Abstract is missing.
- Hovac: A Configurable Fault Injection Framework for Benchmarking the Dependability of C/C++ ApplicationsLena Herscheid, Daniel Richter, Andreas Polze. 1-10 [doi]
- LLFI: An Intermediate Code-Level Fault Injection Tool for Hardware FaultsQining Lu, Mostafa Farahani, Jiesheng Wei, Anna Thomas, Karthik Pattabiraman. 11-16 [doi]
- Deep Learning for Just-in-Time Defect PredictionXinli Yang, David Lo, Xin Xia, Yun Zhang, Jianling Sun. 17-26 [doi]
- Predicting Vulnerable Components via Text Mining or Software Metrics? An Effort-Aware PerspectiveYaming Tang, Fei Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu. 27-36 [doi]
- An Empirical Study of Dynamic Incomplete-Case Nearest Neighbor Imputation in Software Quality DataJianglin Huang, Hongyi Sun, Yan-fu Li, Min Xie 0001. 37-42 [doi]
- Cross-Project Aging Related Bug PredictionFangyun Qin, Zheng Zheng, Chenggang Bai, Yu Qiao, Zhenyu Zhang, Cheng Chen. 43-48 [doi]
- Abstracting Program Dependencies Using the Method Dependence GraphHaipeng Cai, Raúl A. Santelices. 49-58 [doi]
- Node-Set Analysis for Linked Recursive Data StructuresZhenhao Tang, Hanfei Wang, Bin Li, Juan Zhai, Jianhua Zhao, Xuandong Li. 59-64 [doi]
- A New Framework and Application of Software Reliability Estimation Based on Fault Detection and Correction ProcessesYu Liu, Min Xie, Jianfeng Yang, Ming Zhao. 65-74 [doi]
- Robustness of Non-homogeneous Gamma Process-Based Software Reliability ModelsYasuhiro Saito, Tadashi Dohi. 75-84 [doi]
- Fine-Grained Software Reliability Estimation Using Software Testing InputsHiroyuki Okamura, Yuki Takekoshi, Tadashi Dohi. 85-92 [doi]
- On the Viability of Using SRGMs for IT Help Desk Incident PredictionsAnneliese Andrews, Joseph Lucente. 93-98 [doi]
- Assessing Security to Compare Architecture Alternatives of Component-Based SystemsAxel Busch, Misha Strittmatter, Anne Koziolek. 99-108 [doi]
- An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning TechniquesAmirreza Soudi, Wael Khreich, Abdelwahab Hamou-Lhadj. 109-118 [doi]
- System Call-Based Detection of Malicious ProcessesRaymond Canzanese, Spiros Mancoridis, Moshe Kam. 119-124 [doi]
- An Approach for Authenticating Smartphone Users Based on Histogram FeaturesChien-Cheng Lin, Chin-Chun Chang, Deron Liang. 125-130 [doi]
- PORA: Proportion-Oriented Randomized Algorithm for Test Case PrioritizationBo Jiang, Wing Kwong Chan, T. H. Tse. 131-140 [doi]
- Combinatorial Testing for Tree-Structured Test Models with ConstraintsTakashi Kitamura, Akihisa Yamada 0002, Goro Hatayama, Cyrille Artho, Eun-Hye Choi, Thi Bich Ngoc Do, Yutaka Oiwa, Shinya Sakuragi. 141-150 [doi]
- How Effective Are Code Coverage Criteria?Hadi Hemmati. 151-156 [doi]
- Multi-perspective Regression Test Prioritization for Time-Constrained EnvironmentsDusica Marijan. 157-162 [doi]
- Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 PoliciesDianxiang Xu, Yunpeng Zhang, Ning Shen. 163-172 [doi]
- An Event-Based Formal Framework for Dynamic Software UpdateShengwei An, Xiaoxing Ma, Chun Cao, Ping Yu 0002, Chang Xu. 173-182 [doi]
- A Case Study on Code Generation of an ERP System from Event-BNéstor Cataño, Tim Wahls. 183-188 [doi]
- HSD: Hybrid MARTE Sequence DiagramLulu Yao, Jing Liu, Yan Zhang, Yuejun Wang, Haiying Sun, QingSheng Wang, Dehui Du, Xiaohong Chen. 189-194 [doi]
- Potential Component Leaks in Android Apps: An Investigation into a New Feature Set for Malware DetectionLi Li 0029, Kevin Allix, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein. 195-200 [doi]
- Machine Learning Based Hybrid Behavior Models for Android Malware AnalysisHsin-Yu Chuang, Sheng-De Wang. 201-206 [doi]
- Attack Pattern-Based Combinatorial Testing with Constraints for Web Security TestingJosip Bozic, Bernhard Garn, Ioannis Kapsalis, Dimitris E. Simos, Severin Winkler, Franz Wotawa. 207-212 [doi]
- On the Relationship between Model Coverage and Code Coverage Using MATLAB's SimulinkYunwei Dong, Zhe Li, Dave Towey. 213-218 [doi]
- An Effective Approach to Continuous User Authentication for Touch Screen Smart DevicesArun Balaji Buduru, Stephen S. Yau. 219-226 [doi]
- Uncertainty Analysis of Race Conditions in Real-Time SystemsShan He, Sizhao Li, Yan Chen, Donghui Guo. 227-232 [doi]
- Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source SystemsSadeeq Jan, Cu D. Nguyen, Lionel C. Briand. 233-241 [doi]
- Are Anti-patterns Coupled? An Empirical StudyWanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu, Xiaoyu Zhou. 242-251 [doi]
- Comparing and Evaluating CVSS Base Metrics and Microsoft Rating SystemAwad A. Younis, Yashwant K. Malaiya. 252-261 [doi]
- An Empirical Study of Highly Impactful Bugs in Mozilla ProjectsLe An, Foutse Khomh. 262-271 [doi]
- ASR: Abstraction Subspace Reduction for Exposing Atomicity Violation Bugs in Multithreaded ProgramsShangru Wu, Chunbai Yang, W. K. Chan. 272-281 [doi]
- Fault Localization in the Light of Faulty User InputBirgit Hofer, Franz Wotawa. 282-291 [doi]
- A Fault-Localization Approach Based on the Coincidental Correctness ProbabilityXiaoli Zhou, Hanfei Wang, Jianhua Zhao. 292-297 [doi]
- Is Learning-to-Rank Cost-Effective in Recommending Relevant Files for Bug Localization?Fei Zhao, Yaming Tang, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu. 298-303 [doi]