Abstract is missing.
- Modelling and Implementing Complex Systems with TimebandsJim Woodcock, Marcel Oliveira, Alan Burns, Kun Wei. 1-13 [doi]
- Recent Catastrophic Accidents: Investigating How Software was ResponsibleW. Eric Wong, Vidroha Debroy, Adithya Surampudi, Hyeonjeong Kim, Michael F. Siok. 14-22 [doi]
- Modeling and Verification of Safety Critical Systems: A Case Study on PacemakerAnh Tuan Luu, Man Chun Zheng, Quan Thanh Tho. 23-32 [doi]
- Discovering Anomalies in Semantic Web RulesYuzhang Feng, Yang Liu 0003, Yuan-Fang Li, Daqing Zhang. 33-42 [doi]
- Model Checking a Lazy Concurrent List-Based Set AlgorithmShao Jie Zhang, Yang Liu 0003. 43-52 [doi]
- YAWL2DVE: An Automated Translator for Workflow VerificationFazle Rabbi, Hao Wang, Wendy MacCaull. 53-59 [doi]
- Scalable V&V Effort Estimation for Ultra-Large-Scale SystemsChristof J. Budnik, Rajesh Subramanyan, Raj Tanikella. 60-68 [doi]
- Aligning Security Requirements and Security Assurance Using the Common CriteriaKenji Taguchi, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko. 69-77 [doi]
- An Agent-Based System to Support Assurance of Security RequirementsMoussa Ouedraogo, Haralambos Mouratidis, Djamel Khadraoui, Eric Dubois. 78-87 [doi]
- Model-Based Argument Analysis for Evolving Security RequirementsThein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh. 88-97 [doi]
- Failure Type-Aware Reliability Assessment with Component Failure DependencyAtef Mohamed, Mohammad Zulkernine. 98-105 [doi]
- Software Reliability Modeling with Integrated Test CoverageJinxia An, Jihong Zhu. 106-112 [doi]
- Sensitivity of Two Coverage-Based Software Reliability Models to Variations in the Operational ProfileOdair Jacinto da Silva, Adalberto Nobiato Crespo, Marcos Lordello Chaim, Mario Jino. 113-120 [doi]
- A Formal Framework for Mutation TestingFevzi Belli, Mutlu Beyazit. 121-130 [doi]
- An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution LogsZhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ahmed E. Hassan, Parminder Flora. 131-140 [doi]
- Testing Effort Dependent Software FDP and FCP Models with Consideration of Imperfect DebuggingR. Peng, Q. P. Hu, Szu-Hui Ng, M. Xie. 141-146 [doi]
- A Decompositional Approach to Automatic Test Case Generation Based on Formal SpecificationsShaoying Liu, Shin Nakajima. 147-155 [doi]
- Availability Improvement in Virtualized Multiple Servers with Software Rejuvenation and VirtualizationMay Tar Hla Myint, Thandar Thein. 156-162 [doi]
- Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working EnvironmentDae-Yeob Kim, Cheong Youn. 163-172 [doi]
- Recoverability of Erasure Codes Based and Intensively Written Storage SystemsXiangyu Luo, Yun Wang. 173-179 [doi]
- Towards a New Understanding of Advice InterferenceKun Tian, Kendra Cooper, Kang Zhang, Siyuan Liu. 180-189 [doi]
- Self-Checked Metamorphic Testing of an Image Processing ProgramJunhua Ding, Tong Wu, Jun Q. Lu, Xin-Hua Hu. 190-197 [doi]
- PhishTester: Automatic Testing of Phishing AttacksHossain Shahriar, Mohammad Zulkernine. 198-207 [doi]
- Towards Scalable Robustness TestingFevzi Belli, Axel Hollmann, W. Eric Wong. 208-216 [doi]
- Modeling and Analyzing Timed Security Protocols Using Extended Timed CSPXian Zhang, Yang Liu 0003, Mikhail Auguston. 217-226 [doi]
- Modeling Uncertainties in the Estimation of Software Reliability Senthil Kumar Chandran, Aleksandar Dimov, Sasikumar Punnekkat. 227-236 [doi]
- The Best Valid Safe Protocol ConverterJing Cao, Albert Nymeyer. 237-243 [doi]