


default search action
QRS 2015: Vancouver, BC, Canada
- 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Vancouver, BC, Canada, August 3-5, 2015. IEEE 2015, ISBN 978-1-4673-7989-2

- Lena Herscheid, Daniel Richter, Andreas Polze:

Hovac: A Configurable Fault Injection Framework for Benchmarking the Dependability of C/C++ Applications. 1-10 - Qining Lu, Mostafa Farahani, Jiesheng Wei, Anna Thomas, Karthik Pattabiraman:

LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware Faults. 11-16 - Xinli Yang, David Lo

, Xin Xia
, Yun Zhang, Jianling Sun:
Deep Learning for Just-in-Time Defect Prediction. 17-26 - Yaming Tang, Fei Zhao, Yibiao Yang

, Hongmin Lu, Yuming Zhou, Baowen Xu
:
Predicting Vulnerable Components via Text Mining or Software Metrics? An Effort-Aware Perspective. 27-36 - Jianglin Huang

, Hongyi Sun
, Yan-Fu Li, Min Xie
:
An Empirical Study of Dynamic Incomplete-Case Nearest Neighbor Imputation in Software Quality Data. 37-42 - Fangyun Qin, Zheng Zheng, Chenggang Bai, Yu Qiao, Zhenyu Zhang, Cheng Chen:

Cross-Project Aging Related Bug Prediction. 43-48 - Haipeng Cai

, Raúl A. Santelices:
Abstracting Program Dependencies Using the Method Dependence Graph. 49-58 - Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai

, Jianhua Zhao, Xuandong Li:
Node-Set Analysis for Linked Recursive Data Structures. 59-64 - Yu Liu, Min Xie

, Jianfeng Yang
, Ming Zhao:
A New Framework and Application of Software Reliability Estimation Based on Fault Detection and Correction Processes. 65-74 - Yasuhiro Saito, Tadashi Dohi:

Robustness of Non-homogeneous Gamma Process-Based Software Reliability Models. 75-84 - Hiroyuki Okamura, Yuki Takekoshi, Tadashi Dohi:

Fine-Grained Software Reliability Estimation Using Software Testing Inputs. 85-92 - Anneliese Andrews, Joseph Lucente:

On the Viability of Using SRGMs for IT Help Desk Incident Predictions. 93-98 - Axel Busch, Misha Strittmatter, Anne Koziolek

:
Assessing Security to Compare Architecture Alternatives of Component-Based Systems. 99-108 - Amirreza Soudi, Wael Khreich

, Abdelwahab Hamou-Lhadj
:
An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. 109-118 - Raymond Canzanese, Spiros Mancoridis, Moshe Kam:

System Call-Based Detection of Malicious Processes. 119-124 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:

An Approach for Authenticating Smartphone Users Based on Histogram Features. 125-130 - Bo Jiang, Wing Kwong Chan

, T. H. Tse
:
PORA: Proportion-Oriented Randomized Algorithm for Test Case Prioritization. 131-140 - Takashi Kitamura

, Akihisa Yamada
, Goro Hatayama, Cyrille Artho, Eun-Hye Choi
, Thi Bich Ngoc Do, Yutaka Oiwa
, Shinya Sakuragi:
Combinatorial Testing for Tree-Structured Test Models with Constraints. 141-150 - Hadi Hemmati:

How Effective Are Code Coverage Criteria? 151-156 - Dusica Marijan:

Multi-perspective Regression Test Prioritization for Time-Constrained Environments. 157-162 - Dianxiang Xu, Yunpeng Zhang, Ning Shen:

Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies. 163-172 - Shengwei An

, Xiaoxing Ma
, Chun Cao, Ping Yu
, Chang Xu:
An Event-Based Formal Framework for Dynamic Software Update. 173-182 - Néstor Cataño, Tim Wahls:

A Case Study on Code Generation of an ERP System from Event-B. 183-188 - Lulu Yao, Jing Liu, Yan Zhang, Yuejun Wang, Haiying Sun, Qingsheng Wang, Dehui Du, Xiaohong Chen:

HSD: Hybrid MARTE Sequence Diagram. 189-194 - Li Li, Kevin Allix

, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein
:
Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection. 195-200 - Hsin-Yu Chuang, Sheng-De Wang:

Machine Learning Based Hybrid Behavior Models for Android Malware Analysis. 201-206 - Josip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa

:
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing. 207-212 - Yunwei Dong, Zhe Li, Dave Towey

:
On the Relationship between Model Coverage and Code Coverage Using MATLAB's Simulink. 213-218 - Arun Balaji Buduru

, Stephen S. Yau:
An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices. 219-226 - Shan He, Sizhao Li

, Yan Chen, Donghui Guo:
Uncertainty Analysis of Race Conditions in Real-Time Systems. 227-232 - Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:

Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. 233-241 - Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu

, Xiaoyu Zhou:
Are Anti-patterns Coupled? An Empirical Study. 242-251 - Awad A. Younis, Yashwant K. Malaiya:

Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System. 252-261 - Le An, Foutse Khomh:

An Empirical Study of Highly Impactful Bugs in Mozilla Projects. 262-271 - Shangru Wu, Chunbai Yang, W. K. Chan

:
ASR: Abstraction Subspace Reduction for Exposing Atomicity Violation Bugs in Multithreaded Programs. 272-281 - Birgit Hofer

, Franz Wotawa
:
Fault Localization in the Light of Faulty User Input. 282-291 - Xiaoli Zhou, Hanfei Wang, Jianhua Zhao:

A Fault-Localization Approach Based on the Coincidental Correctness Probability. 292-297 - Fei Zhao, Yaming Tang, Yibiao Yang

, Hongmin Lu, Yuming Zhou, Baowen Xu
:
Is Learning-to-Rank Cost-Effective in Recommending Relevant Files for Bug Localization? 298-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














