Search Results - "2016 IEEE International Conference on Software Quality, Reliability and Security (QRS)"

Refine Results
  1. 1

    Hunting Killer Tasks for Cloud System through Machine Learning: A Google Cluster Case Study by Tang, Hongyan, Li, Ying, Jia, Tong, Wu, Zhonghai

    “…Motivated by frequent failures in cloud computing systems, we analyze failure frequency and failure continuity of tasks from the Google cloud cluster, and find…”
    Get full text
    Conference Proceeding
  2. 2

    Empirical Evaluation of Cross-Release Effort-Aware Defect Prediction Models by Bennin, Kwabena Ebo, Toda, Koji, Kamei, Yasutaka, Keung, Jacky, Monden, Akito, Ubayashi, Naoyasu

    “…To prioritize quality assurance efforts, various fault prediction models have been proposed. However, the best performing fault prediction model is unknown due…”
    Get full text
    Conference Proceeding
  3. 3

    A Faceted Classification Scheme for Change-Based Industrial Code Review Processes by Baum, Tobias, Liskin, Olga, Niklas, Kai, Schneider, Kurt

    “…Code review in the industry today is different to code review twenty years ago. The process has become more lightweight, reviews are performed frequently and…”
    Get full text
    Conference Proceeding
  4. 4

    User-Perceived Source Code Quality Estimation Based on Static Analysis Metrics by Papamichail, Michail, Diamantopoulos, Themistoklis, Symeonidis, Andreas

    “…The popularity of open source software repositories and the highly adopted paradigm of software reuse have led to the development of several tools that aspire…”
    Get full text
    Conference Proceeding
  5. 5

    Profiling Android Vulnerabilities by Jimenez, Matthieu, Papadakis, Mike, Bissyande, Tegawende F., Klein, Jacques

    “…In widely used mobile operating systems a single vulnerability can threaten the security and privacy of billions of users. Therefore, identifying…”
    Get full text
    Conference Proceeding
  6. 6

    Thresholds for Size and Complexity Metrics: A Case Study from the Perspective of Defect Density by Yamashita, Kazuhiro, Changyun Huang, Nagappan, Meiyappan, Kamei, Yasutaka, Mockus, Audris, Hassan, Ahmed E., Ubayashi, Naoyasu

    “…Practical guidelines on what code has better quality are in great demand. For example, it is reasonable to expect the most complex code to be buggy…”
    Get full text
    Conference Proceeding
  7. 7

    The Bugs Framework (BF): A Structured Approach to Express Bugs by Bojanova, Irena, Black, Paul E., Yesha, Yaacov, Yan Wu

    “…To achieve higher levels of assurance for digital systems, we need to answer questions such as does this software have bugs of these critical classes? Do two…”
    Get full text
    Conference Proceeding
  8. 8

    Detecting and Preventing Program Inconsistencies under Database Schema Evolution by Meurice, Loup, Nagy, Csaba, Cleve, Anthony

    “…Nowadays, data-intensive applications tend to access their underlying database in an increasingly dynamic way. The queries that they send to the database…”
    Get full text
    Conference Proceeding
  9. 9

    Test Case Prioritization Using Adaptive Random Sequence with Category-Partition-Based Distance by Xiaofang Zhang, Xiaoyuan Xie, Tsong Yueh Chen

    “…Test case prioritization schedules test cases in a certain order aiming to improve the effectiveness of regression testing. Random sequence is a basic and…”
    Get full text
    Conference Proceeding
  10. 10

    Applying Combinatorial Testing in Industrial Settings by Xuelin Li, Ruizhi Gao, Wong, W. Eric, Chunhui Yang, Dong Li

    “…Combinatorial testing (CT) is a black-box-based technique to generate a small number of test cases with a focus on covering various interactions among input…”
    Get full text
    Conference Proceeding
  11. 11

    Improving Protocol Passive Testing through "Gedanken" Experiments with Finite State Machines by Kushik, Natalia, Lopez, Jorge, Cavalli, Ana, Yevtushenko, Nina

    “…This paper is devoted to study the use of 'gedanken' experiments with Finite State Machines (FSMs) for protocol passive testing optimization. We discuss how…”
    Get full text
    Conference Proceeding
  12. 12

    Using a Distributed Representation of Words in Localizing Relevant Files for Bug Reports by Uneno, Yukiya, Mizuno, Osamu, Eun-Hye Choi

    “…Once a bug in software is reported, developers have to determine which source files are related to the bug. This process is referred to as bug localization,…”
    Get full text
    Conference Proceeding
  13. 13

    A Model to Estimate First-Order Mutation Coverage from Higher-Order Mutation Coverage by Parsai, Ali, Murgia, Alessandro, Demeyer, Serge

    “…The test suite is essential for fault detection during software development. First-order mutation coverage is an accurate metric to quantify the quality of the…”
    Get full text
    Conference Proceeding
  14. 14

    Software Reliability Analysis of NASA Space Flight Software: A Practical Experience by Sukhwani, Harish, Alonso, Javier, Trivedi, Kishor S., Mcginnis, Issac

    “…In this paper, we present the software reliability analysis of the flight software of a recently launched space mission. For our analysis, we use the defect…”
    Get full text
    Conference Proceeding
  15. 15

    Correlation between the Distribution of Software Bugs and Network Motifs by Shaoxiong Zhang, Jun Ai, Xuelin Li

    “…With the increase of scale and complexity of software systems as well as the long existing threats of software accidents such as Therac-25 radiation exposure…”
    Get full text
    Conference Proceeding
  16. 16

    Automatic Localization of Bugs to Faulty Components in Large Scale Software Systems Using Bayesian Classification by Jonsson, Leif, Broman, David, Magnusson, Mans, Sandahl, Kristian, Villani, Mattias, Eldh, Sigrid

    “…We suggest a Bayesian approach to the problem of reducing bug turn-around time in large software development organizations. Our approach is to use…”
    Get full text
    Conference Proceeding
  17. 17

    What Makes a Satisficing Bug Report? by Dal Sasso, Tommaso, Mocci, Andrea, Lanza, Michele

    “…To ensure quality of software systems, developers use bug reports to track defects. It is in the interest of users and developers that bug reports provide the…”
    Get full text
    Conference Proceeding
  18. 18

    Grey Relational Analysis Based k Nearest Neighbor Missing Data Imputation for Software Quality Datasets by Jianglin Huang, Hongyi Sun

    “…Software quality estimation is important yet difficult in software engineering studies. Historical quality datasets are used to build classification models for…”
    Get full text
    Conference Proceeding
  19. 19

    Towards Understanding Interactive Debugging by Petrillo, Fabio, Soh, Zephyrin, Khomh, Foutse, Pimenta, Marcelo, Freitas, Carla, Gueheneuc, Yann-Gael

    “…Debugging is a laborious activity in which developers spend lot of time navigating through code, looking for starting points, and stepping through statements…”
    Get full text
    Conference Proceeding
  20. 20

    Mutation Integration Testing by Grechanik, Mark, Devanla, Gurudev

    “…In integration testing, integrated software modules or components are evaluated as a whole to determine if they behave correctly. Mutation testing is…”
    Get full text
    Conference Proceeding