• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 13
  • 1
  • 1
  • Tagged with
  • 43
  • 43
  • 43
  • 13
  • 13
  • 12
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Tool support for introductory software engineering education

Patterson, Andrew Joseph, 1974- January 2002 (has links)
Abstract not available
12

On mutation

Acree, Allen Troy 08 1900 (has links)
No description available.
13

Automatic test data generation

Offutt, Andrew Jefferson, VI 08 1900 (has links)
No description available.
14

An interactive program mutation system

St. André, Daniel M. January 1978 (has links)
No description available.
15

Testing Cobol programs by mutation

Hanks, Jeanne Marie 05 1900 (has links)
No description available.
16

Extensions to the WYSIWYT methodology

Ren, Bing 11 June 2001 (has links)
Researchers in the Forms/3 group have previously developed the WYSIWYT methodology, exploring a way of systematically testing spreadsheet languages. The previous work presented the WYSIWYT methodology for individual spreadsheet cells, and later partially extended it to large grids in which some cells share the same formula. The Forms/3 spreadsheet language supports not only operations of individual cells but also some advanced programming features such as homogeneous grids, recursive programs, and user-defined abstract data types. Therefore, it is important for the testing methodology to support even these more powerful features of the language, not just the "easy parts". In this document, we present extensions to the WYSIWYT methodology for these advanced features. We optimized the visual aspects of testing spreadsheet grids and collected experimental information about scalability. We also developed two possible ways the WYSIWYT methodology could be extended to accommodate recursion in terms of their testing theoretic aspects, implementation strategies, algorithms and time complexities. Since the ultimate goal is to help the people using these languages, we also conducted an empirical study and used its results to inform our choice as to which of these two approaches to adopt. Finally, we developed an approach of testing user-defined abstract data types; here we present design, implementation issues, algorithms and time complexities. / Graduation date: 2002
17

Emulation framework for testing higher level control methodology

Ennulat, Harold W. 10 October 2009 (has links)
Emulation is defined as an intermediate stage of simulation where the model represents the "as specified" mechanical plant and equipment, but not the control logic required to drive it. This thesis investigates the utility of providing a computer representation of the functional elements to be controlled by system control programs. These representations or "emulators" mimic the behavior of the system, or factory being controlled. The advantages of such a scheme are that developers of control software, are able to test out new control methodologies without actually connecting to the hardware system under control. This thesis investigates system control for automated manufacturing systems and identifies how emulation can be used as a valid tool in reducing the implementation time of such systems. The functions and characteristics of system control are identified as well as the problems associated with their implementation. The problems are then categorized to identify where emulation is a valid tool for problem resolution. This thesis is concluded by a description of a software demonstration which validated the concept of using emulation to solve system control problems. / Master of Science
18

Defensive Programming

Bailey, L. Mark 05 1900 (has links)
This research explores the concepts of defensive programming as currently defined in the literature. Then these concepts are extended and more explicitly defined. The relationship between defensive programming, as presented in this research, and current programming practices is discussed and several benefits are observed. Defensive programming appears to benefit the entire software life cycle. Four identifiable phases of the software development process are defined, and the relationship between these four phases and defensive programming is shown. In this research, defensive programming is defined as writing programs in such a way that during execution the program itself produces communication allowing the programmer and the user to observe its dynamic states accurately and critically. To accomplish this end, the use of defensive programming snap shots is presented as a software development tool.
19

A concurrency method: an implementation on a 3B2 network

Morrell, John E. January 1986 (has links)
Call number: LD2668 .T4 1986 M67 / Master of Science / Computing and Information Sciences
20

Data Dependence in Programs Involving Indexed Variables

Nikolik, Borislav 06 August 1993 (has links)
Symbolic execution is a powerful technique used to perform various activities such as program testing, formal verification of programs, etc. However, symbolic execution does not deal with indexed variables in an adequate manner. Integration of indexed variables such as arrays into symbolic execution would increase the generality of this technique. We present an original substitution technique that produces array-term-free constraints as a counterargument to the commonly accepted belief that symbolic execution cannot handle arrays. The substitution technique deals with constraints involving array terms with a single aggregate name, array terms with multiple aggregate names, and nested array terms. Our approach to solving constraints involving array terms is based on the analysis of the relationship between the array subscripts. Dataflow dependence analysis of programs involving indexed variables suffers from problems of undecidability. We propose a separation technique in which the array subscript constraints are separated from the loop path constraints. The separation technique suggests that the problem of establishing data dependencies is not as hard as the general loop problem. In this respect, we present a new general heuristic program analysis technique which is used to preserve the properties of the relations between program variables.

Page generated in 0.1749 seconds