[1] |
HARROLD M J , GUPTA R , SOFFA M L . A methodology for controlling the size of a test suite[J]. ACM Transactions of Engineering and Methodology, 1993,2(3): 270-285.
|
[2] |
屈婉霞, 李暾, 郭阳 ,等. 谓词抽象技术研究[J]. 软件学报, 2008,19(1): 27-38. QU W X , LI T , GUO Y ,et al. Advances in predicate abstraction[J]. Journal of Software, 2008,19(1): 27-38.
|
[3] |
HONG H S , CHA S D , LEE I ,et al. Data flow testing as model checking[A]. Proceedings of the 25th International Conference on Software Engineering[C]. Portland, 2003, 232-243.
|
[4] |
CHVATAL V . A greedy heuristic for the set-covering problem[J]. Mathematics of Operations Research, 1979,4(3): 233-235.
|
[5] |
CHEN T Y , LAU M F . On the completeness of a test suite reduction strategy[J]. The Computer Journal, 1999,42(5): 430-440.
|
[6] |
LEE J G , CHUNG C G . An optimal representative set selection method[J]. Information and Software Technology, 2000,42(21): 17-25.
|
[7] |
章晓芳, 徐宝文, 聂长海 ,等. 一种基于测试需求约简的测试用例集优化方法[J]. 软件学报, 2007,18(4): 821-831. ZHANG X F , XU B W , NIE C H ,et al. An approach for optimizing test suite based on testing requirement reduction[J]. Journal of Software, 2007,18(4): 821-831.
|
[8] |
程亮, 张阳, 冯登国 . 一种基于安全状态转移的简并测试集生成方法[J]. 软件学报, 2010,21(3): 539-547. CHENG L , ZHANG Y , FENG D G . Approach of degenerate test set generation based on secure state transition[J]. Journal of Software, 2010,21(3): 539-547.
|
[9] |
徐明迪, 张焕国, 严飞 . 基于标记变迁系统的可信计算平台信任链测试[J]. 计算机学报, 2009,32(4): 635-645. XU M D , ZHANG H G , YAN F . Testing on trust chain of trusted computing platform based on labeled transition system[J]. Chinese Journal of Computers, 2009,32(4): 635-645.
|
[10] |
SUSANNE G , HASSEN S . Construction of abstract state graphs with PVS[A]. Proceedings of the 9th International Conference on Computer Aided Verification[C]. Berlin, 1997. 72-83.
|
[11] |
HENZINGER T A , JHALA R , MAJUMDAR R . Lazy abstraction[A]. ACM Symposium on Principles of Programming Language[C]. Oregon, 2002. 58-70.
|
[12] |
DETLEFS D , NELSON G , SAXE J B . Simplify:a theorem prover for program checking[J]. Journal of the ACM, 2005,52(3): 365-473.
|
[13] |
CHEN T Y , LAU M F . A simulation study on some heuristics for test suite reduction[J]. Information and Software Technology, 1998,40(13): 777-787.
|
[14] |
沈昌祥, 张焕国, 冯登国 ,等. 信息安全综述[J]. 中国科学E辑, 2007,37(2): 129-150. SHEN C X , ZHANG H G , FENG D G ,et al. Survey of information security[J]. Science in China,Series E,Information Sciences, 2007,37(2): 129-150.
|