


default search action
31th ISSRE 2020: Coimbra, Portugal - Workshops
- 2020 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Coimbra, Portugal, October 12-15, 2020. IEEE 2020, ISBN 978-1-7281-7735-9

- Fuyuki Ishikawa:

Testing and Debugging Autonomous Driving: Experiences with Path Planner and Future Challenges. xxxiii-xxxiv - Jeff Offutt:

ISSRE 2020 Doctoral Symposium Keynote : How to Get Your Paper Rejected. xxvi-xxvii - D. Richard Kuhn:

How do Ordinary Coding Errors Contribute to Security Vulnerabilities? xl - Zoltán Porkoláb:

Fuzzing C++ class interfaces for generating and running tests with libFuzzer. l-lii - Roberto Natella, Artur Andrzejak:

SAR Handbook Chapter: Experimental Tools for Software Aging Analysis. 1 - Hao Yang, Yang Xu, Yong Li, Hyun-Deok Choi:

K-Detector: Identifying Duplicate Crash Failures in Large-Scale Software Delivery. 1-6 - João Lima, Filipe Apolinario

, Nelson Escravana, Carlos Ribeiro:
BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures. 7-12 - Hongzhang Yang, Yahui Yang, Zhengguang Chen, Zongzhao Li, Yaofeng Tu:

ADF2T: an Active Disk Failure Forecasting and Tolerance Software. 13-18 - Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:

When Failure is (Not) an Option: Reliability Models for Microservices Architectures. 19-24 - Miren Illarramendi Rezabal

, Leire Etxeberria, Felix Larrinaga
, Goiuria Sagardui
:
CRESCO Framework and Checker: Automatic generation of Reflective UML State Machine's C++ Code and Checker. 25-30 - Monika Jaskolka

, Stephen Scott, Vera Pantelic, Alan Wassyng, Mark Lawford:
Applying Modular Decomposition in Simulink. 31-36 - Muhammad Usman Sarwar, Sarim Zafar, Mohamed Wiem Mkaouer, Gursimran Singh Walia, Muhammad Zubair Malik:

Multi-label Classification of Commit Messages using Transfer Learning. 37-42 - Maninder Singh, Gursimran S. Walia:

Using Semantic Analysis and Graph Mining Approaches to Support Software Fault Fixation. 43-48 - Vaibhav K. Anu

, Kazi Zakia Sultana, Bharath K. Samanthula:
A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities. 49-54 - Nuno Silva, Xavier Ferreira, Jesper T. Troelsen, Tomasz Kacmajor:

Independent Verification and Validation for the Space Industry: Guide Evolution Experience. 55-60 - Stephan Baumgart, Joakim Fröberg, Sasikumar Punnekkat:

A Process to Support Safety Analysis for a System-of-Systems. 61-66 - Claudius V. Jordan, Florian Hauer, Philipp Foth

, Alexander Pretschner:
Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case Study. 67-72 - Nermin Kajtazovic, Peter Hödl, Georg Macher

:
Instrumenting Compiler Pipeline to Synthesise Traceable Runtime Memory Layouts in Mixed-critical Applications. 73-78 - Jean Guyomarc'h

, Jean-Baptiste Hervé:
Static and Verifiable Memory Partitioning for Safety-Critical Systems. 79-84 - Athira Varma Jayakumar, Smitha Gautham, D. Richard Kuhn, Brandon J. Simon, Aidan G. Collins, Thomas Dirsch, Raghu Kacker, Carl R. Elks

:
Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power Applications. 85-90 - Seunghwan Baek, Jisoo Song, Changyun Seo:

RSX: Reproduction Scenario Extraction Technique for Business Application Workloads in DBMS. 91-96 - Hongjun He, Jicheng Cao, Lesheng Du, Hao Li, Shilong Wang, Shengyu Cheng:

ConstBin: A Tool for Automatic Fixing of Unreproducible Builds. 97-102 - Jinfu Chen, Jingyi Chen, Dong Guo, Dave Towey

:
An improved fuzzing approach based on adaptive random testing. 103-108 - Dheeraj Chahal, Ravi Ojha, Manju Ramesh, Rekha Singhal:

Migrating Large Deep Learning Models to Serverless Architecture. 111-116 - Gilhee Lee, Taegeun Moon, Min Jang, Hyoungshick Kim:

eAPT: enhancing APT with a mirror site resolver. 117-122 - José D'Abruzzo Pereira:

Techniques and Tools for Advanced Software Vulnerability Detection. 123-126 - Antonio Guerriero

:
Reliability Evaluation of ML systems, the oracle problem. 127-130 - José Flora

:
Improving the Security of Microservice Systems by Detecting and Tolerating Intrusions. 131-134 - Raul Sena Ferreira

:
Towards safety monitoring of ML-based perception tasks of autonomous systems. 135-138 - Thomas Hirsch:

A Fault Localization and Debugging Support Framework driven by Bug Tracking Data. 139-142 - M. Alireza Hakamian:

Engineering Resilience: Predicting The Change Impact on Performance and Availability of Reconfigurable Systems. 143-146 - Jinyi Zhou, Kun Qiu, Zheng Zheng, Tsong Yueh Chen

, Pak-Lok Poon
:
Using Metamorphic Testing to Evaluate DNN Coverage Criteria. 147-148 - Naghmeh Ivaki

, Nuno Antunes
:
SIDE: Security-aware Integrated Development Environment. 149-150 - Juan Hernández-Serrato, Alejandro Velasco

, Yury Nifio, Mario Linares-Vásquez:
Applying Machine Learning with Chaos Engineering. 151-152 - Alexandra Figueiredo, Tatjana Lide, Miguel Correia:

Multi-Language Web Vulnerability Detection. 153-154 - Vidroha Debroy, Alireza Mansoori, James Haleblian, Mark Wilkens:

Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud. 153-154 - Qianying Liao

:
Modelling CI/CD Pipeline Through Agent-Based Simulation. 155-156 - Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:

Automated Tool for Revising Masking MC/DC Test Suite. 157-158 - Tomohiko Takagi, Koichiro Sakata:

Test-First for Abstracted Behavior of Software Using Extended Finite State Machine. 159-160 - Nataliya Yakymets, Morayo Adedjouma:

Model-based Quantitative Fault Tree Analysis based on FIDES Reliability Prediction. 161-162 - Ashlie B. Hocking, Jonathan C. Rowanhill, Ben L. Di Vito:

Unit Lemmas for Detecting Requirement and Specification Flaws. 163-164 - Jonathan C. Rowanhill, Ashlie B. Hocking, William Hawkins:

TDABD: Test-Driven-Assurance-Based Development. 165-166 - Nishanth Laxman, Peter Liggesmeyer:

Should we "safely" handle the uncertainties at runtime? - A rather seldom asked question. 167-168 - Madhuparna Bhowmik, Nara Madhumitha, Biju R. Mohan

:
Similarity Calculation of Executable Using Intel Pin Instrumentation Framework. 169-170 - Thomas Hirsch, Birgit Hofer

:
Root cause prediction based on bug reports. 171-176 - Majid Rezazadeh, Naser Ezzati-Jivan, Evan Galea, Michel R. Dagenais:

Multi-Level Execution Trace Based Lock Contention Analysis. 177-182 - Rodger William Byrd, Taniza Sultana, Kristen R. Walcott:

AHPCap: A Framework for Automated Hardware Profiling and Capture of Mobile Application States. 183-188 - Matteo Camilli

, Carmine Colarusso
, Barbara Russo, Eugenio Zimeo:
Domain Metric Driven Decomposition of Data-Intensive Applications. 189-196 - Gianluca Filippone

, Marco Autili
, Massimo Tivoli
:
Towards the synthesis of context-aware choreographies. 197-200 - Andrea Stocco, Paolo Tonella:

Towards Anomaly Detectors that Learn Continuously. 201-208 - Antonia Bertolino, Francesca Lonetti

, Vânia de Oliveira Neves:
Standing on the Shoulders of Software Product Line Research for Testing Systems of Systems. 209-214 - Alessandro Tundo

, Chiara Castelnovo, Marco Mobilio, Oliviero Riganelli, Leonardo Mariani:
Declarative Dashboard Generation. 215-218 - Björn Wudka

, Carsten Thomas, Lennart Siefke
, Volker Sommer:
A Reconfiguration Approach for Open Adaptive Systems-of-Systems. 219-222 - Antonio Brogi

, Stefano Forti
, Carlos Guerrero, Isaac Lera:
Towards Declarative Decentralised Application Management in the Fog. 223-230 - Charles F. Gonçalves, Nuno Antunes

:
Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen. 231-236 - David Pereira, João F. Ferreira

, Alexandra Mendes
:
Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks. 237-242 - Gianpiero Costantino, Ilaria Matteucci

, Domenico Morales:
EARNEST: A challenge-based intrusion prevention system for CAN messages. 243-248 - Lydia Gauerhof, Yuki Hagiwara, Christoph Schorn

, Mario Trapp:
Considering Reliability of Deep Learning Function to Boost Data Suitability and Anomaly Detection. 249-254 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:

Evaluating Deep Learning Classification Reliability in Android Malware Family Detection. 255-260 - Carlo Abate

, Lelio Campanile
, Stefano Marrone:
A flexible simulation-based framework for model-based/data-driven dependability evaluation. 261-266 - M. Alireza Hakamian, Floriment Klinaku, André van Hoorn, Steffen Becker:

Resilience, Survivability, and Elasticity: A Taxonomy for Change Impact Quantification of Reconfigurable Systems. 267-274 - Sylvaine Picard, Camille Chapdelaine, Cyril Cappi, Laurent Gardes, Eric Jenn, Baptiste Lefèvre, Thomas Soumarmon:

Ensuring Dataset Quality for Machine Learning Certification. 275-282 - Arpan Gujarati, Sathish Gopalakrishnan, Karthik Pattabiraman:

New Wine in an Old Bottle: N-Version Programming for Machine Learning Components. 283-286 - Joanna C. S. Santos

, Ali Shokri
, Mehdi Mirakhorli:
Towards Automated Evidence Generation for Rapid and Continuous Software Certification. 287-294 - Carmen Cârlan, Daniel Petrisor, Barbara Gallina, Hannes Schoenhaar:

Checkable Safety Cases: Enabling Automated Consistency Checks between Safety Work Products. 295-302 - Johan Sundell, Kristina Lundqvist, Håkan Forsberg:

Safety-Critical Software - Quantification of Test Results. 303-310 - Lilian Barros

, Celso M. Hirata, Johnny Cardoso Marques, Ana Maria Ambrosio:
Generating test cases to evaluate and improve processes of safety-critical systems development. 311-318 - Alberto Avritzer, Domenico Cotroneo, Yennun Huang, Kishor S. Trivedi:

Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract. 319-320 - Vasilis P. Koutras, Agapios N. Platis:

Chapter 3: Software Rejuvenation: Key Concepts and Granularity. 321-322 - Javier Alonso, Kalyan Vaidyanathan, Roberto Pietrantuono

:
SAR Handbook Chapter: Measurements-based aging analysis. 323-324 - Fumio Machida, Paulo R. M. Maciel:

Markov chains and Petri nets for software rejuvenation systems. 325-326 - Alberto Avritzer, Michael Grottke, Daniel Sadoc Menasché:

Chapter 8: Software Aging Monitoring and Rejuvenation for the Assessment of High Availability Systems - Extended Abstract. 327 - Keita Suzuki, Takafumi Kubota, Kenji Kono:

Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux Kernel. 329-335 - Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi:

How Robust is the Optimal Software Rejuvenation Timing? 336-341 - Ermeson C. Andrade, Fumio Machida, Roberto Pietrantuono

, Domenico Cotroneo:
Software Aging in Image Classification Systems on Cloud and Edge. 342-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














