An Innovative Approach to Investigate Various Software Testing Techniques and Strategies
暂无分享,去创建一个
Fazlullah Khan | Syed Roohullah Jan | Syed Tauhid Ullah Shah | Zia Ullah Johar | Yasin Shah | F. Khan | Ziaullah Johar | Y. Shah
[1] Mohd. Ehmer Khan. Different Approaches To Black box Testing Technique For Finding Errors , 2011 .
[2] Mian Ahmad Jan,et al. A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .
[3] Salman,et al. A Novel Survey on : Mobility Based Routing in Vehicular Ad-Hoc Networks ( Vanets ) , 2014 .
[4] Fahim Arif,et al. Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[5] William Lewis,et al. Software Testing and Continuous Quality Improvement , 2000 .
[6] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[7] Xiangjian He,et al. Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.
[8] Fazlullah Khan,et al. Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).
[9] Mian Ahmad Jan,et al. Energy-efficient routing and secure communication in wireless sensor networks , 2016 .
[10] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[11] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Xiangjian He,et al. PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.
[13] Xiangjian He,et al. Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[14] Xiangjian He,et al. A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[15] F. Khan,et al. Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.
[16] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[17] Srinivas Nidhra,et al. BLACK BOX AND WHITE BOX TESTING TECHNIQUES -A LITERATURE REVIEW , 2012 .