Sciweavers

3547 search results - page 48 / 710
» Pseudo-Exhaustive Testing for Software
Sort
View
ISSRE
2010
IEEE
14 years 10 months ago
Calibrating Probabilistic GUI Testing Models Based on Experiments and Survival Analysis
—Models abstract reality. Although abstract, such models can capture the essence of real world phenomena as long as they are sufficiently accurate. The development of new techni...
Cristiano Bertolini, Alexandre Mota, Eduardo Aranh...
TCAD
2011
14 years 6 months ago
Using Launch-on-Capture for Testing Scan Designs Containing Synchronous and Asynchronous Clock Domains
—This paper presents a hybrid automatic test pattern generation (ATPG) technique using the staggered launch-oncapture (LOC) scheme followed by the one-hot LOC scheme for testing ...
Shianling Wu, Laung-Terng Wang, Xiaoqing Wen, Zhig...
ICST
2009
IEEE
14 years 9 months ago
Penetration Testing with Improved Input Vector Identification
Penetration testing is widely used to help ensure the security of web applications. It discovers vulnerabilities by simulating attacks from malicious users on a target application...
William G. J. Halfond, Shauvik Roy Choudhary, Ales...
ISSRE
2010
IEEE
14 years 10 months ago
DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing
—Web 2.0 applications are increasing in popularity. However, they are also prone to errors because of their dynamic nature. This paper presents DoDOM, an automated system for tes...
Karthik Pattabiraman, Benjamin G. Zorn
ICST
2011
IEEE
14 years 3 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...