Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by 
    •   5  
      Web ServicesRegression TestingAutomationWeb Service
    • by 
    •   8  
      Mechanical EngineeringMechatronicsDependabilityUML
Abstract-Web application security is the hottest issue in the present scenario of e-business environment. Web application attacks can play havoc with the system within no time. More than 80% attacks are at application layer and almost 90%... more
    • by 
    •   20  
      Information TechnologyService Oriented ArchitectureComputer SecurityDatabases
Software Testing is the emerging and important field of IT industry because without the concept of software testing, there is no quality software which is produced in the industry. Verification and Validation are the two basic building... more
    • by 
    •   4  
      White Box TestingControl Flow GraphBasis Path TestingCyclomatic Complexity
    • by 
    •   2  
      Data representationControl Flow Graph
    • by 
    •   4  
      Program AnalysisCode compressionCode OptimizationControl Flow Graph
    • by 
    •   15  
      Computer ScienceArtificial IntelligenceReliability EngineeringProblem Solving
    • by 
    •   11  
      Information SystemsSoftware TestingQuality AssuranceComputer Software
Applications written in dynamically typed scripting languages are increasingly popular for Web software development. Even on the server side, programmers are using dynamically typed scripting languages such as Ruby and Python to build... more
    • by 
    •   7  
      LanguagesComputer ScienceSoftware DevelopmentWorking Memory
Although graphical user interfaces (GUIs) constitute a large part of the software being developed today and are typically created using rapid prototyping, there are no effective regression testing techniques for GUIs. The needs of GUI... more
    • by 
    •   8  
      Computer ScienceRapid PrototypingNational Science FoundationRegression Testing
    • by 
    •   10  
      Virtual MachinesData PrivacyVirtual MachineIndexing
    • by 
    •   13  
      Software TestingSoftware DevelopmentHeuristic SearchDynamic Analysis
    • by 
    •   13  
      Software TestingSoftware DevelopmentHeuristic SearchDynamic Analysis
    • by 
    •   8  
      Flow ControlError CorrectionSoftware Fault ToleranceMatrix Multiplication
    • by 
    •   7  
      Static AnalysisProgram AnalysisFlow ControlException Handling
    • by 
    •   10  
      Embedded SystemsComputer HardwareComputer SoftwareCode compression
    • by 
    •   7  
      Information SystemsGraph MiningWorkflow Management SystemsProfitability
    • by 
    •   10  
      Static AnalysisReverse EngineeringSql InjectionSecurity Policy
This paper presents a software-based technique to detect control-flow errors using basic level control-flow checking and inherent redundancy in commodity multi-core processors. The proposed detection technique is composed of two phases of... more
    • by 
    •   10  
      Flow ControlHardwareTransient analysisRedundancy
    • by 
    •   8  
      Algorithmic CompositionFlow ControlParallel ProcessingFixed Point Theory
Software Testing is one of the indispensable parts of the software development lifecycle and structural testing is one of the most widely used testing paradigms to test various software. Structural testing relies on code path... more
    • by 
    •   6  
      Software TestingAnt Colony OptimizationSoftware DevelopmentControl Flow Graph
    • by 
    •   10  
      AlgorithmsComputer SecurityEncryptionComputers
    • by 
    •   8  
      CompilersProgram TransformationCode GenerationJIT Compilation
In this paper, we present two new control flow based pointcuts to Aspect-Oriented Programming (AOP) languages that are needed for systematic hardening of security concerns. They allow to identify particular join points in a program's... more
    • by 
    •   4  
      Flow ControlCase StudyAspect Oriented ProgrammingControl Flow Graph
    • by 
    •   6  
      Computer ArchitectureProcess ControlFlow ControlMulti-threading
    • by 
    •   8  
      Digital Signal ProcessingReverse EngineeringDelaysDigital Signal Processor
    • by 
    •   10  
      Embedded SystemsComputer HardwareComputer SoftwareCode compression
    • by 
    •   6  
      OPERATING SYSTEMSecurity PolicySource CodeUser Interaction
    • by 
    •   10  
      Software EngineeringSix SigmaQuality AssuranceSe
    • by 
    •   5  
      Computer SoftwareData Flow DiagramSystems ArchitectureControl Flow Graph
    • by 
    •   9  
      Computer HardwareComplex SystemFunctional VerificationLevels of Abstraction
    • by  and +1
    •   13  
      Programming LanguagesCompilersComputational ComplexityProgram Analysis
Program analysis is useful for debugging, testing and maintenance of software systems due to information about the structure and relationship of the program’s modules . In general, program analysis is performed either based on control... more
    • by 
    •   7  
      Program AnalysisBuilding Maintenance ManagementAspect Oriented Software DevelopmentControl Flow Graph
    • by 
    •   5  
      Machine LearningHashingText-based SearchingControl Flow Graph
    • by 
    •   15  
      Information SystemsComputer ScienceSoftware EngineeringTechnology
... Islamabad, Pakistan a.rauf@nu.edu.pk Sajid Anwar Department of Computer Science National university of Computer & Emerging Sciences Islamabad, Pakistansajid.anwar@nu.edu.pk M. Arfan Jaffer Department of Computer ...
    • by 
    •   20  
      Computer ScienceGraph TheoryData AnalysisGenetic Algorithms
A major concern in implementing a checkpoint-based recovery protocol for distributed systems is the performance degradation resulting from process roll-backs. In critical systems, it is highly desirable to contain the rollback distance as... more
    • by 
    •   10  
      Computer ScienceDistributed SystemDistributed SystemsKey words
    • by 
    •   2  
      Code CoverageControl Flow Graph
Detection tools such as virus scanners have performed poorly, particularly when facing previously unknown virus or novel variants of existing ones. This study proposes an efficient and novel method based on arbitrary length of control... more
    • by 
    •   5  
      Ubiquitous Computingmetamorphic VirusAntivirusSimilarity Measurement
    • by 
    •   9  
      Embedded SoftwareComputer HardwareSystem DesignCode Generation
Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to prevent them. We present write integrity testing (WIT), a new... more
    • by 
    •   8  
      Static AnalysisPrivacyInstrumentationColor
    • by 
    •   7  
      Graph TheoryProgram AnalysisProgram SlicingComputer Software
    • by 
    •   2  
      Data representationControl Flow Graph
    • by 
    •   7  
      Information SystemsGraph MiningWorkflow Management SystemsProfitability
    • by 
    •   3  
      High Performance ComputingHigh performance computerControl Flow Graph
    • by  and +1
    •   12  
      Computer ScienceReconfigurable ComputingFlow ControlSoftware Design
This paper presents a software-based technique to detect control-flow errors using basic level control-flow checking and inherent redundancy in commodity multi-core processors. The proposed detection technique is composed of two phases of... more
    • by 
    •   11  
      Flow ControlHardwareTransient analysisRedundancy
A program analysis tool can play an important role in helping users understand and improve OpenMP codes. Dragon is a robust interactive program analysis tool based on the Open64 compiler, an open source OpenMP, C/C++/Fortran77/90 compiler... more
    • by 
    •   7  
      Vernacular ArchitectureOpen SourceData DependenceData Access
    • by 
    •   10  
      Embedded SystemsComputer HardwareComputer SoftwareCode compression
    • by 
    •   10  
      Distributed ComputingTiming AnalysisEmbedded SoftwareWorst-Case Execution Time Analysis