Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSREW
ISSREW 2018
Generate Citations
2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
Oct. 15 2018 to Oct. 18 2018
Memphis, TN, USA
Table of Contents
[Title page i]
Freely available from IEEE.
pp. 1-1
[Title page iii]
Freely available from IEEE.
pp. 3-3
[Copyright notice]
Freely available from IEEE.
pp. 4-4
Table of contents
Freely available from IEEE.
pp. 5-12
Message from the ISSRE 2018 General Chairs
Freely available from IEEE.
pp. 13-14
Message from the ISSRE 2018 Industry Track Chairs
Freely available from IEEE.
pp. 15-15
ISSRE 2018 Industry Track Committees
Freely available from IEEE.
pp. 16-16
Message from the ISSRE 2018 Doctoral Symposium Chairs
Freely available from IEEE.
pp. 17-17
ISSRE 2018 Doctoral Symposium Committees
Freely available from IEEE.
pp. 18-18
ISSRE 2018 Doctoral Symposium Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-19
Message from the ISSRE 2018 Fast Abstracts Track Chair
Freely available from IEEE.
pp. 20-20
ISSRE 2018 Fast Abstracts Track Committees
Freely available from IEEE.
pp. 21-21
Message from the IDEAR 2018 Workshop Chairs
Freely available from IEEE.
pp. 22-22
IDEAR 2018 Workshop Committees
Freely available from IEEE.
pp. 23-23
Message from the STEP 2018 Workshop Chairs
Freely available from IEEE.
pp. 24-24
STEP 2018 Workshop Committees
Freely available from IEEE.
pp. 25-25
STEP 2018 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. 26-26
Message from the WoSAR 2018 Workshop Chairs
Freely available from IEEE.
pp. 27-27
WoSAR 2018 Workshop Committees
Freely available from IEEE.
pp. 28-29
WoSAR 2018 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-30
Message from the WoSoCer 2018 Workshop Chairs
Freely available from IEEE.
pp. 31-31
WoSoCer 2018 Workshop Committees
Freely available from IEEE.
pp. 32-32
WoSoCer 2018 Workshop Keynote
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-34
Use of Self-Healing Techniques to Improve the Reliability of a Dynamic and Geo-Distributed Ad Delivery Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Nicolas Brousse
,
Oleksii Mykhailov
Trap-Based Software Review: How Will Engineers Embed Bugs Due to Cognitive Error?
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-11
by
Aya Ureshino
,
Yasuharu Nishi
,
Satomi Yoshizawa
,
Makoto Nonaka
,
Makiko Asai
Using Supervised Learning to Guide the Selection of Software Inspectors in Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-17
by
Maninder Singh
,
Gursimran Singh Walia
,
Anurag Goswami
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-23
by
Chin-Wei Tien
,
Tsung-Ta Tsai
,
Ing-Yi Chen
,
Sy-Yen Kuo
A Smart Context-Aware Program Assistant Based on Dynamic Programming Event Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Xuejiao Zhao
,
Hongwei Li
,
Yutian Tang
,
Dongjing Gao
,
Lingfeng Bao
,
Ching-Hung Lee
KEREP: Experience in Extracting Knowledge on Distributed System Behavior through Request Execution Path
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
Jing Gu
,
Long Wang
,
Yong Yang
,
Ying Li
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Sung-Hoon Lee
,
Seung-Hyun Kim
,
SooHyung Kim
,
Seung-Hun Jin
A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Monika Maidl
,
Dirk Kröselberg
,
Jochen Christ
,
Kristian Beckers
A Concept of QCD Prediction and Control in Agile Software Development for Portfolio Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-52
by
Kumi Jinzenji
,
Daisuke Hamuro
Training Industry Practitioners to Investigate the Human Error Causes of Requirements Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Kavitha Manjunath
,
Vaibhav Anu
,
Gursimran Walia
,
Gary Bradshaw
Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDN
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Robert Hanmer
,
Lalita Jagadeesan
,
Veena Mendiratta
,
Heng Zhang
SFRAT – An Extendable Software Reliability Assessment Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-70
by
Allen Nikora
,
Lance Fiondella
,
Thierry Wandji
A Fault Injection Approach to Evaluate Soft-Error Dependability of System Calls
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
Rakshith Amarnath
,
Shashank Nagesh Bhat
,
Peter Munk
,
Eike Thaden
Recent Advances in Software Reliability Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-82
by
Rashid Mijumbi
,
Kazuhira Okumoto
,
Abhaya Asthana
,
Jacques Meekel
How Reliable Is My Software-Defined Network? Models and Failure Impacts
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-88
by
Veena B. Mendiratta
,
Lalita J. Jagadeesan
,
Robert Hanmer
,
Muntasir R. Rahman
Empirical Study on Tendencies for Unstable Situations in Application Results of Software Reliability Growth Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-94
by
Kiyoshi Honda
,
Hironori Washizaki
,
Yoshiaki Fukazawa
,
Masahiro Taga
,
Akira Matsuzaki
,
Takayoshi Suzuki
Challenges and Directions in Security Information and Event Management (SIEM)
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-99
by
Marcello Cinque
,
Domenico Cotroneo
,
Antonio Pecchia
Enhancing HPC System Log Analysis by Identifying Message Origin in Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-105
by
Megan Hickman
,
Dakota Fulp
,
Elisabeth Baseman
,
Sean Blanchard
,
Hugh Greenberg
,
William Jones
,
Nathan DeBardeleben
Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-111
by
Tong Jia
,
Ying Li
,
Chengbo Zhang
,
Wensheng Xia
,
Jie Jiang
,
Yuhong Liu
Visualisation to Support Fault Localisation in Distributed Embedded Systems within the Automotive Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Francisco Gomes de Oliveira Neto
,
Michael Jones
,
Rafael da Silva Martins
Using Ontologies for Test Suites Generation for Automated and Autonomous Driving Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-123
by
Florian Klueck
,
Yihao Li
,
Mihai Nica
,
Jianbo Tao
,
Franz Wotawa
An Approach to Identifying Error Patterns for Infrastructure as Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-129
by
Wei Chen
,
Guoquan Wu
,
Jun Wei
Model Checking the Uncertainties in Software Systems Introduced by Intelligent Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-131
by
Zuohua Ding
,
Wenjie Jiang
,
Mingyue Jiang
,
Zhi Jin
,
He Jiang
Evaluation and Construction of Covering Arrays Utilizing Prior Information
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-133
by
Ryan Lekivetz
,
Joseph Morgan
Predicting Software Defects Based on Cognitive Error Theories
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-135
by
Fuqun Huang
,
Lorenzo Strigini
Software Reliability Evaluation Method Based on a Software Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-137
by
Jun Ai
,
Wenzhu Su
,
Fei Wang
Probing the Security of DNA Origami
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-139
by
Chase Koehler
,
Divita Mathur
,
Eric Henderson
,
Robyn Lutz
Enhancing the Analysis of Error Propagation and Failure Modes in Cloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-141
by
Domenico Cotroneo
,
Luigi De Simone
,
Alfonso Di Martino
,
Pietro Liguori
,
Roberto Natella
An Adaptive PID Control for QoS Management in Cloud Computing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-143
by
Siqian Gong
,
Beibei Yin
,
Kai-yuan Cai
Model Fusion: Weighted N-Version Programming for Resilient Autonomous Vehicle Steering Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-145
by
Ailec Wu
,
Abu Hasnat Mohammad Rubaiyat
,
Chris Anton
,
Homa Alemzadeh
ORCAS: Efficient Resilience Benchmarking of Microservice Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-147
by
André van Hoorn
,
Aldeida Aleti
,
Thomas F. Düllmann
,
Teerat Pitakrat
Dynamic Random Testing Strategy for Test Case Optimization in Cloud Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-149
by
Hanyu Pei
,
Beibei Yin
,
Min Xie
Enhancing Security and Reliability for Smart- Systems' Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-153
by
Florian Hofer
Safety Analysis for Highly Automated Driving
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-157
by
Schmid Tobias
Testing Extract-Transform-Load Process in Data Warehouse Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-161
by
Hajar Homayouni
Prioritization of Metamorphic Relations Based on Test Case Execution Properties
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-165
by
Madhusudan Srinivasan
Software Reliability Assessment: Modeling and Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-169
by
Vidhyashree Nagaraju
Modelling, Design and Optimization of Dependable Softwarized Networks for Industrial Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-173
by
Petra Vizarreta
Taming Exceptions in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-177
by
Juliana Oliveira
Machine Learning Augmented Fuzzing
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Leonid Joffe
Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-191
