Sciweavers

ICST
2011
IEEE
13 years 3 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
ICST
2011
IEEE
13 years 3 months ago
EFindBugs: Effective Error Ranking for FindBugs
—Static analysis tools have been widely used to detect potential defects without executing programs. It helps programmers raise the awareness about subtle correctness issues in t...
Haihao Shen, Jianhong Fang, Jianjun Zhao
ICST
2011
IEEE
13 years 3 months ago
It is Not the Length That Matters, It is How You Control It
—The length of test cases is a little investigated topic in search-based test generation for object oriented software, where test cases are sequences of method calls. While intui...
Gordon Fraser, Andrea Arcuri
ICST
2011
IEEE
13 years 3 months ago
Applying aggressive propagation-based strategies for testing changes
—Test-suite augmentation for evolving software— the process of augmenting a test suite to adequately test software changes—is necessary for any program that undergoes modifi...
Raúl A. Santelices, Mary Jean Harrold
ICST
2011
IEEE
13 years 3 months ago
Assessing Oracle Quality with Checked Coverage
—A known problem of traditional coverage metrics is that they do not assess oracle quality—that is, whether the computation result is actually checked against expectations. In ...
David Schuler, Andreas Zeller
ICST
2011
IEEE
13 years 3 months ago
Exploiting Common Object Usage in Test Case Generation
—Generated test cases are good at systematically exploring paths and conditions in software. However, generated test cases often do not make sense. We adapt test case generation ...
Gordon Fraser, Andreas Zeller
ICST
2011
IEEE
13 years 3 months ago
An Empirical Study on the Relation between Dependency Neighborhoods and Failures
—Changing source code in large software systems is complex and requires a good understanding of dependencies between software components. Modification to components with little ...
Thomas Zimmermann, Nachiappan Nagappan, Kim Herzig...
ICST
2011
IEEE
13 years 3 months ago
Constraint-Based Program Debugging Using Data Structure Repair
—Developers have used data structure repair over the last few decades as an effective means to recover on-the-fly from errors in program state. Traditional repair techniques wer...
Muhammad Zubair Malik, Junaid Haroon Siddiqui, Sar...