SlideShare a Scribd company logo
1 of 50
Download to read offline
Conditional	Entropy	and	Failed	Error	
Propagation	in	Software	Testing
Rob	Hierons
Brunel	University	London
Joint	work	with:	Kelly	Androutsopoulos,	David	Clark,	
Haitao Dan,	Mark	Harman	
UCM,	17th	March	2017
White-box	testing
• White	box	testing	is:
– testing	based	on	the	structure	of	the	code.
• Good	at	finding	certain	classes	of	faults	(e.g.	
extra	special	cases)	but	poor	at	finding	others	
(e.g.	missing	special	cases).
UCM,	17th	March	2017
Example:	where	white-box	testing	
helps
• Suppose	someone	implements	the	absolute	
value	function	as:
if (x>0) return x; else if (x==-12)
return 5; else return -x;
• Without	seeing	the	code	we	have	no	reason	to	
believe	that	the	value	-12	is	special.
• These	kind	of	cases	are	only	likely	to	be	found	
with	white-box	testing
UCM,	17th	March	2017
Coverage
• We	look	at	certain	types	of	constructs	(e.g.	
statements,	branches)
• We	might	then:
– measure	the	proportion	of	these	that	are	
executed/covered	in	testing;	or
– insist	that	in	testing	we	achieve	at	least	a	certain	
percentage	coverage	(often	100%).
UCM,	17th	March	2017
Code	coverage	criteria
• The	most	widely	used	type	of	test	criterion.
• Examples	include:
– Statement	Coverage
– Branch	Coverage
– MC/DC
– Path	Coverage
– Dataflow	based	criteria
UCM,	17th	March	2017
Motivation
• Mandated	in	some	standards	(e.g.	
automotive,	avionics).
• Failing	to	achieve	coverage	clearly	
demonstrates	that	testing	is	weak.
• However,	it	is	syntactic:	what	does	achieving	
coverage	tell	us?
UCM,	17th	March	2017
Finding	Faults
• To	find	a	fault	in	statement	s a	test	case	must:
– Execute	s.
– Infect	s.
– Propagate	this	to	output.
• (The	PIE	framework.)
UCM,	17th	March	2017
Propagation	and	dependence
• For	a	difference	in	x	at	statement	s	to	be	
observed	we	require:
– The	output	depends	on	the	value	of	x	at	s
• Examples	where	does	not	hold:
– x=f(…);	… x=1;	…
– x=f(…);	z=g(x);	return(y);
– z=1;	x=f(…);	if	(z<0)	y=g(x);	return(y);
UCM,	17th	March	2017
Propagation
• Dependence	is	necessary	but	not	sufficient:
– Consider	e.g.	statement	y	=	x	mod	2;
– The	expected	value	of	x	is	7
– The	actual	value	of	x	is	3248943
– There	is	dependence	but	no	propagation
UCM,	17th	March	2017
Failed	Error	Propagation	(FEP)
• This	occurs	when:
– A	test	case	leads	to	execution	and	infection	but	
not	propagation.
• Makes	testing	less	effective.
• Empirical	evidence	suggests:
– Affects	approximately	10%	of	test	cases	but	this	
can	be	as	high	as	60%	for	some	programs.
UCM,	17th	March	2017
FEP	and	Coverage
• The	‘hope’	in	coverage	is	that:
– If	a	test	case	executes	e.g.	a	statement	s	and	this	
contains	a	fault	then	the	test	case	will	find	this	fault.
• This	already	looks	weak	(need	‘infection’).
– Also	need	to	avoid	FEP.
• Could	help	explain	evidence	of	limited	
effectiveness	of	coverage.
UCM,	17th	March	2017
Failed	Error	Propagation	(FEP)
UCM,	17th	March	2017
The	basic	idea
• In	test	execution	FEP	occurs	through	the	
following:
– The	program	state	at	statement	s	should	be	σ but	
is	σ’.
– The	code	after	this	maps	σ and	σ’	to	the	same
output.
• There	has	been	a	loss	of	information.
• Underlying	assumption:	only	one	fault.
UCM,	17th	March	2017
Shannon	Entropy
• Context:
– A	message	is	sent	from	a	transmitter	to	a	receiver	
through	a	channel.
– Messages	can	be	modified	by	the	channel.
– The	receiver	tries	to	infer	the	message	sent	by	the	
transmitter.
• Shannon	entropy	is	the	expected	value	of	the	
information	that	can	be	inferred	about	the	
message.
UCM,	17th	March	2017
Shannon	Entropy
• Given	random	variable	X	with	probability	
distribution	p,	the	Shannon	Entropy	is
• This	is	a	measure	of	the	information	content	(or	
entropy)	of	X.
• Basic	idea:	rare	events	provide	more	information	
but	are	less	likely.
UCM,	17th	March	2017
H(X) =
X
x2X
p(x) log2 p(x)
Extreme	cases
• If	a	random	variable	X	has	only	one	possible	
value:
– Shannon	entropy	is	0
• No	information
• The	value	of	X	does	not	‘tell	us	anything’
• Uniform	distribution	(all	values	are	
equiprobable),	with	n	values
– Shannon	entropy	is	log(n)	– number	of	bits	
required	to	represent	X.
UCM,	17th	March	2017
Squeeziness
• This	is	the	loss	of	entropy	(uncertainty)	during	
computation.
• For	function	f	with	input	domain	I this	is:
• Where
UCM,	17th	March	2017
Sq(f, I) = H(I) H(O)
H(X) =
X
x2X
p(x) log2 p(x)
Another	representation
• Given	function	f	on	I:
UCM,	17th	March	2017
Sq(f, I) =
X
o2O
p(o) H(f 1
o)
Extreme	cases
• Recall	
• If	all	inputs	are	mapped	to	the	same	output
– The	entropy	of	the	output	is	zero.
– All	information	lost.
– The	output	tells	us	nothing	about	the	input.
• The	function	f is	a	bijection
– Squeeziness of	0:	no	loss	of	information.
– The	output	uniquely	identifies	the	input.
UCM,	17th	March	2017
Sq(f, I) = H(I) H(O)
A	model	of	FEP
• FEP	happens	after	the	fault.
• Suppose	the	program	follows	path
• Where	πl is	the	lower	path	that	follows	the	
fault.
• One	can	argue	that	FEP	occurs	due	to	πl
UCM,	17th	March	2017
⇡ = ⇡u⇡l
A	first	measure
• FEP	occurs	after	the	fault.
• The	code	executed	is	πl
• Simply	use	the	Squeeziness of	πl
UCM,	17th	March	2017
A	complication
• Any	FEP	involves	two	programs:
– A	‘ghost’	(correct)	program	P
– The	actual	program	P’
• We	assume	there	is	a	single	fault	in	a	component:
– Component	C	of	P
– Corresponding	component	C’	of	P’.
• FEP	is	not	just	about	P’	or	πl (P	might	follow	a	
different	path).
UCM,	17th	March	2017
UCM,	17th	March	2017
n’
t
CFG(P’)
A A’
C C’
Q
o o
B
B’
Q’
t
CFG(P)
pp pp’
n
Estimating	the	probability	of	FEP
• Using	test	case	t,	FEP	is	caused	by	a	lack	of	
information	flow	after	a	fault	(in	statement	s).
• We	could	use:
– The	Squeeziness of	the	code	that	follows	s.
• The	QIF	of	Q;	or
• The	QIF	of	the	path.
• The	former	captures	the	computation;	the	latter	
might	approximate	this.
• Should	we	consider	the	code	before s?
UCM,	17th	March	2017
Possible	measures
• M1:	Squeeziness of	Q	(on	the	states	at	pp’)
• M2:	M1	+	Squeeziness of	R	(code	before)
• M3:	Squeeziness of	Q	on	states	reachable	via	
a	given	upper	path	πu
• M4:	M3	+	Squeeziness of	(upper/initial)	path	
πu
• M5:		Squeeziness of	(lower/final)	path	πl
UCM,	17th	March	2017
Experimental	study
• For	a	program	p	we:
– Randomly	generated	a	sample	T	of	5,000	inputs	
from	a	suitable	domain.
– Generated	mutants	of	p.
– For	mutant	m	(mutated	statement	s),	input	t	in	T:
• Determine	whether	m	and	p	have	the	same	state	after	
s.
• Determine	whether	m	and	p	have	the	same	output.
– A	different	‘outcome’	denotes	FEP.
UCM,	17th	March	2017
Comparison	made
• We	compared	our	measures	with	the	true	(for	
the	sample)	probability	of	FEP:
UCM,	17th	March	2017
p(FEP) =
#tests with di↵erent state after s but same output
#number of tests with di↵erent state after s
Experimental	subjects
• Three	groups,	all	written	in	C:
– 17	toy	programs.
– 10	functions	from	R.
– 3	functions	from	GRETL	(Gnu	Regression,	
Econometrics	and	Time-Series	Library).
• R	functions:	between	137	and	2397	LOC.
• GRETL	functions:	between	270	and	688	LOC.
UCM,	17th	March	2017
Results:	all	programs
• Rank	correlations:
UCM,	17th	March	2017
Experiment Correlation
EXP1 0.715267
EXP2 0.699165
EXP3 0.955647
EXP4 0.948299
EXP5 0.031510
Results	– real	programs
Experiment Correlation
EXP1 0.974459
EXP2 0.974459
EXP3 0.998526
EXP4 0.998526
EXP5 -0.001361
UCM,	17th	March	2017
All	programs	(M2)
UCM,	17th	March	2017
Toy	programs	(M2)
UCM,	17th	March	2017
Real	programs	(M2)
UCM,	17th	March	2017
Consequences
• Potential	to	use	Information	Theory	based	
measures	to	predict	the	likelihood	of	FEP.
• In	practice	we	might:
– Use	as	measure	of	testability	(help	us	to	decide	
e.g.	how	many	tests	cases	to	use?).
– Try	to	cover	e.g.	a	statement	s	with	a	test	that	
follows	it	with	code	that	has	low	FEP.
– Have	more	test	cases	for	‘hard	to	test’	parts	of	the	
code.
UCM,	17th	March	2017
References
• The	work	is	contained	in:
– D.	Clark	and	R.	M.	Hierons,	Squeeziness:	An	
Information	Theoretic	Measure	for	Avoiding	Fault	
Masking,	Information	Processing	Letters,	112,	pp.	335-
340,	2012.
– K.	Androutsopoulos,	D.	Clark,	H.	Dan,	R.	M.	Hierons,	
and	M.	Harman:	An	Analysis	of	the	Relationship	
between	Conditional	Entropy	and	Failed	Error	
Propagation	in	Software	Testing,	36th	International	
Conference	on	Software	Engineering	(ICSE	2014).	
UCM,	17th	March	2017
Other	possible	uses	of	
Information	Theory
UCM,	17th	March	2017
Feasibility
• A	path	has	an	associated	path	condition	c(π)
– A	predicate	on	inputs:	c(π)	is	satisfied	by	an	input	
if	and	only	if	the	input	leads	to	π being	followed.
• A	path	π	is	feasible	if
– One	or	more	input	values	satisfy	c(π).
UCM,	17th	March	2017
More	on	feasibility
• Test	generation	techniques	can	waste	time	in	
trying	to	generate	test	input	for	infeasible	
path.
• Observations:
– An	infeasible	path	has	no	information	flow.
– A	path	with	no	information	flow	is	either	
infeasible	or	maps	all	values	to	one	state.
UCM,	17th	March	2017
Research	Question
• Can	we	use	Squeeziness to	address	feasibility?
UCM,	17th	March	2017
Diversity
• A	test	suite	is	diverse	if:
– The	test	cases	are	quite	‘different’.
• There	is	evidence	that	diverse	test	suites	tend	
to	be	effective.
UCM,	17th	March	2017
More	on	diversity
• Easy	to	see	how	we	measure	this	for	numbers.
• What	about:
– Strings
– Data	structures
– …
• This	has	limited	use	of	diversity	in	testing.
UCM,	17th	March	2017
Complexity
• Which	are	more	complex?
– xyxyxyxyxyxyxz
– xyzabcxyzabcpq
– Fdo3ewr0esr9w2
– xxxxxxxxxxxxxx
• How	about?
– {xy,	xyxyz,	sxyxyxyxy}
UCM,	17th	March	2017
Kolmogorov	Complexity
• Given	an	object,	the	Kolmogorov	complexity	
of	that	object	is:
– The	length	of	the	shortest	computer	program	that	
can	generate	that	object.
• This	provides	a	measure	of	the	complexity	of	
the	objects.
UCM,	17th	March	2017
Using	KC
• A	low	Kolmogorov	Complexity	indicates	
repetition.
– A	computer	program	could	have	functions	that	
generate	the	repeated	elements.
• Can	be	used	as	a	measure	of	diversity.
• In	practice	use:
– The	degree	to	which	the	object	(set	of	test	cases)	
can	be	compressed.
UCM,	17th	March	2017
Potential	uses
• With	a	more	general	measure	of	diversity	we	
can:
– Assess	how	diverse	test	suites	are
– Generate	highly	diverse	test	suites
• Use	search-based	techniques?
UCM,	17th	March	2017
Oracle	placement
• We	might	insert	oracles	into	the	code:
– These	provide	information	about	the	program	
state.
• Commonly	used	in	debugging.
• Help	also	in	testing.
UCM,	17th	March	2017
What	do	oracles	achieve?
• They:
– extend	the	output	– we	also	get	values	from	these	
oracles.
• This	potentially:
– increases	information	flow	to	output;
– helps	avoid	FEP.
UCM,	17th	March	2017
Where	best	to	place	oracles?
• We	might	want	to	minimise potential	for	FEP.
• However,	not	so	simple:
– We	could	just	place	oracles	at	all	program	
statements.
– Not	practical	but	will	eliminate	FEP.
UCM,	17th	March	2017
Future	plans
• Explore	the	use	of	Information	Theory	in	
Testing.
• Develop	methods	for	estimating	Information	
Theory	based	metrics.
• Implement	and	integrate	into	automated	test	
generation	tools.
UCM,	17th	March	2017
Questions?
UCM,	17th	March	2017

More Related Content

Viewers also liked

Viewers also liked (12)

GUIA PARA ELABORAR UN PLAN DE NEGOCIOS
GUIA PARA ELABORAR UN PLAN DE NEGOCIOSGUIA PARA ELABORAR UN PLAN DE NEGOCIOS
GUIA PARA ELABORAR UN PLAN DE NEGOCIOS
 
Who Turned Off the Hope: Brexit and the North
Who Turned Off the Hope: Brexit and the NorthWho Turned Off the Hope: Brexit and the North
Who Turned Off the Hope: Brexit and the North
 
Iliinsky Guaranteed Successful Design O'Reilly Design conf 2017
Iliinsky Guaranteed Successful Design O'Reilly Design conf 2017Iliinsky Guaranteed Successful Design O'Reilly Design conf 2017
Iliinsky Guaranteed Successful Design O'Reilly Design conf 2017
 
LiveBinder Project Made
LiveBinder Project MadeLiveBinder Project Made
LiveBinder Project Made
 
Prot. 1088 17 pl institui o programa de parcelamento incentivado (ppi) – re...
Prot. 1088 17   pl institui o programa de parcelamento incentivado (ppi) – re...Prot. 1088 17   pl institui o programa de parcelamento incentivado (ppi) – re...
Prot. 1088 17 pl institui o programa de parcelamento incentivado (ppi) – re...
 
Apostila alunos dreanagem
Apostila alunos dreanagemApostila alunos dreanagem
Apostila alunos dreanagem
 
Siomay
SiomaySiomay
Siomay
 
6.5. estabilización de_taludes_tcm7-213274
6.5. estabilización de_taludes_tcm7-2132746.5. estabilización de_taludes_tcm7-213274
6.5. estabilización de_taludes_tcm7-213274
 
Experimento1
Experimento1Experimento1
Experimento1
 
2. drogadicción
2. drogadicción2. drogadicción
2. drogadicción
 
Choosing Font for my CD Cover:
Choosing Font for my CD Cover:Choosing Font for my CD Cover:
Choosing Font for my CD Cover:
 
Unidad educativa josé maría vélaz
Unidad educativa josé maría vélazUnidad educativa josé maría vélaz
Unidad educativa josé maría vélaz
 

More from Facultad de Informática UCM

More from Facultad de Informática UCM (20)

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation Computers
 
uElectronics ongoing activities at ESA
uElectronics ongoing activities at ESAuElectronics ongoing activities at ESA
uElectronics ongoing activities at ESA
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura Arm
 
Formalizing Mathematics in Lean
Formalizing Mathematics in LeanFormalizing Mathematics in Lean
Formalizing Mathematics in Lean
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented Computing
 
Computer Design Concepts for Machine Learning
Computer Design Concepts for Machine LearningComputer Design Concepts for Machine Learning
Computer Design Concepts for Machine Learning
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuro
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error Correction
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intento
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPC
 
Type and proof structures for concurrency
Type and proof structures for concurrencyType and proof structures for concurrency
Type and proof structures for concurrency
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
 
Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore wind
 

Recently uploaded

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Conditional Entropy and Failed Error Propagation in Software Testing