iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/STVR.1827
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T04:16:12Z","timestamp":1727496972043},"reference-count":31,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2022,6,19]],"date-time":"2022-06-19T00:00:00Z","timestamp":1655596800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Software Testing Verif & Rel"],"published-print":{"date-parts":[[2022,8]]},"abstract":"Summary<\/jats:title>Exploratory testing (ET) is a software testing approach that complements automated testing by leveraging business expertise. It has gained momentum over the last decades as it appeals testers to exploit their business knowledge to stress the system under test (SUT). Exploratory tests, unlike automated tests, are defined and executed on\u2010the\u2010fly by testers. However, testers who perform exploratory tests may be biased by their experience and, incidentally, miss anomalies or unusual interactions proposed by the SUT. This is even more complex in the context of web applications, which typically expose a huge number of interaction paths to their users. As testers of these applications cannot remember all the sequences of interactions they performed, they may fail to deeply explore the application scope. This article, therefore, introduces a new approach to assist testers in widely exploring any web application. In particular, our approach monitors the online interactions performed by the testers to suggest in real\u2010time the probabilities of performing next interactions. Looking at these probabilities, we claim that the testers who favour interactions that have a low probability (because they were rarely performed), will increase the diversity of their explorations. Our approach defines a prediction model, based on \u2010grams, that encodes the history of past interactions and that supports the estimation of the probabilities. Integrated within a web browser extension, it automatically and transparently injects feedback within the application itself. We conduct a controlled experiment and a qualitative study to assess our approach. Results show that it prevents testers to be trapped in already tested loops, and succeeds to assist them in performing deeper explorations of the SUT.<\/jats:p>","DOI":"10.1002\/stvr.1827","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:39:26Z","timestamp":1655685566000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fostering the diversity of exploratory testing in web applications"],"prefix":"10.1002","volume":"32","author":[{"given":"Julien","family":"Leveau","sequence":"first","affiliation":[{"name":"Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800 Talence F\u201033400 France"},{"name":"CIS Valley Bruges France"}]},{"given":"Xavier","family":"Blanc","sequence":"additional","affiliation":[{"name":"Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800 Talence F\u201033400 France"},{"name":"IUF Paris France"}]},{"given":"Laurent","family":"R\u00e9veill\u00e8re","sequence":"additional","affiliation":[{"name":"Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800 Talence F\u201033400 France"}]},{"given":"Jean\u2010R\u00e9my","family":"Falleri","sequence":"additional","affiliation":[{"name":"Univ. Bordeaux, Bordeaux INP, CNRS, LaBRI, UMR5800 Talence F\u201033400 France"},{"name":"IUF Paris France"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1771-8791","authenticated-orcid":false,"given":"Romain","family":"Rouvoy","sequence":"additional","affiliation":[{"name":"Univ.\u2009Lille \/ Inria Lille France"},{"name":"IUF Paris France"}]}],"member":"311","published-online":{"date-parts":[[2022,6,19]]},"reference":[{"volume-title":"Testing Computer Software, Second Edition","year":"1999","author":"Kaner C","key":"e_1_2_14_2_1"},{"volume-title":"Lessons Learned in Software Testing","year":"2001","author":"Kaner C","key":"e_1_2_14_3_1"},{"key":"e_1_2_14_4_1","unstructured":"ItkonenJ RautiainenK.Exploratory testing: a multiple case study. In2005 International Symposium on Empirical Software Engineering 2005.IEEE:Queensland Australia 2005;82\u201391(en).http:\/\/ieeexplore.ieee.org\/document\/1541817\/"},{"key":"e_1_2_14_5_1","doi-asserted-by":"crossref","unstructured":"ItkonenJ MantylaMV LasseniusC.Defect Detection Efficiency: Test Case Based vs. Exploratory Testing. InFirst International Symposium on Empirical Software Engineering and Measurement (ESEM 2007) 2007;61\u201370.","DOI":"10.1109\/ESEM.2007.56"},{"key":"e_1_2_14_6_1","doi-asserted-by":"crossref","unstructured":"PfahlD YinH M\u00e4ntyl\u00e4MV M\u00fcnchJ.How is Exploratory Testing Used? A State\u2010of\u2010the\u2010practice Survey. InProceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement ESEM '14.ACM:New York NY USA 2014;5:1\u20135:10. event\u2010place: Torino Italy.","DOI":"10.1145\/2652524.2652531"},{"key":"e_1_2_14_7_1","doi-asserted-by":"crossref","unstructured":"LeveauJ BlancX R\u00e9veill\u00e8reL FalleriJ\u2010R RouvoyR.Fostering the Diversity of Exploratory Testing in Web Applications. InICST 2020 \u2010 IEEE International Conference on Software Testing Verification and Validation PasareanuC ZellerA(eds).:Porto Portugal 2020.https:\/\/hal.inria.fr\/hal-02398969","DOI":"10.1109\/ICST46399.2020.00026"},{"key":"e_1_2_14_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2109205.2109208"},{"key":"e_1_2_14_9_1","doi-asserted-by":"crossref","unstructured":"MesbahA