US20110271256A1 - Bi-directional probing of software - Google Patents

Bi-directional probing of software Download PDF

Info

Publication number
US20110271256A1
US20110271256A1 US13/180,794 US201113180794A US2011271256A1 US 20110271256 A1 US20110271256 A1 US 20110271256A1 US 201113180794 A US201113180794 A US 201113180794A US 2011271256 A1 US2011271256 A1 US 2011271256A1
Authority
US
United States
Prior art keywords
address location
data
software
location
probe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/180,794
Inventor
Per-Ola Robertsson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Telefonaktiebolaget LM Ericsson AB
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/180,794 priority Critical patent/US20110271256A1/en
Assigned to TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) reassignment TELEFONAKTIEBOLAGET LM ERICSSON (PUBL) ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ROBERTSSON, PER-OLA
Publication of US20110271256A1 publication Critical patent/US20110271256A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring

Definitions

  • the invention is related to testing of software and, in particular, to a method for bidirectional probing of software.
  • Reliability refers to the ability of a software to operate without failure for a specified amount of time in a specified environment.
  • software must be thoroughly tested and debugged prior to release.
  • the entire software program as a whole is tested, as well as the individual functional components (e.g., function calls, subroutines) that make up the software program.
  • test vectors are generated containing a series of values for the variables that are required by the software and/or one or more functional components thereof.
  • the variable values are chosen to represent various types of usage conditions and environments in which the software is intended to be run.
  • the test vectors are then applied to the software and/or the one or more functional components thereof, and the variable values are observed and recorded.
  • regression analysis involves the selective retesting of a software that has been modified in order to fix known problems.
  • the selective retesting is performed in order to ensure that the identified problems have been fixed, and that no other previously working functional components have failed as a result of the reparations.
  • This type of testing is basically a quality control measure to ensure that the modified code still complies with its specified requirements and that any unmodified code has not been affected by the maintenance activity.
  • the present invention is directed to bi-directional probing of software.
  • the bi-directional probe of the present invention is capable of transferring data to and from a software under test. This two-way transfer of data allows the variables in the software to not only be monitored, but also changed as needed. Test vectors may be developed and injected into the software while running for testing purposes. Regression analysis is made easier by using data from previous iterations as input for the next iterations.
  • the invention is directed to a method of testing software having a plurality of data variables and function arguments therein.
  • the method comprises executing the software, identifying an address location for at least one of the variables or arguments used by the software, and outputting any data stored in the address location to a test system to thereby monitor the data. Data from the test system is then inputted into the address location to thereby replace any data previously stored in the address location.
  • the invention is directed to an apparatus for testing software having a plurality of data variables and function arguments therein.
  • the apparatus comprises a central processing unit, and a storage unit connected to the central processing unit.
  • the storage unit stores computer readable instructions for instructing the central processing unit to execute the software, identify an address location for at least one of the variables or arguments used by the software, output any data stored in the address location to the central processing unit to thereby monitor the data, and input data from the central processing unit into the address location to thereby replace any data previously stored in the address location.
  • the invention is directed to a system for testing software having a plurality of data variables and function arguments therein.
  • the system comprises a device under test configured to execute the software including one or more probe instructions in the software, and a tester connected to the device under test.
  • the tester is configured to control the device under test so that when a probe instruction is executed, the device under test: will identify an address location for at least one of the variables or arguments used by the software; output any data stored in the address location to the tester; and input data received from the tester into the address location.
  • FIG. 1 illustrates an exemplary software testing environment according to embodiments of the invention using analogous hardware components
  • FIGS. 2A-2D illustrates exemplary operating modes of the bi-directional software probe according to embodiments of the invention using analogous hardware components
  • FIG. 3 illustrates an exemplary system in which the bi-directional software probe according to embodiments of the invention may be implemented
  • FIG. 4 illustrates another exemplary system in which the bi-directional software probe according to embodiments of the invention may be implemented.
  • FIG. 5 illustrates an exemplary method of implementing the bi-directional software probe according to embodiments of the invention.
  • Embodiments of the invention provide a method and system for testing software using bi-directional probes.
  • the bi-directional probes of the invention may be inserted into the program code at essentially any location.
  • the probes allow data to be captured from as well as injected into the software.
  • the probes allow the values of the variables in the software to be monitored, changed and inserted back into the software during execution.
  • the software is then further executed with the changed values.
  • the bi-directional probes of the invention may be implemented as a feature or a function in a software development tool such as Code Composer StudioTM from Texas Instruments and LabVIEWTM from National Instruments, or other similar software development environments.
  • the bi-directional software probing technique of the present invention is somewhat analogous to the testing of a hardware circuit board. Therefore, the invention will be described initially in terms of a test system for a hardware circuit board. This description is provided for illustrative purposes only, however, as the invention is actually directed to the probing of software.
  • FIG. 1 illustrates a hardware test system 100 that is analogous to the software testing tool in which the bi-directional probing technique of the present invention may be used.
  • the hardware test system 100 is connected to a device under test (DUT) 102 via a plurality of hardware probes, one of which is indicated at 104 .
  • Each hardware probe 104 may be identified by its probe ID. For example, the first probe is PID 1, the second probe is PID 2, the third probe is PID 3, and so on.
  • the probes 104 are connected to one side of a cross-circuit box 106 , the other side of which is connected to one or more function generators 108 , such as waveform generators, and one or more measurement units 110 , such as oscilloscopes and wavemeters.
  • function generators 108 such as waveform generators
  • measurement units 110 such as oscilloscopes and wavemeters.
  • the cross-circuit box 106 allows the probes 104 to be selectively connected to and disconnected from the function generators 108 and the measurement units 110 of the test system 100 .
  • a controller (not expressly shown) in the test system 100 provides a control signal that controls the connectivity of the cross-circuit box 106 .
  • the probes 104 are strategically placed in order to allow the electrical signals at certain points of interest on the DUT 102 to be probed.
  • the first probe PID 1 is placed at the input of Func2 in order to allow electrical signal “a” to be probed.
  • the second probe Pill 2 is placed at the input of Func1 in order to allow electrical signal “b” to be probed.
  • the fifth probe PID 5, however, is placed at the output of Func1 in order to allow electrical signal “d” to be probed.
  • the various functions i.e., Func 1-3
  • Some functions may have one or more internal and/or sub-functions therein that may also be probed.
  • Func3 has a sub-function “f” included therein that may be probed.
  • the bi-directional probe of the present invention allows certain variables of interest in the software to be probed.
  • connection point of each probe 104 to the DUT is analogous to a typical wired pair connection, shown in the dashed circle indicated by 112 .
  • one wire 114 of the wired pair 112 leads from the DUT 102 to the cross-circuit box 106
  • the other wire 116 of the wired pair 112 leads from the cross-circuit box 106 back to the DUT 102 .
  • the connection point of each probe 104 to the cross-circuit box 106 is analogous to a pair of switches, shown in the dashed circle indicated by 118 .
  • the inbound switch, indicated at 120 selectively connects the incoming wire 114 of a probe 104 to the tester system 100 (e.g., to a measurement unit).
  • the outbound switch selectively connects the return wire 116 of a probe 104 to either the incoming wire 114 (e.g., for normal operation) or to the tester system 100 (e.g., to a function generator).
  • the various modes of operation of the switches will be described in more detail below.
  • FIGS. 2A-2D the basic operating modes of the switches that connect the probes to the cross-circuit box are shown. These operating modes graphically illustrate the functional capability of the software probe of the present invention.
  • the inbound switch 120 and the outbound switch 122 are both disconnected from the cross-circuit box 106 and are connected to each other instead. This is the normal operating mode where data is neither flowing from the DUT 102 into the test system 100 or from the test system 100 into the DUT 102 .
  • the second operating mode shown in FIG.
  • the inbound switch 120 connects the DUT 102 to the test system 100 while the outbound switch 122 is still connected to the inbound switch 120 (i.e., disconnected from the test system).
  • This operating mode is used in order to obtain data from the DUT 102 for monitoring purposes.
  • the outbound switch 122 is connected to the test system 100 , while the inbound switch 120 is disconnected from the test system 100 .
  • This operating mode is used for injecting data from the test system 100 into the DUT 102 for testing purposes.
  • both the inbound switch 120 and the outbound switch 122 are connected to the test system 100 .
  • This operating mode is used to obtain data from the DUT 102 for monitoring purposes as well as for inserting data into the DUT 102 for testing purposes.
  • the bi-directional probe of the present invention may be used to obtain data from the variables and arguments of a software program under test, input data into these variables and arguments, or both.
  • Example 1 An exemplary block of programming code containing bi-directional probe instructions according to embodiments of the invention is shown in Example 1 below.
  • the block of programming code is written in pseudocode and not in any particular programming language in order to emphasize the generic nature and applicability of the bi-directional probe.
  • Func 0 is the code under test and is analogous to the DUT 102 of FIG. 1 .
  • the “probe” instructions are analogous to the hardware probes PID 1-5 of FIG. 1 , and typically include a probe ID as well as an indication of the variable or argument to be probed as arguments.
  • “probe(1,c)” refers to the first probe PID 1, and affects the address location corresponding to the variable “c” in the code under test.
  • the probe instruction “probe(1,c)” allows the variable “c” in the block of programming code to be monitored and changed as needed.
  • the probe instruction “probe(4,a)” allows the variable “a” to be monitored and changed as needed, and so on.
  • Func3 has a sub-function “f”, the inputs to which are variables “a”-“d” and the output from which is variable “e”′, corresponding to variables “a”-“d” and “h”, respectively, of Func0.
  • Sub-functions may also be probed using the bi-directional probing technique of the present invention.
  • the software By adding the probe instructions to the code under test, the software is observable and therefore testable. Any type of variable (e.g., automatic (temporarily stored on the stack), global, static, etc.) or any stored data may be probed so long as it is in the address space of the probe, as indicated by the variable in the probe instruction. It is also possible to probe function arguments using the bi-directional probe of the present invention. Probing the variables and function arguments makes it possible to further test the functionality of the software. Specifically, probing the variables and arguments of a function allows additional tests and test vectors to be developed based on the data obtained.
  • Any type of variable e.g., automatic (temporarily stored on the stack), global, static, etc.
  • any stored data may be probed so long as it is in the address space of the probe, as indicated by the variable in the probe instruction.
  • Example 2 An exemplary C-code version of the probe instructions can be seen in the block of source code shown in Example 2 below. This example is provided to illustrate what an actual block of source code using embodiments of the invention might look like.
  • FIG. 3 shows an exemplary test system 300 for implementing the bidirectional probing technique.
  • the test system 300 includes a tester 302 and a device under test 304 that are in communication with each other.
  • the tester 302 is a typical computer that has a number of functional components, including a CPU 306 , an input/output interface unit 308 , and a storage unit 310 . These components are well known to people of ordinary skill in the computer art and will therefore be described only briefly here.
  • the CPU 306 handles the execution of all software programs on the tester 302 , including the operating system and any software running thereon.
  • the interface unit 308 serves to interface the tester 302 to the device under test 304 , as well as any input/output devices (e.g., keyboard, mouse, display unit, printer, etc.) connected thereto.
  • the storage unit 310 provides temporary storage (e.g., RAM) and/or long-term storage (e.g., hard drive) for any software programs and/or data that may be needed for the execution of the operating system and the software running on the tester 302 .
  • the software development tool 312 Stored in the storage unit 310 are a number of software applications, including a software development tool 312 .
  • the software development tool 312 operates in the same way and has many of the same features as existing software development tools such as Code Composer StudioTM from Texas Instruments and LabVIEWTM from National Instruments, or other similar software development tools.
  • the software development tool 312 further includes a probe control and analysis module 314 .
  • the probe control and analysis module 314 is capable of controlling the bi-directional probing of any software being tested using the software development tool 312 , and analyzing the data being probed.
  • the probe control and analysis module 314 allows data to be captured from the code under test, injected into the code under test, or both, as determined by a user.
  • the probe control and analysis module 314 also allows the user to generate test vectors based on the data obtained and to inject the test vectors back into the code under test. This makes it easier and more convenient for the user to monitor and test the operation and reliability of the code under test.
  • the code under test is executed on a separate unit, namely the device under test 304 , that is in communication with the tester 302 .
  • the device under test 304 like the tester 302 , is a typical computer that has a number of functional components, including a CPU 316 , an input/output interface unit 318 , and a storage unit 320 .
  • the components of the device under test 304 are similar in function to their counterparts in the tester 302 and will therefore not be described here.
  • the main point is that the code under test 322 , including the probed source code and the bi-directional probe instructions and implementation is stored and executed separately from the tester 302 . (See the exemplary blocks of source code above for examples of probe instructions.)
  • FIG. 4 illustrates an example of such a test system 400 .
  • the integrated test system 400 has a number of functional components, including a CPU 402 , an input/output interface 404 , and a storage unit 406 . These components are similar to their counterparts described with respect to FIG. 3 , except that the storage unit 406 has both a software development tool 408 and a code under test 410 stored thereon.
  • the test system 400 preferably has sufficient storage and processing capacity to execute both the software development tool 408 and the code under test 410 at the same time (i.e., multitasking).
  • the software development tool 408 is essentially the same as the software development tool 312 described above, including a probe control and analysis module (not expressly shown).
  • the code under test 410 is essentially the same as the code under test 322 described above, including the probed source code and probe instructions and implementation.
  • a bi-directional probe instruction is illustrated in the exemplary method 500 of FIG. 5 , according to embodiments of the invention.
  • Such a method 500 is usually implemented on the device under test that is executing the code under test, or an integrated tester system in a multitasking environment.
  • a block of source code that includes one or more probe instructions is in the process of being executed.
  • step 501 one of the probe instructions is encountered.
  • step 502 a determination is made as to whether the probe has been set in the probe mode.
  • the particular mode is usually set by a user via the tester from the software development tool 312 , either as a preprogrammed command or manually, or a combination of both.
  • the method 500 continues to the fourth step 504 , where a determination is made as to whether the probe has been set in inject mode. If the answer is yes, then at the fifth step 505 , the data in the memory or storage area indicated by the probe instruction is revised and/or replaced with new data received from test system using, for example, a simple memory copy. If no, then the method 500 continues with execution of the rest of the code under test.
  • the method 500 described above is a simplified implementation of the probe instruction.
  • the type of the data as well as its size are verified. It is also possible to probe more complicated to variables such as arrays and even variables that are not stored in a continuous structure. In this manner, many types of data may be captured from, as well as inserted into, the software while it is being tested.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)
  • Tests Of Electronic Circuits (AREA)
  • Test And Diagnosis Of Digital Computers (AREA)
  • Executing Machine-Instructions (AREA)
  • Soundproofing, Sound Blocking, And Sound Damping (AREA)
  • Electrophonic Musical Instruments (AREA)
  • Saccharide Compounds (AREA)

Abstract

Method and system are disclosed for bi-directional probing of software. The bidirectional probe is capable of transferring data to and from a software under test. This two-way transfer of data allows the variables and arguments in the software to not only be monitored, but also changed as needed. Test vectors may be developed and inserted into the software while running for testing purposes. Regression analysis may be made easier by using data from previous iterations as input for the next iterations.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation application which claims the benefit of U.S. patent application Ser. No. 10/428,733 filed on May 1, 2003, which claims the benefit of U.S. Provisional Patent Application No. 60/412,834 filed on Sep. 23, 2002, the disclosure of which is fully incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The invention is related to testing of software and, in particular, to a method for bidirectional probing of software.
  • 2. Description of the Related Art
  • Among developers of software, one of the most important requirements is for the software to be reliable. Reliability refers to the ability of a software to operate without failure for a specified amount of time in a specified environment. To ensure a sufficiently high level of reliability, software must be thoroughly tested and debugged prior to release. Usually, the entire software program as a whole is tested, as well as the individual functional components (e.g., function calls, subroutines) that make up the software program. Typically, test vectors are generated containing a series of values for the variables that are required by the software and/or one or more functional components thereof. The variable values are chosen to represent various types of usage conditions and environments in which the software is intended to be run. The test vectors are then applied to the software and/or the one or more functional components thereof, and the variable values are observed and recorded.
  • One type of testing that is often performed is called regression analysis, or sometimes verification testing. Regression analysis involves the selective retesting of a software that has been modified in order to fix known problems. The selective retesting is performed in order to ensure that the identified problems have been fixed, and that no other previously working functional components have failed as a result of the reparations. This type of testing is basically a quality control measure to ensure that the modified code still complies with its specified requirements and that any unmodified code has not been affected by the maintenance activity.
  • An important feature in regression analysis specifically and in software testing in general is the ability to observe the variable values resulting from the test vectors. Early attempts to observe the variable values of a software and/or the functional components thereof involved manually setting break points and other traps in the source code itself. More recently, software development tools such as Code Composer Studio™ from Texas Instruments and LabVIEW™ from National Instruments include software probes that may be inserted into the code under test. The software probes allow the variables in the code under test to be observed in real-time as the software is executed. These latter solutions, however, are based only on getting the variable values out from the code under test (e.g., so they can be analyzed). They do not allow the variable values to be changed during the execution of the software. In other words, presently existing software probes are only one-way or unidirectional probes in that the data is allowed to flow only from the code under test to the test system. They do not allow the direction of data transfer to be reversed so that data flows from the test system into the code under test.
  • Accordingly, it would be desirable to provide a way to probe software in a manner such that data may be transferred both out of as well as into the code under test.
  • SUMMARY OF THE INVENTION
  • Briefly, the present invention is directed to bi-directional probing of software. The bi-directional probe of the present invention is capable of transferring data to and from a software under test. This two-way transfer of data allows the variables in the software to not only be monitored, but also changed as needed. Test vectors may be developed and injected into the software while running for testing purposes. Regression analysis is made easier by using data from previous iterations as input for the next iterations.
  • In general, in one embodiment, the invention is directed to a method of testing software having a plurality of data variables and function arguments therein. The method comprises executing the software, identifying an address location for at least one of the variables or arguments used by the software, and outputting any data stored in the address location to a test system to thereby monitor the data. Data from the test system is then inputted into the address location to thereby replace any data previously stored in the address location. In general, in another embodiment, the invention is directed to an apparatus for testing software having a plurality of data variables and function arguments therein. The apparatus comprises a central processing unit, and a storage unit connected to the central processing unit. The storage unit stores computer readable instructions for instructing the central processing unit to execute the software, identify an address location for at least one of the variables or arguments used by the software, output any data stored in the address location to the central processing unit to thereby monitor the data, and input data from the central processing unit into the address location to thereby replace any data previously stored in the address location.
  • In general, in yet another embodiment, the invention is directed to a system for testing software having a plurality of data variables and function arguments therein. The system comprises a device under test configured to execute the software including one or more probe instructions in the software, and a tester connected to the device under test. The tester is configured to control the device under test so that when a probe instruction is executed, the device under test: will identify an address location for at least one of the variables or arguments used by the software; output any data stored in the address location to the tester; and input data received from the tester into the address location.
  • It should be emphasized that the term comprises/comprising, when used in this specification, is taken to specify the presence of stated features, integers, steps, or components, but does not preclude the presence or addition of one or more other features, integers, steps, components, or groups thereof.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • A better understanding of the invention may be had by reference to the following detailed description when taken in conjunction with the accompanying drawings, wherein:
  • FIG. 1 illustrates an exemplary software testing environment according to embodiments of the invention using analogous hardware components;
  • FIGS. 2A-2D illustrates exemplary operating modes of the bi-directional software probe according to embodiments of the invention using analogous hardware components;
  • FIG. 3 illustrates an exemplary system in which the bi-directional software probe according to embodiments of the invention may be implemented;
  • FIG. 4 illustrates another exemplary system in which the bi-directional software probe according to embodiments of the invention may be implemented; and
  • FIG. 5 illustrates an exemplary method of implementing the bi-directional software probe according to embodiments of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Following is a detailed description of the invention with reference to the drawings wherein reference numerals for the same and similar elements are carried forward.
  • Embodiments of the invention provide a method and system for testing software using bi-directional probes. The bi-directional probes of the invention may be inserted into the program code at essentially any location. The probes allow data to be captured from as well as injected into the software. Specifically, the probes allow the values of the variables in the software to be monitored, changed and inserted back into the software during execution. The software is then further executed with the changed values. The bi-directional probes of the invention may be implemented as a feature or a function in a software development tool such as Code Composer Studio™ from Texas Instruments and LabVIEW™ from National Instruments, or other similar software development environments.
  • The bi-directional software probing technique of the present invention is somewhat analogous to the testing of a hardware circuit board. Therefore, the invention will be described initially in terms of a test system for a hardware circuit board. This description is provided for illustrative purposes only, however, as the invention is actually directed to the probing of software.
  • FIG. 1 illustrates a hardware test system 100 that is analogous to the software testing tool in which the bi-directional probing technique of the present invention may be used. The hardware test system 100 is connected to a device under test (DUT) 102 via a plurality of hardware probes, one of which is indicated at 104. Each hardware probe 104 may be identified by its probe ID. For example, the first probe is PID 1, the second probe is PID 2, the third probe is PID 3, and so on. The probes 104 are connected to one side of a cross-circuit box 106, the other side of which is connected to one or more function generators 108, such as waveform generators, and one or more measurement units 110, such as oscilloscopes and wavemeters. The cross-circuit box 106 allows the probes 104 to be selectively connected to and disconnected from the function generators 108 and the measurement units 110 of the test system 100. A controller (not expressly shown) in the test system 100 provides a control signal that controls the connectivity of the cross-circuit box 106.
  • As can be seen, the probes 104 are strategically placed in order to allow the electrical signals at certain points of interest on the DUT 102 to be probed. For example, the first probe PID 1 is placed at the input of Func2 in order to allow electrical signal “a” to be probed. Likewise, the second probe Pill 2 is placed at the input of Func1 in order to allow electrical signal “b” to be probed. The fifth probe PID 5, however, is placed at the output of Func1 in order to allow electrical signal “d” to be probed. The various functions (i.e., Func 1-3) may be any function that can be performed by the DUT (e.g., adding, subtracting, averaging, etc.). Some functions may have one or more internal and/or sub-functions therein that may also be probed. For example, Func3 has a sub-function “f” included therein that may be probed. In a manner similar to that described, the bi-directional probe of the present invention allows certain variables of interest in the software to be probed.
  • The connection point of each probe 104 to the DUT is analogous to a typical wired pair connection, shown in the dashed circle indicated by 112. As can be seen, one wire 114 of the wired pair 112 leads from the DUT 102 to the cross-circuit box 106, while the other wire 116 of the wired pair 112 leads from the cross-circuit box 106 back to the DUT 102. Similarly, the connection point of each probe 104 to the cross-circuit box 106 is analogous to a pair of switches, shown in the dashed circle indicated by 118. The inbound switch, indicated at 120, selectively connects the incoming wire 114 of a probe 104 to the tester system 100 (e.g., to a measurement unit). The outbound switch, indicated at 122, selectively connects the return wire 116 of a probe 104 to either the incoming wire 114 (e.g., for normal operation) or to the tester system 100 (e.g., to a function generator). The various modes of operation of the switches will be described in more detail below.
  • Referring now to FIGS. 2A-2D, the basic operating modes of the switches that connect the probes to the cross-circuit box are shown. These operating modes graphically illustrate the functional capability of the software probe of the present invention. In the first operating mode, shown in FIG. 2A, the inbound switch 120 and the outbound switch 122 are both disconnected from the cross-circuit box 106 and are connected to each other instead. This is the normal operating mode where data is neither flowing from the DUT 102 into the test system 100 or from the test system 100 into the DUT 102. In the second operating mode, shown in FIG. 2B, the inbound switch 120 connects the DUT 102 to the test system 100 while the outbound switch 122 is still connected to the inbound switch 120 (i.e., disconnected from the test system). This operating mode is used in order to obtain data from the DUT 102 for monitoring purposes. In the third operating mode, shown in FIG. 2C, the outbound switch 122 is connected to the test system 100, while the inbound switch 120 is disconnected from the test system 100. This operating mode is used for injecting data from the test system 100 into the DUT 102 for testing purposes. In the fourth operating mode, shown in FIG. 2D, both the inbound switch 120 and the outbound switch 122 are connected to the test system 100. This operating mode is used to obtain data from the DUT 102 for monitoring purposes as well as for inserting data into the DUT 102 for testing purposes. In a similar manner, the bi-directional probe of the present invention may be used to obtain data from the variables and arguments of a software program under test, input data into these variables and arguments, or both.
  • An exemplary block of programming code containing bi-directional probe instructions according to embodiments of the invention is shown in Example 1 below. As can be seen, the block of programming code is written in pseudocode and not in any particular programming language in order to emphasize the generic nature and applicability of the bi-directional probe. In the example, Func0 is the code under test and is analogous to the DUT 102 of FIG. 1. The “probe” instructions are analogous to the hardware probes PID 1-5 of FIG. 1, and typically include a probe ID as well as an indication of the variable or argument to be probed as arguments. For example, “probe(1,c)” refers to the first probe PID 1, and affects the address location corresponding to the variable “c” in the code under test. Thus, the probe instruction “probe(1,c)” allows the variable “c” in the block of programming code to be monitored and changed as needed. Likewise, the probe instruction “probe(4,a)” allows the variable “a” to be monitored and changed as needed, and so on.
  • Example 1
  • Func0(a,b,c)
    {
    probe(1,c)
    probe(2,b)
    probe(4,a)
    d = funcl(b)
    probe(5,d)
    probe(3,g)
    e,f= func2(c,g)
    probe(6,e)
    h,g = func3(a,d,e,f)
    probe(11,h)
    return h
    }
    func3(a′,b′,c′,d′)
    {
    e' = f′(a′,b′,c′,d′)
    probe(8,e′)
    return e′
    }
  • Note that Func3 has a sub-function “f”, the inputs to which are variables “a”-“d” and the output from which is variable “e”′, corresponding to variables “a”-“d” and “h”, respectively, of Func0. Sub-functions may also be probed using the bi-directional probing technique of the present invention.
  • By adding the probe instructions to the code under test, the software is observable and therefore testable. Any type of variable (e.g., automatic (temporarily stored on the stack), global, static, etc.) or any stored data may be probed so long as it is in the address space of the probe, as indicated by the variable in the probe instruction. It is also possible to probe function arguments using the bi-directional probe of the present invention. Probing the variables and function arguments makes it possible to further test the functionality of the software. Specifically, probing the variables and arguments of a function allows additional tests and test vectors to be developed based on the data obtained.
  • An exemplary C-code version of the probe instructions can be seen in the block of source code shown in Example 2 below. This example is provided to illustrate what an actual block of source code using embodiments of the invention might look like.
  • Example 2
  • // Calculates b * b + a
    int func0(int a, int b)
    {
    int d; int e; // a reference to the variable is needed
    probe(2, &b); // so that the value could be changed
    d = func1(b); // this is the
    e = d + a; // functionality of func 0
    probe(7, &e);
    return e;
    }
    int func1(int arg0)
    {
    int res;
    res = arg0 * arg0; //this is the functionality of func 1
    probe(8, &res);
    return res;
    }
  • The bi-directional probing technique of the present invention may be implemented in any test system. FIG. 3 shows an exemplary test system 300 for implementing the bidirectional probing technique. The test system 300 includes a tester 302 and a device under test 304 that are in communication with each other. The tester 302 is a typical computer that has a number of functional components, including a CPU 306, an input/output interface unit 308, and a storage unit 310. These components are well known to people of ordinary skill in the computer art and will therefore be described only briefly here. The CPU 306 handles the execution of all software programs on the tester 302, including the operating system and any software running thereon. The interface unit 308 serves to interface the tester 302 to the device under test 304, as well as any input/output devices (e.g., keyboard, mouse, display unit, printer, etc.) connected thereto. The storage unit 310 provides temporary storage (e.g., RAM) and/or long-term storage (e.g., hard drive) for any software programs and/or data that may be needed for the execution of the operating system and the software running on the tester 302.
  • Stored in the storage unit 310 are a number of software applications, including a software development tool 312. The software development tool 312 operates in the same way and has many of the same features as existing software development tools such as Code Composer Studio™ from Texas Instruments and LabVIEW™ from National Instruments, or other similar software development tools. In accordance with embodiments of the invention, however, the software development tool 312 further includes a probe control and analysis module 314. The probe control and analysis module 314 is capable of controlling the bi-directional probing of any software being tested using the software development tool 312, and analyzing the data being probed. Specifically, the probe control and analysis module 314 allows data to be captured from the code under test, injected into the code under test, or both, as determined by a user. The probe control and analysis module 314 also allows the user to generate test vectors based on the data obtained and to inject the test vectors back into the code under test. This makes it easier and more convenient for the user to monitor and test the operation and reliability of the code under test.
  • In the present embodiment, the code under test, including the bi-directional probe instructions, is executed on a separate unit, namely the device under test 304, that is in communication with the tester 302. The device under test 304, like the tester 302, is a typical computer that has a number of functional components, including a CPU 316, an input/output interface unit 318, and a storage unit 320. The components of the device under test 304 are similar in function to their counterparts in the tester 302 and will therefore not be described here. The main point is that the code under test 322, including the probed source code and the bi-directional probe instructions and implementation is stored and executed separately from the tester 302. (See the exemplary blocks of source code above for examples of probe instructions.)
  • In some embodiments, however, the tester and the device under test are implemented as a single, integrated test system that performs both functions. FIG. 4 illustrates an example of such a test system 400. The integrated test system 400 has a number of functional components, including a CPU 402, an input/output interface 404, and a storage unit 406. These components are similar to their counterparts described with respect to FIG. 3, except that the storage unit 406 has both a software development tool 408 and a code under test 410 stored thereon. Thus, the test system 400 preferably has sufficient storage and processing capacity to execute both the software development tool 408 and the code under test 410 at the same time (i.e., multitasking). The software development tool 408 is essentially the same as the software development tool 312 described above, including a probe control and analysis module (not expressly shown). Likewise, the code under test 410 is essentially the same as the code under test 322 described above, including the probed source code and probe instructions and implementation.
  • Execution of a bi-directional probe instruction is illustrated in the exemplary method 500 of FIG. 5, according to embodiments of the invention. Such a method 500 is usually implemented on the device under test that is executing the code under test, or an integrated tester system in a multitasking environment. In the method 500, a block of source code that includes one or more probe instructions is in the process of being executed. At a certain point during the execution of the code, step 501, one of the probe instructions is encountered. At the next step, step 502, a determination is made as to whether the probe has been set in the probe mode. The particular mode is usually set by a user via the tester from the software development tool 312, either as a preprogrammed command or manually, or a combination of both. If the answer is yes, then at the third step 503, the data within the memory or storage area indicated by the probe instruction is transmitted to the test system where it can be monitored and analyzed as needed. If no, then the method 500 continues to the fourth step 504, where a determination is made as to whether the probe has been set in inject mode. If the answer is yes, then at the fifth step 505, the data in the memory or storage area indicated by the probe instruction is revised and/or replaced with new data received from test system using, for example, a simple memory copy. If no, then the method 500 continues with execution of the rest of the code under test.
  • Note that the method 500 described above is a simplified implementation of the probe instruction. In some embodiments, in addition to determining the probing mode, the type of the data as well as its size are verified. It is also possible to probe more complicated to variables such as arrays and even variables that are not stored in a continuous structure. In this manner, many types of data may be captured from, as well as inserted into, the software while it is being tested.
  • While particular embodiments and applications of the present invention have been illustrated and described, it is to be understood that the invention is not limited to the precise construction and compositions disclosed herein, and that modifications and variations may be made to the foregoing without departing from the scope of the invention as defined in the appended claims.

