default search action
35th ISSRE 2024: Tsukuba, Japan - Workshops
- 35th IEEE International Symposium on Software Reliability Engineering, ISSRE 2024 - Workshops, Tsukuba, Japan, October 28-31, 2024. IEEE 2024, ISBN 979-8-3503-6704-1
- James J. Cusick, Lija Basil:
A Global Operational Readiness Review Process: Improving Cloud Availability. 1-6 - Jie Hu, Mingyue Zhang, Bo Liu, Yuechen Wu, Yingfeng Chen:
A Language-guided Acceleration Method for Smoke Testing of Game Quests. 7-12 - Frank Eichenseer, Shinjini Sarkar, Ali Shakeri:
A Systematic Methodology for Specifying the Operational Design Domain of Automated Vehicles. 13-18 - Zeyu Chen, Jidong Xiao, Angelos Stavrou, Haining Wang:
An Exploration of Fuzzing for Discovering Use-After-Free Vulnerabilities. 19-24 - Shenglin Zhang, Xiao Xiong, Mengyao Li, Yongqian Sun, Yongxin Zhao, Xia Chen, Bowen Deng, Dan Pei:
Auto-PIP: Real-time Identification of Critical Performance Inflection Points in Software Stress Testing. 25-30 - Panshi Jin, Lei Xing, Yufei Yang, Zhaojun Hao:
CCBPS: A Hardware-based Data Loss Prevention Approach. 31-36 - Yang Xu, Yong Li, Qiaoluan Xie, Xiaoxiao Zhang, Chao Liu, Thomas Bach, Sunghun Kim, Sanghun Kang:
CrashChecker: A Fusion Method for Clustering Duplicate Crash Failures in SAP HANA Delivery. 37-42 - Alberto Avritzer, James J. Cusick, Andrea Janes, Matteo Camilli, Barbara Russo, Catia Trubiani, Andre van Hoom:
Dependability Modeling in an Industrial Environment. 43-48 - Yudong Liu, Minghua Ma, Pu Zhao, Tianci Li, Bo Qiao, Shuo Li, Ze Li, Murali Chintalapati, Yingnong Dang, Chetan Bansal, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Early Bird: Ensuring Reliability of Cloud Systems Through Early Failure Prediction. 49-54 - Yichi Zhang, Yang Feng, Jianxun Ju:
Engineer Insights: The Challenges of Implementing Agile at Scale in Software Development. 55-60 - Shenglin Zhang, Pengtian Zhu, Minghua Ma, Jiagang Wang, Yongqian Sun, Dongwen Li, Jingyu Wang, Qianying Guo, Xiaolei Hua, Lin Zhu, Dan Pei:
Enhanced Fine-Tuning of Lightweight Domain-Specific Q&A Model Based on Large Language Models. 61-66 - Bharti Chimdyalwar:
Fast and Precise Interval Analysis on Industry code. 67-72 - Yongqian Sun, Yang Guo, Minghan Liang, Xidao Wen, Junhua Kuang, Shenglin Zhang, Hongbo Li, Kaixu Xia, Dan Pei:
Multivariate Time Series Anomaly Detection based on Pre-trained Models with Dual-Attention Mechanism. 73-78 - Weijie Hong, Yong Yang, Junqi Wu, Dongdong Shangguan, Yuanhao Lai, Qiang Bai, Ying Li:
NICSDG: A Non-Intrusive Approach to Constructing Concise Service Dependency Graphs for Microservice Systems. 79-84 - Neetha Jambigi, Joshua Hammesfahr, Moritz Mueller, Thomas Bach, Michael Felderer:
On Enhancing Root Cause Analysis with SQL Summaries for Failures in Database Workload Replays at SAP HANA. 85-90 - Rohlinger Tihomir:
Automated Interpretation of Fleet Incidents to Enable System Level Runtime Assurance. 91-94 - Iva Kertusha:
Search-Based White-Box Fuzzing of Web Frontend Applications. 95-98 - Hansae Ju:
Reliable Online Log Parsing using Large Language Models with Retrieval-Augmented Generation. 99-102 - Indira Febriyanti, Youmei Fan, Kazumasa Shimari, Kenichi Matsumoto, Raula Gaikovina Kula:
How Maintainable is Proficient Code? A Case Study of Three PyPI Libraries. 103-104 - Shuai Zhang, Gangqiang He, Guanping Xiao:
Coding Pitfalls: Demystifying the Potential API Compatibility Risk of Variadic Parameters in Python. 105-106 - Ani Hovhannisyan, Youmei Fan, Gema Rodríguez-Pérez, Raula Gaikovina Kula:
Linking Code and Documentation Churn: Preliminary Analysis. 107-108 - Tetsuya Kitaoka, Yuichiro Kanzaki, Takashi Ishio, Kazumasa Shimari, Kenichi Matsumoto:
Initial Investigation of Behavioral Changes of Obfuscated Programs Caused by Code Optimization. 109-110 - Masato Nakao, Kensei Hamamoto, Masateru Tsunoda, Amjed Tahir, Koji Toda, Akito Monden, Keitaro Nakasai, Kenichi Matsumoto:
On Applying Bandit Algorithm to Fault Localization Techniques. 111-112 - Jingyi Lei, Yi Wu, Nan Hu, Junjie Tao, Yin Wang, Haijun Wang, Ming Fan:
