![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
20th ASE 2005: Long Beach, CA, USA
- David F. Redmiles, Thomas Ellman, Andrea Zisman:
20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA. ACM 2005, ISBN 1-58113-993-4 - Alfonso Fuggetta:
The power of software. 1 - William R. Swartout
:
Virtual humans: lessons learned in integrating a large-scale AI project. 2 - Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. 3
Validation and verification I
- Sujatha Kashyap, Vijay K. Garg:
Exploiting predicate structure for efficient reachability detection. 4-13 - Aysu Betin-Can
, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Application of design for verification with concurrency controllers to air traffic control software. 14-23 - Dezhuang Zhang, Rance Cleaveland:
Efficient temporal-logic query checking for presburger systems. 24-33
Maintenance and evolution
- Steven P. Reiss:
A component model for internet-scale applications. 34-43 - Ada Diaconescu, John Murphy:
Automating the performance management of component-based enterprise systems through the use of redundancy. 44-53 - Zhenchang Xing, Eleni Stroulia
:
UMLDiff: an algorithm for object-oriented design differencing. 54-65
Program understanding
- Adrian Lienhard, Stéphane Ducasse, Gabriela Arévalo:
Identifying traits with formal concept analysis. 66-75 - Ana L. Milanova:
Precise identification of composition relationships for UML class diagrams. 76-85 - Rainer Koschke, Jochen Quante:
On dynamic feature location. 86-95
Testing I
- Daniel Hoffman, Kevin Yoo:
Blowtorch: a framework for firewall test automation. 96-103 - Mark Hennessy, James F. Power
:
An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software. 104-113 - David Saff, Shay Artzi, Jeff H. Perkins, Michael D. Ernst:
Automatic test factoring for java. 114-123
Code generation
- Gregor Engels, Martin Erwig:
ClassSheets: automatic generation of spreadsheet applications from object-oriented specifications. 124-133 - Karsten Ehrig, Claudia Ermel, Stefan Hänsgen, Gabriele Taentzer:
Generation of visual editors as eclipse plug-ins. 134-143 - Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang Yan, Younggyun Koh, Qinyi Wu, Charles Consel, Akhil Sahai, Koichi Moriyama:
Clearwater: extensible, flexible, modular code generation. 144-153
Configuration management & security
- Eelco Dolstra:
Secure sharing between untrusted users in a transparent source/binary deployment model. 154-163 - Yanyan Wang, Matthew J. Rutherford, Antonio Carzaniga, Alexander L. Wolf:
Automating experimentation on distributed testbeds. 164-173 - William G. J. Halfond, Alessandro Orso:
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. 174-183
Aspect oriented programming
- David C. Shepherd
, Jeffrey Palm, Lori L. Pollock, Mark Chu-Carroll:
Timna: a framework for automatically combining aspect mining analyses. 184-193 - Naoyasu Ubayashi, Genki Moriyama, Hidehiko Masuhara, Tetsuo Tamai:
A parameterized interpreter for modeling different AOP mechanisms. 194-203
Software visualization
- Akhil Mehra, John C. Grundy
, John G. Hosking
:
A generic approach to supporting diagram differencing and merging for collaborative design. 204-213 - Guillaume Langelier, Houari A. Sahraoui, Pierre Poulin:
Visualization-based analysis of quality for large-scale software systems. 214-223
Validation and verification II
- Alex Blewitt, Alan Bundy, Ian Stark
:
Automatic verification of design patterns in Java. 224-232 - Rahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott D. Stoller:
Optimized run-time race detection and atomicity checking using partial discovered types. 233-242 - Subash Shankar, Sinan Asa, Vladimir Sipos, Xiaowei Xu:
Reasoning about real-time statecharts in the presence of semantic variations. 243-252
Testing II
- Sara Sprenkle, Emily Gibson, Sreedevi Sampath, Lori L. Pollock:
Automated replay and failure detection for web applications. 253-262 - Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gupta
:
Locating faulty code using failure-inducing chops. 263-272 - James A. Jones, Mary Jean Harrold:
Empirical evaluation of the tarantula automatic fault-localization technique. 273-282
Short papers 1
- Songtao Xia, Ben Di Vito, César A. Muñoz:
Automated test generation for engineering applications. 283-286 - Shiva Nejati
, Marsha Chechik:
Let's agree to disagree. 287-290 - Dan Hao
, Ying Pan, Lu Zhang, Wei Zhao, Hong Mei, Jiasu Sun:
A similarity-aware approach to testing based fault localization. 291-294 - Aaron G. Cass, Leon J. Osterweil:
Process support to help novices design software faster and better. 295-299 - Magnus Eriksson, Henrik Morast, Jürgen Börstler
, Kjell Borg:
The PLUSS toolkit - extending telelogic DOORS and IBM-rational rose to support product line use case modeling. 300-304 - Marcelo F. Frias, Rodolfo Gamarra, Gabriela Steren, Lorena Bourg:
A strategy for efficient verification of relational specifications, based on monotonicity analysis. 305-308 - Tsong Yueh Chen
, Robert G. Merkel
:
Quasi-random testing. 309-312 - Arnaud Gotlieb, Tristan Denmat, Bernard Botella:
Constraint-based test data generation in the presence of stack-directed pointers. 313-316 - Sonia Ben Mokhtar
