Abstract is missing.
- Soft-LLFI: A Comprehensive Framework for Software Fault InjectionMaryam Raiyat Aliabadi, Karthik Pattabiraman, Nematollah Bidokhti. 1-5 [doi]
- Fault Injection Experiments with the CLAMR Hydrodynamics Mini-AppBrian Atkinson, Nathan DeBardeleben, Qiang Guan, Robert Robey, William M. Jones. 6-9 [doi]
- Event Logging in an Industrial Development Process: Practices and Reengineering ChallengesFabio Baccanico, Gabriella Carrozza, Marcello Cinque, Domenico Cotroneo, Antonio Pecchia, Agostino Savignano. 10-13 [doi]
- Event Based Robot Prognostics Using Principal Component AnalysisV. Sathish, Sithu D. Sudarsan, Srini Ramaswamy. 14-17 [doi]
- Proving Model Equivalence in Model Based DesignAshlie B. Hocking, John C. Knight, M. Anthony Aiello, Shinichi Shiraishi. 18-21 [doi]
- Developing Software Reliability Models in the Architecture Phase of the Software LifecycleAlberto Avritzer, Andre B. Bondi. 22-23 [doi]
- Architecture for a Hard-Real-Time System Enabling Non-intrusive TestsJoachim Froehlich, Reiner Schmid. 24 [doi]
- Handling Soft Error in Embedded Software for Networking SystemHaihong Henry Zhu. 25-28 [doi]
- Safety Critical Robot Programming and Testing for Operations in Industrial Co-ProductionLinn Gustavsson Christiernin, Svante Augustsson, Stefan Christiernin. 29-32 [doi]
- NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber AttacksStefano Avallone, Gabriella Carrozza, Marcello Cinque, Raffaele Della Corte, Antonio Marotta, Antonio Pecchia, Agostino Savignano. 33-36 [doi]
- Network Function Virtualization: Challenges and Directions for Reliability AssuranceDomenico Cotroneo, L. De Simone, A. K. Iannillo, Anna Lanzaro, Roberto Natella, Jiang Fan, Wang Ping. 37-42 [doi]
- Towards an Evaluation Framework for Availability Solutions in the CloudMohammadmajid Hormati, Ferhat Khendek, Maria Toeroe. 43-46 [doi]
- Verifying Response Times in Networked Automation Systems Using Jitter BoundsSeshadhri Srinivasan, Furio Buonopane, Srini Ramaswamy, Juri Vain. 47-50 [doi]
- Performability Comparison of Lustre and HDFS for MR ApplicationsRekha Singhal, Manoj K. Nambiar, Harish Sukhwani, Kishor S. Trivedi. 51 [doi]
- Reliability Models for the Internet of Things: A Paradigm ShiftMudasir Ahmad. 52-59 [doi]
- Predicting Release QualityPete Rotella, Sunita Chulani. 60-61 [doi]
- Automated Generation of Failure Modes and Effects Analysis from SysML ModelsMyron Hecht, Emily Dimpfl, Julia Pinchak. 62-65 [doi]
- MBT for Global Platform Compliance Testing: Experience Report and Lessons LearnedGil Bernabeu, Eddie Jaffuel, Bruno Legeard, Fabien Peureux. 66-70 [doi]
- Assessing the Threat Landscape for Software LibrariesRaghudeep Kannavara. 71-76 [doi]
- Security Evaluation of a Linux System: Common Criteria EAL4+ Certification ExperienceLuca Recchia, Giuseppe Procopio, Andrea Onofrii, Francesco Rogo. 77-81 [doi]
- Balanced Measurement Sets: Criteria for Improving Project Management PracticesLuigi Buglione, Daniele Gagliardi, Sergio Oltolina, Gabriele Ruffatti, Ernesto Damiani, Fulvio Frati. 82-85 [doi]
- CAMDIT: A Toolkit for Integrating Heterogeneous Data for Enhanced Service ProvisioningIpadeola Abayomi, Ipadeola Oladipupo, Ahmed Ameen, Sadiku Joseph. 86-91 [doi]
- Applying Metrics to Identify and Monitor Technical Debt Items during Software EvolutionClauirton de Siebra, Antonio L. O. Cavalcanti, Fabio Q. B. da Silva, Andre L. M. Santos, Tatiana B. Gouveia. 92-95 [doi]
- Quantitative Evaluation of Static Analysis ToolsShinichi Shiraishi, Veena Mohan, Hemalatha Marimuthu. 96-99 [doi]
- Code Analysis as an Enabler for SW Quality Improvement: The SELEX ES SW Engineering ExperienceSalvatore Scervo, Stefano Rosati, Gabriella Carrozza. 100-103 [doi]
- Supporting Reviewing of Warnings in Presence of Shared Variables: Need and EffectivenessTukaram Muske. 104-107 [doi]
- A Formal Method Applied to the Automated Software Engineering with Quality GuaranteesMarcelo Teixeira, Richardson Ribeiro, Marco A. C. Barbosa, Luciene Marin. 108-111 [doi]
- Planning of Prioritized Test Procedures in Large Integrated Systems: Best Strategy of Defect Discovery and Early Stop of Testing Session, The Selex-ES ExperienceGianfrancesco Ranieri. 112-113 [doi]
- Understanding DO-178C Software Certification: Benefits Versus CostsVance Hilderman. 114 [doi]
- Challenges in Future Avionic Systems on Multi-Core PlatformsAndreas Lofwenmark, Simin Nadjm-Tehrani. 115-119 [doi]
- Model-Checking Real-Time Properties of an Auto Flight Control System FunctionPierre-Alain Bourdil, Bernard Berthomieu, Eric Jenn. 120-123 [doi]
- Practical Behavioral Inconsistency Detection between Source Code and Specification Using Model CheckingSaeko Matsuura, Yoshitaka Aoki, Shinpei Ogata. 124-125 [doi]
- Early Conflict Detection with Mined ModelsLeonardo Mariani, Daniela Micucci, Fabrizio Pastore. 126-127 [doi]
- Analysis of Functional Software Dependencies through Supervised ExecutionJasmin Jahic, Thomas Kuhn. 128-129 [doi]
- Applying Parameter Value Weighting to a Practical ApplicationSatoshi Fujimoto, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya. 130-131 [doi]
- Regression Testing Approach for Large-Scale SystemsPassant Kandil, Sherin Moussa, Nagwa Badr. 132-133 [doi]
- Automatic Testing Framework for Virtualization EnvironmentChia Hung Kao, Ping-Hsien Chi, Yi-Hsuan Lee. 134-135 [doi]
- Mapping the Software Errors and Effects Analysis Method to ISO26262 Requirements for Software Architecture AnalysisPaulo Victor Carvalho. 136-137 [doi]
- Is Cut Sequence Necessary in Dynamic Fault Trees?Jianwen Xiang, Fumio Machida, Kumiko Tadano, Shigeru Hosono. 138-139 [doi]
- Exploiting Behavior Models for Availability Analysis of Interactive SystemsMaximilian Junker. 140-141 [doi]
- Evaluating Embedded-Software Specifications - Quantitative and Structured Assessment of Declarative Interface DescriptionsMarc Forster. 142-143 [doi]
- Are the Classical Disaster Recovery Tiers Still Applicable Today?Omar H. Alhazmi, Yashwant K. Malaiya. 144-145 [doi]
- Describing Software Specification by Combining SysML with the B MethodSatoko Kinoshita, Hidekazu Nishimura, Hiroki Takamura, Daichi Mizuguchi. 146-151 [doi]
- A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud SystemsJingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Wei Dong. 152-155 [doi]
- Towards Fault Propagation Analysis in Cloud Computing EcosystemsLuigi De Simone. 156-161 [doi]
- Towards Making Safety-Critical Systems Safer: Learning from MistakesNuno Silva, Marco Vieira. 162-167 [doi]
- A Research Agenda for Benchmarking the Resilience of Software Defined NetworksLuis Eduardo Santos, Marília Curado, Marco Vieira. 168-173 [doi]
- Do Injected Faults Cause Real Failures? A Case Study of LinuxNobuo Kikuchi, Takeshi Yoshimura, Ryo Sakuma, Kenji Kono. 174-179 [doi]
- The Definition and Assessment of a Safety ArgumentValentin Cassano, T. S. E. Maibaum. 180-185 [doi]
- Building Blocks for Assurance CasesRobin E. Bloomfield, Kateryna Netkachova. 186-191 [doi]
- Linking Traceability with GSNKenji Taguchi 0001, Souma Daisuke, Hideaki Nishihara, Toshinori Takai. 192-197 [doi]
- Retrieving Information from a Document Repository for Constructing Assurance CasesKhana Chindamaikul, Toshinori Takai, Hajimu Iida. 198-203 [doi]
- A Model-Driven Safety Certification Method for Process ComplianceBarbara Gallina. 204-209 [doi]
- A Technique for Demonstrating Safety and Correctness of Program Translators: Strategy and Case StudyJunbeom Yoo, Jong-Gyun Choi, Young-Jun Lee, Jang-Soo Lee. 210-215 [doi]
- SCT: A Safety Case ToolkitM. Anthony Aiello, Ashlie B. Hocking, John C. Knight, Jonathan C. Rowanhill. 216-219 [doi]
- A Security Argument Pattern for Medical Device Assurance CasesAnita Finnegan, Fergal McCaffery. 220-225 [doi]
- Arguing Software Compliance with ISO 26262Ashlie B. Hocking, John C. Knight, M. Anthony Aiello, Shinichi Shiraishi. 226-231 [doi]
- Pinpointing Failure Inducing Event OrderingsHanefi Mercan, Cemal Yilmaz. 232-237 [doi]
- Trace Reduction and Pattern Analysis to Assist Debugging in Model-Based TestingTeemu Kanstrén, Marsha Chechik. 238-243 [doi]
- Program Debugging: Research and PracticeW. Eric Wong. 244 [doi]
- Defect Analysis and Reliability Assessment for Transactional Web ApplicationsWafa Jaffal, Jeff Tian. 245-250 [doi]
- A Memory Model Based on Three-Valued Matrix for Static Defect DetectionQian Wang, Dahai Jin, Yunzhan Gong. 251-256 [doi]
- Debugging with Dynamic Temporal AssertionsZiad A. Al-Sharif, Clinton L. Jeffery, Mahmoud H. Said. 257-262 [doi]
- Spectrum-Based Fault Localization for Spreadsheets: Influence of Correct Output Cells on the Fault Localization QualityBirgit Hofer. 263-268 [doi]
- Studying the Advancement in Debugging Practice of Professional Software DevelopersBenjamin Siegmund, Michael Perscheid, Marcel Taeumel, Robert Hirschfeld. 269-274 [doi]
- Evaluation of Risk for Complex Systems Using Attack SurfaceLeanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin. 275-280 [doi]
- Structuring Compliance Risk Identification Using the CORAS Approach: Compliance as an AssetSamson Yoseph Esayas. 281-286 [doi]
- Towards Safety Risk Assessment of Socio-Technical Systems via Failure Logic AnalysisBarbara Gallina, Edin Sefer, Atle Refsdal. 287-292 [doi]
- Risk Management for Outsourcing to the Cloud: Security Risks and Safeguards as Selection Criteria for Extern Cloud ServicesJohannes Viehmann. 293-295 [doi]
- CRSTIP - An Assessment Scheme for Security Assessment ProcessesArthur-Jozsef Molnar, Jeurgen Grossmann. 296-298 [doi]
- Expressing Best Practices in (Risk) Analysis and Testing of Safety-Critical Systems Using PatternsWolfgang Herzner, Sven Sieverding, Omar Kacimi, Eckard Böde, Thomas Bauer, Brian Nielsen. 299-304 [doi]
- Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML InteractionsGencer Erdogan, Atle Refsdal, Ketil Stølen. 305-310 [doi]
- How Does the UML Testing Profile Support Risk-Based TestingShaukat Ali, Tao Yue, Andreas Hoffmann, Marc-Florian Wendland, Alessandra Bagnato, Etienne Brosse, Markus Schacher, Zhen Ru Dai. 311-316 [doi]
- Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code AttributesBindu Madhavi Padmanabhuni, Hee Beng Kuan Tan. 317-322 [doi]
- Mining Security Vulnerabilities from Linux Distribution MetadataJeffrey Stuckman, James Purtilo. 323-328 [doi]
- Detection of Compromised Email Accounts Used by a Spam Botnet with Country Counting and Theoretical Geographical Travelling Speed Extracted from MetadataCarlo Schafer. 329-334 [doi]
- An Experiment with Conceptual Clustering for the Analysis of Security AlertsAndrea Paudice, Santonu Sarkar, Domenico Cotroneo. 335-340 [doi]
- Failure Prediction of Jobs in Compute Clouds: A Google Cluster Case StudyXin Chen, Charng-da Lu, Karthik Pattabiraman. 341-346 [doi]
- Supporting Decision-Making for Biometric System Deployment through Visual AnalysisCagatay Turkay, Stephen Mason, Ilir Gashi, Bojan Cukic. 347-352 [doi]
- Record and Replay GUI-Based Applications with Less OverheadJoão Matos, Nuno Coracao, João Garcia. 353-358 [doi]
- Combining Black Box Testing with White Box Code Analysis: A Heterogeneous Approach for Testing Enterprise SaaS ApplicationsStefano Rosiello, Amish Choudhary, Arpan Roy, Rajeshwari Ganesan. 359-364 [doi]
- Avoiding Hardware Aliasing: Verifying RISC Machine and Assembly Code for Encrypted ComputingPeter T. Breuer, Jonathan P. Bowen. 365-370 [doi]
- Integrating the Security Aspect into Design Space Exploration of Embedded SystemsIngo Stierand, Sunil Malipatlolla, Sibylle B. Fröschle, Alexander Stühring, Stefan Henkler. 371-376 [doi]
- On the Equivalence of SOA Rollback-Recovery Consistency ModelsAnna Kobusinska, Jerzy Brzezinski. 377-382 [doi]
- Using Invariants for Anomaly Detection: The Case Study of a SaaS ApplicationFlavio Frattini, Santonu Sarkar, Jyotiska Nath Khasnabish, Stefano Russo. 383-388 [doi]
- Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in TurkeyAndrea Di Florio, Nino Vincenzo Verde, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini. 389-394 [doi]
- Finding Domain-Generation Algorithms by Looking at Length DistributionMiranda Mowbray, Josiah Hagen. 395-400 [doi]
- Multi-agent System for APT DetectionWim Mees, Thibault Debatty. 401-406 [doi]
- Power Grid Outlier Treatment through Kalman FilterCesario Di Sarno, Alessia Garofalo, Gianfranco Cerullo, Nadir Murru, Felicita Di Giandomenico, Silvano Chiaradonna. 407-412 [doi]
- Software Rejuvenation in Cloud SystemsAntonio Puliafito. 413 [doi]
- Rejuvenation and the Spread of Epidemics in General TopologiesEitan Altman, Alberto Avritzer, Rachid El Azouzi, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar. 414-419 [doi]
- Detection and Analysis of Performance Deterioration in Mobile Offloading SystemQiushi Wang, Katinka Wolter. 420-425 [doi]
- Software Maintenance Optimization Based on Stackelberg Game MethodsJing Zhao, Yanbin Wang, Gao-Rong Ning, Cheng-Hong Wang, Kishor S. Trivedi, Kai-Yuan Cai, Zhen-yu Zhang. 426-430 [doi]
- The Dual Nature of Software Aging: Twenty Years of Software Aging ResearchStefano Russo. 431-432 [doi]
- Towards Patching Memory Leak Bugs in Off-The-Shelf SoftwareDomenico Cotroneo, Roberto Natella. 433-436 [doi]
- A Novel Hybridization of Artificial Neural Networks and ARIMA Models for Forecasting Resource Consumption in an IIS Web ServerYongquan Yan, Ping Guo, Lifeng Liu. 437-442 [doi]
- A Practice of Forecasting Software Aging in an IIS Web Server Using SVMYongquan Yan, Ping Guo, Lifeng Liu. 443-448 [doi]
- Reducing Web Test Cases Aging by Means of Robust XPath LocatorsMaurizio Leotta, Andrea Stocco, Filippo Ricca, Paolo Tonella. 449-454 [doi]
- An Evaluation of Assuring Test Case Sufficiency Using a D-Case PatternShuichiro Yamamoto, Shuji Morisaki. 455-460 [doi]
- A Supplemental Notation of GSN Aiming for Dealing with Changes of Assurance CasesToshinori Takai, Hiroyuki Kido. 461-466 [doi]
- Run-Time Adaptive Error and State Management for Open Automotive SystemsJelena Frtunikj, Michael Armbruster, Alois Knoll. 467-472 [doi]
- Toward SIL Evaluation for a Resilience StrategyLing Fang, Guoqiang Li, Yingjie You, Chaobin Chen, Liqin Hu. 473-477 [doi]
- Prediction of the Complexity of Code Changes Based on Number of Open bugs, New Feature and Feature ImprovementV. B. Singh, Meera Sharma. 478-483 [doi]
- Assessment Techniques, Certification and [What Else We Need for] Confidence in SoftwareLorenzo Strigini. 484 [doi]
- Argument Evaluation in the Context of Assurance Case Confidence ModelingSilviya Grigorova, T. S. E. Maibaum. 485-490 [doi]
- Towards Certification of Automotive SoftwareCristiana Areias, João Carlos Cunha, Davide Iacono, Francesco Rossi. 491-496 [doi]
- Automotive SPICE Assessments in Safety-Critical Contexts: An Experience ReportGiuseppe Lami, Fabio Falcini. 497-502 [doi]
- Process Model Tailoring and Assessment for Automotive Certification ObjectivesMorayo Adedjouma, Hao Hu. 503-508 [doi]
- Cost Optimisation in Certification of Software Product LinesRicardo J. Rodriguez, Sasikumar Punnekkat. 509-514 [doi]
- Reducing Certification Costs through Assured Dynamic Software ConfigurationNermin Kajtazovic, Andrea Höller, Tobias Rauter, Christian Kreiner. 515-520 [doi]
- Adding Security Concerns to Safety Critical CertificationNicola Nostro, Andrea Bondavalli, Nuno Silva. 521-526 [doi]
- Safety ADD: A Tool for Safety-Contract Based DesignFredrik Warg, Benjamin Vedder, Martin A. Skoglund, Andreas Söderberg. 527-529 [doi]
- Improving Usability of Fault InjectionDomenico Cotroneo, L. De Simone, A. K. Iannillo, Anna Lanzaro, Roberto Natella. 530-532 [doi]