By Topic

2009 20th International Symposium on Software Reliability Engineering

16-19 Nov. 2009

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1281 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (152 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s):viii - x
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2009, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2009, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Industry, Steering, and Advisory Committees

    Publication Year: 2009, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2009, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • A Complexity Reliability Model

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    A model of software complexity and reliability is developed. It uses an evolutionary process to transition from one software system to the next, while complexity metrics are used to predict the reliability for each system. Our approach is experimental, using data pertinent to the NASA satellite systems application environment. We do not use sophisticated mathematical models that may have little re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet-Based Approach for Estimating Software Reliability

    Publication Year: 2009, Page(s):11 - 20
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB) | HTML iconHTML

    Recently, wavelet methods have been frequently used for not only multimedia information processing but also time series analysis with high speed and accuracy requirements. In this paper we apply the wavelet-based techniques to estimate software intensity functions in non-homogeneous Poisson process based software reliability models. There are two advantages for use of the wavelet-based estimation;... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating the Probability of Failure When Software Runs Are Dependent: An Empirical Study

    Publication Year: 2009, Page(s):21 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    The assumption of independence among successive software runs, common to many software reliability models, often is a simplification of the actual behavior. This paper addresses the problem of estimating software reliability when the successive software runs are statistically correlated, that is, when an outcome of a run depends on one or more of its previous runs. First, we propose a generalizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying the Composition Filter Model for Runtime Verification of Multiple-Language Software

    Publication Year: 2009, Page(s):31 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Complex software, especially the embedded one, is composed of multiple collaborating subsystems that are possibly developed in multiple languages. To verify the behavior of such software, a run-time verification system must deal with multiple-language environments both in its specifications and in its generated runtime verification modules. In this paper, we present the E-Chaser runtime verificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays

    Publication Year: 2009, Page(s):41 - 50
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    An important software reliability engineering tool is operational profiles. In this paper we propose a cost effective automated approach for creating second generation operational profiles using execution logs of a software product. Our algorithm parses the execution logs into sequences of events and produces an ordered list of all possible subsequences by constructing a suffix-array of the events... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Adaptive System Health Monitoring and Diagnosis for Resource Constrained Cyber-Physical Systems

    Publication Year: 2009, Page(s):51 - 60
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Cyber-physical systems (CPS) are complex net-centric hardware/software systems that can be applied to transportation, healthcare, defense, and other real-time applications. To meet the high reliability and safety requirements for these systems, proactive system health monitoring and management (HMM) techniques can be used. However, to be effective, it is necessary to ensure that the operation of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Field Failures in System Configurable Software: Cost-Based Prioritization

    Publication Year: 2009, Page(s):61 - 70
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    System testing of configurable software is an expensive and resource constrained process. Insufficient testing often leads to escaped faults in the field where failures impact customers and are costly to repair. Prior work has shown that it is possible to efficiently sample configurations for testing using combinatorial interaction testing, and to prioritize these configurations to increase the ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Harnessing Web-Based Application Similarities to Aid in Regression Testing

    Publication Year: 2009, Page(s):71 - 80
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Web-based applications are growing in complexity and criticality, increasing the need for their precise validation. Regression testing is an established approach for providing information about the quality of an application in the face of recurring updates that dominate the web. We present techniques to address a key challenge of the automated regression testing of web-based applications. Innocuou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Effectiveness of Unit Test Automation at Microsoft

    Publication Year: 2009, Page(s):81 - 89
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    Instituting an automated unit testing practice across a large software development team can be technically challenging and time consuming. As a result, teams may question the economic value of instituting such a practice. One large Microsoft team consisting of 32 developers transitioned from ad hoc and individualized unit testing practices to the utilization of the NUnit automated unit testing fra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximating Deployment Metrics to Predict Field Defects and Plan Corrective Maintenance Activities

    Publication Year: 2009, Page(s):90 - 98
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Corrective maintenance activities are a common cause of schedule delays in software development projects. Organizations frequently fail to properly plan the effort required to fix field defects. This study aims to provide relevant guidance to software development organizations on planning for these corrective maintenance activities by correlating metrics that are available prior to release with pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variance Analysis in Software Fault Prediction Models

    Publication Year: 2009, Page(s):99 - 108
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB) | HTML iconHTML

    Software fault prediction models play an important role in software quality assurance. They identify software subsystems (modules,components, classes, or files) which are likely to contain faults. These subsystems, in turn, receive additional resources for verification and validation activities. Fault prediction models are binary classifiers typically developed using one of the supervised learning... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Putting It All Together: Using Socio-technical Networks to Predict Failures

    Publication Year: 2009, Page(s):109 - 119
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (298 KB) | HTML iconHTML

    Studies have shown that social factors in development organizations have a dramatic effect on software quality. Separately, program dependency information has also been used successfully to predict which software components are more fault prone. Interestingly, the influence of these two phenomena have only been studied separately. Intuition and practical experience suggests,however, that task assi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Security Patch Release Timing under Non-homogeneous Vulnerability-Discovery Processes

    Publication Year: 2009, Page(s):120 - 128
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (555 KB) | HTML iconHTML

    This paper proposes a patch management model with non-homogeneous vulnerability-discovery processes to find the optimal security patch release times. The proposed model is an extension of Cavusoglu et al. (2006, 2008) by applying non-homogeneous vulnerability-discovery processes which are based on a vulnerability life-cycle model, and provides the optimal schedule for security patch release times ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study

    Publication Year: 2009, Page(s):129 - 135
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    This paper presents a field study on Web security vulnerabilities from the programming language type system perspective. Security patches reported for a set of 11 widely used Web applications written in strongly typed languages (Java, C#, VB.NET) were analyzed in order to understand the fault types that are responsible for the vulnerabilities observed (SQL injection and XSS). The results are analy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a Unifying Approach in Understanding Security Problems

    Publication Year: 2009, Page(s):136 - 145
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (495 KB) | HTML iconHTML

    To evaluate security in the context of software reliability engineering, it is necessary to analyse security problems, actual exploits, and their relationship with an understanding of the operational behaviour of the system. That can be done in terms of the effort involved in security exploits, through classic reliability factors such as calendar and inservice time, etc. Existing studies focus pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.