Default Cover Image

2014 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)

Nov. 3 2014 to Nov. 6 2014

Naples, Italy

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-xvi
Message from the General ChairFreely available from IEEE.pp. xvii-xviii
CommitteesFreely available from IEEE.pp. xix-xx
Industry Paper OrganizersFreely available from IEEE.pp. xxi-xxi
Message from the Fast Abstract ChairFreely available from IEEE.pp. xxii-xxii
Fast Abstract OrganizersFreely available from IEEE.pp. xxiii-xxiii
Message from the Student Paper Track ChairFreely available from IEEE.pp. xxiv-xxiv
Student Paper OrganizersFreely available from IEEE.pp. xxv-xxv
Message from ASSURE 2014 Workshop Co-ChairsFreely available from IEEE.pp. xxvi-xxvi
ASSURE 2014 Workshop OrganizersFreely available from IEEE.pp. xxvii-xxvii
Message from the IWPD 2014 Workshop OrganizersFreely available from IEEE.pp. xxviii-xxviii
IWPD 2014 Workshop OrganizersFreely available from IEEE.pp. xxix-xxix
Message from RISK 2014 Workshop ChairsFreely available from IEEE.pp. xxx-xxx
RISK 2014 Workshop OrganizersFreely available from IEEE.pp. xxxi-xxxi
Message from the RSDA 2014 Workshop Co-ChairsFreely available from IEEE.pp. xxxii-xxxii
RSDA 2014 Workshop OrganizersFreely available from IEEE.pp. xxxiii-xxxiii
Message from the WoSAR 2014 Workshop ChairsFreely available from IEEE.pp. xxxiv-xxxiv
WoSAR 2014 Organizing Committee and ReviewersFreely available from IEEE.pp. xxxv-xxxvii
Message from the WOSD 2014 Workshop ChairsFreely available from IEEE.pp. xxxviii-xxxviii
WOSD 2014 Workshop OrganizersFreely available from IEEE.pp. xxxix-xxxix
Message from the WoSoCer 2014 Workshop OrganizersFreely available from IEEE.pp. xl-xl
WoSoCer 2014 Workshop OrganizersFreely available from IEEE.pp. xli-xli
Soft-LLFI: A Comprehensive Framework for Software Fault InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Fault Injection Experiments with the CLAMR Hydrodynamics Mini-AppFull-text access may be available. Sign in or learn about subscription options.pp. 6-9
Event Based Robot Prognostics Using Principal Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 14-17
Proving Model Equivalence in Model Based DesignFull-text access may be available. Sign in or learn about subscription options.pp. 18-21
Developing Software Reliability Models in the Architecture Phase of the Software LifecycleFull-text access may be available. Sign in or learn about subscription options.pp. 22-23
Architecture for a Hard-Real-Time System Enabling Non-intrusive TestsFull-text access may be available. Sign in or learn about subscription options.pp. 24-24
Handling Soft Error in Embedded Software for Networking SystemFull-text access may be available. Sign in or learn about subscription options.pp. 25-28
Towards an Evaluation Framework for Availability Solutions in the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 43-46
Verifying Response Times in Networked Automation Systems Using Jitter BoundsFull-text access may be available. Sign in or learn about subscription options.pp. 47-50
Performability Comparison of Lustre and HDFS for MR ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 51-51
Reliability Models for the Internet of Things: A Paradigm ShiftFull-text access may be available. Sign in or learn about subscription options.pp. 52-59
Predicting Release QualityFull-text access may be available. Sign in or learn about subscription options.pp. 60-61
Automated Generation of Failure Modes and Effects Analysis from SysML ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 62-65
MBT for Global Platform Compliance Testing: Experience Report and Lessons LearnedFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
Assessing the Threat Landscape for Software LibrariesFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
Security Evaluation of a Linux System: Common Criteria EAL4+ Certification ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 77-81
CAMDIT: A Toolkit for Integrating Heterogeneous Data for Enhanced Service ProvisioningFull-text access may be available. Sign in or learn about subscription options.pp. 86-91
Quantitative evaluation of static analysis toolsFull-text access may be available. Sign in or learn about subscription options.pp. 96-99
Code Analysis as an Enabler for SW Quality Improvement: The SELEX ES SW Engineering ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
Supporting Reviewing of Warnings in Presence of Shared Variables: Need and EffectivenessFull-text access may be available. Sign in or learn about subscription options.pp. 104-107
A Formal Method Applied to the Automated Software Engineering with Quality GuaranteesFull-text access may be available. Sign in or learn about subscription options.pp. 108-111
Understanding DO-178C Software Certification: Benefits Versus CostsFull-text access may be available. Sign in or learn about subscription options.pp. 114-114
Challenges in Future Avionic Systems on Multi-Core PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 115-119
Model-Checking Real-Time Properties of an Auto Flight Control System FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 120-123
Practical Behavioral Inconsistency Detection between Source Code and Specification Using Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 124-125
Early Conflict Detection with Mined ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 126-127
Analysis of Functional Software Dependencies through Supervised ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 128-129
Applying Parameter Value Weighting to a Practical ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 130-131
Regression Testing Approach for Large-Scale SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 132-133
Automatic Testing Framework for Virtualization EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 134-135
Mapping the Software Errors and Effects Analysis Method to ISO26262 Requirements for Software Architecture AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 136-137
Is Cut Sequence Necessary in Dynamic Fault Trees?Full-text access may be available. Sign in or learn about subscription options.pp. 138-139
Exploiting Behavior Models for Availability Analysis of Interactive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 140-141
Evaluating Embedded-Software Specifications -- Quantitative and Structured Assessment of Declarative Interface DescriptionsFull-text access may be available. Sign in or learn about subscription options.pp. 142-143
Are the Classical Disaster Recovery Tiers Still Applicable Today?Full-text access may be available. Sign in or learn about subscription options.pp. 144-145
Describing Software Specification by Combining SysML with the B MethodFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 152-155
Towards Fault Propagation Analysis in Cloud Computing EcosystemsFull-text access may be available. Sign in or learn about subscription options.pp. 156-161
Towards Making Safety-Critical Systems Safer: Learning from MistakesFull-text access may be available. Sign in or learn about subscription options.pp. 162-167
A Research Agenda for Benchmarking the Resilience of Software Defined NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 168-173
Do Injected Faults Cause Real Failures? A Case Study of LinuxFull-text access may be available. Sign in or learn about subscription options.pp. 174-179
The Definition and Assessment of a Safety ArgumentFull-text access may be available. Sign in or learn about subscription options.pp. 180-185
Building Blocks for Assurance CasesFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
Linking Traceability with GSNFull-text access may be available. Sign in or learn about subscription options.pp. 192-197
Retrieving Information from a Document Repository for Constructing Assurance CasesFull-text access may be available. Sign in or learn about subscription options.pp. 198-203
A Model-Driven Safety Certification Method for Process ComplianceFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
SCT: A Safety Case ToolkitFull-text access may be available. Sign in or learn about subscription options.pp. 216-219
A Security Argument Pattern for Medical Device Assurance CasesFull-text access may be available. Sign in or learn about subscription options.pp. 220-225
Arguing Software Compliance with ISO 26262Full-text access may be available. Sign in or learn about subscription options.pp. 226-231
Pinpointing Failure Inducing Event OrderingsFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Trace Reduction and Pattern Analysis to Assist Debugging in Model-Based TestingFull-text access may be available. Sign in or learn about subscription options.pp. 238-243
Program Debugging: Research and PracticeFull-text access may be available. Sign in or learn about subscription options.pp. 244-244
Defect Analysis and Reliability Assessment for Transactional Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 245-250
A Memory Model Based on Three-Valued Matrix for Static Defect DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 251-256
Debugging with Dynamic Temporal AssertionsFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Spectrum-Based Fault Localization for Spreadsheets: Influence of Correct Output Cells on the Fault Localization QualityFull-text access may be available. Sign in or learn about subscription options.pp. 263-268
Studying the Advancement in Debugging Practice of Professional Software DevelopersFull-text access may be available. Sign in or learn about subscription options.pp. 269-274
Evaluation of Risk for Complex Systems Using Attack SurfaceFull-text access may be available. Sign in or learn about subscription options.pp. 275-280
Structuring Compliance Risk Identification Using the CORAS Approach: Compliance as an AssetFull-text access may be available. Sign in or learn about subscription options.pp. 281-286
Towards Safety Risk Assessment of Socio-Technical Systems via Failure Logic AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 287-292
CRSTIP -- An Assessment Scheme for Security Assessment ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 296-298
Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 305-310
Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code AttributesFull-text access may be available. Sign in or learn about subscription options.pp. 317-322
Mining Security Vulnerabilities from Linux Distribution MetadataFull-text access may be available. Sign in or learn about subscription options.pp. 323-328
Showing 100 out of 140