


default search action
30th APSEC 2023: Seoul, Republic of Korea
- 30th Asia-Pacific Software Engineering Conference, APSEC 2023, Seoul, Republic of Korea, December 4-7, 2023. IEEE 2023, ISBN 979-8-3503-4417-2

- Nils Wild, Horst Lichter:

Unit Test Based Component Integration Testing. 1-10 - Haeun Lee, HeeDong Yang

, Su Geun Ji, Sang Kil Cha:
On the Effectiveness of Synthetic Benchmarks for Evaluating Directed Grey-Box Fuzzers. 11-20 - Rui Xu, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong:

Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features. 21-30 - Paula Rachow, Marion Wiese

, André van Hoorn:
Taxonomy of Architecture Maintainability Smells. 31-40 - Amirali Amiri

, Uwe Zdun, André van Hoorn:
Analytical Modeling and Empirical Validation of Performability of Service- and Cloud-Based Dynamic Routing Architecture Patterns. 41-50 - Johan Cederbladh

, Jagadish Suryadevara:
Light-Weight MBSE Approach for Construction Equipment Domain - An Experience Report. 51-60 - Huan Xie, Maojin Li, Yan Lei, Jian Hu, Shanshan Li, Xiaoguang Mao

, Yue Yu:
On the Reliability of Coverage Data for Fault Localization. 61-70 - Shishuai Yang, Qinsheng Hou, Shuang Li, Wenrui Diao:

Do App Developers Follow the Android Official Data Security Guidelines? An Empirical Measurement on App Data Security. 71-80 - Nanfei Yang, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong:

FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention. 81-90 - Meng Wang, Weiliang Fei, Miao Wang, Jin Cui:

Reinforcement Learning Guided Symbolic Execution for Ethereum Smart Contracts. 91-100 - Siqi Zhou, Xian Zhan, Linlin Li, Yepang Liu:

Effective Anomaly Detection for Microservice Systems with Real-Time Feature Selection. 101-110 - Amirali Amiri

, Evangelos Ntentos, Uwe Zdun:
Architectural Design Decisions for Data Communication of Cyber-Physical Systems. 111-120 - Yishu Li

, Jacky Keung
, Kwabena Ebo Bennin
, Xiaoxue Ma
, Yangyang Huang, Jingyu Zhang
:
Towards Requirements Engineering Activities for Machine Learning-Enabled FinTech Applications. 121-130 - Parsa Karami, Ikram Darif

, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo, Imen Benzarti:
On the Impact of Development Frameworks on Mobile Apps. 131-140 - Jiho Shin, Reem Aleithan, Jaechang Nam, Junjie Wang, Nima Shiri Harzevili, Song Wang:

An Empirical Study on the Stability of Explainable Software Defect Prediction. 141-150 - Atsushi Shirafuji, Yusuke Oda, Jun Suzuki, Makoto Morishita, Yutaka Watanobe:

Refactoring Programs Using Large Language Models with Few-Shot Examples. 151-160 - Jiawei Lu

, Zhijie Tang, Zhongxin Liu:
Improving Code Refinement for Code Review Via Input Reconstruction and Ensemble Learning. 161-170 - Jeongwhan Choi

, Duksan Ryu:
QoS-Aware Graph Contrastive Learning for Web Service Recommendation. 171-180 - Xiaonan Shi, Rui Li, Qingfeng Du, Cheng He, Fulong Tian:

LogFold: Enhancing Log Anomaly Detection Through Sequence Folding and Reconstruction. 181-190 - Jiahao Wei, Xuan Chen, Hongbin Xiao

, Shangzhi Tang, Xiaolan Xie, Zhi Li:
Natural Language Processing-Based Requirements Modeling: A Case Study on Problem Frames. 191-200 - Hongyan Wan, Zhiquan An, Bangchao Wang, Teng Xiong:

Sentiment Analysis for Requirements Elicitation from App Reviews: A Systematic Mapping Study. 201-210 - Shuting Kang, Heng Guo, Zitong Bo, Lijun Zhang, Qian Dong, Yunzhi Xue, Yanjun Wu:

SAB: Stacking Action Blocks for Efficiently Generating Diverse Multimodal Critical Driving Scenario. 211-220 - Qianbo Wei, Qian Tan, Yan Zhang, Zhen Xu, Hongyan Tan:

CP Decomposition and Set Theory based Root Cause Analysis in Online Service Systems. 221-228 - Shamsa Abid, Xuemeng Cai, Lingxiao Jiang

:
Interpreting CodeBERT for Semantic Code Clone Detection. 229-238 - Sayeedi Mottakin, Maliha Bintay Zaman, Manishankar Mondal, Atanu Shome:

Context-Adaptation Bugs in Micro-Clones. 239-248 - Rulin Xu, Xiaoguang Mao

, Luohui Chen:
P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis. 249-258 - Xiangxin Meng, Shaoxiao Lu, Xu Wang, Xudong Liu, Chunming Hu:

Improving Vulnerability Detection with Hybrid Code Graph Representation. 259-268 - Yuxin Zhao, Xinjun Mao, Tanghaoran Zhang

, Zhang Zhang:
MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Search Based on Knowledge Graph. 269-278 - Shulin Zhou, Zhijie Jiang, Shanshan Li, Xiaodong Liu, Zhouyang Jia, Yuanliang Zhang, Jun Ma, Haibo Mi:

WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment. 279-288 - Khairul Alam, Banani Roy, Alexander Serebrenik:

Reusability Challenges of Scientific Workflows: A Case Study for Galaxy. 289-298 - Laurens Studtmann, Selin Aydin

, Horst Lichter:
Histree: A Tree-Based Experiment History Tracking Tool for Jupyter Notebooks. 299-308 - Leping Zhang, Qianying Zhang, Xinyue Wang, Ximeng Li, Guohui Wang, Zhiping Shi, Yong Guan:

Formal Verification of Interrupt Isolation for the TrustZone-based TEE. 309-318 - Huanzhang Xiong, Gang Hou, Long Zhu, Jie Wang, Weiqiang Kong:

A Single-sample Pruning and Clustering Method for Neural Network Verification. 319-328 - Jiangwei Hao, Yuanyuan Xia, Fei Li, Hongru Yang, Zongjiang Yi, Bei Zhou, Jianmin Pang:

AMPT: Automatic Mixed-Precision Tuning Based on Accuracy Gain. 329-338 - Georg Simhandl, Philipp Paulweber, Uwe Zdun:

Developer's Cognitive Effort Maintaining Monoliths vs. Microservices - An Eye-Tracking Study. 339-348 - Yoshitake Hirabayashi, Shinji Ohota, Suzuka Fujii, Motoshi Saeki:

Defining Bad Smells and Automating Their Detection in Goal-Oriented Requirement Analysis Method iStar. 349-358 - Yi Yang, Xinjun Mao:

Understanding Developers' Contribution Motivation in Stack Overflow: A Systematic Review. 359-368 - Meenu Mary John, Helena Holmström Olsson, Jan Bosch, Daniel Gillblad:

Exploring Trade-Offs in MLOps Adoption. 369-375 - Tomoji Kishi:

Family-based Model Checking using Probabilistic Model Checker PRISM. 376-385 - Hyeongseok Eun, Eunkyoung Jee, Doo-Hwan Bae, Younggeul Kim, Yoonhee Lee:

Automated Simulation-Based Integration Testing for Multiple PLCs in a Reactor Protection System. 386-395 - Farnoushsadat Nilizadeh, Hamid Dashtbani

, Maryam Mouzarani:
Parameterized Search Heuristic Prediction for Concolic Execution. 396-404 - Dhriti Khanna, Subodh Sharma, Rahul Purandare:

Verifying Exception-Handling Code in Concurrent Libraries. 405-414 - Guilong Lu, Xiaolin Ju, Xiang Chen, Shaoyu Yang, Liang Chen, Hao Shen

:
Assessing the Effectiveness of Vulnerability Detection via Prompt Tuning: An Empirical Study. 415-424 - Thomas Laurent, Paolo Arcaini

