Abstract is missing.
- Hunting Killer Tasks for Cloud System through Machine Learning: A Google Cluster Case StudyHongyan Tang, Ying Li, Tong Jia, Zhonghai Wu. 1-12 [doi]
- HistLock: Efficient and Sound Hybrid Detection of Hidden Predictive Data Races with Functional ContextsJialin Yang, Chunbai Yang, W. K. Chan. 13-24 [doi]
- D-Cube: Tool for Dynamic Design Discovery from Multi-threaded Applications Using PINSrijoni Majumdar, Nachiketa Chatterjee, Shila Rani Sahoo, Partha Pratim Das. 25-32 [doi]
- Network Performance Bottleneck Detection and Maximum Network Throughput Estimation for Datacenter ApplicationsPatrick Ngai, Sung-Jer Lu, Yu-Sung Wu, Wei-Sheng Lim, Tung-Yueh Lin. 33-40 [doi]
- How Effective Is Branch-Based Combinatorial Testing? An Exploratory StudyHuiyan Wang, Chang Xu, Jun Sui, Jian Lu. 41-52 [doi]
- Applying Combinatorial Testing in Industrial SettingsXue-Lin Li, Ruizhi Gao, W. Eric Wong, Chunhui Yang, Dong Li. 53-60 [doi]
- Test Effectiveness Evaluation of Prioritized Combinatorial Testing: A Case StudyEun-Hye Choi, Shunya Kawabata, Osamu Mizuno, Cyrille Artho, Takashi Kitamura. 61-68 [doi]
- TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement ApproachDimitris E. Simos, Kristoffer Kleine, Artemios G. Voyiatzis, Rick Kuhn, Raghu Kacker. 69-73 [doi]
- A Faceted Classification Scheme for Change-Based Industrial Code Review ProcessesTobias Baum, Olga Liskin, Kai Niklas, Kurt Schneider. 74-85 [doi]
- Grey Relational Analysis Based k Nearest Neighbor Missing Data Imputation for Software Quality DatasetsJianglin Huang, Hongyi Sun. 86-91 [doi]
- Model-Driven Evaluation of Software Architecture Quality Using Model Clone DetectionMatthew Stephan, James R. Cordy. 92-99 [doi]
- User-Perceived Source Code Quality Estimation Based on Static Analysis MetricsMichail Papamichail, Themistoklis G. Diamantopoulos, Andreas L. Symeonidis. 100-107 [doi]
- Automatic Invariant Synthesis for Arrays in Simple ProgramsBin Li, Zhenhao Tang, Juan Zhai, Jianhua Zhao. 108-119 [doi]
- Verifying Distributed Controllers with Local InvariantsYiqun Wang, Shengwei An, Xiaoxing Ma, Chun Cao, Chang Xu. 120-131 [doi]
- Precondition Calculation for Loops Iterating over Data StructuresJuan Zhai, Bin Li, Zhenhao Tang, Jianhua Zhao, Xuandong Li. 132-143 [doi]
- A Method for Pruning Infeasible Paths via Graph Transformations and Symbolic ExecutionRomain Aissat, Marie-Claude Gaudel, Frédéric Voisin, Burkhart Wolff. 144-151 [doi]
- Towards Understanding Interactive DebuggingFábio Petrillo, Zéphyrin Soh, Foutse Khomh, Marcelo Pimenta, Carla M. D. S. Freitas, Yann-Gaël Guéhéneuc. 152-163 [doi]
- What Makes a Satisficing Bug Report?Tommaso Dal Sasso, Andrea Mocci, Michele Lanza. 164-174 [doi]
- The Bugs Framework (BF): A Structured Approach to Express BugsIrena Bojanova, Paul E. Black, Yaacov Yesha, Yan Wu. 175-182 [doi]
- Using a Distributed Representation of Words in Localizing Relevant Files for Bug ReportsYukiya Uneno, Osamu Mizuno, Eun-Hye Choi. 183-190 [doi]
- Thresholds for Size and Complexity Metrics: A Case Study from the Perspective of Defect DensityKazuhiro Yamashita, Changyun Huang, Meiyappan Nagappan, Yasutaka Kamei, Audris Mockus, Ahmed E. Hassan, Naoyasu Ubayashi. 191-201 [doi]
- Correlation between the Distribution of Software Bugs and Network MotifsShaoxiong Zhang, Jun Ai, Xue-Lin Li. 202-213 [doi]
- Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction ModelsKwabena Ebo Bennin, Koji Toda, Yasutaka Kamei, Jacky Keung, Akito Monden, Naoyasu Ubayashi. 214-221 [doi]
- Profiling Android VulnerabilitiesMatthieu Jimenez, Mike Papadakis, Tegawendé F. Bissyandé, Jacques Klein. 222-229 [doi]
- Protecting Legacy Code against Control Hijacking via Execution Location Equivalence CheckingTobias F. Pfeffer, Stefan Sydow, Joachim Fellmuth, Paula Herber. 230-241 [doi]
- Firewalls for the Web 2.0René Rietz, Hartmut König, Steffen Ullrich, Benjamin Stritter. 242-253 [doi]
- Testing Security Requirements with Non-experts: Approaches and Empirical InvestigationsBernhard Peischl, Michael Felderer, Armin Beer. 254-261 [doi]
- Detecting and Preventing Program Inconsistencies under Database Schema EvolutionLoup Meurice, Csaba Nagy, Anthony Cleve. 262-273 [doi]
- Quantitative Analysis of Variation-Aware Internet of Things Designs Using Statistical Model CheckingSiyuan Xu, Weikai Miao, Thomas Kunz, Tongquan Wei, Mingsong Chen. 274-285 [doi]
- Quantifying the Impact of Replication on the Quality-of-Service in Cloud DatabasesRasha Osman, Juan F. Pérez, Giuliano Casale. 286-297 [doi]
- Facilitating Monkey Test by Detecting Operable Regions in Rendered GUI of Mobile Game AppsChenglong Sun, Zhenyu Zhang, Bo Jiang, W. K. Chan. 298-306 [doi]
- MedicationChecker: Development of a Formally Verified Android Application with EventB2SQLTim Wahls. 307-314 [doi]
- Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State MachinesNatalia Kushik, Jorge López, Ana R. Cavalli, Nina Yevtushenko. 315-322 [doi]
- Leveraging Static Analysis Tools for Improving Usability of Memory Error Sanitization CompilersRigel Gjomemo, Phu H. Phung, Edmund Ballou, Kedar S. Namjoshi, V. N. Venkatakrishnan, Lenore D. Zuck. 323-334 [doi]
- NOTICE: A Framework for Non-Functional Testing of CompilersMohamed Boussaa, Olivier Barais, Benoit Baudry, Gerson Sunyé. 335-346 [doi]
- A Specification-Based Approach to the Testing of Java Memory BloatJu Qian, Xiaoyu Zhou, Wanchun Dang, Ziyuan Wang. 347-352 [doi]
- Mutation Integration TestingMark Grechanik, Gurudev Devanla. 353-364 [doi]
- A Model to Estimate First-Order Mutation Coverage from Higher-Order Mutation CoverageAli Parsai, Alessandro Murgia, Serge Demeyer. 365-373 [doi]
- Test Case Prioritization Using Adaptive Random Sequence with Category-Partition-Based DistanceXiaofang Zhang, Xiaoyuan Xie, Tsong Yueh Chen. 374-385 [doi]
- Software Reliability Analysis of NASA Space Flight Software: A Practical ExperienceHarish Sukhwani, Javier Alonso, Kishor S. Trivedi, Issac Mcginnis. 386-397 [doi]
- How Does the Dependence between Inspectors Impact Capture-Recapture Estimation? An Empirical StudyOu Wu. 398-405 [doi]
- Which Change Sets in Git Repositories Are Related?Jasmin Ramadani, Stefan Wagner 0001. 406-411 [doi]
- DFL: Dual-Service Fault LocalizationChung Man Tang, Jacky Keung, Yuen-Tak Yu, W. K. Chan. 412-422 [doi]
- Automatic Localization of Bugs to Faulty Components in Large Scale Software Systems Using Bayesian ClassificationLeif Jonsson, David Broman, Måns Magnusson, Kristian Sandahl, Mattias Villani, Sigrid Eldh. 423-430 [doi]
- Towards More Accurate Fault Localization: An Approach Based on Feature Selection Using Branching Execution ProbabilityAng Li, Yan Lei, Xiaoguang Mao. 431-438 [doi]
- Testing and Debugging in Continuous Integration with Budget Quotas on Test ExecutionsBo Jiang, W. K. Chan. 439-447 [doi]
- A Tool Supported Testing Method for Reducing Cost and Improving QualityShaoying Liu. 448-455 [doi]
- Resource/Schedule/Content Test Planning ModelPete Rotella. 456-463 [doi]