


default search action
31st ASE 2016: Singapore
- David Lo, Sven Apel

, Sarfraz Khurshid:
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3-7, 2016. ACM 2016, ISBN 978-1-4503-3845-5
Keynotes
- Markus Püschel:

Program generation for performance. 1 - Wolfram Schulte:

Changing microsoft's build: revolution or evolution. 2 - David S. Rosenblum:

The power of probabilistic thinking. 3
Test Evaluation
- Michele Tufano, Fabio Palomba

, Gabriele Bavota
, Massimiliano Di Penta, Rocco Oliveto, Andrea De Lucia
, Denys Poshyvanyk
:
An empirical investigation into the nature of test smells. 4-15 - Mohammad Amin Alipour

, August Shi, Rahul Gopinath
, Darko Marinov, Alex Groce:
Evaluating non-adequate test-case reduction. 16-26 - Peter Ohmann, David Bingham Brown

, Naveen Neelakandan, Jeff T. Linderoth, Ben Liblit
:
Optimizing customized program coverage. 27-38 - Willem Visser:

What makes killing a mutant hard. 39-44 - Panagiotis Stratis, Ajitha Rajan:

Test case permutation to improve execution time. 45-50
Learning
- Bowen Xu, Deheng Ye, Zhenchang Xing, Xin Xia

, Guibin Chen
, Shanping Li:
Predicting semantically linkable knowledge in developer online forums via convolutional neural network. 51-62 - Raja Ben Abdessalem, Shiva Nejati

, Lionel C. Briand, Thomas Stifter:
Testing advanced driver assistance systems using multi-objective search and neural networks. 63-74 - Fumin Qi, Xiao-Yuan Jing, Xiaoke Zhu, Fei Wu, Li Cheng:

Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation. 75-86 - Martin White, Michele Tufano, Christopher Vendome, Denys Poshyvanyk

:
Deep learning code fragments for code clone detection. 87-98
Recommendation and Automation
- Christoph Hannebauer, Michael Patalas, Sebastian Stünkel, Volker Gruhn:

Automatically recommending code reviewers based on their expertise: an empirical comparison. 99-110 - Sebastian Proksch, Sven Amann, Sarah Nadi, Mira Mezini:

Evaluating the evaluations of code recommender systems: a reality check. 111-121 - Rahul Krishna, Tim Menzies

, Wei Fu:
Too much automation? the bellwether effect and its implications for transfer learning. 122-131 - Marcelino Rodriguez-Cancio, Benoît Combemale, Benoit Baudry:

Automatic microbenchmark generation to prevent dead code elimination and constant folding. 132-143
Model-Based Testing and Oracles
- Rachel Tzoref-Brill, Paul A. Wojciak, Shahar Maoz

:
Visualization of combinatorial models and test plans. 144-154 - Ivan Bocic, Tevfik Bultan:

Finding access control bugs in web applications with CanCheck. 155-166 - Mariano Ceccato

, Cu D. Nguyen, Dennis Appelt, Lionel C. Briand:
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities. 167-177 - Junjie Chen, Yanwei Bai, Dan Hao

, Lingming Zhang, Lu Zhang, Bing Xie, Hong Mei:
Supporting oracle construction via static analysis. 178-189
Crowdsourcing
- Junjie Wang, Song Wang, Qiang Cui, Qing Wang:

Local-based active classification of test report to assist crowdsourced testing. 190-201 - Yang Feng, James A. Jones, Zhenyu Chen, Chunrong Fang

:
Multi-objective test report prioritization using image understanding. 202-213 - Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun

, Yijun Yu
, Bashar Nuseibeh
, Wenyun Zhao:
CrowdService: serving the individuals through mobile crowdsourcing and service composition. 214-219 - Mohammad Masudur Rahman

, Chanchal K. Roy:
QUICKAR: automatic query reformulation for concept location using crowdsourced knowledge. 220-225
Android
- Lili Wei

