


default search action
27th ISSRE 2016: Ottawa, ON, Canada
- 27th IEEE International Symposium on Software Reliability Engineering, ISSRE 2016, Ottawa, ON, Canada, October 23-27, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9002-6

Best Research Papers
- Roberto Pietrantuono

, Stefano Russo
:
On Adaptive Sampling-Based Testing for Software Reliability Assessment. 1-11 - Per Erik Strandberg, Daniel Sundmark, Wasif Afzal

, Thomas J. Ostrand, Elaine J. Weyuker:
Experience Report: Automated System Level Regression Test Prioritization Using Multiple Factors. 12-23 - Ming Fan, Jun Liu, Xiapu Luo

, Kai Chen, Tianyi Chen
, Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu:
Frequent Subgraph Based Familial Classification of Android Malware. 24-35
Test Optimisation
- Eduardo Noronha de Andrade Freitas, Celso Gonçalves Camilo-Junior, Auri Marcelo Rizzo Vincenzi

:
SCOUT: A Multi-objective Method to Select Components in Designing Unit Testing. 36-46 - Nima Dini, Allison Sullivan

, Milos Gligoric, Gregg Rothermel:
The Effect of Test Suite Type on Regression Test Selection. 47-58 - Aya S. Metwally

, Eman Hosam
, Marwa M. Hassan, Sarah M. Rashad:
WAP: A Novel Automatic Test Generation Technique Based on Moth Flame Optimization. 59-64
Human Aspects
- Vaibhav K. Anu

, Gursimran Singh Walia, Wenhua Hu, Jeffrey C. Carver
, Gary L. Bradshaw:
Using a Cognitive Psychology Perspective on Errors to Improve Requirements Quality: An Empirical Investigation. 65-76 - Ayushi Rastogi

, Nachiappan Nagappan:
On the Personality Traits of GitHub Contributors. 77-86 - João Durães

, Henrique Madeira
, João Castelhano
, Isabel Catarina Duarte
, Miguel Castelo Branco
:
WAP: Understanding the Brain at Software Debugging. 87-92
Testing
- Eun-Hye Choi

, Cyrille Artho, Takashi Kitamura
, Osamu Mizuno
, Akihisa Yamada
:
Distance-Integrated Combinatorial Testing. 93-104 - Farah Hariri, August Shi, Hayes Converse, Sarfraz Khurshid, Darko Marinov:

Evaluating the Effects of Compiler Optimizations on Mutation Testing at the Compiler IR Level. 105-115 - Rafig Almaghairbe

, Marc Roper
:
Automatically Classifying Test Results by Semi-Supervised Learning. 116-126
Software Defects (Bugs)
- Xinli Yang, David Lo

, Xin Xia
, Lingfeng Bao, Jianling Sun:
Combining Word Embedding with Information Retrieval to Recommend Similar Bug Reports. 127-137 - Yichuan Man, Cuiyun Gao, Michael R. Lyu, Jiuchun Jiang:

Experience Report: Understanding Cross-Platform App Issues from User Reviews. 138-149 - Wei Wen, Tingting Yu, Jane Huffman Hayes:

CoLUA: Automatically Predicting Configuration Bug Reports and Extracting Configuration Options. 150-161
Static Analysis
- Supat Rattanasuksun, Tingting Yu, Witawas Srisa-an

, Gregg Rothermel:
RRF: A Race Reproduction Framework for Use in Debugging Process-Level Races. 162-172 - Tukaram Muske, Uday P. Khedker:

Cause Points Analysis for Effective Handling of Alarms. 173-184 - Zhen Dong, Artur Andrzejak, David Lo

, Diego Costa
:
ORPLocator: Identifying Read Points of Configuration Options via Static Analysis. 185-195
Anomaly and Vulnerability Analysis
- Carla Sauvanaud

, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun:
Anomaly Detection and Root Cause Localization in Virtual Network Functions. 196-206 - Shilin He, Jieming Zhu, Pinjia He, Michael R. Lyu:

Experience Report: System Log Analysis for Anomaly Detection. 207-218 - Sultan S. Al-Qahtani, Ellis E. Eghan

