Applying Model Based Testing in Different Contexts
نویسندگان
چکیده
We describe ISP RAS experience in applications of model based testing in various areas. The two different examples are considered UniTesK test development technology aimed at software component testing and OTK tool intended to be used in test development for complex structured text processors, the main example of which is compilers. The surprising fact is that the two methods used in the tools have different prerequisites for successful applications in industrial software development. This demonstrates possibility to change those prerequisites by changing the technical aspects of the method applied. Both techniques were developed in RedVerst group of ISP RAS [1].
منابع مشابه
Applicability Issues with TBLT in EFL Contexts
This paper examines the theoretical rationales and practical aspects of task-based language teaching (TBLT) with particular reference to research findings in EFL/ESL contexts. The definitional scope of the term ‘task’, polarizations in terms of task vs. non-task, and its relation to different language teaching approaches have engendered conceptual and methodological ambiguities. Moreover, fact...
متن کاملبررسی نقش انواع بافتار همنویسهها در تعیین شباهت بین مدارک
Aim: Automatic information retrieval is based on the assumption that texts contain content or structural elements that can be used in word sense disambiguation and thereby improving the effectiveness of the results retrieved. Homographs are among the words requiring sense disambiguation. Depending on their roles and positions in texts, homograph contexts could be divided to different types, wit...
متن کاملA Review of Spatial Factor Modeling Techniques in Recommending Point of Interest Using Location-based Social Network Information
The rapid growth of mobile phone technology and its combination with various technologies like GPS has added location context to social networks and has led to the formation of location-based social networks. In social networking sites, recommender systems are used to recommend points of interest (POIs) to users. Traditional recommender systems, such as film and book recommendations, have a lon...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004