SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA, Vol.17, No.2, April 2019, pp.844~851
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i2.10332 ๏ฎ 844
Received June 11, 2018; Revised November 8, 2018; Accepted December 19, 2018
Regression test selection model: a comparison
between ReTSE and pythia
Amir Ngah*
1
, Malcolm Munro
2
, Zailani Abdullah
3
, Masita A.Jalil
4
, Mohamad Abdallah
5
1,4
School of Informatics and Applied Mathematics, Universiti Malaysia Terengganu
(UMT), 21030 Kuala Terengganu, Malaysia
2
Department of Computer Science, Durham University, DL1 3LE Durham, UK
3
Centre of Computing and Informatics, Universiti Malaysia Kelantan, Kota Bharu, Malaysia
5
Faculty of Science and IT, Az-Zaytoonah University of Jordan, Amman, Jordan
*Corresponding author, e-mail: amirnma@umt.edu.my
1
, malcolm.munro@durham.ac.uk
2
,
zailania@umk.edu.my
3
, masita@umt.edu.my
4
, m.abdallah@zuj.edu.jo
5
Abstract
As software systems change and evolve over time regression tests have to be run to validate
these changes. Regression testing is an expensive but essential activity in software maintenance.
The purpose of this paper is to compare a new regression test selection model called ReTSE with Pythia.
The ReTSE model uses decomposition slicing in order to identify the relevant regression tests.
Decomposition slicing provides a technique that is capable of identifying the unchanged parts of a system.
Pythia is a regression test selection technique based on textual differencing. Both techniques are compare
using a Power program taken from Vokolos and Franklโ€™s paper. The analysis of this comparison has
shown promising results in reducing the number of tests to be run after changes are introduced.
Keywords: decomposition slicing, program slicing, pythia, regression test selection, regression testing,
ReTSE
Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
There are many techniques have been proposed in regression testing racently [1-11].
The most important issue in regression testing is how to minimize the reuse of the existing test
cases for the modified program. One of the techniques to tackle this issue is called regression
test selection. This technique attempts to reduce the cost of regression testing by selecting
appropriate test cases using information from the certified program, the modified program and
the existing test suite [12]. Previous regression test selection approaches used an inclusive
technique. Inclusive means the techniques select test cases directly from test suite that are
needed in regression testing.
Regression test selection techniques can be divided into categories based on the
elements used such as control-flow based [1], code entities based [13], textual differencing
based [14, 15], and program slicing based [16-19]. Rothermel and Harrold [12] proposed a safe
and efficient regression test selection technique based on control-flow graphs (CFG). They
developed two main algorithms based on intraprocedural and interprocedural test selection
algorithms. The intraprocedural algorithm operates on individual procedures and the
interprocedural operates on entire programs or subsystems. In this technique, both the original
and modified program will be transformed into a CFG in order to perform a comparison. The
comparison algorithm will compare each node in both CFGs. If nodes differ, the algorithm will
select tests from an existing test suite that exercised the node. Chen et al. [9] propose a
regression test selection technique based on identifying modified code entities such as
functions, variables, types, and macros. Test cases that have traversed the modified code
entities will be counted in the test suite for the modified program. Vokolos and Frankl [14, 15]
have developed a tool called Pythia that is used to reduce the cost of regression testing. The
Unix-based tool implements an analysis technique that is called textual differencing and works
by comparing the source files from the certified and modified programs. The Pythia tool can be
used to analyse software systems written in the C programming language.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Regression test selection model: a comparison... (Amir Ngah)
845
There are a number of regression test selection techniques based on program slicing
techniques. Binkley [16] conducted a survey about the application of program slicing to
regression testing. He divided the technique into three groups of program slicing that are used
in regression testing. The first group uses dynamic slicing, the second group uses program
dependent graphs (PDG), and the third group is based on Weiser's data flow definition of
slicing [20]. Agrawal et al. [18] have proposed three algorithms to be used in their technique
called incremental regression testing. The algorithms are an execution slice, a dynamic slice,
and a relevant slice. The execution slice of the program with respect to a test case is referred to
as the set of statements executed under that test case. The dynamic program slice with respect
to the output variables gives the statements that are not only executed but also have an effect
on the program output under that test case. The relevant slice with respect to the program
output for a test case is referred to the set of statements that, if modified, may alter the program
output for the given test case.
Gupta et al. [19] have developed a data flow based regression testing technique that
uses slicing algorithms to explicitly determine the affected definition-use associations made by a
program change. The technique uses two slicing algorithms to detect directly and indirectly
affected def-use associations. The first algorithm works backward from the changed statement
to its definitions. The second algorithm is a forward walk from the same point as the first
algorithm. The forward algorithm detects uses, and subsequent definitions and uses, which are
affected by a definition that is changed at that point. Vedpal and Chaulan [21] have proposed a
regression test selection technique based on identification of affected paths, affected functions
and dynamic slicing which can be used to reduce the number of test cases for regression
testing. This technique has two main processes. The first process is the construction of the
OPDG (Object Oriented Program Dependency Graphs) for the modified program. The second
process is a selection of test cases based on an algorithm that involved dynamic slicing. Qu et
al. [22] have proposed a configuration selection approach for regression testing. Their technique
addresses the solution to the redundancy issue in retest-all approach for configurable systems.
The technique has employed an existing static slicing tool called CodeSurfer for computing the
configurable option impact and the code change impact.
Xing et al. [23] have developed a new regression test selection technique based on the
program dependence graphs of the original program and its modified version. The technique
has embedded slicing technique in their two main steps. Comparing with previous techniques,
they claimed their technique can eliminate some unnecessary tests to rerun. All these slicing
based RTS techniques are classified as inclusion techniques which select test cases from the
test suite that are needed in regression testing. The idea of the regression test selection by
exclusion was proposed by Gallagher et al. [24]. Ngah et al. [25] have developed a new
regression test selection by exclusion using decomposition slicing called ReTSE. Exclusion
technique omits test cases from test suite that are not needed in regression testing. This paper
presents the comparison between ReTSE model and Pythia technique.
2. ReTSE Model
The ReTSE model [25] is a four phase model that has three inputs and three outputs.
The inputs are: the Certified Program (C); the Modified Program (M); and the existing Test Suite
(TS) which includes test cases and associated test histories. The outputs are: a set of Excluded
Tests (ET); a set of Optimised Regression Tests (RTO); and notification that new test cases are
required. The Phases of the model are: Program Analysis, Comparison, Exclusion and
Optimisation.
Phase 1 has two main steps which are Pretty Print Step and Slicing Step. This phase
will produce decomposition slices for both Certified Program (C) and Modified Program (M). In
Phase 2, the decomposition slices will be compared in order to produce a set of Similar
Decomposition Slices (S), Different Decomposition Slices (D), Deleted Decomposition Slices (L)
and New Decomposition Slices (N). In Phase 3, any test cases that not related to the D will be
excluded from test suite. Finally in the Phase 4, the model will identify any redundant test cases
that may exist in regression tests produced in Phase 3. More details explaination about the
ReTSE model can be founded in [25].
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 844-851
846
3. Results and Analysis
Vokolos and Frankl [14] have used Power program to illustrate the Pythia, a textual
differencing technique. The program aims to raise a floating point number to an integer power,
using Dijkstraโ€™s algorithm. The program consists of two files: main.c and power.c. Each file
contains one function. The old version of the power program (power.c) is shown in Figure 1.
Because the ReTSE model only concentrates on intraprocedural, it is assumed that the
changes only occur in the power.c. The new version of power function (power-v1.c) is shown in
Figure 2. The old version is called Certified Program (C) and the new version is called Modified
Program (M) in the ReTSE model.
Figure 1. Certified Program (C)-power.c Figure 2. Modified Program (M)-power-v1.c
Vokolos and Frankl used five test cases (TCi) to test the Certified Program (C).
The input and output values for each test cases are shown in Table 1. Test case TC2 in Table 1
catches an error in the certified program. The THi of each TCi for C (power.c program) is shown
in Table 2. In their model, THi is called a basic block execution trace which is an execution trace
of a test case based on a basic block concept. A basic block is a sequence of consecutive
statements with the property that control enters at the beginning statements and may leave only
at the very last statement [14]. However, the THi in Table 2 is slightly different from their paper
in order to consider a statement based used in the ReTSE model. The X symbol in Table 2
shows that the statement is executed for that TCi. The - symbol is for statement not executed.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Regression test selection model: a comparison... (Amir Ngah)
847
These programs and information are used to analyse the ReTSE model based on their 4
phases.
Table 1. Test Suite for Certified Program
(Power Program)
Test Case (TCi) Input Output
TC1 -5.02 25
TC2 -3,03 27
TC3 2.00 1
TC4 1.04 1
TC5 0.0-1 0
Table 2. Test History (THi) of TCi for
Certified Program (power.c)
Statement TH1 TH2 TH3 TH4 TH5
S1 X X X X X
S2 X X X X X
S3 X X X X X
S4 - - - - X
S5 - - - - X
S6 X X X X -
S7 X X X X X
S8 X X - - -
S9 X X - - -
S10 X X X X X
S11 X X - X X
S12 X X - X -
S13 X X - X -
S14 X X - X X
S15 X X X X X
S16 - - - - -
S17 X X X X X
3.1.Phase 1: Program Analysis
The Original Certified Program and the Original Modified Program of the power program
are assumed to have gone through the Pretty Print Step. The outputs of this step are a Certified
Program (C) and Modified Program (M) as shown in Figure 2 and Figure 3 respectively. The M
has two additional new statements at S10โ€™ and S11โ€™ in order to tackle the problem raised in the
Certified Program (C).
In the Slicing Step, both C and M are decomposed into decomposition slices
corresponding to their variables in the programs. Therefore, both programs have five
decomposition slices corresponding to five variables which are x, recip, n, sgn and y.
Decomposition slices for variables sgn and y are similar as shown in Figure 4. The output
summary of the Slicing Step is given below:
DS-C = {DS-Cx, DS-Crecip, DS-Cn, DS-Csgn, DS-Cy} DS-M = {DS-Mx, DS-Mrecip, DS-Mn,
DS-Msgn, DS-My}
Figure 3. Decomposition Slice for Variable n (Power Program)
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 844-851
848
3.2. Phase 2: Comparison
In the first part of the Comparison Phase, the decomposition slices in the DS-C are
compared to the decomposition slices in the DS-M using the diff tool. There is no output
produced from the diff tool for the comparison between DS-Cx and DS-Mx. Similar result was
achieved in the comparison between DS-Crecip and DS-Mrecip. Therefore, these
decomposition slices are included in a set of pairs of Similar Decomposition Slice (S). An output
is produced from the diff tool for the comparison between DS-Cn and DS-Mn as shown in
Figure 3. Therefore, both decomposition slices are included in a set of pairs of Difference
Decomposition Slice (D). The DS-Csgn and DS-Msgn as shown in Figure 4 are also included in
the D because the output is produced from the diff tool for this comparison. The DS-Cy and
DS-My in Figure 4 are also included in the D because the diff tool also produces an output from
this comparison. The output summary of the first part of the Comparison Phase is shown
in Table 3.
Figure 4. Decomposition Slice for Variable sgn/y (Power Program)
Table 3. Comparison Results between DS-Cvi and DS-Mvi (Power Program)
Set of Member of Set
D {(DS-Cn, DS-Mn), (DS-Csgn, DS-Msgn), (DS-Cy, DS-My)}
S {(DS-Cx, DS-Mx), (DS-Crecip, DS-Mrecip)}
S {}
L {}
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Regression test selection model: a comparison... (Amir Ngah)
849
The second part of the Comparison Phase is a more detailed comparison between
DS-Cvi and DS-Mvi only if they are members of D. In this case, only the decomposition slices
for variables sgn (DS-Csgn and DS-Msgn), n (DS-Cn and DSMn) and y (DS-Cy and DS-My)
areinvolved in the second part of the comparison because they are members of D (shown in the
first part of the comparison). The comparison output using the diff tool is given below:
a. Comparison between DS-Csgn and DS-Msgn 19a20,23
> if (n % 2 ==1)
> {
> sgn = -1;
> }
b. Comparison between DS-Cn and DS-Mn 8a9,12
> if (x < 0.0e0
> {
> if (n % 2 ==1)
> }
c. Comparison between DS-Cy and DS-My 19a20,23
> if (n % 2 ==1)
> {
> sgn = -1;
> }
In the comparison between DS-Csgn and DS-Msgn (Figure 4), the statement at line 19
([L9]) from DS-Csgn is included in the set of Change Statement for variable sgn (CSsgn). Any
statement in the range of lines 20 ([L20]) to 23 ([L23]) from DS-Msgn is included in the set of
Relevant Change statement for variable sgn (RCSsgn). Therefore, S9 from DS-Csgn is included
in the CSsgn and statements S10โ€™ and S11โ€™ from DS-Msgn are included in the RCSsgn.
Statement S9โ€™ is also included in the the RCSsgn because it is located at the same branch of
statement S10โ€™. The same happens to the comparison between DS-Cy and DS-My as shown in
Figure 4 where statement S9 from DS-Cy is included in the CS y and statements S9โ€™, S10โ€™ and
S11โ€™ from DS-My are included in the RCSy.
In the comparison between DS-Cn and DS-Mn as shown in Figure 3, line 8 ([L8]) is not
a statement but a close curly bracket (}). Therefore, the statement immediately after that symbol
will be included in the set of Change Statement for variable n (CSn). Any statement in the range
of lines 9 ([L9]) to 12 ([L12]) from DSMn is included in the set of Relevant Change Statement for
variable n (RCSn). Therefore, statement S10 is included in the CSn and statements S8โ€™ and
S10โ€™ are included in the RCSn. Then the CS is produced from the union of CSsgn, CSy and
CSn where the RCS is produced from the union of RCSsgn, RCSy and RCSn. A summary of
the second part of the Comparison Phase is given below:
CS = CSsgn U CSy UCSn
= {S9} U {S9} U {S10}= {S9, S10} RCS= RCSsgn U RCSy U RCSn
= {S9โ€™, S10โ€™, S11โ€™} U {S9โ€™, S10โ€™, S11โ€™} U {S8โ€™, S10โ€™}
= {S8โ€™, S9โ€™, S10โ€™, S11โ€™}
3.4. Phase 3: Exclusion
There are five test cases (TCi) that were used by Vokolos and Frankl for Certified
Program (C) of power.c program as shown in Table 1. Their THi is shown in Table 2. Any TCi
where the CS is not subset of THi, will be included in the set of Excluded Test (ET). In this case,
the CS which includes statements S9 and S10, is not subset of TH3, TH4 and TH5. Therefore,
TC3, TC4, and TC5 will be included in the set of ET. The remaining test cases in Test Suite are
included in the set of Regression Tests (RT). Therefore, TC1 and TC2 are included in the RT. A
summary of the Exclusion Phase is given below:
RT= {TC1, TC2}
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 844-851
850
3.5. Phase 4: Optimisation
In the Optimisation Phase, all TCi that are members of the RT will be executed onto
UDS-M. In this case, there are only three DS-Mvi members of D which are DS-Msgn, DS-Mn
and DS-My. The union of these decomposition slices (UDS-M) has produced the same program
as M (power-v1.c) as shown in Figure 2 which includes statements S1โ€™, S2โ€™, S3โ€™, S4โ€™, S5โ€™, S6โ€™,
S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™, 14โ€™, S15โ€™, S16โ€™, S17โ€™, S18โ€™ and S19โ€™. The RCS produced in
the second part of the Comparison Phase is used here. The RCS includes statements S8โ€™, S9โ€™,
S10โ€™ and S11โ€™.
Test cases in RT, which are TC1 and TC2, are sequently executed onto the UDS-M.
Firstly, TC1 is executed onto UDS-M. The RTE1 for TC1 is S1โ€™, S2โ€™, S3โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™,
S11โ€™, S12โ€™, S13โ€™, S14โ€™, S15โ€™, S16โ€™, S17โ€™ and S19โ€™. The RTE1 contains all members of RCS. That
means the RCS receive full coverage by executed only the TC1. The execution of test cases is
stopped because the RCS has already achieved full coverage. This means it is enough to use
only TC1 as a regression test for the modified program. Therefore, TC1 will be included in the
RTO. The remaining test case TC2 will be ignored for RTO. A summary of the Optimisation
Phase is given below:
UDS-M = {S1โ€™, S2โ€™, S3โ€™, S4โ€™, S5โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™, S14โ€™, S15โ€™,
S16โ€™, S17โ€™, S18โ€™, S19โ€™}
RCS = {S8โ€™, S9โ€™, S10โ€™, S11โ€™}
TC1,
RTE1= {S1โ€™, S2โ€™, S3โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™,S14โ€™, S15โ€™, S16โ€™, S17โ€™,
S19โ€™}
RCS-current= {S8โ€™, S9โ€™, S10โ€™, S11โ€™}
RCS-coverage = {S8โ€™, S9โ€™, S10โ€™, S11โ€™} RTO= {TC1}
RCS-full= YES
Therefore, the final output of the model for this case is given below: RTO = {TC1}
Request_New_Test_Cases = NO
4. Conclusion
The Pythia selected two test cases from an existing test suite to test a new version of
the power program [10]. The same program has been applied to the ReTSE model. In the
Exclusion Phase, the ReTSE model has selected the same two test cases as the Pythia
technique. Moreover, after Optimisation Phase, the ReTSE model has selected only one test
case to test a new version of the power program. This is because the model has identified that
both test cases (produced in the Exclusion Phase) are redundant at the same coverage of a
new version of the program.
References
[1] Binh NT, Duy TC, Parissis. LusRegTes: A Regression Testing Tool for Lustre Programs. International
Journal of Electrical and Computer Engineering (IJECE). 2017; 6(5): 2635-2644.
[2] Ngah A, Munro M, Abdallah M. An Overview of Regression Testing. Journal of Telecommunication,
Electronic and Computer Engineering (JTEC). 2017; 9(3-5): 45-49.
[3] Pandey A, Banerjee S. Test suite minimization in regression testing using hybrid approach of ACO
and GA. International Journal of Applied Metaheuristic Computing. 2018; 9(3): 88-104.
[4] Chen L, Zhang L. Speeding up mutation testing via regression test selection: An extensive study.
Proceedings of the 11th IEEE International Conference on Software Testing, Verification and
Validation (ICST 2018). 2018: 58-69.
[5] Jimenez I, Watkins N, Sevilla M, Lofstead J, Maltzahn C. Quiho: Automated performance regression
testing using inferred resource utilization profiles. Proceedings of the ACM/SPEC International
Conference on Performance Engineering. 2018: 273-284.
[6] Minhas NM, Petersen K, Ali N, Wnuk K. Regression testing goals-view of practitioners and
researchers. Proceedings of the 2
4th
Asia-Pacific Software Engineering Conference Workshops
(APSECW 2017). 2018: 25-31.
[7] Tulasiraman M, Kalimuthu V. Cost cognizant history based prioritization of test case for regression
testing using immune algorithm. International Journal of Intelligent Engineering and Systems. 2018;
11(1): 221-228.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Regression test selection model: a comparison... (Amir Ngah)
851
[8] Lingming Zhang. Hybrid regression test selection. Proceedings of the IEEE/ACM 40
th
International
Conference on Software Engineering (ICSE 2018). 2018: 199-209.
[9] Annibale Panichella, Rocco Oliveto, Massimiliano Di Penta, Andrea De Lucia. Improving
Multi- Objective Test Case Selection by Injecting Diversity in Genetic Algorithms. IEEE Transactions
on Software Engineering. 2015; 41(4): 358-383.
[10] Sumit Dahiya, Rajesh K.Bhatia, Dhavleesh Rattan. Regression Test Selection using Class,
Sequence, and Activity Diagrams. IET Software. 2016; 10(3): 72-80.
[11] Seyedeh Sepideh Emam, James Miller. Test Case Prioritization using Extended Digraphs. ACM
Transactions on Software Engineering and Methodology (TOSEM). 2015; 25(1): 6:1-6:41.
[12] Rothermel G, Harrold MJ. A Safe, Efficient Regression Test Selection Technique. ACM Transactions
on Software Engineering Methodology (TOSEM). 1997; 6(2): 173โ€“210.
[13] Chen YF, Rosenblum DS, Vo KP. Testtube: A System for Selective Regression Testing. Proceedings
of the International Conference on Software Engineering (ICSEโ€™94). 1994: 211โ€“220.
