Sciweavers

2071 search results - page 239 / 415
» An Empirical Evaluation of LFG-DOP
Sort
View
ISSTA
2009
ACM
15 years 7 months ago
Time-aware test-case prioritization using integer linear programming
Techniques for test-case prioritization re-order test cases to increase their rate of fault detection. When there is a fixed time budget that does not allow the execution of all ...
Lu Zhang, Shan-Shan Hou, Chao Guo, Tao Xie, Hong M...
SP
2007
IEEE
15 years 7 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
15 years 7 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...
ISSRE
2006
IEEE
15 years 7 months ago
Studying the Characteristics of a "Good" GUI Test Suite
The widespread deployment of graphical-user interfaces (GUIs) has increased the overall complexity of testing. A GUI test designer needs to perform the daunting task of adequately...
Qing Xie, Atif M. Memon
SCAM
2006
IEEE
15 years 7 months ago
Stop-List Slicing
Traditional program slicing requires two parameters: a program location and a variable, or perhaps a set of variables, of interest. Stop-list slicing adds a third parameter to the...
Keith Gallagher, David Binkley, Mark Harman