SlideShare uma empresa Scribd logo
1 de 161
Baixar para ler offline
felix.dobslaw@miun.se
Boundary Value Testing for Traditional
and ML Software
At Chalmers - WASP, Software Engineering, PhD course - 8/6/2023
Felix Dobslaw
Östersund, Mid Sweden University
Research lead, Software Engineering and Education Group
SEE
felix.dobslaw@miun.se
Felix
● 2007 Bsc in “Informatik” University of Hamburg
● 2009 Msc in Distributed Systems MIUN (Sundsvall)
● 2005 – 2009 Prolifics/IBM software dev (Hamburg/Remote)
● 2012 Lic. in Computational Intelligence, MIUN
● 2015 Dr. in Wireless Sensor Networks, MIUN
● 2016 → Tenure in Computer Sciences, MIUN (Östersund)
● 2016 → Entrepeneurship, ride-sharing, online ratings, ...
● 2019-2021 PostDoc in Software Engineering, Chalmers (Gothenburg)
● 2022-now research-lead in Software Engineering at MIUN (Östersund)
felix.dobslaw@miun.se
Felix
● 2007 Bsc in “Informatik” University of Hamburg
● 2009 Msc in Distributed Systems MIUN (Sundsvall)
● 2005 – 2009 Prolifics/IBM software dev (Hamburg/Remote)
● 2012 Lic. in Computational Intelligence, MIUN
● 2015 Dr. in Wireless Sensor Networks, MIUN
● 2016 → Tenure in Computer Sciences, MIUN (Östersund)
● 2016 → Entrepeneurship, ride-sharing, online ratings, ...
● 2019-2021 PostDoc in Software Engineering, Chalmers (Gothenburg)
● 2022-now research-lead in Software Engineering at MIUN (Östersund)
felix.dobslaw@miun.se
Felix
● 2007 Bsc in “Informatik” University of Hamburg
● 2009 Msc in Distributed Systems MIUN (Sundsvall)
● 2005 – 2009 Prolifics/IBM software dev (Hamburg/Remote)
● 2012 Lic. in Computational Intelligence, MIUN
● 2015 Dr. in Wireless Sensor Networks, MIUN
● 2016 → Tenure in Computer Sciences, MIUN (Östersund)
● 2016 → Entrepeneurship, ride-sharing, online ratings, ...
● 2019-2021 PostDoc in Software Engineering, Chalmers (Gothenburg)
● 2022-now research-lead in Software Engineering at MIUN (Östersund)
felix.dobslaw@miun.se
felix.dobslaw@miun.se
felix.dobslaw@miun.se
Test Automation Augmentation
felix.dobslaw@miun.se
inputs
outputs
requirements
constraints
felix.dobslaw@miun.se
Specification:
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
felix.dobslaw@miun.se
Specification:
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
Goal
vs.
System
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
Goal
vs.
System
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
Goal
vs.
System
felix.dobslaw@miun.se
program
Specification:
tests
validate
Specification
inputs
outputs
requirements
constraints
Entirely
implicit
Greatly
detailed
Waterfall
Model
Goal
vs.
System
Correct software depends on
correct boundaries. Boundary Value
Exploration reveals discrepancies
between desired and actual behavior.
felix.dobslaw@miun.se
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Testing
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Testing
BVT: “Execution of specific input pairs in
order to ensure that an actual boundary
is also expected.”
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Analysis
Boundary Value
Testing
BVT: “Execution of specific input pairs in
order to ensure that an actual boundary
is also expected.”
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
BVA: “Analysis of artifacts of the software
development process to clarify the expected
and actual boundaries of a software.”
Boundary Value
Analysis
Boundary Value
Testing
BVT: “Execution of specific input pairs in
order to ensure that an actual boundary
is also expected.”
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Analysis
Boundary Value
Testing
Boundary Value
Exploration
Candidates
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Analysis
Boundary Value
Testing
Boundary Value
Exploration
Candidates
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Analysis
Boundary Value
Testing
Boundary Value
Exploration
Candidates
BVE: “A collection of techniques that select
or help select inputs to detect and identify
boundary candidates.”
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value
Analysis
Boundary Value
Testing
Boundary Value
Exploration
Candidates
BVE: “A collection of techniques that select
or help select inputs to detect and identify
boundary candidates.”
F. Dobslaw, F. G. de Oliveira Neto and R.
Feldt, "Boundary Value Exploration for
Software Analysis," 2020 IEEE International
Conference on Software Testing, Verification
and Validation Workshops (ICSTW), 2020.
felix.dobslaw@miun.se
Boundary Value Testing (BVT)
Software Testing

Related to Partition Analysis

Decide and implement relevant test cases on the
boundaries
3/13
felix.dobslaw@miun.se
Boundary Value Testing (BVT)
Software Testing

Related to Partition Analysis

Decide and implement relevant test cases on the
boundaries
3/13
felix.dobslaw@miun.se
Boundary Value Testing (BVT)
Software Testing

Related to Partition Analysis

Decide and implement relevant test cases on the
boundaries
3/13
felix.dobslaw@miun.se
Boundary Value Testing (BVT)
Software Testing

Related to Partition Analysis

Decide and implement relevant test cases on the
boundaries
3/13
felix.dobslaw@miun.se
What are the boundaries?
What are the boundary candidates?
felix.dobslaw@miun.se
What are the boundaries?
What are the boundary candidates?
height, weight →
Body Mass Index
Category
height in cm
weight in kg
method:
bmi(h::int, w::int)
felix.dobslaw@miun.se
What are the boundaries?
What are the boundary candidates?
height, weight →
Body Mass Index
Category
height in cm
weight in kg
method:
bmi(h::int, w::int)
Examples
Expected Boundary:
Healthy/Overweight
Boundary Candidate:
[ (142.2, 81), (142.2, 82) ]
felix.dobslaw@miun.se
What are the boundaries?
What are the boundary candidates?
height, weight →
Body Mass Index
Category
height in cm
weight in kg
method:
bmi(h::int, w::int)
Examples
Expected Boundary:
Healthy/Overweight
Boundary Candidate:
[ (142.2, 81), (142.2, 82) ]
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
BVE Process Example
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
Bmi(139, 100) → BoundsError(“ w >= 140”)
Bmi(140, 100) → “Sev. Obese“
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
not so clear case...
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
Bmi(139, 100) → BoundsError(“ w >= 140”)
Bmi(140, 100) → “Sev. Obese“
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
not so clear case...
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
Specification Pull Request:
felix.dobslaw@miun.se
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
Bmi(139, 100) → BoundsError(“ w >= 140”)
Bmi(140, 100) → “Sev. Obese“
Standards simplify
Tooling (e.g. web):
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
not so clear case...
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
Specification Pull Request:
felix.dobslaw@miun.se
Specification Pull Request Correction:
bmi(141, 100) → BoundsError(“ w >= 142”)
bmi(143, 100) → “Sev. Obese“
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
mining
Bmi(139, 100) → BoundsError(“ w >= 140”)
Bmi(140, 100) → “Sev. Obese“
Standards simplify
Tooling (e.g. web):
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
testing → quality assurance
not so clear case...
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
Specification Pull Request:
felix.dobslaw@miun.se
Specification Pull Request Correction:
bmi(141, 100) → BoundsError(“ w >= 142”)
bmi(143, 100) → “Sev. Obese“
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
implementation
boundary
mining
Bmi(139, 100) → BoundsError(“ w >= 140”)
Bmi(140, 100) → “Sev. Obese“
Standards simplify
Tooling (e.g. web):
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
testing → quality assurance
not so clear case...
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
Specification Pull Request:
felix.dobslaw@miun.se
Specification Pull Request Correction:
bmi(141, 100) → BoundsError(“ w >= 142”)
bmi(143, 100) → “Sev. Obese“
program
Specification:
tests
inputs
outputs
requirements
constraints
boundary
implementation
boundary
mining
Bmi(139, 100) → BoundsError(“ w >= 140”)
Bmi(140, 100) → “Sev. Obese“
Standards simplify
Tooling (e.g. web):
bmi(142.2, 81) → “Normal”
bmi(142.2, 82) → “Overweight”
“clear case”
testing → quality assurance
not so clear case...
bmi(1,0) → “Underweight”
bmi(1,1) → “Sev. Obese”
Specification Pull Request:
felix.dobslaw@miun.se
How to automatically mine
boundaries?
felix.dobslaw@miun.se
SUT
x y
How to automatically mine
boundaries?
felix.dobslaw@miun.se
SUT
x y
Assert y == yexp
How to automatically mine
boundaries?
felix.dobslaw@miun.se
SUT
x y
Assert y == yexp
How to automatically mine
boundaries?
felix.dobslaw@miun.se
SUT
x y
x1 x2
y1 y2
SUT SUT
Assert y == yexp
How to automatically mine
boundaries?
felix.dobslaw@miun.se
SUT
x y
x1 x2
y1 y2
?
SUT SUT
Assert y == yexp
How to automatically mine
boundaries?
felix.dobslaw@miun.se
SUT
x y
x1 x2
y1 y2
?
SUT SUT
Assert y == yexp
How to automatically mine
boundaries?
Distance Metric Examples: Jaccard, Hamming, Euclidean…
Very basic one: Strlendist
felix.dobslaw@miun.se
SUT
x y
x1 x2
y1 y2
?
SUT SUT
Assert y == yexp
How to automatically mine
boundaries?
Distance Metric Examples: Jaccard, Hamming, Euclidean…
Very basic one: Strlendist
Example:
30 and 31 are neighbors in the input space for field month:
Date(2021, 30, 4) → “30/4/2021”
StringLength is 9
Date(2021, 31, 4) → “ERROR, month field out of bounds.”
StringLength is 33
Strlendist = |33-9| = 24
Big difference, this seems to be a boundary candidate!
But is it an interesting one?...
felix.dobslaw@miun.se
felix.dobslaw@miun.se
Boundary without Oracle
felix.dobslaw@miun.se
Boundary without Oracle
felix.dobslaw@miun.se
Boundary without Oracle
$ sudo -u# -1 id -u
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.
?
x y
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types. x1 x2
SUT
y1 y2
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types. x1 x2
SUT
y1 y2
?
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Proposal based on Kolmogorov Complexity

Applicable for all data types

Normalized Information Distance (NID)

“Compression trick” makes it practical

CC ~ KC

Normalized Compression Distance (NCD)
x1 x2
SUT
y1 y2
?
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Proposal based on Kolmogorov Complexity

Applicable for all data types

Normalized Information Distance (NID)

“Compression trick” makes it practical

CC ~ KC

Normalized Compression Distance (NCD)
x1 x2
SUT
y1 y2
?
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Proposal based on Kolmogorov Complexity

Applicable for all data types

Normalized Information Distance (NID)

“Compression trick” makes it practical

CC ~ KC

Normalized Compression Distance (NCD)
x1 x2
SUT
y1 y2
?
felix.dobslaw@miun.se
Foundation: Diversity

Challenge: Describe relation between inputs and outputs for
arbitrary data types.

Proposal based on Kolmogorov Complexity

Applicable for all data types

Normalized Information Distance (NID)

“Compression trick” makes it practical

CC ~ KC

Normalized Compression Distance (NCD)
x1 x2
SUT
y1 y2
?
felix.dobslaw@miun.se
Program Derivatives
felix.dobslaw@miun.se
Derivatives
felix.dobslaw@miun.se
Derivatives
Principia Mathematica (1687)
felix.dobslaw@miun.se
Derivatives
● Slope of the tangent line to the graph at x
How sensitive to change is f in x?
felix.dobslaw@miun.se
Derivatives
● Slope of the tangent line to the graph at x
How sensitive to change is f in x?
secant
felix.dobslaw@miun.se
Derivatives
● Slope of the tangent line to the graph at x
How sensitive to change is f in x?
secant
felix.dobslaw@miun.se
What is x + h? … What is h?
felix.dobslaw@miun.se
What is x + h? … What is h?
DQ = Difference Quotient
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
P(x) is program output for input x
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
Hm… But …
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
Hm… But …
… How do I select di and do?
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
Hm… But …
… How do I select di and do?
… How do I get bmin then?
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
Program Derivatives
Hm… But …
… How do I select di and do?
… How do I get bmin then?
...
R. Feldt and F. Dobslaw.
"Towards automated boundary value testing with program derivatives and search.
International Symposium on Search Based Software Engineering. Springer, Cham, 2019.
felix.dobslaw@miun.se
C is the compressor (e.g. bzip2)
CDQ = Compression Difference Quotient
PDQ = Program Difference Quotient
NCD = Normalized Compression Distance
Program Derivatives
9/13
How do I select di and do?
felix.dobslaw@miun.se
C is the compressor (e.g. bzip2)
CDQ = Compression Difference Quotient
PDQ = Program Difference Quotient
NCD = Normalized Compression Distance
Program Derivatives
9/13
How do I select di and do?
felix.dobslaw@miun.se
C is the compressor (e.g. bzip2)
CDQ = Compression Difference Quotient
PDQ = Program Difference Quotient
NCD = Normalized Compression Distance
Program Derivatives
9/13
How do I select di and do?
felix.dobslaw@miun.se
Input Mutation
How do I get bmin then?

May require exploring the SUT’s behavior on a number of “close
values”

