Abstract is missing.
- Improving the Precision of Dependence-Based Defect Mining by Supervised Learning of Rule and Violation GraphsBoya Sun, Andy Podgurski, Soumya Ray. 1-10 [doi]
- Computing the Number of Calls Dropped Due to FailuresKishor S. Trivedi, Dazhi Wang, D. Jason Hunt. 11-20 [doi]
- Propagating Bug Fixes with Fast Subgraph MatchingBoya Sun, Gang Shu, Andy Podgurski, Shirong Li, Shijie Zhang, Jiong Yang. 21-30 [doi]
- A Multi-factor Software Reliability Model Based on Logistic RegressionHiroyuki Okamura, Yusuke Etani, Tadashi Dohi. 31-40 [doi]
- Assessing Asymmetric Fault-Tolerant SoftwarePeter T. Popov, Lorenzo Strigini. 41-50 [doi]
- Flexible, Any-Time Fault Tree Analysis with Component Logic ModelsMarc Forster, Daniel Schneider. 51-60 [doi]
- Errors on Space Software Requirements: A Field Study and Application ScenariosPaulo C. Véras, Emilia Villani, Ana Maria Ambrosio, Nuno Silva, Marco Vieira, Henrique Madeira. 61-70 [doi]
- Software Aging Analysis of the Linux Operating SystemDomenico Cotroneo, Roberto Natella, Roberto Pietrantuono, Stefano Russo. 71-80 [doi]
- Evaluating the Use of Requirement Error Abstraction and Classification Method for Preventing Errors during Artifact Creation: A Feasibility StudyGursimran Singh Walia, Jeffrey C. Carver. 81-90 [doi]
- As-If Infinitely Ranged Integer ModelRoger B. Dannenberg, Will Dormann, David Keaton, Robert C. Seacord, David Svoboda, Alex Volkovitsky, Timothy Wilson, Thomas Plum. 91-100 [doi]
- Towards a Bayesian Approach in Modeling the Disclosure of Unique Security Faults in Open Source ProjectsPrasanth Anbalagan, Mladen A. Vouk. 101-110 [doi]
- Security Trend Analysis with CVE Topic ModelsStephan Neuhaus, Thomas Zimmermann. 111-120 [doi]
- Automatic Mutation Test Case Generation via Dynamic Symbolic ExecutionMike Papadakis, Nicos Malevris. 121-130 [doi]
- Constraint-Based Test Input Generation for Java BytecodeFlorence Charreteur, Arnaud Gotlieb. 131-140 [doi]
- An Industrial Investigation of Similarity Measures for Model-Based Test Case SelectionHadi Hemmati, Lionel C. Briand. 141-150 [doi]
- A 2-Phase Method for Validation of Matching Pair Property with Case Studies of Operating SystemsKang Gui, Suraj Kothari. 151-160 [doi]
- Detecting Dependences and Interactions in Feature-Oriented DesignSven Apel, Wolfgang Scholz, Christian Lengauer, Christian Kästner. 161-170 [doi]
- A Consistency Check Algorithm for Component-Based Refinements of Fault TreesDominik Domis, Kai Hofig, Mario Trapp. 171-180 [doi]
- Automating System Tests Using Declarative Virtual MachinesSander van der Burg, Eelco Dolstra. 181-190 [doi]
- DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness TestingKarthik Pattabiraman, Benjamin G. Zorn. 191-200 [doi]
- Pinpointing the Subsystems Responsible for the Performance Deviations in a Load TestHaroon Malik, Bram Adams, Ahmed E. Hassan. 201-210 [doi]
- Using Accelerated Life Tests to Estimate Time to Software Aging FailureRivalino Matias, Kishor S. Trivedi, Paulo Romero Martins Maciel. 211-219 [doi]
- The Importance of Data Quality in Software Reliability ModelingElisabeth A. Nguyen, Carlos F. Rexach, David P. Thorpe, Andrew E. Walther. 220-228 [doi]
- An Efficient Method for Architecture-Based Reliability Evaluation for Evolving Systems with Changing ParametersIndika Meedeniya, Lars Grunske. 229-238 [doi]
- Log-Based Reliability Analysis of Software as a Service (SaaS)Sean Banerjee, Hema Srikanth, Bojan Cukic. 239-248 [doi]
- Characterizing Failures in Mobile OSes: A Case Study with Android and SymbianAmiya Kumar Maji, Kangli Hao, Salmin Sultana, Saurabh Bagchi. 249-258 [doi]
- Empirical Evaluation of Factors Affecting Distinction between Failing and Passing ExecutionsArin Zahalka, Katerina Goseva-Popstojanova, Jeffrey Zemerick. 259-268 [doi]
- A Case Study on Safety Cases in the Automotive Domain: Modules, Patterns, and ModelsStefan Wagner, Bernhard Schätz, Stefan Puchner, Peter Kock. 269-278 [doi]
- A Large-Scale Industrial Case Study on Architecture-Based Software Reliability AnalysisHeiko Koziolek, Bastian Schlich, Carlos G. Bilich. 279-288 [doi]
- Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental StudyIvano Alessandro Elia, José Fonseca, Marco Vieira. 289-298 [doi]
- The Web Attacker Perspective - A Field StudyJosé Fonseca, Marco Vieira, Henrique Madeira. 299-308 [doi]
- Change Bursts as Defect PredictorsNachiappan Nagappan, Andreas Zeller, Thomas Zimmermann, Kim Herzig, Brendan Murphy. 309-318 [doi]
- Calibrating Probabilistic GUI Testing Models Based on Experiments and Survival AnalysisCristiano Bertolini, Alexandre Mota, Eduardo Aranha. 319-328 [doi]
- The Impact of Coupling on the Fault-Proneness of Aspect-Oriented Programs: An Empirical StudyRachel Burrows, Fabiano Cutigi Ferrari, Otávio Augusto Lazzarini Lemos, Alessandro Garcia, François Taiani. 329-338 [doi]
- Preventing Overflow Attacks by Memory RandomizationVivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghunathan Srinivasan. 339-347 [doi]
- Automata-Based Verification of Security Requirements of Composite Web ServicesHongyu Sun, Samik Basu, Vasant Honavar, Robyn R. Lutz. 348-357 [doi]
- Client-Side Detection of Cross-Site Request Forgery AttacksHossain Shahriar, Mohammad Zulkernine. 358-367 [doi]
- Is Data Privacy Always Good for Software Testing?Mark Grechanik, Christoph Csallner, Chen Fu, Qing Xie. 368-377 [doi]
- Prioritizing Mutation Operators Based on Importance SamplingMohan Sridharan, Akbar Siami Namin. 378-387 [doi]
- On the Round Trip Path Testing StrategyMay Khalil, Yvan Labiche. 388-397 [doi]
- FTCloud: A Component Ranking Framework for Fault-Tolerant Cloud ApplicationsZibin Zheng, Tom Chao Zhou, Michael R. Lyu, Irwin King. 398-407 [doi]
- Optimizing Incremental Scope-Bounded Checking with Data-Flow AnalysisDanhua Shao, Divya Gopinath, Sarfraz Khurshid, Dewayne E. Perry. 408-417 [doi]