default search action
39th ASE 2024: Sacramento, CA, USA - Workshops
- Vladimir Filkov, Baishakhi Ray, Minghui Zhou:
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, ASEW 2024, Sacramento, CA, USA, 27 October 2024 - 1 November 2024. ACM 2024, ISBN 979-8-4007-1249-4
Replications and Negative Results (RENE)
- Radoslaw Klimek
, Julia Witek
:
Automatic Generation of Logical Specifications for Behavioural Models. 1-7 - Linsey J. Kitt
, Myra B. Cohen
:
MorphQ++: A Reproducibility Study of Metamorphic Testing on Quantum Compilers. 8-14 - Teerath Das
, Adam Ali
, Tommi Mikkonen
:
Taxonomy of Security-related Issues in Android Apps: An Empirical Study. 15-21
ASYDE 2024 - 6th International Workshop on Automated and verifiable Software System Development
- Marco Autili
, Alessio Bucaioni
, Gianluca Filippone
, Lina Marsso
, Gian Luca Scoccia
:
6th International Workshop on Automated and verifiable Software sYstem DEvelopment (ASYDE 2024). 22-23 - Arushi Sharma
, Zefu Hu
, Christopher Quinn
, Ali Jannesari
:
Redundancy and Concept Analysis for Code-trained Language Models. 24-34 - Parnian Kamran
, Premkumar T. Devanbu
, Caleb Stanford
:
Vision Paper: Proof-Carrying Code Completions. 35-42 - Korn Sooksatra
, Md Showkat Hossain Chy
, Muhmmad Ashfakur Rahman Arju
, Tomás Cerný
, Pablo Rivas
:
Using Static Analysis to Aid Monolith to Microservice System Transformation: Tuning Fuzzy c-Means in a VAE-Based GNN Approach. 43-53 - Mohammed Latif Siddiq
, Joanna Cecilia da Silva Santos
, Sajith Devareddy
, Anna Muller
:
SALLM: Security Assessment of Generated Code. 54-65 - Mashal Afzal Memon
:
Automated Generation of Ethical Profile-Building Questionnaires. 66-71 - Radoslaw Klimek
:
Logical square-driven and state-oriented generation of behavioural models. 72-81 - Jiwon Park
, Shadaj Laddad
, Dev Bali
, Wen Zhang
, Scott Shenker
, Matei Zaharia
:
Everything Everywhere All At Once: Efficient Cross-Service Program Analysis with OverSeer. 82-87 - Viktoria Koscinski
, Mehdi Mirakhorli
:
Formally Modeled Common Weakness Enumerations (CWEs). 88-93 - Rohit Dandamudi
, Gema Rodríguez-Pérez
:
A Preliminary Study of Multilingual Code Language Models for Code Generation Task Using Translated Benchmarks. 94-99
HCSE&CS-2024 - 2024 Workshop on Human Centric Software Engineering and Cyber Security
- Sophie McKenzie
, Niroshinie Fernando
, Imali Dias
, Ben Cheng
, Thuong Hoang
, Xiao Liu
:
Integrating Human-Centric Approaches into Undergraduate Software Engineering Education: A Scoping Review and Curriculum Analysis in the Australian Context. 100-107 - Robin Theveniaut
, Brahim Hamid
, Jason Jaskolka
:
Interplay of Human Factors and Secure Architecture Design using Model-Driven Engineering. 108-117 - Kazi Amit Hasan
, Vu Thanh Loc Mai
, Cynthia Wang
, Yuan Tian
, Steven H. H. Ding
:
A First Look at Self-Admitted Miscommunications in GitHub Issues. 118-127 - Muhammad Hassnain
, Caleb Stanford
:
Counterexamples in Safe Rust. 128-135 - Haifa Abdullah Al-Shammare
, Esra'a Sulaiman Alshabeeb
, Noor Ahmad Alakkas
, Mohammad Rabah Alshayeb
:
Evaluating Usability as a Key Human Factor in Agile SPM Tools Through Expert-Based Techniques. 136-145 - Juntong Chen
, Yan Zhao
, Na Meng
:
How Do Developers Reuse StackOverflow Answers in Their GitHub Projects? 146-155 - Huizi Hao
, Yuan Tian
:
Engaging with AI: An Exploratory Study on Developers' Sharing and Reactions to ChatGPT in GitHub Pull Requests. 156-160 - Zachary Douglas Wadhams
, Clemente Izurieta
, Ann Marie Reinhold
:
Barriers to Using Static Application Security Testing (SAST) Tools: A Literature Review. 161-166
A-Mobile 2024 - The 7th International Workshop on Advances in Mobile App Analysis
- Chao Wang
, Tianming Liu
, Yanjie Zhao
, Lin Zhang
, Xiaoning Du
, Li Li
, Haoyu Wang
:
Towards Demystifying Android Adware: Dataset and Payload Location. 167-175 - Mugdha Khedkar
, Ambuj Kumar Mondal
, Eric Bodden
:
Do Android App Developers Accurately Report Collection of Privacy-Related Data? 176-186 - Chen Liang
, Qiang Wei
, Zirui Jiang
, Yisen Wang
, Jiang Du
:
A Source Code Vulnerability Detection Method Based on Adaptive Graph Neural Networks. 187-196 - Khubaib Amjad Alam
, Ramsha Ali
, Zyena Kamran
, Sabeen Fatima
:
Leveraging Data-Driven Analytics for Mobile App Feature Extraction and Recommendations. 197-207 - Liangxuan Wu
, Yanjie Zhao
, Chao Wang
, Tianming Liu
, Haoyu Wang
:
A First Look at LLM-powered Smartphones. 208-217 - Mugdha Khedkar
, Michael Schlichtig
, Eric Bodden
:
Advancing Android Privacy Assessments with Automation. 218-222
VARSE 2024 - The Second International Workshop on Virtual and Augmented Reality Software Engineering
- Tomás Cerný
, Amr S. Abdelfattah
, Darek Gajewski
, Patrick E. Harris
, Mia E. Gortney
:
Is the 3D model the way to go when presenting microservice architecture? 223-227 - Xue Qin
, Garrett Weaver
:
Utilizing Generative AI for VR Exploration Testing: A Case Study. 228-232 - Dibyendu Brinto Bose
, Chris Brown
:
An Empirical Study on Current Practices and Challenges of Core AR/VR Developers. 233-238 - Wenjie Huang
, Jinfu Chen
, Huashan Chen
, Zhenyu Qi
, Xiaojia Yang
, Kebin Peng
, Sen He
:
A Study of Code Clone on Open Source VR Software. 239-244 - Xiaolu Zhang
, Tahmid Rafi
, Yuejun Guan
, Shuqing Li
, Michael R. Lyu
:
Demystifying the Privacy-Realism Dilemma in the Metaverse. 245-250
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.