Dynamic Testing for Mobile Privacy Compliance. 113-114 - Masateru Tsunoda, Shohei Sinto, Takeshi Yamada, Hidetsugu Suto:
Assuring Data Integrity on Commercial Gamification Software Considering Productivity: an Industrial Case Study. 115-116 - Scott Lupton, Hironori Washizaki, Naoyasu Ubayashi, Nobukazu Yoshioka:
n-Pipeline Log Anomaly Detection Drift Mitigation. 117-118 - Shinobu Saito, Suguru Endo, Yasunari Suzuki:
Towards N-version Quantum Software Systems for Reliable Classical-Quantum Computing. 119-120 - Takumi Ayukawa, Jati H. Husen, Nobukazu Yoshioka, Hironori Washizaki, Naoyasu Ubayashi:
Toward Pattern-Oriented Machine Learning Reliability Argumentation. 121-122 - James J. Cusick:
A Process Pattern for Cybersecurity Assessment Automation: Experience and Futures. 123-126 - Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, Satoshi Yazawa, Kozo Okano, Takao Okubo, Hironori Washizaki:
Toward Extracting Learning Pattern: A Comparative Study of GPT-4o-mini and BERT Models in Predicting CVSS Base Vectors. 127-134 - Yong Liu, Ruishi Huang, Jizhe Yang, Binbin Yang, ShuMei Wu:
TLFL: Token-Level Fault Localization for Novice Programs via Graph Representation Learning. 135-142 - Wei Jiang, Sijin Dong, Jiaming Zhang, Jin Tang, Zichao Zhang, Chang-Ai Sun, Xiaoyi Zhang:
Towards Mutation Testing of Embedded Software: A Framework and Case Study. 143-150 - Lejin Li, Xiao-Yi Zhang, Shuncheng Tang, Zhenya Zhang, Jianjun Zhao:
Impact of V2V Communication on Robustness of Autonomous Driving Systems. 151-154 - Xiao Xiao, Tomoya Tanahashi, Tadashi Dohi:
A Web-based Tool for Predicting Software Development Effort. 155-160 - Ying Xing, Jiaqi Huang, Guilong Wang, Yehao You, Bin Yang, Xiaofeng Li, Yixing Luo:
Data Augmentation for Vulnerability Detection Based on Code Refactoring and Mixup. 161-168 - Meixian Zhang, Xue Shi, Jiaxin Huang, Lide Su, Yanan Zhang:
DynTrackr: A Robust Two-Stage Framework with Attribute Enhancement for KPI Anomaly Detection. 169-176 - Yin Wu, Haijun Wang, Yuanhui Zhang, Xitao Li, Hao Wu, Ming Fan, Ting Liu:
Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios. 177-178 - Jinfu Chen, Zhehao Li, Dongjie Wang:
HyWE: A Hybrid Word Embedding Method for Smart Contract Vulnerability Detection. 179-186 - Xiangzhong Yu, Wai Kin Wong, Shuai Wang:
EMI Testing of Large Language Model (LLM) Compilers. 187-190 - Carmen Cârlan, Noah Carlson, Chris Dwyer, Manoja Hirannaiah, Michael Wagner:
The SOTIF Meta-Algorithm: Quantitative Analyses of the Safety of Autonomous Behaviors. 191-198 - Robin Bloomfield, John Rushby:
Models are Central to AI Assurance. 199-202 - Torin Viger, Logan Murphy, Simon Diemert, Claudio Menghi, Marsha Chechik:
Supporting Change Impact Assessment with LLMs. 203-204 - Alec Banks, Prathyush P. Menon, Steve Austen:
Removing the Big Red Button: Uncrewed Ground Vehicles in Complex Military Environments. 205-208 - Tomas Bueno Momcilovic, Dian Balta, Beat Buesser, Giulio Zizzo, Mark Purcell:
Developing Assurance Cases for Adversarial Robustness and Regulatory Compliance in LLMs. 209-215 - Justin W. Firestone, Myra B. Cohen, Robyn R. Lutz:
SynBioTrace: Integrating Safety and Security Artifacts to Build Assurance Cases for Synthetic Biology Applications. 216-223 - Anthony Shenouda, Tiziano Santilli, Faezeh Siavashi, Thomas Chiang, Nicholas Annable, Horacio Hoyos Rodriguez, Richard F. Paige, Patrizio Pelliccione, Mark Lawford, Alan Wassyng, Vera Pantelic:
Using Boundary Objects for Continuous Compliance in Automotive Development. 224-231 - Mauricio Castillo-Effen, Carter E. Veldhuizen, Charles D. Lutz:
A Digital Assurance Framework. 232-235 - Nicholas Annable, Mark Lawford, Richard F. Paige, Alan Wassyng:
Generating Understandable and Reusable Safety Assurance Cases using Workflow+. 236-239 - Georg Hägele, Abdelbaki Bouguerra, Arezoo Sarkheyli-Hägele:
Towards the Certification of an Evacuation Assistance System Utilizing AI-based Approaches. 240-246 - Max Scheerer, Marius Take, Jonas Klamroth:
Quantifying Lower Reliability Bounds of Deep Neural Networks. 247-254 - Amit Sahu, Carmen Cârlan:
Defect-based Testing for Safety-critical ML Components. 255-262 - Bing Huang, Kwok-Yan Lam:
A Survey on Physical Event Verification in User-centric Smart Home Systems. 263-270 - Camille Fayollas, Célia Martinie, Philippe A. Palanque:
Taking into Account Human Error when Assessing the Impact of Dependability on Usability. 271-278 - Vivian White, Alyssa White, Jason Wild, Fuqun Huang:
Human Error Scenario Analysis of Software Defects. 279-286 - Qingran Su, Xingze Li, Yuming Ren, Xulang Ouyang, Chunming Hu, Yongfeng Yin:
State Diagram Extension and Test Case Generation Based on Large Language Models for Improving Test Engineers' Efficiency in Safety Testing. 287-294 - Jonathan Sillito, Matt Pope:
Failing and Learning: A Study of What is Learned About Reliability From Software Incidents. 295-302 - Zoé Lagache, Annabelle Mercier, Oum-El-Kheir Aktouf, Arthur Baudet:
Toward CPS Security Monitoring: Employing Multi-Agent Systems and Digital Twins. 303-306 - Kiyoshi Honda, Hironori Washizaki, Yoshiaki Fukazawa, Masahiro Taga, Akira Matsuzaki, Kazuyuki Nakagawa, Yusuke Sakai:
An Empirical Study on Predicting Software Development Bugs Using Dynamic Bayesian Networks. 307-310 - Leyang Xu, Xinghao Yang:
A Novel Fuzzing Mutation Scheduling Method based on Evolutionary Strategy. 311-312 - Ippo Hiroi, Fumio Machida, Ermeson Carneiro de Andrade:
Energy Bugs in Object Detection Software on Battery-Powered Devices. 313-320 - Yuto Sugawa, Chisato Murakami, Mamoru Ohara:
C Source Code Generation from IR towards Making Bug Samples to Fluctuate for Machine Learning. 321-328 - Andrea Ceccarelli, Leonardo Montecchi:
Better and safer autonomous driving with predicted object relevance. 329-336 - Linyun Gao, Qiang Wen, Fumio Machida:
Safety-Aware Weighted Voting for N-version Traffic Sign Recognition System. 337-344 - Jiawei Wang, João R. Campos, Henrique Madeira:
Towards Improved Perception System's Generalization Through Generative Artificial Intelligence. 345-352 - Zimu Tang, Jun Ai, Jie Wang:
Enhancing Neuron Coverage of DNN Models for Adversarial Testing. 353-360 - Wenxiao Zhang, Xiangrui Kong, Conan Dewitt, Thomas Braunl, Jin B. Hong:
A Study on Prompt Injection Attack Against LLM-Integrated Mobile Robotic Systems. 361-368 - Zifan Zeng, Chongzhe Zhang, Feng Liu, Joseph Sifakis, Qunli Zhang, Shiming Liu, Peng Wang:
World Models: The Safety Perspective. 369-376 - Pavlo Vlastos, Irfan Sljivo, Corey Carter, Aaron Woodard:
Developing a Dependable Multi-Agent Rover Swarm Using cFS. 377-382 - Lizhi Zhang, Jingwei Fu, Yan He, Xiaobin Jiang:
Toward Deterministic Wireless Communication: Latency Prediction Using Network Measurement Data. 383-384 - Chuqi Guo, Yu Lin, Ling Dong, Zhijie Feng, Luyao Ye, Wenhua Hu, Siwei Zhou, Jianwen Xiang:
Reliability Analysis of Man-Machine Systems Considering Imperfect Error Coverage Model. 385-390 - Ning Lu, Qian Xie, Hao Zhang, Wenyi Fang, Yang Zheng, Zheng Hu, Jiantao Ma:
Training Overhead Ratio: A Practical Reliability Metric for Large Language Model Training Systems. 391-393 - Nianqiu Wang, Fumio Machida:
A CTMDP Modeling for Multi-Stage Software Aging and Rejuvenation. 394-401 - Leonardo Scommegna, Marco Becattini, Giovanni Fontani, Leonardo Paroli, Enrico Vicario:
Quantitative evaluation of software rejuvenation of a pool of service replicas. 402-409 - Alberto Avritzer, Andrea Janes, Andrea Marin, Daniel S. Menasché, Catia Trubiani, André B. Bondi, James J. Cusick:
Measurements and Models for Resiliency Assessment of VM clusters under Aging and Rejuvenation. 410-417 - Carlos Eduardo De Schuller Banjar, Daniel Sadoc Menasché, Alberto Avritzer:
Splitting Application Input into Batches as a Countermeasure Against Software Aging. 418-425 - Kojiro Soeda, Xiao Xiao:
Evaluation of software aging in Hyperledger Fabric. 426-433
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.