


default search action
20th APSEC 2013: Ratchathewi, Bangkok, Thailand - Volume 1
- Pornsiri Muenchaisri, Gregg Rothermel:

20th Asia-Pacific Software Engineering Conference, APSEC 2013, Ratchathewi, Bangkok, Thailand, December 2-5, 2013 - Volume 1. IEEE Computer Society 2013
Software Quality and Testing 1
- Ali Idri, Karima Moumane

, Alain Abran
:
On the Use of Software Quality Standard ISO/IEC9126 in Mobile Environments. 1-8 - Noriko Hanakawa, Masaki Obana:

System Quality Improvement Including Software and Infrastructure Based on Software Metrics Approach. 9-16 - Xiaoshan Sun, Liang Cheng, Yang Zhang, Yi Deng, Jingbiao Hou:

Refining the Pointer Analysis by Exploiting Constraints on the CFL-Paths. 17-24 - Denzil Correa, Sangeeta Lal, Apoorv Saini, Ashish Sureka:

Samekana: A Browser Extension for Including Relevant Web Links in Issue Tracking System Discussion Forum. 25-33 - Subhajit Datta

, A. S. M. Sajeev, Santonu Sarkar
, Nishant Kumar:
Factors Influencing Research Contributions and Researcher Interactions in Software Engineering: An Empirical Study. 34-41 - Tharindu Patikirikorala, Alan Colman

, Jun Han:
Can Control-Component Libraries Reduce the Costs of Developing Control Engineering-Based Self-Adaptive Systems? 42-49
Software Requirements Engineering 1
- Issam Jebreen

, Robert Wellington, Stephen G. MacDonell:
Packaged Software Implementation Requirements Engineering by Small Software Enterprises. 50-57 - Tatsuya Abe, Shinpei Hayashi

, Motoshi Saeki:
Modeling Security Threat Patterns to Derive Negative Scenarios. 58-66 - Gang Wang, Li Zhang, Jing Jiang, Wei Jiang:

QoS-Based Service Composition under Various QoS Requirements. 67-74
Software Quality and Testing 2
- Johannes Schönböck

, Gerti Kappel, Manuel Wimmer, Angelika Kusel, Werner Retschitzegger
, Wieland Schwinger:
TETRABox - A Generic White-Box Testing Framework for Model Transformations. 75-82 - Aditya Desai, Era Jain

, Subhajit Roy:
Facilitating Verification in Program Loops by Identification of Static Iteration Patterns. 83-90 - Matthew Patrick, Robert Alexander, Manuel Oriol, John A. Clark:

Selecting Highly Efficient Sets of Subdomains for Mutation Adequacy. 91-98 - Satoshi Fujimoto, Hideharu Kojima

, Tatsuhiro Tsuchiya
:
A Value Weighting Method for Pair-wise Testing. 99-105
Empirical Software Engineering 2
- Norimitsu Kasai

, Shuji Morisaki, Ken-ichi Matsumoto:
Fault-Prone Module Prediction Using a Prediction Model and Manual Inspection. 106-115 - Marshima Mohd Rosli

, Ewan D. Tempero, Andrew Luxton-Reilly
:
Can We Trust Our Results? A Mapping Study on Data Quality. 116-123 - Satya Prateek, Anjaneyulu Pasala

, Luis Moreno Aracena:
Evaluating Performance of Network Metrics for Bug Prediction in Software. 124-131 - Seiji Sato, Hironori Washizaki

, Yoshiaki Fukazawa, Sakae Inoue, Hiroyuki Ono, Yoshiiku Hanai, Mikihiko Yamamoto:
Effects of Organizational Changes on Product Metrics and Defects. 132-139
Software Requirements Engineering 2
- Chun Liu, Wei Zhang, Haiyan Zhao, Zhi Jin:

Analyzing Early Requirements of Cyber-physical Systems through Structure and Goal Modeling. 140-147 - Sanjay Ghosh, Srini Ramaswamy, Raoul Praful Jetley:

Towards Requirements Change Decision Support. 148-155 - Duc-Hanh Dang

, Jordi Cabot
:
Automating Inference of OCL Business Rules from User Scenarios. 156-163 - Xiaohong Chen, Haiying Sun, Ronghua Ye, Jing Liu:

Problem Frames Construction from Feature Models. 164-171
Software Quality and Testing 3
- Dalin Zhang

, Dahai Jin, Yunzhan Gong, Hailong Zhang:
Diagnosis-Oriented Alarm Correlations. 172-179 - Marinos Kintis, Nicos Malevris:

Identifying More Equivalent Mutants via Code Similarity. 180-188 - Saurabh Tiwari

, Atul Gupta
:
An Approach to Generate Safety Validation Test Cases from UML Activity Diagram. 189-198 - Yung-Pin Cheng, Jhih-Hao Chen, Yu-Ying Yu:

Executable Program Documentation Based on Debugging Break Points. 199-206
Empirical Software Engineering 3
- Saurabh Tiwari

, Atul Gupta
:
A Controlled Experiment to Assess the Effectiveness of Eight Use Case Templates. 207-214 - Roman Popp

, Hermann Kaindl
, David Raneburger:
Connecting Interaction Models and Application Logic for Model-Driven Generation of Web-Based Graphical User Interfaces. 215-222 - Kaiping Liu, Hee Beng Kuan Tan:

Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications. 223-230
Software Requirements Engineering 3
- Sofia Ouhbi

, Ali Idri, José Luis Fernández-Alemán, Ambrosio Toval:
Software Quality Requirements: A Systematic Mapping Study. 231-238 - Janardan Misra, Subhabrata Das:

Entity Disambiguation in Natural Language Text Requirements. 239-246 - Hui Yang, Peng Liang

:
Reasoning about Stakeholder Groups for Requirements Negotiation Based on Power Relationships. 247-254
Distributed and Parallel Software Systems
- Teemu Kanstrén, Tuomas Kekkonen:

Distributed Online Test Generation for Model-Based Testing. 255-262 - Frank Padberg, Luis M. Carril, Oliver Denninger, Martin Blersch

:
On Detecting Concurrency Defects Automatically at the Design Level. 263-271 - Granville Barnett, Shengchao Qin

:
Data-Race-Freedom of Concurrent Programs. 272-279
Software Maintenance and Evolution
- Jakub Malý, Martin Necaský

:
Semantic Document Adaptation with OCL Annotations. 280-288 - Ronald Jabangwe, Kai Petersen

, Darja Smite:
Visualization of Defect Inflow and Resolution Cycles: Before, During and After Transfer. 289-298 - Eijiro Kitsu, Takayuki Omori, Katsuhisa Maruyama:

Detecting Program Changes from Edit History of Source Code. 299-306
Formal Methods in Software Engineering 1
- Haitao Zhang, Toshiaki Aoki

, Hsin-Hung Lin
, Min Zhang
, Yuki Chiba, Kenro Yatake:
SMT-Based Bounded Model Checking for OSEK/VDX Applications. 307-314 - Kriangkrai Traichaiyaporn, Toshiaki Aoki

:
Preserving Correctness of Requirements Evolution through Refinement in Event-B. 315-322 - Patrice Carle, Christine Choppy, Romain Kervarc, Ariane Piel:

A Formal Coloured Petri Net Model for Hazard Detection in Large Event Flows. 323-330
Product-Line Software Engineering
- Niloofar Khedri, Ramtin Khosravi:

Handling Database Schema Variability in Software Product Lines. 331-338 - Mikio Aoyama, Nozomi Kurono:

An Extended Orthogonal Variability Model for Metadata-Driven Multitenant Cloud Services. 339-346 - Gerald Holl, Paul Grünbacher

, Christoph Elsner, Thomas Klambauer, Michael Vierhauser
:
Constraint Checking in Distributed Product Configuration of Multi Product Lines. 347-354
Formal Methods in Software Engineering 2
- Weiqiang Kong, Leyuan Liu

, Takahiro Ando, Hirokazu Yatsu, Kenji Hisazumi
, Akira Fukuda:
Harnessing SMT-Based Bounded Model Checking through Stateless Explicit-State Exploration. 355-362 - Sun Ding, Hee Beng Kuan Tan, Lwin Khin Shar

, Bindu Madhavi Padmanabhuni:
Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities. 363-370 - Naiju Zeng, Wenhui Zhang:

A SystemC Semantics in Guarded Assignment Systems and Its Applications with VERDS. 371-379
Software Architecture and Design
- Emmanuelle Rouillé, Benoît Combemale, Olivier Barais

, David Touzet, Jean-Marc Jézéquel
:
Integrating Software Process Reuse and Automation. 380-387 - Shin Nakajima:

Safe Substitution of Components in Self-Adaptive Web Applications. 388-395 - Ana Dragomir, Horst Lichter

:
Run-Time Monitoring and Real-Time Visualization of Software Architectures. 396-403 - Yin Hang, Hans Hansson:

Handling Multiple Mode Switch Scenarios in Component-Based Multi-mode Systems. 404-413
Formal Methods in Software Engineering 3
- Ling Yin, Jing Liu, Zuohua Ding, Frédéric Mallet

