Testing of database applications is crucial for ensuring high software quality as undetected faults can result in unrecoverable data corruption. The problem of database applicatio...
ion, so mapping between GUI events and the underlying code is not straightforward. Code-based coverage criteria do not necessarily address problematic interactions between the GUI&...
The testing of the performance of opportunistic communication protocols and applications is usually done through simulation as i) deployments are expensive and should be left to t...
Roberta Calegari, Mirco Musolesi, Franco Raimondi,...
This paper details the results of a Face Authentication Test (FAT2004) [2] held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held ...
Kieron Messer, Josef Kittler, Mohammad Sadeghi, Mi...
End users develop more software than any other group of programmers, using software authoring devices such as e-mail filtering editors, by-demonstration macro builders, and spread...
Joseph R. Ruthruff, Margaret M. Burnett, Gregg Rot...