Sciweavers

443 search results - page 33 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
IADIS
2008
15 years 1 months ago
Data Mining Applications in Intelligent Integrated Development Environments
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
WPES
2003
ACM
15 years 5 months ago
Privacy preserving database application testing
Traditionally, application software developers carry out their tests on their own local development databases. However, such local databases usually have only a small number of sa...
Xintao Wu, Yongge Wang, Yuliang Zheng
ISSA
2008
15 years 1 months ago
The Information Security of a Bluetooth-Enabled Handheld Device
Bluetooth connectivity allows workers to access information anywhere, including both personal and corporate information. Software and applications have been specifically developed...
Frankie Tvrz, Marijke Coetzee
SIGSOFT
2006
ACM
15 years 5 months ago
Simulation-based test adequacy criteria for distributed systems
Developers of distributed systems routinely construct discrete-event simulations to help understand and evaluate the behavior of inter-component protocols. Simulations are abstrac...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
OOPSLA
2004
Springer
15 years 5 months ago
Example centric programming
Programmers tend to understand programs by thinking of concrete examples. Example Centric Programming seeks to add IDE support for examples throughout the process of programming. ...
Jonathan Edwards