default search action
SSIRI 2010: Singapore
- Fourth International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2010, Singapore, June 9-11, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4086-3
Invited Keynote Paper
- Jim Woodcock, Marcel Oliveira, Alan Burns, Kun Wei:
Modelling and Implementing Complex Systems with Timebands. 1-13
Safety & Anomaly Detection
- W. Eric Wong, Vidroha Debroy, Adithya Surampudi, HyeonJeong Kim, Michael F. Siok:
Recent Catastrophic Accidents: Investigating How Software was Responsible. 14-22 - Anh Tuan Luu, Man Chun Zheng, Thanh Tho Quan:
Modeling and Verification of Safety Critical Systems: A Case Study on Pacemaker. 23-32 - Yuzhang Feng, Yang Liu, Yuan-Fang Li, Daqing Zhang:
Discovering Anomalies in Semantic Web Rules. 33-42
Model Checking and Verification
- Shao Jie Zhang, Yang Liu:
Model Checking a Lazy Concurrent List-Based Set Algorithm. 43-52 - Fazle Rabbi, Hao Wang, Wendy MacCaull:
YAWL2DVE: An Automated Translator for Workflow Verification. 53-59 - Christof J. Budnik, Rajesh Subramanyan, Raj Tanikella:
Scalable V&V Effort Estimation for Ultra-Large-Scale Systems. 60-68
Security Requirements (Invited Session)
- Kenji Taguchi, Nobukazu Yoshioka, Takayuki Tobita, Hiroyuki Kaneko:
Aligning Security Requirements and Security Assurance Using the Common Criteria. 69-77 - Moussa Ouedraogo, Haralambos Mouratidis, Djamel Khadraoui, Eric Dubois:
An Agent-Based System to Support Assurance of Security Requirements. 78-87 - Thein Than Tun, Yijun Yu, Charles B. Haley, Bashar Nuseibeh:
Model-Based Argument Analysis for Evolving Security Requirements. 88-97
Software Reliability
- Atef Mohamed, Mohammad Zulkernine:
Failure Type-Aware Reliability Assessment with Component Failure Dependency. 98-105 - Jinxia An, Jihong Zhu:
Software Reliability Modeling with Integrated Test Coverage. 106-112 - Odair Jacinto da Silva, Adalberto Nobiato Crespo, Marcos Lordello Chaim, Mário Jino:
Sensitivity of Two Coverage-Based Software Reliability Models to Variations in the Operational Profile. 113-120
Software Testing I
- Fevzi Belli, Mutlu Beyazit:
A Formal Framework for Mutation Testing. 121-130 - Zhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ahmed E. Hassan, Parminder Flora:
An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs. 131-140 - Rui Peng, Q. P. Hu, Szu Hui Ng, Min Xie:
Testing Effort Dependent Software FDP and FCP Models with Consideration of Imperfect Debugging. 141-146 - Shaoying Liu, Shin Nakajima:
A Decompositional Approach to Automatic Test Case Generation Based on Formal Specifications. 147-155
Quality Improvement
- May Tar Hla Myint, Thandar Thein:
Availability Improvement in Virtualized Multiple Servers with Software Rejuvenation and Virtualization. 156-162 - Dae-Yeob Kim, Cheong Youn:
Traceability Enhancement Technique through the Integration of Software Configuration Management and Individual Working Environment. 163-172 - Xiangyu Luo, Yun Wang:
Recoverability of Erasure Codes Based and Intensively Written Storage Systems. 173-179 - Kun Tian, Kendra M. L. Cooper, Kang Zhang, Siyuan Liu:
Towards a New Understanding of Advice Interference. 180-189
Software Testing II
- Junhua Ding, Tong Wu, Jun Q. Lu, Xin-Hua Hu:
Self-Checked Metamorphic Testing of an Image Processing Program. 190-197 - Hossain Shahriar, Mohammad Zulkernine:
PhishTester: Automatic Testing of Phishing Attacks. 198-207 - Fevzi Belli, Axel Hollmann, W. Eric Wong:
Towards Scalable Robustness Testing. 208-216
Modeling & Analysis
- Xian Zhang, Yang Liu, Mikhail Auguston:
Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP. 217-226 - Senthil Kumar Chandran, Aleksandar Dimov, Sasikumar Punnekkat:
Modeling Uncertainties in the Estimation of Software Reliability . 227-236 - Jing Cao, Albert Nymeyer:
The 'Best' Valid Safe Protocol Converter. 237-243
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.