Charting past, present, and future research in ubiquitous computing
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction in the new millennium, Part 1
Semi-proving: an integrated method based on global symbolic evaluation and metamorphic testing
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
Reconfigurable Context-Sensitive Middleware for Pervasive Computing
IEEE Pervasive Computing
Designing mobile commerce applications
Communications of the ACM - Mobile computing opportunities and challenges
Multimodal processing by finding common cause
Communications of the ACM - Multimodal interfaces that flex, adapt, and persist
Journal of Systems and Software - Special issue: Ubiquitous computing
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Testing Context-Sensitive Middleware-Based Software Applications
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Towards a Metamorphic Testing Methodology for Service-Oriented Software Applications
QSIC '05 Proceedings of the Fifth International Conference on Quality Software
An empirical comparison between direct and indirect test result checking approaches
Proceedings of the 3rd international workshop on Software quality assurance
Automated metamorphic testing on the analyses of feature models
Information and Software Technology
Hi-index | 0.00 |
During the testing of context-sensitive middleware-based software, the middleware identifies the current situation and invokes the appropriate functions of the applications. Since the middleware remains active and the situation may continue to evolve, however, the conclusion of some test cases may not be easily identified. Moreover, failures appearing in one situation may be superseded by subsequent correct outcomes and may, therefore, be hidden. We alleviate the above problems by making use of a special kind of situation, which we call checkpoints, such that the middleware will not activate the functions under test. We propose to generate test cases that start at a checkpoint and end at another. We identify functional relations that associate different execution sequences of a test case. Based on a metamorphic approach, we check the results of the test case to detect any contravention of such relations. We illustrate our technique with an example that shows how re-hidden failures may be detected.