Default Cover Image

2009 20th International Symposium on Software Reliability Engineering

Nov. 16 2009 to Nov. 19 2009

Mysuru, Karnataka, India

ISBN: 978-0-7695-3878-5

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-vii
Papers
Organizing CommitteesFreely available from IEEE.pp. xi
Papers
Program CommitteeFreely available from IEEE.pp. xii-xiii
A Complexity Reliability ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Optimal Adaptive System Health Monitoring and Diagnosis for Resource Constrained Cyber-Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. viii-x
Papers
Industry, Steering, and Advisory CommitteesFreely available from IEEE.pp. xiv
Papers
ReviewersFreely available from IEEE.pp. xv-xvi
Papers
Wavelet-Based Approach for Estimating Software ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Papers
Estimating the Probability of Failure When Software Runs Are Dependent: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Papers
Applying the Composition Filter Model for Runtime Verification of Multiple-Language SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Papers
Efficiently Extracting Operational Profiles from Execution Logs Using Suffix ArraysFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Papers
[Publisher's information]Freely available from IEEE.pp. 206
Papers
Reducing Field Failures in System Configurable Software: Cost-Based PrioritizationFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Papers
Harnessing Web-Based Application Similarities to Aid in Regression TestingFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Papers
On the Effectiveness of Unit Test Automation at MicrosoftFull-text access may be available. Sign in or learn about subscription options.pp. 81-89
Papers
Approximating Deployment Metrics to Predict Field Defects and Plan Corrective Maintenance ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 90-98
Papers
Variance Analysis in Software Fault Prediction ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 99-108
Papers
Putting It All Together: Using Socio-technical Networks to Predict FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 109-119
Papers
Optimal Security Patch Release Timing under Non-homogeneous Vulnerability-Discovery ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 120-128
Papers
Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field StudyFull-text access may be available. Sign in or learn about subscription options.pp. 129-135
Papers
Towards a Unifying Approach in Understanding Security ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 136-145
Papers
Fault Tree Analysis of Software-Controlled Component Systems Based on Second-Order ProbabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 146-154
Papers
Issues on the Design of Efficient Fail-Safe Fault ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 155-164
Papers
Insights on Fault Interference for Programs with Multiple BugsFull-text access may be available. Sign in or learn about subscription options.pp. 165-174
Papers
Towards Behavioral Reflexion ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 175-184
Papers
Automated Identification of LTL Patterns in Natural Language RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 185-194
Papers
Event-Based Input Validation Using Design-by-Contract PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 195-204
Papers
Author IndexFreely available from IEEE.pp. 205
Showing 32 out of 32