Abstract is missing.
- How Economics Shape Reliability: Lessons and Opportunities from Windows DevelopmentSolom Heddaya. 1 [doi]
- Software Reliability - 40 Years of Avoiding the QuestionRussell Morris. 2-3 [doi]
- Using Measures and Risk Indicators for Early Insight into Software Product Characteristics such as Software SafetyVictor R. Basili. 4-5 [doi]
- Anything You Want to Ask about Software Reliability EngineeringMichael G. Hinchey, Karama Kanoun, Mikael Lindvall, Michael R. Lyu, Tiziana Margaria, Veena B. Mendiratta, Paul Pettersson, Norman F. Schneidewind, Eric Wong. 6 [doi]
- A Model-Driven Approach to Assuring Process ReliabilityIbrahim Habli, Tim Kelly. 7-16 [doi]
- Predicting Defect Content and Quality Assurance Effectiveness by Combining Expert Judgment and Defect Data - A Case StudyMichael Kläs, Haruka Nakao, Frank Elberzhager, Jürgen Münch. 17-26 [doi]
- Using an RBF Neural Network to Locate Program BugsW. Eric Wong, Yan Shi, Yu Qi, Richard Golden. 27-36 [doi]
- Concurrent Contracts for Java in JMLWladimir Araujo, Lionel C. Briand, Yvan Labiche. 37-46 [doi]
- Changing Java s Semantics for Handling Null Pointer ExceptionsKinga Dobolyi, Westley Weimer. 47-56 [doi]
- Resolving JavaScript Vulnerabilities in the Browser RuntimeEjike Ofuonye, James Miller. 57-66 [doi]
- Trace NormalizationMadeline Diep, Sebastian G. Elbaum, Matthew B. Dwyer. 67-76 [doi]
- Analysis of Computer Security Incident Data Using Time Series ModelsEdward Condon, Angela He, Michel Cukier. 77-86 [doi]
- Detection and Prediction of Resource-Exhaustion VulnerabilitiesJoão Antunes, Nuno Ferreira Neves, Paulo Veríssimo. 87-96 [doi]
- A QoS-Aware Middleware for Fault Tolerant Web ServicesZibin Zheng, Michael R. Lyu. 97-106 [doi]
- Operating System Robustness Forecast and SelectionXiaoen Ju, Hengming Zou. 107-116 [doi]
- Automated Identification of Failure Causes in System LogsLeonardo Mariani, Fabrizio Pastore. 117-126 [doi]
- Profiling the Operational Behavior of OS Device DriversConstantin Sârbu, Andréas Johansson, Neeraj Suri, Nachiappan Nagappan. 127-136 [doi]
- RUGRAT: Runtime Test Case Generation Using Dynamic CompilersBen Breech, Lori L. Pollock, John Cavazos. 137-146 [doi]
- All-Paths TestGenerationfor Programs with Internal AliasesNikolai Kosmatov. 147-156 [doi]
- Finding Faults: Manual Testing vs. Random+ Testing vs. User ReportsIlinca Ciupa, Bertrand Meyer, Manuel Oriol, Alexander Pretschner. 157-166 [doi]
- A Framework for Testing Peer-to-Peer SystemsEduardo Cunha de Almeida, Gerson Sunyé, Yves Le Traon, Patrick Valduriez. 167-176 [doi]
- Testing of User-Configurable Software Systems Using FirewallsBrian Robinson, Lee J. White. 177-186 [doi]
- Automated Support for Propagating Bug FixesBoya Sun, Ray-Yaung Chang, Xianghao Chen, Andy Podgurski. 187-196 [doi]
- Cost Curve Evaluation of Fault Prediction ModelsYue Jiang, Bojan Cukic, Tim Menzies. 197-206 [doi]
- A Joinpoint Coverage Measurement Tool for Evaluating the Effectiveness of Test Inputs for AspectJ ProgramsFadi Wedyan, Sudipto Ghosh. 207-212 [doi]
- Exploring Quality Metrics to Support Defect Management Process in a Multi-site Organization - A Case StudyKirsi Korhonen, Outi Salo. 213-218 [doi]
- Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot NetworkRobin E. Bloomfield, Ilir Gashi, Andrey Povyakalo, Vladimir Stankovic. 219-228 [doi]
- The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating SystemSam Weber, Amitkumar Paradkar, Suzanne McIntosh, David C. Toll, Paul A. Karger, Matthew Kaplan, Elaine R. Palmer. 229-238 [doi]
- Automated Generation of Pointcut Mutants for Testing Pointcuts in AspectJ ProgramsPrasanth Anbalagan, Tao Xie. 239-248 [doi]
- Testing Software Product Lines Using Incremental Test GenerationEngin Uzuncaova, Daniel Garcia, Sarfraz Khurshid, Don S. Batory. 249-258 [doi]
- Using Statistical Models to Predict Software RegressionsAlexander Tarvo. 259-264 [doi]
- Reliability Assessment of Mass-Market Software: Insights from Windows Vista®Paul Luo Li, Mingtian Ni, Song Xue, Joseph P. Mullally, Mario Garzia, Mujtaba Khambatti. 265-270 [doi]
- Using Fault Modeling in Safety CasesRobyn R. Lutz, Ann Patterson-Hine. 271-276 [doi]
- E-RACE, A Hardware-Assisted Approach to Lockset-Based Data Race Detection for Embedded ProductsLily Huang, Michael R. Smith, Albert Tran, James Miller. 277-278 [doi]
- An Effective Software Reliability Analysis Framework for Weapon System Development in Defense DomainDalju Lee, Jongmoon Baik, Hoyeon Ryu, Ju-Hwan Shin. 279-280 [doi]
- A Modified Genetic Algorithm for Parameter Estimation of Software Reliability Growth ModelsChao Jung Hsu, Chin-Yu Huang, Tsan-Yuan Chen. 281-282 [doi]
- Reliability Assessment of Translated VMF/Link-16 MessagesJingyu Kim, Sungwon Kang, Nohbok Lee. 283-284 [doi]
- An Algebra-Based Reliability Prediction Approach for Composite Web ServicesNing Huang, Dong Wang, Xiaoguang Jia. 285-286 [doi]
- Architecting for Reliability - Recovery MechanismsRobert S. Hanmer, Veena B. Mendiratta. 287-288 [doi]
- Replication vs. Failure Prevention - How to Boost Service Availability?Felix Salfner, Katinka Wolter. 289-290 [doi]
- Assessing the Effect of Software Failures on Trust AssumptionsQian Feng, Robyn R. Lutz. 291-292 [doi]
- GB Coverage Criteria: The Measurement for Testing a Go Back Function Based on a Pushdown AutomatonTomohiko Takagi, Zengo Furukawa. 293-294 [doi]
- Discovering the Fault Origin from Field TracesSyed Shariyar Murtaza, Mechelle Gittens, Nazim H. Madhavji. 295-296 [doi]
- Seasonality in Vulnerability Discovery in Major Software SystemsHyunChul Joh, Yashwant K. Malaiya. 297-298 [doi]
- Vulnerability Discovery Modeling Using Weibull DistributionHyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya. 299-300 [doi]
- An Analysis Framework for Inter-system Interaction BehaviorChristopher Ackermann, Deane E. Sibol, William C. Stratton, Mikael Lindvall, Sally Godfrey. 301-302 [doi]
- Static Detection of Redundant Test Cases: An Initial StudyNuo Li, Patrick Francis, Brian Robinson. 303-304 [doi]
- The Effect of the Number of Defects on Estimates Produced by Capture-Recapture ModelsGursimran Singh Walia, Jeffrey C. Carver. 305-306 [doi]
- Modeling the Software Failure Correlations When Test Automation Is Adopted during the Software DevelopmentChu-Ti Lin, Chin-Yu Huang. 307-308 [doi]
- Using UML Sequence Diagrams and State Machines for Test Input GenerationAritra Bandyopadhyay, Sudipto Ghosh. 309-310 [doi]
- Automated Fix Generator for SQL Injection AttacksFred Dysart, Mark Sherriff. 311-312 [doi]
- Efficient Operational Profiling of Systems Using Suffix Arrays on Execution LogsMeiyappan Nagappan, Mladen A. Vouk, Kesheng Wu, Alex Sim, Arie Shoshani. 313-314 [doi]
- Ranking Attack-Prone Components with a Predictive ModelMichael Gegick, Laurie Williams. 315-316 [doi]
- Comparative Study of Fault-Proneness Filtering with PMDHideaki Hata, Osamu Mizuno, Tohru Kikuno. 317-318 [doi]
- Software Reliability Modeling with Logistic Test Coverage FunctionHaifeng Li, Qiuying Li, Minyan Lu. 319-320 [doi]
- A Hardware-Assisted Tool for Fast, Full Code Coverage AnalysisAlbert Tran, Michael R. Smith, James Miller. 321-322 [doi]
- Reusing Existing Test Cases for Security TestingDazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Kung. 323-324 [doi]
- On Reliability Analysis of Open Source Software - FEDORAPrasanth Anbalagan, Mladen A. Vouk. 325-326 [doi]