Advances in computers. Volume ninety three /
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal ar...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
San Diego :
Academic Press,
2014.
|
Edición: | First edition. |
Colección: | Advances in computers,
volume ninety three |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- Half Title; Title Page; Copyright; Contents; Contributors; Preface; 1 Recent Advances in Web Testing; 1 Introduction; 1.1 Running Example; 1.2 Key Problems in Web Testing; 1.3 Structure of the Chapter; 2 Model Construction; 2.1 UML Models; 2.2 FSM Models; 2.3 Identification of Logical Web Pages; 3 Input Generation; 3.1 Manual Techniques; 3.2 (Semi- )automatic Techniques; 3.2.1 Hidden Web Crawlers; 3.2.2 Automating Equivalence Partitioning and Boundary Value Analysis; 3.2.3 Fuzz Testing; 3.2.4 User-Session-Based Techniques; 3.2.5 Symbolic Execution and Constraint Solving Techniques; 4 Metrics
- 4.1 Adequacy Metrics4.2 Crawlability Metrics; 5 Rich Client; 5.1 Dynamic Analysis; 5.2 Model Mining; 5.3 RIA Testing; 6 Conclusion; References; About the Authors; 2 Exploiting Hardware Monitoring in Software Engineering; 1 Introduction; 2 Reducing the Overhead of Program Monitoring; 3 Foundations in Hardware Monitoring; 3.1 Hardware Monitoring on Commodity Devices; 3.2 Debugging and Advanced Hardware Mechanisms; 3.2.1 Last Branch Record (LBR); 3.2.2 Branch Trace Store (BTS); 3.2.3 Precise Event Based Sampling (PEBS); 3.3 Tools for Exploiting HPMs; 3.3.1 User-Level HPM Access
- 3.3.2 Sampling Challenges4 Hardware Monitoring in Software Engineering; 4.1 Path Profiling and Trace Selection; 4.2 Dynamic Optimization; 4.3 Software Testing; 4.3.1 Branch Coverage via Hardware Monitoring; 4.3.1.1 Enabling Fall-Through Visibility; 4.3.1.2 User-level Branch Vector Access; 4.3.1.3 Improving Branch Coverage; 4.3.1.4 Empirical Evaluation; 4.3.2 Statement Coverage via Hardware Monitoring; 4.3.3 THeME for Smartphones and Tablets; 5 Discussion and Future Directions; 5.1 Software Engineering Applications; 5.2 Future Challenges in Software Engineering; 6 Conclusions; References
- About the Author3 Advances in Model-Driven Security; 1 Introduction; 2 Model-Driven Engineering; 2.1 Models, Metamodels, and Model Transformations; 2.2 Model-Driven Engineering Approaches; 2.2.1 Model-Driven Architecture; 2.2.2 Domain Specific Modeling; 2.2.3 Multi-Paradigm Modeling; 2.2.4 Aspect-Oriented Modeling; 3 Model-Driven Security; 3.1 A Brief History of Mds; 3.2 Evaluation Taxonomy; 4 Evaluation of Current Model-Driven Security Approaches; 4.1 UMLsec; 4.2 SecureUML; 4.3 Sectet; 4.4 ModelSec; 4.5 SecureMDD; 5 Discussion; 5.1 Evaluation Synthesis; 5.2 Threats to the Validity of Mds
- 5.3 Relevant Open Issues5.3.1 Choice of Modeling Paradigms; 5.3.2 Security Concerns and Corresponding Metamodel; 5.3.3 Choice of Modeling Languages; 6 Related Work; 7 Conclusion; List of Acronyms; References; About the Authors; 4 Adapting Multi-Criteria Decision Analysis for Assessing the Quality of Software Products. Current Approaches and Future Perspectives; 1 Introduction; 1.1 Motivation; 1.2 Research Objectives and Scope; 1.3 Structure of the Chapter; 2 Background; 2.1 Software Quality Modeling and Assessment; 2.2 Decision Making and Multi-Criteria Decision Analysis