Sciweavers

185 search results - page 17 / 37
» Generating test cases for specification mining
Sort
View
COMPSAC
2009
IEEE
15 years 3 months ago
GUI-Based Testing of Boundary Overflow Vulnerability
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
Tugkan Tuglular, Can A. Muftuoglu, Özgür...
FAC
2008
100views more  FAC 2008»
14 years 11 months ago
Slicing communicating automata specifications: polynomial algorithms for model reduction
Abstract. Slicing is a program analysis technique that was originally introduced to improve program debugging and understanding. The purpose of a slicing algorithm is to remove the...
Sébastien Labbé, Jean-Pierre Gallois
HASE
2008
IEEE
14 years 11 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
JOT
2007
277views more  JOT 2007»
14 years 11 months ago
REMM-Studio: an Integrated Model-Driven Environment for Requirements Specification, Validation and Formatting
In order to integrate requirements into the current Model-Driven Engineering (MDE) approach, the traditional document-based requirements specification process should be changed in...
Cristina Vicente-Chicote, Begoña Moros, Jos...
CHI
2009
ACM
15 years 12 months ago
Bringing web 2.0 to government research: a case study
DASHlink is a public NASA research collaboration website. Web 2.0 style content generation and social software technologies along with a communitymoderated posting policy make it ...
Francesca A. Barrientos, Elizabeth A. Foughty, Daw...