Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSREW
ISSREW 2012
Generate Citations
2012 IEEE 23rd International Symposium on Software Reliability Engineering Workshops (ISSREW)
Nov. 27 2012 to Nov. 30 2012
Dallas, TX
Table of Contents
[Title page i]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-xii
Message from General Chair
Freely available from IEEE.
pp. xiii-xiii
Organizing Committee
Freely available from IEEE.
pp. xiv-xv
Message from Fast Abstract Co-chairs
Freely available from IEEE.
pp. xvi-xvi
Fast Abstract Organizers
Freely available from IEEE.
pp. xvii-xvii
Message from Industry Papers Co-chairs
Freely available from IEEE.
pp. xviii-xviii
Industry Paper Organizers
Freely available from IEEE.
pp. xix-xix
Message from Student Papers Co-chairs
Freely available from IEEE.
pp. xx-xx
Student Papers Organizers
Freely available from IEEE.
pp. xxi-xxi
Message from IWPD 2012 Workshop Organizers
Freely available from IEEE.
pp. xxii-xxii
IWPD 2012 Workshop Organizers
Freely available from IEEE.
pp. xxiii-xxiii
Message from MoTiP Workshop Co-chairs
Freely available from IEEE.
pp. xxiv-xxiv
MoTiP 2012 Workshop Organizers
Freely available from IEEE.
pp. xxv-xxv
Message from RTW 2012 Workshop Organizers
Freely available from IEEE.
pp. xxvi-xxvi
RTW 2012 Workshop Organizers
Freely available from IEEE.
pp. xxvii-xxvii
Message from WoSAR 2012 Workshop Chairs
Freely available from IEEE.
pp. xxviii-xxviii
WoSAR 2012 Workshop Organizers
Freely available from IEEE.
pp. xxix-xxx
Message from WOSD 2012 Workshop Chair
Freely available from IEEE.
pp. xxxi-xxxi
by
Mario Tokoro
WOSD 2012 Workshop Organizers
Freely available from IEEE.
pp. xxxii-xxxii
Message from WoSoCER 2012 Workshop Chairs
Freely available from IEEE.
pp. xxxiii-xxxiii
WoSoCER 2012 Workshop Organizers
Freely available from IEEE.
pp. xxxiv-xxxiv
A Resilience Design Model for IMS-based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-2
by
Somia Natouri
,
Chidung Lac
Combinatorial Analysis of Dynamic Fault Trees with Priority-AND Gates
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-4
by
Jianwen Xiang
,
Fumio Machida
,
Kumiko Tadano
,
Kazuo Yanoo
,
Wei Sun
,
Yoshiharu Maeno
Bohrbugs, Mandelbugs, Exhaustive Testing and Unintended Automobile Acceleration
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-6
by
Martin L. Shooman
Entropy Metrics for Agile Development Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-8
by
Ozgur Aktunc
TEAMS: A Special-Purpose AOP Framework for Runtime Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-10
by
Amjad Nusayr
,
Jonathan Cook
,
Gholamali Rahnavard
Assessing AUTOSAR Systems Using Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-12
by
As'ad Salkham
,
Antonio Pecchia
,
Nuno Silva
Toward Baselining Software Anomalies in NASA Missions
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-14
by
Lucas Layman
,
Marvin Zelkowitz
,
Victor Basili
,
Allen P. Nikora
Safety and Performance Co-engineering: New MDE Challenge for Critical Applications Design?
Full-text access may be available. Sign in or learn about subscription options.
pp. 15-16
by
Rafik Henia
,
Joseph Machrouh
,
Laurent Rioux
Ontology-Based Reuse of Failure Modes for FMEA: Methodology and Tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-18
by
Guoqi Li
Assessing Disaster Recovery Alternatives: On-Site, Colocation or Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-20
by
Omar H. Alhazmi
,
Yashwant K. Malaiya
Evidence-Based Security in Aerospace: From Safety to Security and Back Again
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-22
by
Michael Paulitsch
,
Rupert Reiger
,
Lorenzo Strigini
,
Robin Bloomfield
Formal Analysis of Device-Delay Error in User-Device Interaction under Uncertainty
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-24
by
Krishnendu Ghosh
Software at Scale for Building Resilient Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-26
by
Catello Di Martino
Applying Software Reliability Growth Models to DOD Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-36
by
E. Andrew Long
,
Louis Gullo
,
Allen P. Nikora
Software Reliability Classes: A Basis for Release and Product Quality Expectations
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-37
by
Sunita Chulani
,
Pete Rotella
,
Bob Mullen
Cost Effective Reliability Centric Validation Model for Automotive ECUs
Full-text access may be available. Sign in or learn about subscription options.
pp. 38-44
by
Ajeet Kumar Pandey
,
Smith Jessy
,
Vivek Diwanji
Early Performance Estimation for Industrial Component-Based Design of Reliable Software Defined Radio System
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-46
by
R. Henia
,
L. Rioux
,
N. Sordon
,
T. Vergnaud
Bug Detection in Large-Scale Nuclear Power Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Zheng Liu
,
Wentao Mo
,
Dangpei Ren
,
Guang Zhao
,
Mingye Liu
Quality Playbook: Ensuring Release to Release Improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-53
by
Pete Rotella
,
Sunita Chulani
,
Satya Pradhan
Metric-Based Quality Evaluations for Iterative Software Development Approaches Like Agile
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-63
by
Kumi Jinzenji
,
Takashi Hoshino
,
Laurie Williams
,
Kenji Takahashi
Targeting Specific Customer Satisfactions Issues with ODC Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-64
by
Ram Chillarege
A Software Quality Evaluation Method Using the Change of Source Code Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-69
by
Mitsuhiro Nakamura
,
Tomoki Hamagami
Smart Unit Testing Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-79
by
Lakshmankumar Mukkavilli
Customer Scenario Focused End-to-End Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-81
by
Chen Liang
,
Aniket Malatpure
,
Mohammad Shafiei
,
Marcelo Vago
,
Tsan Zheng
Applying Test Data Generation Using SMT Solver to COBOL
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-82
by
Yusuke Sasaki
,
Yoshiharu Maeda
,
Kenichi Kobayashi
,
Akihiko Matsuo
Overview of 10 Years of ISVV Findings in Safety-Critical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-83
by
Nuno Silva
,
Rui Lopes
Independent Assessment of Safety-Critical Systems: We Bring Data!
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-84
by
Nuno Silva
,
Rui Lopes
Modeling and Prediction of Performability of Safety Critical Computer Based Systems Using Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-94
by
Lalit Kumar Singh
,
Gopika Vinod
,
A.K. Tripathi
Assessing the Performance of Networked Computer Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-95
by
Shelly Agarwal
Measurements-Based Analysis of Workload-Error Relationship in a Production SaaS Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-105
by
Rajeshwari Ganesan
,
Santonu Sarkar
,
Geetika Goel
,
Catello Di Martino
Assessing Product Quality through PMR Analysis: A Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 106-115
by
Rajarshi Das
A Practical Extension of Pairwise Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-122
by
Oksoon Jeong
Managing Automated End to End Testing in Bitwise Heterogenous Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-128
by
Rossel Paul Banji
,
Pandit Pattabhirama
,
Mukul Gharpure
,
Manjunath Ramachandra
Comparison of Static Analysis Tools for Finding Concurrency Bugs
Full-text access may be available. Sign in or learn about subscription options.
pp. 129-133
by
Numan Manzoor
,
Hussan Munir
,
Misagh Moayyed
Detecting Vulnerabilities in Service Oriented Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-139
by
Nuno Antunes
,
Marco Vieira
Accelerate the Software Software Reliability Testing Execution Process with Fuzzy Discrimination
Full-text access may be available. Sign in or learn about subscription options.
pp. 140-145
by
Feng Zheng
,
Jun Ai
,
Jingwei Shang
,
Jinhui Wang
Using Profiling Metrics to Categorise Peer Review Types in the Android Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 146-151
by
Raula Gaikovina Kula
,
Ana E. Carmago Cruz
,
Norihiro Yoshida
,
Kazuki Hamasaki
,
Kenji Fujiwara
,
Xin Yang
,
Hajimu Iida
Program Debugging with Effective Software Fault Localization (Invited Talk)
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-152
by
W. Eric Wong
The Effect of Testability on Fault Proneness: A Case Study of the Apache HTTP Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-158
by
Mark Hays
,
Jane Hayes
Debugging Spreadsheets: A CSP-based Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-164
by
Rui Abreu
,
André Riboira
,
Franz Wotawa
Detection of Interferences in Aspect-Oriented Programs Using Executable Assertions
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-170
by
Jimmy Lauret
,
Helene Waeselynck
,
Jean-Charles Fabre
A Topology-Based Model for Estimating the Diagnostic Efficiency of Statistics-Based Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-176
by
Alexandre Perez
,
André Riboira
,
Rui Abreu
Predicting Data Dependences for Slice Inspection Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Yiji Zhang
,
Raul Santelices
A Static Detecting Model for Invalid Arithmetic Operation Based on Alias Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-188
by
Hongbo Zhou
,
Qian Wang
,
Dahai Jin
,
Yunzhan Gong
Wielding Statistical Fault Localization Statistically
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-194
by
Yunqian Zhang
,
Lin Chen
,
Bo Jiang
,
Zhenyu Zhang
Baggy Bounds with Accurate Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-200
by
Baozeng Ding
,
Yeping He
,
Yanjun Wu
,
Alex Miller
,
John Criswell
Design-Model-Based Test Data Generation for Database Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-206
by
Haruto Tanno
,
Xiaojing Zhang
,
Takashi Hoshino
Automatic GUI Model Generation: State of the Art
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-212
by
Andres Kull
Automated Risk-Based Testing by Integrating Safety Analysis Information into System Behavior Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-218
by
Ramy Nazier
,
Thomas Bauer
Integrating Model-Based and Constraint-Based Testing Using SpecExplorer
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-224
by
Vivek Vishal
,
Mehmet Kovacioglu
,
Rachid Kherazi
,
Mohammad Reza Mousavi
Integrating MDT in an Industrial Process in the Air Traffic Control Domain
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-230
by
Gabriella Carrozza
,
Mauro Faella
,
Francesco Fucci
,
Roberto Pietrantuono
,
Stefano Russo
A Review of Two Experiences from Applying Model Based Testing in Practice
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-236
by
Dusica Marijan
RTW 2012 Workshop Invited Industrial Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-238
by
Luis Duran
,
Mike Krywonos
,
Michael F. Siok
A Pragmatic Approach on Combined Safety and Security Risk Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-244
by
Frank Reichenbach
,
Jan Endresen
,
Mohammad M. R. Chowdhury
,
Judith Rossebø
WoSAR 2012 Workshop Keynotes [2 abstracts]
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-246
Monitoring Memory-Related Software Aging: An Exploratory Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-252
by
Rivalino Matias
,
Bruno Evangelista Costa
,
Autran Macedo
An Advanced Methodology for Measuring and Characterizing Software Aging
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-258
by
Pengfei Zheng
,
Qingguo Xu
,
Yong Qi
Cost Optimality in Testing and Rejuvenation
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-264
by
Michael Grottke
,
Benjamin Schleich
Monitoring of Aging Software Systems Affected by Integer Overflows
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-270
by
Domenico Cotroneo
,
Roberto Natella
Multiformalism to Support Software Rejuvenation Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-276
by
Enrico Barbierato
,
Andrea Bobbio
,
Marco Gribaudo
,
Mauro Iacono
Modeling Software Rejuvenation on a Redundant System Using Monte Carlo Simulation
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-282
by
Sonia Malefaki
,
Vasilis P. Koutras
,
Agapios N. Platis
Optimization of Opportunity-Based Software Rejuvenation Policy
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-286
by
Hiroyuki Okamura
,
Tadashi Dohi
Aging-Related Bugs in Cloud Computing Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-292
by
Fumio Machida
,
Jianwen Xiang
,
Kumiko Tadano
,
Yoshiharu Maeno
Characterization of Software Aging Effects in Elastic Storage Mechanisms for Private Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-298
by
Rubens Matos
,
Jean Araujo
,
Vandi Alves
,
Paulo Maciel
Software Rejuvenation: Do IT & Telco Industries Use It?
Full-text access may be available. Sign in or learn about subscription options.
pp. 299-304
by
Javier Alonso
,
Antonio Bovenzi
,
Jinghui Li
,
Yakun Wang
,
Stefano Russo
,
Kishor Trivedi
A Proposal on a Method for Reviewing Operation Manuals of Supercomputer
Full-text access may be available. Sign in or learn about subscription options.
pp. 305-306
by
Shota Takama
,
Vaise Patu
,
Yutaka Matsuno
,
Shuichiro Yamamoto
Application of D-Case to the Data-Upload Flow Diagram Scenario of the Distributed E-Learning System Called KISSEL
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-312
by
Vaise Patu
,
Yutaka Matsuno
,
Shuichiro Yamamoto
A Study of Converting Risk to Assurance Case
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-315
by
Motoki Yoan
,
Midori Sugaya
,
Kimio Kuramitsu
Reconfigurable Scripting Language with Programming Risk
Full-text access may be available. Sign in or learn about subscription options.
pp. 316-318
by
Takuma Wakamori
,
Masahiro Ide
,
Midori Sugaya
,
Kimio Kuramitsu
Requirements and Evaluation of Safety Analysis Techniques for Ambient Assisted Living Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-324
by
Adrien Mouaffo Tiadjio
,
Kavyashree Jamboti
Handling Language Variations in Open Source Bug Reporting Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-330
by
Sean Banerjee
,
Jesse Musgrove
,
Bojan Cukic
Combination of Static and Dynamic Analyses for the Certification of Avionics Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-336
by
Antoine Ferlin
,
Virginie Wiels
A Method to Formally Evaluate Safety Case Evidences against a System Architecture Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-342
by
Stefan Björnander
,
Rikard Land
,
Patrick Graydon
,
Kristina Lundqvist
,
Philippa Conmy
Composable Safety-Critical Systems Based on Pre-certified Software Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-348
by
Andreas Söderberg
,
Benjamin Vedder
Industrial Experiences of Building a Safety Case in Compliance with ISO 26262
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-354
by
Raghad Dardar
,
Barbara Gallina
,
Andreas Johnsen
,
Kristina Lundqvist
,
Mattias Nyberg
Agile Practices in Regulated Railway Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 355-360
by
Henrik Jonsson
,
Stig Larsson
,
Sasikumar Punnekkat
Showing 100 out of 103
Load More
Load All