Abstract is missing.
- The Failure Behaviors of Multi-Faults Programs: An Empirical StudyXiaobo Yan, Bin Liu, Jianxing Li. 1-7 [doi]
- Activity-Based Model Synchronization and Defects Detection for Small TeamsJakub Ondik, Martin Olejár, Karol Rástocný, Mária Bieliková. 8-15 [doi]
- Toward Summary Extraction Method for Functional TopicWenpeng Li, Yingkui Cao, Junfeng Zhao, Yanzhen Zou, Bing Xie. 16-23 [doi]
- How Domain Knowledge Accumulation Influences Software Defects: An Empirical AnalysisPeng Xiao, Bin Liu, Xiaobo Yan, Fuqun Huang. 24-30 [doi]
- Context-Aware Adaptation of Mobile Applications Driven by Software Quality and User SatisfactionMai Abusair, Antinisca Di Marco, Paola Inverardi. 31-38 [doi]
- Predicting Release ReliabilityPete Rotella, Sunita Chulani. 39-46 [doi]
- An Empirical Study on the Usage of SQL Execution Traces for Program ComprehensionNesrine Noughi, Stefan Hanenberg, Anthony Cleve. 47-54 [doi]
- Combinatorial Methods of Feature Selection for Cell Image ClassificationSergiy Vilkomir, Jiabin Wang, Nam Le Thai, Junhua Ding. 55-60 [doi]
- Combinatorial and MC/DC Coverage Levels of Random TestingSergiy Vilkomir, Aparna Alluri, D. Richard Kuhn, Raghu N. Kacker. 61-68 [doi]
- On the Effectiveness of Combinatorial Interaction Testing: A Case StudyMiroslav Bures, Bestoun S. Ahmed. 69-76 [doi]
- An Approach for Choosing the Best Covering Array Constructor to UseHanefi Mercan, Cemal Yilmaz, Kamer Kaya. 77-84 [doi]
- A Parameter Free Choice Function Based Hyper-Heuristic Strategy for Pairwise Test GenerationFakhrud Din, Abdul Rahman A. Alsewari, Kamal Z. Zamli. 85-91 [doi]
- Can Pairwise Testing Perform Comparably to Manually Handcrafted Testing Carried Out by Industrial Engineers?Peter Charbachi, Linus Eklund, Eduard Enoiu. 92-99 [doi]
- Combinatorial Testing of Full Text Search in Web ApplicationsM. S. Raunak, D. Richard Kuhn, Raghu Kacker. 100-107 [doi]
- Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-ServiceKhaled M. Khan, Zhuhan Jiang. 108-113 [doi]
- Provenance Information-Based Trust Evaluation Using Cooperation Pattern for Self-Adaptive SystemsHyo-Cheol Lee, Seok-Won Lee. 114-121 [doi]
- A Model Driven Approach for Device Driver DevelopmentYunwei Dong, Yuanyuan He, Yin Lu, Hong Ye. 122-129 [doi]
- Highly-Available Applications on Unreliable Infrastructure: Microservice Architectures in PracticeDaniel Richter, Marcus Konrad, Katharina Utecht, Andreas Polze. 130-137 [doi]
- Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control SystemsGayathri Sugumar, Aditya Mathur. 138-145 [doi]
- Stochastic Comparisons of Used Coherent System and New System of Used Components for Non-Identically Distributed and Dependent ComponentsRui Fang, Xiaohu Li. 146-151 [doi]
- An Importance Based Algorithm for Reliability-Redundancy Allocation of Phased Mission SystemsXin-yang Wu, Xiaoyue Wu. 152-159 [doi]
- Criticality Analysis Method Based on Integrated Importance MeasureShubin Si, Wenhai He, Xianzhi Wang. 160-164 [doi]
- Reliability Analysis for a Degradation System Subject to Dependent Soft and Hard Failure ProcessesHongda Gao, Lirong Cui. 165-170 [doi]
- Circuit Reliability Analysis Using Signal Reliability CorrelationsJinchen Cai, Chunhong Chen. 171-176 [doi]
- Residual Life Estimation by Fusing Few Failure Lifetime and Degradation Data from Real-Time UpdatingShiqi Liu, Hao Chen, Bo Guo, Xiang Jia, Jianjun Qi. 177-184 [doi]
- An Object-Oriented Simulation Model for Reliability of PMS with Time RedundancyXiaoyue Wu, Bo Guo. 185-189 [doi]
- Rolling Bearing Vibration Signal Analysis Based on Dual-Entropy, Holder Coefficient and Gray Relation TheoryYuLong Ying, Jingchao Li, Zhimin Chen, Jing Li. 190-194 [doi]
- Web Service Reliability Test Method Based on Log AnalysisXuetao Tian, Honghui Li, Feng Liu. 195-199 [doi]
- Network Anomaly Detection Based on Dynamic Hierarchical Clustering of Cross Domain DataYang Liu, Hongping Xu, Hang Yi, Zhen Lin, Jian Kang, Weiqiang Xia, Qingping Shi, Youping Liao, YuLong Ying. 200-204 [doi]
- Research on the Measurement and Transmission Network System of New Launch Vehicle Based on Cloud ComputingYuanyi Liu, Wenming Wang, Jian Kang, Youping Liao, Yang Liu, Qingping Shi, Weiqiang Xia, Mingyu Hu. 205-210 [doi]
- Opportunistic Transmission Mechanism Based on SI in Mobile Crowd Sensing NetworksBing Jia, Shuai Liu, Tao Zhou, Zhendong Xu. 211-215 [doi]
- Automatic Modulation Recognition of Digital Signals Based on FisherfaceShanshan Jin, Yun Lin, Hui Wang. 216-220 [doi]
- Evaluation of Lithium Batteries Based on Continuous Hidden Markov ModelYun Lin, Mingyu Hu, Xuhong Yin, Jian Guo, Zhaojun Li. 221-225 [doi]
- A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence TheoryMeiyu Wang, Zhigang Li, Yun Lin. 226-232 [doi]
- Recognition Method of Software Defined Radio Signal Based on Evidence Theory and Interval Grey RelationHui Wang, Lili Guo, Yun Lin. 233-237 [doi]
- Portable Safety Voice Information Recording EquipmentSen Wang, Yun Lin. 238-242 [doi]
- A Method for Modulation Recognition Based on Entropy Features and Random ForestZhen Zhang, Yibing Li, Xiaolei Zhu, Yun Lin. 243-246 [doi]
- A Biological Image Restoration Method with Independently Local Dictionary LearningQidi Wu, Yibing Li. 247-251 [doi]
- Research on Physical Layer Security of Cognitive Radio Network Based on RF-DNAChao Wang, Yun Lin, Zhen Zhang. 252-255 [doi]
- Modulation Recognition of Digital Signal Based on Deep Auto-Ancoder NetworkTu Ya, Yun Lin, Hui Wang. 256-260 [doi]
- Effects of Improper Ground Truth on Target Tracking Performance Evaluation in BenchmarkGaocheng Liu, Shuai Liu, Mengye Lu, Zheng Pan. 261-266 [doi]
- A Zombie Account Detection Method in Microblog Based on the PageRankShaobo Li, Xuhang Li, He Yang, Guanglu Sun, Fei Lang. 267-270 [doi]
- A New Recognition Method for M-QAM Signals in Software Defined RadioYuning Zhao, Xiaodong Yang, Yun Lin. 271-275 [doi]
- Resilience in Homogeneous Networks: A Strategic Network Formation ApproachBabak Heydari. 276-282 [doi]
- CsPI: A New Way to Evaluate Cybersecurity Investments: A Position PaperSummer Fowler, Peter P. Chen. 283-284 [doi]
- Risky Cyber Security: '7012' Regulations Federally-Driven Inhibitor to Resilience within the Defense Industrial Base - A Position PaperLarisa Breton. 285-288 [doi]
- Resilience Mechanism for Trustworthy Workflow Management SystemQiang Han. 289-296 [doi]
- Improving MC/DC and Fault Detection Strength Using Combinatorial TestingDong Li, Linghuan Hu, Ruizhi Gao, W. Eric Wong, D. Richard Kuhn, Raghu N. Kacker. 297-303 [doi]
