Abstract is missing.
- Anomaly detection in computer systems using compressed measurementsTingshan Huang, Nagarajan Kandasamy, Harish Sethu. 1-11 [doi]
- AtomChase: Directed search towards atomicity violationsMahdi Eslamimehr, Mohsen Lesani. 12-23 [doi]
- Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysisMostafa Farshchi, Jean-Guy Schneider, Ingo Weber, John C. Grundy. 24-34 [doi]
- PAID: Prioritizing app issues for developers by tracking user reviews over versionsCuiyun Gao, Baoxiang Wang, Pinjia He, Jieming Zhu, Yangfan Zhou, Michael R. Lyu. 35-45 [doi]
- Mutation-based test-case prioritization in software evolutionYiling Lou, Dan Hao, Lu Zhang 0023. 46-57 [doi]
- A similarity-based approach for test case prioritization using historical failure dataTanzeem Bin Noor, Hadi Hemmati. 58-68 [doi]
- Exciting FPGA cryptographic Trojans using combinatorial testingParis Kitsos, Dimitris E. Simos, Jose Torres-Jimenez, Artemios G. Voyiatzis. 69-76 [doi]
- Model generation to support model-based testing applied on the NASA DAT Web-application - An experience reportChristoph Schulze, Mikael Lindvall, Sigurthor Bjorgvinsson, Robert Wiegand. 77-87 [doi]
- Discovering model transformation pre-conditions using automatically generated test modelsJean-Marie Mottu, Sagar Sen, Juan José Cadavid, Benoit Baudry. 88-99 [doi]
- WAP: Unreasonable distributions of execution time under reasonable conditionsDavid Flater. 100-105 [doi]
- WAP: What activates a bug? A refinement of the Laprie terminology modelPeter Tröger, Lena Feinbube, Matthias Werner. 106-111 [doi]
- Using normalized compression distance to measure the evolutionary stability of software systemsDavid Threm, Liguo Yu, Srini Ramaswamy, Sithu D. Sudarsan. 112-120 [doi]
- Towards comprehensive software reliability evaluation in open source softwareHiroyuki Okamura, Tadashi Dohi. 121-129 [doi]
- Conservative claims about the probability of perfection of software-based systemsXingyu Zhao, Bev Littlewood, Andrey Povyakalo, David Wright. 130-140 [doi]
- Experience report: An application-specific checkpointing technique for minimizing checkpoint corruptionGuanpeng Li, Karthik Pattabiraman, Chen-Yong Cher, Pradip Bose. 141-152 [doi]
- Experience report: Memory accesses for avionic applications and operating systems on a multi-core platformAndreas Lofwenmark, Simin Nadjm-Tehrani. 153-160 [doi]
- A safe generic adaptation mechanism for smart carsAlejandra Ruiz, Garazi Juez, Philipp Schleiss, Gereon Weiss. 161-171 [doi]
- Automated resource release in device driversJia-Ju Bai, Yu-Ping Wang, Hu-Qiu Liu, Shi-Min Hu. 172-182 [doi]
- Contrasting exception handling code across languages: An experience report involving 50 open source projectsBenjamin Jakobus, Eiji Adachi Barbosa, Alessandro F. Garcia, Carlos José Pereira de Lucena. 183-193 [doi]
- Experience report: How do techniques, programs, and tests impact automated program repair?Xianglong Kong, Lingming Zhang, W. Eric Wong, Bixin Li. 194-204 [doi]
- Studying the influence of standard compiler optimizations on symbolic executionShiyu Dong, Oswaldo Olivo, Lingming Zhang, Sarfraz Khurshid. 205-215 [doi]
- How hard does mutation analysis have to be, anyway?Rahul Gopinath, Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce. 216-227 [doi]
- Efficient observability-based test generation by dynamic symbolic executionDongjiang You, Sanjai Rayadurgam, Michael W. Whalen, Mats Per Erik Heimdahl, Gregory Gay. 228-238 [doi]
- Boundary value analysis in automatic white-box test generationZhiqiang Zhang, Tianyong Wu, Jian Zhang. 239-249 [doi]
- Experience report: How do structural dependencies influence change propagation? An empirical studyGustavo Ansaldi Oliva, Marco Aurélio Gerosa. 250-260 [doi]
- Experience report: Evaluating the effectiveness of decision trees for detecting code smellsLucas Amorim, Evandro Costa, Nuno Antunes, Baldoino Fonseca, Márcio Ribeiro. 261-269 [doi]
- Efficient elimination of false positives using static analysisTukaram Muske, Uday P. Khedker. 270-280 [doi]
- Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-BYongwang Zhao, Zhibin Yang, David Sanán, Yang Liu. 281-292 [doi]
- Experience report: Formal verification and testing in the development of embedded softwareAndreas Ulrich, Anjelika Votintseva. 293-302 [doi]
- Specifying and verifying real-time self-adaptive systemsMatteo Camilli, Angelo Gargantini, Patrizia Scandurra. 303-313 [doi]
- Experience report: A field analysis of user-defined security configurations of Android devicesDaniel Vecchiato, Eliane Martins. 314-323 [doi]
- WAP: Digital dependability identitiesDaniel Schneider, Mario Trapp, Yiannis Papadopoulos, Eric Armengaud, Marc Zeller, Kai Höfig. 324-329 [doi]
- WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaignsMichael Grottke, Alberto Avritzer, Daniel Sadoc Menasché, Javier Alonso, Leandro Pfleger de Aguiar, Sara G. Alvarez. 330-335 [doi]
- Enhancing privacy protection in fault replication systemsJoão Matos, João Garcia, Paolo Romano. 336-347 [doi]
- SpyAware: Investigating the privacy leakage signatures in app execution tracesHui Xu, Yangfan Zhou, Cuiyun Gao, Yu Kang, Michael R. Lyu. 348-358 [doi]
- Experience report: Can software testing education lead to more reliable code?Otávio Augusto Lazzarini Lemos, Fabiano Cutigi Ferrari, Fábio Fagundes Silveira, Alessandro F. Garcia. 359-369 [doi]
- Experience report: An industrial experience report on test outsourcing practicesXin Xia, David Lo, Pavneet Singh Kochhar, Zhenchang Xing, Xinyu Wang, Shanping Li. 370-380 [doi]
- Software reliability growth model based on Bohrbugs and MandelbugsMartin L. Shooman. 381-386 [doi]
- WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspectiveMarllos P. Prado, Eric Verbeek, Margaret-Anne D. Storey, Auri M. R. Vincenzi. 387-392 [doi]
- UPMOA: An improved search algorithm to support user-preference multi-objective optimizationShuai Wang, Shaukat Ali, Tao Yue, Marius Liaaen. 393-404 [doi]
- Experience report: Mining test results for reasons other than functional correctnessJeff Anderson, Hyunsook Do, Saeed Salem. 405-415 [doi]
- Classifying faulty modules with an extension of the H-indexSandro Morasca. 416-426 [doi]
- Should fixing these failures be delegated to automated program repair?Xuan-Bach D. Le, Tien-Duy B. Le, David Lo. 427-437 [doi]
- Piecing together app behavior from multiple artifacts: A case studyEmily Kowalczyk, Atif M. Memon, Myra B. Cohen. 438-449 [doi]
- Detecting inconsistencies in multi-platform mobile appsMona Erfani Joorabchi, Mohamed Ali, Ali Mesbah 0001. 450-460 [doi]
- SIG-Droid: Automated system input generation for Android applicationsNariman Mirzaei, Hamid Bagheri, Riyadh Mahmood, Sam Malek. 461-471 [doi]
- MoIO: Run-time monitoring for I/O protocol violations in storage device driversDomenico Cotroneo, Luigi De Simone, Francesco Fucci, Roberto Natella. 472-483 [doi]
- Detecting latent cross-platform API violationsJeff Rasley, Eleni Gessiou, Tony Ohmann, Yuriy Brun, Shriram Krishnamurthi, Justin Cappos. 484-495 [doi]
- Discovering specification violations in networked software systemsRobert J. Walls, Yuriy Bruii, Marc Liberatore, Brian Neil Levine. 496-506 [doi]
- Experience report: How do bug characteristics differ across severity classes: A multi-platform studyBo Zhou, Iulian Neamtiu, Rajiv Gupta. 507-517 [doi]
- Experience report: A characteristic study on out of memory errors in distributed data-parallel applicationsLijie Xu, Wensheng Dou, Feng Zhu, Chushu Gao, Jie Liu, Hua Zhong, Jun Wei. 518-529 [doi]
- Fast reproducing web application errorsJie Wang, Wensheng Dou, Chushu Gao, Jun Wei. 530-540 [doi]
- An evidential reasoning approach for assessing confidence in safety evidenceSunil Nair, Neil Walkinshaw, Tim Kelly, Jose Luis de la Vara. 541-552 [doi]
- Security slicing for auditing XML, XPath, and SQL injection vulnerabilitiesJulian Thomé, Lwin Khin Shar, Lionel C. Briand. 553-564 [doi]
- Pushing the limits on automation in GUI regression testingZebao Gao, Chunroiig Fang, Atif M. Memon. 565-575 [doi]