Bug Detection Using Particle Swarm Optimization with Search Space Reduction

Size: px
Start display at page:

Download "Bug Detection Using Particle Swarm Optimization with Search Space Reduction"

Transcription

1 2015 6th International Conference on Intelligent Systems, Modelling and Simulation Bug Detection Using Particle Swarm Optimization with Search Space Reduction Arun Reungsinkonkarn Department of Computer Information System Assumption University Paskorn Apirukvorapinit Faculty of Information Technology Thai-Nichi Institute of Technology Abstract A bug detection tool is an important tool in software engineering development. Many research papers have proposed techniques for detecting software bug, but there are certain semantic bugs that are not easy to detect. In our views, a bug can occur from incorrect logics that when a program is executed with a particular input, the program will behave in unexpected ways. In this paper, we propose a method and tool for software bugs detection by finding such input that causes an unexpected output guided by the fitness function. The method uses a Hierarchical Similarity Measurement Model (HSM) to help create the fitness function to examine a program behavior. Its tool uses Particle Swarm Optimization (PSO) with Search Space Reduction (SSR) to manipulate input by contracting and eliminating unfavorable areas of input search space. The programs under experiment were selected from four different domains such as financial, decision support system, algorithms and machine learning. The experimental result shows a significant percentage of success rate up to 93% in bug detection, compared to an estimated success rate of 28% without SSR. Keywords- Bug Detection; Fitness Function; Hierarchical Similarity Measurement Model (HSM); Particle Swarm Optimization (PSO); Optimization. I. INTRODUCTION A software bug is any fault or error which causes an unexpected results or an unintended behavior in computer programs. There are several reasons why bugs occur ranging from human error in code implementation to design errors from frameworks and operating system [1][2]. On the other hand, an error that caused by programmers unintentional coding logic is called semantic bug. To further explain, software bug behaves abnormally in program execution which results in unexpected outcomes. A particular bug can be a major root cause for a costly system failure. Sponsor by Bangkok University To develop a bug detection tool, several techniques have been proposed, however, their effectiveness are largely based on types of bugs [3][4][13]. Optimization is one of techniques which using in software bug detection including Particle Swarm Optimization (PSO), Genetic Algorithm, and Evolutionary Computation [14][15]. Each appropriates for different situation [5]. For example, PSO is used in test case generation in order to reach a global maximal while reduce number of test case significantly [6][12]. There is research paper that indicates the strategy so called Boolean formula which automatically generates test data for any implementations intended to expected specification. The effectiveness in fault detection of the strategy is identified both analytically and empirically. Yet, costs are evaluated based on compared test set size [7]. In conclusion, a tool of software bug detection is created from the two concepts which are Hierarchical Similarity Measurement Model HSM and Particle Swarm Optimization (PSO) with Search Space Reduction (SSR) [8][9]. HSM facilitates the fitness function creation to detect software behaviors where PSO with SSR manipulates inputs causing the actual output converged to expected output. II. RELATED WORK Organizational Evolutionary PSO has developed to be used in test case generation. It proves the reduction in number of test case by reaching global maximal [6]. Regression and Machine Learning method is also used to validate the predicted fault-proneness of software system. To illustrate, the method is used in Mozilla, the open source web and suite, in order to detect the fault-proneness of the source code. Yet, the metric are applied in several versions of Mozilla in order to observe how it changes during the development phase [10]. Several strategies for test data generation are presented to implement for effective fault detection [7]. Another technique is called Fault Injection, which is used to evaluate web vulnerability scanners. By injecting the common types of software faults in the web application code, results show the coverage of vulnerability and the percentage of false positives [4]. Calysto is another effective tool for automatic bugs detection. This tool is an inter-procedurally path-sensitive, fully-context sensitive, and bit accurate in modeling data operations. The result shows the discovery of bugs, completely automatically, and a very low rate of false error reports [11]. The effectiveness on detection of compiler optimization varies by the different optimization scenarios. Under the same race detection, it can produce different race of detection probabilities [3]. A Hierarchical Similarity Measurement Model (HSM) of program s execution avoids having to explicitly form an equation by working like a Black-box model. It uses a similarity value to compute a fitness function and supports primitive, abstract, and complex data types [8]. Applying the Search Space Reduction (SSR) to Particle Swarm Optimization (PSO) identifies the solution, which is not feasible to be found for problems, by reducing the excessive sexploitation step [9] /15 $ IEEE DOI /ISMS

