


default search action
34th ASE 2019: San Diego, CA, USA - Workshops
- 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, ASE Workshops 2019, San Diego, CA, USA, November 11-15, 2019. IEEE 2019, ISBN 978-1-7281-4136-7

- Felix Pauck

, Shikun Zhang:
Android App Merging for Benchmark Speed-Up and Analysis Lift-Up. 7-12 - Joydeep Mitra

, Venkatesh-Prasad Ranganath, Aditya Narkar:
BenchPress: Analyzing Android App Vulnerability Benchmark Suites. 13-18 - Joydeep Mitra

, Venkatesh-Prasad Ranganath:
SeMA: A Design Methodology for Building Secure Android Apps. 19-22 - Amit Kumar Mondal, Chanchal K. Roy, Banani Roy, Kevin A. Schneider:

Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based Features. 23-28 - Marcus Nachtigall, Lisa Nguyen Quang Do, Eric Bodden:

Explaining Static Analysis - A Perspective. 29-32 - Albert Zündorf, Sebastian Copei

, Ira Diethelm, Claude Draude, Adrian Kunz
, Ulrich Norbisrath:
Explaining Business Process Software with Fulib-Scenarios. 33-36 - Sophie F. Jentzsch

, Nico Hochgeschwender
:
Don't Forget Your Roots! Using Provenance Data for Transparent and Explainable Development of Machine Learning Models. 37-40 - Thomas Witte

, Matthias Tichy:
A Hybrid Editor for Fast Robot Mission Prototyping. 41-44 - R. P. Jagadeesh Chandra Bose, Kapil Singi, Vikrant Kaulgud, Kanchanjot Kaur Phokela, Sanjay Podder

:
Framework for Trustworthy Software Development. 45-48 - Laurens Sion

, Katja Tuma
, Riccardo Scandariato, Koen Yskout
, Wouter Joosen:
Towards Automated Security Design Flaw Detection. 49-56 - Ákos Kiss, Renáta Hodován:

Security-Related Commits in Open Source Web Browser Projects. 57-60 - Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:

Challenges in Secure Engineering of Critical Infrastructure Systems. 61-64 - Patrick Kwaku Kudjo, Jinfu Chen, Selasie Brown Aformaley

, Solomon Mensah:
The Effect of Weighted Moving Windows on Security Vulnerability Prediction. 65-68 - Jaturong Kongmanee, Phongphun Kijsanayothin, Rattikorn Hewett:

Securing Smart Contracts in Blockchain. 69-76 - Panuchart Bunyakiati, Usa Sammapun:

On Secret Management and Handling in Mobile Application Development Life Cycle: A Position Paper. 77-80 - Tim Nelson

, Natasha Danas, Theophilos Giannakopoulos, Shriram Krishnamurthi
:
Synthesizing Mutable Configurations: Setting up Systems for Success. 81-85 - Maike Basmer, Timo Kehrer:

Encoding Adaptability of Software Engineering Tools as Algorithm Configuration Problem: A Case Study. 86-89 - Lucas