The proceedings contain 63 papers. The topics discussed include: introducing a testing automation framework for basic integrity of java applications in Hitachi railway systems;testing tool for combinatorial transition...
ISBN:
(纸本)9798331534677
The proceedings contain 63 papers. The topics discussed include: introducing a testing automation framework for basic integrity of java applications in Hitachi railway systems;testing tool for combinatorial transition testing in dynamically adaptive software systems;towards continuous integration for combinatorial testing;automated testing in railways: leveraging robotic arm precision and efficiency for superior customizability and usability test case execution;the art of managing flaky tests at scale;establishing utilization decision criteria for open-source software projects based on issue resolution time evaluation;utilizing ontologies for combinatorial testing;and towards accessibility of covering arrays for practitioners of combinatorial testing.
Chatbots are software typically embedded in Web and Mobile applications designed to assist the user in a plethora of activities, from chit-chatting to task completion. They enable diverse forms of interactions, like t...
详细信息
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast vote...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast votes have not been manipulated by the voting client. There are mainly three approaches to implement cast-as-intended verifiability in remote evoting systems: (1) return-code based, (2) challenge-based and (3) second-device-approach. To investigate the usability, perceived trustworthiness and manipulation effectiveness for the second-device-approach, we conducted a user study with 133 participants. The results are similar to those from related work investigating the other two approaches.
The recent surge of building software systems powered by Large Language Models (LLMs) has led to the development of various testing frameworks, primarily focused on treating prompt templates as the unit of testing. De...
详细信息
Face recognition (FR) systems are vulnerable to morphing attacks, which refer to face images created by morphing the facial features of two different identities into one face image to create an image that can match bo...
详细信息
One of the most challenging and time-consuming aspects of debugging is identifying the exact location of the bug. We propose the concept of a Pure Unit Test (PUT), which, when fails, can unambiguously determine the lo...
详细信息
The management of traffic in urban environments has become increasingly complex due to rapid urbanization and the growing number of vehicles on the road. This literature review synthesizes research on various traffic ...
详细信息
This paper explores micromachined chip-scale, silica resonator-based biosensors. Innovative fabrication processes and robust sensor operation configurations for realizing calorimetric, optical, and gravimetric biosens...
详细信息
Graph data represents information efficiently and can be used to learn subsequent tasks easily. In the domain of biological science, recommender systems, social network analysis graph representation learning has becom...
详细信息
In mission-critical SaaS products such as payment systems, maintaining rapid release velocity while ensuring high reliability is essential. However, as these products grow more complex, the areas requiring regression ...
详细信息
暂无评论