2 III. BUG DETECTION USING HSM AND PSO WITH SSR A software bug is program error that causes the program to behave in unintentional ways. This research introduces the method and tool of software bug detection based on HSM and PSO-SSR concepts. The tool is classified as a dynamic bug detection tool used during execution. Therefore source code is required for execution but there is no need for analyzing source code. Program specification is used to specify normal behavior and describe the expected output. After executing the program, if the actual output is not equivalent to the expected output, the program has an error. So in order to detect a bug, it is necessary to find an input (if possible) that makes the actual output differ from the expected output. For example, in installment program, the monthly payment should not exceed the principal. The proposed bug detection tool is divided into five parts, as shown in Figure 1. search space reduction. When the input that satisfies a condition of the program behavior is found the tool will store the related input and output with data logging module. Otherwise, the tool will repeat running HSM with PSO-SSR module until resources are exhausted. PSO uses a fitness function as a guide line to find a solution, an input to a program. However, the fitness function is not a typical mathematic equation that can be easily formulated. So HSM is used to help create the fitness function to examine a program behavior. The fitness function is computed, and the value can be between 0 and 1. When the value of the fitness function becomes one, it means that the solution is found. The fitness function is created based on the program behaviors and its expected output. The program behaviors can be a) normal behavior, for example, in the installment program, the principle should be more than zero or there is no negative monthly payment, and b) abnormal behavior, for example, no loan can have a monthly payment exceed the principle. In addition, the fitness function can be written in a form of one-line expression or a function. Stock analysis is program to recommend a stock trader to buy a stock. When the high price (HP) and low price (LP) of the stock are greater than zero, indicating that there is a trading volume in the market, therefore the recommend buying ratio (RBR) shall be more than zero, and RBR and stock trading density (STD) shall be between zero and one. The fitness function can be written as below: If HP >= 0 and LP >= 0 Then RBR < 0 and RBR > 1, STD < 0 and STD > 1 Traveling Salesman Problem (TSP) is another example that a fitness function has to be created with a function because of its behavior s complexity. The behavior of TSP must meet the following conditions: a) home town and last town must be the same, b) there must not be repeated towns in a route, and c) a traveling town must be in the list of towns. The fitness function can be illustrated as in Figure 2. Figure 1. Flow Chart of Research Tool. The input generator consists of a random number generator that randomly selects the input within the boundary of search space. After the input is generated, it will be fed to the execution part. Code execution is performed by C# compiler, and the actual output (AO), expected output (EO) and inputs are stored for every execution. HSM with PSO-SSR is then applied to compare the actual output with the expected output. Data type of output is determined to select an appropriate similarity measurement method (or technique) according to the hierarchical similarity measurement model. The similarity measurement method is calculated to compare the similarity between actual output and expected output. And the similarity value is stored as well. PSO-SSR is a technique, used to find an input, consists of three steps: exploration, exploitation and Figure 2. Example of TSP Fitness Function. 54

3 Figure 3. Screen Shot of the Tool. The Figure 3 illustrates the user interface of the developed tool with a number of essential details and ease of use. IV. EXPERIMENT Programs written for four domains are used in this research; Finance, Decision Support System, Algorithm and Machine Learning. We assume that 1) A program is executable by C# compiler 2) An output of program execution is limited to the data types supported in HSM [8]. The details of each program are shown in Table I. Install ment TABLE I. Application Domain Financial Module Application Type Web Service PROGRAM SELECTION SUMMARY. No. of Input(s) No. of Output(s) LOC Program Complexity Low A. Experiment and Measurements In an experiment, ten particles are generated with random positions of input in the search space boundary. Twenty rounds of exploration with 20 rounds of exploitation per each exploration are executed. In total, 4000 particles with various positions will be executed for each experiment regardless whether the solution is found or not. Moreover the experiment will not stop at the first solution found because the tool may discover more than one solution. The computer specification used to run the experiment is Intel Corei7 2.2 GHz, 8 GB DDR3 of RAM and 1 TB 5,400 rpm of hard disk. To evaluate the performance of the bug detection tool, we define Success Rate (SR). The formula is SR = b / t (1) where b is number of bugs found and t is a total number of bugs fed into a program under experiment. The success rate measures the success in finding input that satisfies the fitness function. Whenever the value of the fitness function becomes one, it means that the bug is found. To determine the complexity of program behavior, we define Behavior Complexity Ratio (BCR) as BCR = 1 (f/e) (2) where e is the maximum round of exploitation and f is the fastest round that a solution is found. When solution is not found, BCR is zero. Behavior Complexity Ratio defines a degree of complexity of program behavior. High value of BCR indicates that the program behavior s complexity is low because the fastest round to a solution found is low, and many of the fitness functions are easy to satisfy. Stock Analys is Decision Support System Win App Medium TSP Algorithm Console App High Naïve Bayes Machine Learning Console App High In our experiment, 29 bugs are seeded into programs for bug detection tool evaluation. Table II shows types of seeded bugs and criteria for program selection and bugs. TABLE II. A CRITERIA S SELECTION SET. Figure 4. Box Plot of the Fastest Round to a Solution Found. Bug seeded in program Incorrect conditions Incorrect calculation operator Incorrect order of calculation Incorrect order of statements Missing line of code Missing operator Criteria in Selecting a Program Various areas of application A certain degree of complexity 200 lines for minimum LOC Criteria in Seeded Bug Easily occurred or reproduced Should not be trivial Not easy to detect manually From Figure 4, the experimental results show that the median of the fastest round to the solution found of all programs are skewed to the left, meaning that the proposed method and tool produce an exceptional performance in detecting the bugs. For the Stock Analysis and Installment, their medians are below 200, indicating that the programs are not very complex, which corresponds to what already stated in the Table 1. For the Travelling Salesman Problem, the median of the fastest round to the solution found is nearly 500, 55

4 implying that the program is rather robust since it took the largest round compared to the other programs. Notice that the bar s length of the Naïve Bayes in the box plot is the longest compared to the shortest of the Stock Analysis. It indicates that solutions of Naïve Bayes are largely spread out all over the search space, whereas solutions of Stock Analysis are clustered in a particular area. To demonstrate the search space reduction capability, with the massive size of search space of approximately 15 million inputs in Naïve Bayes, the abnormal behavior is found at the 1600 th round with the SSR. This results from eight times of contraction of the search space. Figure 7. Average of Execution Time. Figure 7 shows the average execution (or running) time of all fitness functions for each program. Note that the average execution times of all programs under 1000 LOCs were approximately 60 seconds. We can conclude that our technique and tool can detect most of the bugs, with a low overhead of execution time. Figure 5. Success Rate. Figure 5 shows the success rate of each program under experiment. There were 27 bug founds out of 29 bugs seeded, thereby the overall percentage of the success rate is 93%. The two bugs cannot be found in the Stock Analysis and Naïve Bayes because not only inputs that influence the fitness function but constants that cannot be manipulated also affect the value of the fitness function. Figure 6. Behavior Complexity Ratio. Figure 6 shows the Behavior Complexity Ratio of all programs under experiment. The overall average of BCR is approximately 43%, suggesting that the complexity of selected programs varied from low to high. V. CONCLUSIONS The bug detection tool using PSO with SSR was developed using C# in Microsoft Visual Studio.Net and JSon. Four programs developed in four areas of application were used to evaluate the method and tool. Twenty-nine bugs are seeded into the programs, and 27 bugs are found. A significantly high percentage 93% of success rate was obtained from the experiment because of the capability of PSO with SSR to substantially reduce the search space. ACKNOWLEDGMENT This paper would not have been possible without the help, support and patience of the two persons. The author would like to specially thank to Mr. Sarawut Rasniyom for his support of the programming assistance in this research. The author also wishes to thank Ms. Waraporn Duriyavanich for her assistance in finishing this paper. REFERENCES [1] Gyimothy, T., Ferenc, R. and Siket, I., Empirical validation of object-oriented metrics on open source software for fault prediction, IEEE Transactions on Software Engineering, pp , [2] R. Kuma, S. K. Pandey, S. I. Ahson, Security in Coding Phase of SDLC, Wireless Communication and Sensor Network, pp , [3] Changjiang Jia and Chan, W.K., Which compiler optimization options should I use for detecting data races in multithreaded programs, Automation of Software Test (AST), pp , [4] Fonseca, J., Vieira, M., Madeira, H., Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks, Dependable Computing, PRDC th Pacific Rim International Symposium, pp , [5] Nenortaite J., Butleris R., Application of Particle Swarm Optimization Algorithm to Decision Making Model Incorporating Cluster Analysis, Human System Interactions, pp , [6] Xiaoying P., Using Organizational Evolutionary Particle Swarm Techniques to Generate Test Cases for Combinatorial Testing, Computational Intelligence and Security, pp ,

5 [7] Weyuker, E., Goradia, T. and Singh, A., Automatically generating test data from a Boolean specification, Software Engineering, IEEE Transactions, pp , [8] Reungsinkonkarn A., Hierarchical Similarity Measurement Model of Program Execution, 4 th IEEE International Conference on Software Engineering and Service Science, pp , 2013 [9] Reungsinkonkarn, A., Apirukvorapinit, P., Search Space Reduction of PSO for Hierarchical Similarity Measurement Model, 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp , [10] Gyimothy, T., Ferenc, R. and Siket, I., Empirical validation of object-oriented metrics on open source software for fault prediction, IEEE Transactions on Software Engineering, pp , [11] Babic, D., Hu, A.J., Calysto, 30 th International Conference Software Engineering ICSE '08. ACM/IEEE, pp , 2008 [12] Chengying M., Xinxin Y., Jifu C., "Swarm Intelligence-Based Test Data Generation for Structural Testing", International Conference on Computer and Information Science, pp , [13] Michalewicz, Z., Deb, K., Schmidt, M., Stidsen, T., Test-case generator for nonlinear continuous parameter optimization techniques, IEEE Transactions onevolutionary Computation, pp , [14] Rudnick, E.M., Patel, J.H., Greenstein, G.S., Niermann, T.M., A genetic algorithm framework for test generation, IEEE Transactions oncomputer-aided Design of Integrated Circuits and Systems, pp , [15] Gent, Kelson, Hsiao, Michael S., Dual-Purpose Mixed-Level Test Generation Using Swarm Intelligence, IEEE 23rd AsianTest Symposium (ATS), pp ,

Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation http://www.owasp.org

Preventive Approach for Web Applications Security Testing OWASP 10/30/2009. The OWASP Foundation http://www.owasp.org Preventive Approach for Web Applications Security Testing 10/30/2009 Luiz Otávio Duarte Ferrucio de Franco Rosa Walcir M. Cardoso Jr. Renato Archer Information Technology Center Brazilian Ministry of Science

More information

Performance Based Evaluation of New Software Testing Using Artificial Neural Network

Performance Based Evaluation of New Software Testing Using Artificial Neural Network Performance Based Evaluation of New Software Testing Using Artificial Neural Network Jogi John 1, Mangesh Wanjari 2 1 Priyadarshini College of Engineering, Nagpur, Maharashtra, India 2 Shri Ramdeobaba

More information

COMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID. Jovita Nenortaitė

COMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID. Jovita Nenortaitė ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.3 COMPUTATIONIMPROVEMENTOFSTOCKMARKETDECISIONMAKING MODELTHROUGHTHEAPPLICATIONOFGRID Jovita Nenortaitė InformaticsDepartment,VilniusUniversityKaunasFacultyofHumanities

More information

The Devils Behind Web Application Vulnerabilities

The Devils Behind Web Application Vulnerabilities The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

Finding Execution Faults in Dynamic Web Application

Finding Execution Faults in Dynamic Web Application International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 445-452 International Research Publications House http://www. irphouse.com /ijict.htm Finding

More information

Make Better Decisions with Optimization

Make Better Decisions with Optimization ABSTRACT Paper SAS1785-2015 Make Better Decisions with Optimization David R. Duling, SAS Institute Inc. Automated decision making systems are now found everywhere, from your bank to your government to

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Software Project Management Matrics. Complied by Heng Sovannarith heng_sovannarith@yahoo.com

Software Project Management Matrics. Complied by Heng Sovannarith heng_sovannarith@yahoo.com Software Project Management Matrics Complied by Heng Sovannarith heng_sovannarith@yahoo.com Introduction Hardware is declining while software is increasing. Software Crisis: Schedule and cost estimates

More information

Protecting Database Centric Web Services against SQL/XPath Injection Attacks

Protecting Database Centric Web Services against SQL/XPath Injection Attacks Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal

More information

Securing PHP Based Web Application Using Vulnerability Injection

Securing PHP Based Web Application Using Vulnerability Injection International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 391-398 International Research Publications House http://www. irphouse.com /ijict.htm Securing

More information

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Automating Security Testing. Mark Fallon Senior Release Manager Oracle Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage

More information

A New Quantitative Behavioral Model for Financial Prediction

A New Quantitative Behavioral Model for Financial Prediction 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore A New Quantitative Behavioral Model for Financial Prediction Thimmaraya Ramesh

More information

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation

A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation A hybrid Approach of Genetic Algorithm and Particle Swarm Technique to Software Test Case Generation Abhishek Singh Department of Information Technology Amity School of Engineering and Technology Amity

More information

Data Mining Algorithms Part 1. Dejan Sarka

Data Mining Algorithms Part 1. Dejan Sarka Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka (dsarka@solidq.com) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses

More information

A Novel Binary Particle Swarm Optimization

A Novel Binary Particle Swarm Optimization Proceedings of the 5th Mediterranean Conference on T33- A Novel Binary Particle Swarm Optimization Motaba Ahmadieh Khanesar, Member, IEEE, Mohammad Teshnehlab and Mahdi Aliyari Shoorehdeli K. N. Toosi

More information

A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus

A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus SANON CHIMMANEE, THANYADA VEERAPRASIT, KRITSADA SRIPHAEW, ANIWAT HEMANIDHI Faculty of Information Technology

More information

Using Web Security Scanners to Detect Vulnerabilities in Web Services

Using Web Security Scanners to Detect Vulnerabilities in Web Services FACULDADE DE CIÊNCIAS E TECNOLOGIA DA UNIVERSIDADE DE COIMBRA DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira Nuno Antunes Henrique

More information

A Prediction Model for System Testing Defects using Regression Analysis

A Prediction Model for System Testing Defects using Regression Analysis A Prediction Model for System Testing Defects using Regression Analysis 1 Muhammad Dhiauddin Mohamed Suffian, 2 Suhaimi Ibrahim 1 Faculty of Computer Science & Information System, Universiti Teknologi

More information

A Binary Model on the Basis of Imperialist Competitive Algorithm in Order to Solve the Problem of Knapsack 1-0

A Binary Model on the Basis of Imperialist Competitive Algorithm in Order to Solve the Problem of Knapsack 1-0 212 International Conference on System Engineering and Modeling (ICSEM 212) IPCSIT vol. 34 (212) (212) IACSIT Press, Singapore A Binary Model on the Basis of Imperialist Competitive Algorithm in Order

More information

Numerical Research on Distributed Genetic Algorithm with Redundant

Numerical Research on Distributed Genetic Algorithm with Redundant Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,

More information

ATLAS (Application for Tracking and Scheduling) as Location Guide and Academic Schedulling at Campus YSU (Yogyakarta State University)

ATLAS (Application for Tracking and Scheduling) as Location Guide and Academic Schedulling at Campus YSU (Yogyakarta State University) International Journal of Computer and Communication Engineering, Vol. 3, No. 4, July 4 ATLAS (Application for Tracking and Scheduling) as Location Guide and Academic Schedulling at Campus YSU (Yogyakarta

More information

Web Data Mining: A Case Study. Abstract. Introduction

Web Data Mining: A Case Study. Abstract. Introduction Web Data Mining: A Case Study Samia Jones Galveston College, Galveston, TX 77550 Omprakash K. Gupta Prairie View A&M, Prairie View, TX 77446 okgupta@pvamu.edu Abstract With an enormous amount of data stored

More information

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO

AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of

More information

IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark.

IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Report Date: 27, April 2015. www.iomark. IOmark- VDI HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC- 150427- b Test Copyright 2010-2014 Evaluator Group, Inc. All rights reserved. IOmark- VDI, IOmark- VM, VDI- IOmark, and IOmark

More information

Learning objectives for today s session

Learning objectives for today s session Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify

More information

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction

Keywords: Regression testing, database applications, and impact analysis. Abstract. 1 Introduction Regression Testing of Database Applications Bassel Daou, Ramzi A. Haraty, Nash at Mansour Lebanese American University P.O. Box 13-5053 Beirut, Lebanon Email: rharaty, nmansour@lau.edu.lb Keywords: Regression

More information

The Improvement of Test Case Selection for the Process Software Maintenance

The Improvement of Test Case Selection for the Process Software Maintenance The Improvement of Test Case Selection for the Process Software Maintenance Adtha Lawanna* Abstract following topics in software-development life cycle (SDLC) Software maintenance is one of the critical

More information

Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics

Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Empirical study of Software Quality Evaluation in Agile Methodology Using Traditional Metrics Kumi Jinzenji NTT Software Innovation Canter NTT Corporation Tokyo, Japan jinzenji.kumi@lab.ntt.co.jp Takashi

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

HMLV Manufacturing Systems Simulation Analysis Using the Database Interface

HMLV Manufacturing Systems Simulation Analysis Using the Database Interface HMLV Manufacturing Systems Simulation Analysis Using the Database Interface JURAJ ŠVANČARA Faculty of Electrical Engineering and Information Technology Slovak University of Technology in Bratislava Ilkovicova

More information

Towards a Benchmark Suite for Modelica Compilers: Large Models

Towards a Benchmark Suite for Modelica Compilers: Large Models Towards a Benchmark Suite for Modelica Compilers: Large Models Jens Frenkel +, Christian Schubert +, Günter Kunze +, Peter Fritzson *, Martin Sjölund *, Adrian Pop* + Dresden University of Technology,

More information

Magic Numbers. An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security. Rafal Los HP Web Application Security Evangelist

Magic Numbers. An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security. Rafal Los HP Web Application Security Evangelist Magic Numbers An In-Depth Guide to the 5 Key Performance Indicators for Web Application Security Rafal Los HP Web Application Security Evangelist Version 3.2 2010 Hewlett-Packard Development Company, L.P.

More information

Random Testing: The Best Coverage Technique - An Empirical Proof

Random Testing: The Best Coverage Technique - An Empirical Proof , pp. 115-122 http://dx.doi.org/10.14257/ijseia.2015.9.12.10 Random Testing: The Best Coverage Technique - An Empirical Proof K Koteswara Rao 1 and Prof GSVP Raju 2 1 Asst prof, (PhD) @JNTUK, CSE Department,

More information

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,

More information

WHITE PAPER. CounThru TM 2 Professional Managed Print Service. Introduction. Management Science

WHITE PAPER. CounThru TM 2 Professional Managed Print Service. Introduction. Management Science CounThru TM 2 Professional Managed Print Service WHITE PAPER CounThru TM 2 Professional Managed Print Service Printing solutions as easy as Introduction This white paper contains information about the

More information

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 PREDICTION OF RATE OF IMPROVEMENT OF SOFTWARE QUALITY AND DEVELOPMENT EFFORT ON THE BASIS OF DEGREE OF EXCELLENCE

More information

A Robust Method for Solving Transcendental Equations

A Robust Method for Solving Transcendental Equations www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,

More information

MODIS IMAGES RESTORATION FOR VNIR BANDS ON FIRE SMOKE AFFECTED AREA

MODIS IMAGES RESTORATION FOR VNIR BANDS ON FIRE SMOKE AFFECTED AREA MODIS IMAGES RESTORATION FOR VNIR BANDS ON FIRE SMOKE AFFECTED AREA Li-Yu Chang and Chi-Farn Chen Center for Space and Remote Sensing Research, National Central University, No. 300, Zhongda Rd., Zhongli

