default search action
24th APSEC 2017: Nanjing, China
- Jian Lv, He Jason Zhang, Mike Hinchey, Xiao Liu:
24th Asia-Pacific Software Engineering Conference, APSEC 2017, Nanjing, China, December 4-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3681-7
Full Papers
Program Analysis
- Xingming Wu, Lian Li, Jian Zhang:
Symbolic Execution with Value-Range Analysis for Floating-Point Exception Detection. 1-10 - Xin Yi, Liqian Chen, Xiaoguang Mao, Tao Ji:
Efficient Global Search for Inputs Triggering High Floating-Point Inaccuracies. 11-20 - Bin Li, Juan Zhai, Zhenhao Tang, Enyi Tang, Jianhua Zhao:
A Framework for Array Invariants Synthesis in Induction-Loop Programs. 21-30
Systematic Reviews
- Yuqing Wang, Jouni Markkula, Jing Jiang:
Cultural Factors Influencing International Collaborative Software Engineering Education in China. 31-40 - Luyi Feng, Yin Kia Chiam, Sin Kuang Lo:
Text-Mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature Review. 41-50 - Liming Dong, Bohan Liu, Zheng Li, Ou Wu, Muhammad Ali Babar, Bingbing Xue:
A Mapping Study on Mining Software Process. 51-60
Traceability
- Shinnosuke Saruwatari, Fuyuki Ishikawa, Tsutomu Kobayashi, Shinichi Honiden:
Extracting Traceability between Predicates in Event-B Refinement. 61-70 - Jukka Ruohonen, Ville Leppänen:
How PHP Releases Are Adopted in the Wild? 71-80 - Teng Zhao, Qinghua Cao, Qing Sun:
An Improved Approach to Traceability Recovery Based on Word Embeddings. 81-89
Code Refactory & Clone
- Lov Kumar, Ashish Sureka:
Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level. 90-99 - Min Wang, Pengcheng Wang, Yun Xu:
CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGs. 100-109 - Girish Maskeri Rama, Raghavan Komondoor:
Detecting Full Initialization Points of Objects to Support Code Refactorings. 110-119
Networks
- Biling Lin, Xiao Chen, Liangmin Wang:
A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment. 120-129 - Yanchao Jing, Guangtao Xue, Shiyou Qian:
Noff: A Novel Extendible Parallel Library for High-Performance Network Traffic Monitoring. 130-139 - Xiaoyun Guo, Hsin-Hung Lin, Toshiaki Aoki, Yuki Chiba:
A Reusable Framework for Modeling and Verifying In-Vehicle Networking Systems in the Presence of CAN and FlexRay. 140-149
Testing
- Marc Brünink, David S. Rosenblum:
Using Branch Frequency Spectra to Evaluate Operational Coverage. 150-159 - Jung-Hyun Kwon, In-Young Ko:
Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments. 160-168 - Wenhao Fu, Huiqun Yu, Guisheng Fan, Xiang Ji, Xin Pei:
A Regression Test Case Prioritization Algorithm Based on Program Changes and Method Invocation Relationship. 169-178
Design & Code Patterns
- Ping Zhang, Dongjin Yu, Jiaojiao Wang:
A Degree-Driven Approach to Design Pattern Mining Based on Graph Matching. 179-188 - Shahid Hussain, Jacky Keung, Arif Ali Khan, Kwabena Ebo Bennin:
Correlation between the Frequent Use of Gang-of-Four Design Patterns and Structural Complexity. 189-198 - Sawan Rai, Tejaswini Gaikwad, Sparshi Jain, Atul Gupta:
Method Level Text Summarization for Java Code Using Nano-Patterns. 199-208
Robot & Embedded Systems
- Shuo Yang, Xinjun Mao, Zhe Liu, Sen Yang, Jiangtao Xue, Zixi Xu:
The Accompanying Behavior Model and Implementation Architecture of Autonomous Robot Software. 209-218 - Gabriel Campeanu, Jan Carlson, Séverine Sentilles:
Flexible Components for Development of Embedded Systems with GPUs. 219-228 - Zhe Liu, Xinjun Mao, Shuo Yang:
A Dual-Loop Control Model and Software Framework for Autonomous Robot Software. 229-238
Security & Vulnerability
- Shubham Tripathi, Gustavo Grieco, Sanjay Rawat:
Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump. 239-248 - Chao Xu, Huibiao Zhu, Wanling Xie:
Modeling and Verifying Identity Authentication Security of HDFS Using CSP. 259-268
Management & Decision Making
- Shuhan Yan, Beijun Shen, Wenkai Mo, Ning Li:
Transfer Learning for Cross-Platform Software Crowdsourcing Recommendation. 269-278 - Vitor Freitas, Mirko Barbosa Perkusich, Emilia Mendes, Pilar Rodríguez, Markku Oivo:
Value-Based Decision-Making Using a Web-Based Tool: A Multiple Case Study. 279-288 - Guoping Rong, Xinbei Liu, Shenghui Gu, Dong Shao:
A Goal-Driven Framework in Support of Knowledge Management. 289-297
Software Ecosystems
- Nuttapon Lertwittayatrai, Raula Gaikovina Kula, Saya Onoue, Hideaki Hata, Arnon Rungsawang, Pattara Leelaprute, Kenichi Matsumoto:
Extracting Insights from the Topology of the JavaScript Package Ecosystem. 298-307 - Pankajeshwara N. Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger:
Boundary Spanners in Open Source Software Development: A Study of Python Email Archives. 308-317 - Hui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu:
An Empirical Study on Downstream Workarounds for Cross-Project Bugs. 318-327
Bug Localization & Patterns
- Xiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu, Jian Lu:
Exploring Metadata in Bug Reports for Bug Localization. 328-337 - Yan Xiao, Jacky Keung, Qing Mi, Kwabena Ebo Bennin:
Improving Bug Localization with an Enhanced Convolutional Neural Network. 338-347 - Xiaobing Sun, Tianchi Zhou, Gengjie Li, Jiajun Hu, Hui Yang, Bin Li:
An Empirical Study on Real Bugs for Machine Learning Programs. 348-357
Repository Mining
- Nor Shahida Mohamad Yusop, Jean-Guy Schneider, John Grundy, Rajesh Vasa:
Analysis of the Textual Content of Mined Open Source Usability Defect Reports. 358-367 - Shuai Wang, Wensheng Dou, Chushu Gao, Jun Wei, Tao Huang:
Mining API Type Specifications for JavaScript. 368-377 - Liming Dong, Bohan Liu, Zheng Li, Bingbing Xue, Danni Chen, Tiange Chen:
Mining Handover Process in Open Source Development: An Exploratory Study. 378-387
Requirements
- Tong Li:
Identifying Security Requirements Based on Linguistic Analysis and Machine Learning. 388-397 - Yoohee Chung, Dongwoo Kim, Yunja Choi:
Modeling OSEK/VDX OS Requirements in C. 398-407 - Moe Matsubara, Mikio Aoyama:
An Analysis Method of Safety Requirements for Automotive Software Systems. 408-416
Model Checking
- Nhat-Hoa Tran, Yuki Chiba, Toshiaki Aoki:
Domain-Specific Language Facilitates Scheduling in Model Checking. 417-426 - Ailun Liu, Miroslav Popovic, Huibiao Zhu:
Formalization and Verification of the PSTM Architecture. 427-435 - Azlan B. Ismail, Marta Kwiatkowska:
Synthesizing Pareto Optimal Decision for Autonomic Clouds Using Stochastic Games Model Checking. 436-445
Architecture
- Ana Nicolaescu, Horst Lichter, Veit Hoffmann:
On Adequate Behavior-Based Architecture Conformance Checks. 446-455 - Roland Kretschmer, Djamel Eddine Khelladi, Andreas Demuth, Roberto E. Lopez-Herrejon, Alexander Egyed:
From Abstract to Concrete Repairs of Model Inconsistencies: An Automated Approach. 456-465 - Rui Chen, Shanshan Li, Zheng Li:
From Monolith to Microservices: A Dataflow-Driven Approach. 466-475
Detection & Prediction
- Cangzhou Yuan, Shenhong Wei, Chengjian Zhou, Jiangtao Guo, Hongyue Xiang:
Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark. 476-485 - Miho Kawasaki, Hiroyuki Okamura, Tadashi Dohi:
A Comprehensive Evaluation of Software Reliability Modeling Based on Marshall-Olkin Type Fault-Detection Time Distribution. 486-494 - Abdullah Khanfor, Ye Yang, Gregg Vesonder, Guenther Ruhe, Dave Messinger:
Failure Prediction in Crowdsourced Software Development. 495-504
Industry Papers
- Jianpeng Hu, Linpeng Huang, Juan Huang, Tianqi Sun, Yingjun Ouyang:
What-If Model Construction and Validation of Web Systems Based on Log Mining. 505-512 - Zhiwei Li, Jing Liu, Haiying Sun, Tingliang Zhou, Junfeng Sun:
Automatic Test Generation of Large Boolean Expressions in Computer Based Interlocking System. 513-520 - Yingling Li, Lin Shi, Jun Hu, Qing Wang, Jian Zhai:
An Empirical Study to Revisit Productivity across Different Programming Languages. 526-533
Short Papers
Software Development 1
- Guoping Rong, Qiuping Zhang, Xinbei Liu, Shenghui Gu:
A Systematic Review of Logging Practice in Software Engineering. 534-539 - Georgia M. Kapitsaki, Demetris Paschalides:
Identifying Terms in Open Source Software License Texts. 540-545 - Jiyoung Song, Young Min Baek, Mingyu Jin, Eunkyoung Jee, Doo-Hwan Bae:
SoS GaP Slicer: Slicing SoS Goal and PRISM Models for Change-Responsive Verification of SoS. 546-551 - Tomohiro Ohtake, Yohei Seki, Toshihiro Kodaka:
Steiner Tree Based Recommendation System for Combination of APIs and IoT Devices. 552-557
Software Development 2
- Xingshen Song, Yuexiang Yang, Yu Jiang:
Software Optimizations of Multiple Sets Intersection via SIMD Instructions. 558-563 - Chen Wang, Xiaoyuan Xie, Peng Liang, Jifeng Xuan:
Multi-Perspective Visualization to Assist Code Change Review. 564-569 - Eduardo Rosales, Andrea Rosà, Walter Binder:
tgp: A Task-Granularity Profiler for the Java Virtual Machine. 570-575
Software Evolution and Maintenance
- Djamel Eddine Khelladi, Horacio Hoyos Rodriguez, Roland Kretschmer, Alexander Egyed:
An Exploratory Experiment on Metamodel-Transformation Co-Evolution. 576-581 - Amjed Tahir, Sherlock A. Licorish, Stephen G. MacDonell:
Feature Evolution and Reuse - An Exploratory Study of Eclipse. 582-587 - Sahan Serasinghe, Haifeng Shen, David Chen:
iLSE: An Intelligent Web-Based System for Log Structuring and Extraction. 588-593 - Feiyue Yu, Hao Zhong, Beijun Shen:
How Do Programmers Maintain Concurrent Code? 594-599
Formal Methods
- Judy Bowen, Anke Dittmar:
Formal Definitions for Design Spaces and Traces. 600-605 - Mengjun Li:
Generating Equality Loop Invariants with Functions Based on Random Testing, Constraint Solving and Verification. 606-611 - Colin Pilbrow, Steve Reeves:
Characterising Sound Visualisations of Specifications Using Micro-Charts and Refinement. 612-617 - Xuan-Linh Ha, Kazuhiro Ogata:
Writing Concurrent Java Programs Based on CafeOBJ Specifications. 618-623
Empirical Studies
- Sousuke Amasaki, Chris Lokan:
