default search action
27th ASE 2012: Essen, Germany
- Michael Goedicke, Tim Menzies, Motoshi Saeki:
IEEE/ACM International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012. ACM 2012, ISBN 978-1-4503-1204-2
Keynotes
- Mark Harman, William B. Langdon, Yue Jia, David Robert White, Andrea Arcuri, John A. Clark:
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper). 1-14 - Ivar Jacobson, Ian Spence, Pontus Johnson, Mira Kajko-Mattsson:
Re-founding software engineering - SEMAT at the age of three (keynote abstract). 15-19
Debugging I
- Kai Yu, Mengxiang Lin, Jin Chen, Xiangyu Zhang:
Practical isolation of failure-inducing changes for debugging regression faults. 20-29 - Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang:
Diversity maximization speedup for fault localization. 30-39 - Divya Gopinath, Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Improving the effectiveness of spectra-based fault localization using specifications. 40-49
Debugging II
- Ferdian Thung, Lucia, David Lo, Lingxiao Jiang, Foyzur Rahman, Premkumar T. Devanbu:
To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools. 50-59 - Tegawendé F. Bissyandé, Laurent Réveillère, Julia Lawall, Gilles Muller:
Diagnosys: automatic generation of a debugging interface to the Linux kernel. 60-69 - Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, David Lo, Chengnian Sun:
Duplicate bug report detection with a combination of information retrieval and topic modeling. 70-79
Privacy, Security, and Performance
- Xusheng Xiao, Nikolai Tillmann, Manuel Fähndrich, Jonathan de Halleux, Michal Moskal:
User-aware privacy control via extended static-information-flow analysis. 80-89 - Sonia Haiduc, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, Andrian Marcus:
Automatic query performance assessment during the retrieval of software artifacts. 90-99 - Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Supporting automated vulnerability analysis using formalized vulnerability signatures. 100-109
Configuration Management and QoS
- Rick Rabiser, Paul Grünbacher, Martin Lehofer:
A qualitative study on user guidance capabilities in product configuration tools. 110-119 - Sven Apel, Olaf Leßenich, Christian Lengauer:
Structured merge with auto-tuning: balancing precision and performance. 120-129 - Ayman A. Amin, Lars Grunske, Alan Colman:
An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling. 130-139
Testing and Monitoring
- Ning Chen, Sunghun Kim:
Puzzle-based automatic testing: bringing humans into the loop by solving puzzles. 140-149 - Kari Kähkönen, Olli Saarikivi, Keijo Heljanko:
Using unfoldings in automated testing of multithreaded programs. 150-159 - Adel Noureddine, Aurelien Bourdon, Romain Rouvoy, Lionel Seinturier:
Runtime monitoring of software energy hotspots. 160-169
Prediction
- Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, Hong Mei:
Can I clone this piece of code here? 170-179 - Hyunmin Seo, Sunghun Kim:
Predicting recurring crash stacks. 180-189 - Dennis Westermann, Jens Happe, Rouven Krebs, Roozbeh Farahbod:
Automated inference of goal-oriented performance prediction functions. 190-199
Validation, Verification, and Consistency
- Achraf Ghabi, Alexander Egyed:
Code patterns for automatically validating requirements-to-code traces. 200-209 - Jaideep Nijjar, Tevfik Bultan:
Unbounded data model verification using SMT solvers. 210-219 - Alexander Reder, Alexander Egyed:
Computing repair trees for resolving inconsistencies in design models. 220-229
Re-engineering, Program Understanding, and Model Transformation (Short Papers)
- Mohamed Almorsy, John Grundy, Amani S. Ibrahim:
Supporting automated software re-engineering using re-aspects. 230-233 - Amani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy:
Supporting operating system kernel data disambiguation using points-to analysis. 234-237 - Moria Abadi, Yishai A. Feldman:
Automatic recovery of statecharts from procedural code. 238-241 - Julia Rubin, Marsha Chechik:
Locating distinguishing features using diff sets. 242-245 - Katsuhisa Maruyama, Eijiro Kitsu, Takayuki Omori, Shinpei Hayashi:
Slicing and replaying code change history. 246-249 - Martin Faunes, Houari A. Sahraoui, Mounir Boukadoum:
Generating model transformation rules from examples using an evolutionary algorithm. 250-253
Testing and Code Analysis (Short Papers)
- Konrad Jamrozik, Gordon Fraser, Nikolai Tillmann, Jonathan de Halleux:
Augmented dynamic symbolic execution. 254-257 - Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana, Salvatore De Carmine, Atif M. Memon:
Using GUI ripping for automated testing of Android applications. 258-261 - Lucia, David Lo, Lingxiao Jiang, Aditya Budi:
kbe-anonymity: test data anonymization for evolving programs. 262-265 - JeeHyun Hwang, Tao Xie, Donia El Kateb, Tejeddine Mouelhi, Yves Le Traon:
Selection of regression system tests for security policy evolution. 266-269 - Lei Shang, Yi Lu, Jingling Xue:
Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience. 270-273
Detection and Refactoring (Short Papers)
- Alexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus:
Automatically securing permission-based software by reducing the attack surface: an application to Android. 274-277 - Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Esma Aïmeur:
Support vector machines for anti-pattern detection. 278-281 - Hung Viet Nguyen, Hoan Anh Nguyen, Tung Thanh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen:
Detection of embedded code smells in dynamic web applications. 282-285 - Yang Yuan, Yao Guo:
Boreas: an accurate and scalable token-based approach to code clone detection. 286-289 - Friedrich Steimann, Jens von Pilgrim:
Refactorings without names. 290-293 - Huiqing Li, Simon J. Thompson:
Automated API migration in a user-extensible refactoring tool for Erlang programs. 294-297
Requirements Engineering and Model based Development (Short Papers)
- Rainer Lutz, Sascha Schäfer, Stephan Diehl:
Using mobile devices for collaborative requirements engineering. 298-301 - Andreas Demuth, Roberto E. Lopez-Herrejon, Alexander Egyed:
Automatically generating and adapting model constraints to support co-evolution of design models. 302-305 - Timo Kehrer, Udo Kelter, Pit Pietsch, Maik Schmidt:
Adaptability of model comparison tools. 306-309
Defect Prediction and Recovery (Short Papers)
- Lwin Khin Shar, Hee Beng Kuan Tan:
Predicting common web application vulnerabilities from input validation and sanitization code patterns. 310-313 - Huihua Lu, Bojan Cukic, Mark Vere Culp:
Software defect prediction using semi-supervised learning with dimension reduction. 314-317 - Rui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Jiajun Shen, Tao Xie:
Healing online service systems via mining historical issue repositories. 318-321 - Maartje de Jonge, Eelco Visser:
Automated evaluation of syntax error recovery. 322-325
Tool Demonstrations 1
- Massila Kamalrudin, John Grundy, John G. Hosking:
MaramaAI: tool support for capturing and managing consistency of multi-lingual requirements. 326-329 - Sebastian Bauersfeld, Tanja E. J. Vos:
GUITest: a Java library for fully automated GUI robustness testing. 330-333 - Palakorn Achananuparp, Ibrahim Nelman Lubis, Yuan Tian, David Lo, Ee-Peng Lim:
Observatory of trends in software related microblogs. 334-337 - Sebastian Biallas, Jörg Brauer, Stefan Kowalewski:
Arcade.PLC: a verification platform for programmable logic controllers. 338-341 - Yves Ledru, Germán Vega, Taha Triki, Lydie du Bousquet:
Test suite selection based on traceability annotations. 342-345 - Fu Song, Tayssir Touili:
PuMoC: a CTL model-checker for sequential programs. 346-349 - Yliès Falcone, Sebastian Currea:
Weave droid: aspect-oriented programming on Android devices: fully embedded or in the cloud. 350-353 - Inah Omoronyia, Liliana Pasquale, Mazeiar Salehie, Luca Cavallaro, Gavin J. Doherty, Bashar Nuseibeh:
Caprice: a tool for engineering adaptive privacy. 354-357
Tool Demonstrations 2
- Laura Moreno, Andrian Marcus:
JStereoCode: automatically identifying method and class stereotypes in Java code. 358-361 - Antonio Cicchetti, Federico Ciccozzi, Silvia Mazzini, Stefano Puri, Marco Panunzio, Alessandro Zovi, Tullio Vardanega:
CHESS: a model-driven engineering tool environment for aiding the development of complex industrial systems. 362-365 - Ahmed Tamrawi, Hoan Anh Nguyen, Hung Viet Nguyen, Tien N. Nguyen:
SYMake: a build code analysis and refactoring tool for makefiles. 366-369 - Cameron M. Hine, Jean-Guy Schneider, Jun Han, Steven Versteeg:
Quokka: visualising interactions of enterprise software environment emulators. 370-373 - Stefan Dösinger, Richard Mordinyi, Stefan Biffl:
Communicating continuous integration servers for increasing effectiveness of automated testing. 374-377 - José Campos, André Riboira, Alexandre Perez, Rui Abreu:
GZoltar: an eclipse plug-in for testing and debugging. 378-381 - Jesper Andersen, Anh Cuong Nguyen, David Lo, Julia L. Lawall, Siau-Cheng Khoo:
Semantic patch inference. 382-385 - Tuong Huan Nguyen, Bao Quoc Vo, Markus Lumpe, John Grundy:
REInDetector: a framework for knowledge-based requirements engineering. 386-389
Doctoral Symposium
- Sebastian Gabmeyer:
Formal verification techniques for model transformations specified by-demonstration. 390-393 - Luis Quesada:
A model-driven parser generator with reference resolution support. 394-397 - Yosuke Yamamoto:
Property-preserving program refinement. 398-401 - Ana Filipa Nogueira:
Predicting software complexity by means of evolutionary testing. 402-405 - Panita Meananeatra:
Identifying refactoring sequences for improving software maintainability. 406-409
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.