Sciweavers

1518 search results - page 68 / 304
» Cryptographic Test Correction
Sort
View
122
Voted
ASSETS
2008
ACM
15 years 2 months ago
A comparative test of web accessibility evaluation methods
Accessibility auditors have to choose a method when evaluating accessibility: expert review (a.k.a. conformance testing), user testing, subjective evaluations, barrier walkthrough...
Giorgio Brajnik
110
Voted
EDBT
2008
ACM
133views Database» more  EDBT 2008»
15 years 2 months ago
Action synchronization in P2P system testing
Testing peer-to-peer (P2P) systems is difficult because of the high numbers of nodes which can be heterogeneous and volatile. A test case may be composed of several ordered action...
Eduardo Cunha de Almeida, Gerson Sunyé, Pat...
91
Voted
AIPS
2000
15 years 1 months ago
Plan Generation for GUI Testing
Graphical user interfaces (GUIs) have become nearly ubiquitous as a means of interacting with software systems. GUIs are typically highly complex pieces of software, and testing t...
Atif M. Memon, Martha E. Pollack, Mary Lou Soffa
99
Voted
ICSE
2003
IEEE-ACM
16 years 20 days ago
Requirements Discovery during the Testing of Safety-Critical Software
This paper describes the role of requirements discovery during the testing of a safety-critical software system. Analysis of problem reports generated by the integration and syste...
Robyn R. Lutz, Ines Carmen Mikulski
CCGRID
2007
IEEE
15 years 7 months ago
Build-and-Test Workloads for Grid Middleware: Problem, Analysis, and Applications
The Grid promise is starting to materialize today: largescale multi-site infrastructures have grown to assist the work of scientists from all around the world. This tremendous gro...
Alexandru Iosup, Dick H. J. Epema