


default search action
QRS 2016: Vienna, Austria
- 2016 IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, Vienna, Austria, August 1-3, 2016. IEEE 2016, ISBN 978-1-5090-4127-5

Session: Cloud-Based and Concurrent Programs
- Hongyan Tang, Ying Li, Tong Jia, Zhonghai Wu:

Hunting Killer Tasks for Cloud System through Machine Learning: A Google Cluster Case Study. 1-12 - Jialin Yang, Chunbai Yang, W. K. Chan

:
HistLock: Efficient and Sound Hybrid Detection of Hidden Predictive Data Races with Functional Contexts. 13-24 - Srijoni Majumdar

, Nachiketa Chatterjee, Shila Rani Sahoo, Partha Pratim Das:
D-Cube: Tool for Dynamic Design Discovery from Multi-threaded Applications Using PIN. 25-32 - Patrick Ngai, Sung-Jer Lu, Yu-Sung Wu, Wei-Sheng Lim, Tung-Yueh Lin:

Network Performance Bottleneck Detection and Maximum Network Throughput Estimation for Datacenter Applications. 33-40
Session: Combinatorial Testing
- Huiyan Wang, Chang Xu, Jun Sui, Jian Lu:

How Effective Is Branch-Based Combinatorial Testing? An Exploratory Study. 41-52 - Xue-Lin Li

, Ruizhi Gao, W. Eric Wong, Chunhui Yang, Dong Li:
Applying Combinatorial Testing in Industrial Settings. 53-60 - Eun-Hye Choi

, Shunya Kawabata, Osamu Mizuno
, Cyrille Artho, Takashi Kitamura
:
Test Effectiveness Evaluation of Prioritized Combinatorial Testing: A Case Study. 61-68 - Dimitris E. Simos, Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, Raghu Kacker:

TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach. 69-73
Session: Empirical Approaches for Software Process Quality
- Tobias Baum

, Olga Liskin, Kai Niklas, Kurt Schneider
:
A Faceted Classification Scheme for Change-Based Industrial Code Review Processes. 74-85 - Jianglin Huang

, Hongyi Sun:
Grey Relational Analysis Based k Nearest Neighbor Missing Data Imputation for Software Quality Datasets. 86-91 - Matthew Stephan, James R. Cordy:

Model-Driven Evaluation of Software Architecture Quality Using Model Clone Detection. 92-99 - Michail Papamichail

, Themistoklis G. Diamantopoulos
, Andreas L. Symeonidis
:
User-Perceived Source Code Quality Estimation Based on Static Analysis Metrics. 100-107
Session: Program Verification - Invariants and Constraints
- Bin Li, Zhenhao Tang, Juan Zhai

, Jianhua Zhao:
Automatic Invariant Synthesis for Arrays in Simple Programs. 108-119 - Yiqun Wang, Shengwei An

, Xiaoxing Ma
, Chun Cao, Chang Xu:
Verifying Distributed Controllers with Local Invariants. 120-131 - Juan Zhai

, Bin Li, Zhenhao Tang, Jianhua Zhao, Xuandong Li:
Precondition Calculation for Loops Iterating over Data Structures. 132-143 - Romain Aïssat, Marie-Claude Gaudel, Frédéric Voisin, Burkhart Wolff:

A Method for Pruning Infeasible Paths via Graph Transformations and Symbolic Execution. 144-151
Session: Debugging and Fixing
- Fábio Petrillo

, Zéphyrin Soh, Foutse Khomh, Marcelo Pimenta, Carla M. D. S. Freitas
, Yann-Gaël Guéhéneuc:
Towards Understanding Interactive Debugging. 152-163 - Tommaso Dal Sasso, Andrea Mocci

, Michele Lanza
:
What Makes a Satisficing Bug Report? 164-174 - Irena Bojanova, Paul E. Black

, Yaacov Yesha, Yan Wu:
The Bugs Framework (BF): A Structured Approach to Express Bugs. 175-182 - Yukiya Uneno, Osamu Mizuno

, Eun-Hye Choi
:
Using a Distributed Representation of Words in Localizing Relevant Files for Bug Reports. 183-190
Session: Defect Prediction Models
- Kazuhiro Yamashita, Changyun Huang, Meiyappan Nagappan, Yasutaka Kamei, Audris Mockus

, Ahmed E. Hassan, Naoyasu Ubayashi:
Thresholds for Size and Complexity Metrics: A Case Study from the Perspective of Defect Density. 191-201 - Shaoxiong Zhang

