Abstract is missing.
- On Adaptive Sampling-Based Testing for Software Reliability AssessmentRoberto Pietrantuono, Stefano Russo. 1-11 [doi]
- Experience Report: Automated System Level Regression Test Prioritization Using Multiple FactorsPer Erik Strandberg, Daniel Sundmark, Wasif Afzal, Thomas J. Ostrand, Elaine J. Weyuker. 12-23 [doi]
- Frequent Subgraph Based Familial Classification of Android MalwareMing Fan, Jun Liu, Xiapu Luo, Kai Chen, Tianyi Chen, Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu. 24-35 [doi]
- SCOUT: A Multi-objective Method to Select Components in Designing Unit TestingEduardo Noronha de Andrade Freitas, Celso Gonçalves Camilo-Junior, Auri Marcelo Rizzo Vincenzi. 36-46 [doi]
- The Effect of Test Suite Type on Regression Test SelectionNima Dini, Allison Sullivan, Milos Gligoric, Gregg Rothermel. 47-58 [doi]
- WAP: A Novel Automatic Test Generation Technique Based on Moth Flame OptimizationAya S. Metwally, Eman Hosam, Marwa M. Hassan, Sarah M. Rashad. 59-64 [doi]
- Using a Cognitive Psychology Perspective on Errors to Improve Requirements Quality: An Empirical InvestigationVaibhav K. Anu, Gursimran Singh Walia, Wenhua Hu, Jeffrey C. Carver, Gary L. Bradshaw. 65-76 [doi]
- On the Personality Traits of GitHub ContributorsAyushi Rastogi, Nachiappan Nagappan. 77-86 [doi]
- WAP: Understanding the Brain at Software DebuggingJoão Durães, Henrique Madeira, J. Castelhano, C. Duarte, M. Castelo Branco. 87-92 [doi]
- Distance-Integrated Combinatorial TestingEun-Hye Choi, Cyrille Artho, Takashi Kitamura, Osamu Mizuno, Akihisa Yamada 0002. 93-104 [doi]
- Evaluating the Effects of Compiler Optimizations on Mutation Testing at the Compiler IR LevelFarah Hariri, August Shi, Hayes Converse, Sarfraz Khurshid, Darko Marinov. 105-115 [doi]
- Automatically Classifying Test Results by Semi-Supervised LearningRafig Almaghairbe, Marc Roper. 116-126 [doi]
- Combining Word Embedding with Information Retrieval to Recommend Similar Bug ReportsXinli Yang, David Lo, Xin Xia, Lingfeng Bao, Jianling Sun. 127-137 [doi]
- Experience Report: Understanding Cross-Platform App Issues from User ReviewsYichuan Man, Cuiyun Gao, Michael R. Lyu, Jiuchun Jiang. 138-149 [doi]
- CoLUA: Automatically Predicting Configuration Bug Reports and Extracting Configuration OptionsWei Wen, Tingting Yu, Jane Huffman Hayes. 150-161 [doi]
- RRF: A Race Reproduction Framework for Use in Debugging Process-Level RacesSupat Rattanasuksun, Tingting Yu, Witawas Srisa-an, Gregg Rothermel. 162-172 [doi]
- Cause Points Analysis for Effective Handling of AlarmsTukaram Muske, Uday P. Khedker. 173-184 [doi]
- ORPLocator: Identifying Read Points of Configuration Options via Static AnalysisZhen Dong, Artur Andrzejak, David Lo, Diego Costa. 185-195 [doi]
- Anomaly Detection and Root Cause Localization in Virtual Network FunctionsCarla Sauvanaud, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun. 196-206 [doi]
- Experience Report: System Log Analysis for Anomaly DetectionShilin He, Jieming Zhu, Pinjia He, Michael R. Lyu. 207-218 [doi]
- SV-AF - A Security Vulnerability Analysis FrameworkSultan S. Al-Qahtani, Ellis E. Eghan, Juergen Rilling. 219-229 [doi]
- Proving Concurrent Data Structures LinearizableVineet Singh, Iulian Neamtiu, Rajiv Gupta. 230-240 [doi]
- Detecting, Exposing, and Classifying Sequential Consistency ViolationsMohammad Majharul Islam, Abdullah Muzahid. 241-252 [doi]
- Approximate Lock: Trading off Accuracy for Performance by Skipping Critical SectionsRiad Akram, Mohammad Mejbah Ul Alam, Abdullah Muzahid. 253-263 [doi]
- Goal-Driven Deception Tactics DesignCristiano De Faveri, Ana Moreira, Vasco Amaral. 264-275 [doi]
- Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized EnvironmentsAleksandar Milenkoski, K. R. Jayaram, Nuno Antunes, Marco Vieira, Samuel Kounev. 276-286 [doi]
- Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention ActionsEdward Condon, Michel Cukier. 287-297 [doi]
- MHCP Model for Quality Evaluation for Software Structure Based on Software Complex NetworkYuwei Yang, Jun Ai, Xue-Lin Li, W. Eric Wong. 298-308 [doi]
- The Impact of Feature Selection on Defect Prediction Performance: An Empirical ComparisonZhou Xu, Jin Liu, Zijiang Yang, Gege An, Xiangyang Jia. 309-320 [doi]
- Experience Report: Practical Software Availability Prediction in Telecommunication IndustryKazuhiro Okumoto. 321-331 [doi]
- Dodging Unsafe Update Points in Java Dynamic Software Updating SystemsWalter Cazzola, Mehdi Jalili. 332-341 [doi]
- Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead InstrumentationJierui Liu, Tianyong Wu, Jun Yan, Jian Zhang. 342-352 [doi]
- Predicting Consistent Clone ChangeFanlong Zhang, Siau-Cheng Khoo, Xiaohong Su. 353-364 [doi]
- Failure Models for Testing Continuous ControllersDominik Holling, Alvin Stanescu, Kristian Beckers, Alexander Pretschner, Matthias Gemmar. 365-375 [doi]
- Evaluation Metrics of Service-Level Reliability Monitoring Rules of a Big Data ServiceKeun Soo Yim. 376-387 [doi]
- Bear: A Framework for Understanding Application Sensitivity to OS (Mis) BehaviorRuimin Sun, Andrew Lee, Aokun Chen, Donald E. Porter, Matt Bishop, Daniela Oliveira. 388-399 [doi]
- Switching to Git: The Good, the Bad, and the UglySascha Just, Kim Herzig, Jacek Czerwonka, Brendan Murphy. 400-411 [doi]
- Does Geographical Distance Effect Distributed Development Teams: How Aggregation Bias in Software Artifacts Causes Contradictory FindingsThanh H. D. Nguyen, Bram Adams, Ahmed E. Hassan. 412-423 [doi]
- Experience Report: An Empirical Study of API Failures in OpenStack Cloud EnvironmentsPooya Musavi, Bram Adams, Foutse Khomh. 424-434 [doi]
- Domain Arguments in Safety Critical Software DevelopmentJonathan C. Rowanhill, John C. Knight. 435-444 [doi]
- Experience Report: Model-Based Test Automation of a Concurrent Flight Software BusDharmalingam Ganesan, Mikael Lindvall, Stefan Hafsteinsson, Rance Cleaveland, Susanne L. Strege, Walter Moleski. 445-454 [doi]
- Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling DebuggingArmando Miraglia, Dirk Vogt, Herbert Bos, Andy Tanenbaum, Cristiano Giuffrida. 455-466 [doi]
- Risk Assessment of User-Defined Security Configurations for Android DevicesDaniel Vecchiato, Marco Vieira, Eliane Martins. 467-477 [doi]
- Software Aging Analysis of the Android Mobile OSDomenico Cotroneo, Francesco Fucci, Antonio Ken Iannillo, Roberto Natella, Roberto Pietrantuono. 478-489 [doi]
- Experience Report: Detecting Poor-Responsive UI in Android ApplicationsYu Kang, Yangfan Zhou, Min Gao, Yixia Sun, Michael R. Lyu. 490-501 [doi]