enter search term and/or author name
Program monitors enforce security policies by interposing themselves into the control flow of untrusted software whenever that software attempts to execute security-relevant actions. At the point of interposition, a monitor has authority to permit...
A systematic review of theory use in studies investigating the motivations of software engineers
Tracy Hall, Nathan Baddoo, Sarah Beecham, Hugh Robinson, Helen Sharp
Article No.: 10
Motivated software engineers make a critical contribution to delivering successful software systems. Understanding the motivations of software engineers and the impact of motivation on software engineering outcomes could significantly affect the...
Empirical evaluation of a nesting testability transformation for evolutionary testing
Phil McMinn, David Binkley, Mark Harman
Article No.: 11
Evolutionary testing is an approach to automating test data generation that uses an evolutionary algorithm to search a test object's input domain for test data. Nested predicates can cause problems for evolutionary testing, because information...
Tools and experiments supporting a testing-based theory of component composition
Article No.: 12
Development of software using off-the-shelf components seems to offer a chance for improving product quality and developer productivity. This article reviews a foundational testing-based theory of component composition, describes tools that...