Abstract is missing.
- A Tool for Security Measuring and Probe ManagementTiandu Zhao, Antti Evesti, Teemu Kanstrén. 1-6 [doi]
- An Error Model for Multi-threaded Single-Node Applications, and Its ImplementationLena Feinbube, Daniel Richter, Andreas Polze. 7-14 [doi]
- Empirical Analysis of Factors Affecting Time-Leverage Nodes of Complex SoftwareQian Ye, Minyan Lu, Luyi Li. 15-22 [doi]
- Test-Suite Reduction Does Not Necessarily Require Executing the Program under TestHermann Felbinger, Franz Wotawa, Mihai Nica. 23-30 [doi]
- iCruiser: Protecting Kernel Link-Based Data Structures with Secure CanaryWang Li, Dinghao Wu, Peng Liu 0005. 31-38 [doi]
- Case Study: Project Management Using Cross Project Software Reliability Growth ModelKiyoshi Honda, Nobuhiro Nakamura, Hironori Washizaki, Yoshiaki Fukazawa. 39-46 [doi]
- Effective Test Generation for Combinatorial Decision CoverageRuizhi Gao, Linghuan Hu, W. Eric Wong, Han-Lin Lu, Shih-Kun Huang. 47-54 [doi]
- Combinatorial Testing of Software with Binary Inputs: A State-of-the-Art ReviewSergiy Vilkomir. 55-60 [doi]
- A Real-Time Collaborative Testing Approach for Web Application: Via Multi-tasks MatchingShikai Guo, Rong Chen, Hui Li. 61-68 [doi]
- A Study on the State of Practice in Security Situational AwarenessTeemu Kanstrén, Antti Evesti. 69-76 [doi]
- Designing Adaptive Deception StrategiesCristiano De Faveri, Ana Moreira. 77-84 [doi]
- Experimental Comparison of Software Reliability Models Based on Code Coverage and on Time DomainOdair Jacinto da Silva, Adalberto Nobiato Crespo, Mario Jino. 85-92 [doi]
- Detection of Fault-Prone Classes Using Logistic Regression Based Object-Oriented Metrics ThresholdsShahid Hussain, Jacky W. Keung, Arif Ali Khan, Kwabena Ebo Bennin. 93-100 [doi]
- A Systematic Approach for Privilege Escalation PreventionFehmi Jaafar, Gabriela Nicolescu, Christian Richard. 101-108 [doi]
- A Statistical Analysis of Operational Profile Driven TestingHerman Hartmann. 109-116 [doi]
- Measurement and Prediction of SaaS Reliability in the CloudMohammed O. Alannsary, Jeff Tian. 123-130 [doi]
- Weighted Control Flow Subgraph to Support Debugging ActivitiesYong Wang, Zhiqiu Huang. 131-134 [doi]
- Automated Evaluation for Performance Test ScriptsRuijing Gao, Zhenyu Chen, Chunrong Fang, Tieke He, Peizhang Xie, Jungui Zhou. 135-142 [doi]
- Mining Cryptography Misuse in Online ForumsAlexandre Melo Braga, Ricardo Dahab. 143-150 [doi]
- Recommendations Based on LDA Topic Model in Android ApplicationsTianHao Pan, Weifeng Zhang, Ziyuan Wang, Lei Xu. 151-158 [doi]
- An Automated Testing Platform for Mobile ApplicationsXin Ma, Ning Wang, Peizhang Xie, Jungui Zhou, Xiaofang Zhang, Chunrong Fang. 159-162 [doi]
- Fault Localization Guided Execution Comparison for Failure ComprehensionMengleng Liu, Pei Liu, Xiaoshuang Yang, Lei Zhao. 163-166 [doi]
- The Evaluation of the Embedded Software Quality Based on the Binary CodeJinshuo Liu, Yusen Chen, Lanxin Zhang, Juan Deng, Weixin Zhang. 167-170 [doi]
- CAT: A Customized Automata ToolkitRuoyu Wang, Guoqiang Li 0001, Daniel W. Sun, Jianwen Xiang, Hongming Cai. 171-177 [doi]