by
Arpit Christi
,
Matthew Lyle Olson
,
Mohammad Amin Alipour
,
Alex Groce
Spectrum-Based Fault Localization for Logic-Based Reasoning
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-199
by
Ingo Pill
,
Franz Wotawa
SeTCHi: Selecting Test Cases to Improve History-Guided Fault Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-207
by
Long Zhang
,
Zhenyu Zhang
CFAAR: Control Flow Alteration to Assist Repair
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-215
by
Chadi Trad
,
Rawad Abou Assi
,
Wes Masri
,
Fadi Zaraket
DDS: Deadlock Detector and Solver
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-223
by
Eman Aldakheel
,
Ugo Buy
,
Simran Kaur
ConfGuru - A System for Fully Automated Debugging of Configuration Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-231
by
Artur Andrzejak
,
Matthias Iacsa
An Approach for Predicting Bug Report Fields Using a Neural Network Learning Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-236
by
Korosh Koochekian Sabor
,
Mathieu Nayrolles
,
Abdelaziz Trabelsi
,
Abdelwahab Hamou-Lhadj
Establishment of Methods for Information Security System Policy Using Benchmarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-242
by
Martin Kang
,
Ted Lee
,
Sungyong Um
The DevSecOps and Agency Theory
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-244
by
Jong Seok Lee
Graphite: A Greedy Graph-Based Technique for Regression Test Case Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-251
by
Maral Azizi
,
Hyunsook Do
A Literature Review of Software Test Cases and Future Research
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-256
by
Mark L. Gillenson
,
Xihui Zhang
,
Thomas F. Stafford
,
Yao Shi
Software Aging and Rejuvenation in the Cloud: A Literature Review
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-263
by
Roberto Pietrantuono
,
Stefano Russo
A Systematic Mapping Review of Memory Leak Detection Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-270
by
Guilherme Otávio de Sena
,
Rivalino Matias
An Empirical Study on Software Aging Indicators Prediction in Android Mobile
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-277
by
Yu Qiao
,
Zheng Zheng
,
YunYu Fang
Extracting Interaction-Related Failure Indicators for Online Detection and Prediction of Content Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-285
by
Luyi Li
,
Minyan Lu
,
Tingyang Gu
The Role of Similarity in Detecting Feature Interaction in Software Product Lines
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-292
by
Seyedehzahra Khoshmanesh
,
Robyn R. Lutz
A New Software Rejuvenation Model for Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-299
by
Jianwen Xiang
,
Caisheng Weng
,
Dongdong Zhao
,
Jing Tian
,
Shengwu Xiong
,
Lin Li
,
Artur Andrzejakb
Interacting SRN Models for Availability Evaluation of VM Migration as Rejuvenation on a System under Varying Workload
Full-text access may be available. Sign in or learn about subscription options.
pp. 300-307
by
Matheus Torquato
,
Marco Vieira
Robotics Software Engineering and Certification: Issues and Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Roberto Pietrantuono
,
Stefano Russo
TensorFI: A Configurable Fault Injector for TensorFlow Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-320
by
Guanpeng Li
,
Karthik Pattabiraman
,
Nathan DeBardeleben
Dependability Certification Guidelines for NFVIs through Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-328
by
Domenico Cotroneo
,
Luigi De Simone
,
Roberto Natella
Toward a Systematic and Safety Evidence Productive Verification Approach for Safety-Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 329-336
by
Aiman Gannous
,
Anneliese Andrews
,
Barbara Gallina
Towards Agile Yet Regulatory-Compliant Development of Medical Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-340
by
Vlad Stirbu
,
Tommi Mikkonen
Verifiable Self-Certifying Autonomous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-348
by
Michael Fisher
,
Emily Collins
,
Louise Dennis
,
Matt Luckcuck
,
Matt Webster
,
Mike Jump
,
Vincent Page
,
Charles Patchett
,
Fateme Dinmohammadi
,
David Flynn
,
Valentin Robu
,
Xingyu Zhao
Model-Based Computer-Aided Monitoring for ISO26262 Compliant Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-352
by
Morayo Adedjouma
,
Asma Smaoui
Author Index
Freely available from IEEE.
pp. 353-355
[Publisher's information]
Freely available from IEEE.
pp. 356-356
Showing 90 out of 90