default search action
QRS 2017: Prague, Czech Republic
- 2017 IEEE International Conference on Software Quality, Reliability and Security, QRS 2017, Prague, Czech Republic, July 25-29, 2017. IEEE 2017, ISBN 978-1-5386-0592-9
Session: Keynote Paper
- Ina Schieferdecker, Sascha Kretzschmann, Axel Rennoch, Michael Wagner:
IoT-Testware - An Eclipse Project. 1-8
Session: Verification and Validation I (Regular)
- Andrea Arcuri:
RESTful API Automated Test Case Generation. 9-20 - Bo Jiang, Yaoyue Zhang, W. K. Chan, Zhenyu Zhang:
Which Factor Impacts GUI Traversal-Based Test Case Generation Technique Most? A Controlled Experiment on Android Applications. 21-31 - Xiangyang Huang, LiGuo Huang, Shudong Zhang, Lijuan Zhou, Minhua Wu, Mingrui Chen:
Improving Random Test Sets Using a Locally Spreading Approach. 32-41 - Jiwei Yan, Tianyong Wu, Jun Yan, Jian Zhang:
Widget-Sensitive and Back-Stack-Aware GUI Exploration for Testing Android Apps. 42-53 - Vladimír Still, Petr Rockai, Jiri Barnat:
Using Off-the-Shelf Exception Support Components in C++ Verification. 54-64
Session: Verification and Validation II (Short)
- André Reichstaller, Alexander Knapp:
Transferring Context-Dependent Test Inputs. 65-72 - Jesús Morán, Antonia Bertolino, Claudio de la Riva, Javier Tuya:
Towards Ex Vivo Testing of MapReduce Applications. 73-80 - Tao Zhang, Yu Su, Jianmin Wang, Jinbo Wang:
A Novel Model for Software Development and Testing in Programmable Logic. 81-85 - Lin Deng, Jeff Offutt, David Samudio:
Is Mutation Analysis Effective at Testing Android Apps? 86-93 - Maksim Shudrak:
WinHeap Explorer: Efficient and Transparent Heap-Based Bug Detection in Machine Code. 94-101
Session: Fault Localization and Analysis (Regular)
- Elisabeth Getzner, Birgit Hofer, Franz Wotawa:
Improving Spectrum-Based Fault Localization for Spreadsheet Debugging. 102-113 - Fabian Keller, Lars Grunske, Simon Heiden, Antonio Filieri, André van Hoorn, David Lo:
A Critical Evaluation of Spectrum-Based Fault Localization Techniques on a Large-Scale Software System. 114-125 - Yong Liu, Zheng Li, Linxin Wang, Zhiwen Hu, Ruilian Zhao:
Statement-Oriented Mutant Reduction Strategy for Mutation Based Fault Localization. 126-137 - Kinari Nishiura, Eun-Hye Choi, Osamu Mizuno:
Improving Faulty Interaction Localization Using Logistic Regression. 138-149 - Thierry Sotiropoulos, Hélène Waeselynck, Jérémie Guiochet, Félix Ingrand:
Can Robot Navigation Bugs Be Found in Simulation? An Exploratory Study. 150-159
Session: Security (Short)
- Michael Brunner, Christian Sillaber, Ruth Breu:
Towards Automation in Information Security Management Systems. 160-167 - Kobra Khanmohammadi, Abdelwahab Hamou-Lhadj:
HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security. 168-175 - Busalire Onesmus Emeka, Shaoying Liu:
Security Requirement Engineering Using Structured Object-Oriented Formal Language for M-Banking Applications. 176-183 - Sridhar Adepu, Gyanendra Mishra, Aditya Mathur:
Access Control in Water Distribution Networks: A Case Study. 184-191 - Gencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Fredrik Seehusen:
A Method for Developing Algorithms for Assessing Cyber-Risk Cost. 192-199
Session: Quality by Design (Short)
- Aaron John Buhagiar, Gordon J. Pace, Jean-Paul Ebejer:
Engineering Adaptive User Interfaces Using Monitoring-Oriented Programming. 200-207 - Zhenhao Tang, Juan Zhai, Bin Li, Jianhua Zhao:
Are Your Classes Well-Encapsulated? Encapsulation Analysis for Java. 208-215 - Zack Newsham, Augusto Born de Oliveira, Jean-Christophe Petkovich, Ahmad Saif Ur Rehman, Guy Martin Tchamgoue, Sebastian Fischmeister:
Intersert: Assertions on Distributed Process Interaction Sessions. 216-223 - Felipe Febrero, María Ángeles Moraga, Coral Calero:
Software Reliability as User Perception: Application of the Fuzzy Analytic Hierarchy Process to Software Reliability Analysis. 224-231 - Xudong He:
Modeling and Analyzing the Android Permission Framework Using High Level Petri Nets. 232-239
Session: Quality Analytics (Regular)
- Korosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Alf Larsson:
DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug Reports. 240-250 - Pooyan Behnamghader, Reem Alfayez, Kamonphop Srisopha, Barry W. Boehm:
Towards Better Understanding of Software Quality Evolution through Commit-Impact Analysis. 251-262 - Shahid Hussain, Jacky Keung, Arif Ali Khan:
The Effect of Gang-of-Four Design Patterns Usage on Design Quality Attributes. 263-273 - Fehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, Kim Mens:
On the Analysis of Co-Occurrence of Anti-Patterns and Clones. 274-284 - Fábio Petrillo, Hyan Mandian, Aiko Yamashita, Foutse Khomh, Yann-Gaël Guéhéneuc:
How Do Developers Toggle Breakpoints? Observational Studies. 285-295
Session: Quality Prediction (Regular)
- Yueyang He, Xiaoyan Zhu, Guangtao Wang, Heli Sun, Yong Wang:
Predicting Bugs in Software Code Changes Using Isolation Forest. 296-305 - Alexandre Boucher, Mourad Badri:
Predicting Fault-Prone Classes in Object-Oriented Software: An Adaptation of an Unsupervised Hybrid SOM Algorithm. 306-317 - Jian Li, Pinjia He, Jieming Zhu, Michael R. Lyu:
Software Defect Prediction via Convolutional Neural Network. 318-328 - Petr Novák, Martin Danhel, Rudolf B. Blazek, Martin Kohlík, Hana Kubátová:
Predicting the Life Expectancy of Railway Fail-Safe Signaling Systems Using Dynamic Models with Censoring. 329-339 - Solomon Mensah, Jacky Keung, Stephen G. MacDonell, Michael Franklin Bosu, Kwabena Ebo Bennin:
Investigating the Significance of Bellwether Effect to Improve Software Effort Estimation. 340-351
Session: Security and Networking (Regular)
- Hongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie:
FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model. 352-363 - Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford:
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing. 364-373 - Leonardo Regano, Daniele Canavese, Cataldo Basile, Antonio Lioy:
Towards Optimally Hiding Protected Assets in Software Applications. 374-385 - Suleiman Onimisi Aliyu, Feng Chen, Ying He, Hongji Yang:
A Game-Theoretic Based QoS-Aware Capacity Management for Real-Time EdgeIoT Applications. 386-397 - Othman Esoul, Neil Walkinshaw:
Using Segment-Based Alignment to Extract Packet Structures from Network Traces. 398-409
Session: Measurement and Management (Short)
- Jasmin Ramadani, Stefan Wagner:
How Do Coupled File Changes Influence How Developers Seek Help During Maintenance Tasks? 410-417 - Ralf Teusner, Christoph Matthies, Philipp Giese:
Should I Bug You? Identifying Domain Experts in Software Projects Using Code Complexity Metrics. 418-425 - Ammar Osaiweran, Jelena Marincic, Jan Friso Groote:
Assessing the Quality of Tabular State Machines through Metrics. 426-433 - Wai Nam Poon, Kwabena Ebo Bennin, Jianglin Huang, Passakorn Phannachitta, Jacky Wai Keung:
Cross-Project Defect Prediction Using a Credibility Theory Based Naive Bayes Classifier. 434-441 - Jianglin Huang, Yan-Fu Li, Jacky Wai Keung, Yuen-Tak Yu, W. K. Chan:
An Empirical Analysis of Three-Stage Data-Preprocessing for Analogy-Based Software Effort Estimation on the ISBSG Data. 442-449 - Abderrahmane Benbachir, Isnaldo Francisco De Melo, Michel R. Dagenais, Bram Adams:
Automated Performance Deviation Detection across Software Versions Releases. 450-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.