[HTML][HTML] A survey on different approaches for software test case prioritization

R Mukherjee, KS Patnaik - Journal of King Saud University-Computer and …, 2021 - Elsevier
Testing is the process of evaluating a system by manual or automated means. While
Regression Test Selection (RTS) discards test cases and Test Suite Minimization (TSM) …

Emerging software testing technologies

F Lonetti, E Marchetti - Advances in computers, 2018 - Elsevier
Software testing encompasses a variety of activities along the software development
process and may consume a large part of the effort required for producing software. It …

Boosting a low-cost smart home environment with usage and access control rules

P Barsocchi, A Calabrò, E Ferro, C Gennaro… - Sensors, 2018 - mdpi.com
Smart Home has gained widespread attention due to its flexible integration into everyday
life. Pervasive sensing technologies are used to recognize and track the activities that …

A Systematic Map** Study of the Metrics, Uses and Subjects of Diversity‐Based Testing Techniques

IT Elgendy, RM Hierons… - … Testing, Verification and …, 2025 - Wiley Online Library
There has been a significant amount of interest regarding the use of DBTtsfull in software
testing over the past two decades. Diversity‐based testing (DBT) technique uses similarity …

Learning by sampling: learning behavioral family models from software product lines

CDN Damasceno, MR Mousavi, AS Simao - Empirical Software …, 2021 - Springer
Family-based behavioral analysis operates on a single specification artifact, referred to as
family model, annotated with feature constraints to express behavioral variability in terms of …

Automated reverse engineering of role-based access control policies of web applications

HT Le, LK Shar, D Bianculli, LC Briand… - Journal of Systems and …, 2022 - Elsevier
Access control (AC) is an important security mechanism used in software systems to restrict
access to sensitive resources. Therefore, it is essential to validate the correctness of AC …

Diversity of graph models and graph generators in mutation testing

O Semeráth, R Farkas, G Bergmann… - International Journal on …, 2020 - Springer
When custom modeling tools are used for designing complex safety-critical systems (eg,
critical cyber-physical systems), the tools themselves need to be validated by systematic …

A Survey of the Metrics, Uses, and Subjects of Diversity-Based Techniques in Software Testing

IT Elgendy, RM Hierons, P McMinn - arxiv preprint arxiv:2311.09714, 2023 - arxiv.org
There has been a significant amount of interest regarding the use of diversity-based testing
techniques in software testing over the past two decades. Diversity-based testing (DBT) …

Continuous development and testing of access and usage control: A systematic literature review

S Daoudagh, F Lonetti, E Marchetti - Proceedings of the 2020 European …, 2020 - dl.acm.org
Context: Development and testing of access/usage control systems is a growing research
area. With new trends in software development such as DevOps, the development of …

A dynamic and scalable solution for improving daily life safety

A Calabrò, E Marchetti, D Moroni, G Pieri - Proceedings of the 2nd …, 2019 - dl.acm.org
The integration of computation, networking, and physical processes requires regular
exchange of critical information in timely and reliable fashion and a secure modeling and …