—When a program is modified during software evolution, developers typically run the new version of the program against its existing test suite to validate that the changes made ...
Abstract--Real-time embedded systems (RTESs) are becoming increasingly ubiquitous, controlling a wide variety of popular and safety-critical devices. Effective testing techniques c...
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Testing and verification of asynchronously communicating objects in open environments are challenging due to non-determinism. We explore a formal approach for black-box testing by...
Over the past years it has become evident that the benefits of object orientation warrant the design and development of reengineering methods that aim to migrate legacy procedural...