Sciweavers

286 search results - page 28 / 58
» Crypto Engineering: Some History and Some Case Studies
Sort
View
IPPS
2010
IEEE
13 years 5 months ago
Stability of a localized and greedy routing algorithm
Abstract--In this work, we study the problem of routing packets between undifferentiated sources and sinks in a network modeled by a multigraph. We consider a distributed and local...
Christelle Caillouet, Florian Huc, Nicolas Nisse, ...
ASWEC
2007
IEEE
13 years 11 months ago
Managing Conflicts When Using Combination Strategies to Test Software
Testers often represent systems under test in input parameter models. These contain parameters with associated values. Combinations of parameter values, with one value for each pa...
Mats Grindal, Jeff Offutt, Jonas Mellin
ASWEC
2009
IEEE
14 years 2 months ago
Change Propagation Analysis Using Domain Information
We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis i...
Amir Aryani, Ian D. Peake, Margaret Hamilton, Hein...
CSSE
2008
IEEE
14 years 2 months ago
Lean Implementations of Software Testing Tools Using XML Representations of Source Codes
—By utilizing XML representations of source programs under test, a new approach is proposed to concisely implement some prototypes for TACCLE, a software testing methodology. The...
Yu Xia Sun, Huo Yan Chen, T. H. Tse
COMPSAC
2007
IEEE
14 years 2 months ago
A Combined Concept Location Method for Java Programs
Concept location is one of the fundamental activities during software maintenance which locates the parts of the source code where a specific concept is implemented. The methods f...
Dapeng Liu, Shaochun Xu