Abstract is missing.
- Security Benchmarks for Web Serving SystemsNaaliel Mendes, Henrique Madeira, João Durães. 1-12 [doi]
- Zen-CC: An Automated and Incremental Conformance Checking Solution to Support Interactive Product ConfigurationHong Lu, Tao Yue, Shaukat Ali, Kunming Nie, Li Zhang. 13-22 [doi]
- Predicting Vulnerable Components: Software Metrics vs Text MiningJames Walden, Jeff Stuckman, Riccardo Scandariato. 23-33 [doi]
- Uncovering Errors in ATL Model Transformations Using Static Analysis and Constraint SolvingJesús Sánchez Cuadrado, Esther Guerra, Juan de Lara. 34-44 [doi]
- On the Long-Term Predictive Capability of Data-Driven Software Reliability Model: An Empirical EvaluationJinhee Park, Nakwon Lee, Jongmoon Baik. 45-54 [doi]
- Deadlock and Temporal Properties Analysis in Mixed Reality ApplicationsRaymond R. Devillers, Jean-Yves Didier, Hanna Klaudel, Johan Arcile. 55-65 [doi]
- Program Logic Based Software Plagiarism DetectionFangfang Zhang, Dinghao Wu, Peng Liu 0005, Sencun Zhu. 66-77 [doi]
- A Systematic Approach for Software Interference AnalysisBastian Zimmer, Christoph Dropmann, Jochen Ulrich Hanger. 78-87 [doi]
- WPBOUND: Enforcing Spatial Memory Safety Efficiently at Runtime with Weakest PreconditionsDing Ye, Yu Su, Yulei Sui, Jingling Xue. 88-99 [doi]
- Experience Report: An Analysis of Hypercall Handler VulnerabilitiesAleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev. 100-111 [doi]
- Why Does my Spreadsheet Compute Wrong Values?Birgit Hofer, Franz Wotawa. 112-121 [doi]
- Effective Bug Triage Based on Historical Bug-Fix InformationHao Hu, Hongyu Zhang, Jifeng Xuan, Weigang Sun. 122-132 [doi]
- More Debugging in ParallelWolfgang Hogerle, Friedrich Steimann, Marcus Frenkel. 133-143 [doi]
- Norming to Performing: Failure Analysis and Deployment Automation of Big Data Software Developed by Highly Iterative ModelsKeun Soo Yim. 144-155 [doi]
- Experience Report: Orthogonal Classification of Safety Critical IssuesNuno Silva, Marco Vieira. 156-166 [doi]
- Failure Analysis of Jobs in Compute Clouds: A Google Cluster Case StudyXin Chen, Charng-da Lu, Karthik Pattabiraman. 167-177 [doi]
- Analysis and Diagnosis of SLA Violations in a Production SaaS CloudCatello Di Martino, Daniel Chen, Geetika Goel, Rajeshwari Ganesan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 178-188 [doi]
- Mutations: How Close are they to Real Faults?Rahul Gopinath, Carlos Jensen, Alex Groce. 189-200 [doi]
- A Survey on Unit Testing Practices and ProblemsErmira Daka, Gordon Fraser. 201-211 [doi]
- Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial SystemsMarcello Cinque, Domenico Cotroneo, Raffaele Della Corte, Antonio Pecchia. 212-222 [doi]
- Experience Report: Verifying Data Interaction Coverage to Improve Testing of Data-Intensive Systems: The Norwegian Customs and Excise Case StudySagar Sen, Carlo Ieva, Arnab Sarkar, Atle Sander, Astrid Grime. 223-234 [doi]
- Runtime Verification of Web Services for Interconnected Medical DevicesNormann Decker, Franziska Kühn, Daniel Thoma. 235-244 [doi]
- Access Control Policy Evolution: An Empirical StudyJeeHyun Hwang, Da Young Lee, Laurie A. Williams, Mladen A. Vouk. 245-254 [doi]
- Experience Report: A Safety Engineering Tool Supporting Error Model Creation and VisualizationRoland Mader, Rene Obendrauf, Philipp Prinz, Gerhard Griessnig. 255-266 [doi]
- Reproducibility of Environment-Dependent Software Failures: An Experience ReportDavide G. Cavezza, Roberto Pietrantuono, Javier Alonso, Stefano Russo, Kishor S. Trivedi. 267-276 [doi]
- An Empirical Study on the Scalability of Selective Mutation TestingJie Zhang, Muyao Zhu, Dan Hao, Lu Zhang. 277-287 [doi]
- Multi-objective Construction of an Entire Adequate Test Suite for an EFSMNesa Asoudeh, Yvan Labiche. 288-299 [doi]
- Using Pre-Release Test Failures to Build Early Post-Release Defect Prediction ModelsKim Herzig. 300-311 [doi]
- Defect Prediction between Software Versions with Active Learning and Dimensionality ReductionHuihua Lu, Ekrem Kocaguneli, Bojan Cukic. 312-322 [doi]
- An Orchestrated Survey of Available Algorithms and Tools for Combinatorial TestingSunint Kaur Khalsa, Yvan Labiche. 323-334 [doi]
- Predicting Effectiveness of IR-Based Bug Localization TechniquesTien-Duy B. Le, Ferdian Thung, David Lo. 335-345 [doi]