Sciweavers

27 search results - page 4 / 6
» icst 2008
Sort
View
ICST
2008
IEEE
14 years 6 days ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
ICST
2008
IEEE
14 years 6 days ago
State-Based Testing of Ajax Web Applications
Ajax supports the development of rich-client Web applications, by providing primitives for the execution of asynchronous requests and for the dynamic update of the page structure ...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca
ICST
2008
IEEE
14 years 6 days ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
ICST
2008
IEEE
14 years 6 days ago
On Combining Multi-formalism Knowledge to Select Models for Model Transformation Testing
Testing remains a major challenge for model transformation development. Test models that are used as test data for model transformations, are constrained by various sources of kno...
Sagar Sen, Benoit Baudry, Jean-Marie Mottu
ICST
2008
IEEE
14 years 6 days ago
Distributed In Vivo Testing of Software Applications
The in vivo software testing methodology focuses on testing live applications by executing unit tests throughout the lifecycle, including after deployment. The motivation is that ...
Matt Chu, Christian Murphy, Gail E. Kaiser