Sciweavers

747 search results - page 40 / 150
» Testing for tunneling opens
Sort
View
COMPSAC
2008
IEEE
14 years 3 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
SBCCI
2005
ACM
185views VLSI» more  SBCCI 2005»
14 years 2 months ago
Automatic generation of test sets for SBST of microprocessor IP cores
Higher integration densities, smaller feature lengths, and other technology advances, as well as architectural evolution, have made microprocessor cores exceptionally complex. Cur...
Ernesto Sánchez, Matteo Sonza Reorda, Giova...
SIGSOFT
2004
ACM
14 years 2 months ago
Using an SQL coverage measurement for testing database applications
Many software applications have a component based on database management systems in which information is generally handled through SQL queries embedded in the application code. Wh...
María José Suárez Cabal, Javi...
COMPSAC
1999
IEEE
14 years 1 months ago
Testing Extensible Design Patterns in Object-Oriented Frameworks through Scenario Templates
Design patterns have been used in object-oriented frameworks such as the IBM San Francisco framework, Apple's Rhaspody, OpenStep, and WebObjects, and DIWB. However, few guide...
Wei-Tek Tsai, Yongzhong Tu, Weiguang Shao, Ezra Eb...
ITC
1998
IEEE
71views Hardware» more  ITC 1998»
14 years 1 months ago
A structured and scalable mechanism for test access to embedded reusable cores
The main objective of core-based IC design is improvement of design efficiency and time-to-market. In order to prevent test development from becoming the bottleneck in the entire ...
Erik Jan Marinissen, Robert G. J. Arendsen, Gerard...