Sciweavers

185 search results - page 17 / 37
» Generating test cases for specification mining
Sort
View
COMPSAC
2009
IEEE
13 years 11 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
FAC
2008
100views more  FAC 2008»
13 years 7 months ago
Slicing communicating automata specifications: polynomial algorithms for model reduction
Abstract. Slicing is a program analysis technique that was originally introduced to improve program debugging and understanding. The purpose of a slicing algorithm is to remove the...
Sébastien Labbé, Jean-Pierre Gallois
HASE
2008
IEEE
13 years 7 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
JOT
2007
277views more  JOT 2007»
13 years 7 months ago
REMM-Studio: an Integrated Model-Driven Environment for Requirements Specification, Validation and Formatting
In order to integrate requirements into the current Model-Driven Engineering (MDE) approach, the traditional document-based requirements specification process should be changed in...
Cristina Vicente-Chicote, Begoña Moros, Jos...
CHI
2009
ACM
14 years 8 months ago
Bringing web 2.0 to government research: a case study
DASHlink is a public NASA research collaboration website. Web 2.0 style content generation and social software technologies along with a communitymoderated posting policy make it ...
Francesca A. Barrientos, Elizabeth A. Foughty, Daw...