Abstract is missing.
- Using machine learning techniques to detect metamorphic relations for programs without test oraclesUpulee Kanewala, James M. Bieman. 1-10 [doi]
- Keynote speaker 1: The economics of systems and software reliabilityBarry W. Boehm, Gerard J. Holzmann. 1-2 [doi]
- An empirical comparison of the fault-detection capabilities of internal oraclesTingting Yu, Witawas Srisa-an, Gregg Rothermel. 11-20 [doi]
- Model-driven synthesis of monitoring infrastructure for reliable adaptive multi-agent systemsBenedikt Eberhardinger, Jan-Philipp Steghöfer, Florian Nafz, Wolfgang Reif. 21-30 [doi]
- Analysis of local re-execution in mobile offloading systemQiushi Wang, Marti Griera Jorba, Joan Martinez Ripoll, Katinka Wolter. 31-40 [doi]
- Design of distribution automation networks using survivability modeling and power flow equationsAnne Koziolek, Alberto Avritzer, Sindhu Suresh, Daniel Sadoc Menasché, Kishor S. Trivedi, Lucia Happe. 41-50 [doi]
- Composing hierarchical stochastic model from SysML for system availability analysisFumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno. 51-60 [doi]
- Towards fast OS rejuvenation: An experimental evaluation of fast OS reboot techniquesAntonio Bovenzi, Javier Alonso, Hiroshi Yamada, Stefano Russo, Kishor S. Trivedi. 61-70 [doi]
- Request success rate of multipathing I/O with a paired storage controllerGangadhar Enagandula, Varsha Apte, Bipul Raj. 71-80 [doi]
- Nonparametric bootstrapping interval estimations for software release planning with reliability objectiveShinji Inoue, Shigeru Yamada. 81-89 [doi]
- Quantifying the influence of failure repair/mitigation costs on service-based systemsVittorio Cortellessa, Raffaela Mirandola, Fabrizio Marinelli, Pasqualina Potena. 90-99 [doi]
- SRATS: Software reliability assessment tool on spreadsheet (Experience report)Hiroyuki Okamura, Tadashi Dohi. 100-107 [doi]
- Quantifying software test process and product reliability simultaneouslyShinya Ikemoto, Tadashi Dohi, Hiroyuki Okamura. 108-117 [doi]
- Predicting defects using change genealogiesKim Herzig, Sascha Just, Andreas Rau, Andreas Zeller. 118-127 [doi]
- Predicting risk of pre-release code changes with CheckinmentorAlexander Tarvo, Nachiappan Nagappan, Thomas Zimmermann. 128-137 [doi]
- Filtering noise in mixed-purpose fixing commits to improve defect prediction and localizationHoan Anh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen. 138-147 [doi]
- Fault localization in embedded software based on a single cyclic traceAzzeddine Amiar, Mickaël Delahaye, Yliès Falcone, Lydie du Bousquet. 148-157 [doi]
- Stress testing of task deadlines: A constraint programming approachStefano Di Alesio, Shiva Nejati, Lionel C. Briand, Arnaud Gotlieb. 158-167 [doi]
- Fault localization based on failure-inducing combinationsLaleh Shikh Gholamhossein Ghandehari, Yu Lei, David Chenho Kung, Raghu Kacker, D. Richard Kuhn. 168-177 [doi]
- Fault triggers in open-source software: An experience reportDomenico Cotroneo, Michael Grottke, Roberto Natella, Roberto Pietrantuono, Kishor S. Trivedi. 178-187 [doi]
- Got issues? Who cares about it? A large scale investigation of issue trackers from GitHubTegawendé F. Bissyandé, David Lo, Lingxiao Jiang, Laurent Réveillère, Jacques Klein, Yves Le Traon. 188-197 [doi]
- Characterizing configuration problems in Java EE application servers: An empirical study with GlassFish and JBossFahad A. Arshad, Rebecca J. Krause, Saurabh Bagchi. 198-207 [doi]
- A fusion approach for classifying duplicate problem reportsSean Banerjee, Zahid Syed, Jordan Helmick, Bojan Cukic. 208-217 [doi]
