


default search action
32nd ISSRE 2021: Wuhan, China - Workshops
- IEEE International Symposium on Software Reliability Engineering, ISSRE 2021 - Workshops, Wuhan, China, October 25-28, 2021. IEEE 2021, ISBN 978-1-6654-2603-9

- Mengting Liang, Dimeng Li, Bin Xu, Dongdong Zhao, Xiao Yu, Jianwen Xiang:

Within-Project Software Aging Defect Prediction Based on Active Learning. 1-8 - András Földvári

, András Pataricza
:
Semi-automated model extraction from observations for dependability analysis. 1-6 - Wanrong Ouyang, Baojian Hua:

RusBox: Towards Efficient and Adaptive Sandboxing for Rust. 1-2 - Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi:

Sensitivity Analysis of Software Rejuvenation Model with Markov Regenerative Process. 9-16 - Ricardo M. Czekster

, Alberto Avritzer, Daniel Sadoc Menasché:
Aging and Rejuvenation Models of Load Changing Attacks in Micro-Grids. 17-24 - Lydia Gauerhof, Roman Gansch, Christian Heinzemann, Matthias Woehrle, Andreas Heyl:

On the Necessity of Explicit Artifact Links in Safety Assurance Cases for Machine Learning. 23-28 - Jacopo Parri, Samuele Sampietro, Leonardo Scommegna

, Enrico Vicario:
Evaluation of software aging in component-based Web Applications subject to soft errors over time. 25-32 - Ermeson Carneiro de Andrade, Fumio Machida, Roberto Pietrantuono

, Domenico Cotroneo:
Memory Degradation Analysis in Private and Public Cloud Environments. 33-39 - José Flora

, Paulo Gonçalves, Miguel Teixeira, Nuno Antunes:
My Services Got Old! Can Kubernetes Handle the Aging of Microservices? 40-47 - Lukas Beierlieb, Alberto Avritzer, Lukas Iffländer

, Nuno Antunes, Aleksandar Milenkoski, Samuel Kounev:
Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs. 48-55 - André Sarkis, Johnny Cardoso Marques, Luiz Alberto Vieira Dias:

Recommendations for the Usage of Design Models in Aviation Software. 56-63 - Abraham Chan, Udit Kumar Agarwal, Karthik Pattabiraman:

(WiP) LLTFI: Low-Level Tensor Fault Injector. 64-68 - Vincent Tan, Carmen Cheh

, Binbin Chen:
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector. 69-76 - Fuqun Huang

:
Software Requirement Criteria based on Human Errors. 77-82 - Jinfu Chen, Jingyi Chen, Saihua Cai

, Haibo Chen, Chi Zhang, Chuangfei Huang:
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing. 83-90 - Jinfu Chen, Jiaping Xu, Saihua Cai

, Xiaoli Wang, Yuechao Gu, Shuhui Wang:
An efficient dual ensemble software defect prediction method with neural network. 91-98 - Jinfu Chen, Yuechao Gu, Saihua Cai

, Haibo Chen, Jingyi Chen:
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity. 105-110 - Irena Bojanova, Carlos Eduardo Galhardo, Sara Moshtari:

Input/Output Check Bugs Taxonomy: Injection Errors in Spotlight. 111-120 - Setareh Majidi, Roman Obermaisser:

Genetic Algorithm for Scheduling Communication Networks in Time-Triggered Systems-of-Systems. 121-128 - Emanuele De Angelis

, Alessandro Pellegrini
, Maurizio Proietti:
Automatic Extraction of Behavioral Features for Test Program Similarity Analysis. 129-136 - Luciano Baresi

, Kostandin Caushi:
IDEA: Runtime Collection of Android Data. 137-143 - Gianluca Filippone

, Marco Autili
, Fabrizio Rossi
, Massimo Tivoli:
Migration of Monoliths through the Synthesis of Microservices using Combinatorial Optimization. 144-147 - Shuncheng Tang, Zhenya Zhang, Jia Tang, Lei Ma, Yinxing Xue:

Issue Categorization and Analysis of an Open-Source Driving Assistant System. 148-153 - Wenqiang Zheng

, Yan-Fu Li:
MC-FGSM: Black-box Adversarial Attack for Deep Learning System. 154-159 - Lulu Jia, Dezhen Yang, Yi Ren

, Cheng Qian, Zhifeng Li:
Semantic Learning and Understanding of multivehicle interaction patterns Using Primitive Driving Patterns With Bayesian Nonparametric Approaches. 160-165 - Bastian Kruck

, Peter Munk, Daniel Angermeier:
Safe and Secure: Mutually Supporting Safety and Security Analyses with Model-Based Suggestions. 172-181 - Piaoyi Liu, Siwei Zhou

, Luyao Ye, Dongdong Zhao, Jianwen Xiang:
A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND Gates. 182-188 - Wanrong Ouyang, Baojian Hua:

$^{\prime}\mathbf{R}$: Towards Detecting and Understanding Code-Document Violations in Rust. 189-197 - Xinying Liu, Jianhui Jiang, Long Li:

Computation Offloading and Task Scheduling with Fault-Tolerance for Minimizing Redundancy in Edge Computing. 198-209 - Chuanli Wu, Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jing Tian, Jianwen Xiang:

Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component Relevancy. 210-217 - Xiaoyu Wu, Zheng Hu, Ke Pei, Liyan Song, Zhi Cao

, Shuyi Zhang:
Methods for deep learning model failure detection and model adaption: A survey. 218-223 - Siyu Yu

, Ningjiang Chen, Birui Liang:
Predicting gray fault based on context graph in container-based cloud. 224-234 - Yang Zheng

, Zhenye Feng, Zheng Hu, Ke Pei:
MindFI: A Fault Injection Tool for Reliability Assessment of MindSpore Applicacions. 235-238 - Xu Liu, Honghui Li, Rui Wang, Zhouxian Jiang

:
Important-unit Coverage for Recurrent Neural Network. 245-249 - Zhitao Wu, Xiaoming Yang, Ping Chen, Zongshun Qu, Jun Lin:

Multi-Scale Software Network Model for Software Safety of the Intended Functionality. 250-255 - Jiajun Zhao, Qiuzhen Lin

, Junkai Ji:
Network Intrusion Detection by an Approximate Logic Neural Model. 256-261 - Min Liu, Guodong Ye, Qiuzhen Lin

:
Meaningful color image encryption algorithm based on compressive sensing and chaotic map. 262-265 - Wei Zheng, Liangbo Hou, Junming Yu, Fei Chen:

Detection of IoT Devices That Mine Cryptocurrency. 266-271 - Yuanzhi Liang, Lei Wang, Siran Li, Bo Jiang:

Rustpi: A Rust-powered Reliable Micro-kernel Operating System. 272-273 - Fuqun Huang

, Henrique Madeira:
Targeted Code Inspection based on Human Errors. 274-275 - Yutaka Matsuno, Yoriyuki Yamagata

, Hideaki Nishihara, Yuichiro Hosokawa:
Assurance Carrying Code for Software Supply Chain. 276-277 - Wenchu Xu, Yanran Ma:

A Static Analysis Framework for Detecting Bugs in Introductory Programs. 278-279 - Zhen Wang, Zhen Zhang, Jianhui Jiang:

Multi-Feature Fusion based Image Steganography using GAN. 280-281 - Kai Lin, Chuanqi Tao, Zhiqiu Huang:

Exception Handling Recommendation Based on Self-Attention Network. 282-283 - Naoko Imai, Hironori Washizaki, Naohiko Tsuda, Yoshiaki Fukazawa:

When is Continuous Integration Useful? Empirical Study on Team Size and Reporters in Development. 284-285 - Marco Barletta, Marcello Cinque, Raffaele Della Corte:

Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems. 286-287 - Qinqin Wu, Hao Huang, Yi Tang, Zhenwei Gu, Ang Jia:

SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in Binaries. 288-289 - Marek R. Ogiela, Lidia Ogiela:

Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols. 290-291 - Katarzyna Koptyra, Marek R. Ogiela:

Information Hiding using Bucket Steganography. 292-293 - Ulas Yüksel, Hasan Sözer:

Dynamic Filtering and Prioritization of Static Code Analysis Alerts. 294-295 - Kangjin Wang, Ying Li:

ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference. 296-297 - Saikath Bhattacharya, Munindar P. Singh, Laurie A. Williams:

Software Security Readiness and Deployment. 298-299 - Jinjian Luo, Meixi Liu, Yunlai Luo, Zhenbang Chen, Yufeng Zhang:

A Runtime Monitoring Based Fuzzing Framework for Temporal Properties. 300-301 - Scott Lupton

, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Online Log Parsing: Preliminary Literature Review. 304-305 - Maria Laura Brzezinski Meyer

:
TSAI - Test Selection using Artificial Intelligence for the Support of Continuous Integration. 306-309 - Bo Zhang

:
Mining Numerical Relations for Improving Software Reliability. 310-313 - Vittorio Orbinato

:
A next-generation platform for Cyber Range-as-a-Service. 314-318 - Jomar Domingos:

Failure Prediction for Cloud Applications through Ensemble Learning. 319-322 - Fang Yan:

Generation and Verification of Executable Assurance Case by Model-based Engineering. 323-326 - Monika Maidl, Dirk Kröselberg, Tiange Zhao, Tobias Limmer:

System-specific risk rating of software vulnerabilities in industrial automation & control systems. 327-332 - Ekaterina Blech, Andrey Grishchenko, Ivan Kniazkov, Guangtai Liang, Oleg Serebrennikov, Andrei Tatarnikov, Polina Volkhontseva, Kuzma Yakimets:

Patternika: A Pattern-Mining-Based Tool For Automatic Library Migration. 333-338 - Kumi Jinzenji, Akio Jin, Tatsuya Muramoto:

Innovation evaluation framework using state transition probability of the product. 339-344 - Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo

, Luigi Romano, Irene Bonetti, Elena Spagnuolo:
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study. 345-352 - Joritz Galarraga, Aitor Arrieta Marcos, Shaukat Ali, Goiuria Sagardui, Maite Arratibel:

Genetic Algorithm-based Testing of Industrial Elevators under Passenger Uncertainty. 353-358 - Xu Duan, Jingzheng Wu, Mengnan Du, Tianyue Luo, Mutian Yang, Yanjun Wu:

MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning. 359-364 - Andrey Kuleshov, Petr Trifanov, Vladislav Frolov, Guangtai Liang:

Diktat: Lightweight Static Analysis for Kotlin. 365-370 - Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:

Towards a Secure Software Lifecycle for Autonomous Vehicles. 371-377 - Catello Di Martino, Anwar Walid:

Continuous Testing and SLA Management of 5G Networks for Industrial Automation. 378-386 - Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li:

Disclosing the Fragility Problem of Virtual Safety Testing for Autonomous Driving Systems. 387-392 - Yuta Akiya, Kyle Thomas Le, Megan Luong, Justin C. Wilson, Anas Salah Eddin

, Valerio Formicola
, Mohamed El-Hadedy
:
SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems. 393-398 - Yang Zhang, Chaoshuai Li, Shuai Shao

:
ReSwitcher: Automatically Refactoring Java Programs for Switch Expression. 399-400 - Marie Farrell, Matt Luckcuck

, Laura Pullum, Michael Fisher, Ali Hessami, Danit Gal, Zvikomborero Murahwi, Ken R. Wallace
:
Evolution of the IEEE P7009 Standard: Towards Fail-Safe Design of Autonomous Systems. 401-406 - Senecca Miller, Travis Siems, Vidroha Debroy:

Kubernetes for Cloud Container Orchestration Versus Containers as a Service (CaaS): Practical Insights. 407-408 - Ishan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia:

Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers. 409-414 - Yi Wang, Yang Feng, Min Zhang

, Pu Sun:
The Necessity of Low-code Engineering for Industrial Software Development: A Case Study and Reflections. 415-420 - Anas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik:

Automatic Issue Classifier: A Transfer Learning Framework for Classifying Issue Reports. 421-426 - Chengbo Zhang, Ying Li, Yong Yang, Tong Jia, Zhirong Hou:

How Far Have We Come in Fault Tolerance for Distributed Graph Processing: A Quantitative Assessment of Fault Tolerance Effectiveness. 427-432 - Yuming Wu, Nishok Narasimha Mohanasamy, Lalita Jagadeesan, Muntasir Raihan Rahman:

Changes in Intent: Behavioral Predictions of Distributed SDN Controller Reconfiguration. 433-438

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














