default search action
26th ISSRE 2015: Gaithersbury, MD, USA
- 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, Gaithersbury, MD, USA, November 2-5, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0406-5
- Tingshan Huang, Nagarajan Kandasamy, Harish Sethu:
Anomaly detection in computer systems using compressed measurements. 1-11 - Mahdi Eslamimehr, Mohsen Lesani:
AtomChase: Directed search towards atomicity violations. 12-23 - Mostafa Farshchi, Jean-Guy Schneider, Ingo Weber, John C. Grundy:
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis. 24-34 - Cuiyun Gao, Baoxiang Wang, Pinjia He, Jieming Zhu, Yangfan Zhou, Michael R. Lyu:
PAID: Prioritizing app issues for developers by tracking user reviews over versions. 35-45 - Yiling Lou, Dan Hao, Lu Zhang:
Mutation-based test-case prioritization in software evolution. 46-57 - Tanzeem Bin Noor, Hadi Hemmati:
A similarity-based approach for test case prioritization using historical failure data. 58-68 - Paris Kitsos, Dimitris E. Simos, Jose Torres-Jimenez, Artemios G. Voyiatzis:
Exciting FPGA cryptographic Trojans using combinatorial testing. 69-76 - Christoph Schulze, Mikael Lindvall, Sigurthor Bjorgvinsson, Robert Wiegand:
Model generation to support model-based testing applied on the NASA DAT Web-application - An experience report. 77-87 - Jean-Marie Mottu, Sagar Sen, Juan José Cadavid, Benoit Baudry:
Discovering model transformation pre-conditions using automatically generated test models. 88-99 - David W. Flater:
WAP: Unreasonable distributions of execution time under reasonable conditions. 100-105 - Peter Tröger, Lena Feinbube, Matthias Werner:
WAP: What activates a bug? A refinement of the Laprie terminology model. 106-111 - David Threm, Liguo Yu, Srini Ramaswamy, Sithu D. Sudarsan:
Using normalized compression distance to measure the evolutionary stability of software systems. 112-120 - Hiroyuki Okamura, Tadashi Dohi:
Towards comprehensive software reliability evaluation in open source software. 121-129 - Xingyu Zhao, Bev Littlewood, Andrey Povyakalo, David Wright:
Conservative claims about the probability of perfection of software-based systems. 130-140 - Guanpeng Li, Karthik Pattabiraman, Chen-Yong Cher, Pradip Bose:
Experience report: An application-specific checkpointing technique for minimizing checkpoint corruption. 141-152 - Andreas Löfwenmark, Simin Nadjm-Tehrani:
Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform. 153-160 - Alejandra Ruiz, Garazi Juez, Philipp Schleiss, Gereon Weiss:
A safe generic adaptation mechanism for smart cars. 161-171 - Jia-Ju Bai, Yu-Ping Wang, Hu-Qiu Liu, Shi-Min Hu:
Automated resource release in device drivers. 172-182 - Benjamin Jakobus, Eiji Adachi Barbosa, Alessandro F. Garcia, Carlos José Pereira de Lucena:
Contrasting exception handling code across languages: An experience report involving 50 open source projects. 183-193 - Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li:
Experience report: How do techniques, programs, and tests impact automated program repair? 194-204 - Shiyu Dong, Oswaldo Olivo, Lingming Zhang, Sarfraz Khurshid:
Studying the influence of standard compiler optimizations on symbolic execution. 205-215 - Rahul Gopinath, Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce:
How hard does mutation analysis have to be, anyway? 216-227 - Dongjiang You, Sanjai Rayadurgam, Michael W. Whalen, Mats Per Erik Heimdahl, Gregory Gay:
Efficient observability-based test generation by dynamic symbolic execution. 228-238 - Zhiqiang Zhang, Tianyong Wu, Jian Zhang:
Boundary value analysis in automatic white-box test generation. 239-249 - Gustavo Ansaldi Oliva, Marco Aurélio Gerosa:
Experience report: How do structural dependencies influence change propagation? An empirical study. 250-260 - Lucas Amorim, Evandro Costa, Nuno Antunes, Baldoino Fonseca, Márcio Ribeiro:
Experience report: Evaluating the effectiveness of decision trees for detecting code smells. 261-269 - Tukaram Muske, Uday P. Khedker:
Efficient elimination of false positives using static analysis. 270-280 - Yongwang Zhao, Zhibin Yang, David Sanán, Yang Liu:
Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B. 281-292 - Andreas Ulrich, Anjelika Votintseva:
Experience report: Formal verification and testing in the development of embedded software. 293-302 - Matteo Camilli, Angelo Gargantini, Patrizia Scandurra:
Specifying and verifying real-time self-adaptive systems. 303-313 - Daniel Vecchiato, Eliane Martins:
Experience report: A field analysis of user-defined security configurations of Android devices. 314-323 - Daniel Schneider, Mario Trapp, Yiannis Papadopoulos, Eric Armengaud, Marc Zeller, Kai Höfig:
WAP: Digital dependability identities. 324-329 - Michael Grottke, Alberto Avritzer, Daniel Sadoc Menasché, Javier Alonso, Leandro Pfleger de Aguiar, Sara G. Alvarez:
WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns. 330-335 - João Matos, João Garcia, Paolo Romano:
Enhancing privacy protection in fault replication systems. 336-347 - Hui Xu, Yangfan Zhou, Cuiyun Gao, Yu Kang, Michael R. Lyu:
SpyAware: Investigating the privacy leakage signatures in app execution traces. 348-358 - Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Fábio Fagundes Silveira, Alessandro F. Garcia:
Experience report: Can software testing education lead to more reliable code? 359-369 - Xin Xia, David Lo, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li:
Experience report: An industrial experience report on test outsourcing practices. 370-380 - Martin L. Shooman:
Software reliability growth model based on Bohrbugs and Mandelbugs. 381-386 - Marllos P. Prado, Eric Verbeek, Margaret-Anne D. Storey, Auri M. R. Vincenzi:
WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspective. 387-392 - Shuai Wang, Shaukat Ali, Tao Yue, Marius Liaaen:
UPMOA: An improved search algorithm to support user-preference multi-objective optimization. 393-404 - Jeff Anderson, Hyunsook Do, Saeed Salem:
Experience report: Mining test results for reasons other than functional correctness. 405-415 - Sandro Morasca:
Classifying faulty modules with an extension of the H-index. 416-426 - Xuan-Bach Dinh Le, Tien-Duy B. Le, David Lo:
Should fixing these failures be delegated to automated program repair? 427-437 - Emily Kowalczyk, Atif M. Memon, Myra B. Cohen:
Piecing together app behavior from multiple artifacts: A case study. 438-449 - Mona Erfani Joorabchi, Mohamed Ali, Ali Mesbah:
Detecting inconsistencies in multi-platform mobile apps. 450-460 - Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek:
SIG-Droid: Automated system input generation for Android applications. 461-471 - Domenico Cotroneo, Luigi De Simone, Francesco Fucci, Roberto Natella:
MoIO: Run-time monitoring for I/O protocol violations in storage device drivers. 472-483 - Jeff Rasley, Eleni Gessiou, Tony Ohmann, Yuriy Brun, Shriram Krishnamurthi, Justin Cappos:
Detecting latent cross-platform API violations. 484-495 - Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine:
Discovering specification violations in networked software systems. 496-506 - Bo Zhou, Iulian Neamtiu, Rajiv Gupta:
Experience report: How do bug characteristics differ across severity classes: A multi-platform study. 507-517 - Lijie Xu, Wensheng Dou, Feng Zhu, Chushu Gao, Jie Liu, Hua Zhong, Jun Wei:
Experience report: A characteristic study on out of memory errors in distributed data-parallel applications. 518-529 - Jie Wang, Wensheng Dou, Chushu Gao, Jun Wei:
Fast reproducing web application errors. 530-540 - Sunil Nair, Neil Walkinshaw, Tim Kelly, Jose Luis de la Vara:
An evidential reasoning approach for assessing confidence in safety evidence. 541-552 - Julian Thomé, Lwin Khin Shar, Lionel C. Briand:
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities. 553-564 - Zebao Gao, Chunrong Fang, Atif M. Memon:
Pushing the limits on automation in GUI regression testing. 565-575
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.