Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSRE
ISSRE 2009
Generate Citations
2009 20th International Symposium on Software Reliability Engineering
Nov. 16 2009 to Nov. 19 2009
Mysuru, Karnataka, India
ISBN: 978-0-7695-3878-5
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
Organizing Committees
Freely available from IEEE.
pp. xi
Papers
Program Committee
Freely available from IEEE.
pp. xii-xiii
A Complexity Reliability Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Norm Schneidewind
,
Mike Hinchey
Optimal Adaptive System Health Monitoring and Diagnosis for Resource Constrained Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-60
by
Y. Zhang
,
I.-L. Yen
,
F. B. Bastani
,
A.T. Tai
,
S. Chau
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. viii-x
Papers
Industry, Steering, and Advisory Committees
Freely available from IEEE.
pp. xiv
Papers
Reviewers
Freely available from IEEE.
pp. xv-xvi
Papers
Wavelet-Based Approach for Estimating Software Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Xiao Xiao
,
Tadashi Dohi
Papers
Estimating the Probability of Failure When Software Runs Are Dependent: An Empirical Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-30
by
Katerina Goseva-Popstojanova
,
Margaret Hamill
Papers
Applying the Composition Filter Model for Runtime Verification of Multiple-Language Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-40
by
Somayeh Malakuti
,
Christoph Bockisch
,
Mehmet Aksit
Papers
Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays
Full-text access may be available. Sign in or learn about subscription options.
pp. 41-50
by
Meiyappan Nagappan
,
Kesheng Wu
,
Mladen A. Vouk
Papers
[Publisher's information]
Freely available from IEEE.
pp. 206
Papers
Reducing Field Failures in System Configurable Software: Cost-Based Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-70
by
Hema Srikanth
,
Myra B. Cohen
,
Xiao Qu
Papers
Harnessing Web-Based Application Similarities to Aid in Regression Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-80
by
Kinga Dobolyi
,
Westley Weimer
Papers
On the Effectiveness of Unit Test Automation at Microsoft
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-89
by
Laurie Williams
,
Gunnar Kudrjavets
,
Nachiappan Nagappan
Papers
Approximating Deployment Metrics to Predict Field Defects and Plan Corrective Maintenance Activities
Full-text access may be available. Sign in or learn about subscription options.
pp. 90-98
by
Will Snipes
,
Brian Robinson
,
Penelope Brooks
Papers
Variance Analysis in Software Fault Prediction Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-108
by
Yue Jiang
,
Jie Lin
,
Bojan Cukic
,
Tim Menzies
Papers
Putting It All Together: Using Socio-technical Networks to Predict Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-119
by
Christian Bird
,
Nachiappan Nagappan
,
Harald Gall
,
Brendan Murphy
,
Premkumar Devanbu
Papers
Optimal Security Patch Release Timing under Non-homogeneous Vulnerability-Discovery Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-128
by
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Papers
Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-135
by
Nuno Seixas
,
José Fonseca
,
Marco Vieira
,
Henrique Madeira
Papers
Towards a Unifying Approach in Understanding Security Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-145
by
Prasanth Anbalagan
,
Mladen Vouk
Papers
Fault Tree Analysis of Software-Controlled Component Systems Based on Second-Order Probabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-154
by
Marc Förster
,
Mario Trapp
Papers
Issues on the Design of Efficient Fail-Safe Fault Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-164
by
Arshad Jhumka
,
Matt Leeke
Papers
Insights on Fault Interference for Programs with Multiple Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-174
by
Vidroha Debroy
,
W. Eric Wong
Papers
Towards Behavioral Reflexion Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-184
by
Christopher Ackermann
,
Mikael Lindvall
,
Rance Cleaveland
Papers
Automated Identification of LTL Patterns in Natural Language Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-194
by
Allen P. Nikora
,
Galen Balcom
Papers
Event-Based Input Validation Using Design-by-Contract Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-204
by
T. Tuglular
,
C. A. Muftuoglu
,
F. Belli
,
M. Linschulte
Papers
Author Index
Freely available from IEEE.
pp. 205
Showing 32 out of 32