


default search action
26th ISSRE 2015: Gaithersbury, MD, USA
- 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, Gaithersbury, MD, USA, November 2-5, 2015. IEEE Computer Society 2015, ISBN 978-1-5090-0406-5

- Tingshan Huang, Nagarajan Kandasamy, Harish Sethu:

Anomaly detection in computer systems using compressed measurements. 1-11 - Mahdi Eslamimehr, Mohsen Lesani:

AtomChase: Directed search towards atomicity violations. 12-23 - Mostafa Farshchi, Jean-Guy Schneider

, Ingo Weber, John C. Grundy
:
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis. 24-34 - Cuiyun Gao, Baoxiang Wang, Pinjia He, Jieming Zhu, Yangfan Zhou, Michael R. Lyu:

PAID: Prioritizing app issues for developers by tracking user reviews over versions. 35-45 - Yiling Lou, Dan Hao

, Lu Zhang:
Mutation-based test-case prioritization in software evolution. 46-57 - Tanzeem Bin Noor, Hadi Hemmati:

A similarity-based approach for test case prioritization using historical failure data. 58-68 - Paris Kitsos

, Dimitris E. Simos, Jose Torres-Jimenez, Artemios G. Voyiatzis:
Exciting FPGA cryptographic Trojans using combinatorial testing. 69-76 - Christoph Schulze, Mikael Lindvall, Sigurthor Bjorgvinsson, Robert Wiegand:

Model generation to support model-based testing applied on the NASA DAT Web-application - An experience report. 77-87 - Jean-Marie Mottu, Sagar Sen

, Juan José Cadavid, Benoit Baudry:
Discovering model transformation pre-conditions using automatically generated test models. 88-99 - David W. Flater:

WAP: Unreasonable distributions of execution time under reasonable conditions. 100-105 - Peter Tröger, Lena Feinbube, Matthias Werner:

WAP: What activates a bug? A refinement of the Laprie terminology model. 106-111 - David Threm, Liguo Yu, Srini Ramaswamy, Sithu D. Sudarsan:

Using normalized compression distance to measure the evolutionary stability of software systems. 112-120 - Hiroyuki Okamura, Tadashi Dohi:

Towards comprehensive software reliability evaluation in open source software. 121-129 - Xingyu Zhao

, Bev Littlewood, Andrey Povyakalo, David Wright:
Conservative claims about the probability of perfection of software-based systems. 130-140 - Guanpeng Li

, Karthik Pattabiraman, Chen-Yong Cher, Pradip Bose:
Experience report: An application-specific checkpointing technique for minimizing checkpoint corruption. 141-152 - Andreas Löfwenmark

, Simin Nadjm-Tehrani:
Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform. 153-160 - Alejandra Ruiz, Garazi Juez, Philipp Schleiss

, Gereon Weiss:
A safe generic adaptation mechanism for smart cars. 161-171 - Jia-Ju Bai, Yu-Ping Wang

, Hu-Qiu Liu, Shi-Min Hu:
Automated resource release in device drivers. 172-182 - Benjamin Jakobus, Eiji Adachi Barbosa, Alessandro F. Garcia, Carlos José Pereira de Lucena:

Contrasting exception handling code across languages: An experience report involving 50 open source projects. 183-193 - Xianglong Kong

, Lingming Zhang, W. Eric Wong, Bixin Li:
Experience report: How do techniques, programs, and tests impact automated program repair? 194-204 - Shiyu Dong, Oswaldo Olivo, Lingming Zhang, Sarfraz Khurshid:

Studying the influence of standard compiler optimizations on symbolic execution. 205-215 - Rahul Gopinath

, Amin Alipour
, Iftekhar Ahmed, Carlos Jensen, Alex Groce:
How hard does mutation analysis have to be, anyway? 216-227 - Dongjiang You, Sanjai Rayadurgam, Michael W. Whalen, Mats Per Erik Heimdahl, Gregory Gay:

Efficient observability-based test generation by dynamic symbolic execution. 228-238 - Zhiqiang Zhang, Tianyong Wu, Jian Zhang:

Boundary value analysis in automatic white-box test generation. 239-249 - Gustavo Ansaldi Oliva, Marco Aurélio Gerosa:

Experience report: How do structural dependencies influence change propagation? An empirical study. 250-260 - Lucas Amorim, Evandro Costa, Nuno Antunes

, Baldoino Fonseca, Márcio Ribeiro
:
Experience report: Evaluating the effectiveness of decision trees for detecting code smells. 261-269 - Tukaram Muske, Uday P. Khedker:

Efficient elimination of false positives using static analysis. 270-280 - Yongwang Zhao, Zhibin Yang, David Sanán

, Yang Liu
:
Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B. 281-292 - Andreas Ulrich, Anjelika Votintseva:

Experience report: Formal verification and testing in the development of embedded software. 293-302 - Matteo Camilli

, Angelo Gargantini, Patrizia Scandurra
:
Specifying and verifying real-time self-adaptive systems. 303-313 - Daniel Vecchiato, Eliane Martins:

Experience report: A field analysis of user-defined security configurations of Android devices. 314-323 - Daniel Schneider, Mario Trapp, Yiannis Papadopoulos, Eric Armengaud

, Marc Zeller, Kai Höfig:
WAP: Digital dependability identities. 324-329 - Michael Grottke

, Alberto Avritzer, Daniel Sadoc Menasché, Javier Alonso, Leandro Pfleger de Aguiar, Sara G. Alvarez:
WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns. 330-335 - João Matos, João Garcia, Paolo Romano

:
Enhancing privacy protection in fault replication systems. 336-347 - Hui Xu, Yangfan Zhou, Cuiyun Gao, Yu Kang, Michael R. Lyu:

SpyAware: Investigating the privacy leakage signatures in app execution traces. 348-358 - Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Fábio Fagundes Silveira

, Alessandro F. Garcia:
Experience report: Can software testing education lead to more reliable code? 359-369 - Xin Xia

, David Lo
, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li:
Experience report: An industrial experience report on test outsourcing practices. 370-380 - Martin L. Shooman:

Software reliability growth model based on Bohrbugs and Mandelbugs. 381-386 - Marllos P. Prado, Eric Verbeek, Margaret-Anne D. Storey, Auri M. R. Vincenzi

:
WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspective. 387-392 - Shuai Wang, Shaukat Ali, Tao Yue, Marius Liaaen:

UPMOA: An improved search algorithm to support user-preference multi-objective optimization. 393-404 - Jeff Anderson, Hyunsook Do, Saeed Salem:

Experience report: Mining test results for reasons other than functional correctness. 405-415 - Sandro Morasca

:
Classifying faulty modules with an extension of the H-index. 416-426 - Xuan-Bach Dinh Le, Tien-Duy B. Le, David Lo

:
Should fixing these failures be delegated to automated program repair? 427-437 - Emily Kowalczyk, Atif M. Memon, Myra B. Cohen:

Piecing together app behavior from multiple artifacts: A case study. 438-449 - Mona Erfani Joorabchi, Mohamed Ali, Ali Mesbah

:
Detecting inconsistencies in multi-platform mobile apps. 450-460 - Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek:

SIG-Droid: Automated system input generation for Android applications. 461-471 - Domenico Cotroneo, Luigi De Simone

, Francesco Fucci, Roberto Natella
:
MoIO: Run-time monitoring for I/O protocol violations in storage device drivers. 472-483 - Jeff Rasley, Eleni Gessiou, Tony Ohmann, Yuriy Brun

, Shriram Krishnamurthi
, Justin Cappos:
Detecting latent cross-platform API violations. 484-495 - Robert J. Walls, Yuriy Brun

, Marc Liberatore, Brian Neil Levine:
Discovering specification violations in networked software systems. 496-506 - Bo Zhou, Iulian Neamtiu, Rajiv Gupta

:
Experience report: How do bug characteristics differ across severity classes: A multi-platform study. 507-517 - Lijie Xu, Wensheng Dou, Feng Zhu, Chushu Gao

, Jie Liu, Hua Zhong, Jun Wei:
Experience report: A characteristic study on out of memory errors in distributed data-parallel applications. 518-529 - Jie Wang, Wensheng Dou, Chushu Gao

, Jun Wei:
Fast reproducing web application errors. 530-540 - Sunil Nair, Neil Walkinshaw

, Tim Kelly, Jose Luis de la Vara
:
An evidential reasoning approach for assessing confidence in safety evidence. 541-552 - Julian Thomé, Lwin Khin Shar

, Lionel C. Briand:
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities. 553-564 - Zebao Gao, Chunrong Fang

, Atif M. Memon:
Pushing the limits on automation in GUI regression testing. 565-575

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














