نتایج جستجو برای: مدل breach gui
تعداد نتایج: 129795 فیلتر نتایج به سال:
To gather articles, we searched three literature databases of Scopus, ABI/Inform, and Google Scholar. We looked for all articles that contained various keywords, such as “data breach,” “security breach,” “privacy breach,” and “information breach.” We then narrowed our focus to include scholarly articles, excluding articles in the popular and practitioner media. Most of the articles identified i...
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs and to determine the required number of sensors to be deployed to obtain a certain security level. In this paper, the sensing coverage of surveillance wireless sensor networks is studied by utilizing a well-known image ...
Trust development is a critical aspect of computersupported cooperative work (CSCW). Trust is especially important in distributed work environments because of the limited amount of social presence afforded by computer-based communication media. Although several studies have studied trust development in computer-mediated environments, very few have researched the reparation of trust, following a...
In this paper, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying the Neyman-Pearson detection model and defining the breach probability on a gridmodeled field. Using a graph model for the perimeter, Dijkstra’s shortest path algorithm is used to find the weakest breach path. The breach probability is linked to paramet...
ÐThe widespread use of GUIs for interacting with software is leading to the construction of more and more complex GUIs. With the growing complexity come challenges in testing the correctness of a GUI and its underlying software. We present a new technique to automatically generate test cases for GUIs that exploits planning, a well-developed and used technique in artificial intelligence. Given a...
Graphical user interfaces (GUIs) are important parts of today’s software and their correct execution is required to ensure the correctness of the overall software. A popular technique to detect defects in GUIs is to test them by executing test cases and checking the execution results. Test cases may either be created manually or generated automatically from a model of the GUI. While manual test...
Metastasis is initiated in epithelial-derived tumors when cells at the tumor front breach the epithelial basement membrane (BM). Invasion through BMs is thought to be one of the most rate-limiting steps in cancer progression and thus is a therapeutically attractive target for halting tumor spread. Despite intense interest, it has been challenging to experimentally determine how invasive cells b...
Current fully automatic model-based test-case generation techniques for GUIs employ a static model. Therefore they are unable to leverage certain state-based relationships between GUI events (e.g., one enables the other, one alters the other’s execution) that are revealed at run-time and non-trivial to infer statically. We present ALT – a new technique to generate GUI test cases in batches. Bec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید