Sciweavers

682 search results - page 121 / 137
» Java Implementation Verification Using Reverse Engineering
Sort
View
CCS
2008
ACM
13 years 9 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
POPL
2005
ACM
14 years 7 months ago
Mutatis mutandis: safe and predictable dynamic software updating
Dynamic software updates can be used to fix bugs or add features to a running program without downtime. Essential for some applications and convenient for others, low-level dynami...
Gareth Stoyle, Michael W. Hicks, Gavin M. Bierman,...
ISSRE
2003
IEEE
14 years 24 days ago
Test-Driven Development as a Defect-Reduction Practice
Test-driven development is a software development practice that has been used sporadically for decades. With this practice, test cases (preferably automated) are incrementally wri...
Laurie A. Williams, E. Michael Maximilien, Mladen ...
GECCO
2006
Springer
148views Optimization» more  GECCO 2006»
13 years 11 months ago
A specification-based fitness function for evolutionary testing of object-oriented programs
Encapsulation of states in object-oriented programs hinders the search for test data using evolutionary testing. As client code is oblivious to the internal state of a server obje...
Yoonsik Cheon, Myoung Kim
PTS
2008
165views Hardware» more  PTS 2008»
13 years 9 months ago
Test Plan Generation for Concurrent Real-Time Systems Based on Zone Coverage Analysis
The state space explosion due to concurrency and timing constraints of concurrent real-time systems (CRTS) presents significant challenges to the verification engineers. In this pa...
Farn Wang, Geng-Dian Huang