One of the major challenges in IT security management is determining how much to spend and where to spend. This requires understanding of the economic issues regarding IT security...
—As current software systems evolve continuously, both the application and its user interface (UI) have to be adapted. However, UI code is often scattered through and entangled w...
Web services are often employed to create wide distributed evolvable applications from existing components that constitute a service-based software system. ServiceOriented Archite...
Test case generation is an expensive, tedious, and errorprone process in software testing. In this paper, test case generation is accomplished using an Extended Finite State Machi...
— This paper demonstrates that the algorithmic performance of end user programs may be greatly affected by the two or three level caching scheme of the processor, and we introduc...
The development of network-attached devices has ushered in an era of autonomous, multi-function equipment demanding minimal human interaction: the only requirements are data and e...
Michael J. McMahon Jr., Sergiu M. Dascalu, Frederi...
This paper introduces a framework for classifying and comparing three domains related to the process technology. More particularly, it gives process definitions, characteristics, m...
Automatic test data generation helps testers to validate software against user requirements more easily. Test data can be generated from many sources; for example, experience of t...
Chartchai Doungsa-ard, Keshav P. Dahal, M. Alamgir...
We investigate the trade off between investing effort in improving the features of a research environment that increases productivity and investing such effort in actually conduct...
Juan C. Quiroz, Anil Shankar, Sergiu M. Dascalu, S...
Following the agile philosophy that all core features of a system need an automated test harness, performance requirements also need such a check when they are essential for the s...