• No results found

verification/validation testing

The Complexity of Verification and Validation Testing in Component Based Software Engineering

The Complexity of Verification and Validation Testing in Component Based Software Engineering

... and verification of components from the Capability knowledge Base ...through verification and validation which rectify failure nature of the software ...user testing perspectives on the ...

7

 Validation and Verification For Embedded System Design – An Integrated Testing Process Approach

 Validation and Verification For Embedded System Design – An Integrated Testing Process Approach

... process, testing, verification and validation, it will be shown that there is ample need for software application tools that provide links through all the stages of software development intended to ...

18

Software Testing Strategies and Techniques

Software Testing Strategies and Techniques

... Integration testing: Further progressing the testing process, these units must be assembled or integrated to form complete software ...integration testing focuses the problems of verification ...

6

Effort Estimation for Performance Testing of Software Applications

Effort Estimation for Performance Testing of Software Applications

... that testing data estimations need to be recorded, revised and historical evidence has to be taken into account for avoiding the underruns or over runs in ...estimatingthe verification and validation ...

7

Independent verification and validation of an industrial simulation model

Independent verification and validation of an industrial simulation model

... A review of the simulation model code. This did not entail a detailed line-by-line code check since this was not deemed necessary to meet the IV&V review objectives and would not have been possible within the ...

42

Metamorphic testing: a review of challenges and
opportunities

Metamorphic testing: a review of challenges and opportunities

... when testing a program analyzing gene regulatory networks, Chen et ...random testing (RT) as the benchmark for evaluating the fault-detection effectiveness of MT, either explicitly or ...

27

Formal Verification of Receipt Validation in Chaum’s Scheme

Formal Verification of Receipt Validation in Chaum’s Scheme

... and verification, and involves some additional requirements - a known number of trustees that corresponds to the number of rounds of encryptions/decryptions, along with a pair of hash functions that output a value ...

60

Guide for Verification and Validation in Computational Solid Mechanics

Guide for Verification and Validation in Computational Solid Mechanics

... physical testing in the V&V process, as ultimately, it is only through physical observations (experimentation) that assessments about the adequacy of the selected Conceptual and Mathematical models for ...

10

Ground Testing and Verification of a Small Electric UAS.

Ground Testing and Verification of a Small Electric UAS.

... The stability and aerodynamic analysis that was completed during the design phase of Plank was done exclusively in AVL. AVL is good tool for initial sizing and estimating aerodynamic coefficients, but its accuracy is ...

77

Pedestrian Flow Simulation Validation and Verification Techniques

Pedestrian Flow Simulation Validation and Verification Techniques

... the verification and validation of microscopic simulation models of pedestrian flow, we have performed experiments for different kind of facilities and sites where most conflicts and conges- tion happens ...

16

Testing, Verification and Improvements of Timeliness in ROS Processes

Testing, Verification and Improvements of Timeliness in ROS Processes

... formal verification of computational-time ...formal verification of timeliness properties are proposed for data flows in a ROS-based control system using Probabilistic Timed Programs ...times ...

14

Rapid, automated test, verification and validation for CubeSats

Rapid, automated test, verification and validation for CubeSats

... The FlatSat is a crude model comprised of various subsystems, typically modules of CubeSat and PCBs or breadboards of certain functionality, distributed over a workbench. A flatbed base with power source, electrical ...

10

A PARALLEL SCHEDULING SEQUENCE OF GF (P) EDWARDS COORDINATES COMPUTATION FOR ECC

A PARALLEL SCHEDULING SEQUENCE OF GF (P) EDWARDS COORDINATES COMPUTATION FOR ECC

... when testing occurs it forms some unfeasible test cases which cannot give expected ...regression testing for web applications developed a technique as making changes in input ...the testing will ...

7

Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database

Allowing and Storing of Authorized and Unauthorized Database User According to the Policy Verification and Validation of Distributed Firewall Under the Specialized Database

... The main objective of this research is to implement a authorized and unauthorized database user according to the policy verification and validation of distributed firewall under the specialized ...

5

Behavioral Modeling and Simulation of Semiconductor Devices and Circuits Using VHDL-AMS

Behavioral Modeling and Simulation of Semiconductor Devices and Circuits Using VHDL-AMS

... the verification of the model of devices with the test circuits for validation of these models using System Vision and also the experimental results obtained by exercising these test-circuits in SPICE and ...

11

Seismic   Analysis of the Armenian Nuclear Power Plant (K242)

Seismic Analysis of the Armenian Nuclear Power Plant (K242)

... the verification of the procedures and evaluation of floor response spectra (FRS) at the superstructures of the NPP, the independent validation of the geo-technical data at the NPP site and their influence ...

9

Verification and Validation of a Fingerprint Image Registration Software

Verification and Validation of a Fingerprint Image Registration Software

... systems. Verification and validation techniques applicable to these systems are rather immature and ad hoc, yet the consequences of the wide deployment of biometric systems could be ...towards ...

9

Mitigation Of Distributed Denial Of Service Attack Using Dynamic Captcha With Equal Probability Algorithm In Integration Of Internet Of Things And Cloud Environment

Mitigation Of Distributed Denial Of Service Attack Using Dynamic Captcha With Equal Probability Algorithm In Integration Of Internet Of Things And Cloud Environment

... second validation puzzle test, followed by monitoring of other packages via an Intrusion Prevention Program and a Reversing Proxy server, to examine malware components that can be contained inside ...

11

An empirical comparison of fixed strength and mixed strength for interaction coverage based prioritization

An empirical comparison of fixed strength and mixed strength for interaction coverage based prioritization

... DAVE TOWEY (M’03) is an associate professor at University of Nottingham Ningbo China (UN- NC), in Zhejiang, China, where he serves as the director of teaching and learning, and deputy head of school, for the School of ...

23

II. GENERAL ISSUES IN WA TESTING

II. GENERAL ISSUES IN WA TESTING

... input validation testing of WAs [1] ...input validation testing using TIVT (Tool for Input Validation Testing), a prototype testing tool from Georgia Institute of ...input ...

6

Show all 10000 documents...

Related subjects