


default search action
24th APSEC 2017: Nanjing, China
- Jian Lv, He Jason Zhang, Mike Hinchey, Xiao Liu:

24th Asia-Pacific Software Engineering Conference, APSEC 2017, Nanjing, China, December 4-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-3681-7
Full Papers
Program Analysis
- Xingming Wu, Lian Li, Jian Zhang:

Symbolic Execution with Value-Range Analysis for Floating-Point Exception Detection. 1-10 - Xin Yi

, Liqian Chen, Xiaoguang Mao
, Tao Ji:
Efficient Global Search for Inputs Triggering High Floating-Point Inaccuracies. 11-20 - Bin Li, Juan Zhai

, Zhenhao Tang, Enyi Tang, Jianhua Zhao:
A Framework for Array Invariants Synthesis in Induction-Loop Programs. 21-30
Systematic Reviews
- Yuqing Wang

, Jouni Markkula, Jing Jiang:
Cultural Factors Influencing International Collaborative Software Engineering Education in China. 31-40 - Luyi Feng, Yin Kia Chiam

, Sin Kuang Lo:
Text-Mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature Review. 41-50 - Liming Dong, Bohan Liu, Zheng Li

, Ou Wu, Muhammad Ali Babar, Bingbing Xue:
A Mapping Study on Mining Software Process. 51-60
Traceability
- Shinnosuke Saruwatari, Fuyuki Ishikawa, Tsutomu Kobayashi, Shinichi Honiden:

Extracting Traceability between Predicates in Event-B Refinement. 61-70 - Jukka Ruohonen

, Ville Leppänen
:
How PHP Releases Are Adopted in the Wild? 71-80 - Teng Zhao, Qinghua Cao, Qing Sun:

An Improved Approach to Traceability Recovery Based on Word Embeddings. 81-89
Code Refactory & Clone
- Lov Kumar

, Ashish Sureka:
Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level. 90-99 - Min Wang, Pengcheng Wang, Yun Xu:

CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGs. 100-109 - Girish Maskeri Rama, Raghavan Komondoor:

Detecting Full Initialization Points of Objects to Support Code Refactorings. 110-119
Networks
- Biling Lin, Xiao Chen, Liangmin Wang:

A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment. 120-129 - Yanchao Jing, Guangtao Xue, Shiyou Qian:

Noff: A Novel Extendible Parallel Library for High-Performance Network Traffic Monitoring. 130-139 - Xiaoyun Guo

, Hsin-Hung Lin, Toshiaki Aoki
, Yuki Chiba:
A Reusable Framework for Modeling and Verifying In-Vehicle Networking Systems in the Presence of CAN and FlexRay. 140-149
Testing
- Marc Brünink, David S. Rosenblum:

Using Branch Frequency Spectra to Evaluate Operational Coverage. 150-159 - Jung-Hyun Kwon, In-Young Ko:

Cost-Effective Regression Testing Using Bloom Filters in Continuous Integration Development Environments. 160-168 - Wenhao Fu, Huiqun Yu, Guisheng Fan, Xiang Ji

, Xin Pei:
A Regression Test Case Prioritization Algorithm Based on Program Changes and Method Invocation Relationship. 169-178
Design & Code Patterns
- Ping Zhang, Dongjin Yu, Jiaojiao Wang:

A Degree-Driven Approach to Design Pattern Mining Based on Graph Matching. 179-188 - Shahid Hussain, Jacky Keung

, Arif Ali Khan
, Kwabena Ebo Bennin
:
Correlation between the Frequent Use of Gang-of-Four Design Patterns and Structural Complexity. 189-198 - Sawan Rai

, Tejaswini Gaikwad, Sparshi Jain, Atul Gupta
:
Method Level Text Summarization for Java Code Using Nano-Patterns. 199-208
Robot & Embedded Systems
- Shuo Yang, Xinjun Mao, Zhe Liu, Sen Yang, Jiangtao Xue, Zixi Xu:

The Accompanying Behavior Model and Implementation Architecture of Autonomous Robot Software. 209-218 - Gabriel Campeanu, Jan Carlson, Séverine Sentilles:

Flexible Components for Development of Embedded Systems with GPUs. 219-228 - Zhe Liu, Xinjun Mao, Shuo Yang:

A Dual-Loop Control Model and Software Framework for Autonomous Robot Software. 229-238
Security & Vulnerability
- Shubham Tripathi, Gustavo Grieco, Sanjay Rawat

:
Exniffer: Learning to Prioritize Crashes by Assessing the Exploitability from Memory Dump. 239-248 - Chao Xu, Huibiao Zhu, Wanling Xie:

Modeling and Verifying Identity Authentication Security of HDFS Using CSP. 259-268
Management & Decision Making
- Shuhan Yan, Beijun Shen, Wenkai Mo, Ning Li:

Transfer Learning for Cross-Platform Software Crowdsourcing Recommendation. 269-278 - Vitor Freitas, Mirko Barbosa Perkusich, Emilia Mendes, Pilar Rodríguez, Markku Oivo:

Value-Based Decision-Making Using a Web-Based Tool: A Multiple Case Study. 279-288 - Guoping Rong, Xinbei Liu, Shenghui Gu, Dong Shao:

A Goal-Driven Framework in Support of Knowledge Management. 289-297
Software Ecosystems
- Nuttapon Lertwittayatrai, Raula Gaikovina Kula

, Saya Onoue, Hideaki Hata
, Arnon Rungsawang, Pattara Leelaprute, Kenichi Matsumoto:
Extracting Insights from the Topology of the JavaScript Package Ecosystem. 298-307 - Pankajeshwara N. Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger

:
Boundary Spanners in Open Source Software Development: A Study of Python Email Archives. 308-317 - Hui Ding, Wanwangying Ma, Lin Chen, Yuming Zhou, Baowen Xu

:
An Empirical Study on Downstream Workarounds for Cross-Project Bugs. 318-327
Bug Localization & Patterns
- Xiaofei Zhang, Yuan Yao, Yaojing Wang, Feng Xu, Jian Lu:

Exploring Metadata in Bug Reports for Bug Localization. 328-337 - Yan Xiao

, Jacky Keung
, Qing Mi
, Kwabena Ebo Bennin
:
Improving Bug Localization with an Enhanced Convolutional Neural Network. 338-347 - Xiaobing Sun, Tianchi Zhou, Gengjie Li, Jiajun Hu, Hui Yang, Bin Li:

An Empirical Study on Real Bugs for Machine Learning Programs. 348-357
Repository Mining
- Nor Shahida Mohamad Yusop, Jean-Guy Schneider, John Grundy

, Rajesh Vasa
:
Analysis of the Textual Content of Mined Open Source Usability Defect Reports. 358-367 - Shuai Wang, Wensheng Dou, Chushu Gao

, Jun Wei, Tao Huang:
Mining API Type Specifications for JavaScript. 368-377 - Liming Dong, Bohan Liu, Zheng Li

, Bingbing Xue, Danni Chen, Tiange Chen:
Mining Handover Process in Open Source Development: An Exploratory Study. 378-387
Requirements
- Tong Li:

Identifying Security Requirements Based on Linguistic Analysis and Machine Learning. 388-397 - Yoohee Chung, Dongwoo Kim, Yunja Choi:

Modeling OSEK/VDX OS Requirements in C. 398-407 - Moe Matsubara, Mikio Aoyama:

An Analysis Method of Safety Requirements for Automotive Software Systems. 408-416
Model Checking
- Nhat-Hoa Tran

, Yuki Chiba, Toshiaki Aoki
:
Domain-Specific Language Facilitates Scheduling in Model Checking. 417-426 - Ailun Liu, Miroslav Popovic

, Huibiao Zhu:
Formalization and Verification of the PSTM Architecture. 427-435 - Azlan B. Ismail

, Marta Kwiatkowska:
Synthesizing Pareto Optimal Decision for Autonomic Clouds Using Stochastic Games Model Checking. 436-445
Architecture
- Ana Nicolaescu, Horst Lichter

, Veit Hoffmann:
On Adequate Behavior-Based Architecture Conformance Checks. 446-455 - Roland Kretschmer, Djamel Eddine Khelladi, Andreas Demuth, Roberto E. Lopez-Herrejon, Alexander Egyed:

From Abstract to Concrete Repairs of Model Inconsistencies: An Automated Approach. 456-465 - Rui Chen, Shanshan Li, Zheng Li

:
From Monolith to Microservices: A Dataflow-Driven Approach. 466-475
Detection & Prediction
- Cangzhou Yuan, Shenhong Wei, Chengjian Zhou, Jiangtao Guo, Hongyue Xiang:

Scalable and Obfuscation-Resilient Android App Repackaging Detection Based on Behavior Birthmark. 476-485 - Miho Kawasaki, Hiroyuki Okamura, Tadashi Dohi:

A Comprehensive Evaluation of Software Reliability Modeling Based on Marshall-Olkin Type Fault-Detection Time Distribution. 486-494 - Abdullah Khanfor, Ye Yang, Gregg Vesonder, Guenther Ruhe, Dave Messinger:

Failure Prediction in Crowdsourced Software Development. 495-504
Industry Papers
- Jianpeng Hu, Linpeng Huang, Juan Huang, Tianqi Sun, Yingjun Ouyang:

What-If Model Construction and Validation of Web Systems Based on Log Mining. 505-512 - Zhiwei Li, Jing Liu, Haiying Sun, Tingliang Zhou, Junfeng Sun:

Automatic Test Generation of Large Boolean Expressions in Computer Based Interlocking System. 513-520 - Yingling Li, Lin Shi

, Jun Hu, Qing Wang, Jian Zhai:
An Empirical Study to Revisit Productivity across Different Programming Languages. 526-533
Short Papers
Software Development 1
- Guoping Rong, Qiuping Zhang, Xinbei Liu, Shenghui Gu:

A Systematic Review of Logging Practice in Software Engineering. 534-539 - Georgia M. Kapitsaki, Demetris Paschalides:

Identifying Terms in Open Source Software License Texts. 540-545 - Jiyoung Song, Young Min Baek, Mingyu Jin, Eunkyoung Jee, Doo-Hwan Bae:

SoS GaP Slicer: Slicing SoS Goal and PRISM Models for Change-Responsive Verification of SoS. 546-551 - Tomohiro Ohtake, Yohei Seki, Toshihiro Kodaka:

Steiner Tree Based Recommendation System for Combination of APIs and IoT Devices. 552-557
Software Development 2
- Xingshen Song, Yuexiang Yang, Yu Jiang:

Software Optimizations of Multiple Sets Intersection via SIMD Instructions. 558-563 - Chen Wang, Xiaoyuan Xie, Peng Liang

, Jifeng Xuan
:
Multi-Perspective Visualization to Assist Code Change Review. 564-569 - Eduardo Rosales, Andrea Rosà

, Walter Binder
:
tgp: A Task-Granularity Profiler for the Java Virtual Machine. 570-575
Software Evolution and Maintenance
- Djamel Eddine Khelladi, Horacio Hoyos Rodriguez, Roland Kretschmer, Alexander Egyed:

An Exploratory Experiment on Metamodel-Transformation Co-Evolution. 576-581 - Amjed Tahir, Sherlock A. Licorish, Stephen G. MacDonell:

Feature Evolution and Reuse - An Exploratory Study of Eclipse. 582-587 - Sahan Serasinghe, Haifeng Shen, David Chen

:
iLSE: An Intelligent Web-Based System for Log Structuring and Extraction. 588-593 - Feiyue Yu, Hao Zhong

, Beijun Shen:
How Do Programmers Maintain Concurrent Code? 594-599
Formal Methods
- Judy Bowen

, Anke Dittmar:
Formal Definitions for Design Spaces and Traces. 600-605 - Mengjun Li:

Generating Equality Loop Invariants with Functions Based on Random Testing, Constraint Solving and Verification. 606-611 - Colin Pilbrow

, Steve Reeves
:
Characterising Sound Visualisations of Specifications Using Micro-Charts and Refinement. 612-617 - Xuan-Linh Ha, Kazuhiro Ogata:

