Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSREW
ISSREW 2014
Generate Citations
2014 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
Nov. 3 2014 to Nov. 6 2014
Naples, Italy
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-xvi
Message from the General Chair
Freely available from IEEE.
pp. xvii-xviii
Committees
Freely available from IEEE.
pp. xix-xx
Industry Paper Organizers
Freely available from IEEE.
pp. xxi-xxi
Message from the Fast Abstract Chair
Freely available from IEEE.
pp. xxii-xxii
Fast Abstract Organizers
Freely available from IEEE.
pp. xxiii-xxiii
Message from the Student Paper Track Chair
Freely available from IEEE.
pp. xxiv-xxiv
Student Paper Organizers
Freely available from IEEE.
pp. xxv-xxv
Message from ASSURE 2014 Workshop Co-Chairs
Freely available from IEEE.
pp. xxvi-xxvi
ASSURE 2014 Workshop Organizers
Freely available from IEEE.
pp. xxvii-xxvii
Message from the IWPD 2014 Workshop Organizers
Freely available from IEEE.
pp. xxviii-xxviii
IWPD 2014 Workshop Organizers
Freely available from IEEE.
pp. xxix-xxix
Message from RISK 2014 Workshop Chairs
Freely available from IEEE.
pp. xxx-xxx
RISK 2014 Workshop Organizers
Freely available from IEEE.
pp. xxxi-xxxi
Message from the RSDA 2014 Workshop Co-Chairs
Freely available from IEEE.
pp. xxxii-xxxii
RSDA 2014 Workshop Organizers
Freely available from IEEE.
pp. xxxiii-xxxiii
Message from the WoSAR 2014 Workshop Chairs
Freely available from IEEE.
pp. xxxiv-xxxiv
WoSAR 2014 Organizing Committee and Reviewers
Freely available from IEEE.
pp. xxxv-xxxvii
Message from the WOSD 2014 Workshop Chairs
Freely available from IEEE.
pp. xxxviii-xxxviii
WOSD 2014 Workshop Organizers
Freely available from IEEE.
pp. xxxix-xxxix
Message from the WoSoCer 2014 Workshop Organizers
Freely available from IEEE.
pp. xl-xl
WoSoCer 2014 Workshop Organizers
Freely available from IEEE.
pp. xli-xli
Soft-LLFI: A Comprehensive Framework for Software Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Maryam Raiyat Aliabadi
,
Karthik Pattabiraman
,
Nematollah Bidokhti
Fault Injection Experiments with the CLAMR Hydrodynamics Mini-App
Full-text access may be available. Sign in or learn about subscription options.
pp. 6-9
by
Brian Atkinson
,
Nathan Debardeleben
,
Qiang Guan
,
Robert Robey
,
William M. Jones
Event Logging in an Industrial Development Process: Practices and Reengineering Challenges
Full-text access may be available. Sign in or learn about subscription options.
pp. 10-13
by
Fabio Baccanico
,
Gabriella Carrozza
,
Marcello Cinque
,
Domenico Cotroneo
,
Antonio Pecchia
,
Agostino Savignano
Event Based Robot Prognostics Using Principal Component Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-17
by
V. Sathish
,
S.D. Sudarsan
,
Srini Ramaswamy
Proving Model Equivalence in Model Based Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-21
by
Ashlie B. Hocking
,
John Knight
,
M. Anthony Aiello
,
Shinichi Shiraishi
Developing Software Reliability Models in the Architecture Phase of the Software Lifecycle
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-23
by
Alberto A. Avritzer
,
Andre B. Bondi
Architecture for a Hard-Real-Time System Enabling Non-intrusive Tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-24
by
Joachim Froehlich
,
Reiner Schmid
Handling Soft Error in Embedded Software for Networking System
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-28
by
Haihong Henry Zhu
Safety Critical Robot Programming and Testing for Operations in Industrial Co-Production
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-32
by
Linn Gustavsson Christiernin
,
Svante Augustsson
,
Stefan Christiernin
NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-36
by
Stefano Avallone
,
Gabriella Carrozza
,
Marcello Cinque
,
Raffaele Della Corte
,
Antonio Marotta
,
Antonio Pecchia
,
Agostino Savignano
Network Function Virtualization: Challenges and Directions for Reliability Assurance
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
D. Cotroneo
,
L. De Simone
,
A.K. Iannillo
,
A. Lanzaro
,
R. Natella
,
Jiang Fan
,
Wang Ping
Towards an Evaluation Framework for Availability Solutions in the Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-46
by
Majid Hormati
,
Ferhat Khendek
,
Maria Toeroe
Verifying Response Times in Networked Automation Systems Using Jitter Bounds
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-50
by
Seshadhri Srinivasan
,
Furio Buonopane
,
Srini Ramaswamy
,
Juri Vain
Performability Comparison of Lustre and HDFS for MR Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-51
by
Rekha Singhal
,
Manoj Nambiar
,
Harish Sukhwani
,
Kishor Trivedi
Reliability Models for the Internet of Things: A Paradigm Shift
Full-text access may be available. Sign in or learn about subscription options.
