default search action
25th ISSRE 2014: Naples, Italy - Workshops
- 25th IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Naples, Italy, November 3-6, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-7377-4
Industry Sessions
Session 1: Testing 1
- Maryam Raiyat Aliabadi, Karthik Pattabiraman, Nematollah Bidokhti:
Soft-LLFI: A Comprehensive Framework for Software Fault Injection. 1-5 - Brian Atkinson, Nathan DeBardeleben, Qiang Guan, Robert W. Robey, William M. Jones:
Fault Injection Experiments with the CLAMR Hydrodynamics Mini-App. 6-9 - Fabio Baccanico, Gabriella Carrozza, Marcello Cinque, Domenico Cotroneo, Antonio Pecchia, Agostino Savignano:
Event Logging in an Industrial Development Process: Practices and Reengineering Challenges. 10-13
Session 2: Reliability Modeling 1
- Sathish Vallachira, Sithu D. Sudarsan, Srini Ramaswamy:
Event Based Robot Prognostics Using Principal Component Analysis. 14-17 - Ashlie B. Hocking, John C. Knight, M. Anthony Aiello, Shinichi Shiraishi:
Proving Model Equivalence in Model Based Design. 18-21 - Alberto Avritzer, Andre B. Bondi:
Developing Software Reliability Models in the Architecture Phase of the Software Lifecycle. 22-23
Session 3: Testing 2
- Joachim Froehlich, Reiner N. Schmid:
Architecture for a Hard-Real-Time System Enabling Non-intrusive Tests. 24 - Haihong Henry Zhu:
Handling Soft Error in Embedded Software for Networking System. 25-28 - Linn Gustavsson Christiernin, Svante Augustsson, Stefan Christiernin:
Safety Critical Robot Programming and Testing for Operations in Industrial Co-Production. 29-32
Session 4: Industry Best Paper Nominees
- Stefano Avallone, Gabriella Carrozza, Marcello Cinque, Raffaele Della Corte, Antonio Marotta, Antonio Pecchia, Agostino Savignano:
NAPOLI FUTURA: Novel Approaches for Protecting Critical Infrastructures from Cyber Attacks. 33-36 - Domenico Cotroneo, Luigi De Simone, Antonio Ken Iannillo, Anna Lanzaro, Roberto Natella, Jiang Fan, Ping Wang:
Network Function Virtualization: Challenges and Directions for Reliability Assurance. 37-42
Session 5: Availability and Performance
- Mohammadmajid Hormati, Ferhat Khendek, Maria Toeroe:
Towards an Evaluation Framework for Availability Solutions in the Cloud. 43-46 - Seshadhri Srinivasan, Furio Buonopane, Srini Ramaswamy, Juri Vain:
Verifying Response Times in Networked Automation Systems Using Jitter Bounds. 47-50 - Rekha Singhal, Manoj Nambiar, Harish Sukhwani, Kishor S. Trivedi:
Performability Comparison of Lustre and HDFS for MR Applications. 51
Session 6: Reliability Modeling 2
- Mudasir Ahmad:
Reliability Models for the Internet of Things: A Paradigm Shift. 52-59 - Pete Rotella, Sunita Chulani:
Predicting Release Quality. 60-61
Session 7: Model-Based Testing
- Myron Hecht, Emily Dimpfl, Julia Pinchak:
Automated Generation of Failure Modes and Effects Analysis from SysML Models. 62-65 - Gil Bernabeu, Eddie Jaffuel, Bruno Legeard, Fabien Peureux:
MBT for Global Platform Compliance Testing: Experience Report and Lessons Learned. 66-70
Session 8: Security
- Luca Recchia, Giuseppe Procopio, Andrea Onofrii, Francesco Rogo:
Security Evaluation of a Linux System: Common Criteria EAL4+ Certification Experience. 77-81
Session 9: Data Management and Analysis
- Luigi Buglione, Daniele Gagliardi, Sergio Oltolina, Gabriele Ruffatti, Ernesto Damiani, Fulvio Frati:
Balanced Measurement Sets: Criteria for Improving Project Management Practices. 82-85 - Ipadeola Abayomi, Ipadeola Oladipupo, Ahmed Ameen, Joseph Sadiku:
