


default search action
21st ISSRE 2010: San Jose, CA, USA
- IEEE 21st International Symposium on Software Reliability Engineering, ISSRE 2010, San Jose, CA, USA, 1-4 November 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4255-3

Predicting Defects
- Boya Sun, Andy Podgurski, Soumya Ray

:
Improving the Precision of Dependence-Based Defect Mining by Supervised Learning of Rule and Violation Graphs. 1-10 - Kishor S. Trivedi, Dazhi Wang, D. Jason Hunt:

Computing the Number of Calls Dropped Due to Failures. 11-20 - Boya Sun, Gang Shu, Andy Podgurski, Shirong Li, Shijie Zhang, Jiong Yang:

Propagating Bug Fixes with Fast Subgraph Matching. 21-30
Reliability Modeling 1
- Hiroyuki Okamura

, Yusuke Etani, Tadashi Dohi
:
A Multi-factor Software Reliability Model Based on Logistic Regression. 31-40 - Peter T. Popov

, Lorenzo Strigini:
Assessing Asymmetric Fault-Tolerant Software. 41-50 - Marc Forster, Daniel Schneider:

Flexible, Any-Time Fault Tree Analysis with Component Logic Models. 51-60
Empirical Studies 1
- Paulo C. Véras, Emília Villani, Ana Maria Ambrosio

, Nuno Silva, Marco Vieira
, Henrique Madeira
:
Errors on Space Software Requirements: A Field Study and Application Scenarios. 61-70 - Domenico Cotroneo, Roberto Natella

, Roberto Pietrantuono
, Stefano Russo
:
Software Aging Analysis of the Linux Operating System. 71-80 - Gursimran Singh Walia, Jeffrey C. Carver:

Evaluating the Use of Requirement Error Abstraction and Classification Method for Preventing Errors during Artifact Creation: A Feasibility Study. 81-90
Security 1
- Roger B. Dannenberg, Will Dormann, David Keaton, Robert C. Seacord

, David Svoboda, Alex Volkovitsky, Timothy Wilson, Thomas Plum:
As-If Infinitely Ranged Integer Model. 91-100 - Prasanth Anbalagan, Mladen A. Vouk:

Towards a Bayesian Approach in Modeling the Disclosure of Unique Security Faults in Open Source Projects. 101-110 - Stephan Neuhaus, Thomas Zimmermann:

Security Trend Analysis with CVE Topic Models. 111-120
Testing 1
- Mike Papadakis

, Nicos Malevris:
Automatic Mutation Test Case Generation via Dynamic Symbolic Execution. 121-130 - Florence Charreteur, Arnaud Gotlieb:

Constraint-Based Test Input Generation for Java Bytecode. 131-140 - Hadi Hemmati, Lionel C. Briand:

An Industrial Investigation of Similarity Measures for Model-Based Test Case Selection. 141-150
Validation 1
- Kang Gui, Suraj Kothari:

A 2-Phase Method for Validation of Matching Pair Property with Case Studies of Operating Systems. 151-160 - Sven Apel, Wolfgang Scholz, Christian Lengauer, Christian Kästner:

Detecting Dependences and Interactions in Feature-Oriented Design. 161-170 - Dominik Domis, Kai Höfig, Mario Trapp:

A Consistency Check Algorithm for Component-Based Refinements of Fault Trees. 171-180
Testing 2
- Sander van der Burg, Eelco Dolstra:

Automating System Tests Using Declarative Virtual Machines. 181-190 - Karthik Pattabiraman, Benjamin G. Zorn:

DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing. 191-200 - Haroon Malik, Bram Adams

, Ahmed E. Hassan:
Pinpointing the Subsystems Responsible for the Performance Deviations in a Load Test. 201-210
Reliability Modeling 2
- Rivalino Matias, Kishor S. Trivedi, Paulo Romero Martins Maciel:

Using Accelerated Life Tests to Estimate Time to Software Aging Failure. 211-219 - Elisabeth A. Nguyen, Carlos F. Rexach, David P. Thorpe, Andrew E. Walther:

The Importance of Data Quality in Software Reliability Modeling. 220-228 - Indika Meedeniya, Lars Grunske

:
An Efficient Method for Architecture-Based Reliability Evaluation for Evolving Systems with Changing Parameters. 229-238
Empirical Studies 2
- Sean Banerjee, Hema Srikanth, Bojan Cukic

:
Log-Based Reliability Analysis of Software as a Service (SaaS). 239-248 - Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saurabh Bagchi:

Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian. 249-258 - Arin Zahalka, Katerina Goseva-Popstojanova

, Jeffrey Zemerick:
Empirical Evaluation of Factors Affecting Distinction between Failing and Passing Executions. 259-268
Practical Experience Reports
- Stefan Wagner

, Bernhard Schätz, Stefan Puchner, Peter Kock:
A Case Study on Safety Cases in the Automotive Domain: Modules, Patterns, and Models. 269-278 - Heiko Koziolek, Bastian Schlich, Carlos G. Bilich:

A Large-Scale Industrial Case Study on Architecture-Based Software Reliability Analysis. 279-288 - Ivano Alessandro Elia

, José Fonseca
, Marco Vieira
:
Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study. 289-298 - José Fonseca

, Marco Vieira
, Henrique Madeira
:
The Web Attacker Perspective - A Field Study. 299-308
Empirical Studies 3
- Nachiappan Nagappan, Andreas Zeller

, Thomas Zimmermann, Kim Herzig, Brendan Murphy:
Change Bursts as Defect Predictors. 309-318 - Cristiano Bertolini, Alexandre Mota, Eduardo Aranha:

Calibrating Probabilistic GUI Testing Models Based on Experiments and Survival Analysis. 319-328 - Rachel Burrows, Fabiano Cutigi Ferrari, Otávio Augusto Lazzarini Lemos

, Alessandro Garcia, François Taïani
:
The Impact of Coupling on the Fault-Proneness of Aspect-Oriented Programs: An Empirical Study. 329-338
Security 2
- Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghunathan Srinivasan:

Preventing Overflow Attacks by Memory Randomization. 339-347 - Hongyu Sun, Samik Basu, Vasant G. Honavar

, Robyn R. Lutz
:
Automata-Based Verification of Security Requirements of Composite Web Services. 348-357 - Hossain Shahriar

, Mohammad Zulkernine:
Client-Side Detection of Cross-Site Request Forgery Attacks. 358-367
Testing 3
- Mark Grechanik

, Christoph Csallner
, Chen Fu, Qing Xie:
Is Data Privacy Always Good for Software Testing? 368-377 - Mohan Sridharan, Akbar Siami Namin:

Prioritizing Mutation Operators Based on Importance Sampling. 378-387 - May Khalil, Yvan Labiche

:
On the Round Trip Path Testing Strategy. 388-397
Validation 2
- Zibin Zheng

, Tom Chao Zhou, Michael R. Lyu, Irwin King
:
FTCloud: A Component Ranking Framework for Fault-Tolerant Cloud Applications. 398-407 - Danhua Shao, Divya Gopinath, Sarfraz Khurshid, Dewayne E. Perry:

Optimizing Incremental Scope-Bounded Checking with Data-Flow Analysis. 408-417

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














