Sciweavers

167 search results - page 14 / 34
» Accounting for defect characteristics in evaluations of test...
Sort
View
SIGCOMM
1997
ACM
13 years 11 months ago
Trace-Based Mobile Network Emulation
Subjecting a mobile computing system to wireless network conditions that are realistic yet reproducible is a challenging problem. In this paper, we describe a technique called tra...
Brian Noble, Mahadev Satyanarayanan, Giao Thanh Ng...
WWW
2006
ACM
14 years 8 months ago
The web structure of e-government - developing a methodology for quantitative evaluation
In this paper we describe preliminary work that examines whether statistical properties of the structure of websites can be an informative measure of their quality. We aim to deve...
Vaclav Petricek, Tobias Escher, Ingemar J. Cox, He...
CCS
2004
ACM
14 years 24 days ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
SIGMOD
2008
ACM
65views Database» more  SIGMOD 2008»
14 years 7 months ago
Generating targeted queries for database testing
Tools for generating test queries for databases do not explicitly take into account the actual data in the database. As a consequence, such tools cannot guarantee suitable coverag...
Chaitanya Mishra, Nick Koudas, Calisto Zuzarte
ISSTA
2004
ACM
14 years 25 days ago
Evolutionary testing in the presence of loop-assigned flags: a testability transformation approach
Evolutionary testing is an effective technique for automatically generating good quality test data. However, for structural testing, the technique degenerates to random testing i...
André Baresel, David Binkley, Mark Harman, ...