咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 66 篇 期刊文献
  • 7 篇 学位论文
  • 1 册 图书

馆藏范围

  • 243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 219 篇 工学
    • 153 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 66 篇 电气工程
    • 18 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 7 篇 数学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 系统科学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 2 篇 农学
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 243 篇 code coverage
  • 41 篇 software testing
  • 18 篇 testing
  • 17 篇 regression testi...
  • 14 篇 mutation testing
  • 10 篇 fuzzing
  • 10 篇 unit testing
  • 10 篇 dynamic analysis
  • 9 篇 android
  • 8 篇 test case genera...
  • 8 篇 software
  • 7 篇 instrumentation
  • 7 篇 empirical study
  • 7 篇 test suite reduc...
  • 7 篇 static analysis
  • 6 篇 software enginee...
  • 6 篇 symbolic executi...
  • 6 篇 automated testin...
  • 6 篇 fault detection
  • 6 篇 test generation

机构

  • 6 篇 univ szeged dept...
  • 4 篇 univ szeged mta ...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ waterloo wa...
  • 3 篇 nanjing univ sta...
  • 3 篇 brno university ...
  • 3 篇 univ illinois ur...
  • 3 篇 george mason uni...
  • 3 篇 univ fed rio gra...
  • 3 篇 avaya labs res b...
  • 3 篇 univ passau pass...
  • 3 篇 univ washington ...
  • 2 篇 univ calif river...
  • 2 篇 inst informat in...
  • 2 篇 wuhan univ sch c...
  • 2 篇 hong kong univ s...
  • 2 篇 univ edinburgh e...
  • 2 篇 huazhong univ sc...
  • 2 篇 budapest univ te...
  • 2 篇 microsoft res re...

作者

  • 8 篇 beszedes arpad
  • 8 篇 gyimothy tibor
  • 6 篇 gergely tamas
  • 5 篇 fraser gordon
  • 5 篇 just rene
  • 5 篇 balogh gergo
  • 4 篇 tengeri david
  • 4 篇 horvath ferenc
  • 4 篇 vancsics bela
  • 3 篇 zhou yuming
  • 3 篇 sezer sakir
  • 3 篇 pilgun aleksandr
  • 3 篇 anjum muhammad s...
  • 3 篇 groce alex
  • 3 篇 neamtiu iulian
  • 3 篇 li j. jenny
  • 3 篇 wong w. eric
  • 3 篇 yerima suleiman ...
  • 3 篇 ryan conor
  • 3 篇 alzaylaee mohamm...

