Sciweavers

2419 search results - page 151 / 484
» A Formal Approach to Software Testing
Sort
View
118
Voted
ICFEM
2009
Springer
15 years 10 months ago
Symbolic Query Exploration
Abstract. We study the problem of generating a database and parameters for a given parameterized SQL query satisfying a given test condition. We introduce a formal background theor...
Margus Veanes, Pavel Grigorenko, Peli de Halleux, ...
166
Voted
SIGSOFT
2010
ACM
15 years 1 months ago
Representation dependence testing using program inversion
The definition of a data structure may permit many different concrete representations of the same logical content. A (client) program that accepts such a data structure as input i...
Aditya Kanade, Rajeev Alur, Sriram K. Rajamani, Ga...
173
Voted
ICST
2009
IEEE
15 years 1 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
238
Voted
AADEBUG
2005
Springer
15 years 9 months ago
Code coverage testing using hardware performance monitoring support
Code coverage analysis, the process of finding code exercised by a particular set of test inputs, is an important component of software development and verification. Most tradit...
Alex Shye, Matthew Iyer, Vijay Janapa Reddi, Danie...
125
Voted
AGILEDC
2007
IEEE
15 years 10 months ago
Scrum and CMMI Level 5: The Magic Potion for Code Warriors
Projects combining agile methods with CMMI1 are more successful in producing higher quality software that more effectively meets customer needs at a faster pace. Systematic Softwa...
Jeff Sutherland, Carsten Ruseng Jakobsen, Kent Joh...