Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classif...
The eXtensible Markup Language (XML) is widely used to transmit data across the Internet. XML schemas are used to define the syntax of XML messages. XML-based applications can re...
The software development process imposes major impacts on the quality of software at every development stage; therefore, a common goal of each software development phase concerns ...
A classic question in software development is “H ow much testing is enough?” Aside from dynamic coverage-based metrics, there are few measures that can be used to provide guid...
Nachiappan Nagappan, Laurie A. Williams, Jason Osb...
In wireless sensor networks, to obtain reliability and minimize energy consumption, a dynamic rate-control and congestion-avoidance transport scheme is very important. We notice t...
The difficulty of managing variations and their potential interactions across an entire product line currently hinders safety analysis in safety-critical, software product lines. ...
Code prioritization for testing promises to achieve the maximum testing coverage with the least cost. This paper presents an innovative method to provide hints on which part of co...