Essays about: "Automated Software Testing"
Showing result 1 - 5 of 220 essays containing the words Automated Software Testing.
-
1. A Case Study on the Limitations of Automated Duplicate Bug Report Detection
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Identifying duplicate bug reports is crucial in software development as it helps streamline the debugging process, reduce redundancy, and enhance overall efficiency. By addressing the challenges associated with existing automated techniques and leveraging testers’ expertise, the tool proposed in this study aims to improve the accuracy of duplicate detection, saving valuable time and resources while ensuring that potential duplicates are not overlooked. READ MORE
-
2. A comparison between random testing and adaptive random testing
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Software testing is essential for quality assurance, with automated techniques such as random testing and adaptive random testing being cost-effective solutions compared to others. Adaptive random testing seeks to enhance random testing, and there is a conception that adaptive random testing always should replace random testing. READ MORE
-
3. Continuous Integration for Embedded Software with Modular Firmware Architecture
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Continuous Integration (CI) techniques are widely adopted in web and application development but have received limited attention in the embedded software domain. This thesis investigates the application of CI techniques in embedded software development through a case study at Cobolt AB, a company specializing in optoelectronics. READ MORE
-
4. Behavioural comparison of test and field executions of video games
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Software developers write tests to ensure that their application behaves as intended. However, the behaviour of an application in production may deviate from the behaviours that are tested. This difference between test and field executions is rarely assessed in practice. READ MORE
-
5. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE