ISSRE A

56 papers

YearTitle / Authors
201526th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, Gaithersbury, MD, USA, November 2-5, 2015
2015A safe generic adaptation mechanism for smart cars.
Alejandra Ruiz, Garazi Juez, Philipp Schleiss, Gereon Weiss
2015A similarity-based approach for test case prioritization using historical failure data.
Tanzeem Bin Noor, Hadi Hemmati
2015An evidential reasoning approach for assessing confidence in safety evidence.
Sunil Nair, Neil Walkinshaw, Tim Kelly, Jose Luis de la Vara
2015Anomaly detection in computer systems using compressed measurements.
Tingshan Huang, Nagarajan Kandasamy, Harish Sethu
2015AtomChase: Directed search towards atomicity violations.
Mahdi Eslamimehr, Mohsen Lesani
2015Automated resource release in device drivers.
Jia-Ju Bai, Yu-Ping Wang, Hu-Qiu Liu, Shi-Min Hu
2015Boundary value analysis in automatic white-box test generation.
Zhiqiang Zhang, Tianyong Wu, Jian Zhang
2015Classifying faulty modules with an extension of the H-index.
Sandro Morasca
2015Conservative claims about the probability of perfection of software-based systems.
Xingyu Zhao, Bev Littlewood, Andrey Povyakalo, David Wright
2015Contrasting exception handling code across languages: An experience report involving 50 open source projects.
Benjamin Jakobus, Eiji Adachi Barbosa, Alessandro F. Garcia, Carlos José Pereira de Lucena
2015Detecting inconsistencies in multi-platform mobile apps.
Mona Erfani Joorabchi, Mohamed Ali, Ali Mesbah
2015Detecting latent cross-platform API violations.
Jeff Rasley, Eleni Gessiou, Tony Ohmann, Yuriy Brun, Shriram Krishnamurthi, Justin Cappos
2015Discovering model transformation pre-conditions using automatically generated test models.
Jean-Marie Mottu, Sagar Sen, Juan José Cadavid, Benoit Baudry
2015Discovering specification violations in networked software systems.
Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine
2015Efficient elimination of false positives using static analysis.
Tukaram Muske, Uday P. Khedker
2015Efficient observability-based test generation by dynamic symbolic execution.
Dongjiang You, Sanjai Rayadurgam, Michael W. Whalen, Mats Per Erik Heimdahl, Gregory Gay
2015Enhancing privacy protection in fault replication systems.
João Matos, João Garcia, Paolo Romano
2015Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B.
Yongwang Zhao, Zhibin Yang, David Sanán, Yang Liu
2015Exciting FPGA cryptographic Trojans using combinatorial testing.
Paris Kitsos, Dimitris E. Simos, Jose Torres-Jimenez, Artemios G. Voyiatzis
2015Experience report: A characteristic study on out of memory errors in distributed data-parallel applications.
Lijie Xu, Wensheng Dou, Feng Zhu, Chushu Gao, Jie Liu, Hua Zhong, Jun Wei
2015Experience report: A field analysis of user-defined security configurations of Android devices.
Daniel Vecchiato, Eliane Martins
2015Experience report: An application-specific checkpointing technique for minimizing checkpoint corruption.
Guanpeng Li, Karthik Pattabiraman, Chen-Yong Cher, Pradip Bose
2015Experience report: An industrial experience report on test outsourcing practices.
Xin Xia, David Lo, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li
2015Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis.
Mostafa Farshchi, Jean-Guy Schneider, Ingo Weber, John C. Grundy
2015Experience report: Can software testing education lead to more reliable code?
Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Fábio Fagundes Silveira, Alessandro F. Garcia
2015Experience report: Evaluating the effectiveness of decision trees for detecting code smells.
Lucas Amorim, Evandro Costa, Nuno Antunes, Baldoino Fonseca, Márcio Ribeiro
2015Experience report: Formal verification and testing in the development of embedded software.
Andreas Ulrich, Anjelika Votintseva
2015Experience report: How do bug characteristics differ across severity classes: A multi-platform study.
Bo Zhou, Iulian Neamtiu, Rajiv Gupta
2015Experience report: How do structural dependencies influence change propagation? An empirical study.
Gustavo Ansaldi Oliva, Marco Aurélio Gerosa
2015Experience report: How do techniques, programs, and tests impact automated program repair?
Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li
2015Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform.
Andreas Löfwenmark, Simin Nadjm-Tehrani
2015Experience report: Mining test results for reasons other than functional correctness.
Jeff Anderson, Hyunsook Do, Saeed Salem
2015Fast reproducing web application errors.
Jie Wang, Wensheng Dou, Chushu Gao, Jun Wei
2015How hard does mutation analysis have to be, anyway?
Rahul Gopinath, Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce
2015MoIO: Run-time monitoring for I/O protocol violations in storage device drivers.
Domenico Cotroneo, Luigi De Simone, Francesco Fucci, Roberto Natella
2015Model generation to support model-based testing applied on the NASA DAT Web-application - An experience report.
Christoph Schulze, Mikael Lindvall, Sigurthor Bjorgvinsson, Robert Wiegand
2015Mutation-based test-case prioritization in software evolution.
Yiling Lou, Dan Hao, Lu Zhang
2015PAID: Prioritizing app issues for developers by tracking user reviews over versions.
Cuiyun Gao, Baoxiang Wang, Pinjia He, Jieming Zhu, Yangfan Zhou, Michael R. Lyu
2015Piecing together app behavior from multiple artifacts: A case study.
Emily Kowalczyk, Atif M. Memon, Myra B. Cohen
2015Pushing the limits on automation in GUI regression testing.
Zebao Gao, Chunrong Fang, Atif M. Memon
2015SIG-Droid: Automated system input generation for Android applications.
Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek
2015Security slicing for auditing XML, XPath, and SQL injection vulnerabilities.
Julian Thomé, Lwin Khin Shar, Lionel C. Briand
2015Should fixing these failures be delegated to automated program repair?
Xuan-Bach Dinh Le, Tien-Duy B. Le, David Lo
2015Software reliability growth model based on Bohrbugs and Mandelbugs.
Martin L. Shooman
2015Specifying and verifying real-time self-adaptive systems.
Matteo Camilli, Angelo Gargantini, Patrizia Scandurra
2015SpyAware: Investigating the privacy leakage signatures in app execution traces.
Hui Xu, Yangfan Zhou, Cuiyun Gao, Yu Kang, Michael R. Lyu
2015Studying the influence of standard compiler optimizations on symbolic execution.
Shiyu Dong, Oswaldo Olivo, Lingming Zhang, Sarfraz Khurshid
2015Towards comprehensive software reliability evaluation in open source software.
Hiroyuki Okamura, Tadashi Dohi
2015UPMOA: An improved search algorithm to support user-preference multi-objective optimization.
Shuai Wang, Shaukat Ali, Tao Yue, Marius Liaaen
2015Using normalized compression distance to measure the evolutionary stability of software systems.
David Threm, Liguo Yu, Srini Ramaswamy, Sithu D. Sudarsan
2015WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspective.
Marllos P. Prado, Eric Verbeek, Margaret-Anne D. Storey, Auri M. R. Vincenzi
2015WAP: Digital dependability identities.
Daniel Schneider, Mario Trapp, Yiannis Papadopoulos, Eric Armengaud, Marc Zeller, Kai Höfig
2015WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns.
Michael Grottke, Alberto Avritzer, Daniel Sadoc Menasché, Javier Alonso, Leandro Pfleger de Aguiar, Sara G. Alvarez
2015WAP: Unreasonable distributions of execution time under reasonable conditions.
David W. Flater
2015WAP: What activates a bug? A refinement of the Laprie terminology model.
Peter Tröger, Lena Feinbube, Matthias Werner