Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/108005
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wagner, M. | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Proceedings of the 2014 IEEE Congress on Evolutionary Computation, 2014, pp.2885-2892 | - |
dc.identifier.isbn | 9781479914883 | - |
dc.identifier.uri | http://hdl.handle.net/2440/108005 | - |
dc.description.abstract | The correctness of program verification systems is of great importance, as they are used to formally prove that safety- and security-critical programs follow their specification. One of the contributing factors to the correctness of the whole verification system is the correctness of the background axiomatization, which captures the semantics of the target program language. We present a framework for the maximization of the proportion of the axiomatization that is used (“covered”) during testing of the verification tool. The diverse set of test cases found not only increases the trust in the verification system, but it can also be used to reduce the time needed for regression testing. | - |
dc.description.statementofresponsibility | Markus Wagner | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.rights | © 2014 IEEE | - |
dc.source.uri | http://dx.doi.org/10.1109/cec.2014.6900324 | - |
dc.title | Maximising axiomatization coverage and minimizing regression testing time | - |
dc.type | Conference paper | - |
dc.contributor.conference | IEEE Congress on Evolutionary Computation (CEC) (6 Jul 2014 - 11 Jul 2014 : Beijing, China) | - |
dc.identifier.doi | 10.1109/CEC.2014.6900324 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Wagner, M. [0000-0002-3124-0061] | - |
Appears in Collections: | Aurora harvest 8 Computer Science publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RA_hdl_108005.pdf Restricted Access | Restricted Access | 1.04 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.