e.g. via Search-based Software Engineering with Mutators
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Case: (Julia) Date
felix.dobslaw@miun.se
Finding Candidates
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
Finding Candidates
derivative
felix.dobslaw@miun.se
felix.dobslaw@miun.se
Visible Boundary Candidate 2D
- Color signifies dimension of boundary
felix.dobslaw@miun.se
felix.dobslaw@miun.se
Visible Boundary Candidate 3D
- Opacity signifies boundariness
- “…” abbreviates single (long) year
felix.dobslaw@miun.se
felix.dobslaw@miun.se
3D zoom out
- Delimited to 4 years from boundary
felix.dobslaw@miun.se
3D zoom out
- Delimited to 4 years from boundary
(manually decided)
felix.dobslaw@miun.se
felix.dobslaw@miun.se
felix.dobslaw@miun.se
● 2 proposed detection algorithms
● Program Derivative with crude metric (Strlendist)
● 4 SUTs quant + qual analysis (+200 quant only SUTs in revision)
– Limited to unit tests with integer based inputs
felix.dobslaw@miun.se
Preliminary Results/Conclusions
felix.dobslaw@miun.se
Preliminary Results/Conclusions
● AutoBVA detected and selected interesting
boundary candidates (potential bugs) for all 4
SUTs.
● First automated BVA in literature
– Black-box, non-formal
● Identified demand for a more scalable solution
with aggressive online selection (ongoing).
felix.dobslaw@miun.se
Where else can this be useful?
When does the system hit the switch?
- is that at the right time, i.e. according to specification?
- shall be a problem of the product owner, not the developer/data scientist.
Research Council
Project AQUAS
2022-2025
felix.dobslaw@miun.se
Where else can this be useful?
When does the system hit the switch?
- is that at the right time, i.e. according to specification?
- shall be a problem of the product owner, not the developer/data scientist.
Research Council
Project AQUAS
2022-2025
felix.dobslaw@miun.se
Where else can this be useful?
When does the system hit the switch?
- is that at the right time, i.e. according to specification?
- shall be a problem of the product owner, not the developer/data scientist.
Research Council
Project AQUAS
2022-2025
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
Data
Science
Traditional
Software
Engineering
SE/CS vs DS/ML
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Data
Science
Traditional
Software
Engineering
SE/CS vs DS/ML
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Data
Science
Traditional
Software
Engineering
Approach
SE/CS vs DS/ML
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Data
Science
Traditional
Software
Engineering
Approach
SE/CS vs DS/ML
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Data
Science
Traditional
Software
Engineering
Approach
SE/CS vs DS/ML
(+ )
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Configuration
Code
Training
Data
Training
Data
Training
Data
Data
Science
Traditional
Software
Engineering
Approach
SE/CS vs DS/ML
(+ )
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Configuration
Code
Training
Data
Training
Data
Training
Data
Data
Science
Traditional
Software
Engineering
Approach
SE/CS vs DS/ML
(+ )
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
Learnt
Component
Programmed
Component
Software
Artifact
inputs → → outputs
Configuration
Code
Training
Data
Training
Data
Training
Data
Data
Science
Traditional
Software
Engineering
Approach
SE/CS vs DS/ML
(+ )
Dobslaw, Felix, and Robert Feldt. "Similarities of Testing Programmed and Learnt Software." 2023 IEEE International
Conference on Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2023.
felix.dobslaw@miun.se
“...the notion of correctness is not only a binary notion...”
"...the notion of correctness is not clear..."
Yves Le Traon (ICST Keynote 2023)
felix.dobslaw@miun.se
Incorrect
?
Unknown/
Unconsidered/
Unsure
Correct
Software Correctness
Spectrum
“...the notion of correctness is not only a binary notion...”
"...the notion of correctness is not clear..."
Yves Le Traon (ICST Keynote 2023)
felix.dobslaw@miun.se
Incorrect
?
Unknown/
Unconsidered/
Unsure
Correct
Software Correctness
Spectrum
“...the notion of correctness is not only a binary notion...”
"...the notion of correctness is not clear..."
Yves Le Traon (ICST Keynote 2023)
The U’s call for common testing
method to clarify and refine
understanding.
felix.dobslaw@miun.se
Incorrect
?
Unknown/
Unconsidered/
Unsure
Correct
Software Correctness
Spectrum
“...the notion of correctness is not only a binary notion...”
"...the notion of correctness is not clear..."
Yves Le Traon (ICST Keynote 2023)
The U’s call for common testing
method to clarify and refine
understanding.
One idea here is:
felix.dobslaw@miun.se
Incorrect
?
Unknown/
Unconsidered/
Unsure
Correct
Software Correctness
Spectrum
“...the notion of correctness is not only a binary notion...”
"...the notion of correctness is not clear..."
Yves Le Traon (ICST Keynote 2023)
The U’s call for common testing
method to clarify and refine
understanding.
One idea here is:
- automated black-box boundary
analysis
felix.dobslaw@miun.se
Loan Approval?
felix.dobslaw@miun.se
Loan Approval?
felix.dobslaw@miun.se
Loan Approval?
Question:
What can the person do
to get an approval?
felix.dobslaw@miun.se
Loan Approval?
Counterfactuals
Question:
What can the person do
to get an approval?
felix.dobslaw@miun.se
Loan Approval?
Counterfactuals
Question:
What can the person do
to get an approval?
felix.dobslaw@miun.se
Loan Approval?
Counterfactuals
Question:
What can the person do
to get an approval?
felix.dobslaw@miun.se
Loan Approval?
Counterfactuals
Question:
What can the person do
to get an approval?
felix.dobslaw@miun.se
Loan Approval?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
Is the boundary
appropriate?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
Is the boundary
appropriate?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
Is the boundary
appropriate?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
Is the boundary
appropriate?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
Is the boundary
appropriate?
Is this a reasonable
separator?
felix.dobslaw@miun.se
Loan Approval?
Question:
Are we making the right
decisions?
Is the boundary
appropriate?
Is this a reasonable
separator?
felix.dobslaw@miun.se
Ongoing/Future Work
Program
Derivative
(PD)
felix.dobslaw@miun.se
Ongoing/Future Work
Program
Derivative
(PD)
Generalization of PD:
may extend to
- execution properties
- memory use
- exec time…
- multiple/varying distance metrics
- generic (ncd, jaccard...)
- type specific (euclidean,
geographic)
felix.dobslaw@miun.se
Ongoing/Future Work
Program
Derivative
(PD) Summarization:
- Scalable, generalizable ways of
selecting interesting candidates.
- in support of production data
Generalization of PD:
may extend to
- execution properties
- memory use
- exec time…
- multiple/varying distance metrics
- generic (ncd, jaccard...)
- type specific (euclidean,
geographic)
felix.dobslaw@miun.se
Ongoing/Future Work
GUI handling:
- traces and uncommon/unexpected transitions
Program
Derivative
(PD) Summarization:
- Scalable, generalizable ways of
selecting interesting candidates.
- in support of production data
Generalization of PD:
may extend to
- execution properties
- memory use
- exec time…
- multiple/varying distance metrics
- generic (ncd, jaccard...)
- type specific (euclidean,
geographic)
felix.dobslaw@miun.se
Ongoing/Future Work
GUI handling:
- traces and uncommon/unexpected transitions
Program
Derivative
(PD)
How to support the tester:
- process
what steps, roles?
- tools & method
algorithms for detection/summarization
features for automated test case extraction
Summarization:
- Scalable, generalizable ways of
selecting interesting candidates.
- in support of production data
Generalization of PD:
may extend to
- execution properties
- memory use
- exec time…
- multiple/varying distance metrics
- generic (ncd, jaccard...)
- type specific (euclidean,
geographic)
felix.dobslaw@miun.se
Questions/Comments?
felix.dobslaw@miun.se
Questions/Comments?
● Find me on LinkedIn and connect.
● Chalmers and MIUN PhD positions out.
– Both deadline 15/6
● Related problems/questions?
– Get in touch and we talk

Mais conteúdo relacionado

Semelhante a Boundary Value Testing for Traditional and ML Software

BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxgarnerangelika
 
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...OKOKPROJECTS
 
Using Clone Detection to Identify Bugs in Concurrent Software
Using Clone Detection to Identify Bugs in Concurrent SoftwareUsing Clone Detection to Identify Bugs in Concurrent Software
Using Clone Detection to Identify Bugs in Concurrent SoftwareICSM 2010
 
Mo win cfp
Mo win cfpMo win cfp
Mo win cfppijans
 
Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...Universitat Politècnica de Catalunya
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Anastasija Nikiforova
 
IEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions UpdateIEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions UpdateHironori Washizaki
 
Mo win cfp
Mo win cfpMo win cfp
Mo win cfppijans
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation2b3d
 
OEDN 2011 Sponsor Program
OEDN 2011 Sponsor ProgramOEDN 2011 Sponsor Program
OEDN 2011 Sponsor ProgramOEDN
 

Semelhante a Boundary Value Testing for Traditional and ML Software (20)

BBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docxBBA100 Business and SocietyGood Evening, everyone.T.docx
BBA100 Business and SocietyGood Evening, everyone.T.docx
 
Cv(photo)
Cv(photo)Cv(photo)
Cv(photo)
 
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
Dependable Intrusion Detection System for IoT A Deep Transfer Learning Based ...
 
Using Clone Detection to Identify Bugs in Concurrent Software
Using Clone Detection to Identify Bugs in Concurrent SoftwareUsing Clone Detection to Identify Bugs in Concurrent Software
Using Clone Detection to Identify Bugs in Concurrent Software
 
new_kitching_cv
new_kitching_cvnew_kitching_cv
new_kitching_cv
 
Mo win cfp
Mo win cfpMo win cfp
Mo win cfp
 
Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...
 
