


default search action
QRS Companion 2016: Vienna, Austria
- 2016 IEEE International Conference on Software Quality, Reliability and Security, QRS 2016, Companion, Vienna, Austria, August 1-3, 2016. IEEE 2016, ISBN 978-1-5090-3713-1

IEEE International Workshop on Trustworthy Computing (TC)
- Tiandu Zhao, Antti Evesti, Teemu Kanstrén:

A Tool for Security Measuring and Probe Management. 1-6 - Lena Feinbube, Daniel Richter, Andreas Polze:

An Error Model for Multi-threaded Single-Node Applications, and Its Implementation. 7-14 - Qian Ye

, Minyan Lu, Luyi Li:
Empirical Analysis of Factors Affecting Time-Leverage Nodes of Complex Software. 15-22 - Hermann Felbinger, Franz Wotawa

, Mihai Nica:
Test-Suite Reduction Does Not Necessarily Require Executing the Program under Test. 23-30 - Wang Li, Dinghao Wu, Peng Liu:

iCruiser: Protecting Kernel Link-Based Data Structures with Secure Canary. 31-38 - Kiyoshi Honda, Nobuhiro Nakamura, Hironori Washizaki

, Yoshiaki Fukazawa:
Case Study: Project Management Using Cross Project Software Reliability Growth Model. 39-46 - Ruizhi Gao, Linghuan Hu, W. Eric Wong, Han-Lin Lu, Shih-Kun Huang

:
Effective Test Generation for Combinatorial Decision Coverage. 47-54 - Sergiy Vilkomir:

Combinatorial Testing of Software with Binary Inputs: A State-of-the-Art Review. 55-60 - Shikai Guo, Rong Chen, Hui Li:

A Real-Time Collaborative Testing Approach for Web Application: Via Multi-tasks Matching. 61-68
IEEE International Workshop on Information Assurance (IA)
- Teemu Kanstrén, Antti Evesti:

A Study on the State of Practice in Security Situational Awareness. 69-76 - Cristiano De Faveri, Ana Moreira

:
Designing Adaptive Deception Strategies. 77-84 - Odair Jacinto da Silva, Adalberto Nobiato Crespo, Mário Jino:

Experimental Comparison of Software Reliability Models Based on Code Coverage and on Time Domain. 85-92 - Shahid Hussain, Jacky W. Keung

, Arif Ali Khan
, Kwabena Ebo Bennin
:
Detection of Fault-Prone Classes Using Logistic Regression Based Object-Oriented Metrics Thresholds. 93-100 - Fehmi Jaafar, Gabriela Nicolescu, Christian Richard:

A Systematic Approach for Privilege Escalation Prevention. 101-108 - Herman Hartmann:

A Statistical Analysis of Operational Profile Driven Testing. 109-116 - Mohammed O. Alannsary, Jeff Tian:

Measurement and Prediction of SaaS Reliability in the Cloud. 123-130
IEEE International Workshop on Human and Social Aspects of Software Quality (HASQ)
- Yong Wang, Zhiqiu Huang:

Weighted Control Flow Subgraph to Support Debugging Activities. 131-134 - Ruijing Gao, Zhenyu Chen, Chunrong Fang

, Tieke He, Peizhang Xie, Jungui Zhou:
Automated Evaluation for Performance Test Scripts. 135-142 - Alexandre Melo Braga, Ricardo Dahab

:
Mining Cryptography Misuse in Online Forums. 143-150 - Tianhao Pan, Weifeng Zhang, Ziyuan Wang, Lei Xu:

Recommendations Based on LDA Topic Model in Android Applications. 151-158 - Xin Ma, Ning Wang, Peizhang Xie, Jungui Zhou, Xiaofang Zhang, Chunrong Fang

:
An Automated Testing Platform for Mobile Applications. 159-162 - Mengleng Liu, Pei Liu, Xiaoshuang Yang, Lei Zhao:

Fault Localization Guided Execution Comparison for Failure Comprehension. 163-166 - Jinshuo Liu, Yusen Chen, Lanxin Zhang, Juan Deng, Weixin Zhang:

The Evaluation of the Embedded Software Quality Based on the Binary Code. 167-170
IEEE International Workshop on Software Engineering and Knowledge Management (SEKM)
- Ruoyu Wang, Guoqiang Li, Daniel W. Sun, Jianwen Xiang, Hongming Cai:

CAT: A Customized Automata Toolkit. 171-177 - Xian Yang, Jiangning Wu, Yanzhong Dang, Lili Rong:

A Product Recommendation Approach Based on the Latent Social Trust Network Model for Collaborative Filtering. 178-185 - Jianguo Wu, Jing Tian, Liping Lu, Caisheng Weng, Jianwen Xiang:

Surveys on Knowledge Management and Knowledge Creation in a Chinese Research University. 186-193 - F. Meng, Yoshiteru Nakamori, Jing Tian, Jianwen Xiang:

An Evaluation Framework of Knowledge Management Activities. 194-201 - Jing Sun, Yoshiteru Nakamori, Jing Tian, Jianwen Xiang:

Exploring Academic Knowledge Creation Models for Graduate Researches. 202-209 - Deqiang Hu, Yanzhong Dang:

The Effect of Interpersonal Trust on Interpersonal Knowledge Interaction: A New Thought. 210-216 - Donghua Pan, Xudong Wang, Haoxiang Xia:

Research on the DMC-Based Patent Analysis. 217-221
IEEE International Workshop on Safety and Security in Cyber-Physical Systems (SSCPS)
- Fei Deng, Feng Gao:

P2P-Based Full Digital Co-simulation and Verification System Design. 222-227 - Shulin Zhou, Xiaodong Liu, Shanshan Li, Wei Dong, Xiangke Liao, Yun Xiong:

ConfMapper: Automated Variable Finding for Configuration Items in Source Code. 228-235 - Yuanrui Zhang, Yujing Ma, Yixiang Chen:

A UTP Refinement Model of the STeC Language. 236-243 - Zhipeng Shao, HanYong Hao, Yuanyuan Ma, Chen Wang, Jiaxuan Fei:

Modeling and Verifying Intelligent Unit Transmission Protocol Using CSP Model Checker PAT. 244-251 - Pengpeng Sun, Yunwei Dong, Hong Ye, Hongbin Zhao:

A Wireless Power Transfer CPS Based on 2D Omni-directional Rotating Magnetic Field. 252-258 - Jiahong Jiang, Liqian Chen, Yanjun Wen, Wei Dong, Ling Wen:

Analyzing Math Library Functions via Summarization. 259-264
IEEE International Workshop on Model-Based Verification and Validation (MVV)
- Tolga Ayav

, Hasan Sözer:
Moving Switching Functions to Continuous Domain. 265-270 - Weixuan Sun, Hong Zhang, Chao Feng, Yangzhen Fu:

A Method Based on Meta-model for the Translation from UML into Event-B. 271-277 - Ceren Sahin Gebizli, Hasan Sözer:

Model-Based Software Product Line Testing by Coupling Feature Models with Hierarchical Markov Chain Usage Models. 278-283 - Yanjun Sun, Gérard Memmi, Sylvie Vignes:

Model-Based Testing Directed by Structural Coverage and Functional Requirements. 284-291
IEEE International Workshop on Verification and Validation of Adaptive SystemS (VVASS)
- Rong Chen, Shifeng Chen, Nan Zhang:

Iterative Path Clustering for Software Fault Localization. 292-297 - Gerald Steinbauer, Stefan Loigge, Clemens Mühlbacher:

Supervision of Hardware, Software and Behavior of Autonomous Industrial Transport Robots. 298-300 - Benedikt Eberhardinger

, Axel Habermaier, Alwin Hoffmann
, Alexander Poeppel, Wolfgang Reif
:
Toward Integrated Analysis & Testing of Component-Based, Adaptive Robot Systems. 301-302 - André Reichstaller, Alexander Knapp:

Hunting the Game - Towards a Game of Testing Adaptive Systems. 303-304 - Franz Wotawa

:
Testing Self-Adaptive Systems Using Fault Injection and Combinatorial Testing. 305-310
IEEE International Workshop on Software Cybernetics (IWSC)
- Lin Zou

, Hongji Yang, Lei Xu:
An Approach to Controlling Context by Combining Game Theory and Control Theory for Self-Adaptive Software in Creative Computing. 311-317 - Devanka Pathak

, Hongji Yang, Tin-Kai Chen:
Neurofeedback and Creativity in Interceptive Human Movement: A Theoretical Model for Neurocybernetics Based Kinaesthetic Multimodal Learning Agent. 318-325 - Suleiman Onimisi Aliyu, Feng Chen, Han Li:

A Self-Tuning Procedure for Resource Management in InterCloud Computing. 326-333 - Xiwei Qiu, Liang Luo, Yuan-Shun Dai:

Reliability-Performance-Energy Joint Modeling and Optimization for a Big Data Task. 334-338 - Peng Sun, Demiao Wu, Xiwei Qiu, Liang Luo, Hongwei Li:

Performance Analysis of Cloud Service Considering Reliability. 339-343
IEEE International Workshop on Cyber Resiliency Economics (CRE)
- Fabio Martinelli, Artsiom Yautsiukhin

:
Security by Insurance for Services. 344-351 - Chad Heitzenrater, Justin King-Lacroix, Andrew C. Simpson

:
Motivating Security Engineering with Economics: A Utility Function Approach. 352-359 - Richard Colbaugh, Kristin Glass:

Asymmetry in Coevolving Adversarial Systems. 360-367 - Brandon Wagner, Arun K. Sood:

Economics of Resilient Cloud Services. 368-374
IEEE International Workshop on Hardware-Software Co-Design (HSCD)
- Feng Gao, Fei Deng:

Design of a Networked Embedded Software Test Platform Based on Software and Hardware Co-simulation. 375-381 - Jinyang Li, Yuanrui Zhang, Yixiang Chen:

A Self-Adaptive Traffic Light Control System Based on Speed of Vehicles. 382-388 - Jianwei Zheng, Chunhang Xu, Donghui Guo:

A Programmable CNN Architecture and Its Hardware-Software Co-design Approach for Image Processing and Stimulating Visual Illusions. 389-394 - Jihu Zhang, Haipeng Wang, Wu Liu, Yan Gong, Yunwei Dong, Xiaochuan Jing, Wei Zhang:

Safety Awareness Online Detection System of Driving Behavior Based on Software and Hardware Co-design. 395-399
Posters
- Yan Zhang, Lejian Liao, Chang Xu

, Manzhi Yang:
Hierarchical Clustering of Group Behaviors in Cyber Situation Awareness. 400-401 - Chengyong Mao, Qiuying Li:

A Testing-Coverage Software Reliability Growth Model Considering the Randomness of the Field Environment. 402-403 - Kiyoshi Honda, Nobuhiro Nakamura, Hironori Washizaki

, Yoshiaki Fukazawa:
An Industrial Case Study of Project Management Using Cross Project Software Reliability Growth Model. 404-405 - Zhanwei Hui, Song Huang:

Metamorphic Testing of a Superficial Area Calculation Program. 406-407 - Hsia-Hsiang Chen, Da-Qun Zheng, Shih-Kun Huang

:
Automatic Defense through Fault Localization and Dynamic Patch Creation. 408-409 - Hidenori Nakai, Naohiko Tsuda, Kiyoshi Honda, Hironori Washizaki

, Yoshiaki Fukazawa:
Initial Framework for Software Quality Evaluation Based on ISO/IEC 25022 and ISO/IEC 25023. 410-411 - Zuohua Ding, Rong Wang, Jueliang Hu, Yang Liu

:
Detecting Bugs of Concurrent Programs with Program Invariants. 412-413
Fast Abstracts
- Yangzhen Fu, Hong Zhang, Yaxin Bai, Weixuan Sun:

An Under-sampling Method: Based on Principal Component Analysis and Comprehensive Evaluation Model. 414-415 - Liang Luo, Hongwei Li, Xiwei Qiu, Yangyang Tang:

A Resource Optimization Algorithm of Cloud Data Center Based on Correlated Model of Reliability, Performance and Energy. 416-417 - Quyen L. Nguyen, Arun K. Sood:

Improving Security Level via Velocity of Moving Target Defense. 418-419

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














