We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Abstract. MPI implementations are faced with growingly complex network configurations containing multiple network interfaces per node, NAT, or dual stacks. To implement handling l...
Wolfgang Schnerring, Christian Kauhaus, Dietmar Fe...
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...
This paper presents an agent-based software environment for testing web-based applications. The infrastructure of the system consists of a lightweight agent platform that supports...
This paper is about the elicitation of the requirements for an intelligent interface for a software test development environment that will accommodate the physically challenged (P...