语言

  • 238 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"主题词=Code coverage"
243 条 记 录,以下是91-100 订阅
排序:
Automatic Software-Based Self Test Generation for Embedded Processors
收藏 引用
IFAC-PapersOnLine 2018年 第6期51卷 125-130页
作者: Hudec, Ján Institute of Computer Engineering and Applied Informatics Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava84216 Slovakia
The paper deals with automatic software-based test generation for processors. Processors are basic blocks of current complex systems on chip and embedded systems. Processors testing can be extended by functional tests... 详细信息
来源: 评论
Quantifying, Characterizing, and Mitigating Flakily Covered Program Elements
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2022年 第3期48卷 1018-1029页
作者: Vysali, Shivashree McIntosh, Shane Adams, Bram McGill Univ Dept Elect & Comp Engn Montreal PQ H3A 0G4 Canada Univ Waterloo David R Cheriton Sch Comp Sci Waterloo ON N2L 3G1 Canada Queens Univ Sch Comp Kingston ON K7L 3N6 Canada
code coverage measures the degree to which source code elements (e.g., statements, branches) are invoked during testing. Despite growing evidence that coverage is a problematic measurement, it is often used to make de... 详细信息
来源: 评论
Multi-objective test suite optimization for detection and localization of software faults
收藏 引用
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 2022年 第6期34卷 2897-2909页
作者: Gupta, Neha Sharma, Arun Pachariya, Manoj Kumar Indira Gandhi Delhi Tech Univ Women Dept Informat Technol New Delhi 110006 India Makhanlal Chaturvedi Natl Univ Journalism & Commu Dept Comp Sci & Applicat Bhopal 462011 India
Testing of software is done with an intention to find faults. If a fault is there then it needs to be detected, located and then resolved. Fault detection and localization are adjoining activities and thus it is diffi... 详细信息
来源: 评论
Accelerating Fuzzing through Prefix-Guided Execution
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2023年 第OOPSLA期7卷 1-27页
作者: Li, Shaohua Su, Zhendong Swiss Fed Inst Technol Zurich Switzerland
coverage-guided fuzzing is one of the most effective approaches for discovering software defects and vulnerabilities. It executes all mutated tests from seed inputs to expose coverage-increasing tests. However, execut... 详细信息
来源: 评论
Morpheus Web Testing: A Tool for Generating Test Cases for Widget Based Web Applications
收藏 引用
JOURNAL OF WEB ENGINEERING 2022年 第2期21卷 119-143页
作者: Neves, Romulo de Almeida Watanabe, Willian Massami Oliveira, Rafael Fed Technol Univ Parana UTFPR Cornelio Procopio Parana Brazil
Context: Widgets are reusable User Interfaces (UIs) components frequently delivered in Web *** the web application, widgets implement different interaction scenarios, such as buttons, menus, and text input. Problem: T... 详细信息
来源: 评论
A Survey of coverage-Based Testing Tools
收藏 引用
COMPUTER JOURNAL 2009年 第5期52卷 589-597页
作者: Yang, Qian Li, J. Jenny Weiss, David M. Avaya Labs Res Basking Ridge NJ 07920 USA
Test coverage is sometimes used to measure how thoroughly software is tested and developers and vendors sometimes use it to indicate their confidence in the readiness of their software. This survey studies and compare... 详细信息
来源: 评论
Covering and Uncovering Equivalent Mutants
收藏 引用
SOFTWARE TESTING VERIFICATION & RELIABILITY 2013年 第5期23卷 353-374页
作者: Schuler, David Zeller, Andreas Univ Saarland D-66123 Saarbrucken Germany
Mutation testing measures the adequacy of a test suite by seeding artificial defects (mutations) into a program. If a test suite fails to detect a mutation, it may also fail to detect real defectsand hence should be i... 详细信息
来源: 评论
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
收藏 引用
COMPUTERS & MATHEMATICS WITH APPLICATIONS 2012年 第2期63卷 469-480页
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibing Shanghai Jiao Tong Univ Shanghai Key Lab Scalable Comp & Syst Sch Software Shanghai Peoples R China Shanghai Jiao Tong Univ Shanghai Key Lab Scalable Comp & Syst Sch Elect Informat & Elect Engn Shanghai Peoples R China
The evolution of computer science has exposed us to the growing gravity of security problems and threats. Dynamic taint analysis is a prevalent approach to protect a program from malicious behaviors, but fails to prov... 详细信息
来源: 评论
A Study of Applying Severity-weighted Greedy Algorithm to Software Test Case Prioritization During Testing
A Study of Applying Severity-weighted Greedy Algorithm to So...
收藏 引用
IEEE International Conference on Industrial Engineering and Engineering Management
作者: Hsu, Yen-Ching Peng, Kuan-Li Huang, Chin-Yu Natl Tsing Hua Univ Inst Informat Syst & Applicat Hsinchu Taiwan Natl Tsing Hua Univ Dept Comp Sci Hsinchu Taiwan
Regression testing is a very useful technique for software testing. Traditionally, there are several techniques for test case prioritization;two of the most used techniques are Greedy and Additional Greedy Algorithm (... 详细信息
来源: 评论
Design and Implementation of Remote Terminal for MIL-STD-1553 B  7
Design and Implementation of Remote Terminal for MIL-STD-155...
收藏 引用
7th IEEE International Advance Computing Conference (IACC)
作者: Naidu, C. D. Kishore, P. Sai, Y. Padma Sourav, B. VNR Vignana Jyothi Inst Engn & Technol Dept Elect & Commun Engn Hyderabad Andhra Prades India
In this digital era, the need for the efficient communication between different devices with minimum requirement of hardware for the low power, high speed design and also for cost effectiveness is needed. As a result ... 详细信息
来源: 评论