More information

Principles of Data Mining by Hand&Mannila&Smyth

Principles of Data Mining by Hand&Mannila&Smyth Principles of Data Mining by Hand&Mannila&Smyth Slides for Textbook Ari Visa,, Institute of Signal Processing Tampere University of Technology October 4, 2010 Data Mining: Concepts and Techniques 1 Differences

More information

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS

CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 66 CHAPTER 5 INTELLIGENT TECHNIQUES TO PREVENT SQL INJECTION ATTACKS 5.1 INTRODUCTION In this research work, two new techniques have been proposed for addressing the problem of SQL injection attacks, one

More information

Software testing. Objectives

Software testing. Objectives Software testing cmsc435-1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating

More information

Practical Applications of Evolutionary Computation to Financial Engineering

Practical Applications of Evolutionary Computation to Financial Engineering Hitoshi Iba and Claus C. Aranha Practical Applications of Evolutionary Computation to Financial Engineering Robust Techniques for Forecasting, Trading and Hedging 4Q Springer Contents 1 Introduction to

More information

Event Processing Middleware for Wireless Sensor Networks

Event Processing Middleware for Wireless Sensor Networks Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components

More information

Optimization of Cluster Web Server Scheduling from Site Access Statistics

Optimization of Cluster Web Server Scheduling from Site Access Statistics Optimization of Cluster Web Server Scheduling from Site Access Statistics Nartpong Ampornaramveth, Surasak Sanguanpong Faculty of Computer Engineering, Kasetsart University, Bangkhen Bangkok, Thailand

More information

Metrics, methods and tools to measure trustworthiness

Metrics, methods and tools to measure trustworthiness Metrics, methods and tools to measure trustworthiness Henrique Madeira AMBER Coordination Action University of Coimbra March 9 th, 2009 1 Measuring trustworthiness Trustworthy ICT should be: Secure Dependable

More information

Intelligent and Automated Software Testing Methods Classification

Intelligent and Automated Software Testing Methods Classification Intelligent and Automated Software Testing Methods Classification Seyed Reza Shahamiri Department of Software Engineering Faculty of Computer Science and Information s University Teknologi Malaysia (UTM)

More information

Blind Security Testing

Blind Security Testing Blind Security Testing An Evolutionary Approach Black Hat USA 2007 Scott Stender Vice President, Blind Security Testing An Evolutionary Approach Who are you? Co-Founder and Vice President of Security consultant

More information

Measuring Software Complexity to Target Risky Modules in Autonomous Vehicle Systems

Measuring Software Complexity to Target Risky Modules in Autonomous Vehicle Systems Measuring Software Complexity to Target Risky Modules in Autonomous Vehicle Systems M. N. Clark, Bryan Salesky, Chris Urmson Carnegie Mellon University Dale Brenneman McCabe Software Inc. Corresponding

More information

Peach Fuzzer Platform

Peach Fuzzer Platform Fuzzing is a software testing technique that introduces invalid, malformed, or random data to parts of a computer system, such as files, network packets, environment variables, or memory. How the tested

More information

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team

Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL

More information

A Practical Approach to Process Streaming Data using Graph Database

A Practical Approach to Process Streaming Data using Graph Database A Practical Approach to Process Streaming Data using Graph Database Mukul Sharma Research Scholar Department of Computer Science & Engineering SBCET, Jaipur, Rajasthan, India ABSTRACT In today s information

More information

Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH

Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri

More information

SIP Registration Stress Test

SIP Registration Stress Test SIP Registration Stress Test Miroslav Voznak and Jan Rozhon Department of Telecommunications VSB Technical University of Ostrava 17. listopadu 15/2172, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.voznak@vsb.cz,

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Search Algorithm in Software Testing and Debugging

Search Algorithm in Software Testing and Debugging Search Algorithm in Software Testing and Debugging Hsueh-Chien Cheng Dec 8, 2010 Search Algorithm Search algorithm is a well-studied field in AI Computer chess Hill climbing A search... Evolutionary Algorithm

More information

A clustering Approach for Web Vulnerabilities Detection

A clustering Approach for Web Vulnerabilities Detection A clustering Approach for Web Vulnerabilities Detection Mohamed Kaâniche Rim Akrout, Eric Alata, Yann Bachy, Anthony Dessiatnikoff, Vincent Nicome?e Design and Assessment of application Level Intrusion

More information

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008 Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether

More information

IT services for analyses of various data samples

IT services for analyses of various data samples IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical

More information

Evaluation of Complexity of Some Programming Languages on the Travelling Salesman Problem

Evaluation of Complexity of Some Programming Languages on the Travelling Salesman Problem International Journal of Applied Science and Technology Vol. 3 No. 8; December 2013 Evaluation of Complexity of Some Programming Languages on the Travelling Salesman Problem D. R. Aremu O. A. Gbadamosi

More information

Data Mining Yelp Data - Predicting rating stars from review text

Data Mining Yelp Data - Predicting rating stars from review text Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University rchada@cs.stonybrook.edu Chetan Naik Stony Brook University cnaik@cs.stonybrook.edu ABSTRACT The majority

More information

SoMA. Automated testing system of camera algorithms. Sofica Ltd

SoMA. Automated testing system of camera algorithms. Sofica Ltd SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional

More information

Chapter 17 Software Testing Strategies Slide Set to accompany Software Engineering: A Practitioner s Approach, 7/e by Roger S. Pressman Slides copyright 1996, 2001, 2005, 2009 by Roger S. Pressman For

More information

Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array

Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array Evaluation Report: Supporting Microsoft Exchange on the Lenovo S3200 Hybrid Array Evaluation report prepared under contract with Lenovo Executive Summary Love it or hate it, businesses rely on email. It

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp

More information

A Comparison of Genotype Representations to Acquire Stock Trading Strategy Using Genetic Algorithms

A Comparison of Genotype Representations to Acquire Stock Trading Strategy Using Genetic Algorithms 2009 International Conference on Adaptive and Intelligent Systems A Comparison of Genotype Representations to Acquire Stock Trading Strategy Using Genetic Algorithms Kazuhiro Matsui Dept. of Computer Science

More information

Software Implementation Technology report

Software Implementation Technology report Software Implementation Technology report Team: No Best 1 - Program Manager 2 - Developer 3- Tester 2007-8 Peking University Software Implementation Technology report 1 Problem & Plan 2 Design & Implementation

More information

Architecting for the next generation of Big Data Hortonworks HDP 2.0 on Red Hat Enterprise Linux 6 with OpenJDK 7

Architecting for the next generation of Big Data Hortonworks HDP 2.0 on Red Hat Enterprise Linux 6 with OpenJDK 7 Architecting for the next generation of Big Data Hortonworks HDP 2.0 on Red Hat Enterprise Linux 6 with OpenJDK 7 Yan Fisher Senior Principal Product Marketing Manager, Red Hat Rohit Bakhshi Product Manager,

More information

Metrics, Methods and Tools to Measure Security and Trustworthiness. Measuring trustworthiness

Metrics, Methods and Tools to Measure Security and Trustworthiness. Measuring trustworthiness Metrics, Methods and Tools to Measure Security and Trustworthiness Henrique Madeira, University of Coimbra, Portugal Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS) Cascais, June 29

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013 A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:

More information

Improvised Software Testing Tool

Improvised Software Testing Tool Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files

A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files A Tool for Mining Defect-Tracking Systems to Predict Fault-Prone Files Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 ostrand@research.att.com Elaine J. Weyuker AT&T Labs

More information

A New Approach in Software Cost Estimation with Hybrid of Bee Colony and Chaos Optimizations Algorithms

A New Approach in Software Cost Estimation with Hybrid of Bee Colony and Chaos Optimizations Algorithms A New Approach in Software Cost Estimation with Hybrid of Bee Colony and Chaos Optimizations Algorithms Farhad Soleimanian Gharehchopogh 1 and Zahra Asheghi Dizaji 2 1 Department of Computer Engineering,

More information

Diploma Of Computing

Diploma Of Computing Diploma Of Computing Course Outline Campus Intake CRICOS Course Duration Teaching Methods Assessment Course Structure Units Melbourne Burwood Campus / Jakarta Campus, Indonesia March, June, October 022638B

More information

Method for detecting software anomalies based on recurrence plot analysis

Method for detecting software anomalies based on recurrence plot analysis Journal of Theoretical and Applied Computer Science Vol. 6, No. 1, 2012, pp. 3-12 ISSN 2299-2634 http://www.jtacs.org Method for detecting software anomalies based on recurrence plot analysis Michał Mosdorf

More information

HARDWARE AND SOFTWARE REQUIREMENTS

HARDWARE AND SOFTWARE REQUIREMENTS HARDWARE AND SOFTWARE REQUIREMENTS WINDOWS SPECIFICATIONS File Server Pentium 4 64 - Bit Dual Core, 3.2 GHZ or better (dual/quad Xeon processors recommended) 4GB of RAM or better Two 72GB or better fast

More information

SCHEDULING IN CLOUD COMPUTING

SCHEDULING IN CLOUD COMPUTING SCHEDULING IN CLOUD COMPUTING Lipsa Tripathy, Rasmi Ranjan Patra CSA,CPGS,OUAT,Bhubaneswar,Odisha Abstract Cloud computing is an emerging technology. It process huge amount of data so scheduling mechanism

More information

SOLARWINDS NETWORK PERFORMANCE MONITOR

SOLARWINDS NETWORK PERFORMANCE MONITOR DATASHEET SOLARWINDS NETWORK PERFORMANCE MONITOR Fault, Availability, Performance, and Deep Packet Inspection SolarWinds Network Performance Monitor (NPM) is powerful and affordable network monitoring

More information

KEYWORDS: Internet Applications, Security, Languages, Review and evaluation.

KEYWORDS: Internet Applications, Security, Languages, Review and evaluation. [Madhusudhanan, 4(3): March, 2015] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY WEB SECURITY VULNERABILITY ASSESSMENT AND RECOVERY MACHANISAM M.Madhusudhanan*,

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

ISTQB Certified Tester. Foundation Level. Sample Exam 1

ISTQB Certified Tester. Foundation Level. Sample Exam 1 ISTQB Certified Tester Foundation Level Version 2015 American Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. #1 When test cases are designed

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Coverage Criteria for Search Based Automatic Unit Testing of Java Programs

Coverage Criteria for Search Based Automatic Unit Testing of Java Programs ISSN (Online): 2409-4285 www.ijcsse.org Page: 256-263 Coverage Criteria for Search Based Automatic Unit Testing of Java Programs Ina Papadhopulli 1 and Elinda Meçe 2 1, 2 Department of Computer Engineering,

More information

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence

Augmented Search for IT Data Analytics. New frontier in big log data analysis and application intelligence Augmented Search for IT Data Analytics New frontier in big log data analysis and application intelligence Business white paper May 2015 IT data is a general name to log data, IT metrics, application data,

More information

QOS Based Web Service Ranking Using Fuzzy C-means Clusters

QOS Based Web Service Ranking Using Fuzzy C-means Clusters Research Journal of Applied Sciences, Engineering and Technology 10(9): 1045-1050, 2015 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2015 Submitted: March 19, 2015 Accepted: April

More information

SINGLE-STAGE MULTI-PRODUCT PRODUCTION AND INVENTORY SYSTEMS: AN ITERATIVE ALGORITHM BASED ON DYNAMIC SCHEDULING AND FIXED PITCH PRODUCTION

SINGLE-STAGE MULTI-PRODUCT PRODUCTION AND INVENTORY SYSTEMS: AN ITERATIVE ALGORITHM BASED ON DYNAMIC SCHEDULING AND FIXED PITCH PRODUCTION SIGLE-STAGE MULTI-PRODUCT PRODUCTIO AD IVETORY SYSTEMS: A ITERATIVE ALGORITHM BASED O DYAMIC SCHEDULIG AD FIXED PITCH PRODUCTIO Euclydes da Cunha eto ational Institute of Technology Rio de Janeiro, RJ

More information

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm , pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College

More information

Confirmation Bias as a Human Aspect in Software Engineering

Confirmation Bias as a Human Aspect in Software Engineering Confirmation Bias as a Human Aspect in Software Engineering Gul Calikli, PhD Data Science Laboratory, Department of Mechanical and Industrial Engineering, Ryerson University Why Human Aspects in Software

More information

Access Stations and other Services at SERC. M.R. Muralidharan

Access Stations and other Services at SERC. M.R. Muralidharan Access Stations and other Services at SERC M.R. Muralidharan Overview Platforms and Floors Access Stations Wireless Facility Software printing and plotting Software Packages Maintained by SERC Symantec

More information

"Practical Security Testing for Web Applications"

Practical Security Testing for Web Applications T10 Track 5/7/2009 11:15:00 AM "Practical Security Testing for Web Applications" Presented by: Rafal Los Hewlett-Packard Application Security Center Presented at: 330 Corporate Way, Suite 300, Orange Park,

More information

Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012

Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization. Learning Goals. GENOME 560, Spring 2012 Why Taking This Course? Course Introduction, Descriptive Statistics and Data Visualization GENOME 560, Spring 2012 Data are interesting because they help us understand the world Genomics: Massive Amounts

More information

An ACO Approach to Solve a Variant of TSP

An ACO Approach to Solve a Variant of TSP An ACO Approach to Solve a Variant of TSP Bharat V. Chawda, Nitesh M. Sureja Abstract This study is an investigation on the application of Ant Colony Optimization to a variant of TSP. This paper presents

More information

Software Security Testing

Software Security Testing Software Security Testing Elizabeth Sanders Department of Electrical & Computer Engineering Missouri University of Science and Technology ejwxcf@mst.edu 2015 Elizabeth Sanders Pop Quiz What topics am I

More information

A Brief Overview of Software Testing Techniques and Metrics

A Brief Overview of Software Testing Techniques and Metrics A Brief Overview of Software Techniques and Metrics Anitha.A Programmer, School of Computer Studies (PG), RVS college of Arts & science, Coimbatore, India. Abstract: Software is the process of executing

More information

Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation. TRADING SYSTEM LAB Product Description Version 1.

Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation. TRADING SYSTEM LAB Product Description Version 1. Software that writes Software Stochastic, Evolutionary, MultiRun Strategy Auto-Generation TRADING SYSTEM LAB Product Description Version 1.1 08/08/10 Trading System Lab (TSL) will automatically generate

More information