<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A TEST CASE GENERATION TECHNIQUE AND PROCESS</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Nicha</forename><surname>Kosindrdecha</surname></persName>
						</author>
						<author role="corresp">
							<persName><forename type="first">Jirapun</forename><surname>Daengdej</surname></persName>
							<email>jirapun@scitech.au.edu</email>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="department">Faculty of Science</orgName>
								<orgName type="laboratory">Autonomous System Research Laboratory</orgName>
								<orgName type="institution">Technology</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Assumption University</orgName>
								<address>
									<country key="TH">Thailand</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A TEST CASE GENERATION TECHNIQUE AND PROCESS</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">30B1EC8A6CCEA314F4C65167C4A06325</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:32+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>test generation</term>
					<term>testing and quality</term>
					<term>test case generation</term>
					<term>test generation technique and generate tests</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>It has been proven that the software testing phase is one of the most critical and important phases in the software development life cycle. In general, the software testing phase takes around 40-70% of the effort, time, and cost. This area is well researched over a long period of time. Unfortunately, while many researchers have found methods of reducing time and cost during the testing process, there are still a number of important related issues that need to be researched. This paper introduces a new high level test case generation process with a requirement prioritization method to resolve the following research problems: unable to identify suitable test cases with limited resources, lack of an ability to identify critical domain requirements in the test case generation process and ignore a number of generated test cases. Also, this paper proposes a practical test case generation technique derived from use case diagram.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">INTRODUCTION</head><p>Software testing is known as a key critical phase in the software development life cycle, which account for a large part of the development effort. A way of reducing testing effort, while ensuring its effectiveness, is to generate test cases automatically from artifacts used in the early phases of software development. Many test case generation techniques have been proposed <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b3">[4]</ref>, <ref type="bibr" target="#b9">[10]</ref>, <ref type="bibr" target="#b10">[11]</ref>, <ref type="bibr" target="#b11">[12]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b20">[21]</ref>, <ref type="bibr" target="#b21">[22]</ref>, <ref type="bibr" target="#b42">[42]</ref>, <ref type="bibr" target="#b47">[47]</ref>, <ref type="bibr" target="#b50">[50]</ref>, mainly random, pathoriented, goal-oriented and model-based approaches. Random techniques determine a set of test cases based on assumptions concerning fault distribution. Pathoriented techniques generally use control flow graph to identify paths to be covered and generate the appropriate test cases for those paths. Goal-oriented techniques identify test cases covering a selected goal such as a statement or branch, irrespective of the path taken. There are many researchers and practitioners who have been working in generating a set of test cases based on the specifications. Modeling languages are used to get the specification and generate test cases. Since Unified Modeling Language (UML) is the most widely used language, many researchers are using UML diagrams such as state diagrams, use-case diagrams and sequence diagrams to generate test cases and this has led to model-based test case generation techniques. In this paper, an approach with additional requirement prioritization step is proposed toward test cases generation from requirements captured as use cases <ref type="bibr" target="#b22">[23]</ref>, <ref type="bibr" target="#b23">[24]</ref>, <ref type="bibr" target="#b33">[33]</ref>. A use case is the specification of interconnected sequences of actions that a system can perform, interacting with actors of the system. Use cases have become one of the favorite approaches for requirements capture. Test cases derived from use cases can ensure compliance of an application with its functional requirements. However, one difficulty is that there are a large number of functional requirements and use cases. A second research challenge is to ensure that test cases are able to preserve and identify critical domain requirements <ref type="bibr" target="#b4">[5]</ref>. Finally, a third problem is to minimize a number of test cases while preserving an ability to reveal faults. For example, there are a lot of functional requirements in the large software development. Software test engineers may not be able to design test cases to cover important requirements and generate a minimum set of test cases. Therefore, test cases derived from large requirements or use cases are not effective in the practical large system. This paper presents an approach with additional requirement prioritization process for automated generation of abstract presentation of test purposes called test scenarios. This paper also introduces a new test case generation process to support and resolve the above research challenges. We overcome the problem of large numbers of requirements and use cases. This allows software testing engineer to prioritize critical requirements and reasonably design test cases for them. Also, this allows us to be able to identify a high percentage of each test case's critical domain coverage.