2012 12th International Conference on Quality Software

27-29 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 61
  • [Back cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (362 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Message from the QSIC 2012 General Chair

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the QSIC 2012 Program Chairs

    Publication Year: 2012, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the QSIC 2012 Industry Track Chairs

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (91 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop on Embedded System Software Development and Quality Assurance (WESQA) Chairs

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (109 KB) | HTML iconHTML
    Freely Available from IEEE
  • QSIC 2012 Conference Committees

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • QSIC 2012 Program Committee

    Publication Year: 2012, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • QSIC 2012 Software Quality in Practice Industry Track Program Committee

    Publication Year: 2012, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • QSIC 2012 Additional Reviewers

    Publication Year: 2012, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2012, Page(s):xix - xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    These keynote speeches discuss the following: Quality Assurance for Evolving Systems; Why Is Software So Bad? (Is It?). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leveraging Method Call Anomalies to Improve the Effectiveness of Spectrum-Based Fault Localization Techniques for Object-Oriented Programs

    Publication Year: 2012, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB) | HTML iconHTML

    Spectrum-based fault localization (SFL) is a lightweight automated diagnosis technique. However, when applied to object-oriented programs, its diagnostic accuracy is limited as suspicious statements are distributed in different classes. In this paper, we propose an approach to leveraging method call anomalies to improve the effectiveness of SFL techniques for locating faulty statements in an objec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing

    Publication Year: 2012, Page(s):9 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Null pointer exception is a commonly occurring error in Java programs, and many static analysis tools can identify such errors. However, most of existing tools are pure static analysis and suffer from the common problems of the pure static approaches. In this paper, we present a new approach for identifying null dereferences by combining the dynamically generated information (from the stack trace)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compressed C4.5 Models for Software Defect Prediction

    Publication Year: 2012, Page(s):13 - 16
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (151 KB) | HTML iconHTML

    Defects in every software must be handled properly, and the number of defects directly reflects the quality of a software. In recent years, researchers have applied data mining and machine learning methods to predicting software defects. However, in their studies, the method in which the machine learning models are directly adopted may not be precise enough. Optimizing the machine learning models ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Effectively Locating Integration-Level Faults in BPEL Programs

    Publication Year: 2012, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    Business Process Execution Language (BPEL) is a widely recognized executable service composition language. Since BPEL integrates services of desired functionality to compose business processes, it is significantly different from typical programming languages. How to effectively locate the integration-level faults in BPEL programs is an open issue. In this paper, we propose the BPEL fault localizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Refinement Checking for Model-Based Mutation Testing

    Publication Year: 2012, Page(s):21 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    In model-based mutation testing, a test model is mutated for test case generation. The resulting test cases are able to detect whether the faults in the mutated models have been implemented in the system under test. For this purpose, a conformance check between the original and the mutated model is required. We have developed an approach for conformance checking of action systems, which are well-s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Function Substitution: Towards Constraint Solving in Software Testing

    Publication Year: 2012, Page(s):31 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Constraint solving is a fundamental tenet of most test case generation strategies. However, conventional constraint solving methods were not designed in consideration of that aspect of test case generation. It has led to a situation where test case generation techniques can miss test cases when constraints contain function invocations. This is due to the fact that, when solving constraints to gene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the Size of Dynamic Slicing with Constraint Solving

    Publication Year: 2012, Page(s):41 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Debugging consumes a considerable amount of time in software engineering. Even though numerous techniques have been introduced for automated debugging, they are hardly used in practice. Reasons are the computational overhead imposed by these techniques and the lack of sufficiently precise explanations. There is a need for tools which undertake the task of narrowing down the most likely fault locat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An IOSTS Based Passive Testing Approach for the Validation of Data-Centric Protocols

    Publication Year: 2012, Page(s):49 - 58
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2234 KB) | HTML iconHTML

    Passive testing techniques are used when there is no access to the system interface or when the system cannot be interrupted from its normal operation. It is a way of verifying whether the system meets the requirements. Many passive testing techniques consider only the control portion of the protocol neglecting the data portions, or are confronted with an overloaded amount of data values to consid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method for Constructing Metamorphic Relations

    Publication Year: 2012, Page(s):59 - 68
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    A fundamental problem for software testing is the oracle problem, which means that in many practical situations, it is extremely expensive, if not impossible, to verify the test result given any possible program input. Metamorphic testing is an approach to alleviating the oracle problem. The key part of metamorphic testing is a set of necessary properties of the software under test, namely metamor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Passive Testing of Timed Systems with Timeouts

    Publication Year: 2012, Page(s):69 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    This paper presents a framework to perform passive testing for systems where time aspects affect their behavior. Temporal aspects can be associated with both performance of actions and delays/timeouts. Actually, timeouts have the capability of affecting the subsequent behaviors of the system. Therefore, the expected functional behavior of the studied systems must take into account the possible tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Discovery of Valid Test Strings from the Web Using Dynamic Regular Expressions Collation and Natural Language Processing

    Publication Year: 2012, Page(s):79 - 88
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Classic approaches to test input generation -- such as dynamic symbolic execution and search-based testing -- are commonly driven by a test adequacy criterion such as branch coverage. However, there is no guarantee that these techniques will generate meaningful and realistic inputs, particularly in the case of string test data. Also, these techniques have trouble handling path conditions involving... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.