Abstract is missing.
- Disaster Hardening for Software SystemsC. V. Ramamoorthy. 3-4 [doi]
- A Perspective on Software ConsumabilityCarl Kessler. 5 [doi]
- Software Security: Building Security InGary McGraw. 6 [doi]
- Scaling a Dataflow Testing Methodology to the MultiparadigmWorld of Commercial SpreadsheetsMarc Fisher II, Gregg Rothermel, Tyler Creelan, Margaret M. Burnett. 13-22 [doi]
- Memoized Forward Computation of Dynamic SlicesWes Masri, Nagi Nahas, Andy Podgurski. 23-32 [doi]
- Call Stack Coverage for GUI Test-Suite ReductionScott McMaster, Atif M. Memon. 33-44 [doi]
- Stabilization Time - A Quality Metric for Software ProductsVibhu Saujanya Sharma, Pankaj Jalote. 45-51 [doi]
- Metrics-Based Software Reliability Models Using Non-homogeneous Poisson ProcessesKazuya Shibata, Koichiro Rinsaka, Tadashi Dohi. 52-61 [doi]
- Using Historical In-Process and Product Metrics for Early Estimation of Software FailuresNachiappan Nagappan, Thomas Ball, Brendan Murphy. 62-74 [doi]
- BPEL4WS Unit Testing: Test Case Generation Using a Concurrent Path Analysis ApproachJun Yan, Zhong Jie Li, Yuan Yuan, Wei Sun, Jian Zhang. 75-84 [doi]
- Metamodel-based Test Generation for Model Transformations: an Algorithm and a ToolErwan Brottier, Franck Fleurey, Jim Steel, Benoit Baudry, Yves Le Traon. 85-94 [doi]
- A Systematic Approach to Generate Inputs to Test UML Design ModelsTrung T. Dinh-Trong, Sudipto Ghosh, Robert B. France. 95-104 [doi]
- Using CLP to Automatically Generate Test Sequences for Synchronous Programs with Numeric Inputs and OutputsBesnik Seljimi, Ioannis Parissis. 105-116 [doi]
- Evaluating the Reliability of Credential Hardening through Keystroke DynamicsNick Bartlow, Bojan Cukic. 117-126 [doi]
- A Novel SOAP Attachment-Oriented Security ModelXiaoling Cui, Lei Li, Jun Wei. 127-135 [doi]
- An Attack Simulator for Systematically Testing Program-based Security MechanismsBen Breech, Mike Tegtmeyer, Lori L. Pollock. 136-145 [doi]
- Monitoring the Security Health of Software SystemsAshish Aggarwal, Pankaj Jalote. 146-158 [doi]
- Studying the Characteristics of a Good GUI Test SuiteQing Xie, Atif M. Memon. 159-168 [doi]
- A Candidate Fault Model for AspectJ PointcutsJon S. Bækken, Roger T. Alexander. 169-178 [doi]
- Detecting Redundant Unit Tests for AspectJ ProgramsTao Xie, Jianjun Zhao, Darko Marinov, David Notkin. 179-190 [doi]
- Tail-Splitting to Predict Failing Software Modules - with a Case Study on an Operating Systems ProductRam Chillarege, P. Santhanam. 191-196 [doi]
- Adequacy, Accuracy, Scalability, and Uncertainty of Architecture-based Software Reliability: Lessons Learned from Large Empirical Case StudiesKaterina Goseva-Popstojanova, Margaret Hamill, Xuan Wang. 197-203 [doi]
- Assessing the Relationship between Software Assertions and Faults: An Empirical InvestigationGunnar Kudrjavets, Nachiappan Nagappan, Thomas Ball. 204-212 [doi]
- Tool-Supported Verification of Contingency Software Design in Evolving, Autonomous SystemsRobyn R. Lutz, Ann Patterson-Hine, Anupa Bajwa. 213-220 [doi]
- Testing During Refactoring: Adding Aspects to Legacy SystemsMichael Mortensen, Sudipto Ghosh, James M. Bieman. 221-230 [doi]
- Model Simulation for Test Execution Capacity EstimationEduardo Aranha, Paulo Borba, José Lima. 231-236 [doi]
- Modeling the Performance of Border Inspections with Electronic Travel DocumentsPaola Bracchi, Bojan Cukic, Vittorio Cortellessa. 237-246 [doi]
- On the Effect of Fault Removal in Software Testing - Bayesian Reliability Estimation ApproachHiroyuki Okamura, Hitoshi Furumura, Tadashi Dohi. 247-255 [doi]
- A State Exploration-Based Approach to Testing Java MonitorsYu Lei, Richard H. Carver, David Chenho Kung, Vidur Gupta, Monica Hernandez. 256-265 [doi]
- Web Application Testing with Customized Test Requirements - An Experimental Comparison StudySreedevi Sampath, Sara Sprenkle, Emily Gibson, Lori L. Pollock. 266-278 [doi]
- Combining Replication with Transaction Processing for Enhanced Reliability in J2EELin Zuo, Shaohua Liu, Jun Wei. 279-288 [doi]
- Building Phase-Type Software Reliability ModelsHiroyuki Okamura, Tadashi Dohi. 289-298 [doi]
- Reliability and Performance of Component Based Software Systems with Restarts, Retries, Reboots and RepairsVibhu Saujanya Sharma, Kishor S. Trivedi. 299-310 [doi]
- Mining Interface Specifications for Generating Checkable Robustness PropertiesMithun Acharya, Tao Xie, Jun Xu. 311-320 [doi]
- Effectively Combining Software Verification Strategies: Understanding Different AssumptionsDavid Owen, Dejan Desovski, Bojan Cukic. 321-330 [doi]
- Probe Distribution Techniques to Profile Events in Deployed SoftwareMadeline Diep, Myra Cohen, Sebastian G. Elbaum. 331-342 [doi]
- Measuring and Enhancing Prediction Capabilities of Vulnerability Discovery Models for Apache and IIS HTTP ServersOmar H. Alhazmi, Yashwant K. Malaiya. 343-352 [doi]
- Queuing Models for Field Defect Resolution ProcessSwapna S. Gokhale, Robert E. Mullen. 353-362 [doi]
- Softgoal Traceability PatternsJesse Fletcher, Jane Cleland-Huang. 363-374 [doi]
- DevCOP: A Software Certificate Management System for EclipseMark Sherriff, Laurie Williams. 375-384 [doi]
- CAA-DRIP: a framework for implementing Coordinated Atomic ActionsAlfredo Capozucca, Nicolas Guelfi, Patrizio Pelliccione, Alexander Romanovsky, Avelino F. Zorzo. 385-394 [doi]