Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSRE
ISSRE 2016
Generate Citations
2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)
Oct. 23 2016 to Oct. 27 2016
Ottawa, ON, Canada
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-ix
Message from the ISSRE 2016 General Chair
Freely available from IEEE.
pp. x-x
Message from the Program Co-Chairs
Freely available from IEEE.
pp. xi-xi
Organizing Committee
Freely available from IEEE.
pp. xii-xii
Program Committees
Freely available from IEEE.
pp. xiii-xv
Subreviewers
Freely available from IEEE.
pp. xvi-xvi
Keynote abstracts
Full-text access may be available. Sign in or learn about subscription options.
pp. xvii-xix
by
Rajeev Joshi
On Adaptive Sampling-Based Testing for Software Reliability Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Roberto Pietrantuono
,
Stefano Russo
Experience Report: Automated System Level Regression Test Prioritization Using Multiple Factors
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-23
by
Per Erik Strandberg
,
Daniel Sundmark
,
Wasif Afzal
,
Thomas J. Ostrand
,
Elaine J. Weyuker
Frequent Subgraph Based Familial Classification of Android Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-35
by
Ming Fan
,
Jun Liu
,
Xiapu Luo
,
Kai Chen
,
Tianyi Chen
,
Zhenzhou Tian
,
Xiaodong Zhang
,
Qinghua Zheng
,
Ting Liu
SCOUT: A Multi-objective Method to Select Components in Designing Unit Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-46
by
Eduardo Noronha De Andrade Freitas
,
Celso Gonçalves Camilo Jr.
,
Auri Marcelo Rizzo Vincenzi
The Effect of Test Suite Type on Regression Test Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-58
by
Nima Dini
,
Allison Sullivan
,
Milos Gligoric
,
Gregg Rothermel
WAP: A Novel Automatic Test Generation Technique Based on Moth Flame Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-64
by
Aya S. Metwally
,
Eman Hosam
,
Marwa M. Hassan
,
Sarah M. Rashad
Using a Cognitive Psychology Perspective on Errors to Improve Requirements Quality: An Empirical Investigation
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-76
by
Vaibhav Anu
,
Gursimran Walia
,
Wenhua Hu
,
Jeffrey C. Carver
,
Gary Bradshaw
On the Personality Traits of GitHub Contributors
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-86
by
Ayushi Rastogi
,
Nachiappan Nagappan
WAP: Understanding the Brain at Software Debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
J. Duraes
,
H. Madeira
,
J. Castelhano
,
C. Duarte
,
M. Castelo Branco
Distance-Integrated Combinatorial Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-104
by
Eun-Hye Choi
,
Cyrille Artho
,
Takashi Kitamura
,
Osamu Mizuno
,
Akihisa Yamada
Evaluating the Effects of Compiler Optimizations on Mutation Testing at the Compiler IR Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-115
by
Farah Hariri
,
August Shi
,
Hayes Converse
,
Sarfraz Khurshid
,
Darko Marinov
Automatically Classifying Test Results by Semi-Supervised Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-126
by
Rafig Almaghairbe
,
Marc Roper
Combining Word Embedding with Information Retrieval to Recommend Similar Bug Reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-137
by
Xinli Yang
,
David Lo
,
Xin Xia
,
Lingfeng Bao
,
Jianling Sun
Experience Report: Understanding Cross-Platform App Issues from User Reviews
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-149
by
Yichuan Man
,
Cuiyun Gao
,
Michael R. Lyu
,
Jiuchun Jiang
CoLUA: Automatically Predicting Configuration Bug Reports and Extracting Configuration Options
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-161
by
Wei Wen
,
Tingting Yu
,
Jane Huffman Hayes
RRF: A Race Reproduction Framework for Use in Debugging Process-Level Races
Full-text access may be available. Sign in or learn about subscription options.
pp. 162-172
by
Supat Rattanasuksun
,
Tingting Yu
,
Witawas Srisa-An
,
Gregg Rothermel
Cause Points Analysis for Effective Handling of Alarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-184
by
Tukaram Muske
,
Uday P. Khedker
ORPLocator: Identifying Read Points of Configuration Options via Static Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-195
by
Zhen Dong
,
Artur Andrzejak
,
David Lo
,
Diego Costa
Anomaly Detection and Root Cause Localization in Virtual Network Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-206
by
Carla Sauvanaud
,
Kahina Lazri
,
Mohamed Kaâniche
,
Karama Kanoun
Experience Report: System Log Analysis for Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-218
by
Shilin He
,
Jieming Zhu
,
Pinjia He
,
Michael R. Lyu
SV-AF — A Security Vulnerability Analysis Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-229
by
Sultan S. Alqahtani
,
Ellis E. Eghan
,
Juergen Rilling
Proving Concurrent Data Structures Linearizable
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-240
by
Vineet Singh
,
Iulian Neamtiu
,
Rajiv Gupta
Detecting, Exposing, and Classifying Sequential Consistency Violations
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-252
by
Mohammad Majharul Islam
,
Abdullah Muzahid
Approximate Lock: Trading off Accuracy for Performance by Skipping Critical Sections
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-263
by
Riad Akram
,
Mohammad Mejbah Ul Alam
,
Abdullah Muzahid
Goal-Driven Deception Tactics Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-275
by
Ana Moreira
,
Vasco Amaral
,
Cristiano De Faveri
Quantifying the Attack Detection Accuracy of Intrusion Detection Systems in Virtualized Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-286
by
Aleksandar Milenkoski
,
K. R. Jayaram
,
Nuno Antunes
,
Marco Vieira
,
Samuel Kounev
Using Approximate Bayesian Computation to Empirically Test Email Malware Propagation Models Relevant to Common Intervention Actions
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-297
by
Edward Condon
,
Michel Cukier
MHCP Model for Quality Evaluation for Software Structure Based on Software Complex Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-308
by
Yuwei Yang
,
Jun Ai
,
Xuelin Li
,
W. Eric Wong
The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-320
by
Zhou Xu
,
Jin Liu
,
Zijiang Yang
,
Gege An
,
Xiangyang Jia
Experience Report: Practical Software Availability Prediction in Telecommunication Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 321-331
by
Kazuhiro Okumoto
Dodging Unsafe Update Points in Java Dynamic Software Updating Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-341
by
Walter Cazzola
,
Mehdi Jalili
Fixing Resource Leaks in Android Apps with Light-Weight Static Analysis and Low-Overhead Instrumentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-352
by
Jierui Liu
,
Tianyong Wu
,
Jun Yan
,
Jian Zhang
Predicting Consistent Clone Change
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-364
by
Fanlong Zhang
,
Siau-Cheng Khoo
,
Xiaohong Su
Failure Models for Testing Continuous Controllers
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-375
by
Dominik Holling
,
Alvin Stanescu
,
Kristian Beckers
,
Alexander Pretschner
,
Matthias Gemmar
Evaluation Metrics of Service-Level Reliability Monitoring Rules of a Big Data Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-387
by
Keun Soo Yim
Bear: A Framework for Understanding Application Sensitivity to OS (Mis) Behavior
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-399
by
Ruimin Sun
,
Andrew Lee
,
Aokun Chen
,
Donald E. Porter
,
Matt Bishop
,
Daniela Oliveira
Switching to Git: The Good, the Bad, and the Ugly
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-411
by
Sascha Just
,
Kim Herzig
,
Jacek Czerwonka
,
Brendan Murphy
Does Geographical Distance Effect Distributed Development Teams: How Aggregation Bias in Software Artifacts Causes Contradictory Findings
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-423
by
Thanh H. D. Nguyen
,
Bram Adams
,
Ahmed E. Hassan
Experience Report: An Empirical Study of API Failures in OpenStack Cloud Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-434
by
Pooya Musavi
,
Bram Adams
,
Foutse Khomh
Domain Arguments in Safety Critical Software Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 435-444
by
Jonathan Rowanhill
,
John C. Knight
Experience Report: Model-Based Test Automation of a Concurrent Flight Software Bus
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-454
by
Dharmalingam Ganesan
,
Mikael Lindvall
,
Stefan Hafsteinsson
,
Rance Cleaveland
,
Susanne L. Strege
,
Walter Moleski
Peeking into the Past: Efficient Checkpoint-Assisted Time-Traveling Debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-466
by
Armando Miraglia
,
Dirk Vogt
,
Herbert Bos
,
Andy Tanenbaum
,
Cristiano Giuffrida
Risk Assessment of User-Defined Security Configurations for Android Devices
Full-text access may be available. Sign in or learn about subscription options.
pp. 467-477
by
Daniel Vecchiato
,
Marco Vieira
,
Eliane Martins
Software Aging Analysis of the Android Mobile OS
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-489
by
Domenico Cotroneo
,
Francesco Fucci
,
Antonio Ken Iannillo
,
Roberto Natella
,
Roberto Pietrantuono
Experience Report: Detecting Poor-Responsive UI in Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 490-501
by
Yu Kang
,
Yangfan Zhou
,
Min Gao
,
Yixia Sun
,
Michael R. Lyu
Author Index
Freely available from IEEE.
pp. 502-503
Publisher's Information
Freely available from IEEE.
pp. 504-504
Showing 57 out of 57