


default search action
QRS Companion 2015: Vancouver, BC, Canada
- 2015 IEEE International Conference on Software Quality, Reliability and Security, QRS 2015, Companion, Vancouver, BC, Canada, August 3-5, 2015. IEEE 2015, ISBN 978-1-4673-9598-4

Session II-C: Information Assurance Workshop I
- Matthias Gander, Clemens Sauerwein, Ruth Breu:

Assessing Real-Time Malware Threats. 6-13 - Changsong Liu, Yangyang Zhao, Yibiao Yang

, Hongmin Lu, Yuming Zhou, Baowen Xu
:
An AST-Based Approach to Classifying Defects. 14-21 - Anneliese Andrews, Salwa Elakeili, Ahmed Alhaddad:

Selective Regression Testing of Safety-Critical Systems: A Black Box Approach. 22-31
Session II-D: Trustworthy Computing Workshop I
- Siqian Gong, Beibei Yin, Wenlong Zhu, Kai-Yuan Cai:

An Adaptive Control Strategy for Resource Allocation of Service-Based Systems in Cloud Environment. 32-39 - Juan Jenny Li, Peter Abbate, Brian Vega:

Detecting Security Threats Using Mobile Devices. 40-45 - Josip Bozic, Franz Wotawa

:
PURITY: A Planning-based secURITY Testing Tool. 46-55 - Linzhi Huang

, Jun Ai, Hanyu Pei:
Software Network Models Based on Dynamic Execution for Fault Propagation Research. 56-61
Session III-C: Information Assurance Workshop II
- Xu Zhao, Yan Wang:

Efficiently Testing Intelligent Transportation System in Simulation Environment. 62-71 - Xiaobo Yan, Yichen Wang, Anzhi Zhu, Yikun Wang:

A Fault Propagation Model for Embedded Software. 72-79 - Sai Kiran Thati, Junhua Ding, Dongmei Zhang, Xin-Hua Hu:

Feature Selection and Analysis of Diffraction Images. 80-88 - Yujing Ma, Yixiang Chen, Bin Gu:

An Attributes-Based Allocation Approach of Software Trustworthy Degrees. 89-94
Session III-D: Trustworthy Computing Workshop II
- Donghoon Kim, Mladen A. Vouk:

Securing Scientific Workflows. 95-104 - Nesa Asoudeh, Yvan Labiche

:
On the Effect of Counters in Guard Conditions When State-Based Multi-objective Testing. 105-114 - Chi-An Chih, Yu-Lun Huang:

An Adjustable Risk Assessment Method for a Cloud System. 115-120 - Hsia-Hsiang Chen, Han-Lin Lu, Shih-Kun Huang

, Ruizhi Gao, W. Eric Wong:
Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization Techniques. 121-127
Session VI-A: MVV Workshop
- Paul Muntean

, Adnan Rabbi, Andreas Ibing, Claudia Eckert:
Automated Detection of Information Flow Vulnerabilities in UML State Charts and C Code. 128-137 - Tolga Ayav

, Fevzi Belli:
Boolean Differentiation for Formalizing Myers' Cause-Effect Graph Testing Technique. 138-143 - Alessandro Oliveira Arantes, Valdivino Alexandre de Santiago Jr.

, Nandamudi Lankalapalli Vijaykumar:
On Proposing a Test Oracle Generator Based on Static and Dynamic Source Code Analysis. 144-152
Session VI-B: SSCPS Workshop
- Bin Li, Jun Liu, Jianhua Zhao:

Code Generation for Abstract Data Types Based on Program Analysis. 153-160 - Huiyong Li

, Yuanrui Zhang, Yixiang Chen:
PSTEP - A Novel Probabilistic Event Processing Language for Uncertain Spatio-temporal Event Streams of Internet of Vehicles. 161-168 - Na Li, Yunwei Dong, Tianwei Che, Chao Wang, Yang Gao:

The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access. 169-172 - Xinghua Yao, Jie Zhou:

A Model Language for Describing Spatio-temporal Changes. 173-181
Session VII-A: Fast Abstract
- Xiao Xiao:

Software Intensity Function Prediction by Haar Wavelet Regression. 182-183 - Yufei Jiang, Can Zhang, Dinghao Wu, Peng Liu:

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract). 184-185 - Qian Ye

, Minyan Lu, Luyi Li:
Critical Nodes Evaluation in Large-Scale Software Based on Static Structure and Runtime Information. 186-187 - Siyuan Hu, Hong Zhang:

Towards Transformation from UML to Event-B. 188-189
Session VII-B: Data Mining and Obfuscation
- Shun Guo, Donghui Guo:

Mining Potential Information for Multiclass Microarray Data Using Centroid-Based Dimension Reduction. 190-194 - Khaled M. Khan

, Mahboob Shaheen:
Data Obfuscation for Privacy and Confidentiality in Cloud Computing. 195-196
Session VIII-A: HSASQ Workshop
- Weifeng Zhang, Tianhao Pan, Yun Wang, Ziyuan Wang, Lei Xu:

UT-LDA Based Similarity Computing in Microblog. 197-201 - Yilin Qiu, Weiqiang Zhang, Weiqin Zou, Jia Liu, Qin Liu:

An Empirical Study of Developer Quality. 202-209 - Jeong Soo Eo, Hae-Ryong Choi, Ruizhi Gao, Shou-Yu Lee, W. Eric Wong:

Case Study of Requirements-Based Test Case Generation on an Automotive Domain. 210-215 - Jungui Zhou, Zhiyi Zhang, Peizhang Xie, Jingyu Wang:

A Test Data Generation Approach for Automotive Software. 216-220
Session VIII-B: SEKM Workshop
- Haipeng Cai

:
Facilitating Information Management in Integrated Development Environments through Visual Interface Enhancements. 221-229 - Bingbing Fang, Guoqiang Li, Ling Fang, Jianwen Xiang:

A Refined Algorithm for Reachability Analysis of Updatable Timed Automata. 230-236 - Shanmuganathan Vasanthapriyan

, Jing Tian, Jianwen Xiang:
A Survey on Knowledge Management in Software Engineering. 237-244 - Yoshiteru Nakamori, Fei Meng, Michitaka Kosaka, Jing Tian, Jianwen Xiang:

Service Systems Development Based on a Knowledge Synthesis Methodology. 245-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














