Sciweavers

ICST
2009
IEEE
14 years 6 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ICST
2009
IEEE
14 years 6 months ago
An Initial Characterization of Industrial Graphical User Interface Systems
To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners...
Penelope A. Brooks, Brian P. Robinson, Atif M. Mem...
ICST
2009
IEEE
14 years 6 months ago
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles
It is challenging to test applications and functions for which the correct output for arbitrary input cannot be known in advance, e.g. some computational science or machine learni...
Christian Murphy, Kuang Shen, Gail E. Kaiser
ICST
2009
IEEE
14 years 6 months ago
A Simple Coverage-Based Locator for Multiple Faults
Fault localization helps spotting faults in source code by exploiting automatically collected data. Deviating from other fault locators relying on hit spectra or test coverage inf...
Friedrich Steimann, Mario Bertschler
ICSM
2009
IEEE
14 years 6 months ago
Augmenting static source views in IDEs with dynamic metrics
Mainstream IDEs such as Eclipse support developers in managing software projects mainly by offering static views of the source code. Such a static perspective neglects any informa...
David Röthlisberger, Marcel Harry, Alex Villa...
ICSM
2009
IEEE
14 years 6 months ago
Introducing a test suite similarity metric for event sequence-based test cases
Most of today’s event driven software (EDS) systems are tested using test cases that are carefully constructed as sequences of events; they test the execution of an event in the...
Penelope A. Brooks, Atif M. Memon
ICSM
2009
IEEE
14 years 6 months ago
Detecting virus mutations via dynamic matching
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle...
Min Feng, Rajiv Gupta
ICSM
2009
IEEE
14 years 6 months ago
BCC: Enhancing code completion for better API usability
Nowadays, programmers spend much of their workday dealing with code libraries and frameworks that are bloated with APIs. One common way of interacting with APIs is through Code Co...
David M. Pletcher, Daqing Hou
ICSM
2009
IEEE
14 years 6 months ago
The squale model - A practice-based industrial quality model
ISO 9126 promotes a three-level model of quality (factors, criteria, and metrics) which allows one to assess quality at the top level of factors and criteria. However, it is difï¬...
Karine Mordal-Manet, Francoise Balmas, Simon Denie...
ICSM
2009
IEEE
14 years 6 months ago
A combinatorial approach to building navigation graphs for dynamic web applications
Modeling the navigation structure of a dynamic web application is a challenging task because of the presence of dynamic pages. In particular, there are two problems to be dealt wi...
Wenhua Wang, Yu Lei, Sreedevi Sampath, Raghu Kacke...