default search action
33rd ISSRE 2022: Charlotte, NC, USA - Workshops
- IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE 2022 - Workshops, Charlotte, NC, USA, October 31 - Nov. 3, 2022. IEEE 2022, ISBN 978-1-6654-7679-9
- Luigi De Simone, Nuno Laranjeiro:
Message from the WoSoCer 2022 Chairs. xxvi - Dan Kim:
Moving Target Defense (MTD): Recent Advances and Future Research Challenges. xxxi - Zheng Zheng, Hadi Hemmati:
Message from the Doctoral Symposium Chairs. xvii - Katerina Goseva-Popstojanova, Bojan Cukic:
Message from the ISSRE 2022 General Co-Chairs. xiv - Yan-Fu Li, Yinxing Xue, Lei Ma, Shengjian Guo, Guozhu Meng:
Message from the RAIS 2022 Chairs. xxxviii - Philip Koopman:
Keynote 1: How Safe Is Safe Enough for Autonomous Vehicles? xxviii - Junwei Zhou:
Message from the SSSML 2022 Workshop Organization Committee. xxxvi - Raffaele Della Corte, Marta Catillo, João F. Ferreira, Guanpeng Li:
Message from the RSDA 2022 Workshop Chairs. xxix - Alberto Avritzer, Michael Grottke, Ricardo M. Czekster, Raffaele Romagnoli:
Message from the WoSAR 2022 Chairs. xxi - Junwei Zhou, Antonio Ken Iannillo:
Message from the ISSRE 2022 Fast Abstract Co-Chairs. xix - Uttam Thakore, Muntasir Rahman, Xin Xia, Keun Soo Yim:
Message from the ISSRE 2022 Industry Track Committee Chairs. xv - Phil Laplante, Ben Amaba, Rick Kuhn:
Message from the WAAM 2022 Chairs. 1 - Marcello Cinque, Raffaele Della Corte, Giorgio Farina, Stefano Rosiello:
An unsupervised approach to discover filtering rules from diagnostic logs. 1-6 - Kangjin Wang, Chuanjia Hou, Ying Li, Yaoyong Dou, Cheng Wang, Yang Wen, Jie Yao, Liping Zhang:
Cache Antagonists Identification: A Practice from Alibaba Colocation Datacenter. 7-12 - Jung-Hoon Kim, Young-Sik Lee:
A Page-mapping Consistency Protecting Method for Soft Error Damage in Flash-based Storage. 13-18 - Austin Ketterer, Asha Shekar, Edgardo Barsallo Yi, Saurabh Bagchi, Abraham A. Clements:
An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies. 19-24 - Cihan Tunc, James Durflinger, Charif Mahmoudi, Valerio Formicola:
Autonomic ZTA-based Network Management Engine (AZNME). 25-30 - Gunnar Kudrjavets, Jeff Thomas, Aditya Kumar, Nachiappan Nagappan, Ayushi Rastogi:
When malloc() Never Returns NULL - Reliability as an Illusion. 31-36 - James M. Willenbring, Gursimran Singh Walia:
Using Complexity Metrics with Hotspot Analysis to Support Software Sustainability. 37-42 - Kazuhira Okumoto:
Early Software Defect Prediction: Right-Shifting Software Effort Data into a Defect Curve. 43-48 - Anushri Jana, Bharti Chimdyalwar, Shrawan Kumar, R. Venkatesh:
Fast Analysis of Evolving Software Systems. 49-54 - Advaita Datar, Amey Zare, Asia A, R. Venkatesh, Shrawan Kumar, Ulka Shrotri:
Automated Validation of Insurance Applications against Calculation Specifications. 55-60 - Han Fu, Sigrid Eldh, Kristian Wiklund, Andreas Ermedahl, Cyrille Artho:
Prevalence of continuous integration failures in industrial systems with hardware-in-the-loop testing. 61-66 - Tianyi Yang, Baitong Li, Jiacheng Shen, Yuxin Su, Yongqiang Yang, Michael R. Lyu:
Managing Service Dependency for Cloud Reliability: The Industrial Practice. 67-68 - Soolin Kim, Jusop Choi, Muhammad Ejaz Ahmed, Surya Nepal, Hyoungshick Kim:
VulDeBERT: A Vulnerability Detection System Using BERT. 69-74 - Shun Wang, Chao Ni, Jianbo Wang, Changhai Nie:
Detecting and Defending CSRF at API-Level. 75-80 - Haowei Quan, Jiawei Wang, Bo Li, Xiaoning Du, Kui Liu, Li Li:
Characterizing Python Method Evolution with PyMevol: An Essential Step Towards Enabling Reliable Software Systems. 81-86 - Oussama Jebbar, Ferhat Khendek, Maria Toeroe:
A Method for Component Evaluation for Live Testing of Cloud Systems. 87-92 - James J. Cusick, Alberto Avritzer, Allen Tse, Andrea Janes:
Automated Dependability Assessment in DevOps Environments. 93-98 - Noah Lee, Rui Abreu, Nachiappan Nagappan:
Code Quality Prediction Under Super Extreme Class Imbalance. 99-104 - Diaeddin Rimawi:
Green Resilience of Cyber-Physical Systems. 105-109 - Tiancheng Li, Xiaohui Wan, Muhammed Murat Özbek:
AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems. 110-113 - Sushovan Bhadra:
A Stochastic Petri net Model of Continuous Integration and Continuous Delivery. 114-117 - Lukás Cerný:
Towards automatic validation of composite heterogeneous systems in edge situations. 118-121 - Mengyuan Hou, Hui Xu:
LegoAI: Towards Building Reliable AI Software for Real-world Applications. 122-123 - Yintong Huo, Yuxin Su, Michael R. Lyu:
LogVm: Variable Semantics Miner for Log Messages. 124-125 - Marek R. Ogiela, Urszula Ogiela:
DNA-based Secret Sharing and Hiding in Dispersed Computing. 126-127 - Yiqun Chen, Matthew Bradbury, Neeraj Suri:
Towards Effective Performance Fuzzing. 128-129 - Matthew Siu-Hin Tang, T. H. Tse, Zhi Quan Zhou:
A Disjoint-Partitioning Approach to Enhancing Metamorphic Testing of DBMS. 130-131 - Wenxi Zhang, Kazunori Sakamoto, Hironori Washizaki, Yoshiaki Fukazawa:
Improving Fuzzing Coverage with Execution Path Length Selection. 132-133 - Marco Barletta, Marcello Cinque, Luigi De Simone, Raffaele Della Corte, Giorgio Farina, Daniele Ottaviano:
RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0. 134-135 - Sebastian Frank, M. Alireza Hakamian, Lion Wagner, Jóakim von Kistowski, André van Hoorn:
Towards Continuous and Data-driven Specification and Verification of Resilience Scenarios. 136-137 - Laura Carnevali, Marco Paolieri, Riccardo Reali, Leonardo Scommegna, Enrico Vicario:
A Markov Regenerative Model of Software Rejuvenation Beyond the Enabling Restriction. 138-145 - Leonardo Miranda, Cabral Lima, Daniel Sadoc Menasché, Guilherme de Melo Baptista Domingues:
Sequential Performance Analysis of Systems that Age and Rejuvenate. 146-153 - Takeru Wada, Hiroshi Yamada:
Towards Making Unikernels Rejuvenatable. 154-161 - Alessandro Fantechi, Gloria Gori, Marco Papini:
Software rejuvenation and runtime reliability monitoring. 162-169 - Douglas Dias, Fumio Machida, Ermeson Carneiro de Andrade:
Analysis of Software Aging in a Blockchain Platform. 170-177 - Soichiro Sakamoto, Keita Suzuki, Kenji Kono:
Crash Injection to Persistent Memory for Recovery Code Validation. 178-184 - Yancai Zhou, Chen Zhang, Kai Jia, Dongdong Zhao, Jianwen Xiang:
A Software Aging-Related Bug Prediction Framework Based on Deep Learning and Weakly Supervised Oversampling. 185-192 - Carmine Cesarano, Domenico Cotroneo, Luigi De Simone:
Towards Assessing Isolation Properties in Partitioning Hypervisors. 193-200 - Thomas Hastings, Kristen R. Walcott:
Continuous Verification of Open Source Components in a World of Weak Links. 201-207 - Philipp Schleiss, Yuki Hagiwara, Iwo Kurzidem, Francesco Carella:
Towards the Quantitative Verification of Deep Learning for Safe Perception. 208-215 - Qingyang Zhang, Fumio Machida, Ermeson Carneiro de Andrade:
Performance Bottleneck Analysis of Drone Computation Offloading to a Shared Fog Node. 216-221 - Joaquim Manuel Silva Cardoso Rodrigues, J. Eduardo Ferreira Ribeiro, Ademar Aguiar:
Improving Documentation Agility in Safety-Critical Software Systems Development For Aerospace. 222-229 - Rob Ashmore, Andrew Howe, Rhiannon Chilton, Shamal Faily:
Programming Language Evaluation Criteria for Safety-Critical Software in the Air Domain. 230-237 - Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo:
A Domain Specific Language for the ARINC 653 Specification. 238-245 - Sabuj Laskar, Md Hasanur Rahman, Guanpeng Li:
TensorFI+: A Scalable Fault Injection Framework for Modern Deep Learning Neural Networks. 246-251 - Alastair Nottingham, Molly Buchanan, Mark Gardner, Jason Hiser, Jack W. Davidson:
Sentinel: A Multi-institution Enterprise Scale Platform for Data-driven Cybersecurity Research. 252-257 - Tianyu Li, Xiuwen Lu, Hui Xu:
Automated Test Case Generation from Input Specification in Natural Language. 258-261 - Bohan Zhang, Yafan Huang, Rachael Chen, Guanpeng Li:
D2MoN: Detecting and Mitigating Real-Time Safety Violations in Autonomous Driving Systems. 262-267 - Li Huang, Bertrand Meyer, Manuel Oriol:
Improving Counterexample Quality from Failed Program Verification. 268-273 - Bahareh Afshinpour, Roland Groz, Massih-Reza Amini:
Correlating Test Events With Monitoring Logs For Test Log Reduction And Anomaly Prediction. 274-280 - Wanjin Zhou, Feifei Hu, Junyan Ma:
Improving Flexibility in Embedded System Runtime Verification with Python. 281-282 - Md. Jobair Hossain Faruk, Masrura Tasnim, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu:
Investigating Novel Approaches to Defend Software Supply Chain Attacks. 283-288 - Junwei Zhou, Botian Lei, Huile Lang:
Homomorphic multi-label classification of virus strains. 289-294 - Iwo Kurzidem, Adam Misik, Philipp Schleiss, Simon Burton:
Safety Assessment: From Black-Box to White-Box. 295-300 - Jixiang Zhou, Yi Zhang, Shengjian Guo, Yan Guo:
A Survey on Autonomous Driving System Simulators. 301-306 - Robab Aghazadeh Chakherlou, Kizito Salako, Lorenzo Strigini:
Arguing safety of an improved autonomous vehicle from safe operation before the change: new results. 307-312 - Pei Yang, Jing Wang, Huan Wang:
Colour Space Defence: Simple, Intuitive, but Effective. 313-317 - Guangshuang Ge, Liangliang Sun, Yan-Fu Li:
A systematic approach to develop an autopilot sensor monitoring system for autonomous delivery vehicles based on the STPA method. 318-325 - Alwyn E. Goodloe:
Assuring Safety-Critical Machine Learning Enabled Systems: Challenges and Promise. 326-332 - Doron Drusinsky, James Bret Michael, Matthew Litton:
Machine-Learned Specifications for the Verification and Validation of Autonomous Cyberphysical Systems. 333-341 - Joanna F. DeFranco, Mohamad Kassab, Phil Laplante:
A Taxonomy of Critical AI System Characteristics for Use in Proxy System Testing. 342-346 - Bart Kemper:
AI and Stochastic Terrorism - Should it be done? 347-356 - Rick Kuhn, M. S. Raunak, Raghu Kacker:
Combinatorial Coverage for Assured Autonomy. 357-358 - Sayandev Mukherjee, Jason W. Rupe, Jingjie Zhu:
XAI for Communication Networks. 359-364 - Mohamad Kassab, Joanna F. DeFranco, Phillip A. Laplante:
Investigating Bugs in AI-Infused Systems: Analysis and Proposed Taxonomy. 365-370 - Simon Diemert, Jens H. Weber:
Safety-Critical Adaptation in Self-Adaptive Systems. 371-380 - Boyi Hu, Yue Luo, Yuhao Chen:
Evaluating Human Locomotion Safety in Mobile Robots Populated Environments. 381-386 - Shamanth Manjunath, Ethan Wescoat, Vinita Gangaram Jansari, Matthew Krugh, Laine Mears:
Classification Analysis of Bearing Contrived Dataset under Different Levels of Contamination. 387-393 - Martin S. Feather, Philip C. Slingerland, Steven Guerrini, Max Spolaor:
Assurance Guidance for Machine Learning in a Safety-Critical System. 394-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.