default search action
31th ISSRE 2020: Coimbra, Portugal - Workshops
- 2020 IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Coimbra, Portugal, October 12-15, 2020. IEEE 2020, ISBN 978-1-7281-7735-9
- Fuyuki Ishikawa:
Testing and Debugging Autonomous Driving: Experiences with Path Planner and Future Challenges. xxxiii-xxxiv - Jeff Offutt:
ISSRE 2020 Doctoral Symposium Keynote : How to Get Your Paper Rejected. xxvi-xxvii - D. Richard Kuhn:
How do Ordinary Coding Errors Contribute to Security Vulnerabilities? xl - Zoltán Porkoláb:
Fuzzing C++ class interfaces for generating and running tests with libFuzzer. l-lii - Roberto Natella, Artur Andrzejak:
SAR Handbook Chapter: Experimental Tools for Software Aging Analysis. 1 - Hao Yang, Yang Xu, Yong Li, Hyun-Deok Choi:
K-Detector: Identifying Duplicate Crash Failures in Large-Scale Software Delivery. 1-6 - João Lima, Filipe Apolinario, Nelson Escravana, Carlos Ribeiro:
BP-IDS: Using business process specification to leverage intrusion detection in critical infrastructures. 7-12 - Hongzhang Yang, Yahui Yang, Zhengguang Chen, Zongzhao Li, Yaofeng Tu:
ADF2T: an Active Disk Failure Forecasting and Tolerance Software. 13-18 - Lalita Jategaonkar Jagadeesan, Veena B. Mendiratta:
When Failure is (Not) an Option: Reliability Models for Microservices Architectures. 19-24 - Miren Illarramendi Rezabal, Leire Etxeberria, Felix Larrinaga, Goiuria Sagardui:
CRESCO Framework and Checker: Automatic generation of Reflective UML State Machine's C++ Code and Checker. 25-30 - Monika Jaskolka, Stephen Scott, Vera Pantelic, Alan Wassyng, Mark Lawford:
Applying Modular Decomposition in Simulink. 31-36 - Muhammad Usman Sarwar, Sarim Zafar, Mohamed Wiem Mkaouer, Gursimran Singh Walia, Muhammad Zubair Malik:
Multi-label Classification of Commit Messages using Transfer Learning. 37-42 - Maninder Singh, Gursimran S. Walia:
Using Semantic Analysis and Graph Mining Approaches to Support Software Fault Fixation. 43-48 - Vaibhav K. Anu, Kazi Zakia Sultana, Bharath K. Samanthula:
A Human Error Based Approach to Understanding Programmer-Induced Software Vulnerabilities. 49-54 - Nuno Silva, Xavier Ferreira, Jesper T. Troelsen, Tomasz Kacmajor:
Independent Verification and Validation for the Space Industry: Guide Evolution Experience. 55-60 - Stephan Baumgart, Joakim Fröberg, Sasikumar Punnekkat:
A Process to Support Safety Analysis for a System-of-Systems. 61-66 - Claudius V. Jordan, Florian Hauer, Philipp Foth, Alexander Pretschner:
Time-Series-Based Clustering for Failure Analysis in Hardware-in-the-Loop Setups: An Automotive Case Study. 67-72 - Nermin Kajtazovic, Peter Hödl, Georg Macher:
Instrumenting Compiler Pipeline to Synthesise Traceable Runtime Memory Layouts in Mixed-critical Applications. 73-78 - Jean Guyomarc'h, Jean-Baptiste Hervé:
Static and Verifiable Memory Partitioning for Safety-Critical Systems. 79-84 - Athira Varma Jayakumar, Smitha Gautham, D. Richard Kuhn, Brandon J. Simon, Aidan G. Collins, Thomas Dirsch, Raghu Kacker, Carl R. Elks:
Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power Applications. 85-90 - Seunghwan Baek, Jisoo Song, Changyun Seo:
RSX: Reproduction Scenario Extraction Technique for Business Application Workloads in DBMS. 91-96 - Hongjun He, Jicheng Cao, Lesheng Du, Hao Li, Shilong Wang, Shengyu Cheng:
ConstBin: A Tool for Automatic Fixing of Unreproducible Builds. 97-102 - Jinfu Chen, Jingyi Chen, Dong Guo, Dave Towey:
An improved fuzzing approach based on adaptive random testing. 103-108 - Dheeraj Chahal, Ravi Ojha, Manju Ramesh, Rekha Singhal:
Migrating Large Deep Learning Models to Serverless Architecture. 111-116 - Gilhee Lee, Taegeun Moon, Min Jang, Hyoungshick Kim:
eAPT: enhancing APT with a mirror site resolver. 117-122 - José D'Abruzzo Pereira:
Techniques and Tools for Advanced Software Vulnerability Detection. 123-126 - Antonio Guerriero:
Reliability Evaluation of ML systems, the oracle problem. 127-130 - José Flora:
Improving the Security of Microservice Systems by Detecting and Tolerating Intrusions. 131-134 - Raul Sena Ferreira:
Towards safety monitoring of ML-based perception tasks of autonomous systems. 135-138 - Thomas Hirsch:
A Fault Localization and Debugging Support Framework driven by Bug Tracking Data. 139-142 - M. Alireza Hakamian:
Engineering Resilience: Predicting The Change Impact on Performance and Availability of Reconfigurable Systems. 143-146 - Jinyi Zhou, Kun Qiu, Zheng Zheng, Tsong Yueh Chen, Pak-Lok Poon:
Using Metamorphic Testing to Evaluate DNN Coverage Criteria. 147-148 - Naghmeh Ivaki, Nuno Antunes:
SIDE: Security-aware Integrated Development Environment. 149-150 - Juan Hernández-Serrato, Alejandro Velasco, Yury Nifio, Mario Linares-Vásquez:
Applying Machine Learning with Chaos Engineering. 151-152 - Alexandra Figueiredo, Tatjana Lide, Miguel Correia:
Multi-Language Web Vulnerability Detection. 153-154 - Vidroha Debroy, Alireza Mansoori, James Haleblian, Mark Wilkens:
Challenges Faced with Application Performance Monitoring (APM) when Migrating to the Cloud. 153-154 - Qianying Liao:
Modelling CI/CD Pipeline Through Agent-Based Simulation. 155-156 - Zhenxiang Chen, Hironori Washizaki, Yoshiaki Fukazawa:
Automated Tool for Revising Masking MC/DC Test Suite. 157-158 - Tomohiko Takagi, Koichiro Sakata:
Test-First for Abstracted Behavior of Software Using Extended Finite State Machine. 159-160 - Nataliya Yakymets, Morayo Adedjouma:
Model-based Quantitative Fault Tree Analysis based on FIDES Reliability Prediction. 161-162 - Ashlie B. Hocking, Jonathan C. Rowanhill, Ben L. Di Vito:
Unit Lemmas for Detecting Requirement and Specification Flaws. 163-164 - Jonathan C. Rowanhill, Ashlie B. Hocking, William H. Hawkins:
TDABD: Test-Driven-Assurance-Based Development. 165-166 - Nishanth Laxman, Peter Liggesmeyer:
Should we "safely" handle the uncertainties at runtime? - A rather seldom asked question. 167-168 - Madhuparna Bhowmik, Nara Madhumitha, Biju R. Mohan:
Similarity Calculation of Executable Using Intel Pin Instrumentation Framework. 169-170 - Thomas Hirsch, Birgit Hofer:
Root cause prediction based on bug reports. 171-176 - Majid Rezazadeh, Naser Ezzati-Jivan, Evan Galea, Michel R. Dagenais:
Multi-Level Execution Trace Based Lock Contention Analysis. 177-182 - Rodger William Byrd, Taniza Sultana, Kristen R. Walcott:
AHPCap: A Framework for Automated Hardware Profiling and Capture of Mobile Application States. 183-188 - Matteo Camilli, Carmine Colarusso, Barbara Russo, Eugenio Zimeo:
Domain Metric Driven Decomposition of Data-Intensive Applications. 189-196 - Gianluca Filippone, Marco Autili, Massimo Tivoli:
Towards the synthesis of context-aware choreographies. 197-200 - Andrea Stocco, Paolo Tonella:
Towards Anomaly Detectors that Learn Continuously. 201-208 - Antonia Bertolino, Francesca Lonetti, Vânia de Oliveira Neves:
Standing on the Shoulders of Software Product Line Research for Testing Systems of Systems. 209-214 - Alessandro Tundo, Chiara Castelnovo, Marco Mobilio, Oliviero Riganelli, Leonardo Mariani:
