Abstract is missing.
- Using Behavioral Profiles to Detect Software Flaws in Network ServersJoão Antunes, Nuno Fuentecilla Neves. 1-10 [doi]
- Diversity for Security: A Study with Off-the-Shelf AntiVirus EnginesPeter G. Bishop, Robin E. Bloomfield, Ilir Gashi, Vladimir Stankovic. 11-19 [doi]
- Server Side Detection of Content Sniffing AttacksAnton Barua, Hossain Shahriar, Mohammad Zulkernine. 20-29 [doi]
- A Model-Driven Engineering Approach to Support the Verification of Compliance to Safety StandardsRajwinder Kaur Panesar-Walawege, Mehrdad Sabetzadeh, Lionel C. Briand. 30-39 [doi]
- The Early Identification of Detector Locations in Dependable SoftwareArshad Jhumka, Matthew Leeke. 40-49 [doi]
- Experiences with Assurance Cases for Spacecraft SafingElisabeth A. Nguyen, Alex G. Ellis. 50-59 [doi]
- Mining Cause-Effect-Chains from Version HistoriesKim Herzig, Andreas Zeller. 60-69 [doi]
- Statistical Evaluation of Complex Input-Output TransformationsGang Shu, Zhuofu Bai, Andy Podgurski. 70-79 [doi]
- Uncertainty Propagation through Software Dependability ModelsKesari Mishra, Kishor S. Trivedi. 80-89 [doi]
- Feature Interaction Faults Revisited: An Exploratory StudyBrady J. Garvin, Myra B. Cohen. 90-99 [doi]
- JavaScript Errors in the Wild: An Empirical StudyFrolin S. Ocariza Jr., Karthik Pattabiraman, Benjamin G. Zorn. 100-109 [doi]
- Efficiently Running Test Suites Using Abstract Undo OperationsShadi Abdul Khalek, Sarfraz Khurshid. 110-119 [doi]
- PACOGEN: Automatic Generation of Pairwise Test Configurations from Feature ModelsAymeric Hervieu, Benoit Baudry, Arnaud Gotlieb. 120-129 [doi]
- Adaptive Regression Testing Strategy: An Empirical StudyMd. Junaid Arafeen, Hyunsook Do. 130-139 [doi]
- Impact Analysis of Configuration Changes for Test Case SelectionXiao Qu, Mithun Acharya, Brian Robinson. 140-149 [doi]
- A Hybrid Directed Test Suite Augmentation TechniqueZhihong Xu, Yunho Kim, Moonzoo Kim, Gregg Rothermel. 150-159 [doi]
- LOFT: Redundant Synchronization Event Removal for Data Race DetectionYan Cai, W. K. Chan. 160-169 [doi]
- An Empirical Study of JUnit Test-Suite ReductionLingming Zhang, Darko Marinov, Lu Zhang 0023, Sarfraz Khurshid. 170-179 [doi]
- Rigorous Development of Dependable Systems Using Fault Tolerance ViewsIlya Lopatkin, Alexei Iliasov, Alexander Romanovsky. 180-189 [doi]
- PAT 3: An Extensible Architecture for Building Multi-domain Model CheckersYang Liu, Jun Sun 0001, Jin Song Dong. 190-199 [doi]
- Safety Analysis of Trampoline OS Using Model Checking: An Experience ReportYunja Choi. 200-209 [doi]
- WSPred: A Time-Aware Personalized QoS Prediction Framework for Web ServicesYilei Zhang, Zibin Zheng, Michael R. Lyu. 210-219 [doi]
- Software Reliability Growth Models Based on Local Polynomial Modeling with Kernel SmoothingL. Sandamali Dharmasena, Panlop Zeephongsekul, Chathuri L. Jayasinghe. 220-229 [doi]
- Efficient Analysis of Fault Trees with Voting GatesJianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano, Fumio Machida, Atsushi Kobayashi, Takao Osaki. 230-239 [doi]
- Workload Characterization for Software Aging AnalysisAntonio Bovenzi, Domenico Cotroneo, Roberto Pietrantuono, Stefano Russo. 240-249 [doi]
- Optimal Resource Allocation in a Virtualized Software Aging Platform with Software RejuvenationJavier Alonso, Iñigo Goiri, Jordi Guitart, Ricard Gavaldà, Jordi Torres. 250-259 [doi]
- Injecting Memory Leaks to Accelerate Software FailuresJing Zhao, Yuliang Jin, Kishor S. Trivedi, Rivalino Matias. 260-269 [doi]