


default search action
QRS Companion 2017: Prague, Czech Republic
- 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017, Prague, Czech Republic, July 25-29, 2017. IEEE 2017, ISBN 978-1-5386-2072-4

- Xiaobo Yan, Bin Liu, Jianxing Li:

The Failure Behaviors of Multi-Faults Programs: An Empirical Study. 1-7 - Jakub Ondik, Martin Olejár, Karol Rástocný

, Mária Bieliková:
Activity-Based Model Synchronization and Defects Detection for Small Teams. 8-15 - Wenpeng Li, Yingkui Cao, Junfeng Zhao, Yanzhen Zou, Bing Xie:

Toward Summary Extraction Method for Functional Topic. 16-23 - Peng Xiao, Bin Liu, Xiaobo Yan, Fuqun Huang

:
How Domain Knowledge Accumulation Influences Software Defects: An Empirical Analysis. 24-30 - Mai Abusair, Antinisca Di Marco, Paola Inverardi:

Context-Aware Adaptation of Mobile Applications Driven by Software Quality and User Satisfaction. 31-38 - Pete Rotella, Sunita Chulani:

Predicting Release Reliability. 39-46 - Nesrine Noughi, Stefan Hanenberg, Anthony Cleve:

An Empirical Study on the Usage of SQL Execution Traces for Program Comprehension. 47-54 - Sergiy Vilkomir, Jiabin Wang, Nam Le Thai, Junhua Ding:

Combinatorial Methods of Feature Selection for Cell Image Classification. 55-60 - Sergiy Vilkomir, Aparna Alluri, D. Richard Kuhn, Raghu N. Kacker:

Combinatorial and MC/DC Coverage Levels of Random Testing. 61-68 - Miroslav Bures

, Bestoun S. Ahmed
:
On the Effectiveness of Combinatorial Interaction Testing: A Case Study. 69-76 - Hanefi Mercan, Cemal Yilmaz

, Kamer Kaya:
An Approach for Choosing the Best Covering Array Constructor to Use. 77-84 - Fakhrud Din, Abdul Rahman A. Alsewari

, Kamal Z. Zamli:
A Parameter Free Choice Function Based Hyper-Heuristic Strategy for Pairwise Test Generation. 85-91 - Peter Charbachi, Linus Eklund, Eduard Enoiu:

Can Pairwise Testing Perform Comparably to Manually Handcrafted Testing Carried Out by Industrial Engineers? 92-99 - M. S. Raunak, D. Richard Kuhn, Raghu Kacker:

Combinatorial Testing of Full Text Search in Web Applications. 100-107 - Khaled M. Khan

, Zhuhan Jiang:
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service. 108-113 - Hyo-Cheol Lee, Seok-Won Lee:

Provenance Information-Based Trust Evaluation Using Cooperation Pattern for Self-Adaptive Systems. 114-121 - Yunwei Dong, Yuanyuan He, Yin Lu, Hong Ye:

A Model Driven Approach for Device Driver Development. 122-129 - Daniel Richter, Marcus Konrad, Katharina Utecht, Andreas Polze:

Highly-Available Applications on Unreliable Infrastructure: Microservice Architectures in Practice. 130-137 - Gayathri Sugumar, Aditya Mathur:

Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems. 138-145 - Rui Fang

, Xiaohu Li:
Stochastic Comparisons of Used Coherent System and New System of Used Components for Non-Identically Distributed and Dependent Components. 146-151 - Xinyang Wu, Xiaoyue Wu:

An Importance Based Algorithm for Reliability-Redundancy Allocation of Phased Mission Systems. 152-159 - Shubin Si

, Wenhai He, Xianzhi Wang
:
Criticality Analysis Method Based on Integrated Importance Measure. 160-164 - Hongda Gao, Lirong Cui

:
Reliability Analysis for a Degradation System Subject to Dependent Soft and Hard Failure Processes. 165-170 - Jinchen Cai, Chunhong Chen:

Circuit Reliability Analysis Using Signal Reliability Correlations. 171-176 - Shiqi Liu, Hao Chen

, Bo Guo, Xiang Jia, Jianjun Qi:
Residual Life Estimation by Fusing Few Failure Lifetime and Degradation Data from Real-Time Updating. 177-184 - Xiaoyue Wu, Bo Guo:

An Object-Oriented Simulation Model for Reliability of PMS with Time Redundancy. 185-189 - YuLong Ying, Jingchao Li, Zhimin Chen, Jing Li:

Rolling Bearing Vibration Signal Analysis Based on Dual-Entropy, Holder Coefficient and Gray Relation Theory. 190-194 - Xuetao Tian, Honghui Li, Feng Liu:

Web Service Reliability Test Method Based on Log Analysis. 195-199 - Yang Liu, Hongping Xu, Hang Yi, Zhen Lin, Jian Kang, Weiqiang Xia, Qingping Shi, Youping Liao, Yulong Ying:

Network Anomaly Detection Based on Dynamic Hierarchical Clustering of Cross Domain Data. 200-204 - Yuanyi Liu, Wenming Wang, Jian Kang, Youping Liao, Yang Liu, Qingping Shi, Weiqiang Xia, Mingyu Hu:

Research on the Measurement and Transmission Network System of New Launch Vehicle Based on Cloud Computing. 205-210 - Bing Jia, Shuai Liu

, Tao Zhou, Zhendong Xu:
Opportunistic Transmission Mechanism Based on SI in Mobile Crowd Sensing Networks. 211-215 - Shanshan Jin, Yun Lin

, Hui Wang:
Automatic Modulation Recognition of Digital Signals Based on Fisherface. 216-220 - Yun Lin

, Mingyu Hu, Xuhong Yin, Jian Guo, Zhaojun Li:
Evaluation of Lithium Batteries Based on Continuous Hidden Markov Model. 221-225 - Meiyu Wang, Zhigang Li, Yun Lin

:
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory. 226-232 - Hui Wang, Lili Guo, Yun Lin

:
Recognition Method of Software Defined Radio Signal Based on Evidence Theory and Interval Grey Relation. 233-237 - Sen Wang, Yun Lin

:
Portable Safety Voice Information Recording Equipment. 238-242 - Zhen Zhang, Yibing Li, Xiaolei Zhu, Yun Lin

:
A Method for Modulation Recognition Based on Entropy Features and Random Forest. 243-246 - Qidi Wu, Yibing Li:

A Biological Image Restoration Method with Independently Local Dictionary Learning. 247-251 - Chao Wang, Yun Lin

, Zhen Zhang:
Research on Physical Layer Security of Cognitive Radio Network Based on RF-DNA. 252-255 - Tu Ya, Yun Lin

, Hui Wang:
Modulation Recognition of Digital Signal Based on Deep Auto-Ancoder Network. 256-260 - Gaocheng Liu, Shuai Liu

, Mengye Lu, Zheng Pan:
Effects of Improper Ground Truth on Target Tracking Performance Evaluation in Benchmark. 261-266 - Shaobo Li, Xuhang Li, He Yang, Guanglu Sun, Fei Lang:

A Zombie Account Detection Method in Microblog Based on the PageRank. 267-270 - Yuning Zhao, Xiaodong Yang, Yun Lin

:
A New Recognition Method for M-QAM Signals in Software Defined Radio. 271-275 - Babak Heydari:

Resilience in Homogeneous Networks: A Strategic Network Formation Approach. 276-282 - Summer Craze Fowler, Peter P. Chen:

CsPI: A New Way to Evaluate Cybersecurity Investments: A Position Paper. 283-284 - Larisa Breton:

Risky Cyber Security: '7012' Regulations Federally-Driven Inhibitor to Resilience within the Defense Industrial Base - A Position Paper. 285-288 - Qiang Han:

Resilience Mechanism for Trustworthy Workflow Management System. 289-296 - Dong Li, Linghuan Hu, Ruizhi Gao, W. Eric Wong, D. Richard Kuhn, Raghu N. Kacker:

Improving MC/DC and Fault Detection Strength Using Combinatorial Testing. 297-303 - Xiaolin Ju

, Xiang Chen, Yibiao Yang, Shujuan Jiang, Junyan Qian, Baowen Xu
:
An In-Depth Study of the Efficiency of Risk Evaluation Formulas for Multi-Fault Localization. 304-310 - Jing Xia, Yanhui Li:

Could We Predict the Result of a Continuous Integration Build? An Empirical Study. 311-315 - Yuanchao Qi, Ziyuan Wang, Yongming Yao:

Influence of the Distance Calculation Error on the Performance of Adaptive Random Testing. 316-319 - Yongming Yao, Yiyang Yan, Ziyuan Wang, Chen Liu:

Design and Implementation of Combinatorial Testing Tools. 320-325 - Eun-Young Kang

, Dongrui Mu, Li Huang, Qianqing Lan:
Verification and Validation of a Cyber-Physical System in the Automotive Domain. 326-333 - Michael Brunner

, Michael M. Huber, Clemens Sauerwein, Ruth Breu:
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems. 334-340 - Sridhar Adepu, Jay Prakash, Aditya Mathur:

WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. 341-347 - Ge Zhou, Wei Dong, Wanwei Liu, Hao Shi, Chi Hu, Liangze Yin:

Optimizing Monitor Code Based on Patterns in Runtime Verification. 348-354 - Hao Shi, Wei Dong, Ge Zhou, Liangze Yin:

Monitor Synthesis for Parametric MTL Properties in Discrete Control Software. 355-362 - Zhenying Jiang, Xiao Wu, Zeqian Dong, Ming Mu:

Optimal Test Case Generation for Simulink Models Using Slicing. 363-369 - Gang Yang, Xingshe Zhou, Yuanyuan Lian:

Constraint-Based Consistency Checking for Multi-View Models of Cyber-Physical System. 370-376 - Yichen Wang, Yikun Wang:

Use Neural Network to Improve Fault Injection Testing. 377-384 - Ting Zhang, Fuke Chang:

Target Signal Synchronization Transmission in Coupling Network with Uncertain Parameters. 385-389 - Yuan Huang:

A Method of Personalized Tag Prediction Based on Graph Structure. 390-395 - Pan Liu, Zhenning Jimmy Xu, Jun Ai, Fei Wang:

Identifying Indicators of Fake Reviews Based on Spammer's Behavior Features. 396-403 - Shufeng Ye, Yi Yang, Weixing Huang, Jian Wang, Guigang Zhang:

Public Cultural Services Recommendation System Architecture. 404-409 - Jianqiao Hu, Feng Jin, Guigang Zhang, Jian Wang, Yi Yang:

A User Profile Modeling Method Based on Word2Vec. 410-414 - Hongming Che, Qinyun Liu, Lin Zou

, Hongji Yang, Dongdai Zhou, Feng Yu:
A Content-Based Phishing Email Detection Method. 415-422 - Sicong Ma, Hongji Yang, Lu Zhang, Dongdai Zhou, Hua Zhou:

Emergency Travel Plan Generation Based on Cybernetics. 423-428 - Suleiman Onimisi Aliyu, Feng Chen, Ying He

:
QoS-Aware Resource Management in SDN-Based InterClouds: A Software Cybernetics Perspective. 429-434 - André Reichstaller, Alexander Knapp:

Compressing Uniform Test Suites Using Variational Autoencoders. 435-440 - Ilker Yildirim, Hasan Sözer:

Automated Extraction of Feature Models from Android Based Portable Devices. 441-448 - Xin Yue, Yanzhong Dang:

The Effect of Personality on Team Performance: An Interpersonal Knowledge Interaction Perspective. 449-455 - Lili Rong, Zijun Qie:

Modeling of Hazard Affected Regions in Support of Scenario Evolution Analysis for Unconventional Emergency. 456-463 - Jiangning Wu, Xiangjie Ku, Donghua Pan:

An Empirical Study on How Empowering Leadership Affects the Team Creativity. 464-471 - Shanmuganathan Vasanthapriyan

, Jing Tian, Dongdong Zhao, Shengwu Xiong
, Jianwen Xiang:
An Ontology-Based Knowledge Sharing Portal for Software Testing. 472-479 - Jing Sun, Van-Nam Huynh, Yoshiteru Nakamori, Jianguo Wu, Jing Tian, Jianwen Xiang:

Knowledge Management in Graduate Research. 480-485 - Jianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang:

A Comparative Study of Knowledge Management on Undergraduate by Questionnaire. 486-492 - Biljana Stanic, Wasif Afzal

:
Process Metrics Are Not Bad Predictors of Fault Proneness. 493-499 - Junli Yang, Bo Song, Bing Yan, Guoqiang Li:

A Novel Hidden Markov Model for Genome-Wide Association Studies. 500-506 - Barry W. Boehm, Xavier Franch:

Conflicts and Synergies among Quality Requirements. 507-508 - Juraj Vincur

, Pavol Návrat
, Ivan Polásek
:
VR City: Software Analysis in Virtual Reality Environment. 509-516 - Chuadhry Mujeeb Ahmed

, Aditya P. Mathur:
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System. 517-524 - Eun-Young Kang

, Dongrui Mu, Li Huang, Qianqing Lan:
Model-Based Analysis of Timing and Energy Constraints in an Autonomous Vehicle System. 525-532 - Sridhar Adepu, Aditya Mathur:

From Design to Invariants: Detecting Attacks on Cyber Physical Systems. 533-540 - Mats Carlsson, Olga Grinchtein, Justin Pearson:

Modelling and Verification of User Interactions Using Constraint Programming. 541-547 - Ian David Peake, Jan Olaf Blech

:
A Candidate Architecture for Cloud-Based Monitoring in Industrial Automation. 548-554 - Amro Al-Said Ahmad

, Pearl Brereton, Peter Andras
:
A Systematic Mapping Study of Empirical Studies on Software Cloud Testing Methods. 555-562 - Peter Herrmann

, Jan Olaf Blech
:
Formal Analysis of Control Software for Cyber-Physical Systems. 563-564 - Ashkan Hemmati, Chris Carlson, Maleknaz Nayebi, Guenther Ruhe, Chad Saunders

:
Analysis of Software Service Usage in Healthcare Communication Services. 565-566 - Li-Wen Chen, Yu-Lun Huang:

An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed Movements. 567-568 - Huai Liu, Jan Olaf Blech

, Matt Duckham
, Heinz W. Schmidt:
Spatio-Temporal Aware Testing for Complex Systems. 569-570 - Chunfeng Hu, Jin Guo, Nan Li, Yao Li, Chang Rao, Siqi Liu:

Towards Effective and Scalable Testing for Complex High-Speed Railway Signal Software. 571-572 - Mehrdad Saadatmand

:
Towards Automating Integration Testing of .NET Applications Using Roslyn. 573-574 - Tao Zhang, Jinbo Wang:

A Spatial-Temporal Model for Software Fault Tolerance in Safety-Critical Applications. 575-576 - Mehmet Çagri Çalpur

, Sevgi Arca, Tansu Cagla Calpur, Cemal Yilmaz
:
Model Dressing for Automated Exploratory Testing. 577-578 - Qing Mi

, Jacky Keung
, Jianglin Huang, Yan Xiao
:
Using Eye Tracking Technology to Analyze the Impact of Stylistic Inconsistency on Code Readability. 579-580 - Quyen L. Nguyen, Arun Sood:

Scalability of Cloud Based SCIT-MTD. 581-582 - Dengyun Lei

, Liwei Wang, Jun Lin, Yunfei En:
Quality Evaluation of Digital Soft IP Core for FPGA System. 583-584 - Jigang Liu, Rashmi Kammar, Ryôichi Sasaki, Tetsutaro Uehara

