default search action
25th ASE 2010: Antwerp, Belgium
- Charles Pecheur, Jamie Andrews, Elisabetta Di Nitto:
ASE 2010, 25th IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, September 20-24, 2010. ACM 2010, ISBN 978-1-4503-0116-9 - Jan Bosch:
Keynote address: toward compositional software engineering. 1-2
Design and architecture
- Marwan Abi-Antoun, Jeffrey M. Barnes:
Analyzing security architectures. 3-12 - Christian Hirsch, John G. Hosking, John C. Grundy:
VikiBuilder: end-user specification and generation of visual wikis. 13-22 - Nicolas Mangano, Alex Baker, Mitch Dempsey, Emily Oh Navarro, André van der Hoek:
Software design sketching with calico. 23-32
Natural language processing and generation
- Raymond P. L. Buse, Westley Weimer:
Automatically documenting program changes. 33-42 - Giriprasad Sridhara, Emily Hill, Divya Muppaneni, Lori L. Pollock, K. Vijay-Shanker:
Towards automatically generating summary comments for Java methods. 43-52 - Hui Yang, Alistair Willis, Anne N. De Roeck, Bashar Nuseibeh:
Automatic detection of nocuous coordination ambiguities in natural language requirements. 53-62
Architecture and product lines
- Michael Vierhauser, Paul Grünbacher, Alexander Egyed, Rick Rabiser, Wolfgang Heider:
Flexible and scalable consistency checking on product line variability models. 63-72 - Thorsten Berger, Steven She, Rafael Lotufo, Andrzej Wasowski, Krzysztof Czarnecki:
Variability modeling in the real: a perspective from the operating systems domain. 73-82 - Deshan Cooray, Sam Malek, Roshanak Roshandel, David Kilgore:
RESISTing reliability degradation through proactive reconfiguration. 83-92
Bug finding
- Guangtai Liang, Ling Wu, Qian Wu, Qianxiang Wang, Tao Xie, Hong Mei:
Automatic construction of an effective training set for prioritizing static analysis warnings. 93-102 - Julia Lawall, David Lo:
An automated approach for finding variable-constant pairing bugs. 103-112 - Marouane Kessentini, Stéphane Vaucher, Houari A. Sahraoui:
Deviance from perfection is a better criterion than closeness to evil when identifying risky code. 113-122
Poster session I
- Heiko Paulheim:
Seamlessly integrated, but loosely coupled: building user interfaces from heterogeneous components. 123-126 - Suntae Kim, Dae-Kyoo Kim, Sooyong Park:
Tool support for quality-driven development of software architectures. 127-130 - Kunal Taneja, Nuo Li, Madhuri R. Marri, Tao Xie, Nikolai Tillmann:
MiTV: multiple-implementation testing of user-input validators for web applications. 131-134 - Zhenchang Xing:
Model comparison with GenericDiff. 135-138 - Chang Hwan Peter Kim, Don S. Batory, Sarfraz Khurshid:
Eliminating products to test in a software product line. 139-142 - Reiner Hähnle, Marcus Baum, Richard Bubel, Marcel Rothe:
A visual interactive debugger based on symbolic execution. 143-146 - Óscar Sánchez Ramón, Jesús Sánchez Cuadrado, Jesús García Molina:
Model-driven reverse engineering of legacy graphical user interfaces. 147-150 - Gabriele Bavota, Andrea De Lucia, Andrian Marcus, Rocco Oliveto:
A two-step technique for extract class refactoring. 151-154 - Wanchun Li, Mary Jean Harrold, Carsten Görg:
Detecting user-visible failures in AJAX web applications by analyzing users' interaction behaviors. 155-158 - Hamid Bagheri, Yuanyuan Song, Kevin J. Sullivan:
Architectural style as an independent variable. 159-162 - LiGuo Huang, Daniel Port, Liang Wang, Tao Xie, Tim Menzies:
Text mining in supporting software systems risk assurance. 163-166
Formal demos I
- Benjamin Biegel, Stephan Diehl:
JCCD: a flexible and extensible API for implementing custom code clone detectors. 167-168 - Eduardo Cunha de Almeida, João Eugenio Marynowski, Gerson Sunyé, Patrick Valduriez:
PeerUnit: a framework for testing peer-to-peer systems. 169-170 - Rémi Mélisson, Philippe Merle, Daniel Romero, Romain Rouvoy, Lionel Seinturier:
Reconfigurable run-time support for distributed service component architectures. 171-172 - Hugo Bruneliere, Jordi Cabot, Frédéric Jouault, Frédéric Madiot:
MoDisco: a generic and extensible framework for model driven reverse engineering. 173-174 - Moritz Balz, Michael Striewe, Michael Goedicke:
Tool support for continuous maintenance of state machine models in program code. 175-176 - Cameron M. Hine, Jean-Guy Schneider, Steven Versteeg:
Reac2o: a runtime for enterprise system models. 177-178 - Corina S. Pasareanu, Neha Rungta:
Symbolic PathFinder: symbolic execution of Java bytecode. 179-180 - Raffi Khatchadourian, Benjamin Muskalla:
Enumeration refactoring: a tool for automatically converting Java constants to enumerated types. 181-182 - Cordell Green:
Keynote address: the actual implementation will be derived from the formal specification -- KBSA, 1983. 183-184
Model-driven development
- Asadullah Shaikh, Robert Clarisó, Uffe Kock Wiil, Nasrullah Memon:
Verification-driven slicing of UML/OCL models. 185-194 - Senthil Mani, Vibha Singhal Sinha, Pankaj Dhoolia, Saurabh Sinha:
Automated support for repairing input-model faults. 195-204 - Brice Morin, Tejeddine Mouelhi, Franck Fleurey, Yves Le Traon, Olivier Barais, Jean-Marc Jézéquel:
Security-driven model-based dynamic adaptation. 205-214
Model checking
- KyungHee Kim, Tuba Yavuz-Kahveci, Beverly A. Sanders:
JRF-E: using model checking to give advice on eliminating memory model-related bugs. 215-224 - Ru He, Paul Jennings, Samik Basu, Arka P. Ghosh, Huaiqing Wu:
A bounded statistical approach for model checking of unbounded until properties. 225-234 - Sylvain Hallé, Taylor Ettema, Chris Bunch, Tevfik Bultan:
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines. 235-244
Requirements
- Marek Gibiec, Adam Czauderna, Jane Cleland-Huang:
Towards mining replacement queries for hard-to-retrieve traces. 245-254 - Massila Kamalrudin, John C. Grundy, John G. Hosking:
Tool support for essential use cases to better capture software requirements. 255-264
Mining software repositories
- Renuka Sindhgatta, Nanjangud C. Narendra, Bikram Sengupta, Karthik Visweswariah, Arthur G. Ryman:
Timesheet assistant: mining and reporting developer effort. 265-274 - Weiyi Shang, Bram Adams, Ahmed E. Hassan:
An experience report on scaling tools for mining software repositories using MapReduce. 275-284
Poster session II
- Xuanzhe Liu, Qi Zhao, Gang Huang, Zhi Jin, Hong Mei:
iMashup: assisting end-user programming for the service-oriented web. 285-288 - Kunal Taneja, Yi Zhang, Tao Xie:
MODA: automated test generation for database applications via mock objects. 289-292 - Wujie Zheng, Qirun Zhang, Michael R. Lyu, Tao Xie:
Random unit-test generation with MUT-aware sequence recommendation. 293-296 - Norhayati Mohd. Ali, John G. Hosking, John C. Grundy, Jun Huh:
End-user oriented critic specification for domain-specific visual language tools. 297-300 - Do Thi Bich Ngoc, Mizuhito Ogawa:
Checking roundoff errors using counterexample-guided narrowing. 301-304 - Rich Hilliard, Ivano Malavolta, Henry Muccini, Patrizio Pelliccione:
Realizing architecture frameworks through megamodelling techniques. 305-308 - Mircea Lungu, Romain Robbes, Michele Lanza:
Recovering inter-project dependencies in software ecosystems. 309-312 - Eric M. Schulte, Stephanie Forrest, Westley Weimer:
Automated program repair through the evolution of assembly code. 313-316 - Rafael V. Borges, Artur S. d'Avila Garcez, Luís C. Lamb:
Integrating model verification and self-adaptation. 317-320 - Ekrem Kocaguneli, Gregory Gay, Tim Menzies, Ye Yang, Jacky W. Keung:
When to use data from other projects for effort estimation. 321-324 - David Woollard, Chris Mattmann, Daniel Popescu, Nenad Medvidovic:
Kadre: domain-specific architectural recovery for scientific software systems. 325-328 - Shadi Abdul Khalek, Sarfraz Khurshid:
Automated SQL query generation for systematic testing of database engines. 329-332 - Quentin Boucher, Andreas Classen, Patrick Heymans, Arnaud Bourdoux, Laurent Demonceau:
Tag and prune: a pragmatic approach to software product line implementation. 333-336 - Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry W. Boehm:
Reducing estimation uncertainty with continuous assessment: tracking the "cone of uncertainty". 337-340 - Sukanya Ratanotayanon, Hye Jung Choi, Susan Elliott Sim:
Using transitive changesets to support feature location. 341-344
Formal demos II
- Jocelyn Simmonds, Marsha Chechik:
RuMoR: monitoring and recovery for BPEL applications. 345-346 - Alexander Reder, Alexander Egyed:
Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML. 347-348 - A. C. Rajeev, Prahladavaradan Sampath, K. C. Shashidhar, S. Ramesh:
CoGenTe: a tool for code generator testing. 349-350 - Willem Visser, Jaco Geldenhuys:
Impendulo: debugging the programmer. 351-352 - Zhenchang Xing, Jun Sun, Yang Liu, Jin Song Dong:
SpecDiff: debugging formal specifications. 353-354 - Gregor Gabrysiak, Holger Giese, Andreas Seibel:
Deriving behavior of multi-user processes from interactive requirements validation. 355-356 - Lionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre-Yves Schobbens, Hubert Toussaint:
Tool support for code generation from a UMLsec property. 357-358 - David Harel, Shahar Maoz, Smadar Szekely, Daniel Barkan:
PlayGo: towards a comprehensive tool for scenario based programming. 359-360 - Dinko Ivanov, Marin Orlic, Cristina Cerschi Seceleanu, Aneta Vulgarakis:
REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems. 361-362 - Alexander Nöhrer, Alexander Egyed:
C2O: a tool for guided decision-making. 363-364 - Axel van Lamsweerde:
Keynote address: model engineering for model-driven engineering. 365-366
Specification and verification
- Ali Taleghani, Joanne M. Atlee:
Search-carrying code. 367-376 - Pieter Hooimeijer, Westley Weimer:
Solving string constraints lazily. 377-386 - David Lo, Shahar Maoz:
Scenario-based and value-based specification mining: better together. 387-396
Testing and debugging
- Dawei Qi, Abhik Roychoudhury, Zhenkai Liang:
Test generation to expose changes in evolving programs. 397-406 - Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:
How did you specify your test suite. 407-416 - Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga:
Dynamic and transparent analysis of commodity production systems. 417-426
Reuse and component-based development
- Paulo Trezentos, Inês Lynce, Arlindo L. Oliveira:
Apt-pbo: solving the software dependency problem using pseudo-boolean optimization. 427-436 - Daniel M. Germán, Yuki Manabe, Katsuro Inoue:
A sentence-matching method for automatic license identification of source code files. 437-446 - Nam H. Pham, Tung Thanh Nguyen, Hoan Anh Nguyen, Tien N. Nguyen:
Detection of recurring software vulnerabilities. 447-456
Software evolution
- Xiaoyin Wang, David Lo, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffrey Xu Yu:
Matching dependence-related queries in the system dependence graph. 457-466 - Hossein Tajalli, Joshua Garcia, George Edwards, Nenad Medvidovic:
PLASMA: a plan-based layered architecture for software model-driven adaptation. 467-476 - Adam Duley, Chris Spandikow, Miryung Kim:
A program differencing algorithm for verilog HDL. 477-486
Doctoral symposium
- Casandra Holotescu:
Error-avoiding adaptors for black-box software components. 487-492 - Michael Becker, Volker Gruhn:
Automated model grouping. 493-498 - Mihai Balint:
Automatic inference of abstract type behavior. 499-504 - Xiaofan Chen:
Extraction and visualization of traceability relationships between documents and source code. 505-510 - Dominic Letarte:
Model checking graph representation of precise boolean inter-procedural flow analysis. 511-516 - Matt Staats:
The influence of multiple artifacts on the effectiveness of software testing. 517-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.