default search action
29th ISSRE 2018: Memphis, TN, USA - Workshops
- Sudipto Ghosh, Roberto Natella, Bojan Cukic, Robin S. Poston, Nuno Laranjeiro:
2018 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Memphis, TN, USA, October 15-18, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-9443-5
Industry Track
Best Disruptive Idea Award
- Nicolas Brousse, Oleksii Mykhailov:
Use of Self-Healing Techniques to Improve the Reliability of a Dynamic and Geo-Distributed Ad Delivery Service. 1-5 - Aya Ureshino, Yasuharu Nishi, Satomi Yoshizawa, Makoto Nonaka, Makiko Asai:
Trap-Based Software Review: How Will Engineers Embed Bugs Due to Cognitive Error? 6-11 - Maninder Singh, Gursimran Singh Walia, Anurag Goswami:
Using Supervised Learning to Guide the Selection of Software Inspectors in Industry. 12-17
Best Paper Award Session
- Chin-Wei Tien, Tsung-Ta Tsai, Ing-Yi Chen, Sy-Yen Kuo:
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware. 18-23 - Xuejiao Zhao, Hongwei Li, Yutian Tang, Dongjing Gao, Lingfeng Bao, Ching-Hung Lee:
A Smart Context-Aware Program Assistant Based on Dynamic Programming Event Modeling. 24-29 - Jing Gu, Long Wang, Yong Yang, Ying Li:
KEREP: Experience in Extracting Knowledge on Distributed System Behavior through Request Execution Path. 30-35
Defect and Threats Prevention
- Sung-Hoon Lee, Seung-Hyun Kim, Soohyung Kim, Seung-Hun Jin:
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps. 36-41 - Monika Maidl, Dirk Kröselberg, Jochen Christ, Kristian Beckers:
A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443. 42-47 - Kumi Jinzenji, Daisuke Hamuro:
A Concept of QCD Prediction and Control in Agile Software Development for Portfolio Management. 48-52 - Kavitha Manjunath, Vaibhav K. Anu, Gursimran Singh Walia, Gary Bradshaw:
Training Industry Practitioners to Investigate the Human Error Causes of Requirements Faults. 53-58
Reliability Assessment
- Robert S. Hanmer, Lalita Jagadeesan, Veena B. Mendiratta, Heng Zhang:
Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDN. 59-64 - Allen P. Nikora, Lance Fiondella, Thierry Wandji:
SFRAT - An Extendable Software Reliability Assessment Tool. 65-70 - Rakshith Amarnath, Shashank Nagesh Bhat, Peter Munk, Eike Thaden:
A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls. 71-76
Software Reliability Modeling
- Rashid Mijumbi, Kazuhira Okumoto, Abhaya Asthana, Jacques Meekel:
Recent Advances in Software Reliability Assurance. 77-82 - Veena B. Mendiratta, Lalita Jategaonkar Jagadeesan, Robert S. Hanmer, Muntasir R. Rahman:
How Reliable Is My Software-Defined Network? Models and Failure Impacts. 83-88 - Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Takayoshi Suzuki:
Empirical Study on Tendencies for Unstable Situations in Application Results of Software Reliability Growth Model. 89-94
System Profiling and Log Analysis
- Marcello Cinque, Domenico Cotroneo, Antonio Pecchia:
Challenges and Directions in Security Information and Event Management (SIEM). 95-99 - Megan Hickman, Dakota Fulp, Elisabeth Baseman, Sean Blanchard, Hugh Greenberg, William M. Jones, Nathan DeBardeleben:
Enhancing HPC System Log Analysis by Identifying Message Origin in Source Code. 100-105 - Tong Jia, Ying Li, Chengbo Zhang, Wensheng Xia, Jie Jiang, Yuhong Liu:
Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault Diagnosis. 106-111
Distributed Systems Testing and Profiling
- Francisco Gomes de Oliveira Neto, Michael Jones, Rafael da Silva Martins:
Visualisation to Support Fault Localisation in Distributed Embedded Systems within the Automotive Industry. 112-117 - Florian Klück, Yihao Li, Mihai Nica, Jianbo Tao, Franz Wotawa:
Using Ontologies for Test Suites Generation for Automated and Autonomous Driving Functions. 118-123 - Wei Chen, Guoquan Wu, Jun Wei:
An Approach to Identifying Error Patterns for Infrastructure as Code. 124-129
Fast Abstracts
Reliability, Testing, and Security
- Zuohua Ding, Wenjie Jiang, Mingyue Jiang, Zhi Jin, He Jiang:
Model Checking the Uncertainties in Software Systems Introduced by Intelligent Components. 130-131 - Ryan Lekivetz, Joseph Morgan:
Evaluation and Construction of Covering Arrays Utilizing Prior Information. 132-133 - Fuqun Huang, Lorenzo Strigini:
Predicting Software Defects Based on Cognitive Error Theories. 134-135 - Jun Ai, Wenzhu Su, Fei Wang:
Software Reliability Evaluation Method Based on a Software Network. 136-137 - Chase Koehler, Divita Mathur, Eric R. Henderson, Robyn R. Lutz:
Probing the Security of DNA Origami. 138-139
Services and Cloud Systems
- Domenico Cotroneo, Luigi De Simone, Alfonso Di Martino, Pietro Liguori, Roberto Natella:
Enhancing the Analysis of Error Propagation and Failure Modes in Cloud Systems. 140-141 - Siqian Gong, Beibei Yin, Kai-Yuan Cai:
An Adaptive PID Control for QoS Management in Cloud Computing System. 142-143 - Ailec Wu, Abu Hasnat Mohammad Rubaiyat, Chris Anton, Homa Alemzadeh:
Model Fusion: Weighted N-Version Programming for Resilient Autonomous Vehicle Steering Control. 144-145 - André van Hoorn, Aldeida Aleti, Thomas F. Düllmann, Teerat Pitakrat:
ORCAS: Efficient Resilience Benchmarking of Microservice Architectures. 146-147 - Hanyu Pei, Beibei Yin, Min Xie:
Dynamic Random Testing Strategy for Test Case Optimization in Cloud Environment. 148-149
Doctoral Symposium Papers
Recently Started Students
- Florian Hofer:
Enhancing Security and Reliability for Smart- Systems' Architectures. 150-153 - Tobias Schmid:
Safety Analysis for Highly Automated Driving. 154-157 - Hajar Homayouni:
Testing Extract-Transform-Load Process in Data Warehouse Systems. 158-161 - Madhusudan Srinivasan:
Prioritization of Metamorphic Relations Based on Test Case Execution Properties. 162-165
Nearly Finished Students
- Vidhyashree Nagaraju:
Software Reliability Assessment: Modeling and Algorithms. 166-169 - Petra Vizarreta:
Modelling, Design and Optimization of Dependable Softwarized Networks for Industrial Applications. 170-173 - Juliana Oliveira:
Taming Exceptions in Android Applications. 174-177 - Leonid Joffe:
Machine Learning Augmented Fuzzing. 178-183
IDEAR 2018 Workshop
Advances in Fault Localization
- Arpit Christi, Matthew Lyle Olson, Mohammad Amin Alipour, Alex Groce:
Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault Localization. 184-191 - Ingo Pill, Franz Wotawa:
Spectrum-Based Fault Localization for Logic-Based Reasoning. 192-199 - Long Zhang, Zhenyu Zhang:
SeTCHi: Selecting Test Cases to Improve History-Guided Fault Localization. 200-207
Automated Repair
- Chadi Trad, Rawad Abou Assi, Wes Masri, Fadi A. Zaraket:
CFAAR: Control Flow Alteration to Assist Repair. 208-215 - Eman Aldakheel, Ugo A. Buy, Simran Kaur:
DDS: Deadlock Detector and Solver. 216-223
Processes and Applications
- Artur Andrzejak, Matthias Iacsa:
ConfGuru - A System for Fully Automated Debugging of Configuration Errors. 224-231 - Korosh Koochekian Sabor, Mathieu Nayrolles, Abdelaziz Trabelsi, Abdelwahab Hamou-Lhadj:
An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model. 232-236
STEP 2018 Workshop
Testing and Security
- Martin (Dae Youp) Kang, Euntae Ted Lee, Sungyong Um:
Establishment of Methods for Information Security System Policy Using Benchmarking. 237-242 - Jong Seok Lee:
The DevSecOps and Agency Theory. 243-244
Test Case Prioritization and Value Estimation
- Maral Azizi, Hyunsook Do:
Graphite: A Greedy Graph-Based Technique for Regression Test Case Prioritization. 245-251 - Mark Lee Gillenson, Xihui Zhang, Thomas F. Stafford, Yao Shi:
A Literature Review of Software Test Cases and Future Research. 252-256
WoSAR 2018 Workshop
Literature Review
- Roberto Pietrantuono, Stefano Russo:
Software Aging and Rejuvenation in the Cloud: A Literature Review. 257-263 - Guilherme Otavio de Sena, Rivalino Matias:
A Systematic Mapping Review of Memory Leak Detection Techniques. 264-270
Software Aging Detection and Monitoring
- Yu Qiao, Zheng Zheng, Yunyu Fang:
An Empirical Study on Software Aging Indicators Prediction in Android Mobile. 271-277 - Luyi Li, Minyan Lu, Tingyang Gu:
Extracting Interaction-Related Failure Indicators for Online Detection and Prediction of Content Failures. 278-285 - Seyedehzahra Khoshmanesh, Robyn R. Lutz:
The Role of Similarity in Detecting Feature Interaction in Software Product Lines. 286-292
Software Rejuvenation
- Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Jing Tian, Shengwu Xiong, Lin Li, Artur Andrzejak:
A New Software Rejuvenation Model for Android. 293-299 - Matheus Torquato, Marco Vieira:
Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload. 300-307
WoSoCer 2018 Workshop
Open Challenges in Software Certification
- Roberto Pietrantuono, Stefano Russo:
Robotics Software Engineering and Certification: Issues and Challenges. 308-312
Testing and Certification
- Guanpeng Li, Karthik Pattabiraman, Nathan DeBardeleben:
TensorFI: A Configurable Fault Injector for TensorFlow Applications. 313-320 - Domenico Cotroneo, Luigi De Simone, Roberto Natella:
Dependability Certification Guidelines for NFVIs through Fault Injection. 321-328 - Aiman Gannous, Anneliese Andrews, Barbara Gallina:
Toward a Systematic and Safety Evidence Productive Verification Approach for Safety-Critical Systems. 329-336
Certifiable Software Development and Verification
- Vlad Stirbu, Tommi Mikkonen:
Towards Agile Yet Regulatory-Compliant Development of Medical Software. 337-340 - Michael Fisher, Emily C. Collins, Louise A. Dennis, Matt Luckcuck, Matt Webster, Mike Jump, Vincent Pagé, Charles Patchett, Fateme Dinmohammadi, David Flynn, Valentin Robu, Xingyu Zhao:
Verifiable Self-Certifying Autonomous Systems. 341-348 - Morayo Adedjouma, Asma Smaoui:
Model-Based Computer-Aided Monitoring for ISO26262 Compliant Systems. 349-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.