Manual reviews and inspections of software artefacts are time consuming and thus, automated analysis tools have been developed to support the quality assurance of software artefac...
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
Because of their complexity, business transactions are prone to failure in many ways. This paper reports on our experience using a fault-based testing approach. The approach overco...
Marisa A. Sanchez, Juan Carlos Augusto, Miguel Fel...
Shadow mapping is a technique for doing real-time shadowing. Recent work has shown that shadow mapping hardware can be used as a second depth test in addition to the z-test. In th...