Sciweavers

Share
ISSRE
2007
IEEE
8 years 6 months ago
Generating Trace-Sets for Model-based Testing
Model-checkers are powerful tools that can find individual traces through models to satisfy desired properties. These traces provide solutions to a number of problems. Instead of...
Birgitta Lindström, Paul Pettersson, Jeff Off...
ISSRE
2007
IEEE
8 years 6 months ago
On the Impact of Injection Triggers for OS Robustness Evaluation
The traditional method of software robustness evaluation, through error injection, is for errors to be injected at reaching a specific code location. This paper studies what impa...
Andréas Johansson, Neeraj Suri, Brendan Mur...
ISSRE
2007
IEEE
8 years 6 months ago
Predicting Subsystem Failures using Dependency Graph Complexities
In any software project, developers need to be aware of existing dependencies and how they affect their system. We investigated the architecture and dependencies of Windows Server...
Thomas Zimmermann, Nachiappan Nagappan
ISSRE
2007
IEEE
8 years 6 months ago
Using In-Process Testing Metrics to Estimate Post-Release Field Quality
In industrial practice, information on the software field quality of a product is available too late in the software lifecycle to guide affordable corrective action. An important ...
Nachiappan Nagappan, Laurie Williams, Mladen A. Vo...
ISSRE
2007
IEEE
8 years 6 months ago
Towards Self-Protecting Enterprise Applications
Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and impl...
Davide Lorenzoli, Leonardo Mariani, Mauro Pezz&egr...
ISSRE
2007
IEEE
8 years 6 months ago
Fault Prediction using Early Lifecycle Data
The prediction of fault-prone modules in a software project has been the topic of many studies. In this paper, we investigate whether metrics available early in the development li...
Yue Jiang, Bojan Cukic, Tim Menzies
ISSRE
2007
IEEE
8 years 6 months ago
Using Machine Learning to Support Debugging with Tarantula
Using a specific machine learning technique, this paper proposes a way to identify suspicious statements during debugging. The technique is based on principles similar to Tarantul...
Lionel C. Briand, Yvan Labiche, Xuetao Liu
ISSRE
2007
IEEE
8 years 6 months ago
Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records
During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same f...
Mark Sherriff, Mike Lake, Laurie Williams
ISSRE
2007
IEEE
8 years 6 months ago
Testing Security Policies: Going Beyond Functional Testing
While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper i...
Yves Le Traon, Tejeddine Mouelhi, Benoit Baudry
ISSRE
2007
IEEE
8 years 6 months ago
Requirement Error Abstraction and Classification: A Control Group Replicated Study
Gursimran Singh Walia, Jeffrey C. Carver, Thomas P...
books