


default search action
QRS 2018: Lisbon, Portugal - Companion
- 2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2018, Lisbon, Portugal, July 16-20, 2018. IEEE 2018, ISBN 978-1-5386-7839-8

Invited Talk
- Wei-Tek Tsai, Lian Yu:

Lessons Learned from Developing Permissioned Blockchains. 1-10
Industry Track
- Jitendra Aggarwal, Tran Nguyen, Piyush Kumar Gupta:

DFT+Emulation - A Faster Way to Close Verification. 11-12 - Shannon Burns Conners, Joseph Morgan:

Using Software Development Artifacts to Improve the Software Development Process. 13
Automated Intelligent Software Testing
- Xinghan Zhao, Xiangfei Gao:

An AI Software Test Method Based on Scene Deductive Approach. 14-20 - Chaonian Guo, Shaomin Zhu, Tongsen Wang, Hao Wang

:
FeT: Hybrid Cloud-Based Mobile Bank Application Testing. 21-26 - Yiwen Yang, Jun Ai, Fei Wang:

Defect Prediction Based on the Characteristics of Multilayer Structure of Software Network. 27-34 - Yunqiang Yan, Yanhong Peng, Chang Liu, Haifeng Li:

A New Software Reliability Evaluation Model Based on the Probability of the Failure Mode. 35-41 - Jin-lei Sun, Shi-wen Zhang, Song Huang, Zhanwei Hui:

Design and Application of a Sikuli Based Capture-Replay Tool. 42-44 - Feng Gao, Fei Deng, Yuanqiang Yan, Chunlei Li:

Full Digital Simulation Testing of Networked Embedded Software. 45-50 - Xinyu Han, Nan Zhang, Wei He, Kai Zhang, Longli Tang:

Automated Warship Software Testing System Based on LoadRunner Automation API. 51-55 - Zijie Li, Lanfei Yan, Yuzhen Liu, Zhenyu Zhang, Bo Jiang:

MURE: Making Use of MUtations to REfine Spectrum-Based Fault Localization. 56-63 - Nan Zhang, Haiyan Chai, Xinyu Han:

Research on the Reuse of Test Case for Warship Equipment Software. 64-69 - Chao Jiang, Song Huang, Zhanwei Hui:

Metamorphic Testing of Image Region Growth Programs in Image Processing Applications. 70-72 - Lijin Wu, Wei He, Bojiang Liu, Xinyu Han, Longli Tang:

Scenario-Based Software Reliability Testing and Evaluation of Complex Information Systems. 73-78 - Qingjie Wei, Yijin Li, Yuheng Zhang:

A New Method of Evolutionary Testing for Path Coverage. 79-86 - Yuan Chen, Anbang Wang, Junjie Wang, Luo Liu, Yuanzhang Song, Qinghua Ha:

Automatic Test Transition Paths Generation Approach from EFSM Using State Tree. 87-93 - Yusong Chen, Jianguang Chen, Yang Gao, Dongfeng Chen, Yuming Tang:

Research on Software Failure Analysis and Quality Management Model. 94-99 - Tariq M. King, Dionny Santiago

, Justin Phillips, Peter J. Clarke
:
Towards a Bayesian Network Model for Predicting Flaky Automated Tests. 100-107 - Weijun Shen, Jun Wan, Zhenyu Chen:

MuNN: Mutation Analysis of Neural Networks. 108-115 - Ryan Lekivetz, Joseph Morgan:

Fault Localization: Analyzing Covering Arrays Given Prior Information. 116-121
Blockchain, Smart Contracts, and Digital Society
- Anamika Chauhan, Om Prakash Malviya, Madhav Verma, Tejinder Singh Mor:

Blockchain and Scalability. 122-128 - Kimmo Halunen, Visa Antero Vallivaara, Anni Karinsalo

:
On the Similarities between Blockchains and Merkle-Damgård Hash Functions. 129-134 - Anni Karinsalo

, Kimmo Halunen:
Smart Contracts for a Mobility-as-a-Service Ecosystem. 135-138 - Kan Luo, Wei Yu, Muhammad Amjad Hafiz, Siyuan Wang, Linchao Gao, Kai Hu:

A Multiple Blockchains Architecture on Inter-Blockchain Communication. 139-145 - Michele Amoretti, Giacomo Brambilla, Francesco Medioli, Francesco Zanichelli:

Blockchain-Based Proof of Location. 146-153 - Wei-Tek Tsai, Enyan Deng, Xiaoqiang Ding, Jie Li:

Application of Blockchain to Trade Clearing. 154-163
Human and Social Aspects of Software Quality
- Cong Pan

