Long pages
Jump to navigation
Jump to search
Showing below up to 23 results in range #1 to #23.
- (hist) On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis [88,083 bytes]
- (hist) Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities [50,308 bytes]
- (hist) Proposing SQL Statement Coverage Metrics [41,922 bytes]
- (hist) An Empirical Evaluation of the MuJava Mutation Operators [38,536 bytes]
- (hist) Modifying Without a Trace: High-level Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms [33,001 bytes]
- (hist) Truckers Drive Their Own Assessment for Obstructive Sleep Apnea: A Collaborative Approach to Online Self-Assessment for Obstructive Sleep Apnea [26,117 bytes]
- (hist) Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks [25,965 bytes]
- (hist) An Empirical Evaluation of Assessing Software Requirements for Legal Compliance [6,274 bytes]
- (hist) JSCM.Figure2 [1,439 bytes]
- (hist) Notes about Images [1,165 bytes]
- (hist) Main Page [1,015 bytes]
- (hist) Emse-Table-11 [978 bytes]
- (hist) How to do References [890 bytes]
- (hist) Formatting decisions [282 bytes]
- (hist) IHI Table1 [0 bytes]
- (hist) Emse-table-10 [0 bytes]
- (hist) Emse-table-8 [0 bytes]
- (hist) Emse-table-7 [0 bytes]
- (hist) Emse-table-5 [0 bytes]
- (hist) EmSE-Figure7 [0 bytes]
- (hist) On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis" [0 bytes]
- (hist) JCSM.Figure1 [0 bytes]
- (hist) ICST.Table 1 [0 bytes]