INIS
security
100%
testing
64%
computer codes
58%
units
57%
developers
53%
tools
46%
design
37%
competition
35%
implementation
32%
programming
28%
java
28%
mapping
28%
machine learning
28%
exercise
28%
levels
21%
tolerance
21%
control
20%
distance
14%
evaluation
14%
randomness
10%
industry
10%
alarm systems
9%
people
9%
production
9%
environment
8%
graphs
7%
branching ratio
7%
solutions
7%
algorithms
7%
applications
7%
information
7%
exceptions
7%
feedback
7%
comparative evaluations
7%
relays
7%
fans
7%
distribution
7%
architecture
7%
errors
7%
learning
5%
labor
5%
accuracy
5%
neural networks
5%
explosions
5%
datasets
5%
engineering
5%
mining
5%
Keyphrases
Walloon Region
57%
Cybersecurity
57%
Fuzzing
28%
WebAssembly
28%
Feature-based Machine Learning
28%
Programming Exercises
28%
Execution Trace
28%
Distributed Network
28%
Variability-intensive Systems
19%
Distributed Trust
14%
Undetectable Error
14%
Severe Attack
14%
Communication Design
14%
Global Position
14%
Novel Design
14%
Distributed Software
14%
Runtime Exception
9%
Feature-based Mapping
9%
Mapping Activity
9%
Recurrent Neural Network
9%
Mapping Learning
9%
Greybox Fuzzing
9%
Functional Correctness
9%
Student Solutions
9%
Reference Implementation
9%
Automated Grading
9%
Automated Feedback
9%
Combinatorial Explosion
9%
Reverse Engineering
9%
Supervised Machine Learning
9%
Machine Learning
9%
Black Box
9%
Process Mining
9%
Learning Representations
9%
Memory Models
5%
Memory Safety
5%
Stack-based
5%
Widespread Adoption
5%
Security Assessment
5%
Operating System Kernel
5%
Runtime Overhead
5%
Virtual Machine
5%
Safety Control
5%
Control-flow Integrity
5%
Access Channel
5%
Untrusted
5%
Instruction Format
5%
Execution Model
5%
Regression Testing
5%
Comparison Processes
5%
Large-scale Assessment
5%
Practitioner Needs
5%
Desktop
5%
Evaluation Infrastructure
5%
Fault Localization
5%
Computer Science
Test Generation
47%
Automated Test
38%
Benchmarking
28%
Case Generation
28%
Initial Effort
28%
Fuzzing
28%
Reference Implementation
28%
WebAssembly
28%
Execution Trace
28%
Machine Learning
28%
Distributed Network
28%
Software Testing
19%
Intensive System
19%
Research Direction
19%
Knowledge Transfer
19%
Continuous Evolution
14%
Communication Design
14%
Process Mining
9%
Design Implementation
9%
Entire Application
9%
Control-Flow Graph
9%
Effective Support
9%
Comparison Process
9%
Fault Localization
9%
Reverse Engineering
9%
Mobile Application
9%
Symbolic Execution
9%
Recurrent Neural Network
9%
Hostile Environment
5%