Abstract is missing.
- Lessons Learned from Developing Permissioned BlockchainsWei-Tek Tsai, Lian Yu. 1-10 [doi]
- DFT+Emulation - A Faster Way to Close VerificationJitendra Aggarwal, Tran Nguyen, Piyush Kumar Gupta. 11-12 [doi]
- Using Software Development Artifacts to Improve the Software Development ProcessShannon Burns Conners, Joseph Morgan. 13 [doi]
- An AI Software Test Method Based on Scene Deductive ApproachXinghan Zhao, Xiangfei Gao. 14-20 [doi]
- FeT: Hybrid Cloud-Based Mobile Bank Application TestingChaonian Guo, Shaomin Zhu, Tongsen Wang, Hao Wang. 21-26 [doi]
- Defect Prediction Based on the Characteristics of Multilayer Structure of Software NetworkYiwen Yang, Jun Ai, Fei Wang. 27-34 [doi]
- A New Software Reliability Evaluation Model Based on the Probability of the Failure ModeYunqiang Yan, Yanhong Peng, Chang Liu, Haifeng Li. 35-41 [doi]
- Design and Application of a Sikuli Based Capture-Replay ToolJin-lei Sun, Shi-wen Zhang, Song Huang, Zhanwei Hui. 42-44 [doi]
- Full Digital Simulation Testing of Networked Embedded SoftwareFeng Gao, Fei Deng, Yuanqiang Yan, Chunlei Li. 45-50 [doi]
- Automated Warship Software Testing System Based on LoadRunner Automation APIXinyu Han, Nan Zhang, Wei He, Kai Zhang, Longli Tang. 51-55 [doi]
- MURE: Making Use of MUtations to REfine Spectrum-Based Fault LocalizationZijie Li, Lanfei Yan, Yuzhen Liu, Zhenyu Zhang 0004, Bo Jiang 0001. 56-63 [doi]
- Research on the Reuse of Test Case for Warship Equipment SoftwareNan Zhang, Haiyan Chai, Xinyu Han. 64-69 [doi]
- Metamorphic Testing of Image Region Growth Programs in Image Processing ApplicationsChao Jiang, Song Huang, Zhanwei Hui. 70-72 [doi]
- Scenario-Based Software Reliability Testing and Evaluation of Complex Information SystemsLijin Wu, Wei He, Bojiang Liu, Xinyu Han, Longli Tang. 73-78 [doi]
- A New Method of Evolutionary Testing for Path CoverageQingjie Wei, Yijin Li, Yuheng Zhang. 79-86 [doi]
- Automatic Test Transition Paths Generation Approach from EFSM Using State TreeYuan Chen, Anbang Wang, Junjie Wang, Luo Liu, Yuanzhang Song, Qinghua Ha. 87-93 [doi]
- Research on Software Failure Analysis and Quality Management ModelYusong Chen, Jianguang Chen, Yang Gao, Dongfeng Chen, Yuming Tang. 94-99 [doi]
- Towards a Bayesian Network Model for Predicting Flaky Automated TestsTariq M. King, Dionny Santiago, Justin Phillips, Peter J. Clarke. 100-107 [doi]
- MuNN: Mutation Analysis of Neural NetworksWeijun Shen, Jun Wan, Zhenyu Chen. 108-115 [doi]
- Fault Localization: Analyzing Covering Arrays Given Prior InformationRyan Lekivetz, Joseph Morgan. 116-121 [doi]
- Blockchain and ScalabilityAnamika Chauhan, Om Prakash Malviya, Madhav Verma, Tejinder Singh Mor. 122-128 [doi]
- On the Similarities between Blockchains and Merkle-Damgård Hash FunctionsKimmo Halunen, Visa Antero Vallivaara, Anni Karinsalo. 129-134 [doi]
- Smart Contracts for a Mobility-as-a-Service EcosystemAnni Karinsalo, Kimmo Halunen. 135-138 [doi]
- A Multiple Blockchains Architecture on Inter-Blockchain CommunicationKan Luo, Wei Yu, Muhammad Amjad Hafiz, Siyuan Wang, Linchao Gao, Kai Hu. 139-145 [doi]
- Blockchain-Based Proof of LocationMichele Amoretti, Giacomo Brambilla, Francesco Medioli, Francesco Zanichelli. 146-153 [doi]
- Application of Blockchain to Trade ClearingWei-Tek Tsai, Enyan Deng, Xiaoqiang Ding, Jie Li. 154-163 [doi]
- Qualitative Software Reliability Requirements: Concept, Classification and Practical Elicitation MethodsCong Pan, Minyan Lu, Hong Zhang, Biao Xu. 164-171 [doi]