</p><p>The rest of the paper is organized as follow. Section 2 discusses the comprehensive set of test case generation techniques. Section 3 proposes the outstanding research challenges that motivated this study. Section 4 introduces a new test generation process and technique. Section 5 describes an experiment, measurement metrics and results. Section 6 provides the conclusion and research directions in the test case generation field. The last section represents all source references used in this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">LITERATURE REVIEW</head><p>Model-based techniques are popular and most researchers have proposed several techniques. One of the reasons why those model-based techniques are popular is that wrong interpretations of complex software from non-formal specification can result in incorrect implementations leading to testing them for conformance to its specification standard <ref type="bibr" target="#b43">[43]</ref>. A major advantage of model-based V&amp;V is that it can be easily automated, saving time and resources. Other advantages are shifting the testing activities to an earlier part of the software development process and generating test cases that are independent of any particular implementation of the design <ref type="bibr" target="#b6">[7]</ref>. The model-based techniques are method to generate test cases from model diagrams like UML Use Case diagram <ref type="bibr" target="#b22">[23]</ref>, <ref type="bibr" target="#b23">[24]</ref>, <ref type="bibr" target="#b33">[33]</ref>, UML Sequence diagram <ref type="bibr" target="#b6">[7]</ref> and UML State diagram <ref type="bibr" target="#b4">[5]</ref>, <ref type="bibr" target="#b43">[43]</ref>, <ref type="bibr" target="#b21">[22]</ref>, <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b20">[21]</ref>, <ref type="bibr" target="#b14">[15]</ref>, <ref type="bibr" target="#b32">[32]</ref>, <ref type="bibr" target="#b3">[4]</ref>. There are many researchers who investigated in generating test cases from those diagrams. The following paragraphs show examples of model-based test generation techniques that have been proposed for a long time.</p><p>Heumann <ref type="bibr" target="#b22">[23]</ref> presented how using use cases to generate test cases can help launch the testing process early in the development lifecycle and also help with testing methodology. In a software development project, use cases define system software requirements. Use case development begins early on, so real use cases for key product functionality are available in early iterations. According to the Rational Unified Process (RUP), a use case is used to describe fully a sequence of actions performed by a system to provide an observable result of value to a person or another system using the product under development." Use cases tell the customer what to expect, the developer what to code, the technical writer what to document, and the tester what to test. He proposed three-step process to generate test cases from a fully detailed use case: (a) for each use case, generate a full set of use-case scenarios (b) for each scenario, identify at least one test case and the conditions that will make it execute and (c) for each test case, identify the data values with which to test. Ryser <ref type="bibr" target="#b23">[24]</ref> raised the practical problems in software testing as follows: (1) Lack in planning/time and cost pressure, (2) Lacking test documentation, (3) Lacking tool support, (4) Formal language/specific testing languages required, (5) Lacking measures, measurements and data to quantify testing and evaluate test quality and (6) Insufficient test quality. They proposed their approach to resolve the above problems. Their approach is to derive test case from scenario / UML use case and state diagram. In their work, the generation of test cases is done in three processes: (a) preliminary test case definition and test preparation during scenario creation (b) test case generation from Statechart and from dependency charts and (c) test set refinement by application dependent strategies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">RESEARCH CHALLENGES</head><p>This section discusses the details of research issues related to test case generation techniques and research problems, which are motivated this study. Every test case generation technique has weak and strong points, as addressed in the literature survey. In general, referring to the literature review, the following lists major outstanding research challenges. The first research problem is that existing test case generation methods are lack of ability to identify domain specific requirements. The study <ref type="bibr" target="#b4">[5]</ref> shows that domain specific requirements are some of the most critical requirements required to be captured for implementation and testing, such as constraints requirements and database specific requirements. Existing approaches ignore an ability to address domain specific requirements. Consequently, software testing engineers may ignore the critical functionality related to the critical domain specific requirements. Thus, this paper introduces an approach to priority those specific requirements and generates an effective test case. The second problem is that existing test case generation techniques aim to generate test cases which maximize cover for each scenario. Sometimes, they generate a huge number of test cases which are impossible to execute given limited time and resources. As a result, those unexecuted test cases are useless. The last problem is to unable to identify suitable test cases in case that there are limited resources (e.g. time, effort and cost). The study reveals that existing techniques aim to maximum and generate all possible test cases. This can lead to unable to select necessary test cases to be executed during software testing activities, in case that there are limited resources.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">PROPOSED METHOD</head><p>This section presents a new high-level process to generate a set of test cases introduced by using the above comprehensive literature review and previous works <ref type="bibr" target="#b43">[43]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1 A Proposed Process to Generate Test Cases</head><p>From the above figure, the left-hand side process is a general waterfall process. We propose to add two additional processes: (a) requirement prioritization and (b) test case generation.</p><p>The requirement prioritization process aims to be able to effectively handle with a large number of requirements. The objective of this process is to prioritize and organize requirements in an appropriate way in order to effectively design and prepare test cases <ref type="bibr" target="#b15">[16]</ref>, <ref type="bibr" target="#b24">[25]</ref>, <ref type="bibr" target="#b37">[37]</ref>. There are two sub-processes: (a) classify requirements and (b) prioritize requirements.</p><p>The classify requirement process primarily divides and classifies requirements into four groups <ref type="bibr" target="#b29">[30]</ref>: (a) "Must-Have" (b) "Should-Have" (c) "Could-Have" and (d) "Wish". The "Must-Have" requirements are mandatory requirements that need to be implemented in the system. The "Should-Have" requirements are requirements that should be implemented if there are available resources. The "Could-Have" requirements are additional requirements that are able to be implemented if there are adequate resources. The "Wish" requirements are "would like to have in the future" requirements that may be ignored if there are inadequate resources. This paper introduces five factors to classify the above requirements, as follows:</p><formula xml:id="formula_0">Table 1 Requirement Classification Group Time Cost People Scope Success Must have Y Y Y N Y Should have Y Y Y N N Could have N N Y Y N Wish N N N Y N</formula><p>From the above table, the following shortly describes a meaning of the above factors:</p><p>• Time -The requirement must be implemented in the current version or release of software. • Cost -There is an available of budget or fund to implement the requirement. • People -There is an available of human resources to develop and test the requirement. • Scope -The requirement can be removed out of the current version or release of software. • Success -The success of system development rely on the requirement. In addition, this paper secondary divides those requirements into two groups: (a) functional and (b) non-functional. The functional requirements can be categorized into two groups: (a) domain specific requirements and (b) non-domain specific requirements. The domain specific requirements are able to identify as database specific and constraints requirements. For example, database connection specific requirements and requirements for an interface with other systems. The non-functional requirements can be vary, such as performance, security, operability and maintainability requirements. The following displays the classify requirement tree:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 2 A Classify Requirement Tree</head><p>From the above figure, we propose a ranking number for each requirement. This paper prioritizes "Must-Have" requirements as top three ranking and "Wish" requirements as last three ranking. The study <ref type="bibr" target="#b4">[5]</ref> reveals that domain specific requirements should have higher priority than both of behavioral and nonfunctional requirements.</p><p>However, when the requirement is already classified, the next process is to prioritize those requirements. In the requirement prioritization process, this paper proposes to use a cost-value approach to weight and prioritize requirements. This paper also proposes to use the following formula: P(Req) = (Cost * CP)</p><p>(1) Where:</p><p>• P is a prioritization value.</p><p>• Req is a requirement required to be prioritized.</p><p>• Cost is a total estimated cost of coding and testing for each requirement. • CP is an user-defined customer priority value. This value is in the range between 1 and 10. 10 is the highest priority and 1 is the lowest priority. This value aims to allow customers to identify how important of each requirement is from their perspective. To compute the above cost for coding and testing, this paper proposes to apply the following formula:</p><formula xml:id="formula_1">Cost= (ECode*CostCode)+(ETest*CostTest)</formula><p>(2) Where:</p><p>• Cost is a total estimated cost.</p><p>• ECode is an estimated effort of coding for each requirement. The unit is man-hours. • CostCode is a cost of coding that is charged to customers. This paper applies the cost-value approach to identify the cost of coding for each requirement group (e.g. "Must-Have", "Should-Have", "Could-Have" and "Wish"). The unit is US dollar. • ETest is an estimated effort of testing for each requirement. The unit is man-hours. • CostTest is a cost of testing that is charged to customers. The approach to identify this value is similar to CostCode's approach. The unit is US dollar. In this paper, we assumed the following in order to calculate CostCode and CostTest. Also, this paper assumes that a standard cost for both activities is $100 per man-hours.</p><p>• A value is 1.5 of ("Must-Have", "Should-Have") -this means that "Must-Have" requirements have one and half times cost value than "Should-Have" requirements. • A value is 3 of ("Must-Have", "Could-Have")this means that "Must-Have" requirements have three times cost value than "Could-Have" requirements. • A value is 2 of ("Should-Have", "Could-Have") -this means that "Should-Have" requirements have two times cost value than "Could-Have" requirements. • A value is approximately 3 of ("Could-Have", "Wish") -this means that "Could-Have" requirements have three times cost value than "Wish" requirements. Therefore, the procedure of requirement prioritization process can be shortly described below: 1. Provide estimated efforts of coding and testing for each requirement. 2. Assign cost value for each requirement group based on the previous requirement classification (e.g. "Must-Have", "Should-Have", "Could-Have" and "Wish"). 3. Calculate a total estimated cost for coding and testing, by using the formula (2). 4. Define a customer priority for each requirement. 5. Compute a priority value for each requirement by using the formula (1). 6. Prioritize requirements based on the higher priority value.</p><p>Once the requirements are prioritized, the next proposed step is to generate test scenario and prepare test case.</p><p>This section presents an automated test scenario generation derived from UML Use Case diagram. Our approach is built based on Heumann's algorithm <ref type="bibr" target="#b22">[23]</ref>. The limitation of our approach is to ensure that all use cases are fully dressed. The fully dressed use case is a use case with the comprehensive of information, as follows: use case name, use case number, purpose, summary, pre-condition, post-condition, actors, stakeholders, basic events, alternative events, business rules, notes, version, author and date.</p><p>The proposed method contains four steps, as follows: (a) extract use case diagram (b) generate test scenario (c) prepare test data and prepare other test elements. These steps can be shortly described as follows:</p><p>1. The first step is to extract the following information from fully dressed use cases: (a) use case number (b) purpose (c) summary (d) pre-condition (e) post-condition (f) basic event and (g) alternative events. This information is called use case scenario in this paper. The example fully dressed use cases of ATM withdraw functionality can be found as follows: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">EVALUATION</head><p>The section describes the experiments design, measurement metrics and results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Experiments Design</head><p>A comparative evaluation method has proposed in this experiment design. The high-level overview of this experiment design can be found as follows: 1. Prepare Experiment Data. Before evaluating the proposed methods and other methods, preparing experiment data is required. In this step, 50 requirements and 50 use case scenarios are randomly generated. 2. Generate Test Scenario and Test Case. A comparative evaluation method has been made among the proposed test generation algorithm, Heumann's technique Jim <ref type="bibr" target="#b22">[23]</ref>, Ryser's method <ref type="bibr" target="#b23">[24]</ref>, Nilawar's algorithm <ref type="bibr" target="#b33">[33]</ref> and the proposed method presented in the previous section. 3. Evaluate Results. In this step, the comparative generation methods are executed by using 50 requirements and 50 use case scenarios. These methods are also executed for 10 times in order to find out the average percentage of critical domain requirement coverage, a size of test cases and total generation time. In total, there are 500 requirements and 500 use case scenarios executed in this experiment. The following tables present how to randomly generate data for requirements and use case scenarios respectively. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 2</head><label>2</label><figDesc>Example Fully Dressed Use Case</figDesc><table><row><cell>Use</cell><cell>Use</cell><cell cols="3">Summary Basic Event Alternativ</cell><cell>Business</cell></row><row><cell>Case Id</cell><cell>Case</cell><cell></cell><cell></cell><cell>e Events</cell><cell>Rules</cell></row><row><cell></cell><cell>Name</cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="2">UC-001 Withd</cell><cell>To allow</cell><cell>1. Insert</cell><cell>1. Select</cell><cell>(a) Input</cell></row><row><cell></cell><cell>raw</cell><cell>bank's</cell><cell>Card</cell><cell>Inquiry</cell><cell>amount</cell></row><row><cell></cell><cell></cell><cell>customers</cell><cell>2. Input PIN</cell><cell>2. Select</cell><cell>&lt;=</cell></row><row><cell></cell><cell></cell><cell>to</cell><cell>3. Select</cell><cell>A/C Type</cell><cell>Outstandi</cell></row><row><cell></cell><cell></cell><cell>withdraw</cell><cell>Withdraw</cell><cell>3. Check</cell><cell>ng</cell></row><row><cell></cell><cell></cell><cell>money</cell><cell>4. Select</cell><cell>Balance</cell><cell>Balance</cell></row><row><cell></cell><cell></cell><cell>from ATM</cell><cell>A/C Type</cell><cell></cell><cell>(b) Fee</cell></row><row><cell></cell><cell></cell><cell>machines</cell><cell>5. Input</cell><cell></cell><cell>charge if</cell></row><row><cell></cell><cell></cell><cell>anywhere</cell><cell>Balance</cell><cell></cell><cell>using</cell></row><row><cell></cell><cell></cell><cell>in</cell><cell>6. Get</cell><cell></cell><cell>different</cell></row><row><cell></cell><cell></cell><cell>Thailand.</cell><cell>Money</cell><cell></cell><cell>ATM</cell></row><row><cell></cell><cell></cell><cell></cell><cell>7. Get Card</cell><cell></cell><cell>machines</cell></row><row><cell cols="2">UC-002 Trans</cell><cell>To allow</cell><cell>1. Insert</cell><cell>1. Select</cell><cell>Amount</cell></row><row><cell></cell><cell>fer</cell><cell>users to</cell><cell>Card</cell><cell>Inquiry</cell><cell>&lt;=</cell></row><row><cell></cell><cell></cell><cell>transfer</cell><cell>2. Input PIN</cell><cell>2. Select</cell><cell>50,000</cell></row><row><cell></cell><cell></cell><cell>money to</cell><cell>3. Select</cell><cell>A/C Type</cell><cell>baht</cell></row><row><cell></cell><cell></cell><cell>other</cell><cell>Transfer</cell><cell>3. Check</cell></row><row><cell></cell><cell></cell><cell>banks in</cell><cell>4. Select</cell><cell>Balance</cell></row><row><cell></cell><cell></cell><cell>Thailand</cell><cell>bank</cell><cell></cell></row><row><cell></cell><cell></cell><cell>from all</cell><cell>5. Select</cell><cell></cell></row><row><cell></cell><cell></cell><cell>ATM</cell><cell>"To"</cell><cell></cell></row><row><cell></cell><cell></cell><cell>machines</cell><cell>account</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>6. Select</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>A/C Type</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>7. Input</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>Amount</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>8. Get</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>Receipt</cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>9. Get Card</cell><cell></cell></row><row><cell cols="6">The above use cases can be extracted into the</cell></row><row><cell cols="4">following use case scenarios:</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 3 Extracted</head><label>3</label><figDesc>Use Case Scenarios The next step is to prepare test data. This step allows to manually prepare an input data for each scenarios. The last step is to prepare other test elements, such as expected output, actual output and pass / fail status.</figDesc><table><row><cell>Scenario Id</cell><cell>Summary</cell><cell>Basic Scenario</cell></row><row><cell>Scenario-001</cell><cell>To allow bank's</cell><cell>1. Insert Card</cell></row><row><cell></cell><cell>customers to</cell><cell>2. Input PIN</cell></row><row><cell></cell><cell>withdraw money</cell><cell>3. Select Withdraw</cell></row><row><cell></cell><cell>from ATM</cell><cell>4. Select A/C Type</cell></row><row><cell></cell><cell>machines</cell><cell>5. Input Balance</cell></row><row><cell></cell><cell>anywhere in</cell><cell>6. Get Money</cell></row><row><cell></cell><cell>Thailand.</cell><cell>7. Get Card</cell></row><row><cell>Scenario-002</cell><cell>To allow bank's</cell><cell>1. Insert Card</cell></row><row><cell></cell><cell>customers to</cell><cell>2. Input PIN</cell></row><row><cell></cell><cell>withdraw money</cell><cell>3. Select Inquiry</cell></row><row><cell></cell><cell>from ATM</cell><cell>4. Select A/C Type</cell></row><row><cell></cell><cell>machines</cell><cell>5. Check Balance</cell></row><row><cell></cell><cell>anywhere in</cell><cell>6. Select Withdraw</cell></row><row><cell></cell><cell>Thailand.