:
Malware Behavior Ontology for Digital Evidence. 585-586 - D. Richard Kuhn, M. S. Raunak, Raghu Kacker:

An Analysis of Vulnerability Trends, 2008-2016. 587-588 - Teemu Kanstrén:

Experiences in Testing and Analysing Data Intensive Systems. 589-590 - Claus Klammer

, Rudolf Ramler:
A Journey from Manual Testing to Automated Test Generation in an Industry Project. 591-592 - Bernhard Peischl

:
On Business Drivers for Firmware Test: A Wake-Up Call for Software Engineering Research? 593-594 - Achilleas Xypolytos, Haiyun Xu, Bárbara Vieira, Amr M. T. Ali-Eldin

:
A Framework for Combining and Ranking Static Analysis Tool Findings Based on Tool Performance Statistics. 595-596 - Matthew Campbell, Kent Martin, Ferenc Bozoki, Mike Atkinson:

Dynamic Test Selection Using Source Code Changes. 597-598 - Yoann Blein, Arnaud Clere, Fabrice Bertrand, Yves Ledru, Roland Groz, Lydie du Bousquet:

Improving Trace Generation and Analysis for Medical Devices. 599-600 - Fehmi Jaafar:

An Integrated Architecture for IoT Fingerprinting. 601-602 - Daniel Brahneborg, Wasif Afzal

, Adnan Causevic:
A Black-Box Approach to Latency and Throughput Analysis. 603-604 - Dusan Mondek, Rudolf B. Blazek, Tomás Zahradnický:

Security Analytics in the Big Data Era. 605-606 - Pete Rotella, Sunita Chulani:

Software Release-Over-Release Comparisons. 607 - Pete Rotella, Sunita Chulani:

Comparing and Goaling Releases Using Software Reliability Classes. 608-609 - Zuohua Ding, Tiantian Shuai, Mingyue Jiang:

REConvertor: Transforming Textual Use Cases to High-Level Message Sequence Chart. 610-611 - Néstor Ruben Barraza:

A Mixed Poisson Process and Empirical Bayes Estimation Based Software Reliability Growth Model and Simulation. 612-613 - Yangzhen Fu, Hong Zhang, Chenchen Zeng, Chao Feng:

A Software Reliability Prediction Model: Using Improved Long Short Term Memory Network. 614-615 - Lu Kong, Jinbo Wang:

Verification Methods for Secure and Reliable SoPC Systems. 616-617 - Daniel Brahneborg, Wasif Afzal

, Adnan Causevic:
A Pragmatic Perspective on Regression Testing Challenges. 618-619 - Fengjun Duan, Guanjun Wang:

Reliability Modeling of Two-Phase Gamma Degradation Process. 620-621 - Lena Feinbube, Lukas Pirl, Peter Tröger, Andreas Polze:

Software Fault Injection Campaign Generation for Cloud Infrastructures. 622-623 - Qiuying Li, Chao Zhang, Hong Zhang:

A New Software Reliability Model for Open Stochastic System Based on NHPP. 624-625 - Yuanxun Shao, Bin Liu, Guoqi Li, Ran Yan:

A Fault Diagnosis Expert System for Flight Control Software Based on SFMEA and SFTA. 626-627 - Richard Lipka:

Automated Generator for Complex and Realistic Test Data. 628-629 - Luping Chen, John H. R. May:

Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests. 630-631 - Biao Xu, Minyan Lu, Dajian Zhang:

A Software Security Case Developing Method Based on Hierarchical Argument Strategy. 632-633 - Fei Wang, Jun Ai, Jiaming Wang:

Empirical Study on the Correlation Between Software Structural Modifications and Its Fault-Proneness. 634-635 - Jianmin Wang, Xiaohua Wang, Yunyun Ma, Jinbo Wang:

Hierarchical Combination Design Method of Test Cases Based on Conditional Constraints. 636-637

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