- A Method of Optimizing Multi-Locators Based on Machine LearningYu Zheng, Song Huang, Zhanwei Hui, Yaning Wu. 172-174 [doi]
- Research on Judicial Data StandardZemin Qin, Tieke He, Hao Lian, Yuanhan Tian, Jia Liu. 175-177 [doi]
- Research on the Information Quality Measurement of Judicial DocumentsHao Lian, Tieke He, Zemin Qin, Haoyu Li, Jia Liu. 178-181 [doi]
- Information System Reliability Quantitative Assessment Method and Engineering ApplicationJingwei Shang, Ping Chen, Qiang Wang, Liewen Lu. 182-186 [doi]
- GPU and Multiprocessing Parallel Implementations for the Elimination of Finite State Machine MutantsEmad Badawi, Khaled El-Fakih, Gerassimos D. Barlas. 187-198 [doi]
- On the Effectiveness of Automatically Inferred Invariants in Detecting Regression Faults in SpreadsheetsSohon Roy, Arie van Deursen, Felienne Hermans. 199-206 [doi]
- Functional Dependency Detection for Integration Test CasesSahar Tahvili, Marcus Ahlberg, Eric Fornander, Wasif Afzal, Mehrdad Saadatmand, Markus Bohlin, Mahdi Sarabi. 207-214 [doi]
- A Test Path Generation Method Based on SSM ModelsHao Lan, Yin Tong, Jin Guo, Yadong Zhang, Yao Li, Chang Rao. 215-220 [doi]
- A FPGA Based SAT Solver with High Random and Concurrent StrategiesAnping He, Lvying Yu, Haitao Zhang, Lian Li, Jinzhao Wu. 221-228 [doi]
- A Study of the Extraction of Bug Judgment and Correction Times from Open Source Software Bug LogsSeher Razzaq, Yan-fu Li, Chu-Ti Lin, Min Xie 0001. 229-234 [doi]
- Software Component Reliability Evaluation Method Based on Characteristic ParametersRenya He, Longli Tang, Xinyu Han, Wei He, Zehui Zhao. 235-241 [doi]
- Generating Complex Paths for Testing from an EFSMAna Turlea, Florentin Ipate, Raluca Lefticaru. 242-249 [doi]
- A Data-Driven Smart Fault Diagnosis Method for Electric MotorXiaodong Gou, Chong Bian, Fuping Zeng, Qingyang Xu, Wencai Wang, Shunkun Yang. 250-257 [doi]
- Simulation Design of Shop Material Supply Based on Queuing TheoryShengqi Guo, Min Huang. 258-263 [doi]
- Research on Network Malicious Code Detection and Provenance Tracking in Future NetworkLan Liu 0003, Jun Lin, Qiang Wang, Xiaoping Xu. 264-268 [doi]
- Service Oriented Resilience Strategy for Cloud Data CenterYue Liu, Xiaoyang Li, Lianghua Xiao. 269-274 [doi]
- How Does Node Resilience Effect on Complex Networks?Qiang Dong, Chong Jin, Ruiying Li, Rui Kang. 275-280 [doi]
- Space-Based Unidirectional Networks and ResiliencyVaughn H. Standley, Edward A. Boucheron. 281-286 [doi]
- Dynamic Importance Measure for K-out-of-n System in Presence of Dependent FailureDong Lyu, Shubin Si. 287-293 [doi]
- A Hybrid Method of Redundancy System Reliability Analysis Based on AADL ModelsYin Lu, Yunwei Dong, Xiaomin Wei, Mingrui Xiao. 294-300 [doi]
- Construction of User Concurrent Profile Based on Usage LogsYongqiang Zhang, Hong Zhang, Cong Pan, Chao Feng. 301-307 [doi]
- Tracing Error Propagation in C/C++ ApplicationsShiyi Kong, Minyan Lu, Luyi Li. 308-315 [doi]
- Energy Optimization and Fault Tolerance to Embedded System Based on Adaptive Heterogeneous Multi-Core Hardware ArchitectureXing Liu 0002, Panwen Liu, Xin Yan, Chengming Zou, Ruoshi Xia, Haiying Zhou, Kun Mean Hou, Christophe De Vaulx. 316-323 [doi]
- Optimum Post-Disruption Restoration Plan of Interdependent Critical InfrastructuresLili Rong, Kesheng Yan, Jingwen Zhang. 324-331 [doi]
- Research on the Impact of Consumer Review Sentiments from Different Websites on Product SalesJiangning Wu, Lingyu Du, Yanzhong Dang. 332-338 [doi]