</cell><cell>7. Select A/C Type</cell></row><row><cell></cell><cell></cell><cell>8. Input Balance</cell></row><row><cell></cell><cell></cell><cell>9. Get Money</cell></row><row><cell></cell><cell></cell><cell>10. Get Card</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 5</head><label>5</label><figDesc>Generate Random Requirements</figDesc><table><row><cell>Attribute</cell><cell>Approach</cell></row><row><cell cols="2">Requirement ID Randomly generated from the following</cell></row><row><cell></cell><cell>combination: Req + Sequence Number.</cell></row><row><cell></cell><cell>For example, Req1, Req2, Req3, …,</cell></row><row><cell></cell><cell>ReqN.</cell></row><row><cell>Type of</cell><cell>Randomly selected from the following</cell></row><row><cell>Requirement</cell><cell>values: Functional AND Non-</cell></row></table></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Functional. MoSCoW Criteria</head><p>Randomly selected from the following values: Must Have (M), Should Have (S), Could Have (C) and Won't Have (W) Is it a critical requirement (Y/N)?</p><p>Randomly selected from the following values: True (Y) and False (N) </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Measurement Metrics</head><p>The section lists the measurement metrics used in the experiment. This paper proposes to use three metrics, which are: (a) size of test cases (b) total time and (c) percentage of critical domain requirement coverage.</p><p>The following describe the measurement in details. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">A Domain Specific Requirement Coverage:</head><p>This is an indicator to identify the number of requirements covered in the system, particularly critical requirements, and critical domain requirements <ref type="bibr" target="#b4">[5]</ref>. Due to the fact that one of the goals of software testing is to verify and validate requirements covered by the system, this metric is a must. Therefore, a high percentage of critical requirement coverage is desirable. It can be calculated using the following formula: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Results and Discussion</head><p>This section discusses an evaluation result of the above experiment. This section presents a graph that compares the above proposed method to other three existing test case generation techniques, based on the following measurements: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3 An Evaluation Result</head><p>The above graph shows that the above proposed method generates the smallest set of test cases. It is calculated as 80.80% where as the other techniques is computed over 97%. Those techniques generated a bigger set of test cases, than a set generated by the proposed method. The literature review reveals that the smaller set of test cases is desirable. Also, the graph shows that the proposed method consumes the least total time during a generation process, comparing to other techniques. It used only 30.20%, which is slightly less than others. Finally, the graph presents that the proposed method is the best techniques to coverage critical domains. Its percentage is much greater than other techniques' percentage, over 30%.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">CONCLUSION</head><p>This </p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">An Experimental Comparison of Five Prioritization Methods</title>
		<author>
			<persName><forename type="first">V</forename><surname>Ahl</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<pubPlace>Ronneby, Sweden</pubPlace>
		</imprint>
		<respStmt>
			<orgName>School of Engineering, Blekinge Institute of Technology,</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Master&apos;s Thesis</note>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Using UML for Automatic Test Generation</title>
		<author>
			<persName><forename type="first">Alessandra</forename><surname>Cavarra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Charles</forename><surname>Crichton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jim</forename><surname>Davies</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alan</forename><surname>Hartman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thierry</forename><surname>Jeron</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Laurent</forename><surname>Mounier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Tools and Algorithms for the Construction and Analysis of Systems</title>
				<imprint>
			<date type="published" when="2000">2000. 2000</date>
		</imprint>
		<respStmt>
			<orgName>Oxford University Computing Laboratory</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Test case generation of systems specified in Statecharts</title>
		<author>
			<persName><forename type="first">"</forename><forename type="middle">A S M S</forename><surname>Amaral</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<pubPlace>Brazil</pubPlace>
		</imprint>
		<respStmt>
			<orgName>Laboratory of Computing and Applied Mathematics, INPE</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">M.S. thesis -</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Testing Web Applications</title>
		<author>
			<persName><forename type="first">A</forename><surname>Annelises</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Andrews</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Roger</forename><forename type="middle">T</forename><surname>Offutt</surname></persName>
		</author>
		<author>
			<persName><surname>Alexander</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Software and Systems Modeling</title>
				<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Domain Specific Test Case Generation Using Higher Ordered Typed Languages fro Specification</title>
		<author>
			<persName><forename type="first">Avik</forename><surname>Sinha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ph</forename><surname>Dr</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Carol</forename><forename type="middle">S</forename><surname>Smidts</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
	<note type="report_type">Ph. D. Dissertation</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Software Testing Research and Practice</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bertolino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">10th International Workshop on Abstract State Machines (ASM&apos;2003)</title>
