Search Results - "2014 IEEE 38th Annual Computer Software and Applications Conference"

Refine Results
  1. 1

    Towards Semi-automatic Bug Triage and Severity Prediction Based on Topic Model and Multi-feature of Bug Reports by Yang, Geunseok, Zhang, Tao, Lee, Byungjeong

    “…Bug fixing is an essential activity in the software maintenance, because most of the software systems have unavoidable defects. When new bugs are submitted,…”
    Get full text
    Conference Proceeding Journal Article
  2. 2

    Analysis of Reliability and Resilience for Smart Grids by Albasrawi, Murtadha N., Jarus, Nathan, Joshi, Kamlesh A., Sarvestani, Sahra Sedigh

    “…Smart grids, where cyber infrastructure is used to make power distribution more dependable and efficient, are prime examples of modern infrastructure systems…”
    Get full text
    Conference Proceeding Journal Article
  3. 3

    FECAR: A Feature Selection Framework for Software Defect Prediction by Liu, Shulong, Chen, Xiang, Liu, Wangshu, Chen, Jiaqiang, Gu, Qing, Chen, Daoxu

    “…Software defect prediction can classify new software entities into either buggy or clean. However the effectiveness of existing methods is influenced by…”
    Get full text
    Conference Proceeding Journal Article
  4. 4

    Liquid Software Manifesto: The Era of Multiple Device Ownership and Its Implications for Software Architecture by Taivalsaari, Antero, Mikkonen, Tommi, Systa, Kari

    “…Today, the digital life of people in developed markets is dominated by PCs and smart phones. Yet, as successful as PCs and smart phones are, the dominant era…”
    Get full text
    Conference Proceeding Journal Article
  5. 5

    A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected? by Allix, Kevin, Jerome, Quentin, Bissyande, Tegawende F., Klein, Jacques, State, Radu, Le Traon, Yves

    “…We consider in this paper the analysis of a large set of malware and benign applications from the Android ecosystem. Although a large body of research work has…”
    Get full text
    Conference Proceeding Journal Article
  6. 6

    Automated Configuration Bug Report Prediction Using Text Mining by Xin Xia, Lo, David, Weiwei Qiu, Xingen Wang, Bo Zhou

    “…Configuration bugs are one of the dominant causes of software failures. Previous studies show that a configuration bug could cause huge financial losses in a…”
    Get full text
    Conference Proceeding Journal Article
  7. 7

    Trimming Test Suites with Coincidentally Correct Test Cases for Enhancing Fault Localizations by Xiaozhen Xue, Yulei Pang, Namin, Akbar Siami

    “…Although empirical studies have demonstrated the usefulness of statistical fault localizations based on code coverage, the effectiveness of these techniques…”
    Get full text
    Conference Proceeding Journal Article
  8. 8

    Which Android App Store Can Be Trusted in China? by Ng, Yi Ying, Zhou, Hucheng, Ji, Zhiyuan, Luo, Huan, Dong, Yuan

    “…China has the world's largest Android population with 270 million active users. However, Google Play is only accessible by about 30% of them, and third-party…”
    Get full text
    Conference Proceeding Journal Article
  9. 9

    Towards an Open Architecture Model for Web and Mobile Software: Characteristics and Validity Properties by Vogel, Bahtijar, Kurti, Arianit, Mikkonen, Tommi, Milrad, Marcelo

    “…Proprietary software solutions are extensively deployed through multiple platforms including desktop, web and mobile devices. Such systems are in many cases…”
    Get full text
    Conference Proceeding Journal Article
  10. 10

    Integrated Modular Avionics (IMA) Partition Scheduling with Conflict-Free I/O for Multicore Avionics Systems by Jung-Eun Kim, Man-Ki Yoon, Bradford, Richard, Lui Sha

    “…The trend in the semiconductor industry toward multicore processors poses a significant challenge to many suppliers of safety-critical real-time embedded…”
    Get full text
    Conference Proceeding Journal Article
  11. 11

    Time-Sensitive Adaptation in CPS through Run-Time Configuration Generation and Verification by Garcia-Valls, Marisol, Perez-Palacin, Diego, Mirandola, Raffaela

    “…The inherent dynamic nature of Cyber Physical Systems (CPS) requires novel mechanisms to support their evolution over their operation life time. Though…”
    Get full text
    Conference Proceeding Journal Article
  12. 12

    Dynamic Slicing of Python Programs by Zhifei Chen, Lin Chen, Yuming Zhou, Zhaogui Xu, Chu, William C., Baowen Xu

    “…Python is widely used for web programming and GUI development. Due to the dynamic features of Python, Python programs may contain various unlimited errors…”
    Get full text
    Conference Proceeding Journal Article
  13. 13

    A Lightweight Virtual Machine Image Deduplication Backup Approach in Cloud Environment by Xu, Jiwei, Zhang, Wenbo, Ye, Shiyang, Wei, Jun, Huang, Tao

    “…As most clouds are based on virtualization technology, more and more virtual machine images are created within data centers. Depending on the need of disaster…”
    Get full text
    Conference Proceeding Journal Article
  14. 14

    A Scenario-Based Approach to Predicting Software Defects Using Compressed C4.5 Model by Li, Biwen, Shen, Beijun, Wang, Jun, Chen, Yuting, Zhang, Tao, Wang, Jinshuang

    “…Defect prediction approaches use software metrics and fault data to learn which software properties are associated with what kinds of software faults in…”
    Get full text
    Conference Proceeding Journal Article
  15. 15

    A Semi-supervised Approach to Software Defect Prediction by Huihua Lu, Cukic, Bojan, Culp, Mark

    “…Accurate detection of software components that need to be exposed to additional verification and validation offers the path to high quality products while…”
    Get full text
    Conference Proceeding Journal Article
  16. 16

    Towards Model-and-Code Consistency Checking by Riedl-Ehrenleitner, Markus, Demuth, Andreas, Egyed, Alexander

    “…In model-driven engineering, design models allow for efficient designing without considering implementation details. Still, it is crucial that design models…”
    Get full text
    Conference Proceeding Journal Article
  17. 17

    Optimizing the Power Consumption of Mobile Networks Based on Traffic Prediction by Dawoud, Safaa, Uzun, Abdulbaki, Gondor, Sebastian, Kupper, Axel

    “…Nowadays, mobile networks approach a steady growth in traffic demand. As a result, mobile network providers continuously expand their network infrastructure…”
    Get full text
    Conference Proceeding Journal Article
  18. 18

    Design and Safety Analysis for System Architecture: A Breeze/ADL-Based Approach by Chen, Luxi, Huang, Linpeng, Li, Chen, Wu, Linzhu, Luo, Weichao

    “…Architectural design modeling has emerged as a discipline in a complex system development. To implement early safety analysis, techniques for architectural…”
    Get full text
    Conference Proceeding Journal Article
  19. 19

    How to Generate Realistic Network Traffic? by Varet, Antoine, Larrieu, Nicolas

    “…Network engineers and designers need additional tools to generate network traffic in order to test and evaluate, for instance, application performances or…”
    Get full text
    Conference Proceeding Journal Article
  20. 20

    A Model for Distributed Agile Release Planning: Doctoral Symposium Paper by Richter, Ingo, Lindermeier, Robert, Weber, Michael

    “…In this paper we describe a PhD research plan which focuses on the problem of insular thinking in distributed software development projects and its…”
    Get full text
    Conference Proceeding