default search action
27th APSEC 2020: Virtual Event, Singapore
- 27th Asia-Pacific Software Engineering Conference, APSEC 2020, Singapore, December 1-4, 2020. IEEE 2020, ISBN 978-1-7281-9553-7
- Yingying Shi, Shengping Xiao, Jianwen Li, Jian Guo, Geguang Pu:
SAT-Based Automata Construction for LTL over Finite Traces. 1-10 - Mingyue Jiao, Yanhong Huang, Jianqi Shi, Fangda Cai, Rongfeng Lin:
Fault Diagnosis of Simplified Fault Trees using State Transition Diagrams. 11-20 - Duong Dinh Tran, Dang Duy Bui, Parth Gupta, Kazuhiro Ogata:
Lemma Weakening for State Machine Invariant Proofs. 21-30 - Kazi Zakia Sultana, Zadia Codabux, Byron J. Williams:
Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities. 31-40 - Yanxin Zhang, Guanping Xiao, Zheng Zheng, Tianqing Zhu, Ivor W. Tsang, Yulei Sui:
An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps. 41-50 - Sandip Ghosal, R. K. Shyamasundar:
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs. 51-60 - Wei Yuan, Binhang Qi, Hailong Sun, Xudong Liu:
DependLoc: A Dependency-based Framework For Bug Localization. 61-70 - Bo Lin, Shangwen Wang, Ming Wen, Zhang Zhang, Hongjun Wu, Yihao Qin, Xiaoguang Mao:
Understanding the Non-Repairability Factors of Automated Program Repair Techniques. 71-80 - Tianhang Zhang, Qingfeng Du, Jincheng Xu, Jiechu Li, Xiaojun Li:
Software Defect Prediction and Localization with Attention-Based Models and Ensemble Learning. 81-90 - Irman Faqrizal, Gwen Salaün:
Clusters of Faulty States for Debugging Behavioural Models. 91-99 - Xinjun Mao, Hao Huang, Shuo Wang:
Software Engineering for Autonomous Robot: Challenges, Progresses and Opportunities. 100-108 - Rui Li, Hao Shi, Wanwei Liu, Wei Dong:
Synthesizing Cooperative Controllers from Global Tasks of Multi-robot Systems. 109-118 - Muhammad Waseem, Peng Liang, Gastón Márquez, Amleto Di Salle:
Testing Microservices Architecture-Based Applications: A Systematic Mapping Study. 119-128 - Ashalatha Kunnappilly, Peter Backeman, Cristina Seceleanu:
UML-based Modeling and Analysis of 5G Service Orchestration. 129-138 - Ismaïl Mendil, Neeraj Kumar Singh, Yamine Aït Ameur, Dominique Méry, Philippe A. Palanque:
An Integrated Framework for the Formal Analysis of Critical Interactive Systems. 139-148 - Yuwei Ma, Qianying Zhang, Shijun Zhao, Guohui Wang, Ximeng Li, Zhiping Shi:
Formal Verification of Memory Isolation for the TrustZone-based TEE. 149-158 - Wenbo Zhou, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi:
A Coloured Petri Nets Based Attack Tolerance Framework. 159-168 - Tengfei Li, Jing Liu, Jiexiang Kang, Haiying Sun, Xiaohong Chen, Li Han:
Model Checking of Spatial Logic. 169-177 - Nan Messe, Nicolas Belloir, Vanea Chiprianov, Jamal El Hachem, Régis Fleurquin, Salah Sadou:
An Asset-Based Assistance for Secure by Design. 178-187 - Duoyuan Ma, Yude Bai, Zhenchang Xing, Lintan Sun, Xiaohong Li:
A Knowledge Graph-based Sensitive Feature Selection for Android Malware Classification. 188-197 - Ningning Chen, Huibiao Zhu, Yuan Fei, Lili Xiao, Jiaqi Yin:
Modeling and Verifying Data Access Mechanism of NLSR Trust Model. 198-207 - Bakheet Aljedaani, Aakash Ahmad, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective. 208-217 - Jaydeb Sarker, Asif Kamal Turzo, Amiangshu Bosu:
A Benchmark Study of the Contemporary Toxicity Detectors on Software Engineering Interactions. 218-227 - Jacob Stringer, Amjed Tahir, Kelly Blincoe, Jens Dietrich:
Technical Lag of Dependencies in Major Package Managers. 228-237 - Chenhui Feng, Tao Wang, Yue Yu, Yang Zhang, Yanzhi Zhang, Huaimin Wang:
Sia-RAE: A Siamese Network based on Recursive AutoEncoder for Effective Clone Detection. 238-246 - Yiwen Wu, Yang Zhang, Tao Wang, Huaimin Wang:
Dockerfile Changes in Practice: A Large-Scale Empirical Study of 4, 110 Projects on GitHub. 247-256 - Chaojin Wang, Jian Shen:
Floating Point Accuracy Testing in Deep Neural Network Computations via Hypothesis Testing. 257-265 - Lingjun Zhou, Bing Yu, David Berend, Xiaofei Xie, Xiaohong Li, Jianjun Zhao, Xusheng Liu:
An Empirical Study on Robustness of DNNs with Out-of-Distribution Awareness. 266-275 - Lei Shen, Wangshu Liu, Xiang Chen, Qing Gu, Xuejun Liu:
Improving Machine Learning-Based Code Smell Detection via Hyper-Parameter Optimization. 276-285 - Hongzhen Zhong, Hai Wan, Weilin Luo, Zhanhao Xiao, Jia Li, Biqing Fang:
Structural Similarity of Boundary Conditions and an Efficient Local Search Algorithm for Goal Conflict Identification. 286-295 - Noriko Hanakawa:
An education model for project-based learning using ability map in various target products. 296-305 - Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Hajimu Iida:
Understanding Build Errors in Agile Software Development Project-Based Learning. 306-315 - Antonio Martini, Terese Besker, Jan Bosch:
Process Debt: a First Exploration. 316-325 - Sangwon Hyun, Jiyoung Song, Seungchyul Shin, Young Min Baek, Doo-Hwan Bae:
Pattern-based Analysis of Interaction Failures in Systems-of-Systems: a Case Study on Platooning. 326-335 - Young Min Baek, Zelalem Mihret, Yong-Jun Shin, Doo-Hwan Bae:
A Modeling Method for Model-based Analysis and Design of a System-of-Systems. 336-345 - Aiswarya Raj Munappy, Jan Bosch, Helena Holmström Olsson, Tian J. Wang:
Towards Automated Detection of Data Pipeline Faults. 346-355 - Canh Minh Do, Kazuhiro Ogata:
A divide & conquer approach to testing concurrent programs with JPF*. 356-364 - Lwin Khin Shar, Ta Nguyen Binh Duong, Lingxiao Jiang, David Lo, Wei Minn, Glenn Kiah Yong Yeo, Eugene Kim:
SmartFuzz: An Automated Smart Fuzzing Approach for Testing SmartThings Apps. 365-374 - Aleksandr Pilgun:
Don't Trust Me, Test Me: 100% Code Coverage for a 3rd-party Android App. 375-384 - Hongyi Zhang, Jan Bosch, Helena Holmström Olsson:
Federated Learning Systems: Architecture Alternatives. 385-394 - Meenu Mary John, Helena Holmström Olsson, Jan Bosch:
AI Deployment Architecture: Multi-Case Study for Key Factor Identification. 395-404 - Hugo Sica de Andrade, Christian Berger, Ivica Crnkovic, Jan Bosch:
Principles for Re-architecting Software for Heterogeneous Platforms. 405-414 - Qian Liu, Robert de Simone, Xiaohong Chen, Jiexiang Kang, Jing Liu, Wei Yin, Hui Wang:
Multiform Logical Time & Space for Mobile Cyber-Physical System With Automated Driving Assistance System. 415-424 - Zhang Zhang, Xinjun Mao, Yao Lu, Shangwen Wang, Jinyu Lu:
An Empirical Study on the Influence of Social Interactions for the Acceptance of Answers in Stack Overflow. 425-434 - Iris Figalist, Marco Dieffenbacher, Isabella Eigner, Jan Bosch, Helena Holmström Olsson, Christoph Elsner:
Mining Customer Satisfaction on B2B Online Platforms using Service Quality and Web Usage Metrics. 435-444 - Yoshiki Higo, Shinsuke Matsumoto, Taeyoung Kim, Shinji Kusumoto:
How Weak Reference is Used in Java Projects? 445-449 - Rui Song, Tong Li, Zhiming Ding:
Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction Approach. 450-454 - Tasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto:
CLIONE: Clone Modification Support for Pull Request Based Development. 455-459 - Miaoying Wang, Weixing Ji, Dejiang Jing, Hui Liu:
Identification of Misleading Location Information in Compiler Diagnoses. 460-464 - Sajid Anwer, Lian Wen, Zhe Wang:
A Formal Model for Behavior Trees Based on Context - Free Grammar. 465-469 - Chen Zhi, Jianwei Yin, Junxiao Han, Shuiguang Deng:
A Preliminary Study on Sensitive Information Exposure Through Logging. 470-474 - Masanao Asato, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization. 475-479 - Puneet Bhateja:
Asynchronous test equivalence for probabilistic processes. 480-484 - Satish Siddharth, Sircar Saurav, Kan Jiang, Bimlesh Wadhwa, Jin Song Dong:
Model Driven Inputs to aid Athlete's Decision Making. 485-489 - Xinhao Zheng, Lin Li, Dong Zhou:
An Attentive Deep Supervision based Semantic Matching Framework For Tag Recommendation in Software Information Sites. 490-494 - Yuekang Li, Hongxu Chen, Cen Zhang, Siyang Xiong, Chaoyi Liu, Yi Wang:
Ori: A Greybox Fuzzer for SOME/IP Protocols in Automotive Ethernet. 495-499 - Kun Ma, Kun Liu, Lixin Du:
Automated Assessment and Evaluation of Contribution of Collaborative Software Engineering Development Process. 500-504 - Chetna Gupta, Varun Gupta:
Requirements Risk Estimation Using TOPSIS Method. 505-506 - Ryo Soga, Tetsuya Yonemitsu, Mitsuo Inagaki, Yasushi Fujisaki, Hiroo Sugou, Hideyuki Kanuka:
A Program Simplification Method for Generating Test Input Values Using Symbolic Execution. 507-508 - Zhuoyao Wang, Changguo Guo, Jiaqi Gao, Shazhou Yang:
Towards tracking the development process of the server ecosystems using open-source data. 509-510 - Youngkyoung Kim, Misoo Kim, Eunseok Lee:
Feature Combination to Alleviate Hubness Problem of Source Code Representation for Bug Localization. 511-512 - Meng Zhang, Pengcheng Zhang, Xiapu Luo, Feng Xiao:
Source Code Obfuscation for Smart Contracts. 513-514 - Md. Masudur Rahman, Abdus Satter:
A Context Based Approach for Recommending Move Class Refactoring. 515-516
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.