Sciweavers

2127 search results - page 93 / 426
» Software Automation
Sort
View
JUCS
2008
130views more  JUCS 2008»
15 years 2 months ago
Experimenting the Automated Selection of COTS Components Based on Cost and System Requirements
: In a component-based development process the selection of components is an activity that takes place over multiple lifecycle phases that span from requirement specifications thro...
Vittorio Cortellessa, Ivica Crnkovic, Fabrizio Mar...
ICST
2009
IEEE
15 years 20 days ago
An Empirical Evaluation of Automated Black Box Testing Techniques for Crashing GUIs
This paper reports an empirical evaluation of four blackbox testing techniques for crashing programs through their GUI interface: SH, AF, DH, and BxT. The techniques vary in their...
Cristiano Bertolini, Glaucia Peres, Marcelo d'Amor...
SAC
2009
ACM
15 years 9 months ago
HIVSetSubtype: software for subtype classification of HIV-1 sequences
An automated web based tool for assigning HIV-1 pure and recombinant subtypes within unaligned sequences is presented. The system combines the BLAST search algorithm and the recom...
Luciano Vieira de Araújo, Sabri S. Sanabani...
SICHERHEIT
2010
15 years 24 days ago
Amun: Automatic Capturing of Malicious Software
: This paper describes the low-interaction server honeypot Amun. Through the use of emulated vulnerabilities Amun aims at capturing malware in an automated fashion. The use of the ...
Jan Göbel
TIFS
2010
171views more  TIFS 2010»
14 years 9 months ago
A method for automatic identification of signatures of steganography software
Abstract--A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized ...
Graeme Bell, Yeuan-Kuen Lee