咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 66 篇 期刊文献
  • 7 篇 学位论文
  • 1 册 图书

馆藏范围

  • 243 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 219 篇 工学
    • 153 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 66 篇 电气工程
    • 18 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 7 篇 数学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 系统科学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 2 篇 农学
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 243 篇 code coverage
  • 41 篇 software testing
  • 18 篇 testing
  • 17 篇 regression testi...
  • 14 篇 mutation testing
  • 10 篇 fuzzing
  • 10 篇 unit testing
  • 10 篇 dynamic analysis
  • 9 篇 android
  • 8 篇 test case genera...
  • 8 篇 software
  • 7 篇 instrumentation
  • 7 篇 empirical study
  • 7 篇 test suite reduc...
  • 7 篇 static analysis
  • 6 篇 software enginee...
  • 6 篇 symbolic executi...
  • 6 篇 automated testin...
  • 6 篇 fault detection
  • 6 篇 test generation

机构

  • 6 篇 univ szeged dept...
  • 4 篇 univ szeged mta ...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ waterloo wa...
  • 3 篇 nanjing univ sta...
  • 3 篇 brno university ...
  • 3 篇 univ illinois ur...
  • 3 篇 george mason uni...
  • 3 篇 univ fed rio gra...
  • 3 篇 avaya labs res b...
  • 3 篇 univ passau pass...
  • 3 篇 univ washington ...
  • 2 篇 univ calif river...
  • 2 篇 inst informat in...
  • 2 篇 wuhan univ sch c...
  • 2 篇 hong kong univ s...
  • 2 篇 univ edinburgh e...
  • 2 篇 huazhong univ sc...
  • 2 篇 budapest univ te...
  • 2 篇 microsoft res re...

作者

  • 8 篇 beszedes arpad
  • 8 篇 gyimothy tibor
  • 6 篇 gergely tamas
  • 5 篇 fraser gordon
  • 5 篇 just rene
  • 5 篇 balogh gergo
  • 4 篇 tengeri david
  • 4 篇 horvath ferenc
  • 4 篇 vancsics bela
  • 3 篇 zhou yuming
  • 3 篇 sezer sakir
  • 3 篇 pilgun aleksandr
  • 3 篇 anjum muhammad s...
  • 3 篇 groce alex
  • 3 篇 neamtiu iulian
  • 3 篇 li j. jenny
  • 3 篇 wong w. eric
  • 3 篇 yerima suleiman ...
  • 3 篇 ryan conor
  • 3 篇 alzaylaee mohamm...

语言

  • 238 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"主题词=code coverage"
243 条 记 录,以下是161-170 订阅
排序:
Differential coverage: automating coverage analysis  14
Differential coverage: automating coverage analysis
收藏 引用
14th IEEE Conference on Software Testing, Verification and Validation (ICST)
作者: Cox, Henry MediaTek USA Woburn MA 01801 USA
While it is easy to automate coverage data collection, it is a time consuming/difficult/expensive manual process to analyze the data so that it can be acted upon. The goal of the approaches discussed in here is to red... 详细信息
来源: 评论
Using Static Analysis for coverage Extraction from Emulation/Prototyping Platforms  12
Using Static Analysis for Coverage Extraction from Emulation...
收藏 引用
10th ACM International Conference on Hardware/Software-codesign and System Synthesis
作者: Athavale, Viraj Hertz, Sam Jetly, Darshan Ganesan, Vijay Krysl, Jim Vasudevan, Shobha Oracle Corp Santa Clara CA 95054 USA Univ Illinois Coordinated Scl Lab Urbana IL 61801 USA Qualcomm Inc San Diego CA 92121 USA
Full-system emulation and prototyping is now being used widely in the industry for System-on-Chip (SoC) verification. Emulation/prototyping platforms run tests in a fraction of time compared to the traditional simulat... 详细信息
来源: 评论
GATE: Game-based Testing Environment  11
GATE: Game-based Testing Environment
收藏 引用
33rd International Conference on Software Engineering (ICSE)
作者: Chen, Ning Hong Kong Univ Sci & Technol Hong Kong Hong Kong Peoples R China
In this paper, we propose a game-based public testing mechanism called GATE. The purpose of GATE is to make use of the rich human resource on the Internet to help increase effectiveness in software testing and improve... 详细信息
来源: 评论
Structures of the data and the information reuse based in-memory fuzzing
Structures of the data and the information reuse based in-me...
收藏 引用
JNIC Cybersecurity Conference (JNIC)
作者: Alvarez-Perez, David Fernandez-Veiga, Manuel Fernandez-Vilas, Ana Univ Vigo AtlanTTic Vigo Spain
Fuzzing is the most widely used technique for finding software vulnerabilities. The more straightforward type of fuzzers are dumb fuzzers. These work well at first, but quickly start to be inefficient in the process o... 详细信息
来源: 评论
codescanner: Detecting (Hidden) x86/x64 code in Arbitrary Files.  9
Codescanner: Detecting (Hidden) x86/x64 Code in Arbitrary Fi...
收藏 引用
9th IEEE International Conference on Malicious and Unwanted Software (MALCON)
作者: Zwanger, Viviane Gerhards-Padilla, Elmar Meier, Michael Univ Bonn Fraunhofer FKIE Inst Comp Sci 4 Bonn Germany
Disassembly is indispensable for the proper analysis of malware. However, a common problem concerning the x86/x64 architecture is that disassemblers produce partially incorrect results. This is used by malware authors... 详细信息
来源: 评论
Putting network verification to good use  18
Putting network verification to good use
收藏 引用
18th ACM Workshop on Hot Topics in Networks (HotNets)
作者: Beckett, Ryan Mahajan, Ratul Microsoft Res Redmond WA 98052 USA Univ Washington Intentionet Seattle WA 98195 USA
The past decade has witnessed remarkable progress in the field of network verification, and interest from academia and industry has spurred the development of increasingly sophisticated verification tools and algorith... 详细信息
来源: 评论
Measuring and Mitigating Gaps in Structural Testing  23
Measuring and Mitigating Gaps in Structural Testing
收藏 引用
45th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Hossain, Soneya Binta Dwyer, Matthew B. Elbaum, Sebastian Nguyen-Tuong, Anh Univ Virginia Dept Comp Sci Charlottesville VA 22903 USA
Structural code coverage is a popular test adequacy metric that measures the percentage of program structure (e.g., statement, branch, decision) executed by a test suite. While structural coverage has several benefits... 详细信息
来源: 评论
Multi-objective Optimization Based Software Testing Using Kansei Quality Approach  2
Multi-objective Optimization Based Software Testing Using Ka...
收藏 引用
2nd International Conference on Information Systems Design and Intelligent Applications (INDIA)
作者: Shilpa Choudhary, Kavita ITM Univ Gurgoan Haryana India
Software testing suggests the quality of the software product. More the effective testing means high quality software product. In this paper we have identified and prioritized the parameters according to the perspecti... 详细信息
来源: 评论
DEFLAKER: Automatically Detecting Flaky Tests  18
DEFLAKER: Automatically Detecting Flaky Tests
收藏 引用
40th ACM/IEEE International Conference on Software Engineering (ICSE)
作者: Bell, Jonathan Legunsen, Owolabi Hilton, Michael Eloussi, Lamyaa Yung, Tifany Marinov, Darko George Mason Univ Fairfax VA 22030 USA Univ Illinois Urbana IL USA Carnegie Mellon Univ Pittsburgh PA 15213 USA
Developers often run tests to check that their latest changes to a code repository did not break any previously working functionality. Ideally, any new test failures would indicate regressions caused by the latest cha... 详细信息
来源: 评论
GoldRusher: A Miner for Rapid Identification of Hidden code  25
GoldRusher: A Miner for Rapid Identification of Hidden Code
收藏 引用
25th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Salem, Aleieldin Tech Univ Munich Garching Germany
GoldRusher is a dynamic analysis tool primarily meant to aid reverse engineers with analyzing malware. Based on the fact that hidden code segments rarely execute, the tool is able to rapidly highlight functions and ba... 详细信息
来源: 评论