Sciweavers

1253 search results - page 232 / 251
» Exploration Testing
Sort
View
HOTOS
2007
IEEE
14 years 14 days ago
HotComments: How to Make Program Comments More Useful?
Program comments have long been used as a common practice for improving inter-programmer communication and code readability, by explicitly specifying programmers' intentions ...
Lin Tan, Ding Yuan, Yuanyuan Zhou
HUC
2009
Springer
14 years 14 days ago
Playful bottle: a mobile social persuasion system to motivate healthy water intake
This study of mobile persuasion system explores the use of a mobile phone, when attached to an everyday object used by an everyday behavior, becomes a tool to sense and influence ...
Meng-Chieh Chiu, Shih-Ping Chang, Yu-Chen Chang, H...
DSN
2006
IEEE
14 years 8 days ago
A Contribution Towards Solving the Web Workload Puzzle
World Wide Web, the biggest distributed system ever built, experiences tremendous growth and change in Web sites, users, and technology. A realistic and accurate characterization ...
Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wan...
FMICS
2006
Springer
14 years 7 days ago
SAT-Based Verification of LTL Formulas
Abstract. Bounded model checking (BMC) based on satisfiability testing (SAT) has been introduced as a complementary technique to BDDbased symbolic model checking of LTL properties ...
Wenhui Zhang
USS
2008
13 years 11 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam