Abstract is missing.
- IoT-Testware - An Eclipse ProjectIna Schieferdecker, Sascha Kretzschmann, Axel Rennoch, Michael Wagner 0006. 1-8 [doi]
- RESTful API Automated Test Case GenerationAndrea Arcuri. 9-20 [doi]
- Which Factor Impacts GUI Traversal-Based Test Case Generation Technique Most? A Controlled Experiment on Android ApplicationsBo Jiang, Yaoyue Zhang, W. K. Chan, Zhenyu Zhang. 21-31 [doi]
- Improving Random Test Sets Using a Locally Spreading ApproachXiangyang Huang, LiGuo Huang, Shudong Zhang, Lijuan Zhou, Minhua Wu, Mingrui Chen. 32-41 [doi]
- Widget-Sensitive and Back-Stack-Aware GUI Exploration for Testing Android AppsJiwei Yan, Tianyong Wu, Jun Yan, Jian Zhang. 42-53 [doi]
- Using Off-the-Shelf Exception Support Components in C++ VerificationVladimír Still, Petr Rockai, Jiri Barnat. 54-64 [doi]
- Transferring Context-Dependent Test InputsAndré Reichstaller, Alexander Knapp. 65-72 [doi]
- Towards Ex Vivo Testing of MapReduce ApplicationsJesús Morán, Antonia Bertolino, Claudio de la Riva, Javier Tuya. 73-80 [doi]
- A Novel Model for Software Development and Testing in Programmable LogicTao Zhang, Yu Su, Jianmin Wang, Jinbo Wang. 81-85 [doi]
- Is Mutation Analysis Effective at Testing Android Apps?Lin Deng, Jeff Offutt, David Samudio. 86-93 [doi]
- WinHeap Explorer: Efficient and Transparent Heap-Based Bug Detection in Machine CodeMaksim Shudrak. 94-101 [doi]
- Improving Spectrum-Based Fault Localization for Spreadsheet DebuggingElisabeth Getzner, Birgit Hofer, Franz Wotawa. 102-113 [doi]
- A Critical Evaluation of Spectrum-Based Fault Localization Techniques on a Large-Scale Software SystemFabian Keller, Lars Grunske, Simon Heiden, Antonio Filieri, André van Hoorn, David Lo. 114-125 [doi]
- Statement-Oriented Mutant Reduction Strategy for Mutation Based Fault LocalizationYong Liu, Zheng Li, Linxin Wang, Zhiwen Hu, Ruilian Zhao. 126-137 [doi]
- Improving Faulty Interaction Localization Using Logistic RegressionKinari Nishiura, Eun-Hye Choi, Osamu Mizuno. 138-149 [doi]
- Can Robot Navigation Bugs Be Found in Simulation? An Exploratory StudyThierry Sotiropoulos, Hélène Waeselynck, Jérémie Guiochet, Félix Ingrand. 150-159 [doi]
- Towards Automation in Information Security Management SystemsMichael Brunner, Christian Sillaber, Ruth Breu. 160-167 [doi]
- HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile SecurityKobra Khanmohammadi, Abdelwahab Hamou-Lhadj. 168-175 [doi]
- Security Requirement Engineering Using Structured Object-Oriented Formal Language for M-Banking ApplicationsBusalire Onesmus Emeka, Shaoying Liu. 176-183 [doi]
- Access Control in Water Distribution Networks: A Case StudySridhar Adepu, Gyanendra Mishra, Aditya Mathur. 184-191 [doi]
- A Method for Developing Algorithms for Assessing Cyber-Risk CostGencer Erdogan, Alejandra Gonzalez, Atle Refsdal, Fredrik Seehusen. 192-199 [doi]
- Engineering Adaptive User Interfaces Using Monitoring-Oriented ProgrammingAaron John Buhagiar, Gordon J. Pace, Jean-Paul Ebejer. 200-207 [doi]
- Are Your Classes Well-Encapsulated? Encapsulation Analysis for JavaZhenhao Tang, Juan Zhai, Bin Li, Jianhua Zhao. 208-215 [doi]
- Intersert: Assertions on Distributed Process Interaction SessionsZack Newsham, Augusto Born de Oliveira, Jean-Christophe Petkovich, Ahmad Saif Ur Rehman, Guy Martin Tchamgoue, Sebastian Fischmeister. 216-223 [doi]
- Software Reliability as User Perception: Application of the Fuzzy Analytic Hierarchy Process to Software Reliability AnalysisFelipe Febrero, Maria Ángeles Moraga, Coral Calero. 224-231 [doi]
- Modeling and Analyzing the Android Permission Framework Using High Level Petri NetsXudong He. 232-239 [doi]
- DURFEX: A Feature Extraction Technique for Efficient Detection of Duplicate Bug ReportsKorosh Koochekian Sabor, Abdelwahab Hamou-Lhadj, Alf Larsson. 240-250 [doi]
- Towards Better Understanding of Software Quality Evolution through Commit-Impact AnalysisPooyan Behnamghader, Reem Alfayez, Kamonphop Srisopha, Barry W. Boehm. 251-262 [doi]
- The Effect of Gang-of-Four Design Patterns Usage on Design Quality AttributesShahid Hussain, Jacky Keung, Arif Ali Khan. 263-273 [doi]
- On the Analysis of Co-Occurrence of Anti-Patterns and ClonesFehmi Jaafar, Angela Lozano, Yann-Gaël Guéhéneuc, Kim Mens. 274-284 [doi]
- How Do Developers Toggle Breakpoints? Observational StudiesFábio Petrillo, Hyan Mandian, Aiko Yamashita, Foutse Khomh, Yann-Gaël Guéhéneuc. 285-295 [doi]
- Predicting Bugs in Software Code Changes Using Isolation ForestYueyang He, Xiaoyan Zhu, Guangtao Wang, Heli Sun, Yong Wang. 296-305 [doi]
- Predicting Fault-Prone Classes in Object-Oriented Software: An Adaptation of an Unsupervised Hybrid SOM AlgorithmAlexandre Boucher, Mourad Badri. 306-317 [doi]
- Software Defect Prediction via Convolutional Neural NetworkJian Li, Pinjia He, Jieming Zhu, Michael R. Lyu. 318-328 [doi]
- Predicting the Life Expectancy of Railway Fail-Safe Signaling Systems Using Dynamic Models with CensoringPetr Novák, Martin Danhel, Rudolf B. Blazek, Martin Kohlík, Hana Kubátová. 329-339 [doi]
- Investigating the Significance of Bellwether Effect to Improve Software Effort EstimationSolomon Mensah, Jacky Keung, Stephen G. MacDonell, Michael Franklin Bosu, Kwabena Ebo Bennin. 340-351 [doi]
- FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal ModelHongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie. 352-363 [doi]
- Detecting Cross-Site Scripting Vulnerabilities through Automated Unit TestingMahmoud Mohammadi, Bill Chu, Heather Richter Lipford. 364-373 [doi]
- Towards Optimally Hiding Protected Assets in Software ApplicationsLeonardo Regano, Daniele Canavese, Cataldo Basile, Antonio Lioy. 374-385 [doi]
- A Game-Theoretic Based QoS-Aware Capacity Management for Real-Time EdgeIoT ApplicationsSuleiman Onimisi Aliyu, Feng Chen, Ying He, Hongji Yang. 386-397 [doi]
- Using Segment-Based Alignment to Extract Packet Structures from Network TracesOthman Esoul, Neil Walkinshaw. 398-409 [doi]
- How Do Coupled File Changes Influence How Developers Seek Help During Maintenance Tasks?Jasmin Ramadani, Stefan Wagner 0001. 410-417 [doi]
- Should I Bug You? Identifying Domain Experts in Software Projects Using Code Complexity MetricsRalf Teusner, Christoph Matthies, Philipp Giese. 418-425 [doi]
- Assessing the Quality of Tabular State Machines through MetricsAmmar Osaiweran, Jelena Marincic, Jan Friso Groote. 426-433 [doi]
- Cross-Project Defect Prediction Using a Credibility Theory Based Naive Bayes ClassifierWai Nam Poon, Kwabena Ebo Bennin, Jianglin Huang, Passakorn Phannachitta, Jacky Wai Keung. 434-441 [doi]
- An Empirical Analysis of Three-Stage Data-Preprocessing for Analogy-Based Software Effort Estimation on the ISBSG DataJianglin Huang, Yan-fu Li, Jacky Wai Keung, Yuen-Tak Yu, W. K. Chan. 442-449 [doi]
- Automated Performance Deviation Detection across Software Versions ReleasesAbderrahmane Benbachir, Isnaldo Francisco De Melo, Michel Dagenais, Bram Adams. 450-457 [doi]