- An In-Depth Study of the Efficiency of Risk Evaluation Formulas for Multi-Fault LocalizationXiaolin Ju, Xiang Chen, Yibiao Yang, Shujuan Jiang, Junyan Qian, Baowen Xu. 304-310 [doi]
- Could We Predict the Result of a Continuous Integration Build? An Empirical StudyJing Xia, Yanhui Li. 311-315 [doi]
- Influence of the Distance Calculation Error on the Performance of Adaptive Random TestingYuanchao Qi, Ziyuan Wang, Yongming Yao. 316-319 [doi]
- Design and Implementation of Combinatorial Testing ToolsYongming Yao, Yiyang Yan, Ziyuan Wang, Chen Liu. 320-325 [doi]
- Verification and Validation of a Cyber-Physical System in the Automotive DomainEun-Young Kang, Dongrui Mu, Li Huang, Qianqing Lan. 326-333 [doi]
- Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical SystemsMichael Brunner, Michael Huber, Clemens Sauerwein, Ruth Breu. 334-340 [doi]
- WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment SystemSridhar Adepu, Jay Prakash, Aditya Mathur. 341-347 [doi]
- Optimizing Monitor Code Based on Patterns in Runtime VerificationGe Zhou, Wei Dong, Wanwei Liu, Hao Shi, Chi Hu, Liangze Yin. 348-354 [doi]
- Monitor Synthesis for Parametric MTL Properties in Discrete Control SoftwareHao Shi, Wei Dong, Ge Zhou, Liangze Yin. 355-362 [doi]
- Optimal Test Case Generation for Simulink Models Using SlicingZhenying Jiang, Xiao Wu, Zeqian Dong, Ming Mu. 363-369 [doi]
- Constraint-Based Consistency Checking for Multi-View Models of Cyber-Physical SystemGang Yang, Xingshe Zhou, Yuanyuan Lian. 370-376 [doi]
- Use Neural Network to Improve Fault Injection TestingYichen Wang, Yikun Wang. 377-384 [doi]
- Target Signal Synchronization Transmission in Coupling Network with Uncertain ParametersTing Zhang, Fuke Chang. 385-389 [doi]
- A Method of Personalized Tag Prediction Based on Graph StructureHuang Yuan. 390-395 [doi]
- Identifying Indicators of Fake Reviews Based on Spammer's Behavior FeaturesPan Liu, Zhenning Jimmy Xu, Jun Ai, Fei Wang. 396-403 [doi]
- Public Cultural Services Recommendation System ArchitectureShufeng Ye, Yi Yang, Weixing Huang, Jian Wang, Guigang Zhang. 404-409 [doi]
- A User Profile Modeling Method Based on Word2VecJianqiao Hu, Feng Jin, Guigang Zhang, Jian Wang, Yi Yang. 410-414 [doi]
- A Content-Based Phishing Email Detection MethodHongming Che, Qinyun Liu, Lin Zou, Hongji Yang, Dongdai Zhou, Feng Yu. 415-422 [doi]
- Emergency Travel Plan Generation Based on CyberneticsSicong Ma, Hongji Yang, Lu Zhang, Dongdai Zhou, Hua Zhou. 423-428 [doi]
- QoS-Aware Resource Management in SDN-Based InterClouds: A Software Cybernetics PerspectiveSuleiman Onimisi Aliyu, Feng Chen, Ying He. 429-434 [doi]
- Compressing Uniform Test Suites Using Variational AutoencodersAndré Reichstaller, Alexander Knapp. 435-440 [doi]
- Automated Extraction of Feature Models from Android Based Portable DevicesIlker Yildirim, Hasan Sözer. 441-448 [doi]
- The Effect of Personality on Team Performance: An Interpersonal Knowledge Interaction PerspectiveXin Yue, Yanzhong Dang. 449-455 [doi]
- Modeling of Hazard Affected Regions in Support of Scenario Evolution Analysis for Unconventional EmergencyLili Rong, Zijun Qie. 456-463 [doi]
- An Empirical Study on How Empowering Leadership Affects the Team CreativityJiangning Wu, Xiangjie Ku, Donghua Pan. 464-471 [doi]
- An Ontology-Based Knowledge Sharing Portal for Software TestingShanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang. 472-479 [doi]
- Knowledge Management in Graduate ResearchJing Sun, Van-Nam Huynh, Yoshiteru Nakamori, Jianguo Wu, Jing Tian, Jianwen Xiang. 480-485 [doi]
- A Comparative Study of Knowledge Management on Undergraduate by QuestionnaireJianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang. 486-492 [doi]
- Process Metrics Are Not Bad Predictors of Fault PronenessBiljana Stanic, Wasif Afzal. 493-499 [doi]
- A Novel Hidden Markov Model for Genome-Wide Association StudiesJunli Yang, Bo Song, Bing Yan, Guoqiang Li 0001. 500-506 [doi]
- Conflicts and Synergies among Quality RequirementsBarry Boehm, Xavier Franch. 507-508 [doi]
- VR City: Software Analysis in Virtual Reality EnvironmentJuraj Vincur, Pavol Návrat, Ivan Polásek. 509-516 [doi]
- Hardware Identification via Sensor Fingerprinting in a Cyber Physical SystemChuadhry Mujeeb Ahmed, Aditya P. Mathur. 517-524 [doi]
- Model-Based Analysis of Timing and Energy Constraints in an Autonomous Vehicle SystemEun-Young Kang, Dongrui Mu, Li Huang, Qianqing Lan. 525-532 [doi]
- From Design to Invariants: Detecting Attacks on Cyber Physical SystemsSridhar Adepu, Aditya Mathur. 533-540 [doi]
- Modelling and Verification of User Interactions Using Constraint ProgrammingMats Carlsson, Olga Grinchtein, Justin Pearson. 541-547 [doi]
- A Candidate Architecture for Cloud-Based Monitoring in Industrial AutomationIan David Peake, Jan Olaf Blech. 548-554 [doi]
- A Systematic Mapping Study of Empirical Studies on Software Cloud Testing MethodsAmro Al-Said Ahmad, Pearl Brereton, Peter Andras. 555-562 [doi]
- Formal Analysis of Control Software for Cyber-Physical SystemsPeter Herrmann, Jan Olaf Blech. 563-564 [doi]
- Analysis of Software Service Usage in Healthcare Communication ServicesAshkan Hemmati, Chris Carlson, Maleknaz Nayebi, Guenther Ruhe, Chad Saunders. 565-566 [doi]
- An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed MovementsLi-Wen Chen, Yu-Lun Huang. 567-568 [doi]
- Spatio-Temporal Aware Testing for Complex SystemsHuai Liu, Jan Olaf Blech, Matt Duckham, Heinz W. Schmidt. 569-570 [doi]
- Towards Effective and Scalable Testing for Complex High-Speed Railway Signal SoftwareChunfeng Hu, Jin Guo, Nan Li, Yao Li, Chang Rao, Siqi Liu. 571-572 [doi]
- Towards Automating Integration Testing of .NET Applications Using RoslynMehrdad Saadatmand. 573-574 [doi]
- A Spatial-Temporal Model for Software Fault Tolerance in Safety-Critical ApplicationsTao Zhang, Jinbo Wang. 575-576 [doi]
- Model Dressing for Automated Exploratory TestingMehmet Çagri Çalpur, Sevgi Arca, Tansu Cagla Calpur, Cemal Yilmaz. 577-578 [doi]
- Using Eye Tracking Technology to Analyze the Impact of Stylistic Inconsistency on Code ReadabilityQing Mi, Jacky Keung, Jianglin Huang, Yan Xiao. 579-580 [doi]
- Scalability of Cloud Based SCIT-MTDQuyen L. Nguyen, Arun Sood. 581-582 [doi]
- Quality Evaluation of Digital Soft IP Core for FPGA SystemDengyun Lei, Li-Wei Wang, Jun Lin, Yunfei En. 583-584 [doi]
- Malware Behavior Ontology for Digital EvidenceJigang Liu, Rashmi Kammar, Ryôichi Sasaki, Tetsutaro Uehara. 585-586 [doi]
- An Analysis of Vulnerability Trends, 2008-2016D. Richard Kuhn, M. S. Raunak, Raghu Kacker. 587-588 [doi]
- Experiences in Testing and Analysing Data Intensive SystemsTeemu Kanstrén. 589-590 [doi]
- A Journey from Manual Testing to Automated Test Generation in an Industry ProjectClaus Klammer, Rudolf Ramler. 591-592 [doi]
- On Business Drivers for Firmware Test: A Wake-Up Call for Software Engineering Research?Bernhard Peischl. 593-594 [doi]
- A Framework for Combining and Ranking Static Analysis Tool Findings Based on Tool Performance StatisticsAchilleas Xypolytos, Haiyun Xu, Bárbara Vieira, Amr M. T. Ali-Eldin. 595-596 [doi]
- Dynamic Test Selection Using Source Code ChangesMatthew Campbell, Kent Martin, Ferenc Bozoki, Mike Atkinson. 597-598 [doi]
- Improving Trace Generation and Analysis for Medical DevicesYoann Blein, Arnaud Clere, Fabrice Bertrand, Yves Ledru, Roland Groz, Lydie du Bousquet. 599-600 [doi]
- An Integrated Architecture for IoT FingerprintingFehmi Jaafar. 601-602 [doi]
- A Black-Box Approach to Latency and Throughput AnalysisDaniel Brahneborg, Wasif Afzal, Adnan Causevic. 603-604 [doi]
- Security Analytics in the Big Data EraDusan Mondek, Rudolf B. Blazek, Tomás Zahradnický. 605-606 [doi]
- Software Release-Over-Release ComparisonsPete Rotella, Sunita Chulani. 607 [doi]
- Comparing and Goaling Releases Using Software Reliability ClassesPete Rotella, Sunita Chulani. 608-609 [doi]
- REConvertor: Transforming Textual Use Cases to High-Level Message Sequence ChartZuohua Ding, Tiantian Shuai, Mingyue Jiang. 610-611 [doi]
- A Mixed Poisson Process and Empirical Bayes Estimation Based Software Reliability Growth Model and SimulationNéstor Ruben Barraza. 612-613 [doi]
- A Software Reliability Prediction Model: Using Improved Long Short Term Memory NetworkYangzhen Fu, Hong Zhang, Chenchen Zeng, Chao Feng. 614-615 [doi]
- Verification Methods for Secure and Reliable SoPC SystemsLu Kong, Jinbo Wang. 616-617 [doi]
- A Pragmatic Perspective on Regression Testing ChallengesDaniel Brahneborg, Wasif Afzal, Adnan Causevic. 618-619 [doi]
- Reliability Modeling of Two-Phase Gamma Degradation ProcessFengjun Duan, Guanjun Wang. 620-621 [doi]
- Software Fault Injection Campaign Generation for Cloud InfrastructuresLena Feinbube, Lukas Pirl, Peter Tröger, Andreas Polze. 622-623 [doi]
- A New Software Reliability Model for Open Stochastic System Based on NHPPQiuying Li, Chao Zhang, Hong Zhang. 624-625 [doi]
- A Fault Diagnosis Expert System for Flight Control Software Based on SFMEA and SFTAYuanxun Shao, Bin Liu, Guoqi Li, Ran Yan. 626-627 [doi]
- Automated Generator for Complex and Realistic Test DataRichard Lipka. 628-629 [doi]
- Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation TestsLuping Chen, John H. R. May. 630-631 [doi]
- A Software Security Case Developing Method Based on Hierarchical Argument StrategyBiao Xu, Minyan Lu, Dajian Zhang. 632-633 [doi]
- Empirical Study on the Correlation Between Software Structural Modifications and Its Fault-PronenessFei Wang, Jun Ai, Jiaming Wang. 634-635 [doi]
- Hierarchical Combination Design Method of Test Cases Based on Conditional ConstraintsJianmin Wang, Xiaohua Wang, Yunyun Ma, Jinbo Wang. 636-637 [doi]