[14] Vokolos FI, Frankl PG. Pythia: A Regression Test Selection Tool Based on Textual Differencing.
Proceedings of the International Conference on Reliability, Quality and Safety of Software-intensive
Systems (ENCRESSโ€™97). 1997: 3โ€“21.
[15] Vokolos FI, Frankl PG. Empirical Evaluation of the Textual Differencing Regression Testing
Technique. Proceedings of the International Conference on Software Maintenance (ICSMโ€™98). 1998:
44โ€“53.
[16] Binkley D. The Application of Program Slicing to Regression Testing. Information & Software
Technology, 1998; 40(11-12): 583โ€“594.
[17] Forgรกcs I, Hajnal A, Takรกcs ร‰. Regression Slicing and Its Use in Regression Testing. Proceedings of
the IEEE International Computer Software and Applications Conference (COMPSACโ€™98). 1998:
464โ€“469.
[18] Agrawal H, Horgan JR, Krauser EW, London SA. Incremental Regression Testing. Proceedings of
the International Conference on Software Maintenance (ICSMโ€™93). 1993: 348โ€“357.
[19] Gupta R, Harrold MJ, Soffa ML. An Approach to Regression Testing Using Slicing. Proceedings of
the International Conference on Software Maintenance (ICSMโ€™92). 1992: 299โ€“308.
[20] Weiser M. Program Slicing. Proceedings of the International Conference on Software Engineering
(ICSEโ€™81). 1981: 439โ€“449.
[21] Vedpal, Chauhan N. Regression Test Selection for Object Oriented Systems using OPDG and Slicing
Technique. Proceedings of the 2nd International Conference on Computing for Sustainable Global
Development (INDIACom). 2015: 1372-1378.
[22] Qu X, Acharya M, Robinson B. Configuration Selection Using Code Change Impact Analysis for
Regression Testing. Proceedings of the 28
th
IEEE International Conference on Software Maintenance
(ICSM). 2012; 129-138.
[23] Xing J, Wang H, Song W, Yang Q. Safe Regression Test Selection Based on Program Dependence
Graphs. Proceedings of the 36
th
IEEE Annual Computer Software and Applications Conference
Workshops (COMPSACW). 2012; 188-193.
[24] Gallagher K, Hall T, Black S. Reducing Regression Test Size by Exclusion. Proceedings of the
International Conference on Software Maintenance (ICSMโ€™07). 2007; 154โ€“163.
[25] Ngah A, Saman MY, Munro M. ReTSE: Slicing based Regression Testing. WIT Transactions on
Engineering Sciences. 2014; 86: 457-469.

More Related Content

What's hot

Automated well test analysis ii using โ€˜well test autoโ€™
Automated well test analysis ii using โ€˜well test autoโ€™Automated well test analysis ii using โ€˜well test autoโ€™
Automated well test analysis ii using โ€˜well test autoโ€™Alexander Decker
ย 
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...Amir Ziai
ย 
An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
 An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
An Adjacent Analysis of the Parallel Programming Model Perspective: A SurveyIRJET Journal
ย 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemslaxmanLaxman03209
ย 
Building a new CTL model checker using Web Services
Building a new CTL model checker using Web ServicesBuilding a new CTL model checker using Web Services
Building a new CTL model checker using Web Servicesinfopapers
ย 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATAacijjournal
ย 
New feature selection based on kernel
New feature selection based on kernelNew feature selection based on kernel
New feature selection based on kerneljournalBEEI
ย 
Enhancement of student performance prediction using modified K-nearest neighbor
Enhancement of student performance prediction using modified K-nearest neighborEnhancement of student performance prediction using modified K-nearest neighbor
Enhancement of student performance prediction using modified K-nearest neighborTELKOMNIKA JOURNAL
ย 
A new reverse engineering approach to
A new reverse engineering approach toA new reverse engineering approach to
A new reverse engineering approach toijseajournal
ย 
I041214752
I041214752I041214752
I041214752IOSR-JEN
ย 
Testing the performance of the power law process model considering the use of...
Testing the performance of the power law process model considering the use of...Testing the performance of the power law process model considering the use of...
Testing the performance of the power law process model considering the use of...IJCSEA Journal
ย 
An enhanced pairwise search approach for generating
An enhanced pairwise search approach for generatingAn enhanced pairwise search approach for generating
An enhanced pairwise search approach for generatingAlexander Decker
ย 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...eSAT Journals
ย 
Target-based test path prioritization for UML activity diagram using weight a...
Target-based test path prioritization for UML activity diagram using weight a...Target-based test path prioritization for UML activity diagram using weight a...
Target-based test path prioritization for UML activity diagram using weight a...IJECEIAES
ย 
PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER
PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER
PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER ecij
ย 
2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kddVan Thanh
ย 

What's hot (19)

Automated well test analysis ii using โ€˜well test autoโ€™
Automated well test analysis ii using โ€˜well test autoโ€™Automated well test analysis ii using โ€˜well test autoโ€™
Automated well test analysis ii using โ€˜well test autoโ€™
ย 
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
On the Performance of the Pareto Set Pursuing (PSP) Method for Mixed-Variable...
ย 
An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
 An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
ย 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problems
ย 
Building a new CTL model checker using Web Services
Building a new CTL model checker using Web ServicesBuilding a new CTL model checker using Web Services
Building a new CTL model checker using Web Services
ย 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
ย 
New feature selection based on kernel
New feature selection based on kernelNew feature selection based on kernel
New feature selection based on kernel
ย 
Enhancement of student performance prediction using modified K-nearest neighbor
Enhancement of student performance prediction using modified K-nearest neighborEnhancement of student performance prediction using modified K-nearest neighbor
Enhancement of student performance prediction using modified K-nearest neighbor
ย 
A new reverse engineering approach to
A new reverse engineering approach toA new reverse engineering approach to
A new reverse engineering approach to
ย 
I041214752
I041214752I041214752
I041214752
ย 
Dynamic Symbolic Database Application Testing
Dynamic Symbolic Database Application TestingDynamic Symbolic Database Application Testing
Dynamic Symbolic Database Application Testing
ย 
Testing the performance of the power law process model considering the use of...
Testing the performance of the power law process model considering the use of...Testing the performance of the power law process model considering the use of...
Testing the performance of the power law process model considering the use of...
ย 
An enhanced pairwise search approach for generating
An enhanced pairwise search approach for generatingAn enhanced pairwise search approach for generating
An enhanced pairwise search approach for generating
ย 
SASCO TRC 2015 Final
SASCO TRC 2015 FinalSASCO TRC 2015 Final
SASCO TRC 2015 Final
ย 
Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...Feature selection using modified particle swarm optimisation for face recogni...
Feature selection using modified particle swarm optimisation for face recogni...
ย 
Pesttt testing
Pesttt testingPesttt testing
Pesttt testing
ย 
Target-based test path prioritization for UML activity diagram using weight a...
Target-based test path prioritization for UML activity diagram using weight a...Target-based test path prioritization for UML activity diagram using weight a...
Target-based test path prioritization for UML activity diagram using weight a...
ย 
PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER
PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER
PERFORMANCE ASSESSMENT OF ANFIS APPLIED TO FAULT DIAGNOSIS OF POWER TRANSFORMER
ย 
2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd2013 feature selection for intrusion detection using nsl kdd
2013 feature selection for intrusion detection using nsl kdd
ย 

Similar to Regression test selection model: a comparison between ReTSE and pythia

Bd36334337
Bd36334337Bd36334337
Bd36334337IJERA Editor
ย 
Harnessing deep learning algorithms to predict software refactoring
Harnessing deep learning algorithms to predict software refactoringHarnessing deep learning algorithms to predict software refactoring
Harnessing deep learning algorithms to predict software refactoringTELKOMNIKA JOURNAL
ย 
EXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODEL
EXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODELEXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODEL
EXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODELijaia
ย 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationijseajournal
ย 
Configuration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case PrioritizationConfiguration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case Prioritizationijsrd.com
ย 
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks IJECEIAES
ย 
H047054064
H047054064H047054064
H047054064inventy
ย 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...eSAT Journals
ย 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...acijjournal
ย 
Thetheoryofsoftwaretesting
ThetheoryofsoftwaretestingThetheoryofsoftwaretesting
ThetheoryofsoftwaretestingPiyushMehta57
ย 
LusRegTes: A Regression Testing Tool for Lustre Programs
LusRegTes: A Regression Testing Tool for Lustre Programs LusRegTes: A Regression Testing Tool for Lustre Programs
LusRegTes: A Regression Testing Tool for Lustre Programs IJECEIAES
ย 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
ย 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
ย 
Test case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testingTest case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testingJournal Papers
ย 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionDr. Amarjeet Singh
ย 
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENTENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENTIRJET Journal
ย 
C41041120
C41041120C41041120
C41041120IJERA Editor
ย 
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...ijaia
ย 
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...gerogepatton
ย 

Similar to Regression test selection model: a comparison between ReTSE and pythia (20)

Bd36334337
Bd36334337Bd36334337
Bd36334337
ย 
Harnessing deep learning algorithms to predict software refactoring
Harnessing deep learning algorithms to predict software refactoringHarnessing deep learning algorithms to predict software refactoring
Harnessing deep learning algorithms to predict software refactoring
ย 
EXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODEL
EXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODELEXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODEL
EXTRACTING THE MINIMIZED TEST SUITE FOR REVISED SIMULINK/STATEFLOW MODEL
ย 
Code coverage based test case selection and prioritization
Code coverage based test case selection and prioritizationCode coverage based test case selection and prioritization
Code coverage based test case selection and prioritization
ย 
Configuration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case PrioritizationConfiguration Navigation Analysis Model for Regression Test Case Prioritization
Configuration Navigation Analysis Model for Regression Test Case Prioritization
ย 
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
Test Case Optimization and Redundancy Reduction Using GA and Neural Networks
ย 
H047054064
H047054064H047054064
H047054064
ย 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...
ย 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
ย 
Thetheoryofsoftwaretesting
ThetheoryofsoftwaretestingThetheoryofsoftwaretesting
Thetheoryofsoftwaretesting
ย 
LusRegTes: A Regression Testing Tool for Lustre Programs
LusRegTes: A Regression Testing Tool for Lustre Programs LusRegTes: A Regression Testing Tool for Lustre Programs
LusRegTes: A Regression Testing Tool for Lustre Programs
ย 
ncaca2016
ncaca2016ncaca2016
ncaca2016
ย 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
ย 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
ย 
Test case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testingTest case prioritization using firefly algorithm for software testing
Test case prioritization using firefly algorithm for software testing
ย 
Artificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern RecognitionArtificial Intelligence based Pattern Recognition
Artificial Intelligence based Pattern Recognition
ย 
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENTENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ENVIRONMENTAL QUALITY PREDICTION AND ITS DEPLOYMENT
ย 
C41041120
C41041120C41041120
C41041120
ย 
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
ย 
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
A NOVEL SCHEME FOR ACCURATE REMAINING USEFUL LIFE PREDICTION FOR INDUSTRIAL I...
ย 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
ย 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
ย 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
ย 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
ย 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
ย 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
ย 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
ย 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
ย 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
ย 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
ย 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
ย 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
ย 
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort serviceGurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort servicejennyeacort
ย 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
ย 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
ย 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
ย 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxnull - The Open Security Community
ย 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
ย 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
ย 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
ย 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
ย 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
ย 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
ย 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
ย 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
ย 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
ย 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ย 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
ย 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
ย 
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Serviceyoung call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
ย 
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort serviceGurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
Gurgaon โœก๏ธ9711147426โœจCall In girls Gurgaon Sector 51 escort service
ย 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
ย 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
ย 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
ย 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
ย 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
ย 

Regression test selection model: a comparison between ReTSE and pythia

  • 1. TELKOMNIKA, Vol.17, No.2, April 2019, pp.844~851 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i2.10332 ๏ฎ 844 Received June 11, 2018; Revised November 8, 2018; Accepted December 19, 2018 Regression test selection model: a comparison between ReTSE and pythia Amir Ngah* 1 , Malcolm Munro 2 , Zailani Abdullah 3 , Masita A.Jalil 4 , Mohamad Abdallah 5 1,4 School of Informatics and Applied Mathematics, Universiti Malaysia Terengganu (UMT), 21030 Kuala Terengganu, Malaysia 2 Department of Computer Science, Durham University, DL1 3LE Durham, UK 3 Centre of Computing and Informatics, Universiti Malaysia Kelantan, Kota Bharu, Malaysia 5 Faculty of Science and IT, Az-Zaytoonah University of Jordan, Amman, Jordan *Corresponding author, e-mail: amirnma@umt.edu.my 1 , malcolm.munro@durham.ac.uk 2 , zailania@umk.edu.my 3 , masita@umt.edu.my 4 , m.abdallah@zuj.edu.jo 5 Abstract As software systems change and evolve over time regression tests have to be run to validate these changes. Regression testing is an expensive but essential activity in software maintenance. The purpose of this paper is to compare a new regression test selection model called ReTSE with Pythia. The ReTSE model uses decomposition slicing in order to identify the relevant regression tests. Decomposition slicing provides a technique that is capable of identifying the unchanged parts of a system. Pythia is a regression test selection technique based on textual differencing. Both techniques are compare using a Power program taken from Vokolos and Franklโ€™s paper. The analysis of this comparison has shown promising results in reducing the number of tests to be run after changes are introduced. Keywords: decomposition slicing, program slicing, pythia, regression test selection, regression testing, ReTSE Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction There are many techniques have been proposed in regression testing racently [1-11]. The most important issue in regression testing is how to minimize the reuse of the existing test cases for the modified program. One of the techniques to tackle this issue is called regression test selection. This technique attempts to reduce the cost of regression testing by selecting appropriate test cases using information from the certified program, the modified program and the existing test suite [12]. Previous regression test selection approaches used an inclusive technique. Inclusive means the techniques select test cases directly from test suite that are needed in regression testing. Regression test selection techniques can be divided into categories based on the elements used such as control-flow based [1], code entities based [13], textual differencing based [14, 15], and program slicing based [16-19]. Rothermel and Harrold [12] proposed a safe and efficient regression test selection technique based on control-flow graphs (CFG). They developed two main algorithms based on intraprocedural and interprocedural test selection algorithms. The intraprocedural algorithm operates on individual procedures and the interprocedural operates on entire programs or subsystems. In this technique, both the original and modified program will be transformed into a CFG in order to perform a comparison. The comparison algorithm will compare each node in both CFGs. If nodes differ, the algorithm will select tests from an existing test suite that exercised the node. Chen et al. [9] propose a regression test selection technique based on identifying modified code entities such as functions, variables, types, and macros. Test cases that have traversed the modified code entities will be counted in the test suite for the modified program. Vokolos and Frankl [14, 15] have developed a tool called Pythia that is used to reduce the cost of regression testing. The Unix-based tool implements an analysis technique that is called textual differencing and works by comparing the source files from the certified and modified programs. The Pythia tool can be used to analyse software systems written in the C programming language.
  • 2. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Regression test selection model: a comparison... (Amir Ngah) 845 There are a number of regression test selection techniques based on program slicing techniques. Binkley [16] conducted a survey about the application of program slicing to regression testing. He divided the technique into three groups of program slicing that are used in regression testing. The first group uses dynamic slicing, the second group uses program dependent graphs (PDG), and the third group is based on Weiser's data flow definition of slicing [20]. Agrawal et al. [18] have proposed three algorithms to be used in their technique called incremental regression testing. The algorithms are an execution slice, a dynamic slice, and a relevant slice. The execution slice of the program with respect to a test case is referred to as the set of statements executed under that test case. The dynamic program slice with respect to the output variables gives the statements that are not only executed but also have an effect on the program output under that test case. The relevant slice with respect to the program output for a test case is referred to the set of statements that, if modified, may alter the program output for the given test case. Gupta et al. [19] have developed a data flow based regression testing technique that uses slicing algorithms to explicitly determine the affected definition-use associations made by a program change. The technique uses two slicing algorithms to detect directly and indirectly affected def-use associations. The first algorithm works backward from the changed statement to its definitions. The second algorithm is a forward walk from the same point as the first algorithm. The forward algorithm detects uses, and subsequent definitions and uses, which are affected by a definition that is changed at that point. Vedpal and Chaulan [21] have proposed a regression test selection technique based on identification of affected paths, affected functions and dynamic slicing which can be used to reduce the number of test cases for regression testing. This technique has two main processes. The first process is the construction of the OPDG (Object Oriented Program Dependency Graphs) for the modified program. The second process is a selection of test cases based on an algorithm that involved dynamic slicing. Qu et al. [22] have proposed a configuration selection approach for regression testing. Their technique addresses the solution to the redundancy issue in retest-all approach for configurable systems. The technique has employed an existing static slicing tool called CodeSurfer for computing the configurable option impact and the code change impact. Xing et al. [23] have developed a new regression test selection technique based on the program dependence graphs of the original program and its modified version. The technique has embedded slicing technique in their two main steps. Comparing with previous techniques, they claimed their technique can eliminate some unnecessary tests to rerun. All these slicing based RTS techniques are classified as inclusion techniques which select test cases from the test suite that are needed in regression testing. The idea of the regression test selection by exclusion was proposed by Gallagher et al. [24]. Ngah et al. [25] have developed a new regression test selection by exclusion using decomposition slicing called ReTSE. Exclusion technique omits test cases from test suite that are not needed in regression testing. This paper presents the comparison between ReTSE model and Pythia technique. 2. ReTSE Model The ReTSE model [25] is a four phase model that has three inputs and three outputs. The inputs are: the Certified Program (C); the Modified Program (M); and the existing Test Suite (TS) which includes test cases and associated test histories. The outputs are: a set of Excluded Tests (ET); a set of Optimised Regression Tests (RTO); and notification that new test cases are required. The Phases of the model are: Program Analysis, Comparison, Exclusion and Optimisation. Phase 1 has two main steps which are Pretty Print Step and Slicing Step. This phase will produce decomposition slices for both Certified Program (C) and Modified Program (M). In Phase 2, the decomposition slices will be compared in order to produce a set of Similar Decomposition Slices (S), Different Decomposition Slices (D), Deleted Decomposition Slices (L) and New Decomposition Slices (N). In Phase 3, any test cases that not related to the D will be excluded from test suite. Finally in the Phase 4, the model will identify any redundant test cases that may exist in regression tests produced in Phase 3. More details explaination about the ReTSE model can be founded in [25].
  • 3. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 844-851 846 3. Results and Analysis Vokolos and Frankl [14] have used Power program to illustrate the Pythia, a textual differencing technique. The program aims to raise a floating point number to an integer power, using Dijkstraโ€™s algorithm. The program consists of two files: main.c and power.c. Each file contains one function. The old version of the power program (power.c) is shown in Figure 1. Because the ReTSE model only concentrates on intraprocedural, it is assumed that the changes only occur in the power.c. The new version of power function (power-v1.c) is shown in Figure 2. The old version is called Certified Program (C) and the new version is called Modified Program (M) in the ReTSE model. Figure 1. Certified Program (C)-power.c Figure 2. Modified Program (M)-power-v1.c Vokolos and Frankl used five test cases (TCi) to test the Certified Program (C). The input and output values for each test cases are shown in Table 1. Test case TC2 in Table 1 catches an error in the certified program. The THi of each TCi for C (power.c program) is shown in Table 2. In their model, THi is called a basic block execution trace which is an execution trace of a test case based on a basic block concept. A basic block is a sequence of consecutive statements with the property that control enters at the beginning statements and may leave only at the very last statement [14]. However, the THi in Table 2 is slightly different from their paper in order to consider a statement based used in the ReTSE model. The X symbol in Table 2 shows that the statement is executed for that TCi. The - symbol is for statement not executed.
  • 4. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Regression test selection model: a comparison... (Amir Ngah) 847 These programs and information are used to analyse the ReTSE model based on their 4 phases. Table 1. Test Suite for Certified Program (Power Program) Test Case (TCi) Input Output TC1 -5.02 25 TC2 -3,03 27 TC3 2.00 1 TC4 1.04 1 TC5 0.0-1 0 Table 2. Test History (THi) of TCi for Certified Program (power.c) Statement TH1 TH2 TH3 TH4 TH5 S1 X X X X X S2 X X X X X S3 X X X X X S4 - - - - X S5 - - - - X S6 X X X X - S7 X X X X X S8 X X - - - S9 X X - - - S10 X X X X X S11 X X - X X S12 X X - X - S13 X X - X - S14 X X - X X S15 X X X X X S16 - - - - - S17 X X X X X 3.1.Phase 1: Program Analysis The Original Certified Program and the Original Modified Program of the power program are assumed to have gone through the Pretty Print Step. The outputs of this step are a Certified Program (C) and Modified Program (M) as shown in Figure 2 and Figure 3 respectively. The M has two additional new statements at S10โ€™ and S11โ€™ in order to tackle the problem raised in the Certified Program (C). In the Slicing Step, both C and M are decomposed into decomposition slices corresponding to their variables in the programs. Therefore, both programs have five decomposition slices corresponding to five variables which are x, recip, n, sgn and y. Decomposition slices for variables sgn and y are similar as shown in Figure 4. The output summary of the Slicing Step is given below: DS-C = {DS-Cx, DS-Crecip, DS-Cn, DS-Csgn, DS-Cy} DS-M = {DS-Mx, DS-Mrecip, DS-Mn, DS-Msgn, DS-My} Figure 3. Decomposition Slice for Variable n (Power Program)
  • 5. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 844-851 848 3.2. Phase 2: Comparison In the first part of the Comparison Phase, the decomposition slices in the DS-C are compared to the decomposition slices in the DS-M using the diff tool. There is no output produced from the diff tool for the comparison between DS-Cx and DS-Mx. Similar result was achieved in the comparison between DS-Crecip and DS-Mrecip. Therefore, these decomposition slices are included in a set of pairs of Similar Decomposition Slice (S). An output is produced from the diff tool for the comparison between DS-Cn and DS-Mn as shown in Figure 3. Therefore, both decomposition slices are included in a set of pairs of Difference Decomposition Slice (D). The DS-Csgn and DS-Msgn as shown in Figure 4 are also included in the D because the output is produced from the diff tool for this comparison. The DS-Cy and DS-My in Figure 4 are also included in the D because the diff tool also produces an output from this comparison. The output summary of the first part of the Comparison Phase is shown in Table 3. Figure 4. Decomposition Slice for Variable sgn/y (Power Program) Table 3. Comparison Results between DS-Cvi and DS-Mvi (Power Program) Set of Member of Set D {(DS-Cn, DS-Mn), (DS-Csgn, DS-Msgn), (DS-Cy, DS-My)} S {(DS-Cx, DS-Mx), (DS-Crecip, DS-Mrecip)} S {} L {}
  • 6. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Regression test selection model: a comparison... (Amir Ngah) 849 The second part of the Comparison Phase is a more detailed comparison between DS-Cvi and DS-Mvi only if they are members of D. In this case, only the decomposition slices for variables sgn (DS-Csgn and DS-Msgn), n (DS-Cn and DSMn) and y (DS-Cy and DS-My) areinvolved in the second part of the comparison because they are members of D (shown in the first part of the comparison). The comparison output using the diff tool is given below: a. Comparison between DS-Csgn and DS-Msgn 19a20,23 > if (n % 2 ==1) > { > sgn = -1; > } b. Comparison between DS-Cn and DS-Mn 8a9,12 > if (x < 0.0e0 > { > if (n % 2 ==1) > } c. Comparison between DS-Cy and DS-My 19a20,23 > if (n % 2 ==1) > { > sgn = -1; > } In the comparison between DS-Csgn and DS-Msgn (Figure 4), the statement at line 19 ([L9]) from DS-Csgn is included in the set of Change Statement for variable sgn (CSsgn). Any statement in the range of lines 20 ([L20]) to 23 ([L23]) from DS-Msgn is included in the set of Relevant Change statement for variable sgn (RCSsgn). Therefore, S9 from DS-Csgn is included in the CSsgn and statements S10โ€™ and S11โ€™ from DS-Msgn are included in the RCSsgn. Statement S9โ€™ is also included in the the RCSsgn because it is located at the same branch of statement S10โ€™. The same happens to the comparison between DS-Cy and DS-My as shown in Figure 4 where statement S9 from DS-Cy is included in the CS y and statements S9โ€™, S10โ€™ and S11โ€™ from DS-My are included in the RCSy. In the comparison between DS-Cn and DS-Mn as shown in Figure 3, line 8 ([L8]) is not a statement but a close curly bracket (}). Therefore, the statement immediately after that symbol will be included in the set of Change Statement for variable n (CSn). Any statement in the range of lines 9 ([L9]) to 12 ([L12]) from DSMn is included in the set of Relevant Change Statement for variable n (RCSn). Therefore, statement S10 is included in the CSn and statements S8โ€™ and S10โ€™ are included in the RCSn. Then the CS is produced from the union of CSsgn, CSy and CSn where the RCS is produced from the union of RCSsgn, RCSy and RCSn. A summary of the second part of the Comparison Phase is given below: CS = CSsgn U CSy UCSn = {S9} U {S9} U {S10}= {S9, S10} RCS= RCSsgn U RCSy U RCSn = {S9โ€™, S10โ€™, S11โ€™} U {S9โ€™, S10โ€™, S11โ€™} U {S8โ€™, S10โ€™} = {S8โ€™, S9โ€™, S10โ€™, S11โ€™} 3.4. Phase 3: Exclusion There are five test cases (TCi) that were used by Vokolos and Frankl for Certified Program (C) of power.c program as shown in Table 1. Their THi is shown in Table 2. Any TCi where the CS is not subset of THi, will be included in the set of Excluded Test (ET). In this case, the CS which includes statements S9 and S10, is not subset of TH3, TH4 and TH5. Therefore, TC3, TC4, and TC5 will be included in the set of ET. The remaining test cases in Test Suite are included in the set of Regression Tests (RT). Therefore, TC1 and TC2 are included in the RT. A summary of the Exclusion Phase is given below: RT= {TC1, TC2}
