Abstract is missing.
- An Overview of Numalis Software Suite for Reliable Numerical ComputationArnault Ioualalen, Matthieu Martel, Nicolas Normand. 1-4 [doi]
- Industrial Evaluation of Search-Based Test Generation Techniques for Control SystemsFlorian Hauer, Alexander Pretschner, Maximilian Schmitt, Markus Groetsch. 5-8 [doi]
- Reliable Inspection of an Autonomous System At System Runtime with Built-in Data ProbesJoachim Fröhlich, Christoph Stückjürgen. 9-11 [doi]
- Gherkin Syntax Extension for Parameterization of Network Switch Configurations in Test SpecificationTianyao Li, Shigeru Tsubota, Koji Hirono. 12-14 [doi]
- CrashOS: Hypervisor Testing ToolAnais Gantet. 15 [doi]
- A Configurable Validation Environment for Refactored Embedded Software: An Application to the Vertical Transport DomainGoiuria Sagardui, Leire Etxeberria, Joseba Andoni Agirre, Aitor Arrieta, Carlos Fernando Nicolas, Jose-Maria Martin. 16-19 [doi]
- Assert Use and Defectiveness in Industrial CodeSteve Counsell, Tracy Hall, Thomas Shippey, David Bowes, Amjed Tahir, Stephen G. MacDonell. 20-23 [doi]
- A Static Analyzer for Industrial Robotic ApplicationsAvijit Mandal, Raoul Jetley, Meenakshi DSouza, Sreeja Nair. 24-27 [doi]
- GUI-Profiling for Performance and Coverage AnalysisNico Beierle, Peter M. Kruse, Tanja E. J. Vos. 28-31 [doi]
- IV&V Case: Empirical Study of Software Independent Verification and Validation Based on Safety CaseKazuki Kakimoto, Kensuke Sasaki, Hiroki Umeda, Yasushi Ueda. 32-35 [doi]
- Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in AndroidSung-Hoon Lee, Seung-Hyun Kim, Soo-Hyung Kim, Seung Hun Jin. 36-39 [doi]
- A Practical Approach Towards Validating HIL Simulation of a Safety-Critical SystemAthanasios Stratis, Adnan Causevic. 40-43 [doi]
- Getting Defect Prediction Into Industrial Practice: the ELFF ToolDavid Bowes, Steve Counsell, Tracy Hall, Jean Petric, Thomas Shippey. 44-47 [doi]
- Rich Network Anomaly Detection Using Multivariate DataVeena B. Mendiratta, Marina Thottan. 48-51 [doi]
- Diagnosing Development Turbulence in Agile ProcessesRam Chillarege. 52-55 [doi]
- Experience Report: Testing Private Cloud Reliability Using a Public Cloud Validation SaaSAniket Malatpure, Faraz Qadri, John Haskin. 56 [doi]
- BRACE: Cloud-Based Software Reliability AssuranceKazuhira Okumoto, Abhaya Asthana, Rashid Mijumbi. 57-60 [doi]
- SRC Ratio Method: Benchmarking Software ReliabilityPete Rotella, Sunita Chulani. 61-64 [doi]
- A Comparative Study of Static Analysis Tools for AUTOSAR Automotive Software Components DevelopmentAlfredo Imparato, Raffaele Rodolfo Maietta, Stefano Scala, Vladimiro Vacca. 65-68 [doi]
- Principles for Systematic Development of an Assurance Case Template from ISO 26262Thomas Chowdhury, Chung-Wei Lin, BaekGyu Kim, Mark Lawford, Shinichi Shiraishi, Alan Wassyng. 69-72 [doi]
- Control Parameter Optimization for Autonomous Vehicle Software Using Virtual PrototypingSiyuan Dai, Joseph Hite, Takato Masuda, Yusuke Kashiba, Nikos Arechiga, Shinichi Shiraishi, Scott Eisele, Jason Scott, Ted Bapty. 73-76 [doi]
- Visualization of Specification Coverage: A Case Study of a Web Application Development in IndustryHiroyuki Nakagawa, Toshinobu Hasegawa, Shori Matsui, Tatsuhiro Tsuchiya. 77-80 [doi]
- Applying software reliability engineering process to software development in Korea defense industryTaehyoun Kim, Samjoon Park, Taeho Lee. 81 [doi]
- Towards Embedded System Agile Development Challenging Verification, Validation and Accreditation: Application in a Healthcare CompanyClément Duffau, Bartosz Grabiec, Mireille Blay-Fornarino. 82-85 [doi]
- SIRIUS: Systematic Investigation for Reliability Improvement Upon SoftwareSamjoon Park, Taehyoun Kim, Taeho Lee, Sungkyu Noh. 86-87 [doi]
- Testing Proportional-Integral-Derivative (PID) Controller with Metamorphic TestingKun Qiu, Zheng Zheng, Tsong Yueh Chen. 88-89 [doi]
- Identifying Failed Test Cases Through Metamorphic TestingZhanwei Hui, Song Huang, Tsong Yueh Chen, Man Fai Lau, Sebastian Ng. 90-91 [doi]
- The Future of Automated Debugging - Focus on the Niches FirstFranz Wotawa. 92-93 [doi]
- Integrating Safety-Aware Route Optimisation and Run-Time Safety Monitoring in Controlling Swarms of DronesAmin Majd, Elena Troubitsyna. 94-95 [doi]
- MASSE: Modular Automated Syntactic Signature ExtractionFabrizio Biondi, François Déchelle, Axel Legay. 96-97 [doi]
- Why Securing Your Code Architecture: Detection of Architectural Vulnerabilities in Industrial ProductsIsabelle Michard. 98-99 [doi]
- Benchmarking the Security of Virtualization Infrastructures: Motivation and ApproachCharles Ferreira Goncalves. 100-103 [doi]
- Model-Based Architecture Robustness Analysis for Software-Intensive Autonomous SystemsSebastian Dieter Krach. 104-107 [doi]
- Finite State Machine Testing Complete Round-Trip Versus Transition Trees: On the Road of Finding the Most Effective CriterionHoda Khalil. 108-111 [doi]
- First Insights into Testing Autonomous Robot in Virtual WorldsClement Robert. 112-115 [doi]
- Towards Multi-layered Reliability Analysis in Smart GridsStanislav Chren. 116-119 [doi]
- Living Safety Arguments for Open SystemsCarmen Cârlan. 120-123 [doi]
- Interactive Runtime Verification - A Ph.D to Improve Bug Detection and UnderstandingRaphaël Jakse. 124-127 [doi]
- Multi-level Isolation for Android ApplicationsGuillaume Averlant. 128-131 [doi]
- Adding Correctness Checking to Test Automation PlatformAlberto Salmerón, Leticia Lavado, María-del-Mar Gallardo, Pedro Merino Gómez. 132-138 [doi]
- Analytics-Enhanced Automated Code Verification for Dependability of Software-Defined NetworksLalita Jategaonkar Jagadeesan, Veena B. Mendiratta. 139-145 [doi]
- Using TLA+ in the Development of a Safety-Critical Fault-Tolerant MiddlewareStefan Resch, Michael Paulitsch. 146-152 [doi]
- Safety Verification of Modern Railway Signalling with the SafeCap PlatformPaulius Stankaitis, Alexei Iliasov. 153-156 [doi]
- An IDE for the Design, Verification and Implementation of Security ProtocolsRemi Garcia, Paolo Modesti. 157-163 [doi]
- Experiences with Academic-Industrial Collaboration on Empirical Studies of Software SystemsElaine J. Weyuker, Thomas J. Ostrand. 164-168 [doi]
- Empirical Study on Recognition of Project Situations by Monitoring Application Results of Software Reliability Growth ModelKiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Takayoshi Suzuki. 169-174 [doi]
- Revisiting the Practical Use of Automated Software Fault Localization TechniquesAaron Ang, Alexandre Perez, Arie van Deursen, Rui Abreu. 175-182 [doi]
- Back-in-Time Debugging in Heterogeneous Software StacksArian Treffer, Matthias Uflacker. 183-190 [doi]
- Qualitative Deviation Models for Spreadsheet DebuggingBirgit Hofer, Iulia Nica, Franz Wotawa. 191-198 [doi]
- Removing Coincidental Correctness in Spectrum-Based Fault Localization for Circuit and Spreadsheet DebuggingBirgit Hofer. 199-206 [doi]
- How is IF Statement Fixed Through Code Review? A Case Study of Qt ProjectYuki Ueda, Akinori Ihara, Toshiki Hirao, Takashi Ishio, Kenichi Matsumoto. 207-213 [doi]
- Empirical Study of Abnormalities in Local Variables of Change-Prone Java MethodsHirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara. 214-221 [doi]
- Workload Dependent Fault AnalysisMehul Nalin Vora, Manoj Karunakaran Nambiar. 222-227 [doi]
- Accelerated Simulated Fault Injection TestingEmilia Cioroaica, Jasmin Jahic, Thomas Kuhn, Christian Peper, Denis Uecker, Christoph Dropmann, Peter Munk, Rakshith Amarnath, Eike Thaden. 228-233 [doi]
- Estimation of the Total Number of Software Failures from Test Data and Code Coverage: A Bayesian ApproachHarald A. Stieber, Linghuan Hu, W. Eric Wong. 234-238 [doi]
- Toward an Embedded Multi-agent System Methodology and Positioning on TestingCamille Barnier, Oum-El-Kheir Aktouf, Annabelle Mercier, Jean-Paul Jamont. 239-244 [doi]
- Trigger and Impact Profiles Enable Outcome Focused Defect Discovery to Manage Software QualityRam Chillarege. 245-251 [doi]
- Detection of Memory Leaks in C/C++ Code via Machine LearningArtur Andrzejak, Felix Eichler, Mohammad Ghanavati. 252-258 [doi]
- The Automatic Classification of Fault Trigger Based Bug ReportXiaoting Du, Zheng Zheng, Guanping Xiao, Beibei Yin. 259-265 [doi]
- Monitoring and Mitigating Software Aging on IBM Cloud Controller SystemHarish Sukhwani, Rivalino Matias, Kishor S. Trivedi, Andy Rindos. 266-272 [doi]
- A Rejuvenation Strategy in AndroidCaisheng Weng, Dongdong Zhao, Liping Lu, Jianwen Xiang, Chunhui Yang, Dong Li. 273-279 [doi]
- Efficient Software Rejuvenation of In-memory Key-Value StoragesYuto Jumonji, Hiroshi Yamada. 280-285 [doi]
- Challenges in Certification of Autonomous Driving SystemsFabio Falcini, Giuseppe Lami. 286-293 [doi]
- Observation Based Creation of Minimal Test Suites for Autonomous VehiclesChristian Wolschke, Thomas Kuhn, H. Dieter Rombach, Peter Liggesmeyer. 294-301 [doi]
- Establishing Verification and Validation Objectives for Safety-Critical Bayesian NetworksMark Douthwaite, Tim Kelly. 302-309 [doi]
- Non-determinism and Failure Modes in Machine LearningJose M. Faria. 310-316 [doi]
- Towards Efficiently Checking Compliance Against Automotive Security and Safety StandardsJulieth Patricia Castellanos Ardila, Barbara Gallina. 317-324 [doi]
- Pioneering the Creation of ISO 26262-Compliant OSLC-Based Safety CasesBarbara Gallina, Mattias Nyberg. 325-330 [doi]
- A Layered Argument Strategy for Software Security Case DevelopmentBiao Xu, Minyan Lu, Dajian Zhang. 331-338 [doi]