Computer-based testing

Results: 254



#Item
61Web crawler / Model-based testing / Shortest path problem / Rich Internet application / Graph / Graph theory / Mathematics / Theoretical computer science

Building Rich Internet Applications Models: Example of a Better Strategy Suryakant Choudhary1 , Mustafa Emre Dincturk1 , Seyed M. Mirtaheri1 , Guy-Vincent Jourdan1,2 , Gregor v. Bochmann1,2 , and Iosif Viorel Onut3,4 1

Add to Reading List

Source URL: ssrg.site.uottawa.ca

Language: English - Date: 2013-04-30 15:56:24
62Stock-keeping unit / Mobile application development / Computer programming / Software testing / Computing / Software engineering / Identifiers

Unified Testing Criteria for Java(TM) Technology-based Applications for Mobile Devices

Add to Reading List

Source URL: javaverified.com

Language: English - Date: 2013-04-09 08:55:31
63Test script / Computer music / Entertainment / Culture / Personal life / Software testing controversies / Augmented reality-based testing / Software testing / Exploratory testing / Music

CAST 2008: Beyond the Boundaries July 14-16, 2008 – Toronto, Canada http://www.cast2008.org Session

Add to Reading List

Source URL: www.kohl.ca

Language: English - Date: 2012-03-17 16:37:47
64Computer network security / Access control / Software testing / Data security / Information security / Managed security service / Unix / Role-based access control / Vulnerability / Security / Computer security / Cyberwarfare

SPECIALIST PROFILE Personal Details Reference: BT2691

Add to Reading List

Source URL: www.bmeurope.com

Language: English - Date: 2013-04-26 11:30:25
65Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
66Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
67Computer network security / Metasploit Project / Software testing / Exploit / Session / Internet Relay Chat / X Window System / Proxy server / Port / Software / Computing / System software

Network Attack Collaboration Sharing the Shell RAPHAEL MUDGE Raphael Mudge is a Washington, DC, based

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-22 11:18:01
68Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
UPDATE