, Jun Ai, Xue-Lin Li
:
Correlation between the Distribution of Software Bugs and Network Motifs. 202-213 - Kwabena Ebo Bennin

, Koji Toda, Yasutaka Kamei, Jacky Keung
, Akito Monden
, Naoyasu Ubayashi:
Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models. 214-221 - Matthieu Jimenez

, Mike Papadakis
, Tegawendé F. Bissyandé, Jacques Klein
:
Profiling Android Vulnerabilities. 222-229
Session: Security
- Tobias F. Pfeffer, Stefan Sydow

, Joachim Fellmuth, Paula Herber:
Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking. 230-241 - René Rietz, Hartmut König, Steffen Ullrich, Benjamin Stritter:

Firewalls for the Web 2.0. 242-253 - Bernhard Peischl

, Michael Felderer
, Armin Beer:
Testing Security Requirements with Non-experts: Approaches and Empirical Investigations. 254-261
Session: Databases
- Loup Meurice, Csaba Nagy, Anthony Cleve:

Detecting and Preventing Program Inconsistencies under Database Schema Evolution. 262-273 - Siyuan Xu, Weikai Miao, Thomas Kunz, Tongquan Wei, Mingsong Chen:

Quantitative Analysis of Variation-Aware Internet of Things Designs Using Statistical Model Checking. 274-285 - Rasha Osman

, Juan F. Pérez
, Giuliano Casale:
Quantifying the Impact of Replication on the Quality-of-Service in Cloud Databases. 286-297
Session: Mobile Apps Testing and Verification
- Chenglong Sun, Zhenyu Zhang, Bo Jiang, W. K. Chan

:
Facilitating Monkey Test by Detecting Operable Regions in Rendered GUI of Mobile Game Apps. 298-306 - Tim Wahls:

MedicationChecker: Development of a Formally Verified Android Application with EventB2SQL. 307-314 - Natalia Kushik

, Jorge López, Ana R. Cavalli, Nina Yevtushenko:
Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines. 315-322
Session: Memory and Non-functional Errors
- Rigel Gjomemo, Phu H. Phung

, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, Lenore D. Zuck:
Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers. 323-334 - Mohamed Boussaa, Olivier Barais

, Benoit Baudry, Gerson Sunyé:
NOTICE: A Framework for Non-Functional Testing of Compilers. 335-346 - Ju Qian, Xiaoyu Zhou, Wanchun Dang, Ziyuan Wang:

A Specification-Based Approach to the Testing of Java Memory Bloat. 347-352
Session: Mutation and Prioritization
- Mark Grechanik

, Gurudev Devanla:
Mutation Integration Testing. 353-364 - Ali Parsai

, Alessandro Murgia, Serge Demeyer
:
A Model to Estimate First-Order Mutation Coverage from Higher-Order Mutation Coverage. 365-373 - Xiaofang Zhang, Xiaoyuan Xie, Tsong Yueh Chen

:
Test Case Prioritization Using Adaptive Random Sequence with Category-Partition-Based Distance. 374-385
Session: Project and Process Prediction Models
- Harish Sukhwani, Javier Alonso, Kishor S. Trivedi, Issac Mcginnis:

Software Reliability Analysis of NASA Space Flight Software: A Practical Experience. 386-397 - Ou Wu:

How Does the Dependence between Inspectors Impact Capture-Recapture Estimation? An Empirical Study. 398-405 - Jasmin Ramadani

, Stefan Wagner
:
Which Change Sets in Git Repositories Are Related? 406-411
Session: Fault Localization
- Chung Man Tang

, Jacky Keung
, Yuen-Tak Yu, W. K. Chan
:
DFL: Dual-Service Fault Localization. 412-422 - Leif Jonsson, David Broman, Måns Magnusson, Kristian Sandahl, Mattias Villani, Sigrid Eldh

:
Automatic Localization of Bugs to Faulty Components in Large Scale Software Systems Using Bayesian Classification. 423-430 - Ang Li, Yan Lei, Xiaoguang Mao

:
Towards More Accurate Fault Localization: An Approach Based on Feature Selection Using Branching Execution Probability. 431-438
Session: Testing and Processes
- Bo Jiang, W. K. Chan

:
Testing and Debugging in Continuous Integration with Budget Quotas on Test Executions. 439-447 - Shaoying Liu:

A Tool Supported Testing Method for Reducing Cost and Improving Quality. 448-455 - Pete Rotella:

Resource/Schedule/Content Test Planning Model. 456-463

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














