skip to main content
article
Free Access

A methodology for controlling the size of a test suite

Published:01 July 1993Publication History
Skip Abstract Section

Abstract

This paper presents a technique to select a representative set of test cases from a test suite that provides the same coverage as the entire test suite. This selection is performed by identifying, and then eliminating, the redundant and obsolete test cases in the test suite. The representative set replaces the original test suite and thus, potentially produces a smaller test suite. The representative set can also be used to identify those test cases that should be rerun to test the program after it has been changed. Our technique is independent of the testing methodology and only requires an association between a testing requirement and the test cases that satisfy the requirement. We illustrate the technique using the data flow testing methodology. The reduction that is possible with our technique is illustrated by experimental results.

References

  1. 1 ~AHO, A. V., SETm, R., XND ULLMAN, J. D Compilers, Princzples~ Techmques, and Tool, ~Addison-Wesley, Reading~ Mass. 1986. ~ACM Transaetmns on Software Engineering and Methodology, Vol 2, No 3, July 1993 Google ScholarGoogle Scholar
  2. 2 ~BE~ZER, B. Software Testzng Techniques. Van Nostrand Reinhold, New York, 1990. Google ScholarGoogle Scholar
  3. 3 ~FRANKL, P. G., AND WEYUKER, }~. J. An applicable family of data flow testing criteria. IEEE ~Trans. Softw. Eng. SE-14, 10 (Oct. 1988), 1483-1498. Google ScholarGoogle Scholar
  4. 4 ~GAREY, M. R., AND JOHNSON, n.S. Computers and ~ntractabdity, A Guide to the Theory of ~NP-Completeness, V. Klee, Ed. Freeman, New York, 1979. Google ScholarGoogle Scholar
  5. 5 ~GUPTA, R. A reconfigurable LIW architecture and its compiler. Tech. Rep. 87-3. Dept. ~Computer Science, Univ. Pittsburgh, Pittsburgh, Pa., 1987.Google ScholarGoogle Scholar
  6. 6 ~GUPTA, R., AND SOFFA, M.L. Compile-time techniques for improving scalar access perfor- ~mance in parallel memories. IEEE Trans. Parallel and Distruibuted Systems 2, 2 (Apr. ~1991), 138-148. Google ScholarGoogle Scholar
  7. 7 ~HARROLD, M. J. An approach to incremental testing. Tech. Rep. 89-1. Ph.D dissertation. ~Dept. Computer Science, Univ. Pittsburgh, Pittsburgh, Pa., 1989. Google ScholarGoogle Scholar
  8. 8 ~HARROLD, M. J., A~D KOLTE, P. Combat: A compiler-based data flow testing system. In ~Proceedings of Pacific Northwest Quality Assurance (Oct.). Lawrence and Craig, 1992, ~311 323.Google ScholarGoogle Scholar
  9. 9 ~HARROLD, M. J., AND SOFFA, M. L. Computation of interprocedural definition and use ~dependencies. In Proceedings of IEEE Computer Society 1990 International Conference on ~Computer Languages, (New Orleans, La., Mar.). IEEE, 1990, 297-306.Google ScholarGoogle Scholar
  10. 10 ~HARROLD, M. J., AND SOFFA, M.L. An incremental data flow testing tool. In Proceedings of ~the 6th International Conference on Testing Computer Software (Washington, D.C., May). ~USPDI, 1989.Google ScholarGoogle Scholar
  11. 11 ~HARROLD, M. J., AND SOFFA, M.L. An incremental approach to unit testing during mainte- ~nance. In Proceedings of the Conference on Software Ma~nteaance 1988 (Oct.). IEEE, New ~York, 1988, 362-367.Google ScholarGoogle Scholar
  12. 12 ~LASKL J. W., AND KOREL, B. A data flow oriented program testing strategy. IEEE Trans. ~Softw. Eng. SE-9, 3 (May 1983), 347-354.Google ScholarGoogle Scholar
  13. 13 ~LEUNC, H. K., AND WHITE, L A cost model to compare regression test strategies. In ~Proceedings of Conference on Software Maintenace 1991 (Oct.). IEEE, New York, 1991, ~201 208.Google ScholarGoogle Scholar
  14. 14 ~LEUN6, H. K. L., AND WHITE, L. A study of regression testing. In Proceedings of the 6th ~International Conference on Testing Computer Software (Washington, D.C., May). USPDI, ~1989.Google ScholarGoogle Scholar
  15. 15 ~NTAFOS, S. C. An evaluation of required element testing strategies. In Proceedings of the ~7th International Conference on Software Engineering (Mar.). IEEE, New York, 1984, ~250-256. Google ScholarGoogle Scholar
  16. 16 ~OSTRAND, T. J., AND WEYUKER, E.J. Using data flow analysis for regression testing. In ~Proceedtngs of the 6th Annual Pacific Northwest Software Quality Conference (Sept.). IEEE, ~New York, 1988, 58-71.Google ScholarGoogle Scholar
  17. 17 ~RAPPS, S., AND WEYUKER, E.J. Selecting software test data using data flow information. ~IEEE Trans. Softw. Eng. SE-11, 4 (Apr. 1985), 367-375. Google ScholarGoogle Scholar
  18. 18 ~TAHA, A. M., THEBUT, S. M., AND LIu, S.S. An approach to software fault localization and ~revalidation-based on incremental data flow analysis. In Proceedings of COMPSAC 89 ~(Sept.). IEEE, New York, 1989, 527-534.Google ScholarGoogle Scholar

Index Terms

  1. A methodology for controlling the size of a test suite

          Recommendations

          Reviews

          Michael Marcotty

          Typically, the many modifications that a program undergoes during its lifetime require the development of new test cases, which are usually added to the test suite used for regression testing after modification. Unless special steps are taken, the test suite grows and regression testing becomes time-consuming. This paper presents a technique that helps in the management of software test suites by identifying a representative set of test cases from a suite that provides the same coverage as the entire test suite. This selection is performed by identifying and then eliminating the redundant and obsolete test cases in the test suite. The representative set replaces the original test suite. The representative set can also be used to identify those test cases that should be rerun to test the program after it has been changed. The authors discuss their algorithm in detail and illustrate its use in data flow testing methodology. They also give experimental results that show that, even for small programs, a significant reduction in the test suite may be realized.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader