Sciweavers

1518 search results - page 64 / 304
» Cryptographic Test Correction
Sort
View
76
Voted
IEAAIE
2005
Springer
15 years 6 months ago
A Holistic Approach to Test-Driven Model Checking
Abstract. Testing is the most common validation method in the software industry. It entails the execution of the software system in the real environment. Nevertheless, testing is a...
Fevzi Belli, Baris Güldali
98
Voted
ISSRE
2002
IEEE
15 years 5 months ago
Test Reuse in the Spreadsheet Paradigm
Spreadsheet languages are widely used by a variety of end users to perform many important tasks. Despite their perceived simplicity, spreadsheets often contain faults. Furthermore...
Marc Fisher II, Dalai Jin, Gregg Rothermel, Margar...
ICCAD
1997
IEEE
144views Hardware» more  ICCAD 1997»
15 years 4 months ago
Partial scan delay fault testing of asynchronous circuits
Asynchronous circuits operate correctly only under timing assumptions. Hence testing those circuits for delay faults is crucial. This paper describes a three-step method to detect...
Michael Kishinevsky, Alex Kondratyev, Luciano Lava...
ISSRE
2003
IEEE
15 years 5 months ago
Exploiting Symmetries to Test Programs
Symmetries often appear as properties of many artifical settings. In Program Testing, they can be viewed as properties of programs and can be given by the tester to check the cor...
Arnaud Gotlieb
PTS
2000
58views Hardware» more  PTS 2000»
15 years 1 months ago
Formal Test Automation: The Conference Protocol with PHACT
We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (fo...
Lex Heerink, Jan Feenstra, Jan Tretmans