Declarative Dashboard Generation. 215-218 - Björn Wudka, Carsten Thomas, Lennart Siefke, Volker Sommer:
A Reconfiguration Approach for Open Adaptive Systems-of-Systems. 219-222 - Antonio Brogi, Stefano Forti, Carlos Guerrero, Isaac Lera:
Towards Declarative Decentralised Application Management in the Fog. 223-230 - Charles F. Gonçalves, Nuno Antunes:
Vulnerability Analysis as Trustworthiness Evidence in Security Benchmarking: A Case Study on Xen. 231-236 - David Pereira, João F. Ferreira, Alexandra Mendes:
Evaluating the Accuracy of Password Strength Meters using Off-The-Shelf Guessing Attacks. 237-242 - Gianpiero Costantino, Ilaria Matteucci, Domenico Morales:
EARNEST: A challenge-based intrusion prevention system for CAN messages. 243-248 - Lydia Gauerhof, Yuki Hagiwara, Christoph Schorn, Mario Trapp:
Considering Reliability of Deep Learning Function to Boost Data Suitability and Anomaly Detection. 249-254 - Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Evaluating Deep Learning Classification Reliability in Android Malware Family Detection. 255-260 - Carlo Abate, Lelio Campanile, Stefano Marrone:
A flexible simulation-based framework for model-based/data-driven dependability evaluation. 261-266 - M. Alireza Hakamian, Floriment Klinaku, André van Hoorn, Steffen Becker:
Resilience, Survivability, and Elasticity: A Taxonomy for Change Impact Quantification of Reconfigurable Systems. 267-274 - Sylvaine Picard, Camille Chapdelaine, Cyril Cappi, Laurent Gardes, Eric Jenn, Baptiste Lefèvre, Thomas Soumarmon:
Ensuring Dataset Quality for Machine Learning Certification. 275-282 - Arpan Gujarati, Sathish Gopalakrishnan, Karthik Pattabiraman:
New Wine in an Old Bottle: N-Version Programming for Machine Learning Components. 283-286 - Joanna C. S. Santos, Ali Shokri, Mehdi Mirakhorli:
Towards Automated Evidence Generation for Rapid and Continuous Software Certification. 287-294 - Carmen Cârlan, Daniel Petrisor, Barbara Gallina, Hannes Schoenhaar:
Checkable Safety Cases: Enabling Automated Consistency Checks between Safety Work Products. 295-302 - Johan Sundell, Kristina Lundqvist, Håkan Forsberg:
Safety-Critical Software - Quantification of Test Results. 303-310 - Lilian Barros, Celso M. Hirata, Johnny Cardoso Marques, Ana Maria Ambrosio:
Generating test cases to evaluate and improve processes of safety-critical systems development. 311-318 - Alberto Avritzer, Domenico Cotroneo, Yennun Huang, Kishor S. Trivedi:
Chapter 1: Software Aging and Rejuvenation: A Genesis - Extended Abstract. 319-320 - Vasilis P. Koutras, Agapios N. Platis:
Chapter 3: Software Rejuvenation: Key Concepts and Granularity. 321-322 - Javier Alonso, Kalyan Vaidyanathan, Roberto Pietrantuono:
SAR Handbook Chapter: Measurements-based aging analysis. 323-324 - Fumio Machida, Paulo R. M. Maciel:
Markov chains and Petri nets for software rejuvenation systems. 325-326 - Alberto Avritzer, Michael Grottke, Daniel Sadoc Menasché:
Chapter 8: Software Aging Monitoring and Rejuvenation for the Assessment of High Availability Systems - Extended Abstract. 327 - Keita Suzuki, Takafumi Kubota, Kenji Kono:
Detecting Struct Member-Related Memory Leaks Using Error Code Analysis in Linux Kernel. 329-335 - Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi:
How Robust is the Optimal Software Rejuvenation Timing? 336-341 - Ermeson C. Andrade, Fumio Machida, Roberto Pietrantuono, Domenico Cotroneo:
Software Aging in Image Classification Systems on Cloud and Edge. 342-348
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.