default search action
QRS Companion 2017: Prague, Czech Republic
- 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017, Prague, Czech Republic, July 25-29, 2017. IEEE 2017, ISBN 978-1-5386-2072-4
- Xiaobo Yan, Bin Liu, Jianxing Li:
The Failure Behaviors of Multi-Faults Programs: An Empirical Study. 1-7 - Jakub Ondik, Martin Olejár, Karol Rástocný, Mária Bieliková:
Activity-Based Model Synchronization and Defects Detection for Small Teams. 8-15 - Wenpeng Li, Yingkui Cao, Junfeng Zhao, Yanzhen Zou, Bing Xie:
Toward Summary Extraction Method for Functional Topic. 16-23 - Peng Xiao, Bin Liu, Xiaobo Yan, Fuqun Huang:
How Domain Knowledge Accumulation Influences Software Defects: An Empirical Analysis. 24-30 - Mai Abusair, Antinisca Di Marco, Paola Inverardi:
Context-Aware Adaptation of Mobile Applications Driven by Software Quality and User Satisfaction. 31-38 - Pete Rotella, Sunita Chulani:
Predicting Release Reliability. 39-46 - Nesrine Noughi, Stefan Hanenberg, Anthony Cleve:
An Empirical Study on the Usage of SQL Execution Traces for Program Comprehension. 47-54 - Sergiy Vilkomir, Jiabin Wang, Nam Le Thai, Junhua Ding:
Combinatorial Methods of Feature Selection for Cell Image Classification. 55-60 - Sergiy Vilkomir, Aparna Alluri, D. Richard Kuhn, Raghu N. Kacker:
Combinatorial and MC/DC Coverage Levels of Random Testing. 61-68 - Miroslav Bures, Bestoun S. Ahmed:
On the Effectiveness of Combinatorial Interaction Testing: A Case Study. 69-76 - Hanefi Mercan, Cemal Yilmaz, Kamer Kaya:
An Approach for Choosing the Best Covering Array Constructor to Use. 77-84 - Fakhrud Din, Abdul Rahman A. Alsewari, Kamal Z. Zamli:
A Parameter Free Choice Function Based Hyper-Heuristic Strategy for Pairwise Test Generation. 85-91 - Peter Charbachi, Linus Eklund, Eduard Enoiu:
Can Pairwise Testing Perform Comparably to Manually Handcrafted Testing Carried Out by Industrial Engineers? 92-99 - M. S. Raunak, D. Richard Kuhn, Raghu Kacker:
Combinatorial Testing of Full Text Search in Web Applications. 100-107 - Khaled M. Khan, Zhuhan Jiang:
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service. 108-113 - Hyo-Cheol Lee, Seok-Won Lee:
Provenance Information-Based Trust Evaluation Using Cooperation Pattern for Self-Adaptive Systems. 114-121 - Yunwei Dong, Yuanyuan He, Yin Lu, Hong Ye:
A Model Driven Approach for Device Driver Development. 122-129 - Daniel Richter, Marcus Konrad, Katharina Utecht, Andreas Polze:
Highly-Available Applications on Unreliable Infrastructure: Microservice Architectures in Practice. 130-137 - Gayathri Sugumar, Aditya Mathur:
Testing the Effectiveness of Attack Detection Mechanisms in Industrial Control Systems. 138-145 - Rui Fang, Xiaohu Li:
Stochastic Comparisons of Used Coherent System and New System of Used Components for Non-Identically Distributed and Dependent Components. 146-151 - Xinyang Wu, Xiaoyue Wu:
An Importance Based Algorithm for Reliability-Redundancy Allocation of Phased Mission Systems. 152-159 - Shubin Si, Wenhai He, Xianzhi Wang:
Criticality Analysis Method Based on Integrated Importance Measure. 160-164 - Hongda Gao, Lirong Cui:
Reliability Analysis for a Degradation System Subject to Dependent Soft and Hard Failure Processes. 165-170 - Jinchen Cai, Chunhong Chen:
Circuit Reliability Analysis Using Signal Reliability Correlations. 171-176 - Shiqi Liu, Hao Chen, Bo Guo, Xiang Jia, Jianjun Qi:
Residual Life Estimation by Fusing Few Failure Lifetime and Degradation Data from Real-Time Updating. 177-184 - Xiaoyue Wu, Bo Guo:
An Object-Oriented Simulation Model for Reliability of PMS with Time Redundancy. 185-189 - YuLong Ying, Jingchao Li, Zhimin Chen, Jing Li:
Rolling Bearing Vibration Signal Analysis Based on Dual-Entropy, Holder Coefficient and Gray Relation Theory. 190-194 - Xuetao Tian, Honghui Li, Feng Liu:
Web Service Reliability Test Method Based on Log Analysis. 195-199 - Yang Liu, Hongping Xu, Hang Yi, Zhen Lin, Jian Kang, Weiqiang Xia, Qingping Shi, Youping Liao, Yulong Ying:
Network Anomaly Detection Based on Dynamic Hierarchical Clustering of Cross Domain Data. 200-204 - Yuanyi Liu, Wenming Wang, Jian Kang, Youping Liao, Yang Liu, Qingping Shi, Weiqiang Xia, Mingyu Hu:
Research on the Measurement and Transmission Network System of New Launch Vehicle Based on Cloud Computing. 205-210 - Bing Jia, Shuai Liu, Tao Zhou, Zhendong Xu:
Opportunistic Transmission Mechanism Based on SI in Mobile Crowd Sensing Networks. 211-215 - Shanshan Jin, Yun Lin, Hui Wang:
Automatic Modulation Recognition of Digital Signals Based on Fisherface. 216-220 - Yun Lin, Mingyu Hu, Xuhong Yin, Jian Guo, Zhaojun Li:
Evaluation of Lithium Batteries Based on Continuous Hidden Markov Model. 221-225 - Meiyu Wang, Zhigang Li, Yun Lin:
A Distributed Intrusion Detection System for Cognitive Radio Networks Based on Evidence Theory. 226-232 - Hui Wang, Lili Guo, Yun Lin:
Recognition Method of Software Defined Radio Signal Based on Evidence Theory and Interval Grey Relation. 233-237 - Sen Wang, Yun Lin:
Portable Safety Voice Information Recording Equipment. 238-242 - Zhen Zhang, Yibing Li, Xiaolei Zhu, Yun Lin:
A Method for Modulation Recognition Based on Entropy Features and Random Forest. 243-246 - Qidi Wu, Yibing Li:
A Biological Image Restoration Method with Independently Local Dictionary Learning. 247-251 - Chao Wang, Yun Lin, Zhen Zhang:
Research on Physical Layer Security of Cognitive Radio Network Based on RF-DNA. 252-255 - Tu Ya, Yun Lin, Hui Wang:
Modulation Recognition of Digital Signal Based on Deep Auto-Ancoder Network. 256-260 - Gaocheng Liu, Shuai Liu, Mengye Lu, Zheng Pan:
Effects of Improper Ground Truth on Target Tracking Performance Evaluation in Benchmark. 261-266 - Shaobo Li, Xuhang Li, He Yang, Guanglu Sun, Fei Lang:
A Zombie Account Detection Method in Microblog Based on the PageRank. 267-270 - Yuning Zhao, Xiaodong Yang, Yun Lin:
A New Recognition Method for M-QAM Signals in Software Defined Radio. 271-275 - Babak Heydari:
Resilience in Homogeneous Networks: A Strategic Network Formation Approach. 276-282 - Summer Craze Fowler, Peter P. Chen:
CsPI: A New Way to Evaluate Cybersecurity Investments: A Position Paper. 283-284 - Larisa Breton:
Risky Cyber Security: '7012' Regulations Federally-Driven Inhibitor to Resilience within the Defense Industrial Base - A Position Paper. 285-288 - Qiang Han:
Resilience Mechanism for Trustworthy Workflow Management System. 289-296 - Dong Li, Linghuan Hu, Ruizhi Gao, W. Eric Wong, D. Richard Kuhn, Raghu N. Kacker:
Improving MC/DC and Fault Detection Strength Using Combinatorial Testing. 297-303 - Xiaolin Ju, Xiang Chen, Yibiao Yang, Shujuan Jiang, Junyan Qian, Baowen Xu:
An In-Depth Study of the Efficiency of Risk Evaluation Formulas for Multi-Fault Localization. 304-310 - Jing Xia, Yanhui Li:
Could We Predict the Result of a Continuous Integration Build? An Empirical Study. 311-315 - Yuanchao Qi, Ziyuan Wang, Yongming Yao:
Influence of the Distance Calculation Error on the Performance of Adaptive Random Testing. 316-319 - Yongming Yao, Yiyang Yan, Ziyuan Wang, Chen Liu:
Design and Implementation of Combinatorial Testing Tools. 320-325 - Eun-Young Kang, Dongrui Mu, Li Huang, Qianqing Lan:
Verification and Validation of a Cyber-Physical System in the Automotive Domain. 326-333 - Michael Brunner, Michael M. Huber, Clemens Sauerwein, Ruth Breu:
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems. 334-340 - Sridhar Adepu, Jay Prakash, Aditya Mathur:
WaterJam: An Experimental Case Study of Jamming Attacks on a Water Treatment System. 341-347 - Ge Zhou, Wei Dong, Wanwei Liu, Hao Shi, Chi Hu, Liangze Yin:
Optimizing Monitor Code Based on Patterns in Runtime Verification. 348-354 - Hao Shi, Wei Dong, Ge Zhou, Liangze Yin:
Monitor Synthesis for Parametric MTL Properties in Discrete Control Software. 355-362 - Zhenying Jiang, Xiao Wu, Zeqian Dong, Ming Mu:
Optimal Test Case Generation for Simulink Models Using Slicing. 363-369 - Gang Yang, Xingshe Zhou, Yuanyuan Lian:
Constraint-Based Consistency Checking for Multi-View Models of Cyber-Physical System. 370-376 - Yichen Wang, Yikun Wang:
Use Neural Network to Improve Fault Injection Testing. 377-384 - Ting Zhang, Fuke Chang:
Target Signal Synchronization Transmission in Coupling Network with Uncertain Parameters. 385-389 - Yuan Huang:
A Method of Personalized Tag Prediction Based on Graph Structure. 390-395 - Pan Liu, Zhenning Jimmy Xu, Jun Ai, Fei Wang:
Identifying Indicators of Fake Reviews Based on Spammer's Behavior Features. 396-403 - Shufeng Ye, Yi Yang, Weixing Huang, Jian Wang, Guigang Zhang:
Public Cultural Services Recommendation System Architecture. 404-409 - Jianqiao Hu, Feng Jin, Guigang Zhang, Jian Wang, Yi Yang:
A User Profile Modeling Method Based on Word2Vec. 410-414 - Hongming Che, Qinyun Liu, Lin Zou, Hongji Yang, Dongdai Zhou, Feng Yu:
A Content-Based Phishing Email Detection Method. 415-422 - Sicong Ma, Hongji Yang, Lu Zhang, Dongdai Zhou, Hua Zhou:
Emergency Travel Plan Generation Based on Cybernetics. 423-428 - Suleiman Onimisi Aliyu, Feng Chen, Ying He:
QoS-Aware Resource Management in SDN-Based InterClouds: A Software Cybernetics Perspective. 429-434 - André Reichstaller, Alexander Knapp:
Compressing Uniform Test Suites Using Variational Autoencoders. 435-440 - Ilker Yildirim, Hasan Sözer:
Automated Extraction of Feature Models from Android Based Portable Devices. 441-448 - Xin Yue, Yanzhong Dang:
The Effect of Personality on Team Performance: An Interpersonal Knowledge Interaction Perspective. 449-455 - Lili Rong, Zijun Qie:
Modeling of Hazard Affected Regions in Support of Scenario Evolution Analysis for Unconventional Emergency. 456-463 - Jiangning Wu, Xiangjie Ku, Donghua Pan:
An Empirical Study on How Empowering Leadership Affects the Team Creativity. 464-471 - Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:
An Ontology-Based Knowledge Sharing Portal for Software Testing. 472-479 - Jing Sun, Van-Nam Huynh, Yoshiteru Nakamori, Jianguo Wu, Jing Tian, Jianwen Xiang:
Knowledge Management in Graduate Research. 480-485 - Jianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang:
A Comparative Study of Knowledge Management on Undergraduate by Questionnaire. 486-492 - Biljana Stanic, Wasif Afzal:
Process Metrics Are Not Bad Predictors of Fault Proneness. 493-499 - Junli Yang, Bo Song, Bing Yan, Guoqiang Li:
A Novel Hidden Markov Model for Genome-Wide Association Studies. 500-506 - Barry W. Boehm, Xavier Franch:
Conflicts and Synergies among Quality Requirements. 507-508 - Juraj Vincur, Pavol Návrat, Ivan Polásek:
VR City: Software Analysis in Virtual Reality Environment. 509-516 - Chuadhry Mujeeb Ahmed, Aditya P. Mathur:
Hardware Identification via Sensor Fingerprinting in a Cyber Physical System. 517-524 - Eun-Young Kang, Dongrui Mu, Li Huang, Qianqing Lan:
Model-Based Analysis of Timing and Energy Constraints in an Autonomous Vehicle System. 525-532 - Sridhar Adepu, Aditya Mathur:
From Design to Invariants: Detecting Attacks on Cyber Physical Systems. 533-540 - Mats Carlsson, Olga Grinchtein, Justin Pearson:
Modelling and Verification of User Interactions Using Constraint Programming. 541-547 - Ian David Peake, Jan Olaf Blech:
A Candidate Architecture for Cloud-Based Monitoring in Industrial Automation. 548-554 - Amro Al-Said Ahmad, Pearl Brereton, Peter Andras:
A Systematic Mapping Study of Empirical Studies on Software Cloud Testing Methods. 555-562 - Peter Herrmann, Jan Olaf Blech:
Formal Analysis of Control Software for Cyber-Physical Systems. 563-564 - Ashkan Hemmati, Chris Carlson, Maleknaz Nayebi, Guenther Ruhe, Chad Saunders:
Analysis of Software Service Usage in Healthcare Communication Services. 565-566 - Li-Wen Chen, Yu-Lun Huang:
An Enhanced Handover Scheme Adopting Mobile Relays in a LTE-A Network for High-Speed Movements. 567-568 - Huai Liu, Jan Olaf Blech, Matt Duckham, Heinz W. Schmidt:
Spatio-Temporal Aware Testing for Complex Systems. 569-570 - Chunfeng Hu, Jin Guo, Nan Li, Yao Li, Chang Rao, Siqi Liu:
Towards Effective and Scalable Testing for Complex High-Speed Railway Signal Software. 571-572 - Mehrdad Saadatmand:
Towards Automating Integration Testing of .NET Applications Using Roslyn. 573-574 - Tao Zhang, Jinbo Wang:
A Spatial-Temporal Model for Software Fault Tolerance in Safety-Critical Applications. 575-576 - Mehmet Çagri Çalpur, Sevgi Arca, Tansu Cagla Calpur, Cemal Yilmaz:
Model Dressing for Automated Exploratory Testing. 577-578 - Qing Mi, Jacky Keung, Jianglin Huang, Yan Xiao:
Using Eye Tracking Technology to Analyze the Impact of Stylistic Inconsistency on Code Readability. 579-580 - Quyen L. Nguyen, Arun Sood:
Scalability of Cloud Based SCIT-MTD. 581-582 - Dengyun Lei, Liwei Wang, Jun Lin, Yunfei En:
Quality Evaluation of Digital Soft IP Core for FPGA System. 583-584 - Jigang Liu, Rashmi Kammar, Ryôichi Sasaki, Tetsutaro Uehara:
Malware Behavior Ontology for Digital Evidence. 585-586 - D. Richard Kuhn, M. S. Raunak, Raghu Kacker:
An Analysis of Vulnerability Trends, 2008-2016. 587-588 - Teemu Kanstrén:
Experiences in Testing and Analysing Data Intensive Systems. 589-590 - Claus Klammer, Rudolf Ramler:
A Journey from Manual Testing to Automated Test Generation in an Industry Project. 591-592 - Bernhard Peischl:
On Business Drivers for Firmware Test: A Wake-Up Call for Software Engineering Research? 593-594 - Achilleas Xypolytos, Haiyun Xu, Bárbara Vieira, Amr M. T. Ali-Eldin:
A Framework for Combining and Ranking Static Analysis Tool Findings Based on Tool Performance Statistics. 595-596 - Matthew Campbell, Kent Martin, Ferenc Bozoki, Mike Atkinson:
Dynamic Test Selection Using Source Code Changes. 597-598 - Yoann Blein, Arnaud Clere, Fabrice Bertrand, Yves Ledru, Roland Groz, Lydie du Bousquet:
Improving Trace Generation and Analysis for Medical Devices. 599-600 - Fehmi Jaafar:
An Integrated Architecture for IoT Fingerprinting. 601-602 - Daniel Brahneborg, Wasif Afzal, Adnan Causevic:
A Black-Box Approach to Latency and Throughput Analysis. 603-604 - Dusan Mondek, Rudolf B. Blazek, Tomás Zahradnický:
Security Analytics in the Big Data Era. 605-606 - Pete Rotella, Sunita Chulani:
Software Release-Over-Release Comparisons. 607 - Pete Rotella, Sunita Chulani:
Comparing and Goaling Releases Using Software Reliability Classes. 608-609 - Zuohua Ding, Tiantian Shuai, Mingyue Jiang:
REConvertor: Transforming Textual Use Cases to High-Level Message Sequence Chart. 610-611 - Néstor Ruben Barraza:
A Mixed Poisson Process and Empirical Bayes Estimation Based Software Reliability Growth Model and Simulation. 612-613 - Yangzhen Fu, Hong Zhang, Chenchen Zeng, Chao Feng:
A Software Reliability Prediction Model: Using Improved Long Short Term Memory Network. 614-615 - Lu Kong, Jinbo Wang:
Verification Methods for Secure and Reliable SoPC Systems. 616-617 - Daniel Brahneborg, Wasif Afzal, Adnan Causevic:
A Pragmatic Perspective on Regression Testing Challenges. 618-619 - Fengjun Duan, Guanjun Wang:
Reliability Modeling of Two-Phase Gamma Degradation Process. 620-621 - Lena Feinbube, Lukas Pirl, Peter Tröger, Andreas Polze:
Software Fault Injection Campaign Generation for Cloud Infrastructures. 622-623 - Qiuying Li, Chao Zhang, Hong Zhang:
A New Software Reliability Model for Open Stochastic System Based on NHPP. 624-625 - Yuanxun Shao, Bin Liu, Guoqi Li, Ran Yan:
A Fault Diagnosis Expert System for Flight Control Software Based on SFMEA and SFTA. 626-627 - Richard Lipka:
Automated Generator for Complex and Realistic Test Data. 628-629 - Luping Chen, John H. R. May:
Theoretical Feasibility of Statistical Assurance of Programmable Systems Based on Simulation Tests. 630-631 - Biao Xu, Minyan Lu, Dajian Zhang:
A Software Security Case Developing Method Based on Hierarchical Argument Strategy. 632-633 - Fei Wang, Jun Ai, Jiaming Wang:
Empirical Study on the Correlation Between Software Structural Modifications and Its Fault-Proneness. 634-635 - Jianmin Wang, Xiaohua Wang, Yunyun Ma, Jinbo Wang:
Hierarchical Combination Design Method of Test Cases Based on Conditional Constraints. 636-637
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.