Sciweavers

1718 search results - page 86 / 344
» Modeling and testing of cloud applications
Sort
View
AAAI
2012
12 years 10 days ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
ASPDAC
2004
ACM
151views Hardware» more  ASPDAC 2004»
14 years 3 months ago
Combinatorial group testing methods for the BIST diagnosis problem
— We examine an abstract formulation of BIST diagnosis in digital logic systems. The BIST diagnosis problem has applications that include identification of erroneous test vector...
Andrew B. Kahng, Sherief Reda
ICECCS
2002
IEEE
91views Hardware» more  ICECCS 2002»
14 years 2 months ago
Mars Polar Lander Fault Identification Using Model-based Testing
This paper describes the application of the Test Automation Framework on the Mars Polar Lander (MPL) software. The premature shutdown of the descent engine on the MPL spacecraft i...
Mark R. Blackburn, Robert Busser, Aaron Nauman, Ro...
PVLDB
2008
108views more  PVLDB 2008»
13 years 9 months ago
Taming verification hardness: an efficient algorithm for testing subgraph isomorphism
Graphs are widely used to model complicated data semantics in many applications. In this paper, we aim to develop efficient techniques to retrieve graphs, containing a given query...
Haichuan Shang, Ying Zhang, Xuemin Lin, Jeffrey Xu...
ROMAN
2007
IEEE
156views Robotics» more  ROMAN 2007»
14 years 4 months ago
Development and User Testing of the Gestural Joystick for Gloves-On Hazardous Environments
— For controlling robots in an urban search and rescue (USAR) application, we present a wearable joystick with improved sensing capability as well as Giant MagnetoResistance(GMR)...
Jaewook Bae, Amy C. Larson, Richard M. Voyles, Roy...