default search action
24th ISSRE 2013: Pasadena, CA, USA - Supplemental Proceedings
- IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013 - Supplemental Proceedings. IEEE Computer Society 2013, ISBN 978-1-4799-2552-0
Fast Abstracts
- Ziying Dai, Xiaoguang Mao, Liqian Chen, Yan Lei, Yi Zhang:
Finding related events for specification mining. 1-2 - Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno:
Persistence of relevance: A missing issue in imperfect coverage models. 3-4 - Davide Falessi, Lucas Layman:
Automated classification of NASA anomalies using natural language processing techniques. 5-6 - Noriyoshi Kuno, Tsuyoshi Nakajima, Makoto Matsushita, Katsuro Inoue:
A study on the effectiveness of peer review meeting. 7-8 - T. Ketchiozo Wandji, Shahryar Sarkani, Timothy Eveleigh, Thomas H. Holzer, Peter A. Keiller:
Comparative analysis of Bayesian and classical approaches for software reliability measurement. 9-10 - Chao Luo, Hiroyuki Okamura, Tadashi Dohi:
Characteristic analysis of quantitative definition of resiliency measure. 11-12 - Vignir Gudmundsson, Christoph Schulze, Dharmalingam Ganesan, Mikael Lindvall, Robert Wiegand:
An initial evaluation of model-based testing. 13-14 - Nuno Silva, Marco Vieira:
Certification of embedded systems: Quantitative analysis and irrefutable evidences. 15-16 - Vaise Patu, Shuichiro Yamamoto:
A new model to capture security threat patterns by complying with standards and lesson learned - Archiving dependability for security assurance cases. 17-18 - Shayan Eskandari, Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Mario Couture:
Monitoring system calls for anomaly detection in modern operating systems. 19-20 - Shweta Subramani, Mladen A. Vouk, Laurie A. Williams:
Non-operational testing of software for security issues. 21-22 - Da Young Lee, Mladen A. Vouk, Laurie A. Williams:
Using software reliability models for security assessment - Verification of assumptions. 23-24
Industry
- Yasuhiko Yokote, Tatsumi Nagayama:
Dependability of open systems. 25-35 - Marc Förster:
Conditional software specification & assurance: A practical assessment of contract-based approaches. 36 - Eric Verhulst, Bernhard H. C. Sputh:
ARRL: A criterion for compositional safety and systems engineering: A normative approach to specifying components. 37-44 - Ram Chillarege:
Using ODC to diagnose an Agile enterprise application development project. 45 - Hiroki Takamura:
International standardization of Open Systems Dependability. 46 - Wei Hoo Chong:
Radio Diagnostic tool: IDoctor. 47-48 - R. K. Gupta:
Improving reliability of data protection software with integrated multilayered fault Injection testing. 49 - Kishore Vinod, Manjunath Ramachandra, Prashanth Pai, Santosh Yalawar:
A novel mechanism to continuously scan field logs and gain real-time feedback. 50-52 - Gursimran Singh Walia, Jeffrey C. Carver:
Using capture-recapture models to make objective post-inspection decisions. 54 - Brendan Murphy, Laurie A. Williams:
To branch or not to branch that is the question. 55 - Hrishikesh Dewan, Raksha B. Nayak:
Design of a dependable peer-to-peer system for numerical optimization. 56 - Seema Meena, Uma M. Balasubramani:
Smart defect classification for better analysis using tagging mechanisms. 57 - Lakshmankumar Mukkavilli:
Directed graph as a model for unit testing. 58 - Aline Cristine Fadel, Regina Lúcia de Oliveira Moraes, Paulo Martins, Eliane Martins:
Automating software validation of a GPON network. 59 - Pete Rotella, Satyabrata Pradhan:
Predicting multi-platform release quality. 60 - Arbi Ghazarian:
Detection of missing requirements using base requirements pairs. 61-80 - Suresh C. Kothari:
Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technology. 81 - Kishore Vinod, Pandit Pattabhirama, Manjunath Ramachandra:
Reliability feedback through system log analysis. 82-83 - Ann T. Tai, Chris J. Walter, Lorraine M. Fesq, John C. Day:
Fault-class-aware fault tree generation and analysis. 84 - Myron Hecht, Jeanne Tamaki, Derek Lo:
Modeling of Failure detection and recovery in SysML. 85-95 - Jinghui Li, Xuewen Gong, Jianqing Yuan:
A statistical approach for software resource leak detection and prediction. 96 - Michela Munoz:
Space systems modeling using the Architecture Analysis & Design Language (AADL). 97-98 - Kishore Vinod, Manjunath Ramachandra, Santosh Yalawar, Pandit Pattabhirama:
Diagnosing development software release to predict field failures. 99-101 - Sandipan Dey, Kandathil K. Jacob, Javier Alonso Lopez, Kishor S. Trivedi:
Failure data analytics to build failure prediction mechanisms. 102-103 - Pete Rotella, Devesh Goyal, Sunita Chulani:
Predicting field experience of releases on specific platforms. 105 - Ron Morillo, John Lai, Leila Meshkat:
Forensic study of the Curiosity Flight Software anomalies. 106 - Gursimran Singh Walia, Jeffrey C. Carver:
Using error information to improve software quality. 107
Student Papers
- Chakkrit Tantithamthavorn, Rattamont Teekavanich, Akinori Ihara, Ken-ichi Matsumoto:
Mining A change history to quickly identify bug locations : A case study of the Eclipse project. 108-113
