By Topic

Software Reliability Engineering, 2006. ISSRE '06. 17th International Symposium on

Date 7-10 Nov. 2006

Filter Results

Displaying Results 1 - 25 of 53
  • 17th International Symposium on Software Reliability Engineering - Cover

    Publication Year: 2006 , Page(s): c1
    Request Permissions | PDF file iconPDF (134 KB)  
    Freely Available from IEEE
  • 17th International Symposium on Software Reliability Engineering - Title

    Publication Year: 2006 , Page(s): i - iii
    Request Permissions | PDF file iconPDF (42 KB)  
    Freely Available from IEEE
  • 17th International Symposium on Software Reliability Engineering - Copyright

    Publication Year: 2006 , Page(s): iv
    Request Permissions | PDF file iconPDF (38 KB)  
    Freely Available from IEEE
  • 17th International Symposium on Software Reliability Engineering - Table of contents

    Publication Year: 2006 , Page(s): v - viii
    Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Welcome from the General Chair and Program Committee Chairs

    Publication Year: 2006 , Page(s): ix
    Request Permissions | PDF file iconPDF (28 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006 , Page(s): x
    Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006 , Page(s): xii
    Request Permissions | PDF file iconPDF (30 KB)  
    Freely Available from IEEE
  • Primary Reviewers

    Publication Year: 2006 , Page(s): xiv
    Request Permissions | PDF file iconPDF (32 KB)  
    Freely Available from IEEE
  • Secondary reviewers

    Publication Year: 2006 , Page(s): xv
    Request Permissions | PDF file iconPDF (26 KB)  
    Freely Available from IEEE
  • Disaster Hardening for Software Systems

    Publication Year: 2006 , Page(s): 3 - 4
    Request Permissions | Click to expandAbstract | PDF file iconPDF (67 KB)  

    Summary form only given. We can treat the software system development as a 'disaster-prone' system. We consider a crash as an example of a disaster. We consider the minimum infrastructural requirements based on the application, and the operational and user environments. We review the strategies of disaster awareness, anticipation, proactive pre-emption, and precaution to prevent and/or mitigate th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Perspective on Software Consumability

    Publication Year: 2006 , Page(s): 5
    Request Permissions | Click to expandAbstract | PDF file iconPDF (58 KB) |  | HTML iconHTML  

    Summary form only given. Reliability questions are often directed at the core values of a software product that is at the features and functions. After all, the client imagines a to-be state where the software is running and the client achieves their business goals. So reliability concerns appropriately have mapped to the question: can the client reasonably achieve those goals through this softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Security: Building Security In

    Publication Year: 2006 , Page(s): 6
    Cited by:  Papers (64)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (63 KB) |  | HTML iconHTML  

    Summary form only given. Software security has come a long way in the last few years, but we've really only just begun. I will present a detailed approach to getting past theory and putting software security into practice. The three pillars of software security are applied risk management, software security best practices (which I call touchpoints), and knowledge. By describing a manageably small ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anything You Want to Ask About Software Reliability Engineering

    Publication Year: 2006 , Page(s): 9
    Request Permissions | Click to expandAbstract | PDF file iconPDF (54 KB) |  | HTML iconHTML  

    The panel was a repeat of a panel we have had at every ISSRE since ISSRE97 (of course, the content was different). There were no presentations, only questions. The audience was invited to ask questions on anything: theory, details of application, research needed, solutions to problems on development projects, research issues. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Relevance of Software Modeling to the Software Industry

    Publication Year: 2006 , Page(s): 10
    Request Permissions | Click to expandAbstract | PDF file iconPDF (52 KB)  

    A good percentage of papers submitted to software development related conferences are related to the subject of modeling. To many researchers, model-driven development is the answer to most software reliability/development problems. They argue that models help the architects to reason about the problem and solution domains, and can potentially be used to formally prove that any solution meets its ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling a Dataflow Testing Methodology to the MultiparadigmWorld of Commercial Spreadsheets

    Publication Year: 2006 , Page(s): 13 - 22
    Request Permissions | Click to expandAbstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    Spreadsheets are widely used but often contain faults. Thus, in prior work we presented a dataflow testing methodology for use with spreadsheets, which studies have shown can be used cost-effectively by end-user programmers. To date, however, the methodology has been investigated across a limited set of spreadsheet language features. Commercial spreadsheet environments are multiparadigm languages,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Memoized Forward Computation of Dynamic Slices

    Publication Year: 2006 , Page(s): 23 - 32
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (196 KB) |  | HTML iconHTML  