- A Study of Software Testing Practices in Sri Lankan Software CompaniesShanmuganathan Vasanthapriyan. 339-344 [doi]
- Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive StrategyErqing Li, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang, Yueying He, Jin Wang, Jiangning Wu. 345-352 [doi]
- Service Reliability Oriented Modeling for the Failure of Cloud Data CenterBang-An Tong, Xiaoyang Li, Lianghua Xiao. 353-357 [doi]
- Predictability of Resource Intensive Big Data and HPC Jobs in Cloud Data CentresChristopher B. Hauser, Jörg Domaschka, Stefan Wesner. 358-365 [doi]
- Bug Patterns Localization Based on Topic Model for Bugs in Program LoopYong Wang, Jun Li, Nan Yan, Weiwei Li, Yong Li, Sanming Liu. 366-370 [doi]
- Task Resource Planning and Verification Method Based on Intelligent PlanningHaiqing Wang, Peng Sun. 371-376 [doi]
- An Unsupervised Parameter Grouping Algorithm for Combinatorial TestingPeng Sun, Xiaochuang Tang, Liang Luo. 377-381 [doi]
- Research on Abnormal Behavior Detection Technology of Launch Vehicle Controlled NetworkYang Liu, Qingping Shi, Xiaotao Yan, Heng Zhang, Hang Yi, Weiqiang Xia, Hongwei Ma, Jian Kang. 382-387 [doi]
- A Complex Network Evolution Model Based on Microscopic Characteristic of NodesYong Wang 0020, Jiahe Cui, Tao Zhang, Jing Yang, Jianpei Zhang. 388-393 [doi]
- A Comparative Analysis of SVM, Naive Bayes and GBDT for Data Faults Detection in WSNsYe Yuan, Shouzheng Li, Xingjian Zhang, Jianguo Sun. 394-399 [doi]
- Research on the Node Information Security of WSN Based on Multi-Party Data Fusion AlgorithmHanqi Yin, Zhiming Yin, Yang Yang, Jianguo Sun. 400-405 [doi]
- Industrial Wireless Sensor Network Topology Non-Uniform Node Optimization DeploymentJianguo Sun, Duo Liu, Yiqi Shi, Ye Yuan, Yang Yang. 406-413 [doi]
- Research on Cross-Layer Optimization of Smart Grid Demand Side Based on WSNsYuan Ren, Shuyu He, Pengyu Hu, Jianguo Sun. 414-420 [doi]
- Nonlinear Dynamic Analysis of Air Traffic Flow at Different Temporal Scales: Nonlinear Analysis Approach versus Complex Networks ApproachChao Wang, Zhaoyue Zhang, Ming Zhu. 421-431 [doi]
- Lightweight Key Agreement for Wireless Sensor NetworksJaruwan Mesit, Matthias R. Brust, Pascal Bouvry. 432-437 [doi]
- Information Security Considerations for Wireless Infusion PumpsPooja Rajendraprasad, Sergey Butakov, Fehmi Jaafar. 438-442 [doi]
- Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive PoliciesSiyou Ma, Yunqiang Yan. 443-449 [doi]
- Safety-Based Software Reconfiguration Method for Integrated Modular Avionics Systems in AADL ModelXiaomin Wei, Yunwei Dong, Mingrui Xiao. 450-455 [doi]
- Collaborative Simulation Testing with State Behavior TreeYunqiang Yan, Siyou Ma. 456-462 [doi]
- Automatic Exploit Generation for Buffer Overflow VulnerabilitiesLuhang Xu, Weixi Jia, Wei Dong 0006, Yongjun Li. 463-468 [doi]
- Modeling and Analyzing Cyber Physical Systems Using High Level Petri NetsXudong He. 469-476 [doi]
- Guide Fuzzing with Multi-Factor Potential AnalysisLuhang Xu, Wei Dong 0006, Liangze Yin, Qiuxi Zhong. 477-482 [doi]
- Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case StudyMichael Brunner, Andrea Mussmann, Ruth Breu. 483-490 [doi]
- A Titration Mechanism Based Congestion ModelChunlin Wang, Ning Huang, Lina Sun, Guoyi Wen. 491-496 [doi]
- Stateless Multiparty Trust Negotiation Protocol for Distributed SystemsMaha Ali Allouzi, Javed I. Khan. 497-504 [doi]
- An Analysis of Android Malware BehaviorFehmi Jaafar, Gagandeep Singh, Pavol Zavarsky. 505-512 [doi]
- Case Study: Adaptive Test Automation for Testing an Adaptive Hadoop Resource ManagerBenedikt Eberhardinger, Hella Ponsar, Gerald Siegert, Wolfgang Reif. 513-518 [doi]
- Adaptive System for Autonomous DrivingFranz Wotawa, Martin Zimmermann. 519-525 [doi]
- An Approach for Detecting Critical Adaptations in Automated Adaptive Software SystemsShuji Morisaki, Norimitsu Kasai. 526-530 [doi]
- Formal Transaction Modeling and Verification for an Adaptable Web Service OrchestrationSara Zatout, Maya Souilah Benabdelhafid, Mahmoud Boufaïda. 531-536 [doi]
- Influence Maximization Algorithms Research Based on Big GraphsGuigang Zhang, Chuanchuan You. 537-544 [doi]
- An Approach to Automatic Test Case Generation for Unit TestingPan Liu, Zhenning Jimmy Xu, Jun Ai. 545-552 [doi]
- Embedded Software Fault Prediction Based on Back Propagation Neural NetworkPengyang Zong, Yichen Wang, Feng Xie. 553-558 [doi]
- Personalized Recommender System for Digital Cultural ResourcesShufeng Ye, Yi Yang, Weixing Huang, Jian Wang 0029. 559-565 [doi]
- Tag Recommendation for Cultural ResourcesZhiwen Lei, Yi Yang, Weixing Huang, Jian Wang. 566-571 [doi]
- Equivalence Checking for Hybrid Control Systems Modelled in SimulinkSebastian Schlesinger, Paula Herber, Thomas Göthel, Sabine Glesner. 572-579 [doi]
- Event Sequence Graph-Based Feature-Oriented Testing: A Preliminary StudyTugkan Tuglular. 580-584 [doi]
- Regular Expression Based Test Sequence Generation for HDL Program ValidationOnur Kilinççeker, Ercument Turk, Moharram Challenger, Fevzi Belli. 585-592 [doi]
- Mission Assurance: Beyond Secure ProcessingMichael Vai, David Whelihan, Jacob Leemaster, Haley Whitman, Willahelm Wan, Yunsi Fei, Roger Khazan, Ilia A. Lebedev, Kyle Hogan, Srinivas Devadas. 593-598 [doi]
- Open Source Value Chains for Addressing Security Issues EfficientlyArnd Weber, Steffen Reith, Dirk Kuhlmann, Michael Kasper, Jean-Pierre Seifert, Christoph Krauß. 599-606 [doi]
- Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems EngineeringAnurag Dwivedi. 607-616 [doi]
- Towards a Coherent Terminology and Taxonomy for Evaluating Safety via TestingNils Müllner, Wasif Afzal. 617-622 [doi]
- An Analysis of the Inclusion of Environmental Cost Factors in Software Cost Estimation DatasetsEmtinan Mustafa, Rasha Osman. 623-630 [doi]
- Reusable Support for Task-Based Adaptive NavigationYonglei Tao. 631-632 [doi]
- A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a HoneypotAlejandro Carrasco, Jorge Ropero, Paulino Ruiz-de-Clavijo, Jaime Benjumea, Amalia Luque. 633-634 [doi]
- What Software Quality Characteristics Most Concern Safety-Critical Domains?Fuqun Huang, Yichen Wang, Yikun Wang, Pengyang Zong. 635-636 [doi]
- An AHP-Based Risk Assessment for an Industrial IoT CloudYu-Lun Huang, Wen-Lin Sun. 637-638 [doi]
- The Research on Optimization of Flame Tube Welding Process Reliability Based on Numerical SimulationRui Du, Min Huang, Yu Zheng. 639-640 [doi]
- Modeling Topic Propagation on Heterogeneous Online Social NetworksBeibei Zhang, Wei Wei, Wei Wang, Yang Li, Huali Cui, Qiang Si. 641-642 [doi]
- A Method of Quality Improvement Based on Big Quality Warranty Data AnalysisXing Pan, Manli Zhang, Xi Chen. 643-644 [doi]
- Highly Accelerated Life Test Evaluation Based on Accelerated Growth ModelYuankai Gao, Xiaogang Li, Lei Niu. 645-646 [doi]
- Research on CodeCache Management Strategy Based on Code Heat in Dynamic Binary TranslatorFei Deng, Feng Gao, Yuanqiang Yan, Wei Zou. 647-651 [doi]
- A Software Defect Management System Based on Knowledge BaseHaiyan Chai, Nan Zhang, Bojiang Liu, Longli Tang. 652-653 [doi]