Default Cover Image

2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)

Oct. 15 2018 to Oct. 18 2018

Memphis, TN, USA

Table of Contents

[Title page i]Freely available from IEEE.pp. 1-1
[Title page iii]Freely available from IEEE.pp. 3-3
[Copyright notice]Freely available from IEEE.pp. 4-4
Table of contentsFreely available from IEEE.pp. 5-12
Message from the ISSRE 2018 General ChairsFreely available from IEEE.pp. 13-14
Message from the ISSRE 2018 Industry Track ChairsFreely available from IEEE.pp. 15-15
ISSRE 2018 Industry Track CommitteesFreely available from IEEE.pp. 16-16
Message from the ISSRE 2018 Doctoral Symposium ChairsFreely available from IEEE.pp. 17-17
ISSRE 2018 Doctoral Symposium CommitteesFreely available from IEEE.pp. 18-18
ISSRE 2018 Doctoral Symposium KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 19-19
Message from the ISSRE 2018 Fast Abstracts Track ChairFreely available from IEEE.pp. 20-20
ISSRE 2018 Fast Abstracts Track CommitteesFreely available from IEEE.pp. 21-21
Message from the IDEAR 2018 Workshop ChairsFreely available from IEEE.pp. 22-22
IDEAR 2018 Workshop CommitteesFreely available from IEEE.pp. 23-23
Message from the STEP 2018 Workshop ChairsFreely available from IEEE.pp. 24-24
STEP 2018 Workshop CommitteesFreely available from IEEE.pp. 25-25
STEP 2018 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 26-26
Message from the WoSAR 2018 Workshop ChairsFreely available from IEEE.pp. 27-27
WoSAR 2018 Workshop CommitteesFreely available from IEEE.pp. 28-29
WoSAR 2018 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 30-30
Message from the WoSoCer 2018 Workshop ChairsFreely available from IEEE.pp. 31-31
WoSoCer 2018 Workshop CommitteesFreely available from IEEE.pp. 32-32
WoSoCer 2018 Workshop KeynoteFull-text access may be available. Sign in or learn about subscription options.pp. 33-34
Trap-Based Software Review: How Will Engineers Embed Bugs Due to Cognitive Error?Full-text access may be available. Sign in or learn about subscription options.pp. 6-11
Using Supervised Learning to Guide the Selection of Software Inspectors in IndustryFull-text access may be available. Sign in or learn about subscription options.pp. 12-17
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device FirmwareFull-text access may be available. Sign in or learn about subscription options.pp. 18-23
KEREP: Experience in Extracting Knowledge on Distributed System Behavior through Request Execution PathFull-text access may be available. Sign in or learn about subscription options.pp. 30-35
AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 36-41
A Comprehensive Framework for Security in Engineering Projects - Based on IEC 62443Full-text access may be available. Sign in or learn about subscription options.pp. 42-47
A Concept of QCD Prediction and Control in Agile Software Development for Portfolio ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 48-52
SFRAT – An Extendable Software Reliability Assessment ToolFull-text access may be available. Sign in or learn about subscription options.pp. 65-70
A Fault Injection Approach to Evaluate Soft-Error Dependability of System CallsFull-text access may be available. Sign in or learn about subscription options.pp. 71-76
Recent Advances in Software Reliability AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 77-82
How Reliable Is My Software-Defined Network? Models and Failure ImpactsFull-text access may be available. Sign in or learn about subscription options.pp. 83-88
Challenges and Directions in Security Information and Event Management (SIEM)Full-text access may be available. Sign in or learn about subscription options.pp. 95-99
Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault DiagnosisFull-text access may be available. Sign in or learn about subscription options.pp. 106-111
Using Ontologies for Test Suites Generation for Automated and Autonomous Driving FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
An Approach to Identifying Error Patterns for Infrastructure as CodeFull-text access may be available. Sign in or learn about subscription options.pp. 124-129
Model Checking the Uncertainties in Software Systems Introduced by Intelligent ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 130-131
Evaluation and Construction of Covering Arrays Utilizing Prior InformationFull-text access may be available. Sign in or learn about subscription options.pp. 132-133
Predicting Software Defects Based on Cognitive Error TheoriesFull-text access may be available. Sign in or learn about subscription options.pp. 134-135
Software Reliability Evaluation Method Based on a Software NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 136-137
Probing the Security of DNA OrigamiFull-text access may be available. Sign in or learn about subscription options.pp. 138-139
An Adaptive PID Control for QoS Management in Cloud Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 142-143
ORCAS: Efficient Resilience Benchmarking of Microservice ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 146-147
Dynamic Random Testing Strategy for Test Case Optimization in Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 148-149
Enhancing Security and Reliability for Smart- Systems' ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 150-153
Safety Analysis for Highly Automated DrivingFull-text access may be available. Sign in or learn about subscription options.pp. 154-157
Testing Extract-Transform-Load Process in Data Warehouse SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 158-161
Prioritization of Metamorphic Relations Based on Test Case Execution PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 162-165
Software Reliability Assessment: Modeling and AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 166-169
Modelling, Design and Optimization of Dependable Softwarized Networks for Industrial ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 170-173
Taming Exceptions in Android ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 174-177
Machine Learning Augmented FuzzingFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
Spectrum-Based Fault Localization for Logic-Based ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 192-199
SeTCHi: Selecting Test Cases to Improve History-Guided Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 200-207
CFAAR: Control Flow Alteration to Assist RepairFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
DDS: Deadlock Detector and SolverFull-text access may be available. Sign in or learn about subscription options.pp. 216-223
ConfGuru - A System for Fully Automated Debugging of Configuration ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 224-231
Establishment of Methods for Information Security System Policy Using BenchmarkingFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
The DevSecOps and Agency TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 243-244
Graphite: A Greedy Graph-Based Technique for Regression Test Case PrioritizationFull-text access may be available. Sign in or learn about subscription options.pp. 245-251
A Literature Review of Software Test Cases and Future ResearchFull-text access may be available. Sign in or learn about subscription options.pp. 252-256
Software Aging and Rejuvenation in the Cloud: A Literature ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 257-263
A Systematic Mapping Review of Memory Leak Detection TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 264-270
An Empirical Study on Software Aging Indicators Prediction in Android MobileFull-text access may be available. Sign in or learn about subscription options.pp. 271-277
Extracting Interaction-Related Failure Indicators for Online Detection and Prediction of Content FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 278-285
The Role of Similarity in Detecting Feature Interaction in Software Product LinesFull-text access may be available. Sign in or learn about subscription options.pp. 286-292
A New Software Rejuvenation Model for AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 293-299
Robotics Software Engineering and Certification: Issues and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
TensorFI: A Configurable Fault Injector for TensorFlow ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 313-320
Dependability Certification Guidelines for NFVIs through Fault InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 321-328
Toward a Systematic and Safety Evidence Productive Verification Approach for Safety-Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 329-336
Towards Agile Yet Regulatory-Compliant Development of Medical SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Model-Based Computer-Aided Monitoring for ISO26262 Compliant SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 349-352
Author IndexFreely available from IEEE.pp. 353-355
[Publisher's information]Freely available from IEEE.pp. 356-356
Showing 90 out of 90