pp. 52-59
by
Mudasir Ahmad
Predicting Release Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 60-61
by
Pete Rotella
,
Sunita Chulani
Automated Generation of Failure Modes and Effects Analysis from SysML Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-65
by
Myron Hecht
,
Emily Dimpfl
,
Julia Pinchak
MBT for Global Platform Compliance Testing: Experience Report and Lessons Learned
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Gil Bernabeu
,
Eddie Jaffuel
,
Bruno Legeard
,
Fabien Peureux
Assessing the Threat Landscape for Software Libraries
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-76
by
Raghudeep Kannavara
Security Evaluation of a Linux System: Common Criteria EAL4+ Certification Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-81
by
Luca Recchia
,
Giuseppe Procopio
,
Andrea Onofrii
,
Francesco Rogo
Balanced Measurement Sets: Criteria for Improving Project Management Practices
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-85
by
Luigi Buglione
,
Daniele Gagliardi
,
Sergio Oltolina
,
Gabriele Ruffatti
,
Ernesto Damiani
,
Fulvio Frati
CAMDIT: A Toolkit for Integrating Heterogeneous Data for Enhanced Service Provisioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Ipadeola Abayomi
,
Ipadeola Oladipupo
,
Ahmed Ameen
,
Sadiku Joseph
Applying Metrics to Identify and Monitor Technical Debt Items during Software Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-95
by
Clauirton A. Siebra
,
Antonio Cavalcanti
,
Fabio Q.B. Silva
,
Andre L.M. Santos
,
Tatiana B. Gouveia
Quantitative evaluation of static analysis tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-99
by
Shinichi Shiraishi
,
Veena Mohan
,
Hemalatha Marimuthu
Code Analysis as an Enabler for SW Quality Improvement: The SELEX ES SW Engineering Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-103
by
Salvatore Scervo
,
Stefano Rosati
,
Gabriella Carrozza
Supporting Reviewing of Warnings in Presence of Shared Variables: Need and Effectiveness
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-107
by
Tukaram Muske
A Formal Method Applied to the Automated Software Engineering with Quality Guarantees
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-111
by
Marcelo Teixeira
,
Richardson Ribeiro
,
Marco Barbosa
,
Luciene Marin
Planning of Prioritized Test Procedures in Large Integrated Systems: Best Strategy of Defect Discovery and Early Stop of Testing Session, The Selex-ES Experience
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-113
by
Gianfrancesco Ranieri
Understanding DO-178C Software Certification: Benefits Versus Costs
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-114
by
Vance Hilderman
Challenges in Future Avionic Systems on Multi-Core Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-119
by
Andreas Lofwenmark
,
Simin Nadjm-Tehrani
Model-Checking Real-Time Properties of an Auto Flight Control System Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-123
by
Pierre-Alain Bourdil
,
Bernard Berthomieu
,
Eric Jenn
Practical Behavioral Inconsistency Detection between Source Code and Specification Using Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-125
by
Saeko Matsuura
,
Yoshitaka Aoki
,
Shinpei Ogata
Early Conflict Detection with Mined Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 126-127
by
Leonardo Mariani
,
Daniela Micucci
,
Fabrizio Pastore
Analysis of Functional Software Dependencies through Supervised Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-129
by
Jasmin Jahic
,
Thomas Kuhn
Applying Parameter Value Weighting to a Practical Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-131
by
Satoshi Fujimoto
,
Hideharu Kojima
,
Hiroyuki Nakagawa
,
Tatsuhiro Tsuchiya
Regression Testing Approach for Large-Scale Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-133
by
Passant Kandil
,
Sherin Moussa
,
Nagwa Badr
Automatic Testing Framework for Virtualization Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-135
by
Chia Hung Kao
,
Ping-Hsien Chi
,
Yi-Hsuan Lee
Mapping the Software Errors and Effects Analysis Method to ISO26262 Requirements for Software Architecture Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-137
by
Paulo Victor Carvalho
Is Cut Sequence Necessary in Dynamic Fault Trees?
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-139
by
Jianwen Xiang
,
Fumio Machida
,
Kumiko Tadano
,
Shigeru Hosono
Exploiting Behavior Models for Availability Analysis of Interactive Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-141
by
Maximilian Junker
Evaluating Embedded-Software Specifications -- Quantitative and Structured Assessment of Declarative Interface Descriptions
Full-text access may be available. Sign in or learn about subscription options.
pp. 142-143
by
Marc Forster
Are the Classical Disaster Recovery Tiers Still Applicable Today?
