2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)

4-7 Nov. 2013

Filter Results

Displaying Results 1 - 25 of 100
  • Author index

    Publication Year: 2013, Page(s):1 - 22
    Request permission for reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Fast abstract organizers

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Message from the IWPD 2013 workshop organizers

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • IWPD 2013 workshop organizers

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Invited talk: How the Fundamental Assurance Question pervades certification

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • Invited Talk: Information assurance considerations for software supply chains and 3rd parties

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • MedSRDR 2013 workshop

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • Welcome to MedSRDR 2013

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Message from the IWPD 2013 workshop organizers

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Message from fast abstract co-chairs

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Message from the industry papers co-chairs

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Program committee

    Publication Year: 2013, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Student papers

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Supplemental proceedings

    Publication Year: 2013, Page(s):1 - 7
    Request permission for reuse | PDF file iconPDF (136 KB)
    Freely Available from IEEE
  • Welcome letter

    Publication Year: 2013, Page(s):1 - 3
    Request permission for reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • WoSAR 2013 workshop organizers

    Publication Year: 2013, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Message from the workshop general and program chairs WoSAR 2013

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • WoSoCer 2013 workshop organizers

    Publication Year: 2013, Page(s):1 - 2
    Request permission for reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Message from the workshop chairs WoSoCer 2013

    Publication Year: 2013, Page(s): 1
    Request permission for reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Finding related events for specification mining

    Publication Year: 2013, Page(s):1 - 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    In contemporary software development practice, programmers reuse components by invoking their APIs to construct large systems. These APIs often involve constraints on the temporal order of method calls. For the example of the file usage, a programmer should first open a file, then read and/or write its content, and at last close it. Trying to read a closed file will cause exceptions to be thrown. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Persistence of relevance: A missing issue in imperfect coverage models

    Publication Year: 2013, Page(s):3 - 4
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    In traditional imperfect fault coverage models, simply coverage models (CMs), the coverage (including identification and isolation) is typically limited to the faulty components regardless of their relevance. The relevance is typically defined in the context of perfect fault coverage, and a component is called irrelevant if its (covered) failure does not affect the system state, otherwise it is re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated classification of NASA anomalies using natural language processing techniques

    Publication Year: 2013, Page(s):5 - 6
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (707 KB) | HTML iconHTML

    NASA anomaly databases are rich resources of software failure data in the field. These data are often captured in natural language that is not appropriate for trending or statistical analyses. This fast abstract describes a feasibility study of applying 60 natural language processing techniques for automatically classifying anomaly data to enable trend analyses. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on the effectiveness of peer review meeting

    Publication Year: 2013, Page(s):7 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    The effectiveness of peer review meetings in software development has been discussed for many years. Porter concludes that peer review meetings do not contribute significantly to defect extraction. This paper shows contradictory data to the Porter's findings and our interpretation for them. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative analysis of Bayesian and classical approaches for software reliability measurement

    Publication Year: 2013, Page(s):9 - 10
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Software failure remains an important cause of reported system outage. Yet, developing reliable software is still not well understood by the programmer, the Software Engineer and the Program manager. Software reliability growth models (SRGMs) provide a framework to analyze software failures by using past failure data to predict the reliability of the software. Most models that have been used have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.