Test Case Automate Generation from UML Sequence Diagram and OCL Expression
暂无分享,去创建一个
[1] Ivar Jacobson,et al. The Unified Modeling Language User Guide , 1998, J. Database Manag..
[2] Elvinia Riccobene,et al. An ASM Semantics for UML Activity Diagrams , 2000, AMAST.
[3] Meng Joo Er,et al. PCA and LDA in DCT domain , 2005, Pattern Recognit. Lett..
[4] Ashutosh Saxena,et al. An efficient secure key issuing protocol in ID-based cryptosystems , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[5] Martin Gogolla,et al. The Whole-Part Relationship in the Unified Modeling Language: A New Approach , 2001, Unified Modeling Language: Systems Analysis, Design and Development Issues.
[6] Bernhard K. Aichernig,et al. Test-Design through Abstraction - A Systematic Approach Based on the Refinement Calculus , 2001, J. Univers. Comput. Sci..
[7] Yuguang Fang,et al. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .
[8] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[9] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[10] Byoungcheon Lee,et al. Secure Key Issuing in ID-based Cryptography , 2004, ACSW.
[11] Adi Shamir,et al. How to share a secret , 1979, CACM.
[12] Hua Yu,et al. A direct LDA algorithm for high-dimensional data - with application to face recognition , 2001, Pattern Recognit..
[13] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[14] Ashutosh Saxena,et al. Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems , 2006, IACR Cryptol. ePrint Arch..
[15] Ajith Abraham,et al. Texture classification based on DCT and soft computing , 2001, 10th IEEE International Conference on Fuzzy Systems. (Cat. No.01CH37297).
[16] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[17] Lawrence Sirovich,et al. Application of the Karhunen-Loeve Procedure for the Characterization of Human Faces , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[18] Cláudia Maria Lima Werner,et al. Applying Refactoring Techniques to UML/OCL Models , 2004, UML.
[19] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[20] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[21] A. Jefferson Offutt,et al. Using UML Collaboration Diagrams for Static Checking and Test Generation , 2000, UML.
[22] Ja-Chen Lin,et al. A new LDA-based face recognition system which can solve the small sample size problem , 1998, Pattern Recognit..
[23] Alexandra Boldyreva,et al. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-Group signature scheme , 2002 .
[24] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[25] Jeong Hyun Yi,et al. Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.
[26] Zhenfu Cao,et al. An Improvement of an Identity-Based Key Issuing Protocol , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[27] Wanchai Rivepiboon,et al. Automated-generating test case using UML statechart diagrams , 2003 .