				<meeting><address><addrLine>Taormina, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Automated Generation of Test Cases Using Model-Driven Architecture</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">Z</forename><surname>Javed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">A</forename><surname>Strooper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">N</forename><surname>Watson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Second International Workshop on Automation of Software Test (AST&apos;07</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Extreme Programming Explained: Embrace Change</title>
		<author>
			<persName><forename type="first">K</forename><surname>Beck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Andres</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2004">2004</date>
			<publisher>Addison-Wesley</publisher>
			<pubPlace>Boston, MA</pubPlace>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Theory-W Software Project Management: Principles and Examples</title>
		<author>
			<persName><forename type="first">B</forename><surname>Boehm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ross</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="902" to="916" />
			<date type="published" when="1989">1989</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Object driven performance testing in Web applications</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">M</forename><surname>Subraya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Subrahmanya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First Asia-Pacific Conference on Quality Software (APAQS&apos;00)</title>
				<meeting>the First Asia-Pacific Conference on Quality Software (APAQS&apos;00)<address><addrLine>Hong Kong, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="17" to="26" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Object-Based Data Flow Testing of Web Applications</title>
		<author>
			<persName><forename type="first">Chien-Hung</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">C</forename><surname>Kung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pei</forename><surname>Hsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chih-Tung</forename><surname>Hsu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First Asia-Pacific Conference on Quality Software (APAQS&apos;00)</title>
				<meeting>the First Asia-Pacific Conference on Quality Software (APAQS&apos;00)<address><addrLine>Hong Kong, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="7" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Structural testing of Web applications</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">H</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Kung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hsia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">T</forename><surname>Hsu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 11 th International Symposium on Software Reliability Engineering (ISSRE 2000)</title>
				<meeting>11 th International Symposium on Software Reliability Engineering (ISSRE 2000)</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="84" to="96" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The Art of Requirements Triage</title>
		<author>
			<persName><forename type="first">A</forename><surname>Davis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Computer</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="42" to="49" />
			<date type="published" when="2003">2003</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">Just Enough Requirements Management: Where Software Development Meets Marketing</title>
		<author>
			<persName><forename type="first">A</forename><surname>Davis</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005</date>
			<publisher>Dorset House</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">An Object-Oriented Web Test Model for Testing Web Applications</title>
		<author>
			<persName><forename type="first">C</forename><surname>David</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Chien-Hung</forename><surname>Kung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Pei</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><surname>Hsia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First Asia-Pacific Conference on Quality Software (APAQS&apos;00)</title>
				<meeting>the First Asia-Pacific Conference on Quality Software (APAQS&apos;00)<address><addrLine>Los Alamitos, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page">111</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Prioritizing Requirements</title>
		<author>
			<persName><forename type="first">Donald</forename><surname>Firesmith</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Object Technology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page">8</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">On visual formalisms</title>
		<author>
			<persName><forename type="first">D</forename><surname>Harel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications of the ACM</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="514" to="530" />
			<date type="published" when="1988">1988</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Statecharts: A Visual Formulation for Complex System</title>
		<author>
			<persName><forename type="first">D</forename><surname>Harel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sci.Comput. Program</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="232" to="274" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Analysis and Testing of Web Applications</title>
		<author>
			<persName><forename type="first">Flippo</forename><surname>Ricca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paolo</forename><surname>Tonella</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 23rd International Conference on Software Engineering</title>
				<meeting>of the 23rd International Conference on Software Engineering<address><addrLine>Toronto, Ontario, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="25" to="34" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Statecharts: a visual formalism for complex system</title>
		<author>
			<persName><forename type="first">D</forename><surname>Harel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science of Computer Programming</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="231" to="274" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">A Model Based Testing Technique to Test Web Applications Using Statecharts</title>
		<author>
			<persName><forename type="first">Hassan</forename><surname>Reza</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Kirk</forename><surname>Ogaard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Amarnath</forename><surname>Malge</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Fifth International Conference on Information Technology</title>
				<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Ibrahim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><forename type="middle">A</forename><surname>El-Far</surname></persName>
		</author>
		<author>
			<persName><surname>Whittaker</surname></persName>
		</author>
		<title level="m">Modelbased Software Testing</title>
				<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Generating Test Cases From Use Cases</title>
		<author>
			<persName><forename type="first">Jim</forename><surname>Heumann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Rational Software</title>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<title level="m" type="main">SCENT: A Method Employing Scenarios to Systematically Derive Test Cases for System Test</title>
		<author>
			<persName><forename type="first">Johannes</forename><surname>Ryser</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Martin</forename><surname>Glinz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<title level="m" type="main">First Things First: Prioritizing Requirements</title>
		<author>
			<persName><forename type="first">Karl</forename><forename type="middle">E</forename><surname>Wiegers</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Published in Software Development</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Software Requirements Prioritizing</title>
		<author>
			<persName><forename type="first">J</forename><surname>Karlsson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second International Conference on Requirements Engineering (ICRE&apos;96)</title>
				<meeting>the Second International Conference on Requirements Engineering (ICRE&apos;96)<address><addrLine>Colorado Springs, CO; Los Alamitos, CA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="1996">April 15-18, 1996. 1996</date>
			<biblScope unit="page" from="110" to="116" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Towards a Strategy for Software Requirements Selection</title>
		<author>
			<persName><forename type="first">J</forename><surname>Karlsson</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1995">1995</date>
			<biblScope unit="volume">513</biblScope>
		</imprint>
		<respStmt>
			<orgName>Linköping University</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Thesis</note>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">A Cost-Value Approach for Prioritizing Requirements</title>
		<author>
			<persName><forename type="first">J</forename><surname>Karlsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ryan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Software</title>
		<imprint>
			<date type="published" when="1997">September/October, p67-75, 1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Managing Software Requirements: A Use Case Approach</title>
		<author>
			<persName><forename type="first">D</forename><surname>Leffingwell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Widrig</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Addison-Wesley</publisher>
			<pubPlace>Boston, MA</pubPlace>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">Managing a Designer</title>
		<author>
			<persName><forename type="first">Leslie</forename><forename type="middle">M</forename><surname>Tierstein</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m">NYOUG Fall&apos;97 Conference</title>
				<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Component-interaction automata as a verification oriented component-based system specification</title>
		<author>
			<persName><forename type="first">L</forename><surname>Brim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Cerna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Varekova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zimmerova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings (SAVCBS&apos;05)</title>
				<meeting>SAVCBS&apos;05<address><addrLine>Lisbon, Portugal</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="31" to="38" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">A Model-Based Approach for Testing the Performance of Web Applications</title>
		<author>
			<persName><forename type="first">Mahnaz</forename><surname>Shams</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Diwakar</forename><surname>Krishnamurthy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Behrouz</forename><surname>Far</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third International Workshop on Software Quality Assurance (SOQUA&apos;06)</title>
				<meeting>the Third International Workshop on Software Quality Assurance (SOQUA&apos;06)</meeting>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<title level="m" type="main">A UML-Based Approach for Testing Web Applications</title>
		<author>
			<persName><forename type="first">Manish</forename><surname>Nilawar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dr</forename><forename type="middle">Sergiu</forename><surname>Dascalu</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
		</imprint>
		<respStmt>
			<orgName>Master of Science with major in Computer Science, University of Nevada, Reno</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Prioritising Scenario Evolution</title>
		<author>
			<persName><forename type="first">F</forename><surname>Moisiadis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Requirements Engineering (ICRE 2000)</title>
				<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">A Requirements Prioritisation Tool</title>
		<author>
			<persName><forename type="first">F</forename><surname>Moisiadis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">6th Australian Workshop on Requirements Engineering (AWRE 2001)</title>
				<meeting><address><addrLine>Sydney, Australia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">A Survey on Automatic Test Case Generation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Prasanna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">N</forename><surname>Sivanandam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Venkatesan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sundarrajan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Academic Open Internet Journal</title>
		<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<title level="m" type="main">Requirements Prioritization Introduction</title>
		<author>
