Cryptographic verification of test coverage claims
نویسندگان
چکیده
منابع مشابه
Cryptographic Veriication of Test Coverage Claims
The market for software components is growing, driven on the \demand side" by the need for rapid deployment of highly functional products, and on the \supply side" by distributed object standards. As components and component vendors proliferate, there is naturally a growing concern about quality, and the eeectiveness of testing processes. White box testing, particularly the use of coverage crit...
متن کاملCryptographic Veri cation of Test Coverage Claims
The market for software components is growing, driven on the \demand side" by the need for rapid deployment of highly functional products, and on the \supply side" by distributed object standards. As components and component vendors proliferate, there is naturally a growing concern about quality, and the e ectiveness of testing processes. White box testing, particularly the use of coverage crit...
متن کاملCryptographic Veri cation of Test Coverage
The market for software components is growing, driven on the \demand side" by the need for rapid deployment of highly functional products, and on the \supply side" by distributed object standards. As components and component vendors proliferate, there is naturally a growing concern about quality, and the eeectiveness of testing processes. White box testing, particularly the use of coverage crit...
متن کاملVerification of unemployment benefits’ claims using Classifier Combination method
Unemployment insurance is one of the most popular insurance types in the modern world. The Social Security Organization is responsible for checking the unemployment benefits of individuals supported by unemployment insurance. Hand-crafted evaluation of unemployment claims requires a big deal of time and money. Data mining and machine learning as two efficient tools for data analysis can assist ...
متن کاملInductive Verification of Cryptographic Protocols
The dissertation aims at tailoring Paulson’s Inductive Approach for the analysis of classical cryptographic protocols towards real-world protocols. The aim is pursued by extending the approach with new elements (e.g. timestamps and smart cards), new network events (e.g. message reception) and more expressive functions (e.g. agents’ knowledge). Hence, the aim is achieved by analysing large proto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGSOFT Software Engineering Notes
سال: 1997
ISSN: 0163-5948
DOI: 10.1145/267896.267923