- A Product Recommendation Approach Based on the Latent Social Trust Network Model for Collaborative FilteringXian Yang, Jiangning Wu, Yanzhong Dang, Lili Rong. 178-185 [doi]
- Surveys on Knowledge Management and Knowledge Creation in a Chinese Research UniversityJianguo Wu, Jing Tian, Liping Lu, Caisheng Weng, Jianwen Xiang. 186-193 [doi]
- An Evaluation Framework of Knowledge Management ActivitiesF. Meng, Yoshiteru Nakamori, Jing Tian, Jianwen Xiang. 194-201 [doi]
- Exploring Academic Knowledge Creation Models for Graduate ResearchesJ. Sun, Yoshiteru Nakamori, Jing Tian, Jianwen Xiang. 202-209 [doi]
- The Effect of Interpersonal Trust on Interpersonal Knowledge Interaction: A New ThoughtDeqiang Hu, Yanzhong Dang. 210-216 [doi]
- Research on the DMC-Based Patent AnalysisDonghua Pan, Xudong Wang, Haoxiang Xia. 217-221 [doi]
- P2P-Based Full Digital Co-simulation and Verification System DesignFei Deng, Feng Gao. 222-227 [doi]
- ConfMapper: Automated Variable Finding for Configuration Items in Source CodeShuLin Zhou, Xiaodong Liu, Shanshan Li, Wei Dong, Xiangke Liao, Yun Xiong. 228-235 [doi]
- A UTP Refinement Model of the STeC LanguageYuanrui Zhang, Yujing Ma, Yixiang Chen. 236-243 [doi]
- Modeling and Verifying Intelligent Unit Transmission Protocol Using CSP Model Checker PATZhipeng Shao, HanYong Hao, Yuanyuan Ma, Chen Wang, Jiaxuan Fei. 244-251 [doi]
- A Wireless Power Transfer CPS Based on 2D Omni-directional Rotating Magnetic FieldPengpeng Sun, Yunwei Dong, Hong Ye, Hongbin Zhao. 252-258 [doi]
- Analyzing Math Library Functions via SummarizationJiahong Jiang, Liqian Chen, Yanjun Wen, Wei Dong, Ling Wen. 259-264 [doi]
- Moving Switching Functions to Continuous DomainTolga Ayav, Hasan Sözer. 265-270 [doi]
- A Method Based on Meta-model for the Translation from UML into Event-BWeixuan Sun, Hong Zhang, Chao Feng, Yangzhen Fu. 271-277 [doi]
- Model-Based Software Product Line Testing by Coupling Feature Models with Hierarchical Markov Chain Usage ModelsCeren Sahin Gebizli, Hasan Sözer. 278-283 [doi]
- Model-Based Testing Directed by Structural Coverage and Functional RequirementsYanjun Sun, Gérard Memmi, Sylvie Vignes. 284-291 [doi]
- Iterative Path Clustering for Software Fault LocalizationRong Chen, Shifeng Chen, Nan Zhang. 292-297 [doi]
- Supervision of Hardware, Software and Behavior of Autonomous Industrial Transport RobotsGerald Steinbauer, Stefan Loigge, Clemens Mühlbacher. 298-300 [doi]
- Toward Integrated Analysis & Testing of Component-Based, Adaptive Robot SystemsBenedikt Eberhardinger, Axel Habermaier, Alwin Hoffmann, Alexander Poeppel, Wolfgang Reif. 301-302 [doi]
- Hunting the Game - Towards a Game of Testing Adaptive SystemsAndre Reichstaller, Alexander Knapp. 303-304 [doi]
- Testing Self-Adaptive Systems Using Fault Injection and Combinatorial TestingFranz Wotawa. 305-310 [doi]
- An Approach to Controlling Context by Combining Game Theory and Control Theory for Self-Adaptive Software in Creative ComputingLin Zou, Hongji Yang, Lei Xu 0003. 311-317 [doi]
