Sciweavers

443 search results - page 31 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
ICSE
1999
IEEE-ACM
15 years 4 months ago
Residual Test Coverage Monitoring
Structural coverage criteria are often used as an indicator of the thoroughness of testing, but complete satisfaction of a criterion is seldom achieved. When a software product is...
Christina Pavlopoulou, Michal Young
ICEIS
2009
IEEE
15 years 6 months ago
AgEx: A Financial Market Simulation Tool for Software Agents
Many researchers in the software agent field use the financial domain as a test bed to develop adaptation, cooperation and learning skills of software agents. However, there are no...
Paulo André Lima de Castro, Jaime Sim&atild...
WCNC
2010
IEEE
15 years 3 months ago
Cross Layer Implementation of a Multi-User MIMO Test-Bed
Abstract—This paper describes an implementation of a realtime multi-user multiple-input multiple-output (MU-MIMO) communication system, with cross-layer channel-aware scheduling....
Niklas Jalden, Svante Bergman, Per Zetterberg, Bj&...
HPCA
2005
IEEE
16 years 6 days ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
PLDI
2005
ACM
15 years 5 months ago
DART: directed automated random testing
We present a new tool, named DART, for automatically testing software that combines three main techniques: (1) automated extraction of the interface of a program with its external...
Patrice Godefroid, Nils Klarlund, Koushik Sen