QRS C

39 papers

YearTitle / Authors
20152015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Vancouver, BC, Canada, August 3-5, 2015
2015A Case Study on Code Generation of an ERP System from Event-B.
Néstor Cataño, Tim Wahls
2015A Fault-Localization Approach Based on the Coincidental Correctness Probability.
Xiaoli Zhou, Hanfei Wang, Jianhua Zhao
2015A New Framework and Application of Software Reliability Estimation Based on Fault Detection and Correction Processes.
Yu Liu, Min Xie, Jianfeng Yang, Ming Zhao
2015ASR: Abstraction Subspace Reduction for Exposing Atomicity Violation Bugs in Multithreaded Programs.
Shangru Wu, Chunbai Yang, W. K. Chan
2015Abstracting Program Dependencies Using the Method Dependence Graph.
Haipeng Cai, Raúl A. Santelices
2015An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques.
Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj
2015An Approach for Authenticating Smartphone Users Based on Histogram Features.
Chien-Cheng Lin, Chin-Chun Chang, Deron Liang
2015An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices.
Arun Balaji Buduru, Stephen S. Yau
2015An Empirical Study of Dynamic Incomplete-Case Nearest Neighbor Imputation in Software Quality Data.
Jianglin Huang, Hongyi Sun, Yan-Fu Li, Min Xie
2015An Empirical Study of Highly Impactful Bugs in Mozilla Projects.
Le An, Foutse Khomh
2015An Event-Based Formal Framework for Dynamic Software Update.
Shengwei An, Xiaoxing Ma, Chun Cao, Ping Yu, Chang Xu
2015Are Anti-patterns Coupled? An Empirical Study.
Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu, Xiaoyu Zhou
2015Assessing Security to Compare Architecture Alternatives of Component-Based Systems.
Axel Busch, Misha Strittmatter, Anne Koziolek
2015Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing.
Josip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa
2015Combinatorial Testing for Tree-Structured Test Models with Constraints.
Takashi Kitamura, Akihisa Yamada, Goro Hatayama, Cyrille Artho, Eun-Hye Choi, Thi Bich Ngoc Do, Yutaka Oiwa, Shinya Sakuragi
2015Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System.
Awad A. Younis, Yashwant K. Malaiya
2015Cross-Project Aging Related Bug Prediction.
Fangyun Qin, Zheng Zheng, Chenggang Bai, Yu Qiao, Zhenyu Zhang, Cheng Chen
2015Deep Learning for Just-in-Time Defect Prediction.
Xinli Yang, David Lo, Xin Xia, Yun Zhang, Jianling Sun
2015Fault Localization in the Light of Faulty User Input.
Birgit Hofer, Franz Wotawa
2015Fine-Grained Software Reliability Estimation Using Software Testing Inputs.
Hiroyuki Okamura, Yuki Takekoshi, Tadashi Dohi
2015Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies.
Dianxiang Xu, Yunpeng Zhang, Ning Shen
2015HSD: Hybrid MARTE Sequence Diagram.
Lulu Yao, Jing Liu, Yan Zhang, Yuejun Wang, Haiying Sun, Qingsheng Wang, Dehui Du, Xiaohong Chen
2015Hovac: A Configurable Fault Injection Framework for Benchmarking the Dependability of C/C++ Applications.
Lena Herscheid, Daniel Richter, Andreas Polze
2015How Effective Are Code Coverage Criteria?
Hadi Hemmati
2015Is Learning-to-Rank Cost-Effective in Recommending Relevant Files for Bug Localization?
Fei Zhao, Yaming Tang, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu
2015Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems.
Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand
2015LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware Faults.
Qining Lu, Mostafa Farahani, Jiesheng Wei, Anna Thomas, Karthik Pattabiraman
2015Machine Learning Based Hybrid Behavior Models for Android Malware Analysis.
Hsin-Yu Chuang, Sheng-De Wang
2015Multi-perspective Regression Test Prioritization for Time-Constrained Environments.
Dusica Marijan
2015Node-Set Analysis for Linked Recursive Data Structures.
Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li
2015On the Relationship between Model Coverage and Code Coverage Using MATLAB's Simulink.
Yunwei Dong, Zhe Li, Dave Towey
2015On the Viability of Using SRGMs for IT Help Desk Incident Predictions.
Anneliese Andrews, Joseph Lucente
2015PORA: Proportion-Oriented Randomized Algorithm for Test Case Prioritization.
Bo Jiang, Wing Kwong Chan, T. H. Tse
2015Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection.
Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein
2015Predicting Vulnerable Components via Text Mining or Software Metrics? An Effort-Aware Perspective.
Yaming Tang, Fei Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu
2015Robustness of Non-homogeneous Gamma Process-Based Software Reliability Models.
Yasuhiro Saito, Tadashi Dohi
2015System Call-Based Detection of Malicious Processes.
Raymond Canzanese, Spiros Mancoridis, Moshe Kam
2015Uncertainty Analysis of Race Conditions in Real-Time Systems.
Shan He, Sizhao Li, Yan Chen, Donghui Guo