Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2010, Vol. 4 Issue (3) : 354-364    https://doi.org/10.1007/s11704-010-0387-6
Research articles
Data-driven testing methodology for RFID systems
An LU1,Wenbin FANG1,Shing-Chi CHEUNG1,Chang XU2,Yu LIU3,
1.Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China; 2.Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China;Department of Computer Science and Technology, Nanjing University, Nanjing 210093, China; 3.Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China;
 Download: PDF(339 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract A radio-frequency identification (RFID) system including hardware and software may be updated from time to time after first time deployment. To ensure the reliability of the system, extensive tests are required. However, enumerating all test cases is infeasible, especial- ly when the tests involve time-consuming hardware operations. To solve this problem, we propose a testing methodology for RFID systems which does not enumerate all test cases but rather those which are representative. A clustering method is adopted in selecting representative test cases. Although a small number of selected test cases are run, we can still obtain a relatively high bug detection rate compared with running the enumerated test cases. Our extensive experiments show the efficiency and effectiveness of our testing methodology.
Keywords radio-frequency identification (RFID)      testing methodology      test cases      bug detection      
Issue Date: 05 September 2010
 Cite this article:   
An LU,Shing-Chi CHEUNG,Yu LIU, et al. Data-driven testing methodology for RFID systems[J]. Front. Comput. Sci., 2010, 4(3): 354-364.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-010-0387-6
https://academic.hep.com.cn/fcs/EN/Y2010/V4/I3/354
RFID Benchmarking lab, www.rflab.org/
Bishop C M. Neural Networks for Pattern Recognition. Oxford University Press, 1996
MacQueen J B. Some methods for classification and analysis of multivariate observations. In: Proceedings of 5th Berkeley Symposium on MathematicalStatistics and Probability. Berkeley: University of California Press, 1967, 1: 281―297
mathworld.wolfram.com/
Geraci A. IEEEStandard Computer Dictionary: Compilation of IEEE Standard Computer Glossaries. Piscataway, NJ, USA: IEEE Press, 1991
Jefferson Offutt A. Apractical system for mutation testing: Help for the common programmer. In: ITC. IEEE Computer Society, 1994, 824―830
Mathur A P. Mutation testing. In: Encyclopedia of Software Engineering, 1994, 707―713
DeMillo R A, Lipton R J, Sayward F G. Hints on testdata selection: Help for the practicing programmer. Computer, 1978, 11(4): 34―41

doi: 10.1109/C-M.1978.218136
Hamlet R G. Testing programs with the aid of a compiler. IEEE Transactions on Software Engineering, 1977, 3(4): 279―290

doi: 10.1109/TSE.1977.231145
Jia Y, Harman M. An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering, 2010, (To appear)

doi: 10.1109/TSE.2010.62
De Hoon M J L, Imoto S, Nolan J, Miyano S. Opensource clustering software. Bioinformatics, 2004, 20(9): 1453―1454

doi: 10.1093/bioinformatics/bth078
Youm S K, Kim J H, Cho S K. A study on the methodology for testing of RFID systemat library. In: MUE. IEEE Computer Society, 2007, 1076―1079
Inderjeet Singh Banwait K. Harihara Sudhan. Testing and integration of RFID systems in field: Experienceswith department of post. In: ASCNT-2010, CDAC, Noida,India. 2010, 221―227
Welbourne E, Battle L, Cole G, Gould K, Rector K, Raymer S, Balazinska M, Borriello G. Building the internet of things using RFID: The RFIDecosystem experience. IEEE Internet Computing, 2009, 13(3): 48―55

doi: 10.1109/MIC.2009.52
Olivier M S. Database privacy: balancing confidentiality, integrity and availability. SIGKDD Explorations Newsletter, 2002, 4(2): 20―27

doi: 10.1145/772862.772866
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed