<--- Back to Details
First PageDocument Content
Technology / Test Data Generation / Test automation / Test data / Mutation / Test case / Unit testing / Book:Software testing / Database testing / Software testing / Evaluation / Mutation testing
Date: 2002-07-11 10:57:13
Technology
Test Data Generation
Test automation
Test data
Mutation
Test case
Unit testing
Book:Software testing
Database testing
Software testing
Evaluation
Mutation testing

skip me skip me

Add to Reading List

Source URL: cs.gmu.edu

Download Document from Source Website

File Size: 131,91 KB

Share Document on Facebook

Similar Documents

Logic / Mathematical logic / Mathematics / Boolean algebra / Complexity classes / Metalogic / Model theory / True quantified Boolean formula / Satisfiability / FO / PSPACE-complete / Well-formed formula

Introduction Background, Theory Validating Squolem’s Certificates in HOL4 Evaluation Conclusions

DocID: 1xW1P - View Document

Design of experiments / Causal inference / Evaluation / Observational study / Methodology / Knowledge / Impact assessment / Confounding / Experiment / Quasi-experiment / Program evaluation / Impact evaluation

A2J Evaluation and Research Options Process Evaluation Formative Assessment

DocID: 1xVZa - View Document

Education / Learning / Educational psychology / Course evaluation / Formative assessment / Educational assessment / Peer feedback / Educational technology / Active learning / Classroom Assessment Techniques

March 30th, 2016 Vol. 15, Issue 2 Reflections on End-of-Semester Evaluation Hoda Mostafa MD, Associate Professor of Practice Associate Director Center for Learning and Teaching

DocID: 1xVYB - View Document

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

DocID: 1xVWY - View Document

Cryptography / Stream ciphers / Block cipher / ESTREAM / DICING / WG

A fundamental evaluation of 80bit keys employed by hardware oriented stream ciphers Iain Devlin Centre for Electronic Systems, Durham University

DocID: 1xVU1 - View Document