, Minyan Lu, Hong Zhang, Biao Xu:
Qualitative Software Reliability Requirements: Concept, Classification and Practical Elicitation Methods. 164-171 - Yu Zheng, Song Huang, Zhanwei Hui, Yaning Wu:

A Method of Optimizing Multi-Locators Based on Machine Learning. 172-174 - Zemin Qin, Tieke He, Hao Lian, Yuanhan Tian, Jia Liu:

Research on Judicial Data Standard. 175-177 - Hao Lian, Tieke He, Zemin Qin, Haoyu Li, Jia Liu:

Research on the Information Quality Measurement of Judicial Documents. 178-181
Quality-Oriented Engineering
- Jingwei Shang, Ping Chen, Qiang Wang, Liewen Lu:

Information System Reliability Quantitative Assessment Method and Engineering Application. 182-186 - Emad Badawi, Khaled El-Fakih, Gerassimos D. Barlas

:
GPU and Multiprocessing Parallel Implementations for the Elimination of Finite State Machine Mutants. 187-198 - Sohon Roy, Arie van Deursen

, Felienne Hermans:
On the Effectiveness of Automatically Inferred Invariants in Detecting Regression Faults in Spreadsheets. 199-206 - Sahar Tahvili, Marcus Ahlberg, Eric Fornander, Wasif Afzal

, Mehrdad Saadatmand
, Markus Bohlin, Mahdi Sarabi:
Functional Dependency Detection for Integration Test Cases. 207-214 - Hao Lan, Yin Tong, Jin Guo, Yadong Zhang, Yao Li, Chang Rao:

A Test Path Generation Method Based on SSM Models. 215-220 - Anping He, Lvying Yu, Haitao Zhang, Lian Li, Jinzhao Wu:

A FPGA Based SAT Solver with High Random and Concurrent Strategies. 221-228 - Seher Razzaq

, Yan-Fu Li, Chu-Ti Lin, Min Xie:
A Study of the Extraction of Bug Judgment and Correction Times from Open Source Software Bug Logs. 229-234 - Renya He, Longli Tang, Xinyu Han, Wei He, Zehui Zhao:

Software Component Reliability Evaluation Method Based on Characteristic Parameters. 235-241 - Ana Turlea, Florentin Ipate, Raluca Lefticaru

:
Generating Complex Paths for Testing from an EFSM. 242-249 - Xiaodong Gou, Chong Bian, Fuping Zeng, Qingyang Xu, Wencai Wang, Shunkun Yang:

A Data-Driven Smart Fault Diagnosis Method for Electric Motor. 250-257 - Shengqi Guo, Min Huang:

Simulation Design of Shop Material Supply Based on Queuing Theory. 258-263 - Lan Liu, Jun Lin, Qiang Wang, Xiaoping Xu:

Research on Network Malicious Code Detection and Provenance Tracking in Future Network. 264-268
Reliability and Resilience of Complex Systems
- Yue Liu, Xiaoyang Li

, Lianghua Xiao:
Service Oriented Resilience Strategy for Cloud Data Center. 269-274 - Qiang Dong, Chong Jin, Ruiying Li, Rui Kang:

How Does Node Resilience Effect on Complex Networks? 275-280 - Vaughn H. Standley, Edward A. Boucheron:

Space-Based Unidirectional Networks and Resiliency. 281-286 - Dong Lyu, Shubin Si

:
Dynamic Importance Measure for K-out-of-n System in Presence of Dependent Failure. 287-293 - Yin Lu, Yunwei Dong, Xiaomin Wei

, Mingrui Xiao
:
A Hybrid Method of Redundancy System Reliability Analysis Based on AADL Models. 294-300 - Yongqiang Zhang, Hong Zhang, Cong Pan, Chao Feng:

Construction of User Concurrent Profile Based on Usage Logs. 301-307
Software Engineering and Knowledge Management
- Shiyi Kong, Minyan Lu, Luyi Li:

Tracing Error Propagation in C/C++ Applications. 308-315 - Xing Liu, Panwen Liu, Xin Yan, Chengming Zou, Ruoshi Xia, Haiying Zhou, Kun Mean Hou, Christophe de Vaulx

:
Energy Optimization and Fault Tolerance to Embedded System Based on Adaptive Heterogeneous Multi-Core Hardware Architecture. 316-323 - Lili Rong, Kesheng Yan, Jingwen Zhang:

Optimum Post-Disruption Restoration Plan of Interdependent Critical Infrastructures. 324-331 - Jiangning Wu, Lingyu Du, Yanzhong Dang:

Research on the Impact of Consumer Review Sentiments from Different Websites on Product Sales. 332-338 - Shanmuganathan Vasanthapriyan

:
A Study of Software Testing Practices in Sri Lankan Software Companies. 339-344 - Erqing Li

, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang, Yueying He, Jin Wang, Jiangning Wu:
Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy. 345-352
System Reliability in Cloud Computing and Big Data
- Bang-An Tong, Xiaoyang Li

, Lianghua Xiao:
Service Reliability Oriented Modeling for the Failure of Cloud Data Center. 353-357 - Christopher B. Hauser, Jörg Domaschka, Stefan Wesner:

Predictability of Resource Intensive Big Data and HPC Jobs in Cloud Data Centres. 358-365 - Yong Wang, Jun Li, Nan Yan, Weiwei Li, Yong Li, Sanming Liu:

Bug Patterns Localization Based on Topic Model for Bugs in Program Loop. 366-370 - Haiqing Wang, Peng Sun:

Task Resource Planning and Verification Method Based on Intelligent Planning. 371-376 - Peng Sun, Xiaochuang Tang, Liang Luo:

An Unsupervised Parameter Grouping Algorithm for Combinatorial Testing. 377-381
Security, Reliability, and Resilience in Wireless Sensor Networks and Smart Grid
- Yang Liu, Qingping Shi, Xiaotao Yan, Heng Zhang, Hang Yi, Weiqiang Xia, Hongwei Ma, Jian Kang:

Research on Abnormal Behavior Detection Technology of Launch Vehicle Controlled Network. 382-387 - Yong Wang, Jiahe Cui

, Tao Zhang
, Jing Yang, Jianpei Zhang:
A Complex Network Evolution Model Based on Microscopic Characteristic of Nodes. 388-393 - Ye Yuan

, Shouzheng Li, Xingjian Zhang, Jianguo Sun:
A Comparative Analysis of SVM, Naive Bayes and GBDT for Data Faults Detection in WSNs. 394-399 - Hanqi Yin, Zhiming Yin, Yang Yang, Jianguo Sun:

Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm. 400-405 - Jianguo Sun, Duo Liu, Yiqi Shi, Ye Yuan, Yang Yang:

Industrial Wireless Sensor Network Topology Non-Uniform Node Optimization Deployment. 406-413 - Yuan Ren, Shuyu He, Pengyu Hu, Jianguo Sun:

Research on Cross-Layer Optimization of Smart Grid Demand Side Based on WSNs. 414-420 - Chao Wang, Zhaoyue Zhang, Ming Zhu:

Nonlinear Dynamic Analysis of Air Traffic Flow at Different Temporal Scales: Nonlinear Analysis Approach versus Complex Networks Approach. 421-431
Safety and Security in Cyber-Physical Systems
- Jaruwan Mesit, Matthias R. Brust

, Pascal Bouvry
:
Lightweight Key Agreement for Wireless Sensor Networks. 432-437 - Pooja Rajendraprasad, Sergey Butakov, Fehmi Jaafar:

Information Security Considerations for Wireless Infusion Pumps. 438-442 - Siyou Ma, Yunqiang Yan:

Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies. 443-449 - Xiaomin Wei

, Yunwei Dong, Mingrui Xiao
:
Safety-Based Software Reconfiguration Method for Integrated Modular Avionics Systems in AADL Model. 450-455 - Yunqiang Yan, Siyou Ma:

Collaborative Simulation Testing with State Behavior Tree. 456-462 - Luhang Xu, Weixi Jia, Wei Dong, Yongjun Li:

Automatic Exploit Generation for Buffer Overflow Vulnerabilities. 463-468 - Xudong He:

Modeling and Analyzing Cyber Physical Systems Using High Level Petri Nets. 469-476 - Luhang Xu, Wei Dong, Liangze Yin, Qiuxi Zhong:

Guide Fuzzing with Multi-Factor Potential Analysis. 477-482
Trustworthy Computing
- Michael Brunner

, Andrea Mussmann, Ruth Breu:
Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case Study. 483-490 - Chunlin Wang, Ning Huang, Lina Sun, Guoyi Wen:

A Titration Mechanism Based Congestion Model. 491-496 - Maha Ali Allouzi

, Javed I. Khan:
Stateless Multiparty Trust Negotiation Protocol for Distributed Systems. 497-504 - Fehmi Jaafar, Gagandeep Singh, Pavol Zavarsky:

An Analysis of Android Malware Behavior. 505-512
Verification and Validation of Adaptive Software Systems
- Benedikt Eberhardinger, Hella Ponsar, Gerald Siegert, Wolfgang Reif

:
Case Study: Adaptive Test Automation for Testing an Adaptive Hadoop Resource Manager. 513-518 - Franz Wotawa

, Martin Zimmermann:
Adaptive System for Autonomous Driving. 519-525 - Shuji Morisaki, Norimitsu Kasai:

An Approach for Detecting Critical Adaptations in Automated Adaptive Software Systems. 526-530 - Sara Zatout, Maya Souilah Benabdelhafid, Mahmoud Boufaïda:

Formal Transaction Modeling and Verification for an Adaptable Web Service Orchestration. 531-536 - Guigang Zhang, Chuanchuan You:

Influence Maximization Algorithms Research Based on Big Graphs. 537-544
Software Engineering and Big Data
- Pan Liu, Zhenning Jimmy Xu, Jun Ai:

An Approach to Automatic Test Case Generation for Unit Testing. 545-552 - Pengyang Zong, Yichen Wang, Feng Xie:

Embedded Software Fault Prediction Based on Back Propagation Neural Network. 553-558 - Shufeng Ye, Yi Yang, Weixing Huang, Jian Wang:

Personalized Recommender System for Digital Cultural Resources. 559-565 - Zhiwen Lei, Yi Yang, Weixing Huang, Jian Wang:

Tag Recommendation for Cultural Resources. 566-571
Model-Based Verification and Validation
- Sebastian Schlesinger, Paula Herber, Thomas Göthel, Sabine Glesner:

Equivalence Checking for Hybrid Control Systems Modelled in Simulink. 572-579 - Tugkan Tuglular

:
Event Sequence Graph-Based Feature-Oriented Testing: A Preliminary Study. 580-584 - Onur Kilinççeker

, Ercument Turk, Moharram Challenger
, Fevzi Belli:
Regular Expression Based Test Sequence Generation for HDL Program Validation. 585-592
Cyber Resilience Economics
- Michael Vai, David Whelihan, Jacob Leemaster, Haley Whitman, Willahelm Wan, Yunsi Fei

, Roger Khazan, Ilia A. Lebedev, Kyle Hogan, Srinivas Devadas:
Mission Assurance: Beyond Secure Processing. 593-598 - Arnd Weber, Steffen Reith, Dirk Kuhlmann, Michael Kasper, Jean-Pierre Seifert, Christoph Krauß

:
Open Source Value Chains for Addressing Security Issues Efficiently. 599-606 - Anurag Dwivedi:

Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering. 607-616
Conflicts and Synergies among Reliability, Security, and Other Qualities
- Nils Müllner, Wasif Afzal

:
Towards a Coherent Terminology and Taxonomy for Evaluating Safety via Testing. 617-622 - Emtinan Mustafa, Rasha Osman

:
An Analysis of the Inclusion of Environmental Cost Factors in Software Cost Estimation Datasets. 623-630
Fast Abstracts
- Yonglei Tao:

Reusable Support for Task-Based Adaptive Navigation. 631-632 - Alejandro Carrasco

, Jorge Ropero, Paulino Ruiz-de-Clavijo, Jaime Benjumea, Amalia Luque:
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot. 633-634 - Fuqun Huang

, Yichen Wang, Yikun Wang, Pengyang Zong:
What Software Quality Characteristics Most Concern Safety-Critical Domains? 635-636 - Yu-Lun Huang, Wen-Lin Sun:

An AHP-Based Risk Assessment for an Industrial IoT Cloud. 637-638 - Rui Du, Min Huang, Yu Zheng:

The Research on Optimization of Flame Tube Welding Process Reliability Based on Numerical Simulation. 639-640
Poster Papers
- Beibei Zhang, Wei Wei, Wei Wang, Yang Li, Huali Cui, Qiang Si:

Modeling Topic Propagation on Heterogeneous Online Social Networks. 641-642 - Xing Pan, Manli Zhang, Xi Chen:

A Method of Quality Improvement Based on Big Quality Warranty Data Analysis. 643-644 - Yuankai Gao, Xiaogang Li, Lei Niu:

Highly Accelerated Life Test Evaluation Based on Accelerated Growth Model. 645-646 - Fei Deng, Feng Gao, Yuanqiang Yan, Wei Zou:

Research on CodeCache Management Strategy Based on Code Heat in Dynamic Binary Translator. 647-651 - Haiyan Chai, Nan Zhang, Bojiang Liu, Longli Tang:

A Software Defect Management System Based on Knowledge Base. 652-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














