Sciweavers

1050 search results - page 79 / 210
» Generating Executable Scenarios from Natural Language
Sort
View
155
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
EDCC
2005
Springer
15 years 9 months ago
PathCrawler: Automatic Generation of Path Tests by Combining Static and Dynamic Analysis
Abstract. We present the PathCrawler prototype tool for the automatic generation of test-cases satisfying the rigorous all-paths criterion, with a user-defined limit on the number...
Nicky Williams, Bruno Marre, Patricia Mouy, Muriel...
137
Voted
WWW
2009
ACM
16 years 4 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
SAC
2003
ACM
15 years 9 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
BIS
2006
105views Business» more  BIS 2006»
15 years 5 months ago
Describing Business Processes with Use Cases
Business processes can be described with diagrams, e.g. BPMN diagrams, or as text. Use cases are a text-based notation. They are semiformal: a business process is expressed as a s...
Jerzy R. Nawrocki, Tomasz Nedza, Miroslaw Ochodek,...