All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

A novel use of equivalent mutants for static anomaly detection in software artifacts

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216208%3A11320%2F17%3A10331993" target="_blank" >RIV/00216208:11320/17:10331993 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1016/j.infsof.2016.01.019" target="_blank" >http://dx.doi.org/10.1016/j.infsof.2016.01.019</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1016/j.infsof.2016.01.019" target="_blank" >10.1016/j.infsof.2016.01.019</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    A novel use of equivalent mutants for static anomaly detection in software artifacts

  • Original language description

    Context: In mutation analysis, a mutant of a software artifact, either a program or a model, is said equivalent if it leaves the artifact meaning unchanged. Equivalent mutants are usually seen as an inconvenience and they reduce the applicability of mutation analysis. Objective: Instead, we here claim that equivalent mutants can be useful to define, detect, and remove static anomalies, i.e., deficiencies of given qualities: If an equivalent mutant has a better quality value than the original artifact, then an anomaly has been found and removed. Method: We present a process for detecting static anomalies based on mutation, equivalence checking, and quality measurement. Results: Our proposal and the originating technique are applicable to different kinds of software artifacts. We present anomalies and conduct several experiments in different contexts, at specification, design, and implementation level. Conclusion: We claim that in mutation analysis a new research direction should be followed, in which equivalent mutants and operators generating them are welcome.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2017

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Information and Software Technology

  • ISSN

    0950-5849

  • e-ISSN

  • Volume of the periodical

    81

  • Issue of the periodical within the volume

    January

  • Country of publishing house

    NL - THE KINGDOM OF THE NETHERLANDS

  • Number of pages

    13

  • Pages from-to

    52-64

  • UT code for WoS article

    000387634200005

  • EID of the result in the Scopus database

    2-s2.0-84958213157