default search action
QRS 2018: Lisbon, Portugal - Companion
- 2018 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS Companion 2018, Lisbon, Portugal, July 16-20, 2018. IEEE 2018, ISBN 978-1-5386-7839-8
Invited Talk
- Wei-Tek Tsai, Lian Yu:
Lessons Learned from Developing Permissioned Blockchains. 1-10
Industry Track
- Jitendra Aggarwal, Tran Nguyen, Piyush Kumar Gupta:
DFT+Emulation - A Faster Way to Close Verification. 11-12 - Shannon Burns Conners, Joseph Morgan:
Using Software Development Artifacts to Improve the Software Development Process. 13
Automated Intelligent Software Testing
- Xinghan Zhao, Xiangfei Gao:
An AI Software Test Method Based on Scene Deductive Approach. 14-20 - Chaonian Guo, Shaomin Zhu, Tongsen Wang, Hao Wang:
FeT: Hybrid Cloud-Based Mobile Bank Application Testing. 21-26 - Yiwen Yang, Jun Ai, Fei Wang:
Defect Prediction Based on the Characteristics of Multilayer Structure of Software Network. 27-34 - Yunqiang Yan, Yanhong Peng, Chang Liu, Haifeng Li:
A New Software Reliability Evaluation Model Based on the Probability of the Failure Mode. 35-41 - Jin-lei Sun, Shi-wen Zhang, Song Huang, Zhanwei Hui:
Design and Application of a Sikuli Based Capture-Replay Tool. 42-44 - Feng Gao, Fei Deng, Yuanqiang Yan, Chunlei Li:
Full Digital Simulation Testing of Networked Embedded Software. 45-50 - Xinyu Han, Nan Zhang, Wei He, Kai Zhang, Longli Tang:
Automated Warship Software Testing System Based on LoadRunner Automation API. 51-55 - Zijie Li, Lanfei Yan, Yuzhen Liu, Zhenyu Zhang, Bo Jiang:
MURE: Making Use of MUtations to REfine Spectrum-Based Fault Localization. 56-63 - Nan Zhang, Haiyan Chai, Xinyu Han:
Research on the Reuse of Test Case for Warship Equipment Software. 64-69 - Chao Jiang, Song Huang, Zhanwei Hui:
Metamorphic Testing of Image Region Growth Programs in Image Processing Applications. 70-72 - Lijin Wu, Wei He, Bojiang Liu, Xinyu Han, Longli Tang:
Scenario-Based Software Reliability Testing and Evaluation of Complex Information Systems. 73-78 - Qingjie Wei, Yijin Li, Yuheng Zhang:
A New Method of Evolutionary Testing for Path Coverage. 79-86 - Yuan Chen, Anbang Wang, Junjie Wang, Luo Liu, Yuanzhang Song, Qinghua Ha:
Automatic Test Transition Paths Generation Approach from EFSM Using State Tree. 87-93 - Yusong Chen, Jianguang Chen, Yang Gao, Dongfeng Chen, Yuming Tang:
Research on Software Failure Analysis and Quality Management Model. 94-99 - Tariq M. King, Dionny Santiago, Justin Phillips, Peter J. Clarke:
Towards a Bayesian Network Model for Predicting Flaky Automated Tests. 100-107 - Weijun Shen, Jun Wan, Zhenyu Chen:
MuNN: Mutation Analysis of Neural Networks. 108-115 - Ryan Lekivetz, Joseph Morgan:
Fault Localization: Analyzing Covering Arrays Given Prior Information. 116-121
Blockchain, Smart Contracts, and Digital Society
- Anamika Chauhan, Om Prakash Malviya, Madhav Verma, Tejinder Singh Mor:
Blockchain and Scalability. 122-128 - Kimmo Halunen, Visa Antero Vallivaara, Anni Karinsalo:
On the Similarities between Blockchains and Merkle-Damgård Hash Functions. 129-134 - Anni Karinsalo, Kimmo Halunen:
Smart Contracts for a Mobility-as-a-Service Ecosystem. 135-138 - Kan Luo, Wei Yu, Muhammad Amjad Hafiz, Siyuan Wang, Linchao Gao, Kai Hu:
A Multiple Blockchains Architecture on Inter-Blockchain Communication. 139-145 - Michele Amoretti, Giacomo Brambilla, Francesco Medioli, Francesco Zanichelli:
Blockchain-Based Proof of Location. 146-153 - Wei-Tek Tsai, Enyan Deng, Xiaoqiang Ding, Jie Li:
Application of Blockchain to Trade Clearing. 154-163
Human and Social Aspects of Software Quality
- Cong Pan, Minyan Lu, Hong Zhang, Biao Xu:
Qualitative Software Reliability Requirements: Concept, Classification and Practical Elicitation Methods. 164-171 - Yu Zheng, Song Huang, Zhanwei Hui, Yaning Wu:
A Method of Optimizing Multi-Locators Based on Machine Learning. 172-174 - Zemin Qin, Tieke He, Hao Lian, Yuanhan Tian, Jia Liu:
Research on Judicial Data Standard. 175-177 - Hao Lian, Tieke He, Zemin Qin, Haoyu Li, Jia Liu:
Research on the Information Quality Measurement of Judicial Documents. 178-181
Quality-Oriented Engineering
- Jingwei Shang, Ping Chen, Qiang Wang, Liewen Lu:
Information System Reliability Quantitative Assessment Method and Engineering Application. 182-186 - Emad Badawi, Khaled El-Fakih, Gerassimos D. Barlas:
GPU and Multiprocessing Parallel Implementations for the Elimination of Finite State Machine Mutants. 187-198 - Sohon Roy, Arie van Deursen, Felienne Hermans:
On the Effectiveness of Automatically Inferred Invariants in Detecting Regression Faults in Spreadsheets. 199-206 - Sahar Tahvili, Marcus Ahlberg, Eric Fornander, Wasif Afzal, Mehrdad Saadatmand, Markus Bohlin, Mahdi Sarabi:
Functional Dependency Detection for Integration Test Cases. 207-214 - Hao Lan, Yin Tong, Jin Guo, Yadong Zhang, Yao Li, Chang Rao:
A Test Path Generation Method Based on SSM Models. 215-220 - Anping He, Lvying Yu, Haitao Zhang, Lian Li, Jinzhao Wu:
A FPGA Based SAT Solver with High Random and Concurrent Strategies. 221-228 - Seher Razzaq, Yan-Fu Li, Chu-Ti Lin, Min Xie:
A Study of the Extraction of Bug Judgment and Correction Times from Open Source Software Bug Logs. 229-234 - Renya He, Longli Tang, Xinyu Han, Wei He, Zehui Zhao:
Software Component Reliability Evaluation Method Based on Characteristic Parameters. 235-241 - Ana Turlea, Florentin Ipate, Raluca Lefticaru:
Generating Complex Paths for Testing from an EFSM. 242-249 - Xiaodong Gou, Chong Bian, Fuping Zeng, Qingyang Xu, Wencai Wang, Shunkun Yang:
A Data-Driven Smart Fault Diagnosis Method for Electric Motor. 250-257 - Shengqi Guo, Min Huang:
Simulation Design of Shop Material Supply Based on Queuing Theory. 258-263 - Lan Liu, Jun Lin, Qiang Wang, Xiaoping Xu:
Research on Network Malicious Code Detection and Provenance Tracking in Future Network. 264-268
Reliability and Resilience of Complex Systems
- Yue Liu, Xiaoyang Li, Lianghua Xiao:
Service Oriented Resilience Strategy for Cloud Data Center. 269-274 - Qiang Dong, Chong Jin, Ruiying Li, Rui Kang:
How Does Node Resilience Effect on Complex Networks? 275-280 - Vaughn H. Standley, Edward A. Boucheron:
Space-Based Unidirectional Networks and Resiliency. 281-286 - Dong Lyu, Shubin Si:
Dynamic Importance Measure for K-out-of-n System in Presence of Dependent Failure. 287-293 - Yin Lu, Yunwei Dong, Xiaomin Wei, Mingrui Xiao:
A Hybrid Method of Redundancy System Reliability Analysis Based on AADL Models. 294-300 - Yongqiang Zhang, Hong Zhang, Cong Pan, Chao Feng:
Construction of User Concurrent Profile Based on Usage Logs. 301-307
Software Engineering and Knowledge Management
- Shiyi Kong, Minyan Lu, Luyi Li:
Tracing Error Propagation in C/C++ Applications. 308-315 - Xing Liu, Panwen Liu, Xin Yan, Chengming Zou, Ruoshi Xia, Haiying Zhou, Kun Mean Hou, Christophe de Vaulx:
Energy Optimization and Fault Tolerance to Embedded System Based on Adaptive Heterogeneous Multi-Core Hardware Architecture. 316-323 - Lili Rong, Kesheng Yan, Jingwen Zhang:
Optimum Post-Disruption Restoration Plan of Interdependent Critical Infrastructures. 324-331 - Jiangning Wu, Lingyu Du, Yanzhong Dang:
Research on the Impact of Consumer Review Sentiments from Different Websites on Product Sales. 332-338 - Shanmuganathan Vasanthapriyan:
A Study of Software Testing Practices in Sri Lankan Software Companies. 339-344 - Erqing Li, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang, Yueying He, Jin Wang, Jiangning Wu:
Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy. 345-352
System Reliability in Cloud Computing and Big Data
- Bang-An Tong, Xiaoyang Li, Lianghua Xiao:
Service Reliability Oriented Modeling for the Failure of Cloud Data Center. 353-357 - Christopher B. Hauser, Jörg Domaschka, Stefan Wesner:
Predictability of Resource Intensive Big Data and HPC Jobs in Cloud Data Centres. 358-365 - Yong Wang, Jun Li, Nan Yan, Weiwei Li, Yong Li, Sanming Liu:
Bug Patterns Localization Based on Topic Model for Bugs in Program Loop. 366-370 - Haiqing Wang, Peng Sun:
Task Resource Planning and Verification Method Based on Intelligent Planning. 371-376 - Peng Sun, Xiaochuang Tang, Liang Luo:
An Unsupervised Parameter Grouping Algorithm for Combinatorial Testing. 377-381
Security, Reliability, and Resilience in Wireless Sensor Networks and Smart Grid
- Yang Liu, Qingping Shi, Xiaotao Yan, Heng Zhang, Hang Yi, Weiqiang Xia, Hongwei Ma, Jian Kang:
Research on Abnormal Behavior Detection Technology of Launch Vehicle Controlled Network. 382-387 - Yong Wang, Jiahe Cui, Tao Zhang, Jing Yang, Jianpei Zhang:
A Complex Network Evolution Model Based on Microscopic Characteristic of Nodes. 388-393 - Ye Yuan, Shouzheng Li, Xingjian Zhang, Jianguo Sun:
A Comparative Analysis of SVM, Naive Bayes and GBDT for Data Faults Detection in WSNs. 394-399 - Hanqi Yin, Zhiming Yin, Yang Yang, Jianguo Sun:
Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm. 400-405 - Jianguo Sun, Duo Liu, Yiqi Shi, Ye Yuan, Yang Yang:
Industrial Wireless Sensor Network Topology Non-Uniform Node Optimization Deployment. 406-413 - Yuan Ren, Shuyu He, Pengyu Hu, Jianguo Sun:
Research on Cross-Layer Optimization of Smart Grid Demand Side Based on WSNs. 414-420 - Chao Wang, Zhaoyue Zhang, Ming Zhu:
Nonlinear Dynamic Analysis of Air Traffic Flow at Different Temporal Scales: Nonlinear Analysis Approach versus Complex Networks Approach. 421-431
Safety and Security in Cyber-Physical Systems
- Jaruwan Mesit, Matthias R. Brust, Pascal Bouvry:
Lightweight Key Agreement for Wireless Sensor Networks. 432-437 - Pooja Rajendraprasad, Sergey Butakov, Fehmi Jaafar:
Information Security Considerations for Wireless Infusion Pumps. 438-442 - Siyou Ma, Yunqiang Yan:
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies. 443-449 - Xiaomin Wei, Yunwei Dong, Mingrui Xiao:
Safety-Based Software Reconfiguration Method for Integrated Modular Avionics Systems in AADL Model. 450-455 - Yunqiang Yan, Siyou Ma:
Collaborative Simulation Testing with State Behavior Tree. 456-462 - Luhang Xu, Weixi Jia, Wei Dong, Yongjun Li:
Automatic Exploit Generation for Buffer Overflow Vulnerabilities. 463-468 - Xudong He:
Modeling and Analyzing Cyber Physical Systems Using High Level Petri Nets. 469-476 - Luhang Xu, Wei Dong, Liangze Yin, Qiuxi Zhong:
Guide Fuzzing with Multi-Factor Potential Analysis. 477-482
Trustworthy Computing
- Michael Brunner, Andrea Mussmann, Ruth Breu:
Introduction of a Tool-Based Continuous Information Security Management System: An Exploratory Case Study. 483-490 - Chunlin Wang, Ning Huang, Lina Sun, Guoyi Wen:
A Titration Mechanism Based Congestion Model. 491-496 - Maha Ali Allouzi, Javed I. Khan:
Stateless Multiparty Trust Negotiation Protocol for Distributed Systems. 497-504 - Fehmi Jaafar, Gagandeep Singh, Pavol Zavarsky:
An Analysis of Android Malware Behavior. 505-512
Verification and Validation of Adaptive Software Systems
- Benedikt Eberhardinger, Hella Ponsar, Gerald Siegert, Wolfgang Reif:
Case Study: Adaptive Test Automation for Testing an Adaptive Hadoop Resource Manager. 513-518 - Franz Wotawa, Martin Zimmermann:
Adaptive System for Autonomous Driving. 519-525 - Shuji Morisaki, Norimitsu Kasai:
An Approach for Detecting Critical Adaptations in Automated Adaptive Software Systems. 526-530 - Sara Zatout, Maya Souilah Benabdelhafid, Mahmoud Boufaïda:
Formal Transaction Modeling and Verification for an Adaptable Web Service Orchestration. 531-536 - Guigang Zhang, Chuanchuan You:
Influence Maximization Algorithms Research Based on Big Graphs. 537-544
Software Engineering and Big Data
- Pan Liu, Zhenning Jimmy Xu, Jun Ai:
An Approach to Automatic Test Case Generation for Unit Testing. 545-552 - Pengyang Zong, Yichen Wang, Feng Xie:
Embedded Software Fault Prediction Based on Back Propagation Neural Network. 553-558 - Shufeng Ye, Yi Yang, Weixing Huang, Jian Wang:
Personalized Recommender System for Digital Cultural Resources. 559-565 - Zhiwen Lei, Yi Yang, Weixing Huang, Jian Wang:
Tag Recommendation for Cultural Resources. 566-571
Model-Based Verification and Validation
- Sebastian Schlesinger, Paula Herber, Thomas Göthel, Sabine Glesner:
Equivalence Checking for Hybrid Control Systems Modelled in Simulink. 572-579 - Tugkan Tuglular:
Event Sequence Graph-Based Feature-Oriented Testing: A Preliminary Study. 580-584 - Onur Kilinççeker, Ercument Turk, Moharram Challenger, Fevzi Belli:
Regular Expression Based Test Sequence Generation for HDL Program Validation. 585-592
Cyber Resilience Economics
- Michael Vai, David Whelihan, Jacob Leemaster, Haley Whitman, Willahelm Wan, Yunsi Fei, Roger Khazan, Ilia A. Lebedev, Kyle Hogan, Srinivas Devadas:
Mission Assurance: Beyond Secure Processing. 593-598 - Arnd Weber, Steffen Reith, Dirk Kuhlmann, Michael Kasper, Jean-Pierre Seifert, Christoph Krauß:
Open Source Value Chains for Addressing Security Issues Efficiently. 599-606 - Anurag Dwivedi:
Implementing Cyber Resilient Designs through Graph Analytics Assisted Model Based Systems Engineering. 607-616
Conflicts and Synergies among Reliability, Security, and Other Qualities
- Nils Müllner, Wasif Afzal:
Towards a Coherent Terminology and Taxonomy for Evaluating Safety via Testing. 617-622 - Emtinan Mustafa, Rasha Osman:
An Analysis of the Inclusion of Environmental Cost Factors in Software Cost Estimation Datasets. 623-630
Fast Abstracts
- Yonglei Tao:
Reusable Support for Task-Based Adaptive Navigation. 631-632 - Alejandro Carrasco, Jorge Ropero, Paulino Ruiz-de-Clavijo, Jaime Benjumea, Amalia Luque:
A Proposal for a New Way of Classifying Network Security Metrics: Study of the Information Collected through a Honeypot. 633-634 - Fuqun Huang, Yichen Wang, Yikun Wang, Pengyang Zong:
What Software Quality Characteristics Most Concern Safety-Critical Domains? 635-636 - Yu-Lun Huang, Wen-Lin Sun:
An AHP-Based Risk Assessment for an Industrial IoT Cloud. 637-638 - Rui Du, Min Huang, Yu Zheng:
The Research on Optimization of Flame Tube Welding Process Reliability Based on Numerical Simulation. 639-640
Poster Papers
- Beibei Zhang, Wei Wei, Wei Wang, Yang Li, Huali Cui, Qiang Si:
Modeling Topic Propagation on Heterogeneous Online Social Networks. 641-642 - Xing Pan, Manli Zhang, Xi Chen:
A Method of Quality Improvement Based on Big Quality Warranty Data Analysis. 643-644 - Yuankai Gao, Xiaogang Li, Lei Niu:
Highly Accelerated Life Test Evaluation Based on Accelerated Growth Model. 645-646 - Fei Deng, Feng Gao, Yuanqiang Yan, Wei Zou:
Research on CodeCache Management Strategy Based on Code Heat in Dynamic Binary Translator. 647-651 - Haiyan Chai, Nan Zhang, Bojiang Liu, Longli Tang:
A Software Defect Management System Based on Knowledge Base. 652-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.