Default Cover Image

The 18th IEEE International Symposium on Software Reliability (ISSRE '07)

Nov. 5 2007 to Nov. 9 2007

Trollhattan

Table of Contents

Introduction
Greetings from the General and Program ChairsFreely available from IEEE.pp. viii
Introduction
Secondary reviewersFreely available from IEEE.pp. xv-xvi
Introduction
Organizing CommitteeFreely available from IEEE.pp. ix-x
On the Impact of Injection Triggers for OS Robustness EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 127-126
Introduction
Program CommitteeFreely available from IEEE.pp. xi-xii
Introduction
ReviewersFreely available from IEEE.pp. xiii-xiv
Session 1: Reliability of Software Systems
Sensitivity of Website Reliability to Usage Profile ChangesFull-text access may be available. Sign in or learn about subscription options.pp. 3-8
Session 1: Reliability of Software Systems
Measuring Software Reliability in Practice: An Industry Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Session 1: Reliability of Software Systems
Software Reliability Modeling with Test Coverage: Experimentation and Measurement with A Fault-Tolerant Software ProjectFull-text access may be available. Sign in or learn about subscription options.pp. 17-26
Session 2: Dependable Software Systems
Coordinated Atomic Actions for Dependable Distributed Systems: the Current State in Concepts, Semantics and Verification MeansFull-text access may be available. Sign in or learn about subscription options.pp. 29-38
Session 2: Dependable Software Systems
Towards Self-Protecting Enterprise ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 39-48
Correlations between Internal Software Metrics and Software Dependability in a Large Population of Small C/C++ ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 203-208
Session 2: Dependable Software Systems
Reliability Modeling of a 1-Out-Of-2 System: Research with Diverse Off-The-Shelf SQL Database ServersFull-text access may be available. Sign in or learn about subscription options.pp. 49-58
Session 3: Verification & Validation
Corroborating User Assessments of Software Behavior to Facilitate Operational TestingFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Session 3: Verification & Validation
Requirement Error Abstraction and Classification: A Control Group Replicated StudyFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Session 3: Verification & Validation
Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change RecordsFull-text access may be available. Sign in or learn about subscription options.pp. 81-90
Session 4: Security Testing and Analysis
Testing Security Policies: Going Beyond Functional TestingFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
Session 4: Security Testing and Analysis
Integrated Software Vulnerability and Security Functionality AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Session 4: Security Testing and Analysis
A Comparison between Internal and External Malicious TrafficFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Session 5: Test Automation
Automated Oracle Comparators for TestingWeb ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 117-126
Session 5: Test Automation
Using Machine Learning to Support Debugging with TarantulaFull-text access may be available. Sign in or learn about subscription options.pp. 137-146
Session 6: Software Security
Statistical Inference of Computer Virus Propagation Using Non-Homogeneous Poisson ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 149-158
Session 6: Software Security
Applying Software Reliability Models on Security IncidentsFull-text access may be available. Sign in or learn about subscription options.pp. 159-168
Session 7: Testing Techniques
Generating Trace-Sets for Model-based TestingFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Session 7: Testing Techniques
Improving Constraint-Based Testing with Dynamic Linear RelaxationsFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Session 7: Testing Techniques
Intra-Class Testing of Abstract Class FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Session 8: Metrics and Measurements
Using In-Process Testing Metrics to Estimate Post-Release Field QualityFull-text access may be available. Sign in or learn about subscription options.pp. 209-214
Session 8: Metrics and Measurements
Data Mining Techniques for Building Fault-proneness Models in Telecom Java SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 215-224
Session 9: Software Quality Prediction
Predicting Subsystem Failures using Dependency Graph ComplexitiesFull-text access may be available. Sign in or learn about subscription options.pp. 227-236
Session 9: Software Quality Prediction
Fault Prediction using Early Lifecycle DataFull-text access may be available. Sign in or learn about subscription options.pp. 237-246
Session 9: Software Quality Prediction
Non-parametric Predictive Inference of Preventive Rejuvenation Schedule in Operational Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 247-256
Author Index
Author IndexFreely available from IEEE.pp. 257-258
Showing 35 out of 35