, Fuyuki Ishikawa, Hirokazu Kawamoto, Kaoru Sawai, Eiichi Muramoto:
Investigating Multi- and Many-Objective Search for Stability-Aware Configuration of an Autonomous Delivery System. 425-430 - Mikael Ebrahimi Salari, Eduard Paul Enoiu, Cristina Seceleanu, Wasif Afzal

, Filip Sebek:
Automating Test Generation of Industrial Control Software Through a PLC-to-Python Translation Framework and Pynguin. 431-440 - Kazuki Yokoi, Eunjong Choi

, Norihiro Yoshida, Joji Okada, Yoshiki Higo:
Cost-Benefit Analysis for Modernizing a Large-Scale Industrial System. 441-449 - Tinghui Ouyang, Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Isao Echizen, Yoshiki Seo:

Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and Detection. 450-457 - Tinghui Ouyang, Isao Echizen, Yoshiki Seo:

A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality Assurance. 458-464 - Masahiro Watanabe, Yutaka Matsuno, Toshinori Takai:

A method for requirements elicitation and consensus-building for ideas in the vehicle system concept design using GSN. 465-472 - Muhammad Waseem Anwar

, Alessio Bucaioni, Federico Ciccozzi:
Timing-Aware Variability Resolution in EAST-ADL Product Line Architecture. 473-482 - Karim Ghallab

, Tewfik Ziadi
, Zaak Chalal:
Migrating Individual Applications into Software Product Lines Using the Mobioos Forge Platform. 483-492 - Xun An, Qihang Zhou

, Haichao Du, Zhenyu Song, Xiaoqi Jia:
Refining Use-After-Free Defense: Eliminating Dangling Pointers in Registers and Memory. 493-502 - M. Aiswarya Raj, Jan Bosch, Helena Holmström Olsson:

Maturity Assessment Model for Industrial Data Pipelines. 503-513 - Morayo Adedjouma, Fabien Gaudin, Philippe Fiani:

Assessing Safety of an Automated Vehicle Through Model-Driven Analysis and Simulation. 514-523 - Gonzalo Aguirre Dominguez, Keigo Kawaai, Hiroshi Maruyama:

Quality Assurance for ML Devices A Risk-Based Approach. 524-531 - Hyung Ho Kim:

Scalable Fault Tree Analysis for Functional Safety Software. 532-538 - Wantana Areeprayolkij, Mengzhen Li:

A Decision Tree of Bioengineering Study and Career Path for Educational Guidance. 539-543 - Chakkrit Tantithamthavorn, Norman Chen:

Unit Testing Challenges with Automated Marking. 544-548 - Nick Patrikeos, Yuchao Jiang, Fethi Rabhi

:
Bridging the Gap Between Academic Curricula and Industrial Practice with DevOps Education. 549-553 - Muhammad Awais, Muhammad Waseem Anwar

, Farooque Azam:
A Meta-Model for Outcome-Based Education: Streamlining Evaluation Processes. 554-558 - Zheng Li

, Austen Rainer
:
Exploiting Paired Concepts to Facilitate Software Engineering Education. 559-563 - Masateru Tsunoda, Hidetsugu Suto, Takeshi Yamada:

Toward Enhancing Software Developers' Persuasion and Engagement in Gamification. 564-568 - Yasin Sazid

, Mridha Md. Nafis Fuad, Kazi Sakib:
Automated Detection of Dark Patterns Using In-Context Learning Capabilities of GPT-3. 569-573 - Weitao Pan, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa, Foutse Khomh, Yann-Gaël Guéhéneuc:

A Machine Learning Based Approach to Detect Machine Learning Design Patterns. 574-578 - Shingo Ariwaka, Tatsuhiro Tsuchiya

:
On Mutation Testing of Graph Database Queries in the Cypher Language. 579-583 - Nabhan Suwanachote, Soratouch Pornmaneerattanatri, Yutaro Kashiwa, Kohei Ichikawa

, Pattara Leelaprute, Arnon Rungsawang, Bundit Manaskasemsak, Hajimu Iida:
A Pilot Study of Testing Infrastructure as Code for Cloud Systems. 584-588 - Saikat Mondal, Debajyoti Mondal, Chanchal K. Roy:

