Abstract is missing.
- Finding related events for specification miningZiying Dai, Xiaoguang Mao, Liqian Chen, Yan Lei, Yi Zhang. 1-2 [doi]
- Persistence of relevance: A missing issue in imperfect coverage modelsJianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno. 3-4 [doi]
- Automated classification of NASA anomalies using natural language processing techniquesDavide Falessi, Lucas Layman. 5-6 [doi]
- A study on the effectiveness of peer review meetingNoriyoshi Kuno, Tsuyoshi Nakajima, Makoto Matsushita, Katsuro Inoue. 7-8 [doi]
- Comparative analysis of Bayesian and classical approaches for software reliability measurementT. Ketchiozo Wandji, Shahryar Sarkani, Timothy Eveleigh, Thomas Holzer, Peter A. Keiller. 9-10 [doi]
- Characteristic analysis of quantitative definition of resiliency measureChao Luo, Hiroyuki Okamura, Tadashi Dohi. 11-12 [doi]
- An initial evaluation of model-based testingVignir Gudmundsson, Christoph Schulze, Dharmalingam Ganesan, Mikael Lindvall, Robert Wiegand. 13-14 [doi]
- Certification of embedded systems: Quantitative analysis and irrefutable evidencesNuno Silva, Marco Vieira. 15-16 [doi]
- A new model to capture security threat patterns by complying with standards and lesson learned - Archiving dependability for security assurance casesVaise Patu, Shuichiro Yamamoto. 17-18 [doi]
- Monitoring system calls for anomaly detection in modern operating systemsShayan Eskandari, Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Mario Couture. 19-20 [doi]
- Non-operational testing of software for security issuesShweta Subramani, Mladen A. Vouk, Laurie A. Williams. 21-22 [doi]
- Using software reliability models for security assessment - Verification of assumptionsDa Young Lee, Mladen A. Vouk, Laurie A. Williams. 23-24 [doi]
- Dependability of open systemsYasuhiko Yokote, Tatsumi Nagayama. 25-35 [doi]
- Conditional software specification & assurance: A practical assessment of contract-based approachesMarc Förster. 36 [doi]
- ARRL: A criterion for compositional safety and systems engineering: A normative approach to specifying componentsEric Verhulst, Bernhard H. C. Sputh. 37-44 [doi]
- Using ODC to diagnose an Agile enterprise application development projectRam Chillarege. 45 [doi]
- International standardization of Open Systems DependabilityHiroki Takamura. 46 [doi]
- Radio Diagnostic tool: IDoctorWei Hoo Chong. 47-48 [doi]
- Improving reliability of data protection software with integrated multilayered fault Injection testingR. K. Gupta. 49 [doi]
- A novel mechanism to continuously scan field logs and gain real-time feedbackKishore Vinod, Manjunath Ramachandra, Prashanth Pai, Santosh Yalawar. 50-52 [doi]
- Using capture-recapture models to make objective post-inspection decisionsGursimran Singh Walia, Jeffrey C. Carver. 54 [doi]
- To branch or not to branch that is the questionBrendan Murphy, Laurie A. Williams. 55 [doi]
- Design of a dependable peer-to-peer system for numerical optimizationHrishikesh Dewan, Raksha B. Nayak. 56 [doi]
- Smart defect classification for better analysis using tagging mechanismsSeema Meena, Uma M. Balasubramani. 57 [doi]
- Directed graph as a model for unit testingLakshmankumar Mukkavilli. 58 [doi]
- Automating software validation of a GPON networkAline Cristine Fadel, Regina Lúcia de Oliveira Moraes, Paulo Martins, Eliane Martins. 59 [doi]
- Predicting multi-platform release qualityPete Rotella, Satyabrata Pradhan. 60 [doi]
- Detection of missing requirements using base requirements pairsArbi Ghazarian. 61-80 [doi]
- Computational modeling to detect software sabotage: A discussion of technical challenges and a demonstration of innovative technologySuresh C. Kothari. 81 [doi]
- Reliability feedback through system log analysisKishore Vinod, Pandit Pattabhirama, Manjunath Ramachandra. 82-83 [doi]
- Fault-class-aware fault tree generation and analysisAnn T. Tai, Chris J. Walter, Lorraine M. Fesq, John C. Day. 84 [doi]
- Modeling of Failure detection and recovery in SysMLMyron Hecht, J. Tamaki, D. Lo. 85-95 [doi]
- A statistical approach for software resource leak detection and predictionJinghui Li, Xuewen Gong, Jianqing Yuan. 96 [doi]
- Space systems modeling using the Architecture Analysis & Design Language (AADL)Michela Munoz. 97-98 [doi]
- Diagnosing development software release to predict field failuresKishore Vinod, Manjunath Ramachandra, Santosh Yalawar, Pandit Pattabhirama. 99-101 [doi]
- Failure data analytics to build failure prediction mechanismsPattabhirama Dey, Kandathil K. Jacob, Javier A. Lopez, Kishor S. Trivedi. 102-103 [doi]
- Predicting field experience of releases on specific platformsPete Rotella, Devesh Goyal, Sunita Chulani. 105 [doi]
- Forensic study of the Curiosity Flight Software anomaliesRon Morillo, John Lai, Leila Meshkat. 106 [doi]
- Using error information to improve software qualityGursimran Singh Walia, Jeffrey C. Carver. 107 [doi]
- Mining A change history to quickly identify bug locations : A case study of the Eclipse projectChakkrit Tantithamthavorn, Rattamont Teekavanich, Akinori Ihara, Ken-ichi Matsumoto. 108-113 [doi]
- Coincidental correctness: An interference or interface to successful fault localization?Zheng Zheng, Yichao Gao, Peng Hao, Zhenyu Zhang. 114-119 [doi]
- Cues for scent intensification in debuggingAlexandre Perez, Rui Abreu. 120-125 [doi]
- Bug localisation through diverse sources of informationSteven Davies, Marc Roper. 126-131 [doi]
- Mutation-based spreadsheet debuggingBirgit Hofer, Franz Wotawa. 132-137 [doi]
- An empirical study on clustering for isolating bugs in fault localizationYanqin Huang, Junhua Wu, Yang Feng, Zhenyu Chen, Zhihong Zhao. 138-143 [doi]
- Program behavior characterization and clustering: An empirical study for failure clusteringDanqing Zhang, Jianhui Jiang, Linbo Chen. 144-149 [doi]
- Scalable isolation of failure-inducing changes via version comparisonMohammadreza Ghanavati, Artur Andrzejak, Zhen Dong. 150-156 [doi]
- Improving the accuracy of static analysis based on state partitionDalin Zhang, Hailong Zhang, Dahai Jin, Yunzhan Gong. 157-161 [doi]
- Automated diagnosis of software misconfigurations based on static analysisZhen Dong, Mohammadreza Ghanavati, Artur Andrzejak. 162-168 [doi]
- Integration of software reliability engineering, risk management and safety assurance caseFubin Wu. 169-192 [doi]
- Medical device software risk assessment requires cross functional personnelAlfred Granger, Paul R. Garrett, Gary Dalmadge. 193-210 [doi]
- An extended notation of FTA for risk assessment of software-intensive medical devices.: Recognition of the risk class before and after the risk control measureYoshio Sakai, Seiko Shirasaka, Yasuharu Nishi. 211-216 [doi]
- Safety assessment of software-intensive medical devices: Introducing a safety quality model approachRasmus Adler, Sören Kemmann, Djalma de Melo Carvalho Filho, José Augusto Oliveira Neto. 217-222 [doi]
- Testing distortion estimations in Retinal ProsthesesMahadevan Subramaniam, Parvathi Chundi, Abhilash Muthuraj, Eyal Margalit. 223-242 [doi]
- Use software reliability growth models wiselyYuan Wei. 243-262 [doi]
- Performance degradation analysis of a supercomputerDomenico Cotroneo, Flavio Frattini, Roberto Natella, Roberto Pietrantuono. 263-268 [doi]
- On the effectiveness of Mann-Kendall test for detection of software agingFumio Machida, Artur Andrzejak, Rivalino Matias, Elder V. P. Sobrinho. 269-274 [doi]
- Software rejuvenation impacts on a phased-mission system for Mars explorationStefano Ballerini, Laura Carnevali, Marco Paolieri, Kumiko Tadano, Fumio Machida. 275-280 [doi]
- Estimating response time distribution of server application in software aging phenomenonHiroyuki Okamura, Chao Luo, Tadashi Dohi. 281-284 [doi]
- Comparing four case studies on Bohr-Mandel characteristics using ODCRam Chillarege. 285-289 [doi]
- Identifying silent failures of SaaS services using finite state machine based invariant analysisGeetika Goel, Arpan Roy, Rajeshwari Ganesan. 290-295 [doi]
- A new method of consensus building for open systems dependabilityYukiko Yanagisawa, Takashi Ito, Makoto Takeyama, Yasuhiko Yokote. 296-302 [doi]
- A chain of accountabilities in open systems based on assured entrustmentsMakoto Hirai, Yoshifumi Yuasa, Yoshiki Kinoshita. 303-310 [doi]
- A method for assuring service grade with Assurance case: An experiment on a portal serviceMiki Masumoto, Tatsuya Tokuno, Shuichiro Yamamoto. 311-314 [doi]
- A comparative study of d∗framework and GSNTakuya Saruwatari, Shuichiro Yamamoto, Yutaka Matsuno. 315-320 [doi]
- Exploring possibilities to analyse microblogs for dependability information in variability-intensive open source software systemsMatthias Galster, Dan Tofan. 321-325 [doi]
- D-Script : Dependable scripting with DEOS processKimio Kuramitsu. 326-330 [doi]
- Qualitative comparison of aerospace standards: An objective approachAndrea Ceccarelli, Nuno Silva. 331-336 [doi]
- Accelerated reliability testing approach for high-reliablity software based on the reinforced operational profileQiuying Li, Lei Luo, Jian Wang. 337-342 [doi]
- An improved SFMEA method integrated with assistive techniquesXu Lili, Zhang Hong. 343-348 [doi]
- Requirements engineering in rail transit production: An experience reportFernanda Buonanno, Domenico Di Leo, Paolo di Paolo, Roberto Pietrantuono, Stefano Russo. 349-352 [doi]
- Qualitative analysis of state/event fault trees for supporting the certification process of software-intensive systemsMichael Roth, Peter Liggesmeyer. 353-358 [doi]
- Strong and weak contract formalism for third-party component reuseIrfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson. 359-364 [doi]
- Safety contract based design of software componentsAndreas Söderberg, R. Johansson. 365-370 [doi]
- A monitoring and testing framework for critical off-the-shelf applications and servicesNuno Antunes, Francesco Brancati, Andrea Ceccarelli, Andrea Bondavalli, Marco Vieira. 371-374 [doi]
- Evidence arguments for using formal methods in software certificationEwen Denney, Ganesh Pai. 375-380 [doi]
- Reference architecture for high dependability on-board computersNuno Silva, Alexandre Esper, Ricardo Barbosa, Johan Zandin, Claudio Monteleone. 381-386 [doi]
- Taking a page from the law books: Considering evidence weight in evaluating assurance case confidenceSilviya Grigorova, T. S. E. Maibaum. 387-390 [doi]