A Structured Approach to Systems TestingQED Information Sciences, 1983 - 543 sayfa |
Kitabın içinden
25 sonuçtan 1-3 arası sonuçlar
Sayfa 418
... graph theory are needed to develop these concepts . In this section we will treat graphs with only one connected component ; Section 7 will deal with the more general case . See [ BERG ] for graph theory concepts and a more formal ...
... graph theory are needed to develop these concepts . In this section we will treat graphs with only one connected component ; Section 7 will deal with the more general case . See [ BERG ] for graph theory concepts and a more formal ...
Sayfa 429
William E. Perry. G : b a C e g 0.0 FIGURE 92 CONTROL GRAPH G d f Since each one of the splitting nodes in the graph is associated with some predicate or condition in the program , the expression v = S + 1 can be calculated by simply ...
William E. Perry. G : b a C e g 0.0 FIGURE 92 CONTROL GRAPH G d f Since each one of the splitting nodes in the graph is associated with some predicate or condition in the program , the expression v = S + 1 can be calculated by simply ...
Sayfa 438
... graph which shows the algorithm we might find " inside " modules M , A , and B. The graph in Figure 101 has three components , M , A , and B ; each of the graphs we have previously discussed had only one component . We have to add an ...
... graph which shows the algorithm we might find " inside " modules M , A , and B. The graph in Figure 101 has three components , M , A , and B ; each of the graphs we have previously discussed had only one component . We have to add an ...
Diğer baskılar - Tümünü görüntüle
Sık kullanılan terimler ve kelime öbekleri
ADEQUATE ADEQUATE ADEQUATE V/N RECOMMENDED amination analysis ance Compli application system audit trail automated Boundary Value Analysis Checklist complete compliance Confirm Control Flow Analysis correct cyclomatic complexity Data flow analysis defined design review determine documentation effectiveness of testing employee ensure evaluate example execution Fact finding FIGURE file integrity Functional Testing graph identified input Inspec installation phase interface ments method methodology modules needed normally objectives output paths peer review performed personnel PHASE TEST PROCESS problems procedures PROCESS TEST FACTOR production program phase project team RECOMMENDED TEST TEST records recovery regression testing requirements phase responsibility risk matrix SDLC software testing subphase systems development TECHNIQUE TEST TOOL techniques and tools test conditions test cost test data test phase test plan TEST PROCESS TEST test team TEST TECHNIQUE TEST TEST TEST TECHNIQUE test transactions TESTING TOOLS APPENDIX tion/ex updated V/N RECOMMENDED TEST Verify Volume testing walk-through