Investigating Technology Usage Span by Analyzing Users' Q&A Traces in Stack Overflow. 589-593 - Huaian Zhou, Tao Wang, Yang Zhang, Yang Shen:

TLDBERT: Leveraging Further Pre-Trained Model for Issue Typed Links Detection. 594-598 - Rajesh Kumar

, Nitish Yadav
:
A methodology for resilient safety-critical infrastructures using statistical model checking. 599-603 - Zheheng Liang, Guoquan Wu, Lei Cui, Zhenyue Long:

Performance Diagnosis for Microservice-Based Systems via Intra-/Inter-Trace Analysis. 604-606 - Andrea Rosà

, Matteo Basso, Leonardo Bohnhoff, Walter Binder:
Automated Runtime Transition between Virtual and Platform Threads in the Java Virtual Machine. 607-611 - Eun-Young Kang

, Thiago Rocha Silva:
Towards Formal Verification of Behaviour-Driven Development Scenarios Using Timed Automata. 612-616 - Eun-Young Kang

, Miguel Campusano
:
Towards Safety Assessment of Robot Behaviors in SMACH. 617-621 - Zheng Li

, Sridhar Sai Gorrepati, Desmond Greer
:
On Code Example-Aided Just-In-Time Learning for Programming Education. 622-626 - Shang-Pin Ma, Yan-Cih Liang, Sheng-Kai Wang, Yu-Wen Huang, Wan-Lin You:

TABot: A Teaching Assistant Chatbot for Software Engineering Courses. 627-631 - Michael Fu

, Chakkrit Kla Tantithamthavorn, Van Nguyen, Trung Le:
ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We? 632-636 - Shihan Wang, Yuxin Re, Rongrong Shi, Chiyuan Jing, Ying Liu, Haonan Tong:

An Empirical Study on Regression Techniques for Software Defect Number Prediction. 637-638 - Jin Zhang, Xingjin Wu, Yang Zhang, Shunyu Xu:

Detecting Bot on GitHub Leveraging Transformer-based Models: A Preliminary Study. 639-640 - Chansol Park, Robert Young Chul Kim:

Detecting Common Weakness Enumeration Through Training the Core Building Blocks of Similar Languages Based on the CodeBERT Model. 641-642 - Zhenyu Xu

, Victor S. Sheng:
Enhancing Logic Error Detection Through Program Pseudocodes. 643-644 - Suhee Jo, Ryeonggu Kwon, Gihwon Kwon:

Exploring Collaboration Patterns in GitHub Using Discrete Time Markov Chain. 645-646 - Jiyoung Chang, Ryeonggu Kwon, Gihwon Kwon:

Exploring Loss Scenarios of STPA with Reinforcement Learning: A Case Study of Platform Screen Door. 647-648 - Georgia M. Kapitsaki, Maria Papoutsoglou:

Funding sources in top Software Engineering conference publications. 649-650 - Hyeonachang Jeon, Seoyeon Kang, Seoksu Lee, Eun-Sun Cho:

Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator. 651-652 - Nao Souma, Waka Ito, Momoka Obara, Takako Kawaguchi, Yuka Akinobu, Toshiyuki Kurabayashi, Haruto Tanno, Kimio Kuramitsu

:
Can ChatGPT Correct Code Based on Logical Steps? 653-654 - Hoyoung Choi, Hyunjae Park, Young-June Choi, Kyungsik Han:

Consistency of Code: A Prompt Based Approach to Comprehend Functionality. 655-656 - Nenghui Hu, Zheng Bian, Ziqi Shuai, Zhenbang Chen, Yufeng Zhang:

Symbolic Execution of MPI Programs with One-Sided Communications. 657-658 - Jiahao Gong, Shunhui Ji, Pengcheng Zhang:

Test Case Generation for Cross-Blockchain Smart Contract. 659-660 - Ziqi Shuai

, Zhenbang Chen, Yufeng Zhang, Hengbiao Yu, Ji Wang:
Unsatisfiable Core Based Constraint Solving Cache in Symbolic Execution. 661-662 - Snmika Jinnouchi, Masateru Tsunoda:

Visualizing Program Behavior with a Ball and Pipes for Computer Science Unplugged. 663-664

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














