


default search action
25th ASE 2010: Antwerp, Belgium
- Charles Pecheur, Jamie Andrews, Elisabetta Di Nitto:

ASE 2010, 25th IEEE/ACM International Conference on Automated Software Engineering, Antwerp, Belgium, September 20-24, 2010. ACM 2010, ISBN 978-1-4503-0116-9 - Jan Bosch:

Keynote address: toward compositional software engineering. 1-2
Design and architecture
- Marwan Abi-Antoun, Jeffrey M. Barnes:

Analyzing security architectures. 3-12 - Christian Hirsch, John G. Hosking

, John C. Grundy
:
VikiBuilder: end-user specification and generation of visual wikis. 13-22 - Nicolas Mangano, Alex Baker, Mitch Dempsey, Emily Oh Navarro, André van der Hoek:

Software design sketching with calico. 23-32
Natural language processing and generation
- Raymond P. L. Buse, Westley Weimer:

Automatically documenting program changes. 33-42 - Giriprasad Sridhara, Emily Hill, Divya Muppaneni, Lori L. Pollock, K. Vijay-Shanker:

Towards automatically generating summary comments for Java methods. 43-52 - Hui Yang, Alistair Willis, Anne N. De Roeck, Bashar Nuseibeh

:
Automatic detection of nocuous coordination ambiguities in natural language requirements. 53-62
Architecture and product lines
- Michael Vierhauser

, Paul Grünbacher
, Alexander Egyed, Rick Rabiser
, Wolfgang Heider:
Flexible and scalable consistency checking on product line variability models. 63-72 - Thorsten Berger, Steven She, Rafael Lotufo, Andrzej Wasowski

, Krzysztof Czarnecki:
Variability modeling in the real: a perspective from the operating systems domain. 73-82 - Deshan Cooray, Sam Malek, Roshanak Roshandel, David Kilgore:

RESISTing reliability degradation through proactive reconfiguration. 83-92
Bug finding
- Guangtai Liang, Ling Wu, Qian Wu, Qianxiang Wang, Tao Xie, Hong Mei:

Automatic construction of an effective training set for prioritizing static analysis warnings. 93-102 - Julia Lawall, David Lo

:
An automated approach for finding variable-constant pairing bugs. 103-112 - Marouane Kessentini, Stéphane Vaucher, Houari A. Sahraoui:

Deviance from perfection is a better criterion than closeness to evil when identifying risky code. 113-122
Poster session I
- Heiko Paulheim

:
Seamlessly integrated, but loosely coupled: building user interfaces from heterogeneous components. 123-126 - Suntae Kim, Dae-Kyoo Kim

, Sooyong Park:
Tool support for quality-driven development of software architectures. 127-130 - Kunal Taneja

, Nuo Li, Madhuri R. Marri, Tao Xie, Nikolai Tillmann:
MiTV: multiple-implementation testing of user-input validators for web applications. 131-134 - Zhenchang Xing:

Model comparison with GenericDiff. 135-138 - Chang Hwan Peter Kim, Don S. Batory, Sarfraz Khurshid:

Eliminating products to test in a software product line. 139-142 - Reiner Hähnle

, Marcus Baum
, Richard Bubel, Marcel Rothe:
A visual interactive debugger based on symbolic execution. 143-146 - Óscar Sánchez Ramón, Jesús Sánchez Cuadrado

, Jesús García Molina:
Model-driven reverse engineering of legacy graphical user interfaces. 147-150 - Gabriele Bavota

, Andrea De Lucia
, Andrian Marcus
, Rocco Oliveto:
A two-step technique for extract class refactoring. 151-154 - Wanchun Li, Mary Jean Harrold, Carsten Görg

:
Detecting user-visible failures in AJAX web applications by analyzing users' interaction behaviors. 155-158 - Hamid Bagheri, Yuanyuan Song, Kevin J. Sullivan:

Architectural style as an independent variable. 159-162 - LiGuo Huang

, Daniel Port, Liang Wang, Tao Xie, Tim Menzies:
Text mining in supporting software systems risk assurance. 163-166
Formal demos I
- Benjamin Biegel, Stephan Diehl

:
JCCD: a flexible and extensible API for implementing custom code clone detectors. 167-168 - Eduardo Cunha de Almeida

, João Eugenio Marynowski, Gerson Sunyé, Patrick Valduriez:
PeerUnit: a framework for testing peer-to-peer systems. 169-170 - Rémi Mélisson, Philippe Merle

, Daniel Romero, Romain Rouvoy
, Lionel Seinturier:
Reconfigurable run-time support for distributed service component architectures. 171-172 - Hugo Bruneliere

, Jordi Cabot
, Frédéric Jouault, Frédéric Madiot:
MoDisco: a generic and extensible framework for model driven reverse engineering. 173-174 - Moritz Balz, Michael Striewe

, Michael Goedicke:
Tool support for continuous maintenance of state machine models in program code. 175-176 - Cameron M. Hine, Jean-Guy Schneider

, Steven Versteeg:
Reac2o: a runtime for enterprise system models. 177-178 - Corina S. Pasareanu, Neha Rungta:

Symbolic PathFinder: symbolic execution of Java bytecode. 179-180 - Raffi Khatchadourian

, Benjamin Muskalla:
Enumeration refactoring: a tool for automatically converting Java constants to enumerated types. 181-182 - Cordell Green:

Keynote address: the actual implementation will be derived from the formal specification -- KBSA, 1983. 183-184
Model-driven development
- Asadullah Shaikh

, Robert Clarisó
, Uffe Kock Wiil, Nasrullah Memon:
Verification-driven slicing of UML/OCL models. 185-194 - Senthil Mani, Vibha Singhal Sinha, Pankaj Dhoolia, Saurabh Sinha:

Automated support for repairing input-model faults. 195-204 - Brice Morin, Tejeddine Mouelhi, Franck Fleurey, Yves Le Traon

, Olivier Barais, Jean-Marc Jézéquel
:
Security-driven model-based dynamic adaptation. 205-214
Model checking
- KyungHee Kim, Tuba Yavuz-Kahveci, Beverly A. Sanders:

JRF-E: using model checking to give advice on eliminating memory model-related bugs. 215-224 - Ru He, Paul Jennings, Samik Basu, Arka P. Ghosh, Huaiqing Wu:

A bounded statistical approach for model checking of unbounded until properties. 225-234 - Sylvain Hallé

, Taylor Ettema, Chris Bunch, Tevfik Bultan:
Eliminating navigation errors in web applications via model checking and runtime enforcement of navigation state machines. 235-244
Requirements
- Marek Gibiec, Adam Czauderna, Jane Cleland-Huang:

Towards mining replacement queries for hard-to-retrieve traces. 245-254 - Massila Kamalrudin

, John C. Grundy
, John G. Hosking
:
Tool support for essential use cases to better capture software requirements. 255-264
Mining software repositories
- Renuka Sindhgatta

, Nanjangud C. Narendra, Bikram Sengupta, Karthik Visweswariah, Arthur G. Ryman:
Timesheet assistant: mining and reporting developer effort. 265-274 - Weiyi Shang, Bram Adams

, Ahmed E. Hassan:
An experience report on scaling tools for mining software repositories using MapReduce. 275-284
Poster session II
- Xuanzhe Liu

, Qi Zhao, Gang Huang, Zhi Jin, Hong Mei:
iMashup: assisting end-user programming for the service-oriented web. 285-288 - Kunal Taneja

, Yi Zhang
, Tao Xie:
MODA: automated test generation for database applications via mock objects. 289-292 - Wujie Zheng, Qirun Zhang

, Michael R. Lyu, Tao Xie:
Random unit-test generation with MUT-aware sequence recommendation. 293-296 - Norhayati Mohd. Ali

, John G. Hosking
, John C. Grundy
, Jun Huh:
End-user oriented critic specification for domain-specific visual language tools. 297-300 - Do Thi Bich Ngoc, Mizuhito Ogawa:

Checking roundoff errors using counterexample-guided narrowing. 301-304 - Rich Hilliard, Ivano Malavolta

, Henry Muccini
, Patrizio Pelliccione
:
Realizing architecture frameworks through megamodelling techniques. 305-308 - Mircea Lungu, Romain Robbes

, Michele Lanza
:
Recovering inter-project dependencies in software ecosystems. 309-312 - Eric M. Schulte, Stephanie Forrest

, Westley Weimer:
Automated program repair through the evolution of assembly code. 313-316 - Rafael V. Borges, Artur S. d'Avila Garcez, Luís C. Lamb

:
Integrating model verification and self-adaptation. 317-320 - Ekrem Kocaguneli, Gregory Gay

, Tim Menzies, Ye Yang, Jacky W. Keung
:
When to use data from other projects for effort estimation. 321-324 - David Woollard, Chris Mattmann, Daniel Popescu, Nenad Medvidovic:

Kadre: domain-specific architectural recovery for scientific software systems. 325-328 - Shadi Abdul Khalek, Sarfraz Khurshid:

Automated SQL query generation for systematic testing of database engines. 329-332 - Quentin Boucher, Andreas Classen, Patrick Heymans, Arnaud Bourdoux, Laurent Demonceau:

Tag and prune: a pragmatic approach to software product line implementation. 333-336 - Pongtip Aroonvatanaporn, Chatchai Sinthop, Barry W. Boehm:

Reducing estimation uncertainty with continuous assessment: tracking the "cone of uncertainty". 337-340 - Sukanya Ratanotayanon, Hye Jung Choi, Susan Elliott Sim:

Using transitive changesets to support feature location. 341-344
Formal demos II
- Jocelyn Simmonds

, Marsha Chechik:
RuMoR: monitoring and recovery for BPEL applications. 345-346 - Alexander Reder, Alexander Egyed:

Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML. 347-348 - A. C. Rajeev, Prahladavaradan Sampath, K. C. Shashidhar, S. Ramesh:

CoGenTe: a tool for code generator testing. 349-350 - Willem Visser, Jaco Geldenhuys:

Impendulo: debugging the programmer. 351-352 - Zhenchang Xing, Jun Sun

, Yang Liu
, Jin Song Dong:
SpecDiff: debugging formal specifications. 353-354 - Gregor Gabrysiak, Holger Giese, Andreas Seibel:

Deriving behavior of multi-user processes from interactive requirements validation. 355-356 - Lionel Montrieux, Jan Jürjens, Charles B. Haley, Yijun Yu, Pierre-Yves Schobbens

, Hubert Toussaint:
Tool support for code generation from a UMLsec property. 357-358 - David Harel, Shahar Maoz

, Smadar Szekely, Daniel Barkan:
PlayGo: towards a comprehensive tool for scenario based programming. 359-360 - Dinko Ivanov, Marin Orlic, Cristina Cerschi Seceleanu

, Aneta Vulgarakis:
REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems. 361-362 - Alexander Nöhrer, Alexander Egyed:

C2O: a tool for guided decision-making. 363-364 - Axel van Lamsweerde:

Keynote address: model engineering for model-driven engineering. 365-366
Specification and verification
- Ali Taleghani, Joanne M. Atlee:

Search-carrying code. 367-376 - Pieter Hooimeijer, Westley Weimer:

Solving string constraints lazily. 377-386 - David Lo

, Shahar Maoz
:
Scenario-based and value-based specification mining: better together. 387-396
Testing and debugging
- Dawei Qi, Abhik Roychoudhury

, Zhenkai Liang
:
Test generation to expose changes in evolving programs. 397-406 - Andreas Holzer, Christian Schallhart, Michael Tautschnig, Helmut Veith:

How did you specify your test suite. 407-416 - Aristide Fattori, Roberto Paleari, Lorenzo Martignoni, Mattia Monga

:
Dynamic and transparent analysis of commodity production systems. 417-426
Reuse and component-based development
- Paulo Trezentos, Inês Lynce

, Arlindo L. Oliveira
:
Apt-pbo: solving the software dependency problem using pseudo-boolean optimization. 427-436 - Daniel M. Germán, Yuki Manabe, Katsuro Inoue:

A sentence-matching method for automatic license identification of source code files. 437-446 - Nam H. Pham, Tung Thanh Nguyen

, Hoan Anh Nguyen, Tien N. Nguyen:
Detection of recurring software vulnerabilities. 447-456
Software evolution
- Xiaoyin Wang, David Lo

, Jiefeng Cheng, Lu Zhang, Hong Mei, Jeffrey Xu Yu:
Matching dependence-related queries in the system dependence graph. 457-466 - Hossein Tajalli, Joshua Garcia, George Edwards, Nenad Medvidovic:

PLASMA: a plan-based layered architecture for software model-driven adaptation. 467-476 - Adam Duley, Chris Spandikow, Miryung Kim:

A program differencing algorithm for verilog HDL. 477-486
Doctoral symposium
- Casandra Holotescu:

Error-avoiding adaptors for black-box software components. 487-492 - Michael Becker, Volker Gruhn:

Automated model grouping. 493-498 - Mihai Balint:

Automatic inference of abstract type behavior. 499-504 - Xiaofan Chen:

Extraction and visualization of traceability relationships between documents and source code. 505-510 - Dominic Letarte:

Model checking graph representation of precise boolean inter-procedural flow analysis. 511-516 - Matt Staats:

The influence of multiple artifacts on the effectiveness of software testing. 517-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














