callback( { "result":{ "query":":facetid:toc:\"db/conf/issre/issre2018w.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"190.11" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"66", "@dc":"66", "@oc":"66", "@id":"43409899", "text":":facetid:toc:db/conf/issre/issre2018w.bht" } }, "hits":{ "@total":"66", "@computed":"66", "@sent":"66", "@first":"0", "hit":[{ "@score":"1", "@id":"2625470", "info":{"authors":{"author":[{"@pid":"75/9972","text":"Morayo Adedjouma"},{"@pid":"230/2373","text":"Asma Smaoui"}]},"title":"Model-Based Computer-Aided Monitoring for ISO26262 Compliant Systems.","venue":"ISSRE Workshops","pages":"349-352","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/AdedjoumaS18","doi":"10.1109/ISSREW.2018.00029","ee":"https://doi.org/10.1109/ISSREW.2018.00029","url":"https://dblp.org/rec/conf/issre/AdedjoumaS18"}, "url":"URL#2625470" }, { "@score":"1", "@id":"2625471", "info":{"authors":{"author":[{"@pid":"74/7810","text":"Jun Ai"},{"@pid":"230/2381","text":"Wenzhu Su"},{"@pid":"52/3194","text":"Fei Wang"}]},"title":"Software Reliability Evaluation Method Based on a Software Network.","venue":"ISSRE Workshops","pages":"136-137","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/AiSW18","doi":"10.1109/ISSREW.2018.00-15","ee":"https://doi.org/10.1109/ISSREW.2018.00-15","url":"https://dblp.org/rec/conf/issre/AiSW18"}, "url":"URL#2625471" }, { "@score":"1", "@id":"2625472", "info":{"authors":{"author":[{"@pid":"221/1677","text":"Eman Aldakheel"},{"@pid":"b/UgoABuy","text":"Ugo A. Buy"},{"@pid":"211/3465-5","text":"Simran Kaur 0005"}]},"title":"DDS: Deadlock Detector and Solver.","venue":"ISSRE Workshops","pages":"216-223","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/AldakheelBK18","doi":"10.1109/ISSREW.2018.00009","ee":"https://doi.org/10.1109/ISSREW.2018.00009","url":"https://dblp.org/rec/conf/issre/AldakheelBK18"}, "url":"URL#2625472" }, { "@score":"1", "@id":"2625473", "info":{"authors":{"author":[{"@pid":"191/9332","text":"Rakshith Amarnath"},{"@pid":"230/2368","text":"Shashank Nagesh Bhat"},{"@pid":"156/5565","text":"Peter Munk"},{"@pid":"56/3704","text":"Eike Thaden"}]},"title":"A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls.","venue":"ISSRE Workshops","pages":"71-76","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/AmarnathBMT18","doi":"10.1109/ISSREW.2018.00-28","ee":"https://doi.org/10.1109/ISSREW.2018.00-28","url":"https://dblp.org/rec/conf/issre/AmarnathBMT18"}, "url":"URL#2625473" }, { "@score":"1", "@id":"2625474", "info":{"authors":{"author":[{"@pid":"00/336","text":"Artur Andrzejak 0001"},{"@pid":"230/2386","text":"Matthias Iacsa"}]},"title":"ConfGuru - A System for Fully Automated Debugging of Configuration Errors.","venue":"ISSRE Workshops","pages":"224-231","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/AndrzejakI18","doi":"10.1109/ISSREW.2018.00010","ee":"https://doi.org/10.1109/ISSREW.2018.00010","url":"https://dblp.org/rec/conf/issre/AndrzejakI18"}, "url":"URL#2625474" }, { "@score":"1", "@id":"2625478", "info":{"authors":{"author":[{"@pid":"213/8180","text":"Maral Azizi"},{"@pid":"93/2585","text":"Hyunsook Do"}]},"title":"Graphite: A Greedy Graph-Based Technique for Regression Test Case Prioritization.","venue":"ISSRE Workshops","pages":"245-251","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/AziziD18a","doi":"10.1109/ISSREW.2018.00014","ee":"https://doi.org/10.1109/ISSREW.2018.00014","url":"https://dblp.org/rec/conf/issre/AziziD18a"}, "url":"URL#2625478" }, { "@score":"1", "@id":"2625479", "info":{"authors":{"author":[{"@pid":"145/2337","text":"Nicolas Brousse"},{"@pid":"230/2384","text":"Oleksii Mykhailov"}]},"title":"Use of Self-Healing Techniques to Improve the Reliability of a Dynamic and Geo-Distributed Ad Delivery Service.","venue":"ISSRE Workshops","pages":"1-5","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/BrousseM18","doi":"10.1109/ISSREW.2018.00-40","ee":"https://doi.org/10.1109/ISSREW.2018.00-40","url":"https://dblp.org/rec/conf/issre/BrousseM18"}, "url":"URL#2625479" }, { "@score":"1", "@id":"2625481", "info":{"authors":{"author":[{"@pid":"c/WeiChen18","text":"Wei Chen 0018"},{"@pid":"00/5453","text":"Guoquan Wu"},{"@pid":"68/6546-1","text":"Jun Wei 0001"}]},"title":"An Approach to Identifying Error Patterns for Infrastructure as Code.","venue":"ISSRE Workshops","pages":"124-129","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/ChenW018","doi":"10.1109/ISSREW.2018.00-19","ee":"https://doi.org/10.1109/ISSREW.2018.00-19","url":"https://dblp.org/rec/conf/issre/ChenW018"}, "url":"URL#2625481" }, { "@score":"1", "@id":"2625482", "info":{"authors":{"author":[{"@pid":"145/7668","text":"Arpit Christi"},{"@pid":"249/8157","text":"Matthew Lyle Olson"},{"@pid":"36/3317","text":"Mohammad Amin Alipour"},{"@pid":"g/AlexGroce","text":"Alex Groce"}]},"title":"Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault Localization.","venue":"ISSRE Workshops","pages":"184-191","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/ChristiOAG18","doi":"10.1109/ISSREW.2018.00005","ee":"https://doi.org/10.1109/ISSREW.2018.00005","url":"https://dblp.org/rec/conf/issre/ChristiOAG18"}, "url":"URL#2625482" }, { "@score":"1", "@id":"2625483", "info":{"authors":{"author":[{"@pid":"c/MarcelloCinque","text":"Marcello Cinque"},{"@pid":"c/DomenicoCotroneo","text":"Domenico Cotroneo"},{"@pid":"62/8357","text":"Antonio Pecchia"}]},"title":"Challenges and Directions in Security Information and Event Management (SIEM).","venue":"ISSRE Workshops","pages":"95-99","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/CinqueCP18","doi":"10.1109/ISSREW.2018.00-24","ee":"https://doi.org/10.1109/ISSREW.2018.00-24","url":"https://dblp.org/rec/conf/issre/CinqueCP18"}, "url":"URL#2625483" }, { "@score":"1", "@id":"2625484", "info":{"authors":{"author":[{"@pid":"c/DomenicoCotroneo","text":"Domenico Cotroneo"},{"@pid":"156/2317","text":"Luigi De Simone"},{"@pid":"230/2389","text":"Alfonso Di Martino"},{"@pid":"230/2388","text":"Pietro Liguori"},{"@pid":"63/8166","text":"Roberto Natella"}]},"title":"Enhancing the Analysis of Error Propagation and Failure Modes in Cloud Systems.","venue":"ISSRE Workshops","pages":"140-141","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/CotroneoSMLN18","doi":"10.1109/ISSREW.2018.00-13","ee":"https://doi.org/10.1109/ISSREW.2018.00-13","url":"https://dblp.org/rec/conf/issre/CotroneoSMLN18"}, "url":"URL#2625484" }, { "@score":"1", "@id":"2625485", "info":{"authors":{"author":[{"@pid":"c/DomenicoCotroneo","text":"Domenico Cotroneo"},{"@pid":"156/2317","text":"Luigi De Simone"},{"@pid":"63/8166","text":"Roberto Natella"}]},"title":"Dependability Certification Guidelines for NFVIs through Fault Injection.","venue":"ISSRE Workshops","pages":"321-328","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/CotroneoSN18","doi":"10.1109/ISSREW.2018.00025","ee":"https://doi.org/10.1109/ISSREW.2018.00025","url":"https://dblp.org/rec/conf/issre/CotroneoSN18"}, "url":"URL#2625485" }, { "@score":"1", "@id":"2625486", "info":{"authors":{"author":[{"@pid":"75/157","text":"Zuohua Ding"},{"@pid":"315/0813","text":"Wenjie Jiang"},{"@pid":"82/7064","text":"Mingyue Jiang"},{"@pid":"22/3510","text":"Zhi Jin"},{"@pid":"30/3790-1","text":"He Jiang 0001"}]},"title":"Model Checking the Uncertainties in Software Systems Introduced by Intelligent Components.","venue":"ISSRE Workshops","pages":"130-131","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/DingJJJJ18","doi":"10.1109/ISSREW.2018.00-18","ee":"https://doi.org/10.1109/ISSREW.2018.00-18","url":"https://dblp.org/rec/conf/issre/DingJJJJ18"}, "url":"URL#2625486" }, { "@score":"1", "@id":"2625490", "info":{"authors":{"author":[{"@pid":"f/MichaelFisher","text":"Michael Fisher 0001"},{"@pid":"148/4870","text":"Emily C. Collins 0001"},{"@pid":"58/1750","text":"Louise A. Dennis"},{"@pid":"152/5899","text":"Matt Luckcuck"},{"@pid":"06/10709","text":"Matt Webster"},{"@pid":"24/10081","text":"Mike Jump"},{"@pid":"29/3218","text":"Vincent Pagé"},{"@pid":"72/9788","text":"Charles Patchett"},{"@pid":"230/2357","text":"Fateme Dinmohammadi"},{"@pid":"34/4662","text":"David Flynn"},{"@pid":"40/5122","text":"Valentin Robu"},{"@pid":"83/504-1","text":"Xingyu Zhao 0001"}]},"title":"Verifiable Self-Certifying Autonomous Systems.","venue":"ISSRE Workshops","pages":"341-348","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/FisherCDLWJPPDF18","doi":"10.1109/ISSREW.2018.00028","ee":"https://doi.org/10.1109/ISSREW.2018.00028","url":"https://dblp.org/rec/conf/issre/FisherCDLWJPPDF18"}, "url":"URL#2625490" }, { "@score":"1", "@id":"2625491", "info":{"authors":{"author":[{"@pid":"230/2362","text":"Aiman Gannous"},{"@pid":"a/AnnelieseAmschlerAndrews","text":"Anneliese Andrews"},{"@pid":"34/3823","text":"Barbara Gallina"}]},"title":"Toward a Systematic and Safety Evidence Productive Verification Approach for Safety-Critical Systems.","venue":"ISSRE Workshops","pages":"329-336","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/GannousAG18","doi":"10.1109/ISSREW.2018.00026","ee":"https://doi.org/10.1109/ISSREW.2018.00026","url":"https://dblp.org/rec/conf/issre/GannousAG18"}, "url":"URL#2625491" }, { "@score":"1", "@id":"2625492", "info":{"authors":{"author":[{"@pid":"39/5498","text":"Mark Lee Gillenson"},{"@pid":"12/1729","text":"Xihui Zhang 0001"},{"@pid":"26/4524","text":"Thomas F. Stafford"},{"@pid":"24/1131","text":"Yao Shi"}]},"title":"A Literature Review of Software Test Cases and Future Research.","venue":"ISSRE Workshops","pages":"252-256","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/GillensonZSS18","doi":"10.1109/ISSREW.2018.00015","ee":"https://doi.org/10.1109/ISSREW.2018.00015","url":"https://dblp.org/rec/conf/issre/GillensonZSS18"}, "url":"URL#2625492" }, { "@score":"1", "@id":"2625493", "info":{"authors":{"author":[{"@pid":"171/2327","text":"Siqian Gong"},{"@pid":"171/2320","text":"Beibei Yin"},{"@pid":"71/5252","text":"Kai-Yuan Cai"}]},"title":"An Adaptive PID Control for QoS Management in Cloud Computing System.","venue":"ISSRE Workshops","pages":"142-143","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/GongYC18","doi":"10.1109/ISSREW.2018.00-12","ee":"https://doi.org/10.1109/ISSREW.2018.00-12","url":"https://dblp.org/rec/conf/issre/GongYC18"}, "url":"URL#2625493" }, { "@score":"1", "@id":"2625494", "info":{"authors":{"author":[{"@pid":"56/6538","text":"Jing Gu"},{"@pid":"68/4459-3","text":"Long Wang 0003"},{"@pid":"11/357","text":"Yong Yang"},{"@pid":"22/1805-12","text":"Ying Li 0012"}]},"title":"KEREP: Experience in Extracting Knowledge on Distributed System Behavior through Request Execution Path.","venue":"ISSRE Workshops","pages":"30-35","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/GuWYL18","doi":"10.1109/ISSREW.2018.00-35","ee":"https://doi.org/10.1109/ISSREW.2018.00-35","url":"https://dblp.org/rec/conf/issre/GuWYL18"}, "url":"URL#2625494" }, { "@score":"1", "@id":"2625496", "info":{"authors":{"author":[{"@pid":"48/2799","text":"Robert S. Hanmer"},{"@pid":"j/LJJagadeesan","text":"Lalita Jagadeesan"},{"@pid":"03/6647","text":"Veena B. Mendiratta"},{"@pid":"55/826","text":"Heng Zhang"}]},"title":"Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDN.","venue":"ISSRE Workshops","pages":"59-64","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/HanmerJMZ18","doi":"10.1109/ISSREW.2018.00-30","ee":"https://doi.org/10.1109/ISSREW.2018.00-30","url":"https://dblp.org/rec/conf/issre/HanmerJMZ18"}, "url":"URL#2625496" }, { "@score":"1", "@id":"2625497", "info":{"authors":{"author":[{"@pid":"270/8738","text":"Megan Hickman"},{"@pid":"230/2365","text":"Dakota Fulp"},{"@pid":"187/0860","text":"Elisabeth Baseman"},{"@pid":"93/11144","text":"Sean Blanchard"},{"@pid":"165/3372","text":"Hugh Greenberg"},{"@pid":"05/3059","text":"William M. Jones"},{"@pid":"86/833","text":"Nathan DeBardeleben"}]},"title":"Enhancing HPC System Log Analysis by Identifying Message Origin in Source Code.","venue":"ISSRE Workshops","pages":"100-105","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/HickmanFBBGJD18","doi":"10.1109/ISSREW.2018.00-23","ee":"https://doi.org/10.1109/ISSREW.2018.00-23","url":"https://dblp.org/rec/conf/issre/HickmanFBBGJD18"}, "url":"URL#2625497" }, { "@score":"1", "@id":"2625498", "info":{"authors":{"author":{"@pid":"227/5570-1","text":"Florian Hofer 0001"}},"title":"Enhancing Security and Reliability for Smart- Systems' Architectures.","venue":"ISSRE Workshops","pages":"150-153","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Hofer18","doi":"10.1109/ISSREW.2018.000-8","ee":"https://doi.org/10.1109/ISSREW.2018.000-8","url":"https://dblp.org/rec/conf/issre/Hofer18"}, "url":"URL#2625498" }, { "@score":"1", "@id":"2625500", "info":{"authors":{"author":{"@pid":"222/8076","text":"Hajar Homayouni"}},"title":"Testing Extract-Transform-Load Process in Data Warehouse Systems.","venue":"ISSRE Workshops","pages":"158-161","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Homayouni18","doi":"10.1109/ISSREW.2018.000-6","ee":"https://doi.org/10.1109/ISSREW.2018.000-6","url":"https://dblp.org/rec/conf/issre/Homayouni18"}, "url":"URL#2625500" }, { "@score":"1", "@id":"2625501", "info":{"authors":{"author":[{"@pid":"72/2302","text":"Kiyoshi Honda"},{"@pid":"65/3507","text":"Hironori Washizaki"},{"@pid":"95/4020","text":"Yoshiaki Fukazawa"},{"@pid":"209/2672","text":"Masahiro Taga"},{"@pid":"209/3012","text":"Akira Matsuzaki"},{"@pid":"58/5546","text":"Takayoshi Suzuki"}]},"title":"Empirical Study on Tendencies for Unstable Situations in Application Results of Software Reliability Growth Model.","venue":"ISSRE Workshops","pages":"89-94","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/HondaWFTMS18","doi":"10.1109/ISSREW.2018.00-25","ee":"https://doi.org/10.1109/ISSREW.2018.00-25","url":"https://dblp.org/rec/conf/issre/HondaWFTMS18"}, "url":"URL#2625501" }, { "@score":"1", "@id":"2625502", "info":{"authors":{"author":[{"@pid":"17/2945","text":"André van Hoorn"},{"@pid":"61/7634","text":"Aldeida Aleti"},{"@pid":"191/9336","text":"Thomas F. Düllmann"},{"@pid":"04/9786","text":"Teerat Pitakrat"}]},"title":"ORCAS: Efficient Resilience Benchmarking of Microservice Architectures.","venue":"ISSRE Workshops","pages":"146-147","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/HoornADP18","doi":"10.1109/ISSREW.2018.00-10","ee":"https://doi.org/10.1109/ISSREW.2018.00-10","url":"https://dblp.org/rec/conf/issre/HoornADP18"}, "url":"URL#2625502" }, { "@score":"1", "@id":"2625503", "info":{"authors":{"author":[{"@pid":"149/5794","text":"Fuqun Huang"},{"@pid":"19/6375","text":"Lorenzo Strigini"}]},"title":"Predicting Software Defects Based on Cognitive Error Theories.","venue":"ISSRE Workshops","pages":"134-135","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/HuangS18","doi":"10.1109/ISSREW.2018.00-16","ee":"https://doi.org/10.1109/ISSREW.2018.00-16","url":"https://dblp.org/rec/conf/issre/HuangS18"}, "url":"URL#2625503" }, { "@score":"1", "@id":"2625505", "info":{"authors":{"author":[{"@pid":"56/7768","text":"Tong Jia"},{"@pid":"22/1805-12","text":"Ying Li 0012"},{"@pid":"57/7714","text":"Chengbo Zhang"},{"@pid":"230/2383","text":"Wensheng Xia"},{"@pid":"32/7018","text":"Jie Jiang"},{"@pid":"18/5833","text":"Yuhong Liu"}]},"title":"Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault Diagnosis.","venue":"ISSRE Workshops","pages":"106-111","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/JiaLZXJL18","doi":"10.1109/ISSREW.2018.00-22","ee":"https://doi.org/10.1109/ISSREW.2018.00-22","url":"https://dblp.org/rec/conf/issre/JiaLZXJL18"}, "url":"URL#2625505" }, { "@score":"1", "@id":"2625507", "info":{"authors":{"author":[{"@pid":"87/314","text":"Kumi Jinzenji"},{"@pid":"230/2369","text":"Daisuke Hamuro"}]},"title":"A Concept of QCD Prediction and Control in Agile Software Development for Portfolio Management.","venue":"ISSRE Workshops","pages":"48-52","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/JinzenjiH18","doi":"10.1109/ISSREW.2018.00-32","ee":"https://doi.org/10.1109/ISSREW.2018.00-32","url":"https://dblp.org/rec/conf/issre/JinzenjiH18"}, "url":"URL#2625507" }, { "@score":"1", "@id":"2625508", "info":{"authors":{"author":{"@pid":"198/1622","text":"Leonid Joffe"}},"title":"Machine Learning Augmented Fuzzing.","venue":"ISSRE Workshops","pages":"178-183","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Joffe18","doi":"10.1109/ISSREW.2018.000-1","ee":"https://doi.org/10.1109/ISSREW.2018.000-1","url":"https://dblp.org/rec/conf/issre/Joffe18"}, "url":"URL#2625508" }, { "@score":"1", "@id":"2625509", "info":{"authors":{"author":[{"@pid":"228/2360","text":"Martin (Dae Youp) Kang"},{"@pid":"86/10656","text":"Euntae Ted Lee"},{"@pid":"228/2267","text":"Sungyong Um"}]},"title":"Establishment of Methods for Information Security System Policy Using Benchmarking.","venue":"ISSRE Workshops","pages":"237-242","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/KangLU18","doi":"10.1109/ISSREW.2018.00012","ee":"https://doi.org/10.1109/ISSREW.2018.00012","url":"https://dblp.org/rec/conf/issre/KangLU18"}, "url":"URL#2625509" }, { "@score":"1", "@id":"2625510", "info":{"authors":{"author":[{"@pid":"230/2364","text":"Seyedehzahra Khoshmanesh"},{"@pid":"49/3478","text":"Robyn R. Lutz"}]},"title":"The Role of Similarity in Detecting Feature Interaction in Software Product Lines.","venue":"ISSRE Workshops","pages":"286-292","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/KhoshmaneshL18","doi":"10.1109/ISSREW.2018.00020","ee":"https://doi.org/10.1109/ISSREW.2018.00020","url":"https://dblp.org/rec/conf/issre/KhoshmaneshL18"}, "url":"URL#2625510" }, { "@score":"1", "@id":"2625511", "info":{"authors":{"author":[{"@pid":"223/6240","text":"Florian Klück"},{"@pid":"117/5492","text":"Yihao Li"},{"@pid":"82/1677","text":"Mihai Nica"},{"@pid":"230/2387","text":"Jianbo Tao"},{"@pid":"w/FranzWotawa","text":"Franz Wotawa"}]},"title":"Using Ontologies for Test Suites Generation for Automated and Autonomous Driving Functions.","venue":"ISSRE Workshops","pages":"118-123","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/KluckLNTW18","doi":"10.1109/ISSREW.2018.00-20","ee":"https://doi.org/10.1109/ISSREW.2018.00-20","url":"https://dblp.org/rec/conf/issre/KluckLNTW18"}, "url":"URL#2625511" }, { "@score":"1", "@id":"2625512", "info":{"authors":{"author":[{"@pid":"230/2375","text":"Chase Koehler"},{"@pid":"116/6727","text":"Divita Mathur"},{"@pid":"150/9163","text":"Eric R. Henderson"},{"@pid":"49/3478","text":"Robyn R. Lutz"}]},"title":"Probing the Security of DNA Origami.","venue":"ISSRE Workshops","pages":"138-139","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/KoehlerMHL18","doi":"10.1109/ISSREW.2018.00-14","ee":"https://doi.org/10.1109/ISSREW.2018.00-14","url":"https://dblp.org/rec/conf/issre/KoehlerMHL18"}, "url":"URL#2625512" }, { "@score":"1", "@id":"2625513", "info":{"authors":{"author":{"@pid":"87/9155","text":"Jong Seok Lee"}},"title":"The DevSecOps and Agency Theory.","venue":"ISSRE Workshops","pages":"243-244","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Lee18","doi":"10.1109/ISSREW.2018.00013","ee":"https://doi.org/10.1109/ISSREW.2018.00013","url":"https://dblp.org/rec/conf/issre/Lee18"}, "url":"URL#2625513" }, { "@score":"1", "@id":"2625514", "info":{"authors":{"author":[{"@pid":"138/0973","text":"Sung-Hoon Lee"},{"@pid":"50/3072","text":"Seung-Hyun Kim"},{"@pid":"47/2415","text":"Soohyung Kim"},{"@pid":"56/2059","text":"Seung-Hun Jin"}]},"title":"AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps.","venue":"ISSRE Workshops","pages":"36-41","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/LeeKKJ18","doi":"10.1109/ISSREW.2018.00-34","ee":"https://doi.org/10.1109/ISSREW.2018.00-34","url":"https://dblp.org/rec/conf/issre/LeeKKJ18"}, "url":"URL#2625514" }, { "@score":"1", "@id":"2625515", "info":{"authors":{"author":[{"@pid":"166/8787","text":"Ryan Lekivetz"},{"@pid":"96/7081","text":"Joseph Morgan"}]},"title":"Evaluation and Construction of Covering Arrays Utilizing Prior Information.","venue":"ISSRE Workshops","pages":"132-133","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/LekivetzM18","doi":"10.1109/ISSREW.2018.00-17","ee":"https://doi.org/10.1109/ISSREW.2018.00-17","url":"https://dblp.org/rec/conf/issre/LekivetzM18"}, "url":"URL#2625515" }, { "@score":"1", "@id":"2625516", "info":{"authors":{"author":[{"@pid":"37/2019","text":"Luyi Li"},{"@pid":"14/2481","text":"Minyan Lu"},{"@pid":"225/7869","text":"Tingyang Gu"}]},"title":"Extracting Interaction-Related Failure Indicators for Online Detection and Prediction of Content Failures.","venue":"ISSRE Workshops","pages":"278-285","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/LiLG18","doi":"10.1109/ISSREW.2018.00019","ee":"https://doi.org/10.1109/ISSREW.2018.00019","url":"https://dblp.org/rec/conf/issre/LiLG18"}, "url":"URL#2625516" }, { "@score":"1", "@id":"2625517", "info":{"authors":{"author":[{"@pid":"151/4108","text":"Guanpeng Li"},{"@pid":"91/5344","text":"Karthik Pattabiraman"},{"@pid":"86/833","text":"Nathan DeBardeleben"}]},"title":"TensorFI: A Configurable Fault Injector for TensorFlow Applications.","venue":"ISSRE Workshops","pages":"313-320","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/LiPD18","doi":"10.1109/ISSREW.2018.00024","ee":"https://doi.org/10.1109/ISSREW.2018.00024","url":"https://dblp.org/rec/conf/issre/LiPD18"}, "url":"URL#2625517" }, { "@score":"1", "@id":"2625522", "info":{"authors":{"author":[{"@pid":"45/5648","text":"Monika Maidl"},{"@pid":"00/7442","text":"Dirk Kröselberg"},{"@pid":"230/2392","text":"Jochen Christ"},{"@pid":"93/10434","text":"Kristian Beckers"}]},"title":"A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443.","venue":"ISSRE Workshops","pages":"42-47","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/MaidlKCB18","doi":"10.1109/ISSREW.2018.00-33","ee":"https://doi.org/10.1109/ISSREW.2018.00-33","url":"https://dblp.org/rec/conf/issre/MaidlKCB18"}, "url":"URL#2625522" }, { "@score":"1", "@id":"2625523", "info":{"authors":{"author":[{"@pid":"230/2374","text":"Kavitha Manjunath"},{"@pid":"183/9159","text":"Vaibhav K. Anu"},{"@pid":"00/6421","text":"Gursimran Singh Walia"},{"@pid":"96/4396","text":"Gary Bradshaw"}]},"title":"Training Industry Practitioners to Investigate the Human Error Causes of Requirements Faults.","venue":"ISSRE Workshops","pages":"53-58","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/ManjunathAWB18","doi":"10.1109/ISSREW.2018.00-31","ee":"https://doi.org/10.1109/ISSREW.2018.00-31","url":"https://dblp.org/rec/conf/issre/ManjunathAWB18"}, "url":"URL#2625523" }, { "@score":"1", "@id":"2625524", "info":{"authors":{"author":[{"@pid":"03/6647","text":"Veena B. Mendiratta"},{"@pid":"j/LJJagadeesan","text":"Lalita Jategaonkar Jagadeesan"},{"@pid":"48/2799","text":"Robert S. Hanmer"},{"@pid":"53/7891","text":"Muntasir R. Rahman"}]},"title":"How Reliable Is My Software-Defined Network? Models and Failure Impacts.","venue":"ISSRE Workshops","pages":"83-88","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/MendirattaJHR18","doi":"10.1109/ISSREW.2018.00-26","ee":"https://doi.org/10.1109/ISSREW.2018.00-26","url":"https://dblp.org/rec/conf/issre/MendirattaJHR18"}, "url":"URL#2625524" }, { "@score":"1", "@id":"2625525", "info":{"authors":{"author":[{"@pid":"147/1117","text":"Rashid Mijumbi"},{"@pid":"18/5422","text":"Kazuhira Okumoto"},{"@pid":"88/859","text":"Abhaya Asthana"},{"@pid":"94/5011","text":"Jacques Meekel"}]},"title":"Recent Advances in Software Reliability Assurance.","venue":"ISSRE Workshops","pages":"77-82","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/MijumbiOAM18","doi":"10.1109/ISSREW.2018.00-27","ee":"https://doi.org/10.1109/ISSREW.2018.00-27","url":"https://dblp.org/rec/conf/issre/MijumbiOAM18"}, "url":"URL#2625525" }, { "@score":"1", "@id":"2625526", "info":{"authors":{"author":{"@pid":"185/2780","text":"Vidhyashree Nagaraju"}},"title":"Software Reliability Assessment: Modeling and Algorithms.","venue":"ISSRE Workshops","pages":"166-169","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Nagaraju18","doi":"10.1109/ISSREW.2018.000-4","ee":"https://doi.org/10.1109/ISSREW.2018.000-4","url":"https://dblp.org/rec/conf/issre/Nagaraju18"}, "url":"URL#2625526" }, { "@score":"1", "@id":"2625527", "info":{"authors":{"author":[{"@pid":"56/1704","text":"Francisco Gomes de Oliveira Neto"},{"@pid":"56/4313","text":"Michael Jones"},{"@pid":"230/2385","text":"Rafael da Silva Martins"}]},"title":"Visualisation to Support Fault Localisation in Distributed Embedded Systems within the Automotive Industry.","venue":"ISSRE Workshops","pages":"112-117","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/NetoJM18","doi":"10.1109/ISSREW.2018.00-21","ee":"https://doi.org/10.1109/ISSREW.2018.00-21","url":"https://dblp.org/rec/conf/issre/NetoJM18"}, "url":"URL#2625527" }, { "@score":"1", "@id":"2625528", "info":{"authors":{"author":[{"@pid":"30/446","text":"Allen P. Nikora"},{"@pid":"92/1152","text":"Lance Fiondella"},{"@pid":"191/9341","text":"Thierry Wandji"}]},"title":"SFRAT - An Extendable Software Reliability Assessment Tool.","venue":"ISSRE Workshops","pages":"65-70","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/NikoraFW18","doi":"10.1109/ISSREW.2018.00-29","ee":"https://doi.org/10.1109/ISSREW.2018.00-29","url":"https://dblp.org/rec/conf/issre/NikoraFW18"}, "url":"URL#2625528" }, { "@score":"1", "@id":"2625529", "info":{"authors":{"author":{"@pid":"86/10905","text":"Juliana Oliveira"}},"title":"Taming Exceptions in Android Applications.","venue":"ISSRE Workshops","pages":"174-177","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Oliveira18","doi":"10.1109/ISSREW.2018.000-2","ee":"https://doi.org/10.1109/ISSREW.2018.000-2","url":"https://dblp.org/rec/conf/issre/Oliveira18"}, "url":"URL#2625529" }, { "@score":"1", "@id":"2625532", "info":{"authors":{"author":[{"@pid":"154/5796","text":"Hanyu Pei"},{"@pid":"171/2320","text":"Beibei Yin"},{"@pid":"36/844-1","text":"Min Xie 0001"}]},"title":"Dynamic Random Testing Strategy for Test Case Optimization in Cloud Environment.","venue":"ISSRE Workshops","pages":"148-149","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/PeiYX18","doi":"10.1109/ISSREW.2018.000-9","ee":"https://doi.org/10.1109/ISSREW.2018.000-9","url":"https://dblp.org/rec/conf/issre/PeiYX18"}, "url":"URL#2625532" }, { "@score":"1", "@id":"2625533", "info":{"authors":{"author":[{"@pid":"07/504","text":"Roberto Pietrantuono"},{"@pid":"20/665","text":"Stefano Russo 0001"}]},"title":"Software Aging and Rejuvenation in the Cloud: A Literature Review.","venue":"ISSRE Workshops","pages":"257-263","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/PietrantuonoR18","doi":"10.1109/ISSREW.2018.00016","ee":"https://doi.org/10.1109/ISSREW.2018.00016","url":"https://dblp.org/rec/conf/issre/PietrantuonoR18"}, "url":"URL#2625533" }, { "@score":"1", "@id":"2625534", "info":{"authors":{"author":[{"@pid":"07/504","text":"Roberto Pietrantuono"},{"@pid":"20/665","text":"Stefano Russo 0001"}]},"title":"Robotics Software Engineering and Certification: Issues and Challenges.","venue":"ISSRE Workshops","pages":"308-312","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/PietrantuonoR18a","doi":"10.1109/ISSREW.2018.00023","ee":"https://doi.org/10.1109/ISSREW.2018.00023","url":"https://dblp.org/rec/conf/issre/PietrantuonoR18a"}, "url":"URL#2625534" }, { "@score":"1", "@id":"2625536", "info":{"authors":{"author":[{"@pid":"49/690","text":"Ingo Pill"},{"@pid":"w/FranzWotawa","text":"Franz Wotawa"}]},"title":"Spectrum-Based Fault Localization for Logic-Based Reasoning.","venue":"ISSRE Workshops","pages":"192-199","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/PillW18","doi":"10.1109/ISSREW.2018.00006","ee":"https://doi.org/10.1109/ISSREW.2018.00006","url":"https://dblp.org/rec/conf/issre/PillW18"}, "url":"URL#2625536" }, { "@score":"1", "@id":"2625537", "info":{"authors":{"author":[{"@pid":"181/2883","text":"Yu Qiao"},{"@pid":"35/2837-1","text":"Zheng Zheng 0001"},{"@pid":"199/7175","text":"Yunyu Fang"}]},"title":"An Empirical Study on Software Aging Indicators Prediction in Android Mobile.","venue":"ISSRE Workshops","pages":"271-277","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Qiao0F18","doi":"10.1109/ISSREW.2018.00018","ee":"https://doi.org/10.1109/ISSREW.2018.00018","url":"https://dblp.org/rec/conf/issre/Qiao0F18"}, "url":"URL#2625537" }, { "@score":"1", "@id":"2625538", "info":{"authors":{"author":[{"@pid":"166/0992","text":"Korosh Koochekian Sabor"},{"@pid":"120/4682","text":"Mathieu Nayrolles"},{"@pid":"91/10596","text":"Abdelaziz Trabelsi"},{"@pid":"70/2136","text":"Abdelwahab Hamou-Lhadj"}]},"title":"An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model.","venue":"ISSRE Workshops","pages":"232-236","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/SaborNTH18","doi":"10.1109/ISSREW.2018.00011","ee":"https://doi.org/10.1109/ISSREW.2018.00011","url":"https://dblp.org/rec/conf/issre/SaborNTH18"}, "url":"URL#2625538" }, { "@score":"1", "@id":"2625540", "info":{"authors":{"author":{"@pid":"124/1428","text":"Tobias Schmid"}},"title":"Safety Analysis for Highly Automated Driving.","venue":"ISSRE Workshops","pages":"154-157","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Schmid18","doi":"10.1109/ISSREW.2018.000-7","ee":"https://doi.org/10.1109/ISSREW.2018.000-7","url":"https://dblp.org/rec/conf/issre/Schmid18"}, "url":"URL#2625540" }, { "@score":"1", "@id":"2625541", "info":{"authors":{"author":[{"@pid":"230/2379","text":"Guilherme Otavio de Sena"},{"@pid":"06/6499","text":"Rivalino Matias"}]},"title":"A Systematic Mapping Review of Memory Leak Detection Techniques.","venue":"ISSRE Workshops","pages":"264-270","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/SenaM18","doi":"10.1109/ISSREW.2018.00017","ee":"https://doi.org/10.1109/ISSREW.2018.00017","url":"https://dblp.org/rec/conf/issre/SenaM18"}, "url":"URL#2625541" }, { "@score":"1", "@id":"2625542", "info":{"authors":{"author":[{"@pid":"05/7685","text":"Maninder Singh"},{"@pid":"00/6421","text":"Gursimran Singh Walia"},{"@pid":"139/3865","text":"Anurag Goswami"}]},"title":"Using Supervised Learning to Guide the Selection of Software Inspectors in Industry.","venue":"ISSRE Workshops","pages":"12-17","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/SinghWG18","doi":"10.1109/ISSREW.2018.00-38","ee":"https://doi.org/10.1109/ISSREW.2018.00-38","url":"https://dblp.org/rec/conf/issre/SinghWG18"}, "url":"URL#2625542" }, { "@score":"1", "@id":"2625543", "info":{"authors":{"author":{"@pid":"180/4074","text":"Madhusudan Srinivasan"}},"title":"Prioritization of Metamorphic Relations Based on Test Case Execution Properties.","venue":"ISSRE Workshops","pages":"162-165","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Srinivasan18","doi":"10.1109/ISSREW.2018.000-5","ee":"https://doi.org/10.1109/ISSREW.2018.000-5","url":"https://dblp.org/rec/conf/issre/Srinivasan18"}, "url":"URL#2625543" }, { "@score":"1", "@id":"2625544", "info":{"authors":{"author":[{"@pid":"72/5244","text":"Vlad Stirbu"},{"@pid":"80/5814","text":"Tommi Mikkonen"}]},"title":"Towards Agile Yet Regulatory-Compliant Development of Medical Software.","venue":"ISSRE Workshops","pages":"337-340","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/StirbuM18","doi":"10.1109/ISSREW.2018.00027","ee":"https://doi.org/10.1109/ISSREW.2018.00027","url":"https://dblp.org/rec/conf/issre/StirbuM18"}, "url":"URL#2625544" }, { "@score":"1", "@id":"2625545", "info":{"authors":{"author":[{"@pid":"35/10114","text":"Chin-Wei Tien"},{"@pid":"230/2391","text":"Tsung-Ta Tsai"},{"@pid":"20/3822","text":"Ing-Yi Chen"},{"@pid":"57/264","text":"Sy-Yen Kuo"}]},"title":"UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware.","venue":"ISSRE Workshops","pages":"18-23","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/TienTCK18","doi":"10.1109/ISSREW.2018.00-37","ee":"https://doi.org/10.1109/ISSREW.2018.00-37","url":"https://dblp.org/rec/conf/issre/TienTCK18"}, "url":"URL#2625545" }, { "@score":"1", "@id":"2625546", "info":{"authors":{"author":[{"@pid":"151/4104","text":"Matheus Torquato 0001"},{"@pid":"14/6260","text":"Marco Vieira"}]},"title":"Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload.","venue":"ISSRE Workshops","pages":"300-307","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/TorquatoV18","doi":"10.1109/ISSREW.2018.00022","ee":"https://doi.org/10.1109/ISSREW.2018.00022","url":"https://dblp.org/rec/conf/issre/TorquatoV18"}, "url":"URL#2625546" }, { "@score":"1", "@id":"2625547", "info":{"authors":{"author":[{"@pid":"138/8148","text":"Chadi Trad"},{"@pid":"45/6112","text":"Rawad Abou Assi"},{"@pid":"23/4711","text":"Wes