, Juergen Rilling:
SV-AF - A Security Vulnerability Analysis Framework. 219-229
Reasoning About Concurrency
- Vineet Singh, Iulian Neamtiu, Rajiv Gupta

:
Proving Concurrent Data Structures Linearizable. 230-240 - Mohammad Majharul Islam, Abdullah Muzahid:

Detecting, Exposing, and Classifying Sequential Consistency Violations. 241-252 - Riad Akram, Mohammad Mejbah Ul Alam, Abdullah Muzahid:

Approximate Lock: Trading off Accuracy for Performance by Skipping Critical Sections. 253-263
Security
- Cristiano De Faveri, Ana Moreira

, Vasco Amaral
:
Goal-Driven Deception Tactics Design. 264-275 - Aleksandar Milenkoski, K. R. Jayaram, Nuno Antunes

, Marco Vieira
, Samuel Kounev:
Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments. 276-286 - Edward Condon, Michel Cukier:

Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions. 287-297
Software Quality and Reliability Evaluation
- Yuwei Yang, Jun Ai, Xue-Lin Li

, W. Eric Wong:
MHCP Model for Quality Evaluation for Software Structure Based on Software Complex Network. 298-308 - Zhou Xu, Jin Liu, Zijiang Yang, Gege An, Xiangyang Jia:

The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison. 309-320 - Kazuhiro Okumoto:

Experience Report: Practical Software Availability Prediction in Telecommunication Industry. 321-331
Program Analysis
- Walter Cazzola

, Mehdi Jalili:
Dodging Unsafe Update Points in Java Dynamic Software Updating Systems. 332-341 - Jierui Liu, Tianyong Wu, Jun Yan, Jian Zhang:

Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead Instrumentation. 342-352 - Fanlong Zhang, Siau-Cheng Khoo, Xiaohong Su:

Predicting Consistent Clone Change. 353-364
Reliability Monitoring and Failure Analysis
- Dominik Holling, Alvin Stanescu, Kristian Beckers, Alexander Pretschner, Matthias Gemmar:

Failure Models for Testing Continuous Controllers. 365-375 - Keun Soo Yim:

Evaluation Metrics of Service-Level Reliability Monitoring Rules of a Big Data Service. 376-387 - Ruimin Sun

, Andrew Lee, Aokun Chen, Donald E. Porter, Matt Bishop
, Daniela Oliveira:
Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior. 388-399
Software Design
- Sascha Just, Kim Herzig, Jacek Czerwonka, Brendan Murphy:

Switching to Git: The Good, the Bad, and the Ugly. 400-411 - Thanh H. D. Nguyen, Bram Adams

, Ahmed E. Hassan:
Does Geographical Distance Effect Distributed Development Teams: How Aggregation Bias in Software Artifacts Causes Contradictory Findings. 412-423 - Pooya Musavi, Bram Adams

, Foutse Khomh:
Experience Report: An Empirical Study of API Failures in OpenStack Cloud Environments. 424-434
Software in Critical Applications
- Jonathan C. Rowanhill, John C. Knight:

Domain Arguments in Safety Critical Software Development. 435-444 - Dharmalingam Ganesan, Mikael Lindvall, Stefan Hafsteinsson, Rance Cleaveland, Susanne L. Strege, Walter Moleski:

Experience Report: Model-Based Test Automation of a Concurrent Flight Software Bus. 445-454 - Armando Miraglia, Dirk Vogt, Herbert Bos

, Andy Tanenbaum
, Cristiano Giuffrida
:
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging. 455-466
Issues in Android devices
- Daniel Vecchiato, Marco Vieira

, Eliane Martins:
Risk Assessment of User-Defined Security Configurations for Android Devices. 467-477 - Domenico Cotroneo, Francesco Fucci, Antonio Ken Iannillo

, Roberto Natella
, Roberto Pietrantuono
:
Software Aging Analysis of the Android Mobile OS. 478-489 - Yu Kang

, Yangfan Zhou, Min Gao, Yixia Sun, Michael R. Lyu:
Experience Report: Detecting Poor-Responsive UI in Android Applications. 490-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