  • 7. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 2, April 2019: 844-851 850 3.5. Phase 4: Optimisation In the Optimisation Phase, all TCi that are members of the RT will be executed onto UDS-M. In this case, there are only three DS-Mvi members of D which are DS-Msgn, DS-Mn and DS-My. The union of these decomposition slices (UDS-M) has produced the same program as M (power-v1.c) as shown in Figure 2 which includes statements S1โ€™, S2โ€™, S3โ€™, S4โ€™, S5โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™, 14โ€™, S15โ€™, S16โ€™, S17โ€™, S18โ€™ and S19โ€™. The RCS produced in the second part of the Comparison Phase is used here. The RCS includes statements S8โ€™, S9โ€™, S10โ€™ and S11โ€™. Test cases in RT, which are TC1 and TC2, are sequently executed onto the UDS-M. Firstly, TC1 is executed onto UDS-M. The RTE1 for TC1 is S1โ€™, S2โ€™, S3โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™, S14โ€™, S15โ€™, S16โ€™, S17โ€™ and S19โ€™. The RTE1 contains all members of RCS. That means the RCS receive full coverage by executed only the TC1. The execution of test cases is stopped because the RCS has already achieved full coverage. This means it is enough to use only TC1 as a regression test for the modified program. Therefore, TC1 will be included in the RTO. The remaining test case TC2 will be ignored for RTO. A summary of the Optimisation Phase is given below: UDS-M = {S1โ€™, S2โ€™, S3โ€™, S4โ€™, S5โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™, S14โ€™, S15โ€™, S16โ€™, S17โ€™, S18โ€™, S19โ€™} RCS = {S8โ€™, S9โ€™, S10โ€™, S11โ€™} TC1, RTE1= {S1โ€™, S2โ€™, S3โ€™, S6โ€™, S7โ€™, S8โ€™, S9โ€™, S10โ€™, S11โ€™, S12โ€™, S13โ€™,S14โ€™, S15โ€™, S16โ€™, S17โ€™, S19โ€™} RCS-current= {S8โ€™, S9โ€™, S10โ€™, S11โ€™} RCS-coverage = {S8โ€™, S9โ€™, S10โ€™, S11โ€™} RTO= {TC1} RCS-full= YES Therefore, the final output of the model for this case is given below: RTO = {TC1} Request_New_Test_Cases = NO 4. Conclusion The Pythia selected two test cases from an existing test suite to test a new version of the power program [10]. The same program has been applied to the ReTSE model. In the Exclusion Phase, the ReTSE model has selected the same two test cases as the Pythia technique. Moreover, after Optimisation Phase, the ReTSE model has selected only one test case to test a new version of the power program. This is because the model has identified that both test cases (produced in the Exclusion Phase) are redundant at the same coverage of a new version of the program. References [1] Binh NT, Duy TC, Parissis. LusRegTes: A Regression Testing Tool for Lustre Programs. International Journal of Electrical and Computer Engineering (IJECE). 2017; 6(5): 2635-2644. [2] Ngah A, Munro M, Abdallah M. An Overview of Regression Testing. Journal of Telecommunication, Electronic and Computer Engineering (JTEC). 2017; 9(3-5): 45-49. [3] Pandey A, Banerjee S. Test suite minimization in regression testing using hybrid approach of ACO and GA. International Journal of Applied Metaheuristic Computing. 2018; 9(3): 88-104. [4] Chen L, Zhang L. Speeding up mutation testing via regression test selection: An extensive study. Proceedings of the 11th IEEE International Conference on Software Testing, Verification and Validation (ICST 2018). 2018: 58-69. [5] Jimenez I, Watkins N, Sevilla M, Lofstead J, Maltzahn C. Quiho: Automated performance regression testing using inferred resource utilization profiles. Proceedings of the ACM/SPEC International Conference on Performance Engineering. 2018: 273-284. [6] Minhas NM, Petersen K, Ali N, Wnuk K. Regression testing goals-view of practitioners and researchers. Proceedings of the 2 4th Asia-Pacific Software Engineering Conference Workshops (APSECW 2017). 2018: 25-31. [7] Tulasiraman M, Kalimuthu V. Cost cognizant history based prioritization of test case for regression testing using immune algorithm. International Journal of Intelligent Engineering and Systems. 2018; 11(1): 221-228.
  • 8. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Regression test selection model: a comparison... (Amir Ngah) 851 [8] Lingming Zhang. Hybrid regression test selection. Proceedings of the IEEE/ACM 40 th International Conference on Software Engineering (ICSE 2018). 2018: 199-209. [9] Annibale Panichella, Rocco Oliveto, Massimiliano Di Penta, Andrea De Lucia. Improving Multi- Objective Test Case Selection by Injecting Diversity in Genetic Algorithms. IEEE Transactions on Software Engineering. 2015; 41(4): 358-383. [10] Sumit Dahiya, Rajesh K.Bhatia, Dhavleesh Rattan. Regression Test Selection using Class, Sequence, and Activity Diagrams. IET Software. 2016; 10(3): 72-80. [11] Seyedeh Sepideh Emam, James Miller. Test Case Prioritization using Extended Digraphs. ACM Transactions on Software Engineering and Methodology (TOSEM). 2015; 25(1): 6:1-6:41. [12] Rothermel G, Harrold MJ. A Safe, Efficient Regression Test Selection Technique. ACM Transactions on Software Engineering Methodology (TOSEM). 1997; 6(2): 173โ€“210. [13] Chen YF, Rosenblum DS, Vo KP. Testtube: A System for Selective Regression Testing. Proceedings of the International Conference on Software Engineering (ICSEโ€™94). 1994: 211โ€“220. [14] Vokolos FI, Frankl PG. Pythia: A Regression Test Selection Tool Based on Textual Differencing. Proceedings of the International Conference on Reliability, Quality and Safety of Software-intensive Systems (ENCRESSโ€™97). 1997: 3โ€“21. [15] Vokolos FI, Frankl PG. Empirical Evaluation of the Textual Differencing Regression Testing Technique. Proceedings of the International Conference on Software Maintenance (ICSMโ€™98). 1998: 44โ€“53. [16] Binkley D. The Application of Program Slicing to Regression Testing. Information & Software Technology, 1998; 40(11-12): 583โ€“594. [17] Forgรกcs I, Hajnal A, Takรกcs ร‰. Regression Slicing and Its Use in Regression Testing. Proceedings of the IEEE International Computer Software and Applications Conference (COMPSACโ€™98). 1998: 464โ€“469. [18] Agrawal H, Horgan JR, Krauser EW, London SA. Incremental Regression Testing. Proceedings of the International Conference on Software Maintenance (ICSMโ€™93). 1993: 348โ€“357. [19] Gupta R, Harrold MJ, Soffa ML. An Approach to Regression Testing Using Slicing. Proceedings of the International Conference on Software Maintenance (ICSMโ€™92). 1992: 299โ€“308. [20] Weiser M. Program Slicing. Proceedings of the International Conference on Software Engineering (ICSEโ€™81). 1981: 439โ€“449. [21] Vedpal, Chauhan N. Regression Test Selection for Object Oriented Systems using OPDG and Slicing Technique. Proceedings of the 2nd International Conference on Computing for Sustainable Global Development (INDIACom). 2015: 1372-1378. [22] Qu X, Acharya M, Robinson B. Configuration Selection Using Code Change Impact Analysis for Regression Testing. Proceedings of the 28 th IEEE International Conference on Software Maintenance (ICSM). 2012; 129-138. [23] Xing J, Wang H, Song W, Yang Q. Safe Regression Test Selection Based on Program Dependence Graphs. Proceedings of the 36 th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW). 2012; 188-193. [24] Gallagher K, Hall T, Black S. Reducing Regression Test Size by Exclusion. Proceedings of the International Conference on Software Maintenance (ICSMโ€™07). 2007; 154โ€“163. [25] Ngah A, Saman MY, Munro M. ReTSE: Slicing based Regression Testing. WIT Transactions on Engineering Sciences. 2014; 86: 457-469.