Masri"},{"@pid":"29/5476","text":"Fadi A. Zaraket"}]},"title":"CFAAR: Control Flow Alteration to Assist Repair.","venue":"ISSRE Workshops","pages":"208-215","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/TradAMZ18","doi":"10.1109/ISSREW.2018.00008","ee":"https://doi.org/10.1109/ISSREW.2018.00008","url":"https://dblp.org/rec/conf/issre/TradAMZ18"}, "url":"URL#2625547" }, { "@score":"1", "@id":"2625548", "info":{"authors":{"author":[{"@pid":"230/2395","text":"Aya Ureshino"},{"@pid":"77/543","text":"Yasuharu Nishi"},{"@pid":"134/8928","text":"Satomi Yoshizawa"},{"@pid":"22/6663","text":"Makoto Nonaka"},{"@pid":"230/2372","text":"Makiko Asai"}]},"title":"Trap-Based Software Review: How Will Engineers Embed Bugs Due to Cognitive Error?","venue":"ISSRE Workshops","pages":"6-11","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/UreshinoNYNA18","doi":"10.1109/ISSREW.2018.00-39","ee":"https://doi.org/10.1109/ISSREW.2018.00-39","url":"https://dblp.org/rec/conf/issre/UreshinoNYNA18"}, "url":"URL#2625548" }, { "@score":"1", "@id":"2625549", "info":{"authors":{"author":{"@pid":"191/2277","text":"Petra Vizarreta"}},"title":"Modelling, Design and Optimization of Dependable Softwarized Networks for Industrial Applications.","venue":"ISSRE Workshops","pages":"170-173","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/Vizarreta18","doi":"10.1109/ISSREW.2018.000-3","ee":"https://doi.org/10.1109/ISSREW.2018.000-3","url":"https://dblp.org/rec/conf/issre/Vizarreta18"}, "url":"URL#2625549" }, { "@score":"1", "@id":"2625550", "info":{"authors":{"author":[{"@pid":"230/2378","text":"Ailec Wu"},{"@pid":"193/4228","text":"Abu Hasnat Mohammad Rubaiyat"},{"@pid":"230/2367","text":"Chris Anton"},{"@pid":"80/7769","text":"Homa Alemzadeh"}]},"title":"Model Fusion: Weighted N-Version Programming for Resilient Autonomous Vehicle Steering Control.","venue":"ISSRE Workshops","pages":"144-145","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/WuRAA18","doi":"10.1109/ISSREW.2018.00-11","ee":"https://doi.org/10.1109/ISSREW.2018.00-11","url":"https://dblp.org/rec/conf/issre/WuRAA18"}, "url":"URL#2625550" }, { "@score":"1", "@id":"2625551", "info":{"authors":{"author":[{"@pid":"66/5911","text":"Jianwen Xiang"},{"@pid":"186/6689","text":"Caisheng Weng"},{"@pid":"48/2034-1","text":"Dongdong Zhao 0001"},{"@pid":"69/4394","text":"Jing Tian"},{"@pid":"96/4134","text":"Shengwu Xiong"},{"@pid":"73/2252-1","text":"Lin Li 0001"},{"@pid":"00/336","text":"Artur Andrzejak 0001"}]},"title":"A New Software Rejuvenation Model for Android.","venue":"ISSRE Workshops","pages":"293-299","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/XiangWZTXLA18","doi":"10.1109/ISSREW.2018.00021","ee":"https://doi.org/10.1109/ISSREW.2018.00021","url":"https://dblp.org/rec/conf/issre/XiangWZTXLA18"}, "url":"URL#2625551" }, { "@score":"1", "@id":"2625553", "info":{"authors":{"author":[{"@pid":"48/2807","text":"Long Zhang"},{"@pid":"01/1844-4","text":"Zhenyu Zhang 0004"}]},"title":"SeTCHi: Selecting Test Cases to Improve History-Guided Fault Localization.","venue":"ISSRE Workshops","pages":"200-207","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/ZhangZ18","doi":"10.1109/ISSREW.2018.00007","ee":"https://doi.org/10.1109/ISSREW.2018.00007","url":"https://dblp.org/rec/conf/issre/ZhangZ18"}, "url":"URL#2625553" }, { "@score":"1", "@id":"2625556", "info":{"authors":{"author":[{"@pid":"161/1043","text":"Xuejiao Zhao"},{"@pid":"39/5544-17","text":"Hongwei Li 0017"},{"@pid":"120/1174","text":"Yutian Tang"},{"@pid":"161/1030","text":"Dongjing Gao"},{"@pid":"161/1073","text":"Lingfeng Bao"},{"@pid":"57/4656","text":"Ching-Hung Lee"}]},"title":"A Smart Context-Aware Program Assistant Based on Dynamic Programming Event Modeling.","venue":"ISSRE Workshops","pages":"24-29","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/issre/ZhaoLTGBL18","doi":"10.1109/ISSREW.2018.00-36","ee":"https://doi.org/10.1109/ISSREW.2018.00-36","url":"https://dblp.org/rec/conf/issre/ZhaoLTGBL18"}, "url":"URL#2625556" }, { "@score":"1", "@id":"2685704", "info":{"authors":{"author":[{"@pid":"g/SudiptoGhosh","text":"Sudipto Ghosh"},{"@pid":"63/8166","text":"Roberto Natella"},{"@pid":"07/1027","text":"Bojan Cukic"},{"@pid":"34/3155","text":"Robin S. Poston"},{"@pid":"56/6126","text":"Nuno Laranjeiro"}]},"title":"2018 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Memphis, TN, USA, October 15-18, 2018","venue":"ISSRE Workshops","publisher":"IEEE Computer Society","year":"2018","type":"Editorship","key":"conf/issre/2018w","ee":"https://ieeexplore.ieee.org/xpl/conhome/8536839/proceeding","url":"https://dblp.org/rec/conf/issre/2018w"}, "url":"URL#2685704" } ] } } } )