Sciweavers

ICST
2008
IEEE
14 years 6 months ago
Automated Session Data Repair for Web Application Regression Testing
This paper introduces an approach to web application regression testing, based upon repair of user session data. The approach is entirely automated. It consists of a white box exa...
Mark Harman, Nadia Alshahwan
ICST
2008
IEEE
14 years 6 months ago
Testing Java Components based on Algebraic Specifications
This paper presents a method of component testing based on algebraic specifications. An algorithm for generating checkable test cases is proposed. A prototype testing tool called ...
Bo Yu, Liang Kong, Yufeng Zhang, Hong Zhu
ICST
2008
IEEE
14 years 6 months ago
A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy
This paper presents a MOF-compliant metamodel for calculating software metrics and demonstrates how it is used to generate a metrics tool that calculates coupling and cohesion met...
Jacqueline A. McQuillan, James F. Power
ICST
2008
IEEE
14 years 6 months ago
On Combining Multi-formalism Knowledge to Select Models for Model Transformation Testing
Testing remains a major challenge for model transformation development. Test models that are used as test data for model transformations, are constrained by various sources of kno...
Sagar Sen, Benoit Baudry, Jean-Marie Mottu
ICST
2008
IEEE
14 years 6 months ago
Efficient Test Data Generation for Variables with Complex Dependencies
This paper introduces a new method for generating test data that combines the benefits of equivalence partitioning, boundary value analysis and cause-effect analysis. It is suitab...
Armin Beer, Stefan Mohacsi
ICST
2008
IEEE
14 years 6 months ago
Designing and Building a Software Test Organization
–Abstract for conference - preliminary Model-Based Testing: Models for Test Cases Jan Tretmans, Embedded Systems Institute, Eindhoven : Systematic testing of software plays an im...
Bruce Benton
ICST
2008
IEEE
14 years 6 months ago
Model-Based Quality Assurance of Windows Protocol Documentation
Microsoft is producing high-quality documentation for Windows client-server and server-server protocols. Our group in the Windows organization is responsible for verifying the doc...
Wolfgang Grieskamp, Nicolas Kicillof, Dave MacDona...
ICST
2008
IEEE
14 years 6 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
ICST
2008
IEEE
14 years 6 months ago
Scheduling Timed Modules for Correct Resource Sharing
Real-time embedded systems typically include concurrent tasks of different priorities with time-dependent operations accessing common resources. In this context, unsynchronized pa...
Cristina Cerschi Seceleanu, Paul Pettersson, Hans ...
ICST
2008
IEEE
14 years 6 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams