Sciweavers

1466 search results - page 68 / 294
» Completeness of the Authentication Tests
Sort
View
SIGIR
2011
ACM
12 years 11 months ago
Pseudo test collections for learning web search ranking functions
Test collections are the primary drivers of progress in information retrieval. They provide a yardstick for assessing the effectiveness of ranking functions in an automatic, rapi...
Nima Asadi, Donald Metzler, Tamer Elsayed, Jimmy L...
OSDI
2008
ACM
14 years 8 months ago
Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test
Hard disk drives returned back to Seagate undergo the Field Return Incoming Test. During the test, the available logs in disk drives are collected, if possible. These logs contain...
Alma Riska, Erik Riedel
KBSE
2008
IEEE
14 years 2 months ago
Query-Aware Test Generation Using a Relational Constraint Solver
We present a novel approach for black-box testing of database management systems (DBMS) using the Alloy tool-set. Given a database schema and an SQL query as inputs, our approach ...
Shadi Abdul Khalek, Bassem Elkarablieh, Yai O. Lal...
ICFEM
2005
Springer
14 years 1 months ago
Testing Real-Time Multi Input-Output Systems
Abstract. In formal testing, the assumption of input enabling is typically made. This assumption requires all inputs to be enabled anytime. In addition, the useful concept of quies...
Laura Brandán Briones, Ed Brinksma
DSN
2000
IEEE
14 years 20 days ago
Robustness Testing of the Microsoft Win32 API
Although Microsoft Windows is being deployed in mission-critical applications, little quantitative data has been published about its robustness. We present the results of executin...
Charles P. Shelton, Philip Koopman, Kobey Devale