    Forward computation of dynamic slices is necessary to support interactive debugging and online analysis of long running programs. However, the overhead of existing forward computing algorithms limits their use to non-processing intensive applications. Recent empirical studies have shown that slices tend to reoccur often during execution. This paper presents a new forward computing algorithm for dy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call Stack Coverage for GUI Test-Suite Reduction

    Publication Year: 2006 , Page(s): 33 - 44
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (269 KB) |  | HTML iconHTML  

    Graphical user interfaces (GUIs) are used as front-ends to most of today's software applications; testing GUIs for functional correctness is needed to ensure the overall correctness of these applications. The event-driven nature of GUIs presents new challenges for testing. One important challenge is test suite reduction. Conventional reduction techniques/tools based on static analysis are not easi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stabilization Time - A Quality Metric for Software Products

    Publication Year: 2006 , Page(s): 45 - 51
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (140 KB) |  | HTML iconHTML  

    In software products, often the failure rate decreases after installation, eventually reaching a steady state. The time it takes for a product to reach its steady state reliability depends on different product parameters. In this paper we propose a new metric for software products called stabilization time which is the time taken after installation for the reliability of the product to stabilize. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metrics-Based Software Reliability Models Using Non-homogeneous Poisson Processes

    Publication Year: 2006 , Page(s): 52 - 61
    Cited by:  Papers (10)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    The traditional software reliability models aim to describe the temporal behavior of software fault-detection processes with only the fault data, but fail to incorporate some significant test-metrics data observed in software testing. In this paper we develop a useful modeling framework to assess the quantitative software reliability with time-dependent covariate as well as software-fault data. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Historical In-Process and Product Metrics for Early Estimation of Software Failures

    Publication Year: 2006 , Page(s): 62 - 74
    Cited by:  Papers (12)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (218 KB) |  | HTML iconHTML  

    The benefits that a software organization obtains from estimates of product quality are dependent upon how early in the product cycle that these estimates are available. Early estimation of software quality can help organizations make informed decisions about corrective actions. To provide such early estimates we present an empirical case study of two large scale commercial operating systems, Wind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BPEL4WS Unit Testing: Test Case Generation Using a Concurrent Path Analysis Approach

    Publication Year: 2006 , Page(s): 75 - 84
    Cited by:  Papers (19)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (247 KB) |  | HTML iconHTML  

    BPEL is a language that could express complex concurrent behaviors. This paper presents a novel method of BPEL test case generation, which is based on concurrent path analysis. This method first uses an extended control flow graph (XCFG) to represent a BPEL program, and generates all the sequential test paths from XCFG. These sequential test paths are then combined to form concurrent test paths. F... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metamodel-based Test Generation for Model Transformations: an Algorithm and a Tool

    Publication Year: 2006 , Page(s): 85 - 94
    Cited by:  Papers (9)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    In a model-driven development context (MDE), model transformations allow memorizing and reusing design know-how, and thus automate parts of the design and refinement steps of a software development process. A model transformation program is a specific program, in the sense it manipulates models as main parameters. Each model must be an instance of a "metamodel", a metamodel being the specification... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Systematic Approach to Generate Inputs to Test UML Design Models

    Publication Year: 2006 , Page(s): 95 - 104
    Cited by:  Papers (6)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (263 KB) |  | HTML iconHTML  

    Practical model validation techniques are needed for model driven development (MDD) techniques to succeed. This paper presents an approach to generating inputs to test UML design models that are produced in the detailed design phase of an MDD project. A symbolic execution based approach is used to derive test input constraints from the paths of a variable assignment graph, which integrates informa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using CLP to Automatically Generate Test Sequences for Synchronous Programs with Numeric Inputs and Outputs

    Publication Year: 2006 , Page(s): 105 - 116
    Cited by:  Papers (4)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    Lutess is a testing environment designed for synchronous software specified with Lustre, a synchronous data-flow language. It makes possible to automatically generate test input sequences in conformance with a specification of the software external behavior and of guiding directives such as operational profiles and behavioral patterns. Lutess deals with software and specifications involving only B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Reliability of Credential Hardening through Keystroke Dynamics

    Publication Year: 2006 , Page(s): 117 - 126
    Cited by:  Papers (9)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (377 KB) |  | HTML iconHTML  

    Most computer systems rely on usernames and passwords as a mechanism for authentication and access control. These credential sets offer weak protection to a broad scope of applications with differing levels of sensitivity. Traditional physiological biometric systems such as fingerprint, face, and iris recognition are not readily deployable in remote authentication schemes. Keystroke dynamics provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.