An Evaluation of Selection Methods for Time-Aware Effort Estimation. 624-629 - Kwabena Ebo Bennin, Jacky Keung, Akito Monden:
Impact of the Distribution Parameter of Data Sampling Approaches on Software Defect Prediction Models. 630-635 - Qing Mi, Yujin Gao, Jacky Keung, Yan Xiao, Solomon Mensah:
Identifying Textual Features of High-Quality Questions: An Empirical Study on Stack Overflow. 636-641 - Tianxia Wang, Yan Liu:
Facilitating Scenario-Based Program Comprehension with Topic Models. 642-647
Code Generation and Quality
- Navdeep Singh, Paramvir Singh:
How Do Code Refactoring Activities Impact Software Developers' Sentiments? - An Empirical Investigation Into GitHub Commits. 648-653 - Yuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
CCFinderSW: Clone Detection Tool with Flexible Multilingual Tokenization. 654-659 - Michael Szvetits, Uwe Zdun:
Automatic Generation of Monitoring Code for Model Based Analysis of Runtime Behaviour. 660-665 - Tetsuo Yamamoto:
Code Suggestion of Method Call Statements Using a Source Code Corpus. 666-671
Software Testing
- Li Sui, Jens Dietrich, Amjed Tahir:
On the Use of Mined Stack Traces to Improve the Soundness of Statically Constructed Call Graphs. 672-676 - Dong Hun Song, Yongjin Seo, Hyeon Soo Kim:
Test Environment Construction Method Using Parameterized Test Environments. 677-682 - Jing Liu, Wenjie Chen:
Optimized Test Data Generation for RESTful Web Service. 683-688 - Chengying Mao, Xuzheng Zhan:
Towards an Improvement of Bisection-Based Adaptive Random Testing. 689-694
Software Testing and Requirements
- Kristian Fjeld Hasselknippe, Jingyue Li:
A Novel Tool for Automatic GUI Layout Testing. 695-700 - Haiyang Sun, Alexander North, Walter Binder:
Multi-Process Runtime Verification for Android. 701-706 - Danielle Gaither, Hyunsook Do, Barrett R. Bryant:
Toward Detection of Abnormal Behaviors in Timing and Security Requirements. 707-712 - Luciana Provenzano, Kaj Hänninen, Jiale Zhou, Kristina Lundqvist:
An Ontological Approach to Elicit Safety Requirements. 713-718
Software Process
- Laurent Wouters, Stephen Creff, Emma Effa Bella, Ali Koudri:
Towards Semantic-Aware Collaborations in Systems Engineering. 719-724 - Chih-Hong Cheng, Yassine Hamza, Harald Ruess:
Automated Analysis of Multi-View Software Architectures. 725-730 - Suppasit Roongsangjan, Thanwadee Sunetnanta, Pattanasak Mongkolwat:
Structuring the Knowledge for Software Process Appraisal towards Semi-Automated Support. 731-736 - Israt Fatema, Kazi Sakib:
Factors Influencing Productivity of Agile Software Development Teamwork: A Qualitative System Dynamics Approach. 737-742
Posters
- Bo Wan, Xi Li, Kaiqi Zhou, Haizhao Luo, Chao Wang, Xianglan Chen, Xuehai Zhou:
Clockwerk: A Predictable and Efficient Extension of Logical Execution Time Model. 743-744 - Haojie Gong, Bohan Liu, Dong Shao:
A Simulation Model of Kanban Software Process. 745-746 - Md Rakib Hossain Misu, Kazi Sakib:
Interface Driven Code Clone Detection. 747-748 - Abdus Satter, M. G. Muntaqeem, Nadia Nahar, Kazi Sakib:
Retrieving Self-Executable and Functionally Correct Code to Improve Source Code Search. 749-750 - Mahieddine Dellabani, Jacques Combaz, Saddek Bensalem, Marius Bozga:
Knowledge Based Optimization for Distributed Real-Time Systems. 751-756
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.