


default search action
26th APSEC 2019: Putrajaya, Malaysia
- 26th Asia-Pacific Software Engineering Conference, APSEC 2019, Putrajaya, Malaysia, December 2-5, 2019. IEEE 2019, ISBN 978-1-7281-4648-5

Software Project Management
- R. P. Jagadeesh Chandra Bose, Kanchanjot Kaur Phokela, Vikrant Kaulgud, Sanjay Podder

:
BLINKER: A Blockchain-Enabled Framework for Software Provenance. 1-8 - Sharifah Mashita Syed-Mohamad

, Nur Shazwani Md. Akhir:
SoReady: An Extension of the Test and Defect Coverage-Based Analytics Model for Pull-Based Software Development. 9-14
Requirements Engineering
- Weikai Miao, Qianqian Yan, Yihao Huang

, Jincao Feng, Hanyue Zheng:
A Domain Experts Centric Approach to Formal Requirements Modeling and V&V of Embedded Control Software. 15-22 - Lei Chen, Dandan Wang, Junjie Wang, Qing Wang:

Enhancing Unsupervised Requirements Traceability with Sequential Semantics. 23-30 - Muhammad Abbas, Irum Inayat

, Naila Jan, Mehrdad Saadatmand, Eduard Paul Enoiu, Daniel Sundmark:
MBRP: Model-Based Requirements Prioritization Using PageRank Algorithm. 31-38 - Shiheng Wang, Tong Li, Zhen Yang:

Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. 39-46
Software Architecture, Modelling, and Design
- Feng Sheng, Huibiao Zhu, Zongyuan Yang:

Towards the Mechanized Semantics and Refinement of UML Class Diagrams. 47-54 - Sandra Schröder, Georg Buchgeher:

Formalizing Architectural Rules with Ontologies - An Industrial Evaluation. 55-62
Testing, Verification, and Validation
- Chengcheng Lv, Long Zhang, Fanping Zeng, Jian Zhang:

Adaptive Random Testing for XSS Vulnerability. 63-69 - Thu-Trang Nguyen

, Toshiaki Aoki
, Takashi Tomita
, Iori Yamada:
Multiple Program Analysis Techniques Enable Precise Check for SEI CERT C Coding Standard. 70-77 - Ziqi Chen, Huiyan Wang, Chang Xu, Xiaoxing Ma, Chun Cao:

VISION: Evaluating Scenario Suitableness for DNN Models by Mirror Synthesis. 78-85 - Thuy Nguyen, Toshiaki Aoki

, Takashi Tomita
, Junpei Endo:
Integrating Static Program Analysis Tools for Verifying Cautions of Microcontroller. 86-93 - Thomas Laurent

, Paolo Arcaini
, Fuyuki Ishikawa, Anthony Ventresque
:
A Mutation-Based Approach for Assessing Weight Coverage of a Path Planner. 94-101 - Ran Chen, Wenhui Zhang:

Verification of CTL_BDI Properties by Symbolic Model Checking. 102-109 - Konrad Fögen, Horst Lichter

:
Semi-Automatic Repair of Over-Constrained Models for Combinatorial Robustness Testing. 110-117 - Hirofumi Akimoto, Yuto Isogami, Takashi Kitamura

, Natsuko Noda, Tomoji Kishi:
A Prioritization Method for SPL Pairwise Testing Based on User Profiles. 118-125
Software Maintenance and Evolution
- Ran Mo, Mengya Zhan:

History Coupling Space: A New Model to Represent Evolutionary Relations. 126-133 - Hiroshi Yonai, Yasuhiro Hayase, Hiroyuki Kitagawa

:
Mercem: Method Name Recommendation Based on Call Graph Embedding. 134-141 - Chen Zhi, Shuiguang Deng

, Jianwei Yin, Min Fu, Hai Zhu, Yuanping Li, Tao Xie:
Quality Assessment for Large-Scale Industrial Software Systems: Experience Report at Alibaba. 142-149
Configuration Management and Deployment
- Yongfeng Gu, Yuntianyi Chen

