Abstract is missing.
- A Complexity Reliability ModelNorman F. Schneidewind, Mike Hinchey. 1-10 [doi]
- Wavelet-Based Approach for Estimating Software ReliabilityXiao Xiao, Tadashi Dohi. 11-20 [doi]
- Estimating the Probability of Failure When Software Runs Are Dependent: An Empirical StudyKaterina Goseva-Popstojanova, Margaret Hamill. 21-30 [doi]
- Applying the Composition Filter Model for Runtime Verification of Multiple-Language SoftwareSomayeh Malakuti, Christoph Bockisch, Mehmet Aksit. 31-40 [doi]
- Efficiently Extracting Operational Profiles from Execution Logs Using Suffix ArraysMeiyappan Nagappan, Kesheng Wu, Mladen A. Vouk. 41-50 [doi]
- Optimal Adaptive System Health Monitoring and Diagnosis for Resource Constrained Cyber-Physical SystemsYansheng Zhang, I-Ling Yen, Farokh B. Bastani, Ann T. Tai, Savio N. Chau. 51-60 [doi]
- Reducing Field Failures in System Configurable Software: Cost-Based PrioritizationHema Srikanth, Myra B. Cohen, Xiao Qu. 61-70 [doi]
- Harnessing Web-Based Application Similarities to Aid in Regression TestingKinga Dobolyi, Westley Weimer. 71-80 [doi]
- On the Effectiveness of Unit Test Automation at MicrosoftLaurie Williams, Gunnar Kudrjavets, Nachiappan Nagappan. 81-89 [doi]
- Approximating Deployment Metrics to Predict Field Defects and Plan Corrective Maintenance ActivitiesWill Snipes, Brian P. Robinson, Penelope A. Brooks. 90-98 [doi]
- Variance Analysis in Software Fault Prediction ModelsYue Jiang, Jie Lin, Bojan Cukic, Tim Menzies. 99-108 [doi]
- Putting It All Together: Using Socio-technical Networks to Predict FailuresChristian Bird, Nachiappan Nagappan, Harald Gall, Brendan Murphy, Premkumar T. Devanbu. 109-119 [doi]
- Optimal Security Patch Release Timing under Non-homogeneous Vulnerability-Discovery ProcessesHiroyuki Okamura, Masataka Tokuzane, Tadashi Dohi. 120-128 [doi]
- Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field StudyNuno Seixas, José Fonseca, Marco Vieira, Henrique Madeira. 129-135 [doi]
- Towards a Unifying Approach in Understanding Security ProblemsPrasanth Anbalagan, Mladen A. Vouk. 136-145 [doi]
- Fault Tree Analysis of Software-Controlled Component Systems Based on Second-Order ProbabilitiesMarc Forster, Mario Trapp. 146-154 [doi]
- Issues on the Design of Efficient Fail-Safe Fault ToleranceArshad Jhumka, Matthew Leeke. 155-164 [doi]
- Insights on Fault Interference for Programs with Multiple BugsVidroha Debroy, W. Eric Wong. 165-174 [doi]
- Towards Behavioral Reflexion ModelsChristopher Ackermann, Mikael Lindvall, Rance Cleaveland. 175-184 [doi]
- Automated Identification of LTL Patterns in Natural Language RequirementsAllen P. Nikora, Galen Balcom. 185-194 [doi]
- Event-Based Input Validation Using Design-by-Contract PatternsTugkan Tuglular, Can Arda Muftuoglu, Fevzi Belli, Michael Linschulte. 195-204 [doi]