THE CONCEPTUAL VIEW OF TESTING AS A SERVICE (TAAS) ON CLOUD
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 4
Abstract
Cloud computing leads a chance in contributing a Testing as a Service (TaaS) for cloud, and cloud-based applications. It offers new business challenges, opportunities, and demands in advanced service models, QoS standards, testing techniques, and desires. This paper delivers a conceptual view on testing as a service in a cloud platform. It provides clear conceptual discussions regarding the testing as a service (TaaS), including its objectives, scope, motivations and values, required techniques, distinct features as well as testing environments. It not only provides the classification of diverse types of testing services in TaaS, but also provides the clear comparative study about the conventional software testing service and cloud-based testing as a service.
Authors and Affiliations
Anitha D, Srinath M. V
ENHANCING LOAD SHARING (ELShare) METHOD IN MOBILE CLOUD COMPUTING ENVIRONMENT
With uptrend of smartphones and an increasing number of services are provided by cloud computing. In mobile cloud computing (MCCs), a mobile user is integrated with a cloud server through a network gate...
PERFORMANCE ANALYSIS OF K-MEANS ALGORITHMS IN WEBLOG DATA
Web mining is used to discover interest patterns which can be applied to many real world problems like refining web sites, better understanding the user behavior, product approval etc. Data mining sof...
DESIGN PLOT BASED ON THE ASPECT RATIO OF DELAUNAY TRIANGULATION
Scatter plots with Cartesian coordinates are applied in scientific and mathematical visualization to present two variables for a given set of data typically. The number of displayed variables are increased to three when...
ROPE: A ROBUST ORDER PRESERVING RE-ENCRYPTION SCHEME FOR MOBILE CLOUD ENVIRONMENT
Cloud computing strengthens its presence within the public sector, Organizations and people are searching for cloud services to enhance productivity, security and scale back costs. With the except...
CONDITIONAL PRIVACY PROTOCOL TO OVERCOME SECURITY THREATS IN WIRELESS NETWORK TRANSACTIONS
Even with several technological developments and security protocols, the wireless network transaction is still not in safe waters. Today we come across several frauds related to this wireless network transactions, the ma...