By Topic

15th International Symposium on Software Reliability Engineering

2-5 Nov. 2004

Filter Results

Displaying Results 1 - 25 of 48
  • [Cover page]

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (406 KB)
    Freely Available from IEEE
  • 15th International Symposium on Software Reliability Engineering

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (460 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2004, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Program Committee Co-Chairs

    Publication Year: 2004, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (97 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2004, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2004, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2004, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Unit testing in practice

    Publication Year: 2004, Page(s):3 - 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Unit testing is a technique that receives a lot of criticism in terms of the amount of time that it is perceived to take and in how much it costs to perform. However it is also the most effective means to test individual software components for boundary value behavior and ensure that all code has been exercise adequately (e.g. statement, branch or MC/DC coverage). In this paper we examine the avai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deriving test sets from partial proofs

    Publication Year: 2004, Page(s):14 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    Proof-guided testing is intended to enhance the test design with information extracted from the argument for correctness. The target application field is the verification of fault-tolerance algorithms where a complete formal proof is not available. Ideally, testing should be focused on the pending parts of the proof. The approach is experimentally assessed using the example of a group membership p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A generic method for statistical testing

    Publication Year: 2004, Page(s):25 - 34
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    This paper addresses the problem of selecting finite test sets and automating this selection. Among these methods, some are deterministic and some are statistical. The kind of statistical testing we consider has been inspired by the work of Thevenod-Fosse and Waeselynck. There, the choice of the distribution on the input domain is guided by the structure of the program or the form of its specifica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical software testing with parallel modeling: a case study

    Publication Year: 2004, Page(s):35 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    Statistical software testing promises to offer a solution to the growing testing burden caused by the ever-increasing complexity of today's software systems. Nevertheless, the complexity of these systems makes it more difficult to provide a model to use as a basis for statistical testing. The flat and hierarchical modeling currently used to create operational profiles leads to enormous models when... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability growth in software products

    Publication Year: 2004, Page(s):47 - 53
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Most of the software reliability growth models work under the assumption that reliability of software grows due to the bugs that cause failures being removed from the software. While correcting bugs will improve reliability, another phenomenon has often been observed - the failure rate of a software product, as observed by the user, improves with time irrespective of whether bugs are corrected or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability estimation for statistical usage testing using Markov chains

    Publication Year: 2004, Page(s):54 - 65
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    Software validation is an important activity in order to test whether or not the correct software has been developed. Several testing techniques have been developed, and one of these is statistical usage testing (SUT). The main purpose of SUT is to test a software product from a user's point of view. Hence, usage models are designed and then test cases are developed from the models. Another advant... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of a methodology for assessing software reliability

    Publication Year: 2004, Page(s):66 - 76
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Software-based digital systems are progressively replacing analog systems in safety-critical applications. However the ability to predict their reliability is not well understood and needs further study. A first step towards systematic resolution of this issue was presented in a recent software engineering measure study. In that study a set of software engineering measures were ranked with respect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performability modeling of mobile software systems

    Publication Year: 2004, Page(s):77 - 88
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB) | HTML iconHTML

    An increasing number of applications operate in heterogeneous computing environments, often with mobile components. Methodologies that help developers assess the ability of such applications to meet their performance requirements throughout the software life-cycle are needed. In particular, early in the design phases, analysis techniques are critical for ensuring the future system's behavior, eval... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Are found defects an indicator of software correctness? An investigation in a controlled case study

    Publication Year: 2004, Page(s):91 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    In quality assurance programs, we want indicators of software quality, especially software correctness. The number of found defects during inspection and testing are often used as the basis for indicators of software correctness. However, there is a paradox in this approach, since the remaining defects is what impacts negatively on software correctness, not the found ones. In order to investigate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An exploration of software faults and failure behaviour in a large population of programs

    Publication Year: 2004, Page(s):101 - 112
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    A large part of software engineering research suffers from a major problem-there are insufficient data to test software hypotheses, or to estimate parameters in models. To obtain statistically significant results, a large set of programs is needed, each set comprising many programs built to the same specification. We have gained access to such a large body of programs (written in C, C++, Java or P... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirical studies of test case prioritization in a JUnit testing environment

    Publication Year: 2004, Page(s):113 - 124
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    Test case prioritization provides a way to run test cases with the highest priority earliest. Numerous empirical studies have shown that prioritization can improve a test suite's rate of fault detection, but the extent to which these results generalize is an open question because the studies have all focused on a single procedural language, C, and a few specific types of test suites, in particular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An empirical study on reliability modeling for diverse software systems

    Publication Year: 2004, Page(s):125 - 136
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Reliability and fault correlation are two main concerns for design diversity, yet empirical data are limited in investigating these two. In previous work, we conducted a software project with real-world application for investigation on software testing and fault tolerance for design diversity. Mutants were generated by injecting one single real fault recorded in the software development phase to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Boundary coverage criteria for test generation from formal models

    Publication Year: 2004, Page(s):139 - 150
    Cited by:  Papers (15)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    This paper proposes a new family of model-based coverage criteria, based on formalizing boundary-value testing heuristics. The new criteria form a hierarchy of data-oriented coverage criteria, and can be applied to any formal notation that uses variables and values. They can be used either to measure the coverage of an existing test set, or to generate tests from a formal model. We give algorithms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-based test driven development of the Tefkat model-transformation engine

    Publication Year: 2004, Page(s):151 - 160
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Tefkat is an implementation of a rule- and pattern-based engine for the transformation of models defined using the Object Management Group's (OMG) Model-Driven Architecture (MDA). The process for the development of the engine included the concurrent development of a unit test suite for the engine. The test suite is constructed as a number of models, whose elements comprise the test cases, and whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test-adequacy and statistical testing: combining different properties of a test-set

    Publication Year: 2004, Page(s):161 - 172
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Dependability assessment of safety-critical or safety-related software components is an important issue for example within the nuclear industry, the avionics sector or the military. Statistical testing is one way of quantifying the dependability of a given software product. The use of sector-specific standards with their suggested test-criteria is another (nonquantitative) way of aiming at employi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Plannable test selection criteria for FSMs extracted from operational specifications

    Publication Year: 2004, Page(s):173 - 184
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Model-based test generation (MBTG) is becoming an area of active research. Several MBTG approaches extract a finite state machine (FSM) from a given model, and use structural (mostly transition) coverage of the extracted FSM as a test selection criteria. In this paper, we demonstrate inadequacy of structural coverage criteria, and propose a set of test selection criteria for extracted FSMs. Our mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bypass testing of Web applications

    Publication Year: 2004, Page(s):187 - 197
    Cited by:  Papers (26)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Web software applications are increasingly being deployed in sensitive situations. Web applications are used to transmit, accept and store data that is personal, company confidential and sensitive. Input validation testing (IVT) checks user inputs to ensure that they conform to the program's requirements, which is particularly important for software that relies on user inputs, including Web applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.