, Jinshan Liu, Nikolaos Georgantas, Valérie Issarny:
QoS-aware dynamic service composition in ambient intelligence environments. 317-320 - Na Liu, John C. Grundy
, John G. Hosking
:
A visual language and environment for composing web services. 321-324 - Abhay Vardhan, Mahesh Viswanathan:
Learning to verify branching time properties. 325-328 - Yuanfang Cai, Kevin J. Sullivan:
Simon: modeling and analysis of design space structures. 329-332 - Johannes Mayer:
Lattice-based adaptive random testing. 333-336 - Xiyang Liu, Hehui Liu, Bin Wang
, Ping Chen, Xiyao Cai:
A unified fitness function calculation rule for flag conditions to improve evolutionary testing. 337-341 - Dianxiang Xu, Kendall E. Nygard:
A threat-driven approach to modeling and verifying secure software. 342-346 - Tao Wang, Abhik Roychoudhury
:
Automated path generation for software fault localization. 347-351 - Américo Sampaio
, Ruzanna Chitchyan
, Paul Rayson
:
EA-Miner: a tool for automating aspect-oriented requirements identification. 352-355
Short papers 2
- David Coppit, Jiexin Lian:
yagg: an easy-to-use generator for structured test inputs. 356-359 - Alexander Egyed, Stefan Biffl, Matthias Heindl, Paul Grünbacher
:
Determining the cost-quality trade-off for automated software traceability. 360-363 - Jean-François Couchot, Alain Giorgetti
, Nikolai Kosmatov:
A uniform deductive approach for parameterized protocol safety. 364-367 - Johan Fredriksson, Massimo Tivoli
, Ivica Crnkovic
:
A component-based development framework for supporting functional and non-functional analysis in control system design. 368-371 - Rohit Gheyi, Tiago Massoni, Paulo Borba
:
A rigorous approach for proving model refactorings. 372-375 - Alma L. Juarez Dominguez, Nancy A. Day:
Compositional reasoning for port-based distributed systems. 376-379 - Li Tan:
Model-based self-monitoring embedded programs with temporal logic specifications. 380-383 - Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn:
Specialization and extrapolation of software cost models. 384-387 - Chouki Tibermacine, Régis Fleurquin, Salah Sadou
:
NFRs-aware architectural evolution of component-based software. 388-391 - Jan Jürjens, Mark Yampolskiy:
Code security analysis with assertions. 392-395 - Tristan Denmat, Mireille Ducassé, Olivier Ridoux:
Data mining and cross-checking of execution traces: a re-interpretation of Jones, Harrold and Stasko test information. 396-399 - May Haydar, Sergiy Boroday, Alexandre Petrenko
, Houari A. Sahraoui:
Properties and scopes in web model checking. 400-404 - Paola Inverardi, Leonardo Mostarda, Massimo Tivoli
, Marco Autili
:
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. 405-409 - Neha Rungta, Eric G. Mercer:
A context-sensitive structural heuristic for guided search model checking. 410-413 - Willem Visser, Corina S. Pasareanu, Radek Pelánek
:
Test input generation for red-black trees using abstraction. 414-417 - Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Mossé:
Testing in resource constrained execution environments. 418-422 - Justin Ward, Garrin Kimmell, Perry Alexander:
Prufrock: a framework for constructing polytypic theorem provers. 423-426
Formal tool demo presentations
- Guozheng Ge, E. James Whitehead Jr.:
Bamboo: an architecture modeling and code generation framework for configuration management systems. 427-428 - Jürgen Falb, Roman Popp, Thomas Röck, Helmut Jelinek, Edin Arnautovic, Hermann Kaindl
:
Using communicative acts in high-level specifications of user interfaces for their automated synthesis. 429-430 - Jocelyn Simmonds
, M. Cecilia Bastarrica:
A tool for automatic UML model consistency checking. 431-432 - Peter Stewart Hearty, Norman E. Fenton
, Martin Neil
, Patrick Cates:
Automated population of causal models for improved software risk assessment. 433-434
Doctoral symposium
- Steve M. Easterbrook, Sebastián Uchitel
:
Introduction to doctoral symposium. 435 - Hui Wu, Jeff Gray
:
Automated generation of testing tools for domain-specific languages. 436-439 - Renée C. Bryce, Charles J. Colbourn:
Constructing interaction test suites with greedy algorithms. 440-443 - Gudmund Grov:
Verifying the correctness of hume programs: an approach combining deductive and algorithmic reasoning. 444-447 - Yuehua Lin, Jeff Gray
:
A model transformation approach to automatic model construction and evolution. 448-451 - Shiva Nejati
:
Formal support for merging and negotiation. 456-460 - Jiang Zheng:
In regression testing selection when source code is not available. 452-455
Workshops
- Carsten Rudolph, Antonio Mana
:
Specification and automated processing of security requirements (SAPS'05). 460 - Paul E. Black
, Michael Kass:
Software security assurance tools, techniques and metrics (SSATTM). 461 - Jonathan I. Maletic, Giuliano Antoniol, Jane Cleland-Huang, Jane Huffman Hayes:
3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005). 462 - Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones:
Software certificate management (SoftCeMent'05). 463 - Andrea Zisman, Thomas Ellman:
2nd Workshop on the state of the art in automated software engineering. 464
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.