Abstract is missing.
- A Resilience Design Model for IMS-based ServicesSomia Natouri, Chidung Lac. 1-2 [doi]
- Combinatorial Analysis of Dynamic Fault Trees with Priority-AND GatesJianwen Xiang, Fumio Machida, Kumiko Tadano, Kazuo Yanoo, Wei Sun, Yoshiharu Maeno. 3-4 [doi]
- Bohrbugs, Mandelbugs, Exhaustive Testing and Unintended Automobile AccelerationMartin L. Shooman. 5-6 [doi]
- Entropy Metrics for Agile Development ProcessesOzgur Aktunc. 7-8 [doi]
- TEAMS: A Special-Purpose AOP Framework for Runtime MonitoringAmjad Nusayr, Jonathan Cook, Gholamali Rahnavard. 9-10 [doi]
- Assessing AUTOSAR Systems Using Fault InjectionAs'ad Salkham, Antonio Pecchia, Nuno Silva. 11-12 [doi]
- Toward Baselining Software Anomalies in NASA MissionsLucas Layman, Marvin V. Zelkowitz, Victor R. Basili, Allen P. Nikora. 13-14 [doi]
- Safety and Performance Co-engineering: New MDE Challenge for Critical Applications Design?Rafik Henia, Joseph Machrouh, Laurent Rioux. 15-16 [doi]
- Ontology-Based Reuse of Failure Modes for FMEA: Methodology and ToolGuoqi Li. 17-18 [doi]
- Assessing Disaster Recovery Alternatives: On-Site, Colocation or CloudOmar H. Alhazmi, Yashwant K. Malaiya. 19-20 [doi]
- Evidence-Based Security in Aerospace: From Safety to Security and Back AgainMichael Paulitsch, Rupert Reiger, Lorenzo Strigini, Robin E. Bloomfield. 21-22 [doi]
- Formal Analysis of Device-Delay Error in User-Device Interaction under UncertaintyKrishnendu Ghosh. 23-24 [doi]
- Software at Scale for Building Resilient Wireless Sensor NetworksCatello Di Martino. 25-26 [doi]
- Applying Software Reliability Growth Models to DOD SystemsE. Andrew Long, Louis Gullo, Allen P. Nikora. 27-36 [doi]
- Software Reliability Classes: A Basis for Release and Product Quality ExpectationsSunita Chulani, Pete Rotella, Bob Mullen. 37 [doi]
- Cost Effective Reliability Centric Validation Model for Automotive ECUsAjeet Kumar Pandey, Jessy George Smith, Vivek Diwanji. 38-44 [doi]
- Early Performance Estimation for Industrial Component-Based Design of Reliable Software Defined Radio SystemRafik Henia, Laurent Rioux, Nicolas Sordon, Thomas Vergnaud. 45-46 [doi]
- Bug Detection in Large-Scale Nuclear Power SoftwareZheng Liu, Wentao Mo, Dangpei Ren, Guang Zhao, Mingye Liu. 47-52 [doi]
- Quality Playbook: Ensuring Release to Release ImprovementPete Rotella, Sunita Chulani, Satyabrata Pradhan. 53 [doi]
- Metric-Based Quality Evaluations for Iterative Software Development Approaches Like AgileKumi Jinzenji, Takashi Hoshino, Laurie Williams, Kenji Takahashi. 54-63 [doi]
- Targeting Specific Customer Satisfactions Issues with ODC AnalysisRam Chillarege. 64 [doi]
- A Software Quality Evaluation Method Using the Change of Source Code MetricsMitsuhiro Nakamura, Tomoki Hamagami. 65-69 [doi]
- Smart Unit Testing FrameworkLakshmankumar Mukkavilli. 70-79 [doi]
- Customer Scenario Focused End-to-End TestingChen Liang, Aniket Malatpure, Mohammad Shafiei, Marcelo Vago, Tsan Zheng. 80-81 [doi]
- Applying Test Data Generation Using SMT Solver to COBOLYusuke Sasaki, Yoshiharu Maeda, Kenichi Kobayashi, Akihiko Matsuo. 82 [doi]
- Overview of 10 Years of ISVV Findings in Safety-Critical SystemsNuno Silva, Rui Lopes. 83 [doi]
- Independent Assessment of Safety-Critical Systems: We Bring Data!Nuno Silva, Rui Lopes. 84 [doi]
- Modeling and Prediction of Performability of Safety Critical Computer Based Systems Using Petri NetsLalit Kumar Singh, Gopika Vinod, Anil Kumar Tripathi. 85-94 [doi]
- Assessing the Performance of Networked Computer Based SystemsShelly Agarwal. 95 [doi]
- Measurements-Based Analysis of Workload-Error Relationship in a Production SaaS CloudRajeshwari Ganesan, Santonu Sarkar, Geetika Goel, Catello Di Martino. 96-105 [doi]
- Assessing Product Quality through PMR Analysis: A PerspectiveRajarshi Das. 106-115 [doi]
- A Practical Extension of Pairwise TestingOksoon Jeong. 116-122 [doi]
- Managing Automated End to End Testing in Bitwise Heterogenous EnvironmentsRossel Paul Banji, Pandit Pattabhirama, Mukul Gharpure, Manjunath Ramachandra. 123-128 [doi]
- Comparison of Static Analysis Tools for Finding Concurrency BugsNuman Manzoor, Hussan Munir, Misagh Moayyed. 129-133 [doi]
- Detecting Vulnerabilities in Service Oriented ArchitecturesNuno Antunes, Marco Vieira. 134-139 [doi]
- Accelerate the Software Software Reliability Testing Execution Process with Fuzzy DiscriminationFeng Zheng, Jun Ai, Jingwei Shang, Jinhui Wang. 140-145 [doi]
- Using Profiling Metrics to Categorise Peer Review Types in the Android ProjectRaula Gaikovina Kula, Carmago Cruz Ana E., Norihiro Yoshida, Kazuki Hamasaki, Kenji Fujiwara, Xin Yang, Hajimu Iida. 146-151 [doi]
- Program Debugging with Effective Software Fault Localization (Invited Talk)W. Eric Wong. 152 [doi]
- The Effect of Testability on Fault Proneness: A Case Study of the Apache HTTP ServerMark Hays, Jane Hayes. 153-158 [doi]
- Debugging Spreadsheets: A CSP-based ApproachRui Abreu, André Riboira, Franz Wotawa. 159-164 [doi]
- Detection of Interferences in Aspect-Oriented Programs Using Executable AssertionsJimmy Lauret, Hélène Waeselynck, Jean-Charles Fabre. 165-170 [doi]
- A Topology-Based Model for Estimating the Diagnostic Efficiency of Statistics-Based ApproachesAlexandre Perez, André Riboira, Rui Abreu. 171-176 [doi]
- Predicting Data Dependences for Slice Inspection PrioritizationYiji Zhang, Raúl A. Santelices. 177-182 [doi]
- A Static Detecting Model for Invalid Arithmetic Operation Based on Alias AnalysisHongbo Zhou, Qian Wang, Dahai Jin, Yunzhan Gong. 183-188 [doi]
- Wielding Statistical Fault Localization StatisticallyYunqian Zhang, Lin Chen, Bo Jiang, Zhenyu Zhang. 189-194 [doi]
- Baggy Bounds with Accurate CheckingBaozeng Ding, Yeping He, Yanjun Wu, Alex Miller, John Criswell. 195-200 [doi]
- Design-Model-Based Test Data Generation for Database ApplicationsHaruto Tanno, Xiaojing Zhang, Takashi Hoshino. 201-206 [doi]
- Automatic GUI Model Generation: State of the ArtAndres Kull. 207-212 [doi]
- Automated Risk-Based Testing by Integrating Safety Analysis Information into System Behavior ModelsRamy Nazier, Thomas Bauer. 213-218 [doi]
- Integrating Model-Based and Constraint-Based Testing Using SpecExplorerVivek Vishal, Mehmet Kovacioglu, Rachid Kherazi, Mohammad Reza Mousavi. 219-224 [doi]
- Integrating MDT in an Industrial Process in the Air Traffic Control DomainGabriella Carrozza, Mauro Faella, Francesco Fucci, Roberto Pietrantuono, Stefano Russo. 225-230 [doi]
- A Review of Two Experiences from Applying Model Based Testing in PracticeDusica Marijan. 231-236 [doi]
- A Pragmatic Approach on Combined Safety and Security Risk AnalysisFrank Reichenbach, Jan Endresen, Mohammad M. R. Chowdhury, Judith E. Y. Rossebø. 239-244 [doi]
- Monitoring Memory-Related Software Aging: An Exploratory StudyRivalino Matias, Bruno Evangelista Costa, Autran Macedo. 247-252 [doi]
- An Advanced Methodology for Measuring and Characterizing Software AgingPengfei Zheng, Qingguo Xu, Yong Qi. 253-258 [doi]
- Cost Optimality in Testing and RejuvenationMichael Grottke, Benjamin Schleich. 259-264 [doi]
- Monitoring of Aging Software Systems Affected by Integer OverflowsDomenico Cotroneo, Roberto Natella. 265-270 [doi]
- Multiformalism to Support Software Rejuvenation ModelingEnrico Barbierato, Andrea Bobbio, Marco Gribaudo, Mauro Iacono. 271-276 [doi]
- Modeling Software Rejuvenation on a Redundant System Using Monte Carlo SimulationSonia Malefaki, Vasilis P. Koutras, Agapios N. Platis. 277-282 [doi]
- Optimization of Opportunity-Based Software Rejuvenation PolicyHiroyuki Okamura, Tadashi Dohi. 283-286 [doi]
- Aging-Related Bugs in Cloud Computing SoftwareFumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno. 287-292 [doi]
- Characterization of Software Aging Effects in Elastic Storage Mechanisms for Private CloudsRubens de S. Matos, Jean Araujo, Vandi Alves, Paulo Romero Martins Maciel. 293-298 [doi]
- Software Rejuvenation: Do IT & Telco Industries Use It?Javier Alonso, Antonio Bovenzi, Jinghui Li, Yakun Wang, Stefano Russo, Kishor S. Trivedi. 299-304 [doi]
- A Proposal on a Method for Reviewing Operation Manuals of SupercomputerShota Takama, Vaise Patu, Yutaka Matsuno, Shuichiro Yamamoto. 305-306 [doi]
- Application of D-Case to the Data-Upload Flow Diagram Scenario of the Distributed E-Learning System Called KISSELVaise Patu, Yutaka Matsuno, Shuichiro Yamamoto. 307-312 [doi]
- A Study of Converting Risk to Assurance CaseMotoki Yoan, Midori Sugaya, Kimio Kuramitsu. 313-315 [doi]
- Reconfigurable Scripting Language with Programming RiskTakuma Wakamori, Masahiro Ide, Midori Sugaya, Kimio Kuramitsu. 316-318 [doi]
- Requirements and Evaluation of Safety Analysis Techniques for Ambient Assisted Living SystemsAdrien Mouaffo Tiadjio, Kavyashree Jamboti. 319-324 [doi]
- Handling Language Variations in Open Source Bug Reporting SystemsSean Banerjee, Jesse Musgrove, Bojan Cukic. 325-330 [doi]
- Combination of Static and Dynamic Analyses for the Certification of Avionics SoftwareAntoine Ferlin, Virginie Wiels. 331-336 [doi]
- A Method to Formally Evaluate Safety Case Evidences against a System Architecture ModelStefan Björnander, Rikard Land, Patrick J. Graydon, Kristina Lundqvist, Philippa Conmy. 337-342 [doi]
- Composable Safety-Critical Systems Based on Pre-certified Software ComponentsAndreas Soderberg, Benjamin Vedder. 343-348 [doi]
- Industrial Experiences of Building a Safety Case in Compliance with ISO 26262Raghad Dardar, Barbara Gallina, Andreas Johnsen, Kristina Lundqvist, Mattias Nyberg. 349-354 [doi]
- Agile Practices in Regulated Railway Software DevelopmentHenrik Jonsson, Stig Larsson, Sasikumar Punnekkat. 355-360 [doi]
- 10 Years of ISVV: What's Next?Nuno Silva, Rui Lopes. 361-366 [doi]