, Xiangyang Jia, Jifeng Xuan
:
Multi-Objective Configuration Sampling for Performance Ranking in Configurable Systems. 150-157
Cloud and Service-Oriented Computing
- Ammar Lanui, Thiam Kian Chiew:

A Cloud-Based Solution for Testing Applications' Compatibility and Portability on Fragmented Android Platform. 158-164 - Shang-Pin Ma, I-Hsiu Liu, Chun-Yu Chen, Jiun-Ting Lin, Nien-Lin Hsueh:

Version-Based Microservice Analysis, Monitoring, and Visualization. 165-172 - Thilini Bhagya

, Jens Dietrich
, Hans W. Guesgen
:
Generating Mock Skeletons for Lightweight Web-Service Testing. 181-188
Cyber-Physical Systems and Internet of Things
- Xiaotong Chi, Min Zhang

, Xiao Xu:
An Algebraic Approach to Modeling and Verifying Policy-Driven Smart Devices in IoT Systems. 189-196 - Daneth Horn, Nazakat Ali, Jang-Eui Hong:

Automatic Identifying Interaction Components in Collaborative Cyber-Physical Systems. 197-203 - Mengyu Ma, Liwei Chen, Gang Shi:

Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware. 204-211 - Sangwon Hyun, Jiyoung Song, Seungchyul Shin, Doo-Hwan Bae:

Statistical Verification Framework for Platooning System of Systems with Uncertainty. 212-219 - Dehui Du, Tong Guo, Yao Wang:

SHML: Stochastic Hybrid Modeling Language for CPS Behavior. 220-227 - Nguyen Khoi Tran, Muhammad Ali Babar, Quan Z. Sheng

, John C. Grundy:
A Framework for Internet of Things Search Engines Engineering. 228-235
Debugging, Defect Prediction, and Fault Localization
- Kazuya Yasuda

, Shinji Itoh, Ryota Mibe, Yoshinori Jodai, Fumie Nakaya:
Inferring Faults in Business Specifications Extracted from Source Code. 236-243 - Guisheng Fan, Xuyang Diao, Huiqun Yu, Kang Yang, Liqiong Chen:

Deep Semantic Feature Learning with Embedded Static Metrics for Software Defect Prediction. 244-251 - Meiling Zhou, Jie Chen, Haiyang Hu, JiaCheng Yu, Zhongjin Li, Hua Hu:

DeepTLE: Learning Code-Level Features to Predict Code Performance before It Runs. 252-259 - Chenghao Cai, Jing Sun, Gillian Dobbie, Scott Uk-Jin Lee:

Achieving Abstract Machine Reachability with Learning-Based Model Fulfilment. 260-267 - Yuexing Wang, Min Zhou, Ming Gu, Jiaguang Sun:

Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis. 268-275 - Zheng Li, Xingyao Zhang, Junxia Guo, Ying Shang:

Class Imbalance Data-Generation for Software Defect Prediction. 276-283
Empirical Software Engineering
- Tasuku Nakagawa, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:

How Compact Will My System Be? A Fully-Automated Way to Calculate LoC Reduced by Clone Refactoring. 284-291 - Anas Shatnawi, Tewfik Ziadi

, Mohamed Yassin Mohamadi:
Understanding Source Code Variability in Cloned Android Families: An Empirical Study on 75 Families. 292-299 - Zhiwen Zheng, Liang Wang, Yue Cao, Yuqian Zhuang, Xianping Tao:

Towards Non-Invasive Recognition of Developers' Flow States with Computer Interaction Traces. 300-307 - Saurabh Tiwari

, Santosh Singh Rathore
:
Teaching Software Process Models to Software Engineering Students: An Exploratory Study. 308-315 - Supatsara Wattanakriengkrai, Napat Srisermphoak, Sahawat Sintoplertchaikul, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta

, Hideaki Hata
, Kenichi Matsumoto:
Automatic Classifying Self-Admitted Technical Debt Using N-Gram IDF. 316-322 - Xueying Li, Peng Liang

, Tianqing Liu:
Decisions and Their Making in OSS Development: An Exploratory Study Using the Hibernate Developer Mailing List. 323-330
Formal Methods
- Yongxin Zhao, Xiujuan Zhang, Ling Shi, Gan Zeng, Feng Sheng, Shuang Liu:

Towards a Formal Approach to Defining and Computing the Complexity of Component Based Software. 331-338 - Zhangtao Chen, Jing Liu, Xi Ding, Miaomiao Zhang:

RBML: A Refined Behavior Modeling Language for Safety-Critical Hybrid Systems. 339-346 - Sapna Jaidka

, Steve Reeves
, Judy Bowen
:
A Coloured Petri Net Approach to Model and Analyze Safety-Critical Interactive Systems. 347-354 - Leping Zhang, Qianying Zhang, Guohui Wang, Zhiping Shi, Minhua Wu, Yong Guan:

Formal Modelling and Verification of Spinlocks at Instruction Level. 355-362
Model-Driven and Domain-Specific Engineering
- Jamal El Hachem, Ali Sedaghatbaf

, Elena Lisova, Aida Causevic:
Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems. 363-370 - Maya R. A. Setyautami

, Rafiano R. Rubiantoro, Ade Azurat:
Model-Driven Engineering for Delta-Oriented Software Product Lines. 371-377
Open Source Development
- Yi Ren, Jianbo Guan, Jun Ma, Yusong Tan, Qingbo Wu, Yan Ding:

CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System Packages. 378-385 - Ruiyin Li

, Peng Liang
, Chen Yang, Georgios Digkas, Alexander Chatzigeorgiou, Zhuang Xiong:
Automatic Identification of Assumptions from the Hibernate Developer Mailing List. 394-401 - Subhajit Datta

:
Influence, Information and Team Outcomes in Large Scale Software Development. 402-409
Security, Reliability, and Privacy
- Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu:

More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A. 410-417 - Denghui Zhang

, Guisai Wang, Wei Xu, Kevin Gao:
SGXPy: Protecting Integrity of Python Applications with Intel SGX. 418-425 - Hui Zhao, Frédéric Mallet

, Ludovic Apvrille:
A Language-Based Multi-View Approach for Combining Functional and Security Models. 426-433 - Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie:

Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably. 434-441 - Mohd Hafeez Osman, Stefan Kugele, Sina Shafaei:

Run-Time Safety Monitoring Framework for AI-Based Systems: Automated Driving Cases. 442-449 - Anand Tirkey, Ramesh Kumar Mohapatra, Lov Kumar

:
Anatomizing Android Malwares. 450-457
Software Engineering Tools and Environments
- Wei Li

, Shuhan Yan, Beijun Shen, Yuting Chen:
Reinforcement Learning of Code Search Sessions. 458-465 - Chao Peng

, Sefa Akca
, Ajitha Rajan:
SIF: A Framework for Solidity Contract Instrumentation and Analysis. 466-473 - Nozomi Nakajima, Shinsuke Matsumoto, Shinji Kusumoto:

Jact: A Playground Tool for Comparison of JavaScript Frameworks. 474-481 - Sefa Akca

, Ajitha Rajan, Chao Peng
:
SolAnalyser: A Framework for Analysing and Testing Smart Contracts. 482-489
Software Repository Mining and Data Analytics
- Duo Wang, Jian Cao, Shiyou Qian, Qing Qi:

Investigating Cross-Repository Socially Connected Teams on GitHub. 490-497 - Shintaro Kurimoto, Yasuhiro Hayase, Hiroshi Yonai, Hiroyoshi Ito

, Hiroyuki Kitagawa
:
Class Name Recommendation Based on Graph Embedding of Program Elements. 498-505 - Liting Wang, Li Zhang, Jing Jiang:

Detecting Duplicate Questions in Stack Overflow via Deep Learning Approaches. 506-513 - Syed Fatiul Huq

, Ali Zafar Sadiq, Kazi Sakib:
Understanding the Effect of Developer Sentiment on Fix-Inducing Changes: An Exploratory Study on GitHub Pull Requests. 514-521
Software Comprehension, Visualization, and Traceability
- Minghao Chen, Xiaojun Wan:

Neural Comment Generation for Source Code with Auxiliary Code Classification Task. 522-529

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