- Experience report: Assessing the reliability of an industrial avionics software: Results, insights and recommendationsJi Wu, Shaukat Ali, Tao Yue, Jie Tian. 218-227 [doi]
- Evaluating long-term predictive power of standard reliability growth models on automotive systemsRakesh Rana, Miroslaw Staron, Christian Berger, Jörgen Hansson, Martin Nilsson, Fredrik Törner. 228-237 [doi]
- A structured and model-based hazard analysis and risk assessment method for automotive systemsKristian Beckers, Maritta Heisel, Thomas Frese, Denis Hatebur. 238-247 [doi]
- Combining testing and proof to gain high assurance in software: A case studyPeter G. Bishop, Robin E. Bloomfield, Lukasz Cyra. 248-257 [doi]
- Sinfer: Inferring information flow lattices for checking self-stabilizationYong Hun Eom, Brian Demsky. 258-267 [doi]
- Relevant inputs analysis and its applicationsYan Wang, Rajiv Gupta, Iulian Neamtiu. 268-277 [doi]
- Feedback-directed exploration of web applications to derive test modelsAmin Milani Fard, Ali Mesbah. 278-287 [doi]
- A pattern-based approach for GUI modeling and testingRodrigo M. L. M. Moreira, Ana C. R. Paiva, Atif Memon. 288-297 [doi]
- Model-based testing of NASA's OSAL API - An experience reportChristoph Schulze, Dharmalingam Ganesan, Mikael Lindvall, Dave Mcf Omas, Alan Cudmore. 300-309 [doi]
- An experience report for software quality evaluation in highly iterative development methodology using traditional metricsKumi Jinzenji, Takashi Hoshino, Laurie Williams, Kenji Takahashi. 310-319 [doi]
- Automatic skeleton generation for data-aware service choreographiesHuu-Nghia Nguyen, Pascal Poizat, Fatiha Zaïdi. 320-329 [doi]
- An empirical study of the effect of learning styles on the faults found during the software requirements inspectionAnurag Goswami, Gursimran Walia. 330-339 [doi]
- Constructing subtle higher order mutants for Java and AspectJ programsElmahdi Omar, Sudipto Ghosh, Darrell Whitley. 340-349 [doi]
- Finding test data with specific properties via metaheuristic searchRobert Feldt, Simon M. Poulding. 350-359 [doi]
- Improving search-based test suite generation with dynamic symbolic executionJuan Pablo Galeotti, Gordon Fraser, Andrea Arcuri. 360-369 [doi]
- Search-based data-flow test generationMattia Vivanti, Andre Mis, Alessandra Gorla, Gordon Fraser. 370-379 [doi]
- Is bytecode instrumentation as good as source code instrumentation: An empirical study with industrial tools (Experience Report)Nan Li, Xin Meng, Jeff Offutt, Lin Deng. 380-389 [doi]
- Help, help, i'm being suppressed! The significance of suppressors in software testingAlex Groce, Chaoqiang Zhang, Mohammad Amin Alipour, Eric Eide, Yang Chen, John Regehr. 390-399 [doi]
- Permlyzer: Analyzing permission usage in Android applicationsWei Xu, Fangfang Zhang, Sencun Zhu. 400-410 [doi]
- Systematic testing for resource leaks in Android applicationsDacong Yan, Shengqian Yang, Atanas Rountev. 411-420 [doi]
- Keep it moving: Proactive workload management for reducing SLA violations in large scale SaaS cloudsArpan Roy, Rajeshwari Ganesan, Santonu Sarkar. 421-430 [doi]
- A host-based anomaly detection approach by representing system calls as states of kernel modulesSyed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Mario Couture. 431-440 [doi]
- A study of the relationship between antivirus regressions and label changesIlir Gashi, Bertrand Sobesto, Stephen Mason, Vladimir Stankovic, Michel Cukier. 441-450 [doi]
- Static analysis versus penetration testing: A controlled experimentRiccardo Scandariato, James Walden, Wouter Joosen. 451-460 [doi]