default search action
32nd ISSRE 2021: Wuhan, China - Workshops
- IEEE International Symposium on Software Reliability Engineering, ISSRE 2021 - Workshops, Wuhan, China, October 25-28, 2021. IEEE 2021, ISBN 978-1-6654-2603-9
- Mengting Liang, Dimeng Li, Bin Xu, Dongdong Zhao, Xiao Yu, Jianwen Xiang:
Within-Project Software Aging Defect Prediction Based on Active Learning. 1-8 - András Földvári, András Pataricza:
Semi-automated model extraction from observations for dependability analysis. 1-6 - Wanrong Ouyang, Baojian Hua:
RusBox: Towards Efficient and Adaptive Sandboxing for Rust. 1-2 - Junjun Zheng, Hiroyuki Okamura, Tadashi Dohi:
Sensitivity Analysis of Software Rejuvenation Model with Markov Regenerative Process. 9-16 - Ricardo M. Czekster, Alberto Avritzer, Daniel Sadoc Menasché:
Aging and Rejuvenation Models of Load Changing Attacks in Micro-Grids. 17-24 - Lydia Gauerhof, Roman Gansch, Christian Heinzemann, Matthias Woehrle, Andreas Heyl:
On the Necessity of Explicit Artifact Links in Safety Assurance Cases for Machine Learning. 23-28 - Jacopo Parri, Samuele Sampietro, Leonardo Scommegna, Enrico Vicario:
Evaluation of software aging in component-based Web Applications subject to soft errors over time. 25-32 - Ermeson Carneiro de Andrade, Fumio Machida, Roberto Pietrantuono, Domenico Cotroneo:
Memory Degradation Analysis in Private and Public Cloud Environments. 33-39 - José Flora, Paulo Gonçalves, Miguel Teixeira, Nuno Antunes:
My Services Got Old! Can Kubernetes Handle the Aging of Microservices? 40-47 - Lukas Beierlieb, Alberto Avritzer, Lukas Iffländer, Nuno Antunes, Aleksandar Milenkoski, Samuel Kounev:
Software Testing Strategies for Detecting Hypercall Handlers' Aging-related Bugs. 48-55 - André Sarkis, Johnny Cardoso Marques, Luiz Alberto Vieira Dias:
Recommendations for the Usage of Design Models in Aviation Software. 56-63 - Abraham Chan, Udit Kumar Agarwal, Karthik Pattabiraman:
(WiP) LLTFI: Low-Level Tensor Fault Injector. 64-68 - Vincent Tan, Carmen Cheh, Binbin Chen:
From Application Security Verification Standard (ASVS) to Regulation Compliance: A Case Study in Financial Services Sector. 69-76 - Fuqun Huang:
Software Requirement Criteria based on Human Errors. 77-82 - Jinfu Chen, Jingyi Chen, Saihua Cai, Haibo Chen, Chi Zhang, Chuangfei Huang:
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing. 83-90 - Jinfu Chen, Jiaping Xu, Saihua Cai, Xiaoli Wang, Yuechao Gu, Shuhui Wang:
An efficient dual ensemble software defect prediction method with neural network. 91-98 - Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen:
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity. 105-110 - Irena Bojanova, Carlos Eduardo Galhardo, Sara Moshtari:
Input/Output Check Bugs Taxonomy: Injection Errors in Spotlight. 111-120 - Setareh Majidi, Roman Obermaisser:
Genetic Algorithm for Scheduling Communication Networks in Time-Triggered Systems-of-Systems. 121-128 - Emanuele De Angelis, Alessandro Pellegrini, Maurizio Proietti:
Automatic Extraction of Behavioral Features for Test Program Similarity Analysis. 129-136 - Luciano Baresi, Kostandin Caushi:
IDEA: Runtime Collection of Android Data. 137-143 - Gianluca Filippone, Marco Autili, Fabrizio Rossi, Massimo Tivoli:
Migration of Monoliths through the Synthesis of Microservices using Combinatorial Optimization. 144-147 - Shuncheng Tang, Zhenya Zhang, Jia Tang, Lei Ma, Yinxing Xue:
Issue Categorization and Analysis of an Open-Source Driving Assistant System. 148-153 - Wenqiang Zheng, Yan-Fu Li:
MC-FGSM: Black-box Adversarial Attack for Deep Learning System. 154-159 - Lulu Jia, Dezhen Yang, Yi Ren, Cheng Qian, Zhifeng Li:
Semantic Learning and Understanding of multivehicle interaction patterns Using Primitive Driving Patterns With Bayesian Nonparametric Approaches. 160-165 - Bastian Kruck, Peter Munk, Daniel Angermeier:
Safe and Secure: Mutually Supporting Safety and Security Analyses with Model-Based Suggestions. 172-181 - Piaoyi Liu, Siwei Zhou, Luyao Ye, Dongdong Zhao, Jianwen Xiang:
A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND Gates. 182-188 - Wanrong Ouyang, Baojian Hua:
$^{\prime}\mathbf{R}$: Towards Detecting and Understanding Code-Document Violations in Rust. 189-197 - Xinying Liu, Jianhui Jiang, Long Li:
Computation Offloading and Task Scheduling with Fault-Tolerance for Minimizing Redundancy in Edge Computing. 198-209 - Chuanli Wu, Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jing Tian, Jianwen Xiang:
Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component Relevancy. 210-217 - Xiaoyu Wu, Zheng Hu, Ke Pei, Liyan Song, Zhi Cao, Shuyi Zhang:
Methods for deep learning model failure detection and model adaption: A survey. 218-223 - Siyu Yu, Ningjiang Chen, Birui Liang:
Predicting gray fault based on context graph in container-based cloud. 224-234 - Yang Zheng, Zhenye Feng, Zheng Hu, Ke Pei:
MindFI: A Fault Injection Tool for Reliability Assessment of MindSpore Applicacions. 235-238 - Xu Liu, Honghui Li, Rui Wang, Zhouxian Jiang:
Important-unit Coverage for Recurrent Neural Network. 245-249 - Zhitao Wu, Xiaoming Yang, Ping Chen, Zongshun Qu, Jun Lin:
Multi-Scale Software Network Model for Software Safety of the Intended Functionality. 250-255 - Jiajun Zhao, Qiuzhen Lin, Junkai Ji:
Network Intrusion Detection by an Approximate Logic Neural Model. 256-261 - Min Liu, Guodong Ye, Qiuzhen Lin:
Meaningful color image encryption algorithm based on compressive sensing and chaotic map. 262-265 - Wei Zheng, Liangbo Hou, Junming Yu, Fei Chen:
Detection of IoT Devices That Mine Cryptocurrency. 266-271 - Yuanzhi Liang, Lei Wang, Siran Li, Bo Jiang:
Rustpi: A Rust-powered Reliable Micro-kernel Operating System. 272-273 - Fuqun Huang, Henrique Madeira:
Targeted Code Inspection based on Human Errors. 274-275 - Yutaka Matsuno, Yoriyuki Yamagata, Hideaki Nishihara, Yuichiro Hosokawa:
Assurance Carrying Code for Software Supply Chain. 276-277 - Wenchu Xu, Yanran Ma:
A Static Analysis Framework for Detecting Bugs in Introductory Programs. 278-279 - Zhen Wang, Zhen Zhang, Jianhui Jiang:
Multi-Feature Fusion based Image Steganography using GAN. 280-281 - Kai Lin, Chuanqi Tao, Zhiqiu Huang:
Exception Handling Recommendation Based on Self-Attention Network. 282-283 - Naoko Imai, Hironori Washizaki, Naohiko Tsuda, Yoshiaki Fukazawa:
When is Continuous Integration Useful? Empirical Study on Team Size and Reporters in Development. 284-285 - Marco Barletta, Marcello Cinque, Raffaele Della Corte:
Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems. 286-287 - Qinqin Wu, Hao Huang, Yi Tang, Zhenwei Gu, Ang Jia:
SourceSnippet2Binary: A Method for Searching Vulnerable Source Code Snippets in Binaries. 288-289 - Marek R. Ogiela, Lidia Ogiela:
Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols. 290-291 - Katarzyna Koptyra, Marek R. Ogiela:
Information Hiding using Bucket Steganography. 292-293 - Ulas Yüksel, Hasan Sözer:
Dynamic Filtering and Prioritization of Static Code Analysis Alerts. 294-295 - Kangjin Wang, Ying Li:
ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference. 296-297 - Saikath Bhattacharya, Munindar P. Singh, Laurie A. Williams:
Software Security Readiness and Deployment. 298-299 - Jinjian Luo, Meixi Liu, Yunlai Luo, Zhenbang Chen, Yufeng Zhang:
A Runtime Monitoring Based Fuzzing Framework for Temporal Properties. 300-301 - Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Online Log Parsing: Preliminary Literature Review. 304-305 - Maria Laura Brzezinski Meyer:
TSAI - Test Selection using Artificial Intelligence for the Support of Continuous Integration. 306-309 - Bo Zhang:
Mining Numerical Relations for Improving Software Reliability. 310-313 - Vittorio Orbinato:
A next-generation platform for Cyber Range-as-a-Service. 314-318 - Jomar Domingos:
Failure Prediction for Cloud Applications through Ensemble Learning. 319-322 - Fang Yan:
Generation and Verification of Executable Assurance Case by Model-based Engineering. 323-326 - Monika Maidl, Dirk Kröselberg, Tiange Zhao, Tobias Limmer:
System-specific risk rating of software vulnerabilities in industrial automation & control systems. 327-332 - Ekaterina Blech, Andrey Grishchenko, Ivan Kniazkov, Guangtai Liang, Oleg Serebrennikov, Andrei Tatarnikov, Polina Volkhontseva, Kuzma Yakimets:
Patternika: A Pattern-Mining-Based Tool For Automatic Library Migration. 333-338 - Kumi Jinzenji, Akio Jin, Tatsuya Muramoto:
Innovation evaluation framework using state transition probability of the product. 339-344 - Luigi Coppolino, Salvatore D'Antonio, Giovanni Mazzeo, Luigi Romano, Irene Bonetti, Elena Spagnuolo:
The protection of LP-WAN Endpoints via TEE: a Chemical Storage Case Study. 345-352 - Joritz Galarraga, Aitor Arrieta Marcos, Shaukat Ali, Goiuria Sagardui, Maite Arratibel:
Genetic Algorithm-based Testing of Industrial Elevators under Passenger Uncertainty. 353-358 - Xu Duan, Jingzheng Wu, Mengnan Du, Tianyue Luo, Mutian Yang, Yanjun Wu:
MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning. 359-364 - Andrey Kuleshov, Petr Trifanov, Vladislav Frolov, Guangtai Liang:
Diktat: Lightweight Static Analysis for Kotlin. 365-370 - Lama J. Moukahal, Mohammad Zulkernine, Martin Soukup:
Towards a Secure Software Lifecycle for Autonomous Vehicles. 371-377 - Catello Di Martino, Anwar Walid:
Continuous Testing and SLA Management of 5G Networks for Industrial Automation. 378-386 - Zhisheng Hu, Shengjian Guo, Zhenyu Zhong, Kang Li:
Disclosing the Fragility Problem of Virtual Safety Testing for Autonomous Driving Systems. 387-392 - Yuta Akiya, Kyle Thomas Le, Megan Luong, Justin C. Wilson, Anas Salah Eddin, Valerio Formicola, Mohamed El-Hadedy:
SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems. 393-398 - Yang Zhang, Chaoshuai Li, Shuai Shao:
ReSwitcher: Automatically Refactoring Java Programs for Switch Expression. 399-400 - Marie Farrell, Matt Luckcuck, Laura Pullum, Michael Fisher, Ali Hessami, Danit Gal, Zvikomborero Murahwi, Ken R. Wallace:
Evolution of the IEEE P7009 Standard: Towards Fail-Safe Design of Autonomous Systems. 401-406 - Senecca Miller, Travis Siems, Vidroha Debroy:
Kubernetes for Cloud Container Orchestration Versus Containers as a Service (CaaS): Practical Insights. 407-408 - Ishan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia:
Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers. 409-414 - Yi Wang, Yang Feng, Min Zhang, Pu Sun:
The Necessity of Low-code Engineering for Industrial Software Development: A Case Study and Reflections. 415-420 - Anas Nadeem, Muhammad Usman Sarwar, Muhammad Zubair Malik:
Automatic Issue Classifier: A Transfer Learning Framework for Classifying Issue Reports. 421-426 - Chengbo Zhang, Ying Li, Yong Yang, Tong Jia, Zhirong Hou:
How Far Have We Come in Fault Tolerance for Distributed Graph Processing: A Quantitative Assessment of Fault Tolerance Effectiveness. 427-432 - Yuming Wu, Nishok Narasimha Mohanasamy, Lalita Jagadeesan, Muntasir Raihan Rahman:
Changes in Intent: Behavioral Predictions of Distributed SDN Controller Reconfiguration. 433-438
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.