default search action
17th ISSRE 2006: Raleigh, North Carolina, USA
- 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 7-10 November 2006, Raleigh, North Carolina, USA. IEEE Computer Society 2006, ISBN 0-7695-2684-5
Keynotes
- C. V. Ramamoorthy:
Disaster Hardening for Software Systems. 3-4 - Carl Kessler:
A Perspective on Software Consumability. 5 - Gary McGraw:
Software Security: Building Security In. 6
Testing I
- Marc Fisher II, Gregg Rothermel, Tyler Creelan, Margaret M. Burnett:
Scaling a Dataflow Testing Methodology to the MultiparadigmWorld of Commercial Spreadsheets. 13-22 - Wes Masri, Nagi Nahas, Andy Podgurski:
Memoized Forward Computation of Dynamic Slices. 23-32 - Scott McMaster, Atif M. Memon:
Call Stack Coverage for GUI Test-Suite Reduction. 33-44
Metrics
- Vibhu Saujanya Sharma, Pankaj Jalote:
Stabilization Time - A Quality Metric for Software Products. 45-51 - Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi:
Metrics-Based Software Reliability Models Using Non-homogeneous Poisson Processes. 52-61 - Nachiappan Nagappan, Thomas Ball, Brendan Murphy:
Using Historical In-Process and Product Metrics for Early Estimation of Software Failures. 62-74
Testing II
- Jun Yan, Zhong Jie Li, Yuan Yuan, Wei Sun, Jian Zhang:
BPEL4WS Unit Testing: Test Case Generation Using a Concurrent Path Analysis Approach. 75-84 - Erwan Brottier, Franck Fleurey, Jim Steel, Benoit Baudry, Yves Le Traon:
Metamodel-based Test Generation for Model Transformations: an Algorithm and a Tool. 85-94 - Trung T. Dinh-Trong, Sudipto Ghosh, Robert B. France:
A Systematic Approach to Generate Inputs to Test UML Design Models. 95-104 - Besnik Seljimi, Ioannis Parissis:
Using CLP to Automatically Generate Test Sequences for Synchronous Programs with Numeric Inputs and Outputs. 105-116
Security
- Nick Bartlow, Bojan Cukic:
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics. 117-126 - Xiaoling Cui, Lei Li, Jun Wei:
A Novel SOAP Attachment-Oriented Security Model. 127-135 - Ben Breech, Mike Tegtmeyer, Lori L. Pollock:
An Attack Simulator for Systematically Testing Program-based Security Mechanisms. 136-145 - Ashish Aggarwal, Pankaj Jalote:
Monitoring the Security Health of Software Systems. 146-158
Testing III
- Qing Xie, Atif M. Memon:
Studying the Characteristics of a "Good" GUI Test Suite. 159-168 - Jon S. Bækken, Roger T. Alexander:
A Candidate Fault Model for AspectJ Pointcuts. 169-178 - Tao Xie, Jianjun Zhao, Darko Marinov, David Notkin:
Detecting Redundant Unit Tests for AspectJ Programs. 179-190
Experience Reports I
- Ram Chillarege, P. Santhanam:
"Tail-Splitting" to Predict Failing Software Modules - with a Case Study on an Operating Systems Product. 191-196 - Katerina Goseva-Popstojanova, Margaret Hamill, Xuan Wang:
Adequacy, Accuracy, Scalability, and Uncertainty of Architecture-based Software Reliability: Lessons Learned from Large Empirical Case Studies. 197-203 - Gunnar Kudrjavets, Nachiappan Nagappan, Thomas Ball:
Assessing the Relationship between Software Assertions and Faults: An Empirical Investigation. 204-212
Experience Reports II
- Robyn R. Lutz, Ann Patterson-Hine, Anupa Bajwa:
Tool-Supported Verification of Contingency Software Design in Evolving, Autonomous Systems. 213-220 - Michael Mortensen, Sudipto Ghosh, James M. Bieman:
Testing During Refactoring: Adding Aspects to Legacy Systems. 221-230 - Eduardo Aranha, Paulo Borba, José Lima:
Model Simulation for Test Execution Capacity Estimation. 231-236 - Paola Bracchi, Bojan Cukic, Vittorio Cortellessa:
Modeling the Performance of Border Inspections with Electronic Travel Documents. 237-246
Testing IV
- Hiroyuki Okamura, Hitoshi Furumura, Tadashi Dohi:
On the Effect of Fault Removal in Software Testing - Bayesian Reliability Estimation Approach. 247-255 - Yu Lei, Richard H. Carver, David Chenho Kung, Vidur Gupta, Monica Hernandez:
A State Exploration-Based Approach to Testing Java Monitors. 256-265 - Sreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock:
Web Application Testing with Customized Test Requirements - An Experimental Comparison Study. 266-278
Modeling I
- Lin Zuo, Shaohua Liu, Jun Wei:
Combining Replication with Transaction Processing for Enhanced Reliability in J2EE. 279-288 - Hiroyuki Okamura, Tadashi Dohi:
Building Phase-Type Software Reliability Models. 289-298 - Vibhu Saujanya Sharma, Kishor S. Trivedi:
Reliability and Performance of Component Based Software Systems with Restarts, Retries, Reboots and Repairs. 299-310
Static and Dynamic Analysis
- Mithun Acharya, Tao Xie, Jun Xu:
Mining Interface Specifications for Generating Checkable Robustness Properties. 311-320 - David Owen, Dejan Desovski, Bojan Cukic:
Effectively Combining Software Verification Strategies: Understanding Different Assumptions. 321-330 - Madeline Diep, Myra B. Cohen, Sebastian G. Elbaum:
Probe Distribution Techniques to Profile Events in Deployed Software. 331-342
Modeling II
- Omar Hussain Alhazmi, Yashwant K. Malaiya:
Measuring and Enhancing Prediction Capabilities of Vulnerability Discovery Models for Apache and IIS HTTP Servers. 343-352 - Swapna S. Gokhale, Robert E. Mullen:
Queuing Models for Field Defect Resolution Process. 353-362 - Jesse Fletcher, Jane Cleland-Huang:
Softgoal Traceability Patterns. 363-374
Tools
- Mark Sherriff, Laurie A. Williams:
DevCOP: A Software Certificate Management System for Eclipse. 375-384 - Alfredo Capozucca, Nicolas Guelfi, Patrizio Pelliccione, Alexander B. Romanovsky, Avelino F. Zorzo:
CAA-DRIP: a framework for implementing Coordinated Atomic Actions. 385-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.