Default Cover Image

2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)

Oct. 23 2016 to Oct. 27 2016

Ottawa, ON, Canada

Table of Contents

Title Page iFreely available from IEEE.pp. i-i
Title Page iiiFreely available from IEEE.pp. iii-iii
Copyright PageFreely available from IEEE.pp. iv-iv
Table of ContentsFreely available from IEEE.pp. v-ix
Message from the ISSRE 2016 General ChairFreely available from IEEE.pp. x-x
Message from the Program Co-ChairsFreely available from IEEE.pp. xi-xi
Organizing CommitteeFreely available from IEEE.pp. xii-xii
Program CommitteesFreely available from IEEE.pp. xiii-xv
SubreviewersFreely available from IEEE.pp. xvi-xvi
Keynote abstractsFull-text access may be available. Sign in or learn about subscription options.pp. xvii-xix
On Adaptive Sampling-Based Testing for Software Reliability AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Frequent Subgraph Based Familial Classification of Android MalwareFull-text access may be available. Sign in or learn about subscription options.pp. 24-35
The Effect of Test Suite Type on Regression Test SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 47-58
WAP: A Novel Automatic Test Generation Technique Based on Moth Flame OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 59-64
On the Personality Traits of GitHub ContributorsFull-text access may be available. Sign in or learn about subscription options.pp. 77-86
WAP: Understanding the Brain at Software DebuggingFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Distance-Integrated Combinatorial TestingFull-text access may be available. Sign in or learn about subscription options.pp. 93-104
Automatically Classifying Test Results by Semi-Supervised LearningFull-text access may be available. Sign in or learn about subscription options.pp. 116-126
Combining Word Embedding with Information Retrieval to Recommend Similar Bug ReportsFull-text access may be available. Sign in or learn about subscription options.pp. 127-137
Experience Report: Understanding Cross-Platform App Issues from User ReviewsFull-text access may be available. Sign in or learn about subscription options.pp. 138-149
CoLUA: Automatically Predicting Configuration Bug Reports and Extracting Configuration OptionsFull-text access may be available. Sign in or learn about subscription options.pp. 150-161
RRF: A Race Reproduction Framework for Use in Debugging Process-Level RacesFull-text access may be available. Sign in or learn about subscription options.pp. 162-172
Cause Points Analysis for Effective Handling of AlarmsFull-text access may be available. Sign in or learn about subscription options.pp. 173-184
ORPLocator: Identifying Read Points of Configuration Options via Static AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 185-195
Anomaly Detection and Root Cause Localization in Virtual Network FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 196-206
Experience Report: System Log Analysis for Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 207-218
SV-AF — A Security Vulnerability Analysis FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 219-229
Proving Concurrent Data Structures LinearizableFull-text access may be available. Sign in or learn about subscription options.pp. 230-240
Detecting, Exposing, and Classifying Sequential Consistency ViolationsFull-text access may be available. Sign in or learn about subscription options.pp. 241-252
Approximate Lock: Trading off Accuracy for Performance by Skipping Critical SectionsFull-text access may be available. Sign in or learn about subscription options.pp. 253-263
Goal-Driven Deception Tactics DesignFull-text access may be available. Sign in or learn about subscription options.pp. 264-275
MHCP Model for Quality Evaluation for Software Structure Based on Software Complex NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 298-308
The Impact of Feature Selection on Defect Prediction Performance: An Empirical ComparisonFull-text access may be available. Sign in or learn about subscription options.pp. 309-320
Experience Report: Practical Software Availability Prediction in Telecommunication IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 321-331
Dodging Unsafe Update Points in Java Dynamic Software Updating SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 332-341
Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead InstrumentationFull-text access may be available. Sign in or learn about subscription options.pp. 342-352
Predicting Consistent Clone ChangeFull-text access may be available. Sign in or learn about subscription options.pp. 353-364
Failure Models for Testing Continuous ControllersFull-text access may be available. Sign in or learn about subscription options.pp. 365-375
Evaluation Metrics of Service-Level Reliability Monitoring Rules of a Big Data ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 376-387
Bear: A Framework for Understanding Application Sensitivity to OS (Mis) BehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 388-399
Switching to Git: The Good, the Bad, and the UglyFull-text access may be available. Sign in or learn about subscription options.pp. 400-411
Experience Report: An Empirical Study of API Failures in OpenStack Cloud EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 424-434
Domain Arguments in Safety Critical Software DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 435-444
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling DebuggingFull-text access may be available. Sign in or learn about subscription options.pp. 455-466
Risk Assessment of User-Defined Security Configurations for Android DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 467-477
Software Aging Analysis of the Android Mobile OSFull-text access may be available. Sign in or learn about subscription options.pp. 478-489
Experience Report: Detecting Poor-Responsive UI in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 490-501
Author IndexFreely available from IEEE.pp. 502-503
Publisher's InformationFreely available from IEEE.pp. 504-504
Showing 57 out of 57