A Comparative Study of White Box, Black Box and Grey Box Testing Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 6
Abstract
Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the correctness, completeness, security and quality of software products against a specification. Software testing is the process used to measure the quality of developed computer software. It exhibits all mistakes, errors and flaws in the developed software. There are many approaches to software testing, but effective testing of complex product is essentially a process of investigation, not merely a matter of creating and following route procedure. It is not possible to find out all the errors in the program. This fundamental problem in testing thus throws an open question, as to what would be the strategy we should adopt for testing. In our paper, we have described and compared the three most prevalent and commonly used software testing techniques for detecting errors, they are: white box testing, black box testing and grey box testing.
Authors and Affiliations
Mohd Khan, Farmeena Khan
Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development
One of most common aspect with traditional software development is managing requirements. As requirements emerge throughout the software development process and thus are needed to be addressed through proper communicatio...
Active and Reactive Power Control of Wind Turbine based on Doubly Fed Induction Generator using Adaptive Sliding Mode Approach
In this work, a robust Adaptive sliding mode controller (ASMC) is proposed to improve the dynamic performance of the Doubly Fed Induction generator (DFIG) based wind system under variable wind speed conditions. Firstly,...
Improve Traffic Management in the Vehicular Ad Hoc Networks by Combining Ant Colony Algorithm and Fuzzy System
Over the last years, total number of transporter has increased. High traffic leads to serious problems and finding a sensible solution to solve the traffic problem is a significant challenge. Also, the use of the full ca...
B2C E-Commerce Fact-Based Negotiation Using Big Data Analytics and Agent-Based Technologies
The focus of this study is application of intelligent agent in negotiation between buyer and seller in B2C Commerce using big data analytics. The developed model is used to conduct negotiations on behalf of prospective b...
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
The transmission of the encryption voice over IP is challenging. The voice is recorded, eavesdropping, change and theft voice, etc. The voice over IP is encrypted by using Advance Encryption Standard (AES) Algorithm. AES...