Cloud-Enabled Software Testing Based on Program Understanding
暂无分享,去创建一个
[1] Betty H. C. Cheng,et al. A framework for classifying and comparing software reverse engineering and design recovery techniques , 1999, Sixth Working Conference on Reverse Engineering (Cat. No.PR00303).
[2] Harald C. Gall,et al. A comparison of four reverse engineering tools , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.
[3] R. E. Kurt Stirewalt,et al. The interleaving problem in program understanding , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.
[4] N. Raghavendra Rao. Enterprise Management Strategies in the Era of Cloud Computing , 2015 .
[5] Arie van Deursen,et al. A Controlled Experiment for Program Comprehension through Trace Visualization , 2011, IEEE Transactions on Software Engineering.
[6] Roma Chauhan,et al. A Case Study of the Health Cloud , 2014 .
[7] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[8] Leandro Soares Indrusiak,et al. Handbook of Research on Embedded Systems Design , 2014 .
[9] Keith H. Bennett,et al. Legacy Systems: Coping with Success , 1995, IEEE Softw..
[10] Sushil K. Prasad,et al. A Mobile Fleet Application Case Study Using SyD Middleware , 2012 .
[11] Marijana Despotović-Zrakić,et al. Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education , 2014 .
[12] Shamsul Sahibuddin,et al. Software Process Improvement and Management: Approaches and Tools for Practical Development , 2011 .
[13] Nicholas Zvegintzov. A Resource Guide to Year 2000 Tools , 1997, Computer.
[14] Anastasia N. Kastania,et al. Cloud Computing Applications for Quality Health Care Delivery , 2014 .
[15] P. Venkata Krishna,et al. Challenges, Opportunities, and Dimensions of Cyber-Physical Systems , 2014 .
[16] Qiang Yang,et al. The program understanding problem: analysis and a heuristic approach , 1996, Proceedings of IEEE 18th International Conference on Software Engineering.
[17] Nicolas Guelfi,et al. SETER: Towards Architecture-Model Based Security Engineering , 2012, Int. J. Secur. Softw. Eng..
[18] Veljko Milutinovic,et al. Exploiting Spatial and Temporal Patterns in a High-Performance CPU , 2014 .
[19] Betty H. C. Cheng,et al. Strongest postcondition semantics as the formal basis for reverse engineering , 2004, Automated Software Engineering.
[20] Michael Losavio,et al. Regulatory Aspects of Cloud Computing in Business Environments , 2015 .
[21] KolagariRamin Tavakoli,et al. Model-Based Analysis and Engineering of Automotive Architectures with EAST-ADL , 2015 .
[22] Richard Wolski,et al. The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[23] M. Scott. Tort Liability for Vendors of Insecure Software: Has the Time Finally Come? , 2007 .
[24] Paul Hofmann,et al. Cloud Computing: The Limits of Public Clouds for Business Applications , 2010, IEEE Internet Computing.
[25] Paulo S. C. Alencar,et al. Handbook of Research on Mobile Software Engineering: Design, Implementation, and Emergent Applications , 2012 .
[26] Arie van Deursen,et al. Crawling Ajax-Based Web Applications through Dynamic Analysis of User Interface State Changes , 2012, TWEB.
[27] Zhaohao Sun,et al. Secure Network Solutions for Enterprise Cloud Services , 2014 .
[28] Stéphane Ducasse,et al. Polymetric Views - A Lightweight Visual Approach to Reverse Engineering , 2003, IEEE Trans. Software Eng..
[29] M. Brian Blake,et al. Service-Oriented Computing and Cloud Computing: Challenges and Opportunities , 2010, IEEE Internet Computing.
[30] Minnie Yi-Miin Yen,et al. Cloud Computing Security and Risk Management , 2013 .
[31] Joel J. P. C. Rodrigues,et al. Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications , 2013 .
[32] Sergey Bratus,et al. Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain , 2010, Int. J. Secur. Softw. Eng..
[33] George Candea,et al. Automated software testing as a service , 2010, SoCC '10.
[34] Salwa K. Abd-El-Hafiz,et al. A Knowledge-Based Approach to the Analysis of Loops , 1996, IEEE Trans. Software Eng..
[35] James H. Cross,et al. Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.
[36] S. Srinivasan. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments , 2014 .
[37] Stephen H. Edwards,et al. A framework for practical, automated black‐box testing of component‐based software † , 2001, Softw. Test. Verification Reliab..
[38] David B. Paradice,et al. On the Study of Complexity in Information Systems , 2008, Int. J. Inf. Technol. Syst. Approach.
[39] David B. Paradice. Emerging Systems Approaches in Information Technologies: Concepts, Theories and Applications , 2009 .