Sciweavers

1051 search results - page 124 / 211
» Protocols in the use of empirical software engineering artif...
Sort
View
QOSA
2010
Springer
14 years 27 days ago
Evaluating Maintainability with Code Metrics for Model-to-Model Transformations
Using model-to-model transformations to generate analysis models or code from architecture models is sought to promote compliance and reuse of components. The maintainability of tr...
Lucia Kapová, Thomas Goldschmidt, Steffen B...
SAC
2009
ACM
14 years 3 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...
FSTTCS
2003
Springer
14 years 2 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
ICSE
2009
IEEE-ACM
14 years 3 months ago
Lightweight fault-localization using multiple coverage types
Lightweight fault-localization techniques use program coverage to isolate the parts of the code that are most suspicious of being faulty. In this paper, we present the results of ...
Raúl A. Santelices, James A. Jones, Yanbing...
KBSE
2009
IEEE
14 years 3 months ago
Reggae: Automated Test Generation for Programs Using Complex Regular Expressions
Abstract—Test coverage such as branch coverage is commonly measured to assess the sufficiency of test inputs. To reduce tedious manual efforts in generating high-covering test i...
Nuo Li, Tao Xie, Nikolai Tillmann, Jonathan de Hal...