[PDF][PDF] Black box testing based on requirement analysis and design specifications
H Bhasin, E Khanna - International Journal of Computer Applications, 2014 - Citeseer
ABSTRACT Black Box Testing is used when code of the module is not available. In such
situations appropriate priorities can be given to different test cases, so that the quality of …
situations appropriate priorities can be given to different test cases, so that the quality of …
[HTML][HTML] Repository and meta-data design for efficient component consistency verification
Composing a complete component-based application as well as updating a subset of its
components may involve complex issues of maintaining application consistency. Its …
components may involve complex issues of maintaining application consistency. Its …
Cloud query manager: Using semantic web concepts to avoid iaas cloud lock-in
The cloud lock-in problem is commonly addressed by three strategies:(i) use of intermediate
layer between cloud services consumers and providers,(ii) use of standardized interfaces to …
layer between cloud services consumers and providers,(ii) use of standardized interfaces to …
Dual Wavelet Transform Used in Color Image Steganography Method
G Prabakaran, R Bhavani… - … Conference on Intelligent …, 2014 - ieeexplore.ieee.org
Steganography is an art of activity the data within the cover like the simplest way that, it's like
straightforward cover, though its hidden information. In this paper, secret image is activity …
straightforward cover, though its hidden information. In this paper, secret image is activity …
Ensuring component application consistency on small devices: A repository-based approach
Deployment of component-based applications may involve complex issues of maintaining
their consistency, both when composing a complete application and updating a small subset …
their consistency, both when composing a complete application and updating a small subset …
Learning service behavior with progressive testing
J Church, A Motro - 2011 IEEE International Conference on …, 2011 - ieeexplore.ieee.org
We describe a comprehensive methodology for discovering service similarity
(substitutability) by testing. Our solutions do not rely on the service descriptions provided by …
(substitutability) by testing. Our solutions do not rely on the service descriptions provided by …
Reconstruction of type information from java bytecode for component compatibility
J Bauml, P Brada - Electronic Notes in Theoretical Computer Science, 2011 - Elsevier
The Java type system is strictly checked by both the compiler and the runtime bytecode
interpreter of the JVM. These mechanisms together guarantee appropriate usage of class …
interpreter of the JVM. These mechanisms together guarantee appropriate usage of class …
Testing-based selection method for integrability on service-oriented applications
Service-Oriented Computing allows building applications by reusing web-accessible
services. However, current approaches still involve a large effort both at discovery of …
services. However, current approaches still involve a large effort both at discovery of …
[PDF][PDF] Best Practice in Robotics
GK Kraetzschmar, A Shakhimardanov… - Deliverable D-2.2 …, 2010 - academia.edu
Deliverable D2. 2 provides specifications for the research and development work performed
in work package WP2 of the BRICS project. The main purpose of the deliverable is to …
in work package WP2 of the BRICS project. The main purpose of the deliverable is to …
[PDF][PDF] Research Article Research on Evaluation of Component-Based Software Testing
XJ andZihui Che - Research Journal of Applied Sciences …, 2013 - pdfs.semanticscholar.org
The research object of our work is evaluating program for the component-based software
testing. As an important part into the software engineering, software testing is the primary …
testing. As an important part into the software engineering, software testing is the primary …