Claims (22)

1. A method of testing software having a plurality of data variables and function arguments therein, comprising:
executing the software;
identifying an address location for at least one of the variables or arguments used by the software;
outputting any data stored in the address location to a test system to thereby monitor the data; and
inputting data from the test system into the address location to thereby replace any data previously stored in the address location.
2. The method according to claim 1, wherein the data inputted into the address location is a revised version of the data outputted from the address location.
3. The method according to claim 1, wherein the data inputted into the address location is the same as the data outputted from the address location.
4. The method according to claim 1, wherein the data inputted into the address location is generated based on the data outputted from the address location during a previous iteration.
5. The method according to claim 1, wherein the data inputted into the address location comprises a test vector of data generated based on data outputted from the address location during a previous iteration.
6. The method according to claim 1, wherein the address location identifies a storage location in a computer memory.
7. The method according to claim 1, wherein the address location identifies a storage location in a hard drive.
8. An apparatus for testing software having a plurality of data variables and function arguments therein, comprising:
a central processing unit;
a storage unit connected to the central processing unit, the storage unit storing computer readable instructions for instructing the central processing unit to:
execute the software;
identify an address location for at least one of the variables or arguments used by the software;
output any data stored m the address location to the central processing unit to thereby monitor the data; and
input data from the central processing unit into the address location to thereby replace any data previously stored in the address location.
9. The apparatus according to claim 8, wherein the data inputted into the address location is a revised version of the data outputted from the address location.
10. The apparatus according to claim 8, wherein the data inputted into the address location is the same as the data outputted from the address location.
11. The apparatus according to claim 8, wherein the data inputted into the address location is generated based on data outputted from the address location during a previous iteration.
12. The apparatus according to claim 8, wherein the data inputted into the storage area comprises a test vector of data generated based on data outputted from the address location during a previous iteration.
13. The apparatus according to claim 8, wherein the address location identifies a storage location in a computer memory.
14. The apparatus according to claim 8, wherein the address location identifies a storage location in a hard drive.
15. A system for testing software having a plurality of data variables and function arguments therein, comprising:
a device under test configured to execute the software including one or more probe instructions in the software;
a tester connected to the device under test, the tester configured to control the device under test so that when a probe instruction is executed, the device under test will:
identify an address location for at least one of the variables or arguments used by the software;
output any data stored in the address location to the tester; and
input data received from the tester into the address location.
16. The system according to claim 15, wherein the data inputted into the address location is a revised version of the data outputted from the address location.
17. The system according to claim 15, wherein the data inputted into the address location is the same as the data outputted from the address location.
18. The system according to claim 15, wherein the data inputted into the address location is generated based on data outputted from the address location during a previous iteration.
19. The system according to claim 15, wherein the data inputted into the storage area comprises a test vector of data generated based on data outputted from the address location during a previous iteration.
20. The system according to claim 15, wherein the address location identifies a storage location in a computer memory.
21. The system according to claim 15, wherein the address location identifies a storage location in a hard drive.
22. The system according to claim 15, wherein the tester and the device under test reside in a single unit.
US13/180,794 2002-09-23 2011-07-12 Bi-directional probing of software Abandoned US20110271256A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/180,794 US20110271256A1 (en) 2002-09-23 2011-07-12 Bi-directional probing of software

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US41283402P 2002-09-23 2002-09-23
US10/428,733 US8020148B2 (en) 2002-09-23 2003-05-01 Bi-directional probing and testing of software
US13/180,794 US20110271256A1 (en) 2002-09-23 2011-07-12 Bi-directional probing of software

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/428,733 Continuation US8020148B2 (en) 2002-09-23 2003-05-01 Bi-directional probing and testing of software

Publications (1)

Publication Number Publication Date
US20110271256A1 true US20110271256A1 (en) 2011-11-03

Family

ID=31998143

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/428,733 Active 2025-03-17 US8020148B2 (en) 2002-09-23 2003-05-01 Bi-directional probing and testing of software
US13/180,794 Abandoned US20110271256A1 (en) 2002-09-23 2011-07-12 Bi-directional probing of software

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/428,733 Active 2025-03-17 US8020148B2 (en) 2002-09-23 2003-05-01 Bi-directional probing and testing of software

Country Status (9)

Country Link
US (2) US8020148B2 (en)
EP (1) EP1576477B1 (en)
JP (1) JP4959941B2 (en)
KR (1) KR100976371B1 (en)
CN (1) CN1701305B (en)
AT (1) ATE325383T1 (en)
AU (1) AU2003267394A1 (en)
DE (1) DE60305073T2 (en)
WO (1) WO2004027623A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455421A (en) * 2013-08-19 2013-12-18 西安交通大学 Regression testing case generation method based on program control dependence guide
JP2017538996A (en) * 2014-11-05 2017-12-28 アビニシオ テクノロジー エルエルシー Application testing
US10936289B2 (en) 2016-06-03 2021-03-02 Ab Initio Technology Llc Format-specific data processing operations

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6823478B1 (en) * 2000-09-12 2004-11-23 Microsoft Corporation System and method for automating the testing of software processing environment changes
US7350194B1 (en) * 2001-09-24 2008-03-25 Oracle Corporation Techniques for debugging computer programs involving multiple computing machines
US7793271B2 (en) * 2004-06-17 2010-09-07 State Of Oregon Acting By And Through The State Board Of Higher Education On Behalf Of Portland State University Bi-directional product development process simulation
US20060130048A1 (en) * 2004-12-13 2006-06-15 Ebay Inc. Shared schema for software user interface designers and developers
US7568186B2 (en) * 2005-06-07 2009-07-28 International Business Machines Corporation Employing a mirror probe handler for seamless access to arguments of a probed function
US20070074175A1 (en) * 2005-09-23 2007-03-29 Telefonaktiebolaget L M Ericsson (Publ) Method and system for dynamic probes for injection and extraction of data for test and monitoring of software
CN100388195C (en) * 2006-02-22 2008-05-14 北京金山软件有限公司 Method and system for acquiring function parameter on 64-bit windows operating system
US8359585B1 (en) * 2007-01-18 2013-01-22 Advanced Testing Technologies, Inc. Instrumentation ATS/TPS mitigation utilizing I/O data stream
EP1962194A1 (en) * 2007-02-23 2008-08-27 Telefonaktiebolaget LM Ericsson (publ) A method and a system for dynamic probe authentication for test and monitoring of software
US8500730B2 (en) * 2007-11-16 2013-08-06 Biosense Webster, Inc. Catheter with omni-directional optical tip having isolated optical paths
US8413120B2 (en) * 2008-10-27 2013-04-02 Advanced Micro Devices, Inc. Method and system for thread monitoring
CN102023923B (en) * 2010-12-28 2014-07-02 北京邮电大学 Software test method based on alias analysis technology
GB2507048A (en) * 2012-10-16 2014-04-23 Bae Systems Plc System testing algorithm and apparatus
US9021428B2 (en) * 2013-05-29 2015-04-28 Microsoft Technology Licensing, Llc Troubleshooting visuals and transient expressions in executing applications

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5604895A (en) * 1994-02-22 1997-02-18 Motorola Inc. Method and apparatus for inserting computer code into a high level language (HLL) software model of an electrical circuit to monitor test coverage of the software model when exposed to test inputs
US6223134B1 (en) * 1998-03-20 2001-04-24 National Instruments Corporation Instrumentation system and method including an improved driver software architecture
US6412106B1 (en) * 1999-06-16 2002-06-25 Intervoice Limited Partnership Graphical system and method for debugging computer programs
US20040044993A1 (en) * 2002-09-03 2004-03-04 Horst Muller Testing versions of applications
US7539591B2 (en) * 2001-08-24 2009-05-26 Vi Technology, Inc. Enterprise test data management system utilizing hierarchical test data models and related methods

Family Cites Families (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5191646A (en) * 1986-11-20 1993-03-02 Hitachi, Ltd. Display method in software development support system
US5581695A (en) * 1990-05-09 1996-12-03 Applied Microsystems Corporation Source-level run-time software code debugging instrument
US5604841A (en) * 1990-07-06 1997-02-18 United Technologies Corporation Hierarchical restructuring generic test templates and reusable value spaces for machine failure isolation using qualitative physics
US5202955A (en) * 1990-07-06 1993-04-13 United Technologies Corporation Dynamic assumption ordering for qualitative physics
US5317740A (en) * 1991-03-07 1994-05-31 Digital Equipment Corporation Alternate and iterative analysis of computer programs for locating translatable code by resolving callbacks and other conflicting mutual dependencies
DE69231873T2 (en) * 1992-01-08 2002-04-04 Emc Corp., Hopkinton Method for synchronizing reserved areas in a redundant memory arrangement
JPH0756729A (en) 1993-08-10 1995-03-03 Pfu Ltd Program debugging system
EP0690378A1 (en) * 1994-06-30 1996-01-03 Tandem Computers Incorporated Tool and method for diagnosing and correcting errors in a computer programm
US5634127A (en) * 1994-11-30 1997-05-27 International Business Machines Corporation Methods and apparatus for implementing a message driven processor in a client-server environment
US6324683B1 (en) * 1996-02-23 2001-11-27 International Business Machines Corporation System, method and program for debugging external programs in client/server-based relational database management systems
GB9622684D0 (en) * 1996-10-31 1997-01-08 Sgs Thomson Microelectronics An integrated circuit device and method of communication therwith
US6202199B1 (en) * 1997-07-31 2001-03-13 Mutek Solutions, Ltd. System and method for remotely analyzing the execution of computer programs
US6282701B1 (en) * 1997-07-31 2001-08-28 Mutek Solutions, Ltd. System and method for monitoring and analyzing the execution of computer programs
US6212650B1 (en) * 1997-11-24 2001-04-03 Xilinx, Inc. Interactive dubug tool for programmable circuits
US7152027B2 (en) * 1998-02-17 2006-12-19 National Instruments Corporation Reconfigurable test system
SE9801678L (en) * 1998-05-13 1999-11-14 Axis Ab Computer chip and computer device with improved debugging ability
EP0992906B1 (en) * 1998-10-06 2005-08-03 Texas Instruments Inc. Apparatus and method for software breakpoint in a delay slot
US6934934B1 (en) * 1999-08-30 2005-08-23 Empirix Inc. Method and system for software object testing
US6405364B1 (en) * 1999-08-31 2002-06-11 Accenture Llp Building techniques in a development architecture framework
JP2001147830A (en) * 1999-11-19 2001-05-29 Nec Microcomputer Technology Ltd Method for changing state of real time os
US6304972B1 (en) * 2000-01-03 2001-10-16 Massachusetts Institute Of Technology Secure software system and related techniques
FR2820222B1 (en) * 2001-01-26 2003-03-21 Schneider Automation METHOD FOR PROGRAMMING AN AUTOMATION APPLICATION
US7917895B2 (en) * 2001-07-27 2011-03-29 Smartesoft, Inc. Automated software testing and validation system
US7107578B1 (en) * 2001-09-24 2006-09-12 Oracle International Corporation Techniques for debugging computer programs involving multiple programming languages
US7047519B2 (en) * 2001-09-26 2006-05-16 International Business Machines Corporation Dynamic setting of breakpoint count attributes
US7134115B2 (en) * 2002-02-07 2006-11-07 Matsushita Electric Industrial Co., Ltd. Apparatus, method, and program for breakpoint setting
JP3764405B2 (en) * 2002-05-27 2006-04-05 株式会社東芝 Debugging apparatus and debugging method
US7219333B2 (en) * 2002-11-22 2007-05-15 Texas Instruments Incorporated Maintaining coherent synchronization between data streams on detection of overflow
US7111281B2 (en) * 2002-12-26 2006-09-19 International Business Machines Corporation Method, system, and article of manufacture for debugging utilizing screen pattern recognition and breakpoints
US7171653B2 (en) * 2003-06-03 2007-01-30 Hewlett-Packard Development Company, L.P. Systems and methods for providing communication between a debugger and a hardware simulator
US7299456B2 (en) * 2003-09-18 2007-11-20 International Business Machines Corporation Run into function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5604895A (en) * 1994-02-22 1997-02-18 Motorola Inc. Method and apparatus for inserting computer code into a high level language (HLL) software model of an electrical circuit to monitor test coverage of the software model when exposed to test inputs
US6223134B1 (en) * 1998-03-20 2001-04-24 National Instruments Corporation Instrumentation system and method including an improved driver software architecture
US6412106B1 (en) * 1999-06-16 2002-06-25 Intervoice Limited Partnership Graphical system and method for debugging computer programs
US7539591B2 (en) * 2001-08-24 2009-05-26 Vi Technology, Inc. Enterprise test data management system utilizing hierarchical test data models and related methods
US20040044993A1 (en) * 2002-09-03 2004-03-04 Horst Muller Testing versions of applications

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455421A (en) * 2013-08-19 2013-12-18 西安交通大学 Regression testing case generation method based on program control dependence guide
JP2017538996A (en) * 2014-11-05 2017-12-28 アビニシオ テクノロジー エルエルシー Application testing
US10705807B2 (en) 2014-11-05 2020-07-07 Ab Initio Technology Llc Application testing
US10936289B2 (en) 2016-06-03 2021-03-02 Ab Initio Technology Llc Format-specific data processing operations
US11347484B2 (en) 2016-06-03 2022-05-31 Ab Initio Technology Llc Format-specific data processing operations

Also Published As

Publication number Publication date
DE60305073D1 (en) 2006-06-08
CN1701305A (en) 2005-11-23
EP1576477B1 (en) 2006-05-03
AU2003267394A1 (en) 2004-04-08
US20040059962A1 (en) 2004-03-25
WO2004027623A3 (en) 2004-05-13
CN1701305B (en) 2010-05-05
JP2006500695A (en) 2006-01-05
DE60305073T2 (en) 2006-09-28
KR20050073458A (en) 2005-07-13
JP4959941B2 (en) 2012-06-27
KR100976371B1 (en) 2010-08-18
US8020148B2 (en) 2011-09-13
EP1576477A2 (en) 2005-09-21
WO2004027623A2 (en) 2004-04-01
ATE325383T1 (en) 2006-06-15

Similar Documents

Publication Publication Date Title
US20110271256A1 (en) Bi-directional probing of software
US20070074175A1 (en) Method and system for dynamic probes for injection and extraction of data for test and monitoring of software
US4709366A (en) Computer assisted fault isolation in circuit board testing
US7237161B2 (en) Remote integrated circuit testing method and apparatus
US7480826B2 (en) Test executive with external process isolation for user code modules
IES20000160A2 (en) A Method and system for testing microprocessor-based boards in a manufacturing environment
JP2010146592A (en) Test program debug device, semiconductor test device, test program debug method, and test method
US7577876B2 (en) Debug system for data tracking
US20090204849A1 (en) Test system and method which can use tool during debugging
US20060074625A1 (en) Program development suport device, program execution device, compile method and debug method
JP4574894B2 (en) Program debugging device for semiconductor testing
US7254508B2 (en) Site loops
US6718498B2 (en) Method and apparatus for the real time manipulation of a test vector to access the microprocessor state machine information using the integrated debug trigger
Jeon et al. Increasing the testability of object-oriented frameworks with built-in tests
US20070032999A1 (en) System and method for emulating hardware failures and method of testing system software incorporating the same
US20010016923A1 (en) Program execution system for semiconductor testing apparatus
Ribeiro Rocha et al. A strategy to improve component testability without source code
Wong An integrated solution for creating dependable software
Prabhu et al. Analysis of Testing in Software Project Environment
Alessandro et al. A new methodology and tool set to execute software test on real-time safety-critical systems
Schilling et al. The software static analysis reliability toolkit
Kirkland What are we able to do with test data or using LabVIEW to hone in on actual cause of failures
Heckeler et al. State-based coverage analysis and UML-driven equivalence checking for C++ state machines
PHILIP Testing Object Oriented Software
Rogin et al. High-level debugging and exploration

Legal Events

Date Code Title Description
AS Assignment

Owner name: TELEFONAKTIEBOLAGET LM ERICSSON (PUBL), SWEDEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROBERTSSON, PER-OLA;REEL/FRAME:026681/0655

Effective date: 20031014

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION