Sciweavers

290 search results - page 36 / 58
» Using a Software Testing Technique to Improve Theorem Provin...
Sort
View
PAISI
2007
Springer
14 years 4 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
VLDB
1998
ACM
110views Database» more  VLDB 1998»
14 years 2 months ago
Massive Stochastic Testing of SQL
Deterministic testing of SQL database systems is human intensive and cannot adequately cover the SQL input domain. A system (RAGS), was built to stochastically generate valid SQL ...
Donald R. Slutz
INFSOF
2011
176views more  INFSOF 2011»
13 years 5 months ago
Testing in Service Oriented Architectures with dynamic binding: A mapping study
Context: Service Oriented Architectures (SOA) have emerged as a new paradigm to develop interoperable and highly dynamic applications. Objective: This paper aims to identify the s...
Marcos Palacios, José García-Fanjul,...
ESE
2006
154views Database» more  ESE 2006»
13 years 10 months ago
Prioritizing JUnit Test Cases: An Empirical Assessment and Cost-Benefits Analysis
Test case prioritization provides a way to run test cases with the highest priority earliest. Numerous empirical studies have shown that prioritization can improve a test suite�...
Hyunsook Do, Gregg Rothermel, Alex Kinneer
ANSS
2006
IEEE
14 years 4 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...