Results 21 to 30 of about 4,221,254 (369)
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj +1 more source
BackgroundInequities in Coronavirus Disease 2019 (COVID-19) vaccine and booster coverage may contribute to future disparities in morbidity and mortality within and between Massachusetts (MA) communities.Methods and findingsWe conducted a population-based
Jacob Bor +6 more
doaj +2 more sources
Equitable access to the COVID-19 vaccine remains a public health priority. This study explores the association between ZIP Code–Tabulation Area level Social Vulnerability Indices (SVI) and COVID-19 vaccine coverage in Texas.
Dania Mofleh +8 more
doaj +1 more source
Fragmented software‐based self‐test technique for online intermittent fault detection in processors
Software‐based self‐test (SBST) method is one of the widely used test techniques in processors. SBST scheme provides high fault coverage but incurs long detection latencies in case of intermittent faults (IFs) in online testing mode, due to large size ...
Vasudevan Matampu Suryasarman +2 more
doaj +1 more source
Structural coverage of feasible code [PDF]
Infeasible execution paths reduce the precision of structural testing coverage and limit the industrial applicability of structural testing criteria. In this paper, we propose a technique that combines static and dynamic analysis approaches to identify infeasible program elements that can be eliminated from the computation of structural coverage to ...
Baluda, M +3 more
openaire +1 more source
In this paper, we investigate a modification of the method of data generation for multiple code paths within a single launch of the genetic algorithm. This method allows the consideration of the remoteness of paths initiated by different test cases by ...
Tatiana Avdeenko, Konstantin Serdyukov
doaj +1 more source
Dataflow approach to testing Java programs supported with DFC [PDF]
Code based (“white box”) approach to testing can be divided into two main types: control flow coverage and data flow coverage methods. Dataflow testing was introduced for structural programming languages and later adopted for object languages. Among many
Ilona Bluemke, Artur Rembiszewski
doaj +1 more source
K-Step Crossover Method based on Genetic Algorithm for Test Suite Prioritization in Regression Testing [PDF]
Software is an integration of numerous programming modules (e.g., functions, procedures, legacy system, reusable components, etc.) tested and combined to build the entire module.
P. K. Gupta
doaj +3 more sources
In the present paper, we investigate an approach to intelligent support of the software white-box testing process based on an evolutionary paradigm. As a part of this approach, we solve the urgent problem of automated generation of the optimal set of ...
Tatiana Avdeenko, Konstantin Serdyukov
doaj +1 more source
Will My Tests Tell Me If I Break This Code? [PDF]
Automated tests play an important role in software evolution because they can rapidly detect faults introduced during changes. In practice, code-coverage metrics are often used as criteria to evaluate the effectiveness of test suites with focus on ...
Juergens, Elmar +2 more
core +2 more sources

