree-Based Cuckoo Optimization Algorithm
The problem of QoS multicast routing is to find a multicast tree with the least expense/cost which would meet the limitations such as band width, delay and loss rate. This is a NP-Complete problem. To solve the problem o...
Implementation of Vision-based Object Tracking Algorithms for Motor Skill Assessments
Assessment of upper extremity motor skills often involves object manipulation, drawing or writing using a pencil, or performing specific gestures. Traditional assessment of such skills usually requires a trained person t...
A Multi-Threaded Symmetric Block Encryption Scheme Implementing PRNG for DES and AES Systems
Due to the ever-increasing efficiency of computer systems, symmetric cryptosystem are becoming more vulnerable to linear cryptanalysis brute force attacks. For example, DES with its short key (56 bits) is becoming easier...