Sciweavers

403 search results - page 22 / 81
» Insight knowledge in search based software testing
Sort
View
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 4 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
VLDB
2008
ACM
131views Database» more  VLDB 2008»
14 years 10 months ago
Primal or dual: which promises faster spatiotemporal search?
The existing predictive spatiotemporal indexes can be classified into two categories, depending on whether they are based on the primal or dual methodology. Although we have gaine...
Yufei Tao, Xiaokui Xiao
WWW
2003
ACM
14 years 11 months ago
A software framework for matchmaking based on semantic web technology
An important objective of the Semantic Web is to make Electronic Commerce interactions more flexible and automated. To achieve this, standardization of ontologies, message content...
Lei Li, Ian Horrocks
SCAM
2008
IEEE
14 years 5 months ago
Constructing Subtle Faults Using Higher Order Mutation Testing
Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easil...
Yue Jia, Mark Harman
FLAIRS
2004
13 years 12 months ago
The Power of Experience: On the Usefulness of Validation Knowledge
TURING Test technologies are promising ways to validate AI systems which may have no alternative way to indicate validity. Human experts (validators) are often too expensive to in...
Rainer Knauf, Setsuo Tsuruta, Kenichi Uehara, Taka...