Sciweavers

4095 search results - page 299 / 819
» How to test a tree
Sort
View
101
Voted
ICSE
2008
IEEE-ACM
16 years 25 days ago
Proposing SQL statement coverage metrics
An increasing number of cyber attacks are occurring at the application layer when attackers use malicious input. These input validation vulnerabilities can be exploited by (among ...
Ben H. Smith, Yonghee Shin, Laurie Williams
101
Voted
DAC
2003
ACM
16 years 1 months ago
Seed encoding with LFSRs and cellular automata
Reseeding is used to improve fault coverage of pseudorandom testing. The seed corresponds to the initial state of the PRPG before filling the scan chain. In this paper, we present...
Ahmad A. Al-Yamani, Edward J. McCluskey
78
Voted
ISBI
2008
IEEE
16 years 1 months ago
Statistical colocalization in biological imaging with false discovery control
In this paper, we present a novel object-based statistical colocalization method. Our colocalization relies on multiple hypothesis tests on the distances between all pairs of the ...
Bo Zhang, Nicolas Chenouard, Jean-Christophe Olivo...
100
Voted
CHI
2007
ACM
16 years 1 months ago
BrickRoad: a light-weight tool for spontaneous design of location-enhanced applications
It is difficult to design and test location-enhanced applications. A large part of this difficulty is due to the added complexity of supporting location. Wizard of Oz (WOz) has be...
Alan L. Liu, Yang Li
DSN
2009
IEEE
15 years 7 months ago
Fitness-guided path exploration in dynamic symbolic execution
Dynamic symbolic execution is a structural testing technique that systematically explores feasible paths of the program under test by running the program with different test input...
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wo...