|
|
Data-driven testing methodology for RFID systems |
An LU1,Wenbin FANG1,Shing-Chi CHEUNG1,Chang XU2,Yu LIU3, |
1.Department of Computer
Science and Engineering, The Hong Kong University of Science and Technology,
Hong Kong, China; 2.Department of Computer
Science and Engineering, The Hong Kong University of Science and Technology,
Hong Kong, China;Department of Computer
Science and Technology, Nanjing University, Nanjing 210093, China; 3.Institute of Automation,
Chinese Academy of Sciences, Beijing 100190, China; |
|
|
Abstract A radio-frequency identification (RFID) system including hardware and software may be updated from time to time after first time deployment. To ensure the reliability of the system, extensive tests are required. However, enumerating all test cases is infeasible, especial- ly when the tests involve time-consuming hardware operations. To solve this problem, we propose a testing methodology for RFID systems which does not enumerate all test cases but rather those which are representative. A clustering method is adopted in selecting representative test cases. Although a small number of selected test cases are run, we can still obtain a relatively high bug detection rate compared with running the enumerated test cases. Our extensive experiments show the efficiency and effectiveness of our testing methodology.
|
Keywords
radio-frequency identification (RFID)
testing methodology
test cases
bug detection
|
Issue Date: 05 September 2010
|
|
|
RFID Benchmarking lab, www.rflab.org/
|
|
Bishop C M. Neural Networks for Pattern Recognition. Oxford University Press, 1996
|
|
MacQueen J B. Some methods for classification and analysis of multivariate observations. In: Proceedings of 5th Berkeley Symposium on MathematicalStatistics and Probability. Berkeley: University of California Press, 1967, 1: 281―297
|
|
mathworld.wolfram.com/
|
|
Geraci A. IEEEStandard Computer Dictionary: Compilation of IEEE Standard Computer Glossaries. Piscataway, NJ, USA: IEEE Press, 1991
|
|
Jefferson Offutt A. Apractical system for mutation testing: Help for the common programmer. In: ITC. IEEE Computer Society, 1994, 824―830
|
|
Mathur A P. Mutation testing. In: Encyclopedia of Software Engineering, 1994, 707―713
|
|
DeMillo R A, Lipton R J, Sayward F G. Hints on testdata selection: Help for the practicing programmer. Computer, 1978, 11(4): 34―41
doi: 10.1109/C-M.1978.218136
|
|
Hamlet R G. Testing programs with the aid of a compiler. IEEE Transactions on Software Engineering, 1977, 3(4): 279―290
doi: 10.1109/TSE.1977.231145
|
|
Jia Y, Harman M. An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering, 2010, (To appear)
doi: 10.1109/TSE.2010.62
|
|
De Hoon M J L, Imoto S, Nolan J, Miyano S. Opensource clustering software. Bioinformatics, 2004, 20(9): 1453―1454
doi: 10.1093/bioinformatics/bth078
|
|
Youm S K, Kim J H, Cho S K. A study on the methodology for testing of RFID systemat library. In: MUE. IEEE Computer Society, 2007, 1076―1079
|
|
Inderjeet Singh Banwait K. Harihara Sudhan. Testing and integration of RFID systems in field: Experienceswith department of post. In: ASCNT-2010, CDAC, Noida,India. 2010, 221―227
|
|
Welbourne E, Battle L, Cole G, Gould K, Rector K, Raymer S, Balazinska M, Borriello G. Building the internet of things using RFID: The RFIDecosystem experience. IEEE Internet Computing, 2009, 13(3): 48―55
doi: 10.1109/MIC.2009.52
|
|
Olivier M S. Database privacy: balancing confidentiality, integrity and availability. SIGKDD Explorations Newsletter, 2002, 4(2): 20―27
doi: 10.1145/772862.772866
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|