Abstract is missing.
- A Diversity Model Based on Failure Distribution and Its Application in Safety CasesLuping Chen, John May. 1-10 [doi]
- The Influence of Developer Quality on Software Fault-Proneness PredictionYangsong Wu, Yibiao Yang, Yangyang Zhao, Hongmin Lu, Yuming Zhou, Baowen Xu. 11-19 [doi]
- A Two-Stage Data Preprocessing Approach for Software Fault PredictionJiaqiang Chen, Shulong Liu, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen. 20-29 [doi]
- High Performance Java Card Operating SystemMohammad R. Eletriby, Mohamed Sobh, Ayman M. Bahaa Eldin, Hossam M. A. Fahmy. 30-39 [doi]
- Providing Hardware Redundancy for Highly Available Services in Virtualized EnvironmentsAzadeh Jahanbanifar, Ferhat Khendek, Maria Toeroe. 40-47 [doi]
- Estimating the Accuracy of Dynamic Change-Impact Analysis Using Sensitivity AnalysisHaipeng Cai, Raúl A. Santelices, Tianyu Xu. 48-57 [doi]
- AppMark: A Picture-Based Watermark for Android AppsYingjun Zhang, Kai Chen. 58-67 [doi]
- ADAutomation: An Activity Diagram Based Automated GUI Testing Framework for Smartphone ApplicationsAng Li, Zishan Qin, Mingsong Chen, Jing Liu. 68-77 [doi]
- BinClone: Detecting Code Clones in MalwareMohammad Reza Farhadi, Benjamin C. M. Fung, Philippe Charland, Mourad Debbabi. 78-87 [doi]
- Security Test Generation by Answer Set ProgrammingPhilipp Zech, Michael Felderer, Basel Katt, Ruth Breu. 88-97 [doi]
- Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic ExecutionTing Su, Geguang Pu, Bin Fang, Jifeng He, Jun Yan, Siyuan Jiang, Jianjun Zhao. 98-107 [doi]
- Rule-Based Test Input Generation from BytecodeWeifeng Xu, Tao Ding, Dianxiang Xu. 108-117 [doi]
- Automatic Test Data Generation for Unit Testing to Achieve MC/DC CriterionTianyong Wu, Jun Yan, Jian Zhang 0001. 118-126 [doi]
- TaaS (Testing-as-a-Service) Design for Combinatorial TestingWei-Tek Tsai, Guanqiu Qi, Lian Yu, Jerry Gao. 127-136 [doi]
- Generating Test Cases for Context-Aware Applications Using BigraphsLian Yu, Wei-Tek Tsai, Yanbing Jiang, Jerry Gao. 137-146 [doi]
- SeTGaM: Generalized Technique for Regression Testing Based on UML/OCL ModelsElizabeta Fourneret, Jérôme Cantenot, Fabrice Bouquet, Bruno Legeard, Julien Botella. 147-156 [doi]
- Effective Regression Testing Using Requirements and RisksCharitha Hettiarachchi, Hyunsook Do, Byoungju Choi. 157-166 [doi]
- Traceability-Based Formal Specification InspectionMo Li, Shaoying Liu. 167-176 [doi]
- Specification of Dynamic Fault Tree Concepts with Stochastic Petri NetsLena Herscheid, Peter Tröger. 177-186 [doi]
- Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage SystemsChung-Yi Lin, Wen-Guey Tzeng. 187-195 [doi]
- Fast Discovery of VM-Sensitive Divergence Points with Basic Block ComparisonYen Ju Liu, Chong Kuan Chen, Michael Cheng Yi Cho, Shiuhpyng Shieh. 196-205 [doi]
- Using Network Tainting to Bound the Scope of Network Ingress AttacksPeter Mell, Richard E. Harang. 206-215 [doi]
- Automatic Numerical Analysis Based on Infinite-Precision ArithmeticShuai Wei, Enyi Tang, Tianyu Liu, Norbert Th. Müller, Zhenyu Chen. 216-224 [doi]
- A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of TrustGerry Howser, Bruce McMillin. 225-234 [doi]
- Reliable Repair Mechanisms with Low Connection Cost for Code Based Distributed Storage SystemsHsiao-Ying Lin, Li-Ping Tung, Bao-Shuh Paul Lin. 235-244 [doi]
- Collision Analysis of Safety Devices to Prevent Hazards in Safety Critical SystemsJang Jin Kwon, Doohwan Kim, Jae Jin Park, Jang-Eui Hong. 245-254 [doi]