- Neurofeedback and Creativity in Interceptive Human Movement: A Theoretical Model for Neurocybernetics Based Kinaesthetic Multimodal Learning AgentDevanka Pathak, Hongji Yang, Tin-Kai Chen. 318-325 [doi]
- A Self-Tuning Procedure for Resource Management in InterCloud ComputingSuleiman Onimisi Aliyu, Feng Chen, Han Li. 326-333 [doi]
- Reliability-Performance-Energy Joint Modeling and Optimization for a Big Data TaskXiwei Qiu, Liang Luo, Yuan-Shun Dai. 334-338 [doi]
- Performance Analysis of Cloud Service Considering ReliabilityPeng Sun, Demiao Wu, Xiwei Qiu, Liang Luo, Hongwei Li. 339-343 [doi]
- Security by Insurance for ServicesFabio Martinelli, Artsiom Yautsiukhin. 344-351 [doi]
- Motivating Security Engineering with Economics: A Utility Function ApproachChad Heitzenrater, Justin King-Lacroix, Andrew C. Simpson. 352-359 [doi]
- Asymmetry in Coevolving Adversarial SystemsRichard Colbaugh, Kristin Glass. 360-367 [doi]
- Economics of Resilient Cloud ServicesBrandon Wagner, Arun K. Sood. 368-374 [doi]
- Design of a Networked Embedded Software Test Platform Based on Software and Hardware Co-simulationFeng Gao, Fei Deng. 375-381 [doi]
- A Self-Adaptive Traffic Light Control System Based on Speed of VehiclesJinyang Li, Yuanrui Zhang, Yixiang Chen. 382-388 [doi]
- A Programmable CNN Architecture and Its Hardware-Software Co-design Approach for Image Processing and Stimulating Visual IllusionsJianwei Zheng, Chunhang Xu, Donghui Guo. 389-394 [doi]
- Safety Awareness Online Detection System of Driving Behavior Based on Software and Hardware Co-designJihu Zhang, Haipeng Wang, Wu Liu, Yan Gong, Yunwei Dong, Xiaochuan Jing, Wei Zhang. 395-399 [doi]
- Hierarchical Clustering of Group Behaviors in Cyber Situation AwarenessYan Zhang, Lejian Liao, Chang Xu, Manzhi Yang. 400-401 [doi]
- A Testing-Coverage Software Reliability Growth Model Considering the Randomness of the Field EnvironmentChengyong Mao, Qiuying Li. 402-403 [doi]
- An Industrial Case Study of Project Management Using Cross Project Software Reliability Growth ModelKiyoshi Honda, Nobuhiro Nakamura, Hironori Washizaki, Yoshiaki Fukazawa. 404-405 [doi]
- Metamorphic Testing of a Superficial Area Calculation ProgramZhanwei Hui, Song Huang. 406-407 [doi]
- Automatic Defense through Fault Localization and Dynamic Patch CreationHsia-Hsiang Chen, Da-Qun Zheng, Shih-Kun Huang. 408-409 [doi]
- Initial Framework for Software Quality Evaluation Based on ISO/IEC 25022 and ISO/IEC 25023Hidenori Nakai, Naohiko Tsuda, Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa. 410-411 [doi]
- Detecting Bugs of Concurrent Programs with Program InvariantsZuohua Ding, Rong Wang, Jueliang Hu, Yang Liu. 412-413 [doi]
- An Under-sampling Method: Based on Principal Component Analysis and Comprehensive Evaluation ModelYangzhen Fu, Hong Zhang, Yaxin Bai, Weixuan Sun. 414-415 [doi]
- A Resource Optimization Algorithm of Cloud Data Center Based on Correlated Model of Reliability, Performance and EnergyLiang Luo, Hongwei Li, Xiwei Qiu, Yangyang Tang. 416-417 [doi]
- Improving Security Level via Velocity of Moving Target DefenseQuyen L. Nguyen, Arun K. Sood. 418-419 [doi]