Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,404,454 papers from all fields of science
Search
Sign In
Create Free Account
Model-based testing
Known as:
Model based testing
, Model-driven testing
, MBT
Expand
Model-based testing is an application of model-based design for designing and optionally also executing artifacts to perform software testing or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
Black-box testing
Boolean satisfiability problem
Constraint programming
Data-driven testing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Modeling Cloud Architectures as Interactive Systems
A. Pérez
,
Bernhard Rumpe
MDHPCL@MoDELS
2014
Corpus ID: 2585070
The development and maintenance of cloud software is complicated by complex but crucial technological requirements that are…
Expand
2011
2011
Neural networks and fuzzy logic-based spark advance control of SI engines
Samir Saraswati
,
Praveen Kumar Agarwal
,
S. Chand
Expert systems with applications
2011
Corpus ID: 46163662
Highly Cited
2009
Highly Cited
2009
Assessment of soil n-alkane δD and branched tetraether membrane lipid distributions as tools for paleoelevation reconstruction
F. Peterse
,
M. V. D. Meer
,
+4 authors
J. Damsté
2009
Corpus ID: 54787030
Abstract. δ18O values of pedogenic minerals forming from soil water are commonly used to reconstruct paleoelevation. To…
Expand
2008
2008
Model-Based Firewall Conformance Testing
Achim D. Brucker
,
Lukas Brügger
,
B. Wolff
TestCom/FATES
2008
Corpus ID: 359115
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy…
Expand
2007
2007
Model-Based Security Vulnerability Testing
Percy Antonio Pari Salas
,
P. Krishnan
,
K. Ross
Australian Software Engineering Conference
2007
Corpus ID: 16125055
In this work we present a model-based framework for security vulnerabilities testing. Security vulnerabilities are not only…
Expand
Highly Cited
2006
Highly Cited
2006
Pulsed channel flow in Bhutan
Lincoln S. Hollister
,
Djordje Grujic
Geological Society Special Publication
2006
Corpus ID: 32789043
Abstract We summarize our results from Bhutan and interpret the Greater Himalaya Sequence (GHS) of Bhutan, together with a…
Expand
2006
2006
OpenModelica Development Environment with Eclipse Integration for Browsing, Modeling, and Debugging
A. Pop
,
P. Fritzson
,
E. Jagudin
,
Andreas Remar
,
David Akhvlediani
2006
Corpus ID: 54727142
The OpenModelica (MDT) Eclipse Plugin integrates the OpenModelica compiler and debugger with the Eclipse Integrated Development…
Expand
Highly Cited
1991
Highly Cited
1991
The Efficient Learning of Multiple Task Sequences
Satinder Singh
Neural Information Processing Systems
1991
Corpus ID: 558847
I present a modular network architecture and a learning algorithm based on incremental dynamic programming that allows a single…
Expand
Highly Cited
1989
Highly Cited
1989
Monitoring and assessement of butyltins in Atlantic coastal waters
C. Alzieu
,
J. Sanjuan
,
P. Michel
,
M. Borel
,
J. Dreno
1989
Corpus ID: 84281393
Highly Cited
1978
Highly Cited
1978
IBM's Santa Teresa Laboratory - Architectural Design for Program Development
Gerald M. McCue
IBM Systems Journal
1978
Corpus ID: 27883019
The reaction to the office environment was highly favorable. The increased work surface, the work surface arrangement, and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE