


default search action
20th ISSRE 2009: Mysuru, Karnataka, India
- ISSRE 2009, 20th International Symposium on Software Reliability Engineering, Mysuru, Karnataka, India, 16-19 November 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3878-5

Reliability Modeling
- Norman F. Schneidewind, Mike Hinchey

:
A Complexity Reliability Model. 1-10 - Xiao Xiao

, Tadashi Dohi
:
Wavelet-Based Approach for Estimating Software Reliability. 11-20 - Katerina Goseva-Popstojanova

, Margaret Hamill:
Estimating the Probability of Failure When Software Runs Are Dependent: An Empirical Study. 21-30
Runtime Monitoring, Verification, and Profiling
- Somayeh Malakuti, Christoph Bockisch, Mehmet Aksit:

Applying the Composition Filter Model for Runtime Verification of Multiple-Language Software. 31-40 - Meiyappan Nagappan, Kesheng Wu

, Mladen A. Vouk:
Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays. 41-50 - Yansheng Zhang, I-Ling Yen, Farokh B. Bastani, Ann T. Tai, Savio N. Chau:

Optimal Adaptive System Health Monitoring and Diagnosis for Resource Constrained Cyber-Physical Systems. 51-60
Testing
- Hema Srikanth, Myra B. Cohen, Xiao Qu:

Reducing Field Failures in System Configurable Software: Cost-Based Prioritization. 61-70 - Kinga Dobolyi, Westley Weimer:

Harnessing Web-Based Application Similarities to Aid in Regression Testing. 71-80 - Laurie A. Williams, Gunnar Kudrjavets

, Nachiappan Nagappan:
On the Effectiveness of Unit Test Automation at Microsoft. 81-89
Predicting Defects and Failures
- Will Snipes

, Brian P. Robinson, Penelope A. Brooks:
Approximating Deployment Metrics to Predict Field Defects and Plan Corrective Maintenance Activities. 90-98 - Yue Jiang, Jie Lin, Bojan Cukic

, Tim Menzies:
Variance Analysis in Software Fault Prediction Models. 99-108 - Christian Bird, Nachiappan Nagappan, Harald C. Gall

, Brendan Murphy, Premkumar T. Devanbu
:
Putting It All Together: Using Socio-technical Networks to Predict Failures. 109-119
Security
- Hiroyuki Okamura

, Masataka Tokuzane, Tadashi Dohi
:
Optimal Security Patch Release Timing under Non-homogeneous Vulnerability-Discovery Processes. 120-128 - Nuno Seixas

, José Fonseca
, Marco Vieira
, Henrique Madeira
:
Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study. 129-135 - Prasanth Anbalagan, Mladen A. Vouk:

Towards a Unifying Approach in Understanding Security Problems. 136-145
Safety
- Marc Forster, Mario Trapp:

Fault Tree Analysis of Software-Controlled Component Systems Based on Second-Order Probabilities. 146-154 - Arshad Jhumka, Matthew Leeke:

Issues on the Design of Efficient Fail-Safe Fault Tolerance. 155-164
Fault Localization and Behavioral Compliance Checking
- Vidroha Debroy, W. Eric Wong:

Insights on Fault Interference for Programs with Multiple Bugs. 165-174 - Christopher Ackermann, Mikael Lindvall, Rance Cleaveland:

Towards Behavioral Reflexion Models. 175-184
Fault Localization and Behavioral Compliance Checking
- Allen P. Nikora, Galen Balcom:

Automated Identification of LTL Patterns in Natural Language Requirements. 185-194 - Tugkan Tuglular

, Can Arda Muftuoglu, Fevzi Belli, Michael Linschulte:
Event-Based Input Validation Using Design-by-Contract Patterns. 195-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














