default search action
QRS 2015: Vancouver, BC, Canada
- 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Vancouver, BC, Canada, August 3-5, 2015. IEEE 2015, ISBN 978-1-4673-7989-2
- Lena Herscheid, Daniel Richter, Andreas Polze:
Hovac: A Configurable Fault Injection Framework for Benchmarking the Dependability of C/C++ Applications. 1-10 - Qining Lu, Mostafa Farahani, Jiesheng Wei, Anna Thomas, Karthik Pattabiraman:
LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware Faults. 11-16 - Xinli Yang, David Lo, Xin Xia, Yun Zhang, Jianling Sun:
Deep Learning for Just-in-Time Defect Prediction. 17-26 - Yaming Tang, Fei Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu:
Predicting Vulnerable Components via Text Mining or Software Metrics? An Effort-Aware Perspective. 27-36 - Jianglin Huang, Hongyi Sun, Yan-Fu Li, Min Xie:
An Empirical Study of Dynamic Incomplete-Case Nearest Neighbor Imputation in Software Quality Data. 37-42 - Fangyun Qin, Zheng Zheng, Chenggang Bai, Yu Qiao, Zhenyu Zhang, Cheng Chen:
Cross-Project Aging Related Bug Prediction. 43-48 - Haipeng Cai, Raúl A. Santelices:
Abstracting Program Dependencies Using the Method Dependence Graph. 49-58 - Zhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li:
Node-Set Analysis for Linked Recursive Data Structures. 59-64 - Yu Liu, Min Xie, Jianfeng Yang, Ming Zhao:
A New Framework and Application of Software Reliability Estimation Based on Fault Detection and Correction Processes. 65-74 - Yasuhiro Saito, Tadashi Dohi:
Robustness of Non-homogeneous Gamma Process-Based Software Reliability Models. 75-84 - Hiroyuki Okamura, Yuki Takekoshi, Tadashi Dohi:
Fine-Grained Software Reliability Estimation Using Software Testing Inputs. 85-92 - Anneliese Andrews, Joseph Lucente:
On the Viability of Using SRGMs for IT Help Desk Incident Predictions. 93-98 - Axel Busch, Misha Strittmatter, Anne Koziolek:
Assessing Security to Compare Architecture Alternatives of Component-Based Systems. 99-108 - Amirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj:
An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques. 109-118 - Raymond Canzanese, Spiros Mancoridis, Moshe Kam:
System Call-Based Detection of Malicious Processes. 119-124 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang:
An Approach for Authenticating Smartphone Users Based on Histogram Features. 125-130 - Bo Jiang, Wing Kwong Chan, T. H. Tse:
PORA: Proportion-Oriented Randomized Algorithm for Test Case Prioritization. 131-140 - Takashi Kitamura, Akihisa Yamada, Goro Hatayama, Cyrille Artho, Eun-Hye Choi, Thi Bich Ngoc Do, Yutaka Oiwa, Shinya Sakuragi:
Combinatorial Testing for Tree-Structured Test Models with Constraints. 141-150 - Hadi Hemmati:
How Effective Are Code Coverage Criteria? 151-156 - Dusica Marijan:
Multi-perspective Regression Test Prioritization for Time-Constrained Environments. 157-162 - Dianxiang Xu, Yunpeng Zhang, Ning Shen:
Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies. 163-172 - Shengwei An, Xiaoxing Ma, Chun Cao, Ping Yu, Chang Xu:
An Event-Based Formal Framework for Dynamic Software Update. 173-182 - Néstor Cataño, Tim Wahls:
A Case Study on Code Generation of an ERP System from Event-B. 183-188 - Lulu Yao, Jing Liu, Yan Zhang, Yuejun Wang, Haiying Sun, Qingsheng Wang, Dehui Du, Xiaohong Chen:
HSD: Hybrid MARTE Sequence Diagram. 189-194 - Li Li, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein:
Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware Detection. 195-200 - Hsin-Yu Chuang, Sheng-De Wang:
Machine Learning Based Hybrid Behavior Models for Android Malware Analysis. 201-206 - Josip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa:
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing. 207-212 - Yunwei Dong, Zhe Li, Dave Towey:
On the Relationship between Model Coverage and Code Coverage Using MATLAB's Simulink. 213-218 - Arun Balaji Buduru, Stephen S. Yau:
An Effective Approach to Continuous User Authentication for Touch Screen Smart Devices. 219-226 - Shan He, Sizhao Li, Yan Chen, Donghui Guo:
Uncertainty Analysis of Race Conditions in Real-Time Systems. 227-232 - Sadeeq Jan, Cu D. Nguyen, Lionel C. Briand:
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems. 233-241 - Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu, Xiaoyu Zhou:
Are Anti-patterns Coupled? An Empirical Study. 242-251 - Awad A. Younis, Yashwant K. Malaiya:
Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System. 252-261 - Le An, Foutse Khomh:
An Empirical Study of Highly Impactful Bugs in Mozilla Projects. 262-271 - Shangru Wu, Chunbai Yang, W. K. Chan:
ASR: Abstraction Subspace Reduction for Exposing Atomicity Violation Bugs in Multithreaded Programs. 272-281 - Birgit Hofer, Franz Wotawa:
Fault Localization in the Light of Faulty User Input. 282-291 - Xiaoli Zhou, Hanfei Wang, Jianhua Zhao:
A Fault-Localization Approach Based on the Coincidental Correctness Probability. 292-297 - Fei Zhao, Yaming Tang, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu:
Is Learning-to-Rank Cost-Effective in Recommending Relevant Files for Bug Localization? 298-303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.