Default Cover Image

2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)

Oct. 23 2017 to Oct. 26 2017

Toulouse, France

Table of Contents

[Title page i]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-viii
Message from the General ChairFreely available from IEEE.pp. ix-x
Message from the Program Co-ChairsFreely available from IEEE.pp. xi-xi
Organizing CommitteeFreely available from IEEE.pp. xii-xiii
Program Committee MembersFreely available from IEEE.pp. xiv-xv
SubreviewersFreely available from IEEE.pp. xvi-xvi
Keynote abstractsFull-text access may be available. Sign in or learn about subscription options.pp. xvii-xviii
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service CustomizationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Reflection Analysis for Java: Uncovering More Reflective Targets PreciselyFull-text access may be available. Sign in or learn about subscription options.pp. 12-23
GEMS: An Extract Method Refactoring RecommenderFull-text access may be available. Sign in or learn about subscription options.pp. 24-34
A Generalized Bivariate Modeling Framework of Fault Detection and Correction ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 35-45
Understanding the Impacts of Influencing Factors on Time to a DataRace Software FailureFull-text access may be available. Sign in or learn about subscription options.pp. 56-66
An Exploratory Study of Field FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 67-77
Learning from Imbalanced Data for Predicting the Number of Software DefectsFull-text access may be available. Sign in or learn about subscription options.pp. 78-89
A Fault Correlation Approach to Detect Performance Anomalies in Virtual Network Function ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 90-100
Simultaneous Fault Models for the Generation of Efficient Error Detection MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 112-123
Which Packages Would be Affected by This Bug Report?Full-text access may be available. Sign in or learn about subscription options.pp. 124-135
Experience Report: On the Impact of Software Faults in the Privileged Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 136-145
WAP: SAT-Based Computation of Minimal Cut SetsFull-text access may be available. Sign in or learn about subscription options.pp. 146-151
WAP: Does Reviewer Age Affect Code Review Performance?Full-text access may be available. Sign in or learn about subscription options.pp. 164-169
Experience Report: Study of Vulnerabilities of Enterprise Operating SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 205-215
Software Metrics as Indicators of Security VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 216-227
Models of Reliability of Fault-Tolerant Software Under Cyber-AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 228-239
Perman: Fine-Grained Permission Management for Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 250-259
AQAT: The Architecture Quality Assurance Tool for Critical Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 260-270
Experience Report: Log-Based Behavioral DifferencingFull-text access may be available. Sign in or learn about subscription options.pp. 282-293
Experience Report: Verifying MPI Java Programs Using Software Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 294-304
On FSM-Based Testing: An Empirical Study: Complete Round-Trip Versus Transition TreesFull-text access may be available. Sign in or learn about subscription options.pp. 305-315
COCOON: Crowdsourced Testing Quality Maximization Under Context Coverage ConstraintFull-text access may be available. Sign in or learn about subscription options.pp. 316-327
Toward Rigorous Object-Code Coverage CriteriaFull-text access may be available. Sign in or learn about subscription options.pp. 328-338
Automatically Repairing Web Application Firewalls Based on Successful SQL Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 339-350
Learning Feature Representations from Change Dependency Graphs for Defect PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 361-372
Author indexFreely available from IEEE.pp. 373-374
[Publisher's information]Freely available from IEEE.pp. 376-376
Showing 46 out of 46