, Robert de Simone:
Schedulability Analysis with CCSL Specifications. 414-421 - Peng Liu, Huibiao Zhu, Shengchao Qin

, Phillip J. Brooke, Xi Wu:
Linking the Semantics of BPEL Using Maude. 422-431 - Phu Hong Nguyen

, Jacques Klein
, Yves Le Traon
, Max E. Kramer:
A Systematic Review of Model-Driven Security. 432-441 - Tingxun Shi, Ruizhi Wang, Daolan Zhang, Wenpin Jiao, Bing Xie:

Quality Driven Design of Program Frameworks for Intelligent Sensor Applications. 442-449
Component-Based Software Engineering and Mobile and Cloud Systems
- Ping Su, Chun Cao, Xiaoxing Ma

, Jian Lu:
Automated Management of Dynamic Component Dependency for Runtime System Reconfiguration. 450-458 - Shang-Pin Ma

, Jheng-Shiun Jiang, Wen-Tin Lee:
Service Brick Composition Framework for Smartphones. 459-466 - Timo Aaltonen, Varvana Myllärniemi, Mikko Raatikainen

, Niko Mäkitalo, Jari Pääkkö:
An Action-Oriented Programming Model for Pervasive Computing in a Device Cloud. 467-475
Software Engineering Environments and Tools
- Hiroshi Kazato, Shinpei Hayashi

, Tsuyoshi Oshima, Shunsuke Miyata, Takashi Hoshino, Motoshi Saeki:
Extracting and Visualizing Implementation Structure of Features. 476-484 - Weiqing Zhang, Birger Møller-Pedersen:

Tool Integration Models. 485-494 - Timo Lehtonen, Veli-Pekka Eloranta, Marko Leppänen

, Essi Isohanni:
Visualizations as a Basis for Agile Software Process Improvement. 495-502 - Veli-Pekka Eloranta, Kai Koskimies, Tommi Mikkonen, Jyri Vuorinen:

Scrum Anti-Patterns - An Empirical Study. 503-510
Short Papers: Software Architecture
- Iris Groher

, Rainer Weinreich
:
Strategies for Aligning Variability Model and Architecture. 511-516 - Naoya Nitta, Izuru Kume, Yasuhiro Takemura:

A Method for Early Detection of Mismatches between Framework Architecture and Execution Scenarios. 517-522 - Changxiao Du, Xiaohong Li, Hong Shi, Jing Hu, Ruitao Feng

, Zhiyong Feng:
Architecture Security Evaluation Method Based on Security of the Components. 523-528
Short Papers: Software Project Management, Design, Testing, and Verification
- Peng Zhou, Hareton K. N. Leung:

A New Scheduling Strategy for Risk Mitigation. 529-534 - Kati Kuusinen

, Tommi Mikkonen:
Designing User Experience for Mobile Apps: Long-Term Product Owner Perspective. 535-540 - Passakorn Phannachitta, Jacky Keung

, Akito Monden
, Ken-ichi Matsumoto:
Improving Analogy-Based Software Cost Estimation through Probabilistic-Based Similarity Measures. 541-546 - Xuan-Linh Ha, Thanh Tho Quan, Yang Liu

, Jun Sun
:
Multi-core Model Checking Algorithms for LTL Verification with Fairness Assumptions. 547-552 - Qian Wang, Dahai Jin, Yunzhan Gong:

Null Dereference Detection via a Backward Analysis. 553-558 - Boutheina Bannour

, Christophe Gaston
, Marc Aiguier, Arnault Lapitre:
Results for Compositional Timed Testing. 559-564
Short Papers: Formal Methods, Maintenance, and Web-BasedSoftware Engineering
- Kazuhiro Ogata:

Model Checking Liveness Properties under Fairness & Anti-fairness Assumptions. 565-570 - Faqing Yang, Jean-Pierre Jacquot, Jeanine Souquières:

JeB: Safe Simulation of Event-B Models in JavaScript. 571-576 - Ramin Moazeni, Daniel Link, Barry W. Boehm:

Lehman's Laws and the Productivity of Increments: Implications for Productivity. 577-582 - Vikas Kumar Malviya

, Saket Saurav, Atul Gupta
:
On Security Issues in Web Applications through Cross Site Scripting (XSS). 583-588 - Pengjiao Sun, Pengcheng Zhang, Wenrui Li, Xuejun Guo, Jun Feng

:
Sky-MCSP-R: An Efficient Graph-Based Web Service Composition Approach. 589-594

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