Sudharmendra's Resume_02.pdf
Sudharmendra's Resume_02.pdfSudharmendra's Resume_02.pdf
Sudharmendra's Resume_02.pdf
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
IEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions UpdateIEEE Computer Society 2024 Technology Predictions Update
IEEE Computer Society 2024 Technology Predictions Update
 
CV(2016)
CV(2016)CV(2016)
CV(2016)
 
Mo win cfp
Mo win cfpMo win cfp
Mo win cfp
 
2011 lecture ia orientation
2011 lecture ia orientation2011 lecture ia orientation
2011 lecture ia orientation
 
Olive_JbCV[9mar_2k16]
Olive_JbCV[9mar_2k16]Olive_JbCV[9mar_2k16]
Olive_JbCV[9mar_2k16]
 
CV _Manoj
CV _ManojCV _Manoj
CV _Manoj
 
Vinoth babu b new
Vinoth babu b newVinoth babu b new
Vinoth babu b new
 
Vinoth Babu B-New
Vinoth Babu B-NewVinoth Babu B-New
Vinoth Babu B-New
 
Vinoth babu b new
Vinoth babu b newVinoth babu b new
Vinoth babu b new
 
Infobroschuere
InfobroschuereInfobroschuere
Infobroschuere
 
OEDN 2011 Sponsor Program
OEDN 2011 Sponsor ProgramOEDN 2011 Sponsor Program
OEDN 2011 Sponsor Program
 

Mais de Felix Dobslaw

Software testing research solving real-world problems
Software testing research solving real-world problemsSoftware testing research solving real-world problems
Software testing research solving real-world problemsFelix Dobslaw
 
Boundary Value Exploration for Software Analysis
Boundary Value Exploration for Software AnalysisBoundary Value Exploration for Software Analysis
Boundary Value Exploration for Software AnalysisFelix Dobslaw
 
Presentation at SCAM 2020
Presentation at SCAM 2020Presentation at SCAM 2020
Presentation at SCAM 2020Felix Dobslaw
 
Estimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation FrameworksEstimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation FrameworksFelix Dobslaw
 
Using Diversity for Automated Boundary Value Testing
Using Diversity for Automated Boundary Value TestingUsing Diversity for Automated Boundary Value Testing
Using Diversity for Automated Boundary Value TestingFelix Dobslaw
 
A Future where we don’t write tests
A Future where we don’t write testsA Future where we don’t write tests
A Future where we don’t write testsFelix Dobslaw
 
Towards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and SearchTowards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and SearchFelix Dobslaw
 

Mais de Felix Dobslaw (7)

Software testing research solving real-world problems
Software testing research solving real-world problemsSoftware testing research solving real-world problems
Software testing research solving real-world problems
 
Boundary Value Exploration for Software Analysis
Boundary Value Exploration for Software AnalysisBoundary Value Exploration for Software Analysis
Boundary Value Exploration for Software Analysis
 
Presentation at SCAM 2020
Presentation at SCAM 2020Presentation at SCAM 2020
Presentation at SCAM 2020
 
Estimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation FrameworksEstimating Return on Investment for GUI Test Automation Frameworks
Estimating Return on Investment for GUI Test Automation Frameworks
 
Using Diversity for Automated Boundary Value Testing
Using Diversity for Automated Boundary Value TestingUsing Diversity for Automated Boundary Value Testing
Using Diversity for Automated Boundary Value Testing
 
A Future where we don’t write tests
A Future where we don’t write testsA Future where we don’t write tests
A Future where we don’t write tests
 
Towards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and SearchTowards Automated Boundary Value Testing with Program Derivatives and Search
Towards Automated Boundary Value Testing with Program Derivatives and Search
 

Último

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Boundary Value Testing for Traditional and ML Software