IWPD
- Zheng Zheng, Yichao Gao, Peng Hao, Zhenyu Zhang:
Coincidental correctness: An interference or interface to successful fault localization? 114-119 - Alexandre Perez, Rui Abreu:
Cues for scent intensification in debugging. 120-125 - Steven Davies, Marc Roper:
Bug localisation through diverse sources of information. 126-131 - Birgit Hofer, Franz Wotawa:
Mutation-based spreadsheet debugging. 132-137 - Yanqin Huang, Junhua Wu, Yang Feng, Zhenyu Chen, Zhihong Zhao:
An empirical study on clustering for isolating bugs in fault localization. 138-143 - Danqing Zhang, Jianhui Jiang, Linbo Chen:
Program behavior characterization and clustering: An empirical study for failure clustering. 144-149 - Dalin Zhang, Hailong Zhang, Dahai Jin, Yunzhan Gong:
Improving the accuracy of static analysis based on state partition. 157-161 - Zhen Dong, Mohammadreza Ghanavati, Artur Andrzejak:
Automated diagnosis of software misconfigurations based on static analysis. 162-168
MedSRDR
- Fubin Wu:
Integration of software reliability engineering, risk management and safety assurance case. 169-192 - Alfred Granger, Paul R. Garrett, Gary Dalmadge:
Medical device software risk assessment requires cross functional personnel. 193-210 - Yoshio Sakai, Seiko Shirasaka, Yasuharu Nishi:
An extended notation of FTA for risk assessment of software-intensive medical devices.: Recognition of the risk class before and after the risk control measure. 211-216 - Rasmus Adler, Sören Kemmann, Djalma de Melo Carvalho Filho, José Augusto Oliveira Neto:
Safety assessment of software-intensive medical devices: Introducing a safety quality model approach. 217-222 - Mahadevan Subramaniam, Parvathi Chundi, Abhilash Muthuraj, Eyal Margalit:
Testing distortion estimations in Retinal Prostheses. 223-242 - Yuan Wei:
Use software reliability growth models wisely. 243-262
WoSAR
- Domenico Cotroneo, Flavio Frattini, Roberto Natella, Roberto Pietrantuono:
Performance degradation analysis of a supercomputer. 263-268 - Fumio Machida, Artur Andrzejak, Rivalino Matias, Elder V. P. Sobrinho:
On the effectiveness of Mann-Kendall test for detection of software aging. 269-274 - Stefano Ballerini, Laura Carnevali, Marco Paolieri, Kumiko Tadano, Fumio Machida:
Software rejuvenation impacts on a phased-mission system for Mars exploration. 275-280 - Hiroyuki Okamura, Chao Luo, Tadashi Dohi:
Estimating response time distribution of server application in software aging phenomenon. 281-284 - Ram Chillarege:
Comparing four case studies on Bohr-Mandel characteristics using ODC. 285-289 - Geetika Goel, Arpan Roy, Rajeshwari Ganesan:
Identifying silent failures of SaaS services using finite state machine based invariant analysis. 290-295
WoSD3
- Yukiko Yanagisawa, Takashi Ito, Makoto Takeyama, Yasuhiko Yokote:
A new method of consensus building for open systems dependability. 296-302 - Makoto Hirai, Yoshifumi Yuasa, Yoshiki Kinoshita:
A chain of accountabilities in open systems based on assured entrustments. 303-310 - Miki Masumoto, Tatsuya Tokuno, Shuichiro Yamamoto:
A method for assuring service grade with Assurance case: An experiment on a portal service. 311-314 - Takuya Saruwatari, Shuichiro Yamamoto, Yutaka Matsuno:
A comparative study of d∗framework and GSN. 315-320 - Matthias Galster, Dan Tofan:
Exploring possibilities to analyse microblogs for dependability information in variability-intensive open source software systems. 321-325 - Kimio Kuramitsu:
D-Script : Dependable scripting with DEOS process. 326-330
WoSoCer
- Andrea Ceccarelli, Nuno Silva:
Qualitative comparison of aerospace standards: An objective approach. 331-336 - Qiuying Li, Lei Luo, Jian Wang:
Accelerated reliability testing approach for high-reliablity software based on the reinforced operational profile. 337-342 - Lili Xu, Hong Zhang:
An improved SFMEA method integrated with assistive techniques. 343-348 - Fernanda Buonanno, Domenico Di Leo, Paolo di Paolo, Roberto Pietrantuono, Stefano Russo:
Requirements engineering in rail transit production: An experience report. 349-352 - Michael Roth, Peter Liggesmeyer:
Qualitative analysis of state/event fault trees for supporting the certification process of software-intensive systems. 353-358 - Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson:
Strong and weak contract formalism for third-party component reuse. 359-364 - Andreas Söderberg, Rolf Johansson:
Safety contract based design of software components. 365-370 - Nuno Antunes, Francesco Brancati, Andrea Ceccarelli, Andrea Bondavalli, Marco Vieira:
A monitoring and testing framework for critical off-the-shelf applications and services. 371-374 - Ewen Denney, Ganesh Pai:
Evidence arguments for using formal methods in software certification. 375-380 - Nuno Silva, Alexandre Esper, Ricardo Barbosa, Johan Zandin, Claudio Monteleone:
Reference architecture for high dependability on-board computers. 381-386 - Silviya Grigorova, T. S. E. Maibaum:
Taking a page from the law books: Considering evidence weight in evaluating assurance case confidence. 387-390
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.