Writing Concurrent Java Programs Based on CafeOBJ Specifications. 618-623
Empirical Studies
- Sousuke Amasaki, Chris Lokan:

An Evaluation of Selection Methods for Time-Aware Effort Estimation. 624-629 - Kwabena Ebo Bennin

, Jacky Keung
, Akito Monden
:
Impact of the Distribution Parameter of Data Sampling Approaches on Software Defect Prediction Models. 630-635 - Qing Mi

, Yujin Gao, Jacky Keung
, Yan Xiao
, Solomon Mensah:
Identifying Textual Features of High-Quality Questions: An Empirical Study on Stack Overflow. 636-641 - Tianxia Wang, Yan Liu:

Facilitating Scenario-Based Program Comprehension with Topic Models. 642-647
Code Generation and Quality
- Navdeep Singh, Paramvir Singh:

How Do Code Refactoring Activities Impact Software Developers' Sentiments? - An Empirical Investigation Into GitHub Commits. 648-653 - Yuichi Semura, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:

CCFinderSW: Clone Detection Tool with Flexible Multilingual Tokenization. 654-659 - Michael Szvetits, Uwe Zdun:

Automatic Generation of Monitoring Code for Model Based Analysis of Runtime Behaviour. 660-665 - Tetsuo Yamamoto:

Code Suggestion of Method Call Statements Using a Source Code Corpus. 666-671
Software Testing
- Li Sui, Jens Dietrich

, Amjed Tahir:
On the Use of Mined Stack Traces to Improve the Soundness of Statically Constructed Call Graphs. 672-676 - Dong Hun Song, Yongjin Seo, Hyeon Soo Kim

:
Test Environment Construction Method Using Parameterized Test Environments. 677-682 - Jing Liu, Wenjie Chen:

Optimized Test Data Generation for RESTful Web Service. 683-688 - Chengying Mao

, Xuzheng Zhan:
Towards an Improvement of Bisection-Based Adaptive Random Testing. 689-694
Software Testing and Requirements
- Kristian Fjeld Hasselknippe, Jingyue Li

:
A Novel Tool for Automatic GUI Layout Testing. 695-700 - Haiyang Sun, Alexander North, Walter Binder

:
Multi-Process Runtime Verification for Android. 701-706 - Danielle Gaither, Hyunsook Do, Barrett R. Bryant:

Toward Detection of Abnormal Behaviors in Timing and Security Requirements. 707-712 - Luciana Provenzano, Kaj Hänninen, Jiale Zhou, Kristina Lundqvist:

An Ontological Approach to Elicit Safety Requirements. 713-718
Software Process
- Laurent Wouters, Stephen Creff, Emma Effa Bella, Ali Koudri:

Towards Semantic-Aware Collaborations in Systems Engineering. 719-724 - Chih-Hong Cheng, Yassine Hamza, Harald Ruess:

Automated Analysis of Multi-View Software Architectures. 725-730 - Suppasit Roongsangjan, Thanwadee Sunetnanta

, Pattanasak Mongkolwat
:
Structuring the Knowledge for Software Process Appraisal towards Semi-Automated Support. 731-736 - Israt Fatema, Kazi Sakib:

Factors Influencing Productivity of Agile Software Development Teamwork: A Qualitative System Dynamics Approach. 737-742
Posters
- Bo Wan, Xi Li, Kaiqi Zhou, Haizhao Luo, Chao Wang, Xianglan Chen, Xuehai Zhou:

Clockwerk: A Predictable and Efficient Extension of Logical Execution Time Model. 743-744 - Haojie Gong, Bohan Liu, Dong Shao:

A Simulation Model of Kanban Software Process. 745-746 - Md Rakib Hossain Misu

, Kazi Sakib:
Interface Driven Code Clone Detection. 747-748 - Abdus Satter, M. G. Muntaqeem, Nadia Nahar

, Kazi Sakib:
Retrieving Self-Executable and Functionally Correct Code to Improve Source Code Search. 749-750 - Mahieddine Dellabani, Jacques Combaz, Saddek Bensalem, Marius Bozga:

Knowledge Based Optimization for Distributed Real-Time Systems. 751-756

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














