


default search action
24th ISSRE 2013: Pasadena, CA, USA - Supplemental Proceedings
- IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013, Pasadena, CA, USA, November 4-7, 2013 - Supplemental Proceedings. IEEE Computer Society 2013, ISBN 978-1-4799-2552-0

Fast Abstracts
- Ziying Dai, Xiaoguang Mao

, Liqian Chen, Yan Lei, Yi Zhang:
Finding related events for specification mining. 1-2 - Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno:

Persistence of relevance: A missing issue in imperfect coverage models. 3-4 - Davide Falessi, Lucas Layman

:
Automated classification of NASA anomalies using natural language processing techniques. 5-6 - Noriyoshi Kuno, Tsuyoshi Nakajima, Makoto Matsushita, Katsuro Inoue:

A study on the effectiveness of peer review meeting. 7-8 - T. Ketchiozo Wandji, Shahryar Sarkani, Timothy Eveleigh, Thomas H. Holzer, Peter A. Keiller:

Comparative analysis of Bayesian and classical approaches for software reliability measurement. 9-10 - Chao Luo, Hiroyuki Okamura

, Tadashi Dohi
:
Characteristic analysis of quantitative definition of resiliency measure. 11-12 - Vignir Gudmundsson, Christoph Schulze, Dharmalingam Ganesan, Mikael Lindvall, Robert Wiegand:

An initial evaluation of model-based testing. 13-14 - Nuno Silva, Marco Vieira

:
Certification of embedded systems: Quantitative analysis and irrefutable evidences. 15-16 - Vaise Patu, Shuichiro Yamamoto:

A new model to capture security threat patterns by complying with standards and lesson learned - Archiving dependability for security assurance cases. 17-18 - Shayan Eskandari

, Wael Khreich
, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj
, Mario Couture:
Monitoring system calls for anomaly detection in modern operating systems. 19-20 - Shweta Subramani, Mladen A. Vouk, Laurie A. Williams:

Non-operational testing of software for security issues. 21-22 - Da Young Lee, Mladen A. Vouk, Laurie A. Williams:

Using software reliability models for security assessment - Verification of assumptions. 23-24
Industry
- Yasuhiko Yokote, Tatsumi Nagayama:

Dependability of open systems. 25-35 - Marc Förster:

Conditional software specification & assurance: A practical assessment of contract-based approaches. 36 - Eric Verhulst, Bernhard H. C. Sputh:

ARRL: A criterion for compositional safety and systems engineering: A normative approach to specifying components. 37-44 - Ram Chillarege:

Using ODC to diagnose an Agile enterprise application development project. 45 - Hiroki Takamura:

International standardization of Open Systems Dependability. 46 - Wei Hoo Chong:

Radio Diagnostic tool: IDoctor. 47-48 - R. K. Gupta:

Improving reliability of data protection software with integrated multilayered fault Injection testing. 49 - Kishore Vinod, Manjunath Ramachandra, Prashanth Pai, Santosh Yalawar:

A novel mechanism to continuously scan field logs and gain real-time feedback. 50-52 - Gursimran Singh Walia, Jeffrey C. Carver:

Using capture-recapture models to make objective post-inspection decisions. 54 - Brendan Murphy, Laurie A. Williams:

To branch or not to branch that is the question. 55 - Hrishikesh Dewan, Raksha B. Nayak:

Design of a dependable peer-to-peer system for numerical optimization. 56 - Seema Meena, Uma M. Balasubramani:

Smart defect classification for better analysis using tagging mechanisms. 57 - Lakshmankumar Mukkavilli:

Directed graph as a model for unit testing. 58 - Aline Cristine Fadel, Regina Lúcia de Oliveira Moraes

, Paulo Martins, Eliane Martins:
Automating software validation of a GPON network. 59 - Pete Rotella, Satyabrata Pradhan:

Predicting multi-platform release quality. 60 - Arbi Ghazarian:

Detection of missing requirements using base requirements pairs. 61-80 - Suresh C. Kothari:

Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technology. 81 - Kishore Vinod, Pandit Pattabhirama, Manjunath Ramachandra:

Reliability feedback through system log analysis. 82-83 - Ann T. Tai, Chris J. Walter, Lorraine M. Fesq, John C. Day:

Fault-class-aware fault tree generation and analysis. 84 - Myron Hecht, Jeanne Tamaki, Derek Lo:

Modeling of Failure detection and recovery in SysML. 85-95 - Jinghui Li, Xuewen Gong, Jianqing Yuan:

A statistical approach for software resource leak detection and prediction. 96 - Michela Munoz:

Space systems modeling using the Architecture Analysis & Design Language (AADL). 97-98 - Kishore Vinod, Manjunath Ramachandra, Santosh Yalawar, Pandit Pattabhirama:

Diagnosing development software release to predict field failures. 99-101 - Sandipan Dey, Kandathil K. Jacob, Javier Alonso Lopez, Kishor S. Trivedi:

Failure data analytics to build failure prediction mechanisms. 102-103 - Pete Rotella, Devesh Goyal, Sunita Chulani:

Predicting field experience of releases on specific platforms. 105 - Ron Morillo, John Lai, Leila Meshkat:

Forensic study of the Curiosity Flight Software anomalies. 106 - Gursimran Singh Walia, Jeffrey C. Carver:

Using error information to improve software quality. 107
Student Papers
- Chakkrit Tantithamthavorn

, Rattamont Teekavanich, Akinori Ihara, Ken-ichi Matsumoto:
Mining A change history to quickly identify bug locations : A case study of the Eclipse project. 108-113
IWPD
- Zheng Zheng, Yichao Gao, Peng Hao, Zhenyu Zhang:

Coincidental correctness: An interference or interface to successful fault localization? 114-119 - Alexandre Perez

, Rui Abreu
:
Cues for scent intensification in debugging. 120-125 - Steven Davies

, Marc Roper
:
Bug localisation through diverse sources of information. 126-131 - Birgit Hofer

, Franz Wotawa
:
Mutation-based spreadsheet debugging. 132-137 - Yanqin Huang, Junhua Wu, Yang Feng, Zhenyu Chen, Zhihong Zhao:

An empirical study on clustering for isolating bugs in fault localization. 138-143 - Danqing Zhang, Jianhui Jiang, Linbo Chen:

Program behavior characterization and clustering: An empirical study for failure clustering. 144-149 - Dalin Zhang

, Hailong Zhang, Dahai Jin, Yunzhan Gong:
Improving the accuracy of static analysis based on state partition. 157-161 - Zhen Dong, Mohammadreza Ghanavati, Artur Andrzejak:

Automated diagnosis of software misconfigurations based on static analysis. 162-168
MedSRDR
- Fubin Wu:

Integration of software reliability engineering, risk management and safety assurance case. 169-192 - Alfred Granger, Paul R. Garrett, Gary Dalmadge:

Medical device software risk assessment requires cross functional personnel. 193-210 - Yoshio Sakai, Seiko Shirasaka, Yasuharu Nishi:

An extended notation of FTA for risk assessment of software-intensive medical devices.: Recognition of the risk class before and after the risk control measure. 211-216 - Rasmus Adler, Sören Kemmann, Djalma de Melo Carvalho Filho, José Augusto Oliveira Neto:

Safety assessment of software-intensive medical devices: Introducing a safety quality model approach. 217-222 - Mahadevan Subramaniam, Parvathi Chundi, Abhilash Muthuraj, Eyal Margalit:

Testing distortion estimations in Retinal Prostheses. 223-242 - Yuan Wei:

Use software reliability growth models wisely. 243-262
WoSAR
- Domenico Cotroneo, Flavio Frattini, Roberto Natella

, Roberto Pietrantuono
:
Performance degradation analysis of a supercomputer. 263-268 - Fumio Machida, Artur Andrzejak, Rivalino Matias, Elder V. P. Sobrinho:

On the effectiveness of Mann-Kendall test for detection of software aging. 269-274 - Stefano Ballerini, Laura Carnevali, Marco Paolieri

, Kumiko Tadano, Fumio Machida:
Software rejuvenation impacts on a phased-mission system for Mars exploration. 275-280 - Hiroyuki Okamura

, Chao Luo, Tadashi Dohi
:
Estimating response time distribution of server application in software aging phenomenon. 281-284 - Ram Chillarege:

Comparing four case studies on Bohr-Mandel characteristics using ODC. 285-289 - Geetika Goel, Arpan Roy

, Rajeshwari Ganesan:
Identifying silent failures of SaaS services using finite state machine based invariant analysis. 290-295
WoSD3
- Yukiko Yanagisawa, Takashi Ito, Makoto Takeyama, Yasuhiko Yokote:

A new method of consensus building for open systems dependability. 296-302 - Makoto Hirai, Yoshifumi Yuasa, Yoshiki Kinoshita:

A chain of accountabilities in open systems based on assured entrustments. 303-310 - Miki Masumoto, Tatsuya Tokuno, Shuichiro Yamamoto:

A method for assuring service grade with Assurance case: An experiment on a portal service. 311-314 - Takuya Saruwatari, Shuichiro Yamamoto, Yutaka Matsuno:

A comparative study of d∗framework and GSN. 315-320 - Matthias Galster, Dan Tofan

:
Exploring possibilities to analyse microblogs for dependability information in variability-intensive open source software systems. 321-325 - Kimio Kuramitsu

:
D-Script : Dependable scripting with DEOS process. 326-330
WoSoCer
- Andrea Ceccarelli

, Nuno Silva:
Qualitative comparison of aerospace standards: An objective approach. 331-336 - Qiuying Li, Lei Luo, Jian Wang:

Accelerated reliability testing approach for high-reliablity software based on the reinforced operational profile. 337-342 - Lili Xu, Hong Zhang:

An improved SFMEA method integrated with assistive techniques. 343-348 - Fernanda Buonanno, Domenico Di Leo, Paolo di Paolo, Roberto Pietrantuono

, Stefano Russo
:
Requirements engineering in rail transit production: An experience report. 349-352 - Michael Roth, Peter Liggesmeyer:

Qualitative analysis of state/event fault trees for supporting the certification process of software-intensive systems. 353-358 - Irfan Sljivo

, Barbara Gallina, Jan Carlson
, Hans Hansson:
Strong and weak contract formalism for third-party component reuse. 359-364 - Andreas Söderberg, Rolf Johansson:

Safety contract based design of software components. 365-370 - Nuno Antunes

, Francesco Brancati, Andrea Ceccarelli
, Andrea Bondavalli
, Marco Vieira
:
A monitoring and testing framework for critical off-the-shelf applications and services. 371-374 - Ewen Denney, Ganesh Pai:

Evidence arguments for using formal methods in software certification. 375-380 - Nuno Silva, Alexandre Esper, Ricardo Barbosa, Johan Zandin, Claudio Monteleone:

Reference architecture for high dependability on-board computers. 381-386 - Silviya Grigorova, T. S. E. Maibaum:

Taking a page from the law books: Considering evidence weight in evaluating assurance case confidence. 387-390

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














