default search action
QRS 2016: Vienna, Austria
- 2016 IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, Vienna, Austria, August 1-3, 2016. IEEE 2016, ISBN 978-1-5090-4127-5
Session: Cloud-Based and Concurrent Programs
- Hongyan Tang, Ying Li, Tong Jia, Zhonghai Wu:
Hunting Killer Tasks for Cloud System through Machine Learning: A Google Cluster Case Study. 1-12 - Jialin Yang, Chunbai Yang, W. K. Chan:
HistLock: Efficient and Sound Hybrid Detection of Hidden Predictive Data Races with Functional Contexts. 13-24 - Srijoni Majumdar, Nachiketa Chatterjee, Shila Rani Sahoo, Partha Pratim Das:
D-Cube: Tool for Dynamic Design Discovery from Multi-threaded Applications Using PIN. 25-32 - Patrick Ngai, Sung-Jer Lu, Yu-Sung Wu, Wei-Sheng Lim, Tung-Yueh Lin:
Network Performance Bottleneck Detection and Maximum Network Throughput Estimation for Datacenter Applications. 33-40
Session: Combinatorial Testing
- Huiyan Wang, Chang Xu, Jun Sui, Jian Lu:
How Effective Is Branch-Based Combinatorial Testing? An Exploratory Study. 41-52 - Xue-Lin Li, Ruizhi Gao, W. Eric Wong, Chunhui Yang, Dong Li:
Applying Combinatorial Testing in Industrial Settings. 53-60 - Eun-Hye Choi, Shunya Kawabata, Osamu Mizuno, Cyrille Artho, Takashi Kitamura:
Test Effectiveness Evaluation of Prioritized Combinatorial Testing: A Case Study. 61-68 - Dimitris E. Simos, Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, Raghu Kacker:
TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach. 69-73
Session: Empirical Approaches for Software Process Quality
- Tobias Baum, Olga Liskin, Kai Niklas, Kurt Schneider:
A Faceted Classification Scheme for Change-Based Industrial Code Review Processes. 74-85 - Jianglin Huang, Hongyi Sun:
Grey Relational Analysis Based k Nearest Neighbor Missing Data Imputation for Software Quality Datasets. 86-91 - Matthew Stephan, James R. Cordy:
Model-Driven Evaluation of Software Architecture Quality Using Model Clone Detection. 92-99 - Michail Papamichail, Themistoklis G. Diamantopoulos, Andreas L. Symeonidis:
User-Perceived Source Code Quality Estimation Based on Static Analysis Metrics. 100-107
Session: Program Verification - Invariants and Constraints
- Bin Li, Zhenhao Tang, Juan Zhai, Jianhua Zhao:
Automatic Invariant Synthesis for Arrays in Simple Programs. 108-119 - Yiqun Wang, Shengwei An, Xiaoxing Ma, Chun Cao, Chang Xu:
Verifying Distributed Controllers with Local Invariants. 120-131 - Juan Zhai, Bin Li, Zhenhao Tang, Jianhua Zhao, Xuandong Li:
Precondition Calculation for Loops Iterating over Data Structures. 132-143 - Romain Aïssat, Marie-Claude Gaudel, Frédéric Voisin, Burkhart Wolff:
A Method for Pruning Infeasible Paths via Graph Transformations and Symbolic Execution. 144-151
Session: Debugging and Fixing
- Fábio Petrillo, Zéphyrin Soh, Foutse Khomh, Marcelo Pimenta, Carla M. D. S. Freitas, Yann-Gaël Guéhéneuc:
Towards Understanding Interactive Debugging. 152-163 - Tommaso Dal Sasso, Andrea Mocci, Michele Lanza:
What Makes a Satisficing Bug Report? 164-174 - Irena Bojanova, Paul E. Black, Yaacov Yesha, Yan Wu:
The Bugs Framework (BF): A Structured Approach to Express Bugs. 175-182 - Yukiya Uneno, Osamu Mizuno, Eun-Hye Choi:
Using a Distributed Representation of Words in Localizing Relevant Files for Bug Reports. 183-190
Session: Defect Prediction Models
- Kazuhiro Yamashita, Changyun Huang, Meiyappan Nagappan, Yasutaka Kamei, Audris Mockus, Ahmed E. Hassan, Naoyasu Ubayashi:
Thresholds for Size and Complexity Metrics: A Case Study from the Perspective of Defect Density. 191-201 - Shaoxiong Zhang, Jun Ai, Xue-Lin Li:
Correlation between the Distribution of Software Bugs and Network Motifs. 202-213 - Kwabena Ebo Bennin, Koji Toda, Yasutaka Kamei, Jacky Keung, Akito Monden, Naoyasu Ubayashi:
Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models. 214-221 - Matthieu Jimenez, Mike Papadakis, Tegawendé F. Bissyandé, Jacques Klein:
Profiling Android Vulnerabilities. 222-229
Session: Security
- Tobias F. Pfeffer, Stefan Sydow, Joachim Fellmuth, Paula Herber:
Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking. 230-241 - René Rietz, Hartmut König, Steffen Ullrich, Benjamin Stritter:
Firewalls for the Web 2.0. 242-253 - Bernhard Peischl, Michael Felderer, Armin Beer:
Testing Security Requirements with Non-experts: Approaches and Empirical Investigations. 254-261
Session: Databases
- Loup Meurice, Csaba Nagy, Anthony Cleve:
Detecting and Preventing Program Inconsistencies under Database Schema Evolution. 262-273 - Siyuan Xu, Weikai Miao, Thomas Kunz, Tongquan Wei, Mingsong Chen:
Quantitative Analysis of Variation-Aware Internet of Things Designs Using Statistical Model Checking. 274-285 - Rasha Osman, Juan F. Pérez, Giuliano Casale:
Quantifying the Impact of Replication on the Quality-of-Service in Cloud Databases. 286-297
Session: Mobile Apps Testing and Verification
- Chenglong Sun, Zhenyu Zhang, Bo Jiang, W. K. Chan:
Facilitating Monkey Test by Detecting Operable Regions in Rendered GUI of Mobile Game Apps. 298-306 - Tim Wahls:
MedicationChecker: Development of a Formally Verified Android Application with EventB2SQL. 307-314 - Natalia Kushik, Jorge López, Ana R. Cavalli, Nina Yevtushenko:
Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines. 315-322
Session: Memory and Non-functional Errors
- Rigel Gjomemo, Phu H. Phung, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, Lenore D. Zuck:
Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization Compilers. 323-334 - Mohamed Boussaa, Olivier Barais, Benoit Baudry, Gerson Sunyé:
NOTICE: A Framework for Non-Functional Testing of Compilers. 335-346 - Ju Qian, Xiaoyu Zhou, Wanchun Dang, Ziyuan Wang:
A Specification-Based Approach to the Testing of Java Memory Bloat. 347-352
Session: Mutation and Prioritization
- Mark Grechanik, Gurudev Devanla:
Mutation Integration Testing. 353-364 - Ali Parsai, Alessandro Murgia, Serge Demeyer:
A Model to Estimate First-Order Mutation Coverage from Higher-Order Mutation Coverage. 365-373 - Xiaofang Zhang, Xiaoyuan Xie, Tsong Yueh Chen:
Test Case Prioritization Using Adaptive Random Sequence with Category-Partition-Based Distance. 374-385
Session: Project and Process Prediction Models
- Harish Sukhwani, Javier Alonso, Kishor S. Trivedi, Issac Mcginnis:
Software Reliability Analysis of NASA Space Flight Software: A Practical Experience. 386-397 - Ou Wu:
How Does the Dependence between Inspectors Impact Capture-Recapture Estimation? An Empirical Study. 398-405 - Jasmin Ramadani, Stefan Wagner:
Which Change Sets in Git Repositories Are Related? 406-411
Session: Fault Localization
- Chung Man Tang, Jacky Keung, Yuen-Tak Yu, W. K. Chan:
DFL: Dual-Service Fault Localization. 412-422 - Leif Jonsson, David Broman, Måns Magnusson, Kristian Sandahl, Mattias Villani, Sigrid Eldh:
Automatic Localization of Bugs to Faulty Components in Large Scale Software Systems Using Bayesian Classification. 423-430 - Ang Li, Yan Lei, Xiaoguang Mao:
Towards More Accurate Fault Localization: An Approach Based on Feature Selection Using Branching Execution Probability. 431-438
Session: Testing and Processes
- Bo Jiang, W. K. Chan:
Testing and Debugging in Continuous Integration with Budget Quotas on Test Executions. 439-447 - Shaoying Liu:
A Tool Supported Testing Method for Reducing Cost and Improving Quality. 448-455 - Pete Rotella:
Resource/Schedule/Content Test Planning Model. 456-463
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.