CAMDIT: A Toolkit for Integrating Heterogeneous Data for Enhanced Service Provisioning. 86-91 - Clauirton de Siebra, Antonio L. O. Cavalcanti, Fabio Q. B. da Silva, André L. M. Santos, Tatiana B. Gouveia:
Applying Metrics to Identify and Monitor Technical Debt Items during Software Evolution. 92-95
Session 10: Static Analysis
- Shinichi Shiraishi, Veena Mohan, Hemalatha Marimuthu:
Quantitative Evaluation of Static Analysis Tools. 96-99 - Salvatore Scervo, Stefano Rosati, Gabriella Carrozza:
Code Analysis as an Enabler for SW Quality Improvement: The SELEX ES SW Engineering Experience. 100-103 - Tukaram Muske:
Supporting Reviewing of Warnings in Presence of Shared Variables: Need and Effectiveness. 104-107
Session 11: Design and Planning
- Marcelo Teixeira, Richardson Ribeiro, Marco A. C. Barbosa, Luciene Marin:
A Formal Method Applied to the Automated Software Engineering with Quality Guarantees. 108-111 - Gianfrancesco Ranieri:
Planning of Prioritized Test Procedures in Large Integrated Systems: Best Strategy of Defect Discovery and Early Stop of Testing Session, The Selex-ES Experience. 112-113
Session 12: Avionics
- Vance Hilderman:
Understanding DO-178C Software Certification: Benefits Versus Costs. 114 - Andreas Löfwenmark, Simin Nadjm-Tehrani:
Challenges in Future Avionic Systems on Multi-Core Platforms. 115-119 - Pierre-Alain Bourdil, Bernard Berthomieu, Eric Jenn:
Model-Checking Real-Time Properties of an Auto Flight Control System Function. 120-123
Fast Abstracts
Fast Abstracts 1
- Saeko Matsuura, Yoshitaka Aoki, Shinpei Ogata:
Practical Behavioral Inconsistency Detection between Source Code and Specification Using Model Checking. 124-125 - Leonardo Mariani, Daniela Micucci, Fabrizio Pastore:
Early Conflict Detection with Mined Models. 126-127 - Jasmin Jahic, Thomas Kuhn:
Analysis of Functional Software Dependencies through Supervised Execution. 128-129 - Satoshi Fujimoto, Hideharu Kojima, Hiroyuki Nakagawa, Tatsuhiro Tsuchiya:
Applying Parameter Value Weighting to a Practical Application. 130-131 - Passant Kandil, Sherin M. Moussa, Nagwa L. Badr:
Regression Testing Approach for Large-Scale Systems. 132-133 - Chia Hung Kao, Ping-Hsien Chi, Yi-Hsuan Lee:
Automatic Testing Framework for Virtualization Environment. 134-135
Fast Abstracts 2
- Paulo Victor R. de Carvalho:
Mapping the Software Errors and Effects Analysis Method to ISO26262 Requirements for Software Architecture Analysis. 136-137 - Jianwen Xiang, Fumio Machida, Kumiko Tadano, Shigeru Hosono:
Is Cut Sequence Necessary in Dynamic Fault Trees? 138-139 - Maximilian Junker:
Exploiting Behavior Models for Availability Analysis of Interactive Systems. 140-141 - Marc Forster:
Evaluating Embedded-Software Specifications - Quantitative and Structured Assessment of Declarative Interface Descriptions. 142-143 - Omar Hussain Alhazmi, Yashwant K. Malaiya:
Are the Classical Disaster Recovery Tiers Still Applicable Today? 144-145
Student Papers
- Satoko Kinoshita, Hidekazu Nishimura, Hiroki Takamura, Daichi Mizuguchi:
Describing Software Specification by Combining SysML with the B Method. 146-151 - Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, Wei Dong:
A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems. 152-155 - Luigi De Simone:
Towards Fault Propagation Analysis in Cloud Computing Ecosystems. 156-161 - Nuno Silva, Marco Vieira:
Towards Making Safety-Critical Systems Safer: Learning from Mistakes. 162-167 - Luis Eduardo Santos, Marília Curado, Marco Vieira:
A Research Agenda for Benchmarking the Resilience of Software Defined Networks. 168-173 - Nobuo Kikuchi, Takeshi Yoshimura, Ryo Sakuma, Kenji Kono:
Do Injected Faults Cause Real Failures? A Case Study of Linux. 174-179
ASSURE 2014 - Second International Workshop on Assurance Cases for Software-Intensive Systems
Session 1: Principles and Techniques
- Valentin Cassano, T. S. E. Maibaum:
The Definition and Assessment of a Safety Argument. 180-185 - Robin E. Bloomfield, Kateryna Netkachova:
Building Blocks for Assurance Cases. 186-191 - Kenji Taguchi, Daisuke Souma, Hideaki Nishihara, Toshinori Takai:
Linking Traceability with GSN. 192-197 - Khana Chindamaikul, Toshinori Takai, Hajimu Iida:
Retrieving Information from a Document Repository for Constructing Assurance Cases. 198-203
Session 2: Processes and Tools
- Barbara Gallina:
A Model-Driven Safety Certification Method for Process Compliance. 204-209 - Junbeom Yoo, Jong-Gyun Choi, Young-Jun Lee, Jang-Soo Lee:
A Technique for Demonstrating Safety and Correctness of Program Translators: Strategy and Case Study. 210-215 - M. Anthony Aiello, Ashlie B. Hocking, John C. Knight, Jonathan C. Rowanhill:
SCT: A Safety Case Toolkit. 216-219
Session 3: Applications
- Anita Finnegan, Fergal McCaffery:
A Security Argument Pattern for Medical Device Assurance Cases. 220-225 - Ashlie B. Hocking, John C. Knight, M. Anthony Aiello, Shinichi Shiraishi:
Arguing Software Compliance with ISO 26262. 226-231
IWPD 2014 - The Fifth IEEE International Workshop on Program Debugging
Session 1: Event Set and Trace Reduction
- Hanefi Mercan, Cemal Yilmaz:
Pinpointing Failure Inducing Event Orderings. 232-237 - Teemu Kanstrén, Marsha Chechik:
Trace Reduction and Pattern Analysis to Assist Debugging in Model-Based Testing. 238-243
Session 2: Panel Discussion
- W. Eric Wong:
Program Debugging: Research and Practice. 244
Session 3: Debugging with Support for Reliability, Static Analysis, and Temporal Assertions
- Wafa Jaffal, Jeff Tian:
Defect Analysis and Reliability Assessment for Transactional Web Applications. 245-250 - Qian Wang, Dahai Jin, Yunzhan Gong:
A Memory Model Based on Three-Valued Matrix for Static Defect Detection. 251-256 - Ziad A. Al-Sharif, Clinton L. Jeffery, Mahmoud H. Said:
Debugging with Dynamic Temporal Assertions. 257-262
Session 4: Quality and Applicability of Debugging and Fault Localization
- Birgit Hofer:
Spectrum-Based Fault Localization for Spreadsheets: Influence of Correct Output Cells on the Fault Localization Quality. 263-268 - Benjamin Siegmund, Michael Perscheid, Marcel Taeumel, Robert Hirschfeld:
Studying the Advancement in Debugging Practice of Professional Software Developers. 269-274
RISK 2014 - Second International Workshop on Risk Assessment and Risk-Driven Testing
Session 1: Risk Analysis and Assessment
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin:
Evaluation of Risk for Complex Systems Using Attack Surface. 275-280 - Samson Yoseph Esayas:
Structuring Compliance Risk Identification Using the CORAS Approach: Compliance as an Asset. 281-286 - Barbara Gallina, Edin Sefer, Atle Refsdal:
Towards Safety Risk Assessment of Socio-Technical Systems via Failure Logic Analysis. 287-292
Session 2: Risk Management
- Johannes Viehmann:
Risk Management for Outsourcing to the Cloud: Security Risks and Safeguards as Selection Criteria for Extern Cloud Services. 293-295 - Arthur-Jozsef Molnar, Jürgen Großmann:
CRSTIP - An Assessment Scheme for Security Assessment Processes. 296-298
Session 3: Risk Modeling and Risk-Based Testing
- Wolfgang Herzner, Sven Sieverding, Omar Kacimi, Eckard Böde, Thomas Bauer, Brian Nielsen:
Expressing Best Practices in (Risk) Analysis and Testing of Safety-Critical Systems Using Patterns. 299-304 - Gencer Erdogan, Atle Refsdal, Ketil Stølen:
Schematic Generation of English-Prose Semantics for a Risk Analysis Language Based on UML Interactions. 305-310 - Shaukat Ali, Tao Yue, Andreas Hoffmann, Marc-Florian Wendland, Alessandra Bagnato, Etienne Brosse, Markus Schacher, Zhen Ru Dai:
How Does the UML Testing Profile Support Risk-Based Testing. 311-316
RSDA 2014 - Second IEEE International Workshop on Reliability and Security Data Analysis
Session 1: Vulnerability Analysis
- Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan:
Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes. 317-322 - Jeffrey Stuckman, James Purtilo:
Mining Security Vulnerabilities from Linux Distribution Metadata. 323-328
Session 2: Security Data Mining
- Carlo Schäfer:
Detection of Compromised Email Accounts Used by a Spam Botnet with Country Counting and Theoretical Geographical Travelling Speed Extracted from Metadata. 329-334 - Andrea Paudice, Santonu Sarkar, Domenico Cotroneo:
An Experiment with Conceptual Clustering for the Analysis of Security Alerts. 335-340
Session 3: Data-Driven Analysis
- Xin Chen, Charng-Da Lu, Karthik Pattabiraman:
Failure Prediction of Jobs in Compute Clouds: A Google Cluster Case Study. 341-346 - Cagatay Turkay, Stephen Mason, Ilir Gashi, Bojan Cukic:
Supporting Decision-Making for Biometric System Deployment through Visual Analysis. 347-352 - João Matos, Nuno Coração, João Garcia:
Record and Replay GUI-Based Applications with Less Overhead. 353-358
Session 4: Secure and Reliable Design
- Stefano Rosiello, Amish Choudhary, Arpan Roy, Rajeshwari Ganesan:
Combining Black Box Testing with White Box Code Analysis: A Heterogeneous Approach for Testing Enterprise SaaS Applications. 359-364 - Peter T. Breuer, Jonathan P. Bowen:
Avoiding Hardware Aliasing: Verifying RISC Machine and Assembly Code for Encrypted Computing. 365-370 - Ingo Stierand, Sunil Malipatlolla, Sibylle B. Fröschle, Alexander Stühring, Stefan Henkler:
Integrating the Security Aspect into Design Space Exploration of Embedded Systems. 371-376 - Anna Kobusinska, Jerzy Brzezinski:
On the Equivalence of SOA Rollback-Recovery Consistency Models. 377-382
Session 5: Anomaly Detection
- Flavio Frattini, Santonu Sarkar, Jyotiska Nath Khasnabish, Stefano Russo:
Using Invariants for Anomaly Detection: The Case Study of a SaaS Application. 383-388
Session 6: Internet Threats and Countermeasures
- Andrea Di Florio, Nino Vincenzo Verde, Antonio Villani, Domenico Vitali, Luigi Vincenzo Mancini:
Bypassing Censorship: A Proven Tool against the Recent Internet Censorship in Turkey. 389-394 - Miranda Mowbray, Josiah Hagen:
Finding Domain-Generation Algorithms by Looking at Length Distribution. 395-400 - Wim Mees, Thibault Debatty:
Multi-agent System for APT Detection. 401-406 - Cesario Di Sarno, Alessia Garofalo, Gianfranco Cerullo, Nadir Murru, Felicita Di Giandomenico, Silvano Chiaradonna:
Power Grid Outlier Treatment through Kalman Filter. 407-412
WoSAR 2014 - The Sixth International Workshop on Software Aging and Rejuvenation
Keynote 1
- Antonio Puliafito:
Software Rejuvenation in Cloud Systems. 413
Session 1: Rejuvenation Planning
- Eitan Altman, Alberto Avritzer, Rachid El Azouzi, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar:
Rejuvenation and the Spread of Epidemics in General Topologies. 414-419 - Qiushi Wang, Katinka Wolter:
Detection and Analysis of Performance Deterioration in Mobile Offloading System. 420-425 - Jing Zhao, Yanbin Wang, Gao-Rong Ning, Cheng-Hong Wang, Kishor S. Trivedi, Kai-Yuan Cai, Zhenyu Zhang:
Software Maintenance Optimization Based on Stackelberg Game Methods. 426-430
Keynote 2
- Stefano Russo:
The Dual Nature of Software Aging: Twenty Years of Software Aging Research. 431-432
Session 2: Aging Analysis and Mitigation
- Domenico Cotroneo, Roberto Natella:
Towards Patching Memory Leak Bugs in Off-The-Shelf Software. 433-436 - Yongquan Yan, Ping Guo, Lifeng Liu:
A Novel Hybridization of Artificial Neural Networks and ARIMA Models for Forecasting Resource Consumption in an IIS Web Server. 437-442 - Yongquan Yan, Ping Guo, Lifeng Liu:
A Practice of Forecasting Software Aging in an IIS Web Server Using SVM. 443-448 - Maurizio Leotta, Andrea Stocco, Filippo Ricca, Paolo Tonella:
Reducing Web Test Cases Aging by Means of Robust XPath Locators. 449-454
WOSD 2014 - The Fourth Workshop on Open Systems Dependability
Session 1: Evolution of Assurance
- Shuichiro Yamamoto, Shuji Morisaki:
An Evaluation of Assuring Test Case Sufficiency Using a D-Case Pattern. 455-460 - Toshinori Takai, Hiroyuki Kido:
A Supplemental Notation of GSN Aiming for Dealing with Changes of Assurance Cases. 461-466
Session 2: Management of Open Systems Dependability
- Jelena Frtunikj, Michael Armbruster, Alois C. Knoll:
Run-Time Adaptive Error and State Management for Open Automotive Systems. 467-472 - Ling Fang, Guoqiang Li, Yingjie You, Chaobin Chen, Liqin Hu:
Toward SIL Evaluation for a Resilience Strategy. 473-477 - V. B. Singh, Meera Sharma:
Prediction of the Complexity of Code Changes Based on Number of Open bugs, New Feature and Feature Improvement. 478-483
WoSoCer 2014 - Fourth IEEE International Workshop on Software Certification
Invited Talk
- Lorenzo Strigini:
Assessment Techniques, Certification and [What Else We Need for] Confidence in Software. 484
Session 1: Certification Arguments
- Silviya Grigorova, T. S. E. Maibaum:
Argument Evaluation in the Context of Assurance Case Confidence Modeling. 485-490
Session 2: Automotive Certification
- Cristiana Areias, João Carlos Cunha, Davide Iacono, Francesco Rossi:
Towards Certification of Automotive Software. 491-496 - Giuseppe Lami, Fabio Falcini:
Automotive SPICE Assessments in Safety-Critical Contexts: An Experience Report. 497-502 - Morayo Adedjouma, Hao Hu:
Process Model Tailoring and Assessment for Automotive Certification Objectives. 503-508
Session 3: Certification Processes
- Ricardo J. Rodríguez, Sasikumar Punnekkat:
Cost Optimisation in Certification of Software Product Lines. 509-514 - Nermin Kajtazovic, Andrea Höller, Tobias Rauter, Christian Kreiner:
Reducing Certification Costs through Assured Dynamic Software Configuration. 515-520 - Nicola Nostro, Andrea Bondavalli, Nuno Silva:
Adding Security Concerns to Safety Critical Certification. 521-526
Session 4: Tools for Dependability and Certifiability Assessment
- Fredrik Warg, Benjamin Vedder, Martin A. Skoglund, Andreas Söderberg:
Safety ADD: A Tool for Safety-Contract Based Design. 527-529 - Domenico Cotroneo, Luigi De Simone, Antonio Ken Iannillo, Anna Lanzaro, Roberto Natella:
Improving Usability of Fault Injection. 530-532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.