DeursenA.Migrating Multi\u2010page Web Applications to Single\u2010page AJAX Interfaces. In11th European Conference on Software Maintenance and Reengineering (CSMR'07) 2007;181\u2013190.","DOI":"10.1109\/CSMR.2007.33"},{"key":"e_1_2_14_10_1","doi-asserted-by":"crossref","unstructured":"MesbahA BozdagE Van DeursenA.Crawling ajax by inferring user interface state changes. In2008 eighth international conference on web engineering IEEE 2008;122\u2013134.","DOI":"10.1109\/ICWE.2008.24"},{"issue":"4","key":"e_1_2_14_11_1","first-page":"467","article-title":"Class\u2010based N\u2010gram Models of Natural Language","volume":"18","author":"Brown PF","year":"1992","journal-title":"Computational Linguistics"},{"key":"e_1_2_14_12_1","doi-asserted-by":"crossref","unstructured":"TonellaP TiellaR NguyenCD.Interpolated N\u2010Grams for Model Based Testing. InProceedings of the 36th International Conference on Software Engineering ICSE 2014.Association for Computing Machinery:New York NY USA 2014;562\u2013572. event\u2010place: Hyderabad India.","DOI":"10.1145\/2568225.2568242"},{"key":"e_1_2_14_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001669914"},{"key":"e_1_2_14_14_1","unstructured":"SalkindN.Encyclopedia of Research Design:Thousand Oaks California 2020.http:\/\/sk.sagepub.com\/reference\/researchdesign"},{"first-page":"231","volume-title":"The handbook of research synthesis","year":"1994","author":"Rosenthal R","key":"e_1_2_14_15_1"},{"key":"e_1_2_14_16_1","first-page":"2014","article-title":"Thresholds for interpreting effect sizes","volume":"13","author":"Ellis PD","year":"2009","journal-title":"Retrieved January"},{"key":"e_1_2_14_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6646-9"},{"key":"e_1_2_14_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1958.10501452"},{"key":"e_1_2_14_19_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.328.7447.1073"},{"key":"e_1_2_14_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-004-0077-7"},{"key":"e_1_2_14_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.364"},{"key":"e_1_2_14_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.50"},{"key":"e_1_2_14_23_1","doi-asserted-by":"crossref","unstructured":"HanS WallaceDR MillerRC.Code Completion from Abbreviated Input. In2009 IEEE\/ACM International Conference on Automated Software Engineering.IEEE:Auckland New Zealand 2009;332\u2013343.http:\/\/ieeexplore.ieee.org\/document\/5431761\/","DOI":"10.1109\/ASE.2009.64"},{"key":"e_1_2_14_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0083-2"},{"key":"e_1_2_14_25_1","doi-asserted-by":"crossref","unstructured":"HindleA BarrET SuZ GabelM DevanbuP.On the Naturalness of Software. InProceedings of the 34th International Conference on Software Engineering ICSE '12.IEEE Press:Piscataway NJ USA 2012;837\u2013847. event\u2010place: Zurich Switzerland.","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"e_1_2_14_26_1","doi-asserted-by":"crossref","unstructured":"WangQ BrunY OrsoA.Behavioral Execution Comparison: Are Tests Representative of Field Behavior?. In2017 IEEE International Conference on Software Testing Verification and Validation (ICST) 2017;321\u2013332.","DOI":"10.1109\/ICST.2017.36"},{"key":"e_1_2_14_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083256"},{"key":"e_1_2_14_28_1","doi-asserted-by":"crossref","unstructured":"SprenkleS PollockL SimkoL.A Study of Usage\u2010Based Navigation Models and Generated Abstract Test Cases for Web Applications. In2011 Fourth IEEE International Conference on Software Testing Verification and Validation 2011;230\u2013239.","DOI":"10.1109\/ICST.2011.34"},{"key":"e_1_2_14_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.02.001"},{"key":"e_1_2_14_30_1","doi-asserted-by":"crossref","unstructured":"HammoudiM RothermelG TonellaP.Why do Record\/Replay Tests of Web Applications Break?In2016 IEEE International Conference on Software Testing Verification and Validation (ICST) 2016;180\u2013190.","DOI":"10.1109\/ICST.2016.16"},{"key":"e_1_2_14_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1771"},{"key":"e_1_2_14_32_1","doi-asserted-by":"crossref","unstructured":"AttererR LorenziP.A Heatmap\u2010based Visualization for Navigation Within Large Web Pages. InProceedings of the 5th Nordic Conference on Human\u2010computer Interaction: Building Bridges NordiCHI '08.ACM:New York NY USA 2008;407\u2013410. event\u2010place: Lund Sweden.","DOI":"10.1145\/1463160.1463206"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.1827","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/stvr.1827","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.1827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T05:54:50Z","timestamp":1727416490000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.1827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,19]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["10.1002\/stvr.1827"],"URL":"https:\/\/doi.org\/10.1002\/stvr.1827","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"type":"print","value":"0960-0833"},{"type":"electronic","value":"1099-1689"}],"subject":[],"published":{"date-parts":[[2022,6,19]]},"assertion":[{"value":"2021-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}