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-145
by
Omar H. Alhami
,
Yashwant K. Malaiya
Describing Software Specification by Combining SysML with the B Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Satoko Kinoshita
,
Hidekazu Nishimura
,
Hiroki Takamura
,
Daichi Mizuguchi
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-155
by
Jingwen Zhou
,
Zhenbang Chen
,
Ji Wang
,
Zibin Zheng
,
Wei Dong
Towards Fault Propagation Analysis in Cloud Computing Ecosystems
Full-text access may be available. Sign in or learn about subscription options.
pp. 156-161
by
Luigi De Simone
Towards Making Safety-Critical Systems Safer: Learning from Mistakes
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-167
by
Nuno Silva
,
Marco Vieira
A Research Agenda for Benchmarking the Resilience of Software Defined Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-173
by
Luis Eduardo Santos
,
Marilia Curado
,
Marco Vieira
Do Injected Faults Cause Real Failures? A Case Study of Linux
Full-text access may be available. Sign in or learn about subscription options.
pp. 174-179
by
Nobuo Kikuchi
,
Takeshi Yoshimura
,
Ryo Sakuma
,
Kenji Kono
The Definition and Assessment of a Safety Argument
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
V. Cassano
,
T.S.E. Maibaum
Building Blocks for Assurance Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-191
by
Robin Bloomfield
,
Kateryna Netkachova
Linking Traceability with GSN
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-197
by
Kenji Taguchi
,
Souma Daisuke
,
Hideaki Nishihara
,
Toshinori Takai
Retrieving Information from a Document Repository for Constructing Assurance Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 198-203
by
Khana Chindamaikul
,
Toshinori Takai
,
Hajimu Iida
A Model-Driven Safety Certification Method for Process Compliance
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Barbara Gallina
A Technique for Demonstrating Safety and Correctness of Program Translators: Strategy and Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-215
by
Junbeom Yoo
,
Jong-Gyun Choi
,
Young Jun Lee
,
Jang-Soo Lee
SCT: A Safety Case Toolkit
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-219
by
M. Anthony Aiello
,
Ashlie B. Hocking
,
John Knight
,
Jonathan Rowanhill
A Security Argument Pattern for Medical Device Assurance Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-225
by
Anita Finnegan
,
Fergal McCaffery
Arguing Software Compliance with ISO 26262
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Ashlie B. Hocking
,
John Knight
,
M. Anthony Aiello
,
Shinichi Shiraishi
Pinpointing Failure Inducing Event Orderings
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
Hanefi Mercan
,
Cemal Yilmaz
Trace Reduction and Pattern Analysis to Assist Debugging in Model-Based Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-243
by
Teemu Kanstren
,
Marsha Chechik
Program Debugging: Research and Practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-244
by
W. Eric Wong
Defect Analysis and Reliability Assessment for Transactional Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-250
by
Wafa Jaffal
,
Jeff Tian
A Memory Model Based on Three-Valued Matrix for Static Defect Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-256
by
Qian Wang
,
Dahai Jin
,
Yunzhan Gong
Debugging with Dynamic Temporal Assertions
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Ziad A. Al-Sharif
,
Clinton L. Jeffery
,
Mahmoud H. Said
Spectrum-Based Fault Localization for Spreadsheets: Influence of Correct Output Cells on the Fault Localization Quality
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-268
by
Birgit Hofer
Studying the Advancement in Debugging Practice of Professional Software Developers
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-274
by
Benjamin Siegmund
,
Michael Perscheid
,
Marcel Taeumel
,
Robert Hirschfeld
Evaluation of Risk for Complex Systems Using Attack Surface
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-280
by
Leanid Krautsevich
,
Fabio Martinelli
,
Artsiom Yautsiukhin
Structuring Compliance Risk Identification Using the CORAS Approach: Compliance as an Asset
Full-text access may be available. Sign in or learn about subscription options.
pp. 281-286
by
Samson Yoseph Esayas
Towards Safety Risk Assessment of Socio-Technical Systems via Failure Logic Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Barbara Gallina
,
Edin Sefer
,
Atle Refsdal
Risk Management for Outsourcing to the Cloud: Security Risks and Safeguards as Selection Criteria for Extern Cloud Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-295
by
Johannes Viehmann
CRSTIP -- An Assessment Scheme for Security Assessment Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-298
by
Arthur-Jozsef Molnar
,
Jurgen Grossmann
Expressing Best Practices in (Risk) Analysis and Testing of Safety-Critical Systems Using Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-304
by
Wolfgang Herzner
,
Sven Sieverding
,
Omar Kacimi
,
Eckard Bode
,
Thomas Bauer
,
Brian Nielsen
Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-310
by
Gencer Erdogan
,
Atle Refsdal
,
Ketil Stolen
How Does the UML Testing Profile Support Risk-Based Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-316
by
Shaukat Ali
,
Tao Yue
,
Andreas Hoffmann
,
Marc-Florian Wendland
,
Alessandra Bagnato
,
Etienne Brosse
,
Markus Schacher
,
Zhen Ru Dai
Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes
Full-text access may be available. Sign in or learn about subscription options.
pp. 317-322
by
Bindu Madhavi Padmanabhuni
,
Hee Beng Kuan Tan
Mining Security Vulnerabilities from Linux Distribution Metadata
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-328
by
Jeffrey Stuckman
,
James Purtilo
Showing 100 out of 140
Load More
Load All