Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,115,617 papers from all fields of science
Search
Sign In
Create Free Account
Classification Tree Method
The Classification Tree Method is a method for test design, as it is used in different areas of software development.It was developed by Grimm and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
44 relations
AUTOSAR
All-pairs testing
Black-box testing
Boolean expression
Expand
Broader (2)
Software development process
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
APPLYING DESIGN ETHNOGRAPHY TO PRODUCT EVALUATION: A CASE EXAMPLE OF A MEDICAL DEVICE IN A LOW-RESOURCE SETTING
I. Mohedas
,
A. S. Sarvestani
,
S. Daly
,
K. Sienko
2015
Corpus ID: 73532820
The use of design ethnography for the design of human-computer interfaces and computer supported cooperative work systems has…
Expand
2015
2015
A computational intuition pump to examine group creativity: building on the ideas of others
R. Sosa
,
A. Connor
arXiv.org
2015
Corpus ID: 542226
This paper presents a computational approach to modelling group creativity. It presents an analysis of two studies of group…
Expand
2010
2010
Verification and Trade-Off Analysis of Security Properties in UML System Models
Geri Georg
,
K. Anastasakis
,
B. Bordbar
,
S. Houmb
,
I. Ray
,
Manachai Toahchoodee
IEEE Transactions on Software Engineering
2010
Corpus ID: 14504736
Designing secure systems is a nontrivial task. Incomplete or faulty designs can cause security mechanisms to be incorrectly…
Expand
2010
2010
A dynamic URL assignment method for parallel web crawler
A. Guerriero
,
F. Ragni
,
Claudio Martines
IEEE International Conference on Computational…
2010
Corpus ID: 14817039
A web crawler is a relatively simple automated program or script that methodically scans or “crawls” through Internet pages to…
Expand
2009
2009
Implementation of Tunneling Phenomena in a CNTFET Compact Model
S. Frégonèse
,
C. Maneux
,
T. Zimmer
IEEE Transactions on Electron Devices
2009
Corpus ID: 40675011
This paper presents the implementation of band-to-band tunneling (BTBT) mechanisms into the compact model of a conventional…
Expand
2003
2003
On Inspection and Verification of Software with Timing Requirements
Jia Xu
IEEE Trans. Software Eng.
2003
Corpus ID: 15673113
Software with hard timing requirements should be designed using a systematic approach to make its timing properties easier to…
Expand
2002
2002
The Classification Tree Method
F. Büchner
2002
Corpus ID: 10417983
All rights reserved. No part of this document may be copied or reproduced in any form or by any means without prior written…
Expand
1994
1994
Development of authentication protocols: some misconceptions and a new approach
W. Mao
,
C. Boyd
Proceedings The Computer Security Foundations…
1994
Corpus ID: 14653512
Various published authentication protocols that employ symmetric cryptographic algorithms are examined. A number of…
Expand
Review
1982
Review
1982
The Main Stages of the Late Quaternary Evolution of the Kalahari Region, Southern Africa
K. Heine
1982
Corpus ID: 127443852
The palaeogeographical and palaeoclimatic development of the Kalahari region provides strong evidence that South African climatic…
Expand
Highly Cited
1974
Highly Cited
1974
Scaling: A Sourcebook for Behavioral Scientists
Gary M. Maranell
1974
Corpus ID: 60781466
Despite the obvious importance of measurement in any scientific endeavor, few students of the social sciences receive adequate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE