Sciweavers

1310 search results - page 33 / 262
» On a Class of Traceability Codes
Sort
View
ISSTA
2006
ACM
14 years 1 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
ACMSE
2007
ACM
13 years 11 months ago
A case study in test management
Testing is an essential but often under-utilized area of software engineering. A variety of software testing techniques have been developed to effectively identify bugs in source ...
Tauhida Parveen, Scott R. Tilley, George Gonzalez
ASIACRYPT
2001
Springer
13 years 11 months ago
Efficient Traitor Tracing Algorithms Using List Decoding
Abstract. We use powerful new techniques for list decoding errorcorrecting codes to efficiently trace traitors. Although much work has focused on constructing traceability schemes,...
Alice Silverberg, Jessica Staddon, Judy L. Walker
MIE
2008
117views Healthcare» more  MIE 2008»
13 years 9 months ago
An electronic registry for physiotherapists in Belgium
This paper describes the results of the KINELECTRICS project. Since more and more clinical documents are stored and transmitted in an electronic way, the aim of this project was to...
Ronald Buyl, Marc Nyssen
KBSE
2010
IEEE
13 years 6 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes