Abstract is missing.
- Use of Self-Healing Techniques to Improve the Reliability of a Dynamic and Geo-Distributed Ad Delivery ServiceNicolas Brousse, Oleksii Mykhailov. 1-5 [doi]
- Trap-Based Software Review: How Will Engineers Embed Bugs Due to Cognitive Error?Aya Ureshino, Yasuharu Nishi, Satomi Yoshizawa, Makoto Nonaka, Makiko Asai. 6-11 [doi]
- Using Supervised Learning to Guide the Selection of Software Inspectors in IndustryManinder Singh, Gursimran Singh Walia, Anurag Goswami. 12-17 [doi]
- UFO - Hidden Backdoor Discovery and Security Verification in IoT Device FirmwareChin-Wei Tien, Tsung-Ta Tsai, Ing-Yi Chen, Sy-Yen Kuo. 18-23 [doi]
- A Smart Context-Aware Program Assistant Based on Dynamic Programming Event ModelingXuejiao Zhao, Hongwei Li, Yutian Tang, Dongjing Gao, Lingfeng Bao, Ching-Hung Lee. 24-29 [doi]
- KEREP: Experience in Extracting Knowledge on Distributed System Behavior through Request Execution PathJing Gu, Long Wang, Yong Yang, Ying Li. 30-35 [doi]
- AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android AppsSung-Hoon Lee, Seung-Hyun Kim, Soohyung Kim, Seung Hun Jin. 36-41 [doi]
- A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443Monika Maidl, Dirk Kröselberg, Jochen Christ, Kristian Beckers. 42-47 [doi]
- A Concept of QCD Prediction and Control in Agile Software Development for Portfolio ManagementKumi Jinzenji, Daisuke Hamuro. 48-52 [doi]
- Training Industry Practitioners to Investigate the Human Error Causes of Requirements FaultsKavitha Manjunath, Vaibhav K. Anu, Gursimran Singh Walia, Gary Bradshaw. 53-58 [doi]
- Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDNRobert S. Hanmer, Lalita Jagadeesan, Veena B. Mendiratta, Heng Zhang. 59-64 [doi]
- SFRAT - An Extendable Software Reliability Assessment ToolAllen P. Nikora, Lance Fiondella, Thierry Wandji. 65-70 [doi]
- A Fault Injection Approach to Evaluate Soft-Error Dependability of System CallsRakshith Amarnath, Shashank Nagesh Bhat, Peter Munk, Eike Thaden. 71-76 [doi]
- Recent Advances in Software Reliability AssuranceRashid Mijumbi, Kazuhira Okumoto, Abhaya Asthana, Jacques Meekel. 77-82 [doi]
- How Reliable Is My Software-Defined Network? Models and Failure ImpactsVeena B. Mendiratta, Lalita Jategaonkar Jagadeesan, Robert S. Hanmer, Muntasir R. Rahman. 83-88 [doi]
- Empirical Study on Tendencies for Unstable Situations in Application Results of Software Reliability Growth ModelKiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Takayoshi Suzuki. 89-94 [doi]
- Challenges and Directions in Security Information and Event Management (SIEM)Marcello Cinque, Domenico Cotroneo, Antonio Pecchia. 95-99 [doi]
- Enhancing HPC System Log Analysis by Identifying Message Origin in Source CodeMegan Hickman, Dakota Fulp, Elisabeth Baseman, Sean Blanchard, Hugh Greenberg, William M. Jones, Nathan DeBardeleben. 100-105 [doi]
- Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault DiagnosisTong Jia, Ying Li, Chengbo Zhang, Wensheng Xia, Jie Jiang, Yuhong Liu. 106-111 [doi]
- Visualisation to Support Fault Localisation in Distributed Embedded Systems within the Automotive IndustryFrancisco Gomes de Oliveira Neto, Michael Jones, Rafael da Silva Martins. 112-117 [doi]
- Using Ontologies for Test Suites Generation for Automated and Autonomous Driving FunctionsFlorian Klück, Yihao Li, Mihai Nica, Jianbo Tao, Franz Wotawa. 118-123 [doi]
- An Approach to Identifying Error Patterns for Infrastructure as CodeWei Chen, Guoquan Wu, Jun Wei 0001. 124-129 [doi]
- Model Checking the Uncertainties in Software Systems Introduced by Intelligent ComponentsZuohua Ding, Wenjie Jiang, Mingyue Jiang, Zhi Jin, He Jiang. 130-131 [doi]
- Evaluation and Construction of Covering Arrays Utilizing Prior InformationRyan Lekivetz, Joseph Morgan. 132-133 [doi]
- Predicting Software Defects Based on Cognitive Error TheoriesFuqun Huang, Lorenzo Strigini. 134-135 [doi]
- Software Reliability Evaluation Method Based on a Software NetworkJun Ai, Wenzhu Su, Fei Wang. 136-137 [doi]
- Probing the Security of DNA OrigamiChase Koehler, Divita Mathur, Eric R. Henderson, Robyn R. Lutz. 138-139 [doi]
- Enhancing the Analysis of Error Propagation and Failure Modes in Cloud SystemsDomenico Cotroneo, Luigi De Simone, Alfonso Di Martino, Pietro Liguori, Roberto Natella. 140-141 [doi]
- An Adaptive PID Control for QoS Management in Cloud Computing SystemSiqian Gong, Beibei Yin, Kai-Yuan Cai. 142-143 [doi]
- Model Fusion: Weighted N-Version Programming for Resilient Autonomous Vehicle Steering ControlAilec Wu, Abu Hasnat Mohammad Rubaiyat, Chris Anton, Homa Alemzadeh. 144-145 [doi]
- ORCAS: Efficient Resilience Benchmarking of Microservice ArchitecturesAndré van Hoorn, Aldeida Aleti, Thomas F. Düllmann, Teerat Pitakrat. 146-147 [doi]
- Dynamic Random Testing Strategy for Test Case Optimization in Cloud EnvironmentHanyu Pei, Beibei Yin, Min Xie. 148-149 [doi]
- Enhancing Security and Reliability for Smart- Systems' ArchitecturesFlorian Hofer. 150-153 [doi]
- Safety Analysis for Highly Automated DrivingTobias Schmid. 154-157 [doi]
- Testing Extract-Transform-Load Process in Data Warehouse SystemsHajar Homayouni. 158-161 [doi]
- Prioritization of Metamorphic Relations Based on Test Case Execution PropertiesMadhusudan Srinivasan. 162-165 [doi]
- Software Reliability Assessment: Modeling and AlgorithmsVidhyashree Nagaraju. 166-169 [doi]
- Modelling, Design and Optimization of Dependable Softwarized Networks for Industrial ApplicationsPetra Vizarreta. 170-173 [doi]
- Taming Exceptions in Android ApplicationsJuliana Oliveira. 174-177 [doi]
- Machine Learning Augmented FuzzingLeonid Joffe. 178-183 [doi]
- Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault LocalizationArpit Christi, Matthew Lyle Olson, Mohammad Amin Alipour, Alex Groce. 184-191 [doi]
- Spectrum-Based Fault Localization for Logic-Based ReasoningIngo Pill, Franz Wotawa. 192-199 [doi]
- SeTCHi: Selecting Test Cases to Improve History-Guided Fault LocalizationLong Zhang, Zhenyu Zhang. 200-207 [doi]
- CFAAR: Control Flow Alteration to Assist RepairChadi Trad, Rawad Abou Assi, Wes Masri, Fadi A. Zaraket. 208-215 [doi]
- DDS: Deadlock Detector and SolverEman Aldakheel, Ugo Buy, Simran Kaur. 216-223 [doi]
- ConfGuru - A System for Fully Automated Debugging of Configuration ErrorsArtur Andrzejak, Matthias Iacsa. 224-231 [doi]
- An Approach for Predicting Bug Report Fields Using a Neural Network Learning ModelKorosh Koochekian Sabor, Mathieu Nayrolles, Abdelaziz Trabelsi, Abdelwahab Hamou-Lhadj. 232-236 [doi]
- Establishment of Methods for Information Security System Policy Using BenchmarkingMartin (Dae Youp) Kang, Ted (Euntae) Lee, SungYong Um. 237-242 [doi]
- The DevSecOps and Agency TheoryJong-Seok Lee. 243-244 [doi]
- Graphite: A Greedy Graph-Based Technique for Regression Test Case PrioritizationMaral Azizi, Hyunsook Do. 245-251 [doi]
- A Literature Review of Software Test Cases and Future ResearchMark L. Gillenson, Xihui Zhang 0001, Thomas F. Stafford, Yao Shi. 252-256 [doi]
- Software Aging and Rejuvenation in the Cloud: A Literature ReviewRoberto Pietrantuono, Stefano Russo. 257-263 [doi]
- A Systematic Mapping Review of Memory Leak Detection TechniquesGuilherme Otavio de Sena, Rivalino Matias. 264-270 [doi]
- An Empirical Study on Software Aging Indicators Prediction in Android MobileYu Qiao, Zheng Zheng 0001, Yunyu Fang. 271-277 [doi]
- Extracting Interaction-Related Failure Indicators for Online Detection and Prediction of Content FailuresLuyi Li, Minyan Lu, Tingyang Gu. 278-285 [doi]
- The Role of Similarity in Detecting Feature Interaction in Software Product LinesSeyedehzahra Khoshmanesh, Robyn R. Lutz. 286-292 [doi]
- A New Software Rejuvenation Model for AndroidJianwen Xiang, Caisheng Weng, Dongdong Zhao, Jing Tian, Shengwu Xiong, Lin Li, Artur Andrzejakb. 293-299 [doi]
- Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying WorkloadMatheus Torquato 0001, Marco Vieira. 300-307 [doi]
- Robotics Software Engineering and Certification: Issues and ChallengesRoberto Pietrantuono, Stefano Russo. 308-312 [doi]
- TensorFI: A Configurable Fault Injector for TensorFlow ApplicationsGuanpeng Li, Karthik Pattabiraman, Nathan DeBardeleben. 313-320 [doi]
- Dependability Certification Guidelines for NFVIs through Fault InjectionDomenico Cotroneo, Luigi De Simone, Roberto Natella. 321-328 [doi]
- Toward a Systematic and Safety Evidence Productive Verification Approach for Safety-Critical SystemsAiman Gannous, Anneliese Andrews, Barbara Gallina. 329-336 [doi]
- Towards Agile Yet Regulatory-Compliant Development of Medical SoftwareVlad Stirbu, Tommi Mikkonen. 337-340 [doi]
- Verifiable Self-Certifying Autonomous SystemsMichael Fisher 0001, Emily Collins, Louise A. Dennis, Matt Luckcuck, Matt Webster, Mike Jump, Vincent Pagé, Charles Patchett, Fateme Dinmohammadi, David Flynn, Valentin Robu, Xingyu Zhao. 341-348 [doi]
- Model-Based Computer-Aided Monitoring for ISO26262 Compliant SystemsMorayo Adedjouma, Asma Smaoui. 349-352 [doi]