			<persName><forename type="first">Nancy</forename><forename type="middle">R</forename><surname>Mead</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>Software Engineering Institute, Carnegie Mellon University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">Supporting Distributed Collaborative Prioritization for Win-Win Requirements Capture and Negotiation 578-584</title>
		<author>
			<persName><forename type="first">J</forename><surname>Park</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Port</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Boehm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Third World Multiconference on Systemics, Cybernetics and Informatics (SCI&apos;99)</title>
				<meeting>the International Third World Multiconference on Systemics, Cybernetics and Informatics (SCI&apos;99)<address><addrLine>Orlando, FL; Orlando, FL</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999-08-04">July 31-August 4, 1999. 1999</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
		<respStmt>
			<orgName>International Institute of Informatics and Systemic (IIIS</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<monogr>
		<title level="m" type="main">Software Test Metric</title>
		<author>
			<persName><surname>Rajib</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>QCON</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<monogr>
		<title level="m" type="main">Test Case Generation for Mutation-based Testing of Timeliness</title>
		<author>
			<persName><forename type="first">Robert</forename><surname>Nilsson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Offutt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jonas</forename><surname>Mellin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<monogr>
		<title level="m" type="main">The Analytic Hierarchy Process</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">L</forename><surname>Saaty</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1980">1980</date>
			<publisher>McGraw-Hill</publisher>
			<pubPlace>New York, NY</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<analytic>
		<title level="a" type="main">Automatic Generating Test Cases for Testing Web Applications</title>
		<author>
			<persName><forename type="first">Shengbo</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Huaikou</forename><surname>Miao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Zhongsheng</forename><surname>Qian</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Conference on Computational Intelligence and Security Workshops</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b43">
	<monogr>
		<title level="m" type="main">A Practical Approach for Automated Test Case Generation using Statecharts</title>
		<author>
			<persName><forename type="first">Valdivino</forename><surname>Santiago</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ana</forename><forename type="middle">Silvia</forename><surname>Martins Do Amaral</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">L</forename><surname>Vijaykumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Maria</forename><surname>De Fatima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eliane</forename><surname>Mattiello-Francisco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Odnei Cuesta</forename><surname>Martins</surname></persName>
		</author>
		<author>
			<persName><surname>Lopes</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<analytic>
		<title level="a" type="main">On proposing Statecharts to specify performance models</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">L</forename><surname>Vijaykumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V</forename><surname>Carvalho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Abdurahiman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Transactions in Operational Research</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="321" to="336" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b45">
	<monogr>
		<title level="m" type="main">Software Requirements</title>
		<author>
			<persName><forename type="first">K</forename><surname>Wiegers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Microsoft Press</publisher>
			<pubPlace>Redmond, WA</pubPlace>
		</imprint>
	</monogr>
	<note>2nd ed</note>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">Formal Structured Specification for Web Application Testing</title>
		<author>
			<persName><forename type="first">Xiaoping</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hongming</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Lizhang</forename><surname>Qin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2003 Midwest Software Engineering Conference (MSEC&apos;03)</title>
				<meeting>of the 2003 Midwest Software Engineering Conference (MSEC&apos;03)<address><addrLine>Chicago, IL, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="88" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Constructing an object-oriented architecture for Web application testing</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">T</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">C</forename><surname>Chu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Science and Engineering</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="59" to="84" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<monogr>
		<title level="m" type="main">Modeling and Testing Webbased Applications</title>
		<author>
			<persName><forename type="first">Ye</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Offutt</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<monogr>
		<title level="m" type="main">Modeling and Testing of Dynamic Aspects of Web Applications</title>
		<author>
			<persName><forename type="first">Ye</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jeff</forename><surname>Offutt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Xiaochen</forename></persName>
		</author>
		<idno>ISE-TR-04-01</idno>
		<ptr target=",www.ise.gmu.edu/techreps/" />
		<imprint>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
	<note>Submitted for publication</note>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Software Unit Test Coverage and Adequacy</title>
		<author>
			<persName><forename type="first">H</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Hall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>May</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Comp. Survey</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="366" to="427" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
