Sciweavers

1414 search results - page 74 / 283
» Automated Metamorphic Testing
Sort
View
FM
2009
Springer
153views Formal Methods» more  FM 2009»
13 years 6 months ago
Iterative Refinement of Reverse-Engineered Models by Model-Based Testing
Abstract. This paper presents an iterative technique to accurately reverseengineer models of the behaviour of software systems. A key novelty of the approach is the fact that it us...
Neil Walkinshaw, John Derrick, Qiang Guo
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
14 years 9 months ago
V-Miner: using enhanced parallel coordinates to mine product design and test data
Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...
COMCOM
2002
143views more  COMCOM 2002»
13 years 8 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
LREC
2010
112views Education» more  LREC 2010»
13 years 10 months ago
Principled Construction of Elicited Imitation Tests
In this paper we discuss the methodology behind the construction of elicited imitation (EI) test items. First we examine varying uses for EI tests in research and in testing overa...
Carl Christensen, Ross Hendrickson, Deryle Lonsdal...
LPNMR
2005
Springer
14 years 2 months ago
Testing Strong Equivalence of Datalog Programs - Implementation and Examples
In this work we describe a system for determining strong equivalence of disjunctive non-ground datalog programs under the stable model semantics. The problem is tackled by reducing...
Thomas Eiter, Wolfgang Faber, Patrick Traxler