Search Results - "Kuhn, D Richard"
-
1
Challenges of Assured Autonomy
Published in IEEE transactions on reliability (01-03-2024)“…This article summarizes some recent novel approaches to the problem of verification, testing, and assurance of autonomous systems. These include proxy…”
Get full text
Journal Article -
2
Finding Bugs in Cryptographic Hash Function Implementations
Published in IEEE transactions on reliability (01-09-2018)“…Cryptographic hash functions are security-critical algorithms with many practical applications, notably in digital signatures. Developing an approach to test…”
Get full text
Journal Article -
3
Access Control for Emerging Distributed Systems
Published in Computer (Long Beach, Calif.) (01-10-2018)“…As big data, cloud computing, grid computing, and the Internet of Things reshape current data systems and practices, IT experts are keen to harness the power…”
Get full text
Journal Article -
4
Adding Attributes to Role-Based Access Control
Published in Computer (Long Beach, Calif.) (01-06-2010)“…Merging the best features of RBAC and attribute-based systems can provide effective access control for distributed and rapidly changing applications…”
Get full text
Journal Article -
5
Combinatorial Test Generation for Multiple Input Models With Shared Parameters
Published in IEEE transactions on software engineering (01-07-2022)“…Combinatorial testing typically considers a single input model and creates a single test set that achieves <inline-formula><tex-math…”
Get full text
Journal Article -
6
How does combinatorial testing perform in the real world: an empirical study
Published in Empirical software engineering : an international journal (01-07-2020)“…Studies have shown that combinatorial testing (CT) can be effective for detecting faults in software systems. By focusing on the interactions between different…”
Get full text
Journal Article -
7
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing
Published in Software testing, verification & reliability (01-09-2008)“…This paper presents two strategies for multi‐way testing (i.e. t‐way testing with t>2). The first strategy generalizes an existing strategy, called…”
Get full text
Journal Article -
8
Attribute-Based Access Control
Published in Computer (Long Beach, Calif.) (01-02-2015)“…Attribute-based access control (ABAC) is a flexible approach that can implement AC policies limited only by the computational language and the richness of the…”
Get full text
Journal Article -
9
Leveraging Combinatorial Coverage in the Machine Learning Product Lifecycle
Published in Computer (Long Beach, Calif.) (01-07-2024)“…The data-intensive nature of machine learning (ML)-enabled systems introduces unique challenges in test and evaluation. We present an overview of combinatorial…”
Get full text
Journal Article -
10
Assured Autonomy Through Combinatorial Methods
Published in Computer (Long Beach, Calif.) (01-05-2024)“…Many conventional software engineering methods for high-trust software are not well suited to assured autonomy, but concepts from combinatorial testing can add…”
Get full text
Journal Article -
11
A Combinatorial Approach to Testing Deep Neural Network-based Autonomous Driving Systems
Published in 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-04-2021)“…Recent advancements in the field of deep learning have enabled its application in Autonomous Driving Systems (ADS). A Deep Neural Network (DNN) model is often…”
Get full text
Conference Proceeding -
12
The Path to a Consensus on Artificial Intelligence Assurance
Published in Computer (Long Beach, Calif.) (01-03-2022)“…Wide-scale adoption of intelligent algorithms requires artificial intelligence (AI) engineers to provide assurances that an algorithm will perform as intended…”
Get full text
Journal Article -
13
Measuring the Adequacy of a Test Suite With Respect to a Modeled Test Space
Published in IEEE software (01-09-2022)“…A test suite is typically assessed using a criterion such as requirements coverage or code coverage. This article presents a metric to measure the adequacy of…”
Get full text
Journal Article -
14
A Combinatorial Approach to Explaining Image Classifiers
Published in 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-04-2021)“…Machine Learning (ML) models, a core component to artificial intelligence systems, often come as a black box to the user, leading to the problem of…”
Get full text
Conference Proceeding -
15
CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing
Published in Empirical software engineering : an international journal (01-03-2022)“…Testing Internet of Things (IoT) systems is challenging. This is not only because of the various aspects of IoT systems, such as software, hardware, and…”
Get full text
Journal Article -
16
A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case
Published in IEEE network (01-01-2021)“…Distributed systems have always presented complex challenges, and technology trends are in many ways making the software designer's job more difficult. In…”
Get full text
Journal Article -
17
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems
Published in Computer (Long Beach, Calif.) (01-01-2021)“…Embedded systems are becoming ubiquitous companions in all our lives. This article reviews the terminology and modern understanding of complex anomalies and…”
Get full text
Journal Article -
18
Combinatorial Testing Metrics for Machine Learning
Published in 2021 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01-04-2021)“…This paper defines a set difference metric for comparing machine learning (ML) datasets and proposes the difference between datasets be a function of…”
Get full text
Conference Proceeding -
19
Refining the In-Parameter-Order Strategy for Constructing Covering Arrays
Published in Journal of research of the National Institute of Standards and Technology (01-09-2008)“…Covering arrays are structures for well-representing extremely large input spaces and are used to efficiently implement blackbox testing for software and…”
Get full text
Journal Article -
20
Software fault interactions and implications for software testing
Published in IEEE transactions on software engineering (01-06-2004)“…Exhaustive testing of computer software is intractable, but empirical studies of software failures suggest that testing can in some cases be effectively…”
Get full text
Journal Article