default search action
QRS Companion 2015: Vancouver, BC, Canada
- 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Companion, Vancouver, BC, Canada, August 3-5, 2015. IEEE 2015, ISBN 978-1-4673-9598-4
Session II-C: Information Assurance Workshop I
- Matthias Gander, Clemens Sauerwein, Ruth Breu:
Assessing Real-Time Malware Threats. 6-13 - Changsong Liu, Yangyang Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu:
An AST-Based Approach to Classifying Defects. 14-21 - Anneliese Andrews, Salwa Elakeili, Ahmed Alhaddad:
Selective Regression Testing of Safety-Critical Systems: A Black Box Approach. 22-31
Session II-D: Trustworthy Computing Workshop I
- Siqian Gong, Beibei Yin, Wenlong Zhu, Kai-Yuan Cai:
An Adaptive Control Strategy for Resource Allocation of Service-Based Systems in Cloud Environment. 32-39 - Juan Jenny Li, Peter Abbate, Brian Vega:
Detecting Security Threats Using Mobile Devices. 40-45 - Josip Bozic, Franz Wotawa:
PURITY: A Planning-based secURITY Testing Tool. 46-55 - Linzhi Huang, Jun Ai, Hanyu Pei:
Software Network Models Based on Dynamic Execution for Fault Propagation Research. 56-61
Session III-C: Information Assurance Workshop II
- Xu Zhao, Yan Wang:
Efficiently Testing Intelligent Transportation System in Simulation Environment. 62-71 - Xiaobo Yan, Yichen Wang, Anzhi Zhu, Yikun Wang:
A Fault Propagation Model for Embedded Software. 72-79 - Sai Kiran Thati, Junhua Ding, Dongmei Zhang, Xin-Hua Hu:
Feature Selection and Analysis of Diffraction Images. 80-88 - Yujing Ma, Yixiang Chen, Bin Gu:
An Attributes-Based Allocation Approach of Software Trustworthy Degrees. 89-94
Session III-D: Trustworthy Computing Workshop II
- Donghoon Kim, Mladen A. Vouk:
Securing Scientific Workflows. 95-104 - Nesa Asoudeh, Yvan Labiche:
On the Effect of Counters in Guard Conditions When State-Based Multi-objective Testing. 105-114 - Chi-An Chih, Yu-Lun Huang:
An Adjustable Risk Assessment Method for a Cloud System. 115-120 - Hsia-Hsiang Chen, Han-Lin Lu, Shih-Kun Huang, Ruizhi Gao, W. Eric Wong:
Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization Techniques. 121-127
Session VI-A: MVV Workshop
- Paul Muntean, Adnan Rabbi, Andreas Ibing, Claudia Eckert:
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code. 128-137 - Tolga Ayav, Fevzi Belli:
Boolean Differentiation for Formalizing Myers' Cause-Effect Graph Testing Technique. 138-143 - Alessandro Oliveira Arantes, Valdivino Alexandre de Santiago Jr., Nandamudi Lankalapalli Vijaykumar:
On Proposing a Test Oracle Generator Based on Static and Dynamic Source Code Analysis. 144-152
Session VI-B: SSCPS Workshop
- Bin Li, Jun Liu, Jianhua Zhao:
Code Generation for Abstract Data Types Based on Program Analysis. 153-160 - Huiyong Li, Yuanrui Zhang, Yixiang Chen:
PSTEP - A Novel Probabilistic Event Processing Language for Uncertain Spatio-temporal Event Streams of Internet of Vehicles. 161-168 - Na Li, Yunwei Dong, Tianwei Che, Chao Wang, Yang Gao:
The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access. 169-172 - Xinghua Yao, Jie Zhou:
A Model Language for Describing Spatio-temporal Changes. 173-181
Session VII-A: Fast Abstract
- Xiao Xiao:
Software Intensity Function Prediction by Haar Wavelet Regression. 182-183 - Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:
A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract). 184-185 - Qian Ye, Minyan Lu, Luyi Li:
Critical Nodes Evaluation in Large-Scale Software Based on Static Structure and Runtime Information. 186-187 - Siyuan Hu, Hong Zhang:
Towards Transformation from UML to Event-B. 188-189
Session VII-B: Data Mining and Obfuscation
- Shun Guo, Donghui Guo:
Mining Potential Information for Multiclass Microarray Data Using Centroid-Based Dimension Reduction. 190-194 - Khaled M. Khan, Mahboob Shaheen:
Data Obfuscation for Privacy and Confidentiality in Cloud Computing. 195-196
Session VIII-A: HSASQ Workshop
- Weifeng Zhang, Tianhao Pan, Yun Wang, Ziyuan Wang, Lei Xu:
UT-LDA Based Similarity Computing in Microblog. 197-201 - Yilin Qiu, Weiqiang Zhang, Weiqin Zou, Jia Liu, Qin Liu:
An Empirical Study of Developer Quality. 202-209 - Jeong Soo Eo, Hae-Ryong Choi, Ruizhi Gao, Shou-Yu Lee, W. Eric Wong:
Case Study of Requirements-Based Test Case Generation on an Automotive Domain. 210-215 - Jungui Zhou, Zhiyi Zhang, Peizhang Xie, Jingyu Wang:
A Test Data Generation Approach for Automotive Software. 216-220
Session VIII-B: SEKM Workshop
- Haipeng Cai:
Facilitating Information Management in Integrated Development Environments through Visual Interface Enhancements. 221-229 - Bingbing Fang, Guoqiang Li, Ling Fang, Jianwen Xiang:
A Refined Algorithm for Reachability Analysis of Updatable Timed Automata. 230-236 - Shanmuganathan Vasanthapriyan, Jing Tian, Jianwen Xiang:
A Survey on Knowledge Management in Software Engineering. 237-244 - Yoshiteru Nakamori, Fei Meng, Michitaka Kosaka, Jing Tian, Jianwen Xiang:
Service Systems Development Based on a Knowledge Synthesis Methodology. 245-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.