, Yepang Liu
, Shing-Chi Cheung
:
Taming Android fragmentation: characterizing and detecting compatibility issues for Android apps. 226-237 - Young Min Baek, Doo-Hwan Bae:

Automated model-based Android GUI testing using multi-level GUI comparison criteria. 238-249 - Sungho Lee, Julian Dolby, Sukyoung Ryu

:
HybriDroid: static analysis framework for Android hybrid applications. 250-261
Faults
- Ming Wen, Rongxin Wu

, Shing-Chi Cheung
:
Locus: locating bugs from software changes. 262-273 - Gulsher Laghari, Alessandro Murgia, Serge Demeyer

:
Fine-tuning spectrum based fault localisation with frequent method item sets. 274-285 - Rafi Almhana, Wiem Mkaouer

, Marouane Kessentini, Ali Ouni
:
Recommending relevant classes for bug reports using multi-objective search. 286-295 - Yibiao Yang

, Mark Harman, Jens Krinke, Syed S. Islam, David W. Binkley, Yuming Zhou, Baowen Xu
:
An empirical study on dependence clusters for effort-aware fault-proneness prediction. 296-307
Program Analysis
- Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu:

StraightTaint: decoupled offline symbolic taint analysis. 308-319 - Tamás Szabó, Sebastian Erdweg, Markus Voelter:

IncA: a DSL for the definition of incremental program analyses. 320-331 - Maria Christakis, Christian Bird:

What developers want and need from program analysis: an empirical study. 332-343 - Haipeng Cai

, Douglas Thain
:
DistIA: a cost-effective dynamic impact analysis for distributed programs. 344-355
Locks and Races
- Yan Cai

, Zijiang Yang:
Radius aware probabilistic testing of deadlocks with guarantees. 356-367 - Ziyi Lin, Hao Zhong

, Yuting Chen, Jianjun Zhao:
LockPeeker: detecting latent locks in Java APIs. 368-378 - Daniel Kroening

, Daniel Poetzl, Peter Schrammel
, Björn Wachter:
Sound static deadlock analysis for C/Pthreads. 379-390 - Vesal Vojdani

, Kalmer Apinis
, Vootele Rõtov, Helmut Seidl, Varmo Vene, Ralf Vogler:
Static race detection for device drivers: the Goblint approach. 391-402
Empirical Studies and New Ideas
- Martin Hentschel, Reiner Hähnle

, Richard Bubel:
An empirical evaluation of two user interfaces of an interactive program verifier. 403-413 - Salome Maro, Anthony Anjorin

, Rebekka Wohlrab
, Jan-Philipp Steghöfer:
Traceability maintenance: factors and guidelines. 414-425 - Michael Hilton

, Timothy Tunnell, Kai Huang, Darko Marinov, Danny Dig:
Usage, costs, and benefits of continuous integration in open-source projects. 426-437 - Ana Pescador, Juan de Lara

:
DSL-maps: from requirements to design of domain-specific languages. 438-443 - Dimitar Asenov, Peter Müller, Lukas Vogel:

The IDE as a scriptable information system. 444-449
Inference
- Zvonimir Pavlinovic, Akash Lal, Rahul Sharma:

Inferring annotations for device drivers from verification histories. 450-460 - Alisa J. Maas, Henrique Nazaré, Ben Liblit

:
Array length inference for C library bindings. 461-471 - Yuan Jochen Kang, Baishakhi Ray, Suman Jana:

APEx: automated inference of error specifications for C APIs. 472-482
Interactions, Deltas, Goals
- Jens Meinicke, Chu-Pan Wong, Christian Kästner, Thomas Thüm, Gunter Saake:

On essential configuration complexity: measuring interactions in highly-configurable systems. 483-494 - Yi Li

, Chenguang Zhu
, Julia Rubin, Marsha Chechik:
Precise semantic history slicing through dynamic delta refinement. 495-506 - Renzo Degiovanni

, Nicolás Ricci, Dalal Alrajeh, Pablo F. Castro, Nazareno Aguirre:
Goal-conflict detection based on temporal satisfiability checking. 507-518
Symbolic Execution
- Muhammad Suleman Mahmood, Maryam Abdul Ghafoor, Junaid Haroon Siddiqui

:
Symbolic execution of stored procedures in database management systems. 519-530 - Shengjian Guo, Markus Kusano, Chao Wang:

Conc-iSE: incremental symbolic execution of concurrent software. 531-542 - Van-Thuan Pham

, Marcel Böhme
, Abhik Roychoudhury
:
Model-based whitebox fuzzing for program binaries. 543-553 - Xin Li, Yongjuan Liang, Hong Qian, Yi-Qi Hu, Lei Bu

, Yang Yu, Xin Chen, Xuandong Li:
Symbolic execution of complex program driven by machine learning based constraint solving. 554-559 - Masataka Nishi:

Towards bounded model checking using nonlinear programming solver. 560-565
Design and Specs
- Jitendra Singh Thakur

, Atul Gupta
:
Identifying domain elements from textual specifications. 566-577 - Sven Peldszus

, Géza Kulcsár, Malte Lochau, Sandro Schulze
:
Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching. 578-589 - Andreas Demuth, Markus Riedl-Ehrenleitner, Alexander Egyed:

Efficient detection of inconsistencies in a multi-developer engineering environment. 590-601 - Owolabi Legunsen, Wajih Ul Hassan, Xinyue Xu, Grigore Rosu, Darko Marinov:

How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications. 602-613
Test Generation
- Akihisa Yamada

, Armin Biere
, Cyrille Artho, Takashi Kitamura
, Eun-Hye Choi
:
Greedy combinatorial test case generation using unsatisfiable cores. 614-624 - Benwen Zhang, Emily Hill, James Clause:

Towards automatically generating descriptive names for unit tests. 625-636 - Nan Li, Yu Lei, Haider Riaz Khan

, Jingshu Liu, Yun Guo:
Applying combinatorial test data generation to big data applications. 637-647 - Hongyin Tang, Guoquan Wu, Jun Wei, Hua Zhong:

Generating test cases to expose concurrency bugs in Android applications. 648-653 - Matthew Patrick, Matthew D. Castle

, Richard O. J. H. Stutt, Christopher A. Gilligan:
Automatic test image generation using procedural noise. 654-659
Code Comparison and Transformation
- Georg Dotzler, Michael Philippsen

:
Move-optimized source code tree differencing. 660-671 - Davood Mazinanian, Nikolaos Tsantalis

:
Migrating cascading style sheets to preprocessors by introducing mixins. 672-683 - Tianxiao Gu, Chengnian Sun, Xiaoxing Ma

, Jian Lü, Zhendong Su
:
Automatic runtime recovery via error handler synthesis. 684-695 - Xiao Cheng, Zhiming Peng, Lingxiao Jiang

, Hao Zhong
, Haibo Yu, Jianjun Zhao:
Mining revision histories to detect cross-language clones without intermediates. 696-701 - Jürgen Cito, Julia Rubin, Phillip Stanley-Marbell

, Martin C. Rinard:
Battery-aware transformations in mobile applications. 702-707
Language
- Song Wang, Devin Chollak, Dana Movshovitz-Attias, Lin Tan:

Bugram: bug detection with n-gram language models. 708-719 - Matthias Höschele, Andreas Zeller

:
Mining input grammars from dynamic taints. 720-725 - Phong Minh Vu, Hung Viet Pham, Tam The Nguyen, Tung Thanh Nguyen

:
Phrase-based extraction of user opinions in mobile app reviews. 726-731
Mining and Retrieval
- Leon Moonen

, Stefano Di Alesio, David W. Binkley, Thomas Rolfsnes:
Practical guidelines for change recommendation using association rule mining. 732-743 - Guibin Chen

, Chunyang Chen
, Zhenchang Xing, Bowen Xu:
Learning a dual-language vector space for domain-specific cross-lingual question retrieval. 744-755
Mobile and Security
- Li Li, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein

:
Reflection-aware static analysis of Android apps. 756-761 - Tianyong Wu, Jierui Liu, Xi Deng, Jun Yan, Jian Zhang:

Relda2: an effective static analysis tool for resource leak detection in Android apps. 762-767 - Zhongyi Zhai, Bo Cheng, Meng Niu, Zhaoning Wang, Yimeng Feng

, Junliang Chen:
An end-user oriented tool suite for development of mobile applications. 768-773 - Huafeng Zhang

, Yu Jiang, Han Liu, Hehua Zhang, Ming Gu, Jia-Guang Sun:
Model driven design of heterogeneous synchronous embedded systems. 774-779 - Saahil Ognawala, Martín Ochoa

, Alexander Pretschner, Tobias Limmer:
MACKE: compositional analysis of low-level vulnerabilities with symbolic execution. 780-785 - Fengjuan Gao, Linzhang Wang, Xuandong Li:

BovInspector: automatic inspection and repair of buffer overflow vulnerabilities. 786-791
Performance, Recommendation, and Analysis
- Mohammad Masudur Rahman

, Chanchal Kumar Roy, Jesse Redl, Jason A. Collins:
CORRECT: code reviewer recommendation at GitHub for Vendasta technologies. 792-797 - Mushtaq Raza

, João Pascoal Faria
:
ProcessPAIR: a tool for automated performance analysis and improvement recommendation in software development. 798-803 - Gillian J. Greene, Bernd Fischer

:
CVExplorer: identifying candidate developers by mining and exploring their open source contributions. 804-809 - Thomas Kowark, Christoph Matthies

, Matthias Uflacker, Hasso Plattner:
Lightweight collection and storage of software repository data with DataRover. 810-815 - Abdullah M. Alshanqiti

, Reiko Heckel, Timo Kehrer:
Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis. 816-821 - Felix Schwägerl

, Bernhard Westfechtel:
SuperMod: tool support for collaborative filtered model-driven software product line engineering. 822-827 - Jitendra Singh Thakur

, Atul Gupta
:
AnModeler: a tool for generating domain models from textual specifications. 828-833 - Chunyang Chen

, Zhenchang Xing:
SimilarTech: automatically recommend analogical libraries across different programming languages. 834-839
Testing, Validation, and Verification
- Jian Liu, John C. Grundy

, Iman Avazpour, Mohamed Almorsy Abdelrazek:
TeeVML: tool support for semi-automatic integration testing environment emulation. 840-845 - Martin Hentschel, Reiner Hähnle

, Richard Bubel:
The interactive verification debugger: effective understanding of interactive proof attempts. 846-851 - Yixiao Yang, Yu Jiang, Ming Gu, Jia-Guang Sun:

Verifying simulink stateflow model: timed automata approach. 852-857 - Lin Cheng, Jialiang Chang, Zijiang Yang, Chao Wang:

GUICat: GUI testing as a service. 858-863 - Nor Aiza Moketar

, Massila Kamalrudin
, Safiah Sidek, Mark Robinson, John C. Grundy
:
An automated collaborative requirements engineering tool for better validation of requirements. 864-869 - Tamás Szabó, Simon Alperovich, Markus Voelter, Sebastian Erdweg:

An extensible framework for variable-precision data-flow analyses in MPS. 870-875
Doctoral Symposium
- Xuan-Bach Dinh Le:

Towards efficient and effective automatic program repair. 876-879 - Joseph Chan Joo Keng:

Automated testing and notification of mobile app privacy leak-cause behaviours. 880-883 - Davoud Mougouei

:
Factoring requirement dependencies in software requirement selection using graphs and integer programming. 884-887 - Önder Babur

:
Statistical analysis of large sets of models. 888-891 - Jürgen Cito:

Developer targeted analytics: supporting software development decisions with runtime information. 892-895 - Ferdian Thung:

API recommendation system for software development. 896-899

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














