咨询与建议

限定检索结果

文献类型

  • 169 篇 会议
  • 69 篇 期刊文献
  • 3 篇 学位论文
  • 1 册 图书

馆藏范围

  • 242 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 217 篇 工学
    • 151 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 66 篇 电气工程
    • 18 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 9 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 网络空间安全
    • 1 篇 动力工程及工程热...
  • 11 篇 理学
    • 7 篇 数学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 系统科学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 2 篇 农学
  • 2 篇 医学
    • 2 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 242 篇 code coverage
  • 41 篇 software testing
  • 18 篇 regression testi...
  • 17 篇 testing
  • 14 篇 mutation testing
  • 10 篇 fuzzing
  • 10 篇 unit testing
  • 10 篇 dynamic analysis
  • 9 篇 android
  • 8 篇 test case genera...
  • 8 篇 software
  • 7 篇 instrumentation
  • 7 篇 empirical study
  • 7 篇 test suite reduc...
  • 7 篇 static analysis
  • 7 篇 test generation
  • 6 篇 software enginee...
  • 6 篇 symbolic executi...
  • 6 篇 automated testin...
  • 6 篇 fault detection

机构

  • 6 篇 univ szeged dept...
  • 4 篇 univ szeged mta ...
  • 4 篇 carnegie mellon ...
  • 3 篇 univ waterloo wa...
  • 3 篇 nanjing univ sta...
  • 3 篇 univ illinois ur...
  • 3 篇 george mason uni...
  • 3 篇 univ fed rio gra...
  • 3 篇 avaya labs res b...
  • 3 篇 univ passau pass...
  • 3 篇 univ washington ...
  • 2 篇 univ calif river...
  • 2 篇 inst informat in...
  • 2 篇 wuhan univ sch c...
  • 2 篇 hong kong univ s...
  • 2 篇 univ edinburgh e...
  • 2 篇 huazhong univ sc...
  • 2 篇 budapest univ te...
  • 2 篇 microsoft res re...
  • 2 篇 univ sheffield s...

作者

  • 8 篇 beszedes arpad
  • 8 篇 gyimothy tibor
  • 6 篇 gergely tamas
  • 5 篇 fraser gordon
  • 5 篇 just rene
  • 5 篇 balogh gergo
  • 4 篇 tengeri david
  • 4 篇 horvath ferenc
  • 4 篇 vancsics bela
  • 3 篇 zhou yuming
  • 3 篇 sezer sakir
  • 3 篇 pilgun aleksandr
  • 3 篇 anjum muhammad s...
  • 3 篇 groce alex
  • 3 篇 neamtiu iulian
  • 3 篇 li j. jenny
  • 3 篇 wong w. eric
  • 3 篇 yerima suleiman ...
  • 3 篇 ryan conor
  • 3 篇 alzaylaee mohamm...

语言

  • 235 篇 英文
  • 5 篇 其他
  • 2 篇 中文
检索条件"主题词=code coverage"
242 条 记 录,以下是51-60 订阅
排序:
Beyond code coverage - An approach for test suite assessment and improvement  8
Beyond code coverage - An approach for test suite assessment...
收藏 引用
2015 8th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2015
作者: Tengeri, Dávid Beszédes, Árpád Gergely, Tamás Vidács, László Hávas, David Gyimóthy, Tibor Department of Software Engineering University of Szeged Szeged Hungary MTA-SZTE Research Group on Artificial Intelligence University of Szeged Szeged Hungary
code coverage is successfully used to guide white box test design and evaluate the respective test completeness. However, simple overall coverage ratios are often not precise enough to effectively help when a (regress... 详细信息
来源: 评论
code coverage Visualization on Web-Based Testing Tool for Java Programs
收藏 引用
JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE 2015年 第2期2卷 89-93页
作者: Saputra, Mochamad Chandra Katayama, Tetsuro Univ Brawijaya Jl Veteran Malang 65145 Indonesia Miyazaki Univ Miyazaki 8892192 Japan
The visualization of statement coverage (C0) and branch coverage (C1) measurement output can be used in several ways to improve the verification and validation process. The result displays are percentage of a successf... 详细信息
来源: 评论
code coverage of Assertions Using RTL Source code Analysis  14
Code Coverage of Assertions Using RTL Source Code Analysis
收藏 引用
51st ACM/EDAC/IEEE Design Automation Conference (DAC)
作者: Athavale, Viraj Ma, Sai Hertz, Samuel Vasudevan, Shobha Univ Illinois Coordinated Sci Lab Urbana IL 61801 USA
Assertions are gaining importance in pre-silicon hardware verification to ensure expected design behavior. coverage of an assertion in terms of statements of a Register Transfer Level (RTL) source code is a very acces... 详细信息
来源: 评论
Improving coverage and Vulnerability Detection in Smart Contract Testing Using Self-Adaptive Learning GA
收藏 引用
IETE JOURNAL OF RESEARCH 2024年 第2期70卷 1593-1606页
作者: Sujeetha, R. Akila, K. SRM Inst Sci & Technol Coll Engn & Technol Dept Comp Sci & Engn 1 Jawaharlal Nehru RdVadapalani Campus Chennai Tamil Nadu India
In the domain of software testing, the generation of test cases is a critical process for detecting system errors and bugs. However, automated test case generation for smart contracts often encounters challenges relat... 详细信息
来源: 评论
A systematic literature review on software security testing using metaheuristics
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2024年 第2期31卷 44-44页
作者: Ahsan, Fatma Anwer, Faisal Aligarh Muslim Univ Dept Comp Sci Aligarh 202002 Uttar Pradesh India
The security of an application is critical for its success, as breaches cause loss for organizations and individuals. Search-based software security testing (SBSST) is the field that utilizes metaheuristics to generat... 详细信息
来源: 评论
Research on software regression testing method considering greedy algorithm sorting weight
收藏 引用
INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION 2024年 第1期24卷 55-64页
作者: Wang, Weibin Xian Fanyi Univ Sch Informat Engn Xian 710105 Peoples R China
A regression testing algorithm based on greedy algorithm sorting weight is proposed to further improve the efficiency and effectiveness of software regression test. In view of the problems existing in the sorting of t... 详细信息
来源: 评论
coverage-Based Debloating for Java Bytecode
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2023年 第2期32卷 1-34页
作者: Soto-Valero, Cesar Durieux, Thomas Harrand, Nicolas Baudry, Benoit KTH Royal Inst Technol Dept Software & Comp Syst Stockholm Sweden
Software bloat is code that is packaged in an application but is actually not necessary to run the application. The presence of software bloat is an issue for security, performance, and for maintenance. In this articl... 详细信息
来源: 评论
PosFuzz:augmenting greybox fuzzing with effective position distribution
收藏 引用
Cybersecurity 2023年 第4期6卷 123-143页
作者: Yanyan Zou Wei Zou JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi Wei Huo Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina State Key Lab of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Zhongguancun Laboratory BeijingChina
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and ***-based greybo... 详细信息
来源: 评论
Toolset and Program Repository for code coverage-Based Test Suite Analysis and Manipulation  14
Toolset and Program Repository for Code Coverage-Based Test ...
收藏 引用
14th IEEE International Working Conference on Source code Analysis and Manipulation (SCAM)
作者: Tengeri, David Beszedes, Arpad Havas, David Gyimothy, Tibor Univ Szeged Dept Software Engn Szeged Hungary
code coverage is often used in academic and industrial practice of white-box software testing. Various test optimization methods, e.g. test selection and prioritization, rely on code coverage information, but other re... 详细信息
来源: 评论
Accelerating Fuzzing through Prefix-Guided Execution
收藏 引用
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL 2023年 第OOPSLA期7卷 1-27页
作者: Li, Shaohua Su, Zhendong Swiss Fed Inst Technol Zurich Switzerland
coverage-guided fuzzing is one of the most effective approaches for discovering software defects and vulnerabilities. It executes all mutated tests from seed inputs to expose coverage-increasing tests. However, execut... 详细信息
来源: 评论