Sciweavers

KBSE
2010
IEEE
13 years 11 months ago
How did you specify your test suite
Although testing is central to debugging and software certification, there is no adequate language to specify test suites over source code. Such a language should be simple and c...
Andreas Holzer, Christian Schallhart, Michael Taut...
KBSE
2010
IEEE
13 years 11 months ago
RESISTing reliability degradation through proactive reconfiguration
Situated software systems are an emerging class of systems that are predominantly pervasive, embedded, and mobile. They are marked with a high degree of unpredictability and dynam...
Deshan Cooray, Sam Malek, Roshanak Roshandel, Davi...
KBSE
2010
IEEE
13 years 11 months ago
Apt-pbo: solving the software dependency problem using pseudo-boolean optimization
The installation of software packages depends on the correct resolution of dependencies and conflicts between packages. This problem is NP-complete and, as expected, is a hard ta...
Paulo Trezentos, Inês Lynce, Arlindo L. Oliv...
KBSE
2010
IEEE
13 years 11 months ago
Eliminating products to test in a software product line
A Software Product Line (SPL) is a family of programs. Testing an SPL is a challenge because the number of programs to examine may be exponential in the number of features. Howeve...
Chang Hwan Peter Kim, Don S. Batory, Sarfraz Khurs...
KBSE
2010
IEEE
13 years 11 months ago
A bounded statistical approach for model checking of unbounded until properties
We study the problem of statistical model checking of probabilistic systems for PCTL unbounded until property P1p(ϕ1 U ϕ2) (where 1 ∈ {<, ≤, >, ≥}) using the computa...
Ru He, Paul Jennings, Samik Basu, Arka P. Ghosh, H...
KBSE
2010
IEEE
13 years 11 months ago
MiTV: multiple-implementation testing of user-input validators for web applications
User-input validators play an essential role in guarding a web application against application-level attacks. Hence, the security of the web application can be compromised by defe...
Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, N...
KBSE
2010
IEEE
13 years 11 months ago
Security-driven model-based dynamic adaptation
Brice Morin, Tejeddine Mouelhi, Franck Fleurey, Yv...
KBSE
2010
IEEE
13 years 11 months ago
Analyzing security architectures
We present a semi-automated approach, Secoria, for analyzing a security runtime architecture for security and for conformance to an object-oriented implementation. Typecheckable a...
Marwan Abi-Antoun, Jeffrey M. Barnes
KBSE
2010
IEEE
13 years 11 months ago
Automated model grouping
Michael Becker, Volker Gruhn