| 2015 | 26th IEEE International Symposium on Software Reliability Engineering, ISSRE 2015, Gaithersbury, MD, USA, November 2-5, 2015 |
| 2015 | A safe generic adaptation mechanism for smart cars. Alejandra Ruiz, Garazi Juez, Philipp Schleiss, Gereon Weiss |
| 2015 | A similarity-based approach for test case prioritization using historical failure data. Tanzeem Bin Noor, Hadi Hemmati |
| 2015 | An evidential reasoning approach for assessing confidence in safety evidence. Sunil Nair, Neil Walkinshaw, Tim Kelly, Jose Luis de la Vara |
| 2015 | Anomaly detection in computer systems using compressed measurements. Tingshan Huang, Nagarajan Kandasamy, Harish Sethu |
| 2015 | AtomChase: Directed search towards atomicity violations. Mahdi Eslamimehr, Mohsen Lesani |
| 2015 | Automated resource release in device drivers. Jia-Ju Bai, Yu-Ping Wang, Hu-Qiu Liu, Shi-Min Hu |
| 2015 | Boundary value analysis in automatic white-box test generation. Zhiqiang Zhang, Tianyong Wu, Jian Zhang |
| 2015 | Classifying faulty modules with an extension of the H-index. Sandro Morasca |
| 2015 | Conservative claims about the probability of perfection of software-based systems. Xingyu Zhao, Bev Littlewood, Andrey Povyakalo, David Wright |
| 2015 | Contrasting exception handling code across languages: An experience report involving 50 open source projects. Benjamin Jakobus, Eiji Adachi Barbosa, Alessandro F. Garcia, Carlos José Pereira de Lucena |
| 2015 | Detecting inconsistencies in multi-platform mobile apps. Mona Erfani Joorabchi, Mohamed Ali, Ali Mesbah |
| 2015 | Detecting latent cross-platform API violations. Jeff Rasley, Eleni Gessiou, Tony Ohmann, Yuriy Brun, Shriram Krishnamurthi, Justin Cappos |
| 2015 | Discovering model transformation pre-conditions using automatically generated test models. Jean-Marie Mottu, Sagar Sen, Juan José Cadavid, Benoit Baudry |
| 2015 | Discovering specification violations in networked software systems. Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine |
| 2015 | Efficient elimination of false positives using static analysis. Tukaram Muske, Uday P. Khedker |
| 2015 | Efficient observability-based test generation by dynamic symbolic execution. Dongjiang You, Sanjai Rayadurgam, Michael W. Whalen, Mats Per Erik Heimdahl, Gregory Gay |
| 2015 | Enhancing privacy protection in fault replication systems. João Matos, João Garcia, Paolo Romano |
| 2015 | Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-B. Yongwang Zhao, Zhibin Yang, David Sanán, Yang Liu |
| 2015 | Exciting FPGA cryptographic Trojans using combinatorial testing. Paris Kitsos, Dimitris E. Simos, Jose Torres-Jimenez, Artemios G. Voyiatzis |
| 2015 | Experience report: A characteristic study on out of memory errors in distributed data-parallel applications. Lijie Xu, Wensheng Dou, Feng Zhu, Chushu Gao, Jie Liu, Hua Zhong, Jun Wei |
| 2015 | Experience report: A field analysis of user-defined security configurations of Android devices. Daniel Vecchiato, Eliane Martins |
| 2015 | Experience report: An application-specific checkpointing technique for minimizing checkpoint corruption. Guanpeng Li, Karthik Pattabiraman, Chen-Yong Cher, Pradip Bose |
| 2015 | Experience report: An industrial experience report on test outsourcing practices. Xin Xia, David Lo, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li |
| 2015 | Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis. Mostafa Farshchi, Jean-Guy Schneider, Ingo Weber, John C. Grundy |
| 2015 | Experience report: Can software testing education lead to more reliable code? Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Fábio Fagundes Silveira, Alessandro F. Garcia |
| 2015 | Experience report: Evaluating the effectiveness of decision trees for detecting code smells. Lucas Amorim, Evandro Costa, Nuno Antunes, Baldoino Fonseca, Márcio Ribeiro |
| 2015 | Experience report: Formal verification and testing in the development of embedded software. Andreas Ulrich, Anjelika Votintseva |
| 2015 | Experience report: How do bug characteristics differ across severity classes: A multi-platform study. Bo Zhou, Iulian Neamtiu, Rajiv Gupta |
| 2015 | Experience report: How do structural dependencies influence change propagation? An empirical study. Gustavo Ansaldi Oliva, Marco Aurélio Gerosa |
| 2015 | Experience report: How do techniques, programs, and tests impact automated program repair? Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li |
| 2015 | Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform. Andreas Löfwenmark, Simin Nadjm-Tehrani |
| 2015 | Experience report: Mining test results for reasons other than functional correctness. Jeff Anderson, Hyunsook Do, Saeed Salem |
| 2015 | Fast reproducing web application errors. Jie Wang, Wensheng Dou, Chushu Gao, Jun Wei |
| 2015 | How hard does mutation analysis have to be, anyway? Rahul Gopinath, Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce |
| 2015 | MoIO: Run-time monitoring for I/O protocol violations in storage device drivers. Domenico Cotroneo, Luigi De Simone, Francesco Fucci, Roberto Natella |
| 2015 | Model generation to support model-based testing applied on the NASA DAT Web-application - An experience report. Christoph Schulze, Mikael Lindvall, Sigurthor Bjorgvinsson, Robert Wiegand |
| 2015 | Mutation-based test-case prioritization in software evolution. Yiling Lou, Dan Hao, Lu Zhang |
| 2015 | PAID: Prioritizing app issues for developers by tracking user reviews over versions. Cuiyun Gao, Baoxiang Wang, Pinjia He, Jieming Zhu, Yangfan Zhou, Michael R. Lyu |
| 2015 | Piecing together app behavior from multiple artifacts: A case study. Emily Kowalczyk, Atif M. Memon, Myra B. Cohen |
| 2015 | Pushing the limits on automation in GUI regression testing. Zebao Gao, Chunrong Fang, Atif M. Memon |
| 2015 | SIG-Droid: Automated system input generation for Android applications. Nariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek |
| 2015 | Security slicing for auditing XML, XPath, and SQL injection vulnerabilities. Julian Thomé, Lwin Khin Shar, Lionel C. Briand |
| 2015 | Should fixing these failures be delegated to automated program repair? Xuan-Bach Dinh Le, Tien-Duy B. Le, David Lo |
| 2015 | Software reliability growth model based on Bohrbugs and Mandelbugs. Martin L. Shooman |
| 2015 | Specifying and verifying real-time self-adaptive systems. Matteo Camilli, Angelo Gargantini, Patrizia Scandurra |
| 2015 | SpyAware: Investigating the privacy leakage signatures in app execution traces. Hui Xu, Yangfan Zhou, Cuiyun Gao, Yu Kang, Michael R. Lyu |
| 2015 | Studying the influence of standard compiler optimizations on symbolic execution. Shiyu Dong, Oswaldo Olivo, Lingming Zhang, Sarfraz Khurshid |
| 2015 | Towards comprehensive software reliability evaluation in open source software. Hiroyuki Okamura, Tadashi Dohi |
| 2015 | UPMOA: An improved search algorithm to support user-preference multi-objective optimization. Shuai Wang, Shaukat Ali, Tao Yue, Marius Liaaen |
| 2015 | Using normalized compression distance to measure the evolutionary stability of software systems. David Threm, Liguo Yu, Srini Ramaswamy, Sithu D. Sudarsan |
| 2015 | WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspective. Marllos P. Prado, Eric Verbeek, Margaret-Anne D. Storey, Auri M. R. Vincenzi |
| 2015 | WAP: Digital dependability identities. Daniel Schneider, Mario Trapp, Yiannis Papadopoulos, Eric Armengaud, Marc Zeller, Kai Höfig |
| 2015 | WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns. Michael Grottke, Alberto Avritzer, Daniel Sadoc Menasché, Javier Alonso, Leandro Pfleger de Aguiar, Sara G. Alvarez |
| 2015 | WAP: Unreasonable distributions of execution time under reasonable conditions. David W. Flater |
| 2015 | WAP: What activates a bug? A refinement of the Laprie terminology model. Peter Tröger, Lena Feinbube, Matthias Werner |