Sciweavers

752 search results - page 37 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
CN
2007
179views more  CN 2007»
13 years 8 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
AGILEDC
2006
IEEE
14 years 2 months ago
On Agile Performance Requirements Specification and Testing
Underspecified performance requirements can cause performance issues in a software system. However, a complete, upfront analysis of a software system is difficult, and usually not...
Chih-Wei Ho, Michael J. Johnson, Laurie Williams, ...
SIGSOFT
2006
ACM
14 years 2 months ago
Simulation-based test adequacy criteria for distributed systems
Developers of distributed systems routinely construct discrete-event simulations to help understand and evaluate the behavior of inter-component protocols. Simulations are abstrac...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
JCIT
2008
154views more  JCIT 2008»
13 years 8 months ago
A Multi-Agent Framework for Testing 3-Tier Distributed Systems Architecture
Lack of time and capital for software testing is an oft encountered problem in most organizations. The plethora of possible test cases for each software component makes software t...
Sunitha Ramanujam, Hany F. El Yamany, Miriam A. M....
JLP
2010
73views more  JLP 2010»
13 years 3 months ago
Composing model programs for analysis
Model programs are high-level behavioral specifications used for software testing and design analysis. Composition of model programs is a versatile technique that, at one end of t...
Margus Veanes, Jonathan Jacky