Abstract is missing.
- Assessing Real-Time Malware ThreatsMatthias Gander, Clemens Sauerwein, Ruth Breu. 6-13 [doi]
- An AST-Based Approach to Classifying DefectsChangsong Liu, Yangyang Zhao, Yibiao Yang, Hongmin Lu, Yuming Zhou, Baowen Xu. 14-21 [doi]
- Selective Regression Testing of Safety-Critical Systems: A Black Box ApproachAnneliese Andrews, Salwa Elakeili, Ahmed Alhaddad. 22-31 [doi]
- An Adaptive Control Strategy for Resource Allocation of Service-Based Systems in Cloud EnvironmentSiqian Gong, Beibei Yin, Wenlong Zhu, Kaiyuan Cai. 32-39 [doi]
- Detecting Security Threats Using Mobile DevicesJuan Jenny Li, Peter Abbate, Brian Vega. 40-45 [doi]
- PURITY: A Planning-based secURITY Testing ToolJosip Bozic, Franz Wotawa. 46-55 [doi]
- Software Network Models Based on Dynamic Execution for Fault Propagation ResearchLinzhi Huang, Jun Ai, Hanyu Pei. 56-61 [doi]
- Efficiently Testing Intelligent Transportation System in Simulation EnvironmentXu Zhao, Yan Wang. 62-71 [doi]
- A Fault Propagation Model for Embedded SoftwareXiaobo Yan, Yichen Wang, Anzhi Zhu, Yikun Wang. 72-79 [doi]
- Feature Selection and Analysis of Diffraction ImagesSai Kiran Thati, Junhua Ding, Dongmei Zhang, Xin-Hua Hu. 80-88 [doi]
- An Attributes-Based Allocation Approach of Software Trustworthy DegreesYujing Ma, Yixiang Chen, Bin Gu. 89-94 [doi]
- Securing Scientific WorkflowsDonghoon Kim, Mladen A. Vouk. 95-104 [doi]
- On the Effect of Counters in Guard Conditions When State-Based Multi-objective TestingNesa Asoudeh, Yvan Labiche. 105-114 [doi]
- An Adjustable Risk Assessment Method for a Cloud SystemChi-An Chih, Yu-Lun Huang. 115-120 [doi]
- Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization TechniquesHsia-Hsiang Chen, Han-Lin Lu, Shih-Kun Huang, Ruizhi Gao, W. Eric Wong. 121-127 [doi]
- Automated Detection of Information Flow Vulnerabilities in UML State Charts and C CodePaul Muntean, Adnan Rabbi, Andreas Ibing, Claudia Eckert. 128-137 [doi]
- Boolean Differentiation for Formalizing Myers' Cause-Effect Graph Testing TechniqueTolga Ayav, Fevzi Belli. 138-143 [doi]
- On Proposing a Test Oracle Generator Based on Static and Dynamic Source Code AnalysisAlessandro Oliveira Arantes, Valdivino Alexandre de Santiago Jr., Nandamudi Lankalapalli Vijaykumar. 144-152 [doi]
- Code Generation for Abstract Data Types Based on Program AnalysisBin Li, Jun Liu, Jianhua Zhao. 153-160 [doi]
- PSTEP - A Novel Probabilistic Event Processing Language for Uncertain Spatio-temporal Event Streams of Internet of VehiclesHuiyong Li, Yuanrui Zhang, Yixiang Chen. 161-168 [doi]
- The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data AccessNa Li, Yunwei Dong, Tianwei Che, Chao Wang, Yang Gao. 169-172 [doi]
- A Model Language for Describing Spatio-temporal ChangesXinghua Yao, Jie Zhou. 173-181 [doi]
- Software Intensity Function Prediction by Haar Wavelet RegressionXiao Xiao. 182-183 [doi]
- A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu. 184-185 [doi]
- Critical Nodes Evaluation in Large-Scale Software Based on Static Structure and Runtime InformationQian Ye, Minyan Lu, Luyi Li. 186-187 [doi]
- Towards Transformation from UML to Event-BSiyuan Hu, Hong Zhang. 188-189 [doi]
- Mining Potential Information for Multiclass Microarray Data Using Centroid-Based Dimension ReductionShun Guo, Donghui Guo. 190-194 [doi]
- Data Obfuscation for Privacy and Confidentiality in Cloud ComputingKhaled M. Khan, Mahboob Shaheen. 195-196 [doi]
- UT-LDA Based Similarity Computing in MicroblogWeifeng Zhang, TianHao Pan, Yun Wang, Ziyuan Wang, Lei Xu. 197-201 [doi]
- An Empirical Study of Developer QualityYilin Qiu, Weiqiang Zhang, Weiqin Zou, Jia Liu, Qin Liu. 202-209 [doi]
- Case Study of Requirements-Based Test Case Generation on an Automotive DomainJeong Soo Eo, Hae-Ryong Choi, Ruizhi Gao, Shou-Yu Lee, W. Eric Wong. 210-215 [doi]
- A Test Data Generation Approach for Automotive SoftwareJungui Zhou, Zhiyi Zhang, Peizhang Xie, Jingyu Wang. 216-220 [doi]
- Facilitating Information Management in Integrated Development Environments through Visual Interface EnhancementsHaipeng Cai. 221-229 [doi]
- A Refined Algorithm for Reachability Analysis of Updatable Timed AutomataBingbing Fang, Guoqiang Li 0001, Ling Fang, Jianwen Xiang. 230-236 [doi]
- A Survey on Knowledge Management in Software EngineeringShanmuganathan Vasanthapriyan, Jing Tian, Jianwen Xiang. 237-244 [doi]
- Service Systems Development Based on a Knowledge Synthesis MethodologyYoshiteru Nakamori, F. Meng, Michitaka Kosaka, J. Tian, J. W. Xiang. 245-250 [doi]