Sciweavers

4079 search results - page 254 / 816
» Differential Testing for Software
Sort
View
ICST
2011
IEEE
14 years 6 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
113
Voted
ISSRE
2006
IEEE
15 years 8 months ago
Testing During Refactoring: Adding Aspects to Legacy Systems
Moving program code that implements cross-cutting concerns into aspects can improve the maintainability of legacy systems. This kind of refactoring, called aspectualization, can a...
Michael Mortensen, Sudipto Ghosh, James M. Bieman
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
16 years 2 months ago
A case study in database reliability: component types, usage profiles, and testing
Data management lies at the core of most modern information technology deployments. Accordingly, the reliability of the database management system (DBMS) is critical to the reputa...
C. A. Taylor, Mechelle Gittens, Andriy V. Miransky...
139
Voted
ICSE
2009
IEEE-ACM
15 years 9 months ago
Automated testing of healthcare document transformations in the PICASSO interoperability platform
In every application domain, achieving interoperability among heterogenous information systems is a crucial challenge and alliances are formed to standardize data-exchange formats...
Massimo Pascale, Marcello Roselli, Umberto Rugani,...
122
Voted
ICST
2009
IEEE
15 years 9 months ago
PKorat: Parallel Generation of Structurally Complex Test Inputs
Constraint solving lies at the heart of several specification-based approaches to automated testing. Korat is a previously developed algorithm for solving constraints in Java pro...
Junaid Haroon Siddiqui, Sarfraz Khurshid