1. A. Johanson and W. Hasselbring, “Software Engineering for Computational Science: Past, Present, Future,” Computing in Science and Engineering, Vol. 20, No. 2, pp. 90-109, 2018 2. M. P. Cristescu, J. A. Vasilev, M. V. Stoyanova,A. -M. R. Stancu, “Capability and Maturity. Characteristics Used in Software Reliability Engineering Modeling,”Land Forces Academy Review, Vol. 24, pp. 332-341, 2019 3. M. L. Gromov, S. A. Prokopenko, N. V. Shabaldina,A. V. Laputenko, “Model based JUnit Testing,” in Proceedings of the 20th International Conference of Young Specialists on Micro/Nanotechnologies and Electron Devices (EDM), pp. 139-142, Erlagol, Russia, 2019 4. S. M. Shariff, H. Li, C. -P. Bezemer, A. E. Hassan, T. H. Nguyen, and P. Flora, “Improving the Testing Efficiency of Selenium-based Load Tests,” inProceedings of the IEEE/ACM 14th International Workshop on Automation of Software Test (AST), pp. 14-20, Montreal, QC, Canada, 2019 5. P. Liu, Y. Li,Z. Li, “Some Thoughts on Model-based Test Optimization,” in Proceedings of the IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 268-274, Sofia, Bulgaria, 2019 6. P. Liu, H. -K. Miao, H. -W. Zeng, and Y. Liu, “FSM-based Testing: Theory, Method and Evaluation,”Jisuanji Xuebao (Chinese Journal of Computers), Vol. 34, pp. 965-984, 2011 7. Y. Chen, A. Wang, J. Wang, L. Liu, Y. Song,Q. Ha, “Automatic Test Transition Paths Generation Approach from EFSM using State Tree,” inProceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 87-93, Lisbon, Portugal, 2018 8. P. Liu and Z. Xu, “MTTool: A Tool for Software Modeling and Test Generation,”IEEE Access, Vol. 6, pp. 56222-56237, 2018 9. C. Kallepalli and J. Tian, “Measuring and Modeling Usage and Reliability for Statistical Web Testing,”IEEE Transactions on Software Engineering, Vol. 27, pp. 1023-1036, 2001 10. Q. Song, M. Shepperd, M. Cartwright,C. Mair, “Software Defect Association Mining and Defect Correction Effort Prediction,”IEEE Transactions on Software Engineering, Vol. 32, pp. 69-82, 2006 11. A. Miranskyy, A. Hamou-Lhadj, E. Cialini,A. Larsson, “Operational-Log Analysis for Big Data Systems: Challenges and Solutions,”IEEE Software, Vol. 33, pp. 52-59, 2016 12. M. A.Hernández and S. J. Stolfo, “Real-World Data is Dirty: Data Cleansing and the Eerge/Purge Problem,”Data Mining and Knowledge Discovery, Vol. 2, pp. 9-37, 1998 13. H. Liu, S. Shah,W. Jiang, “On-Line Outlier Detection and Data Cleaning,”Computers and Chemical Engineering, Vol. 28, pp. 1635-1647, 2004 14. J. Tang, H. Li, Y. Cao,Z. Tang, “Email Data Cleaning,” in Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 489-498, Chicago, USA, 2005 15. X. Xu, Y. Lei,Z. Li, “An Incorrect Data Detection Method for Big Data Cleaning of Machinery Condition Monitoring,”IEEE Transactions on Industrial Electronics, Vol. 67, pp. 2326-2336, 2019 16. Y. -J. Chen and H. -Y. Chien, “IoT-based Green House System with Splunk Data Analysis,” in Proceedings of the IEEE 8th International Conference on Awareness Science and Technology (iCAST), pp. 260-263, Taichung, Taiwan, 2017 17. C. Lim, N. Singh,S. Yajnik, “A Log Mining Approach to Failure Analysis of Enterprise Telephony Systems,” in Proceedings of the IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN), pp. 398-403, Anchorage, AK, USA, 2008 18. Z. M. Jiang, A. Avritzer, E. Shihab, A. E. Hassan,P. Flora, “An Industrial Case Study on Speeding up User Acceptance Testing by Mining Execution Logs,” in Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, pp. 131-140, Singapore, 2010 19. V. A. Rubin, A. A. Mitsyuk, I. A. Lomazova,W. M. van der Aalst, “Process Mining can be Applied to Software too!,” in Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 1-8, Torino, Italy, 2014 20. C. Ioannou, A. Burattin,B. Weber, “Mining Developers’ Workflows from Ide Usage,” in Proceedings of the International Conference on Advanced Information Systems Engineering, pp. 167-179, Tallinn, Estonia, 2018 21. M. Nottingham and R. Fielding, “Additional HTTP Status Codes,” Internet Engineering Task Force (IETF), 2012 22. W. E. Wong, R. Gao, Y. Li, R. Abreu,F. Wotawa, “A Survey on Software Fault Localization,”IEEE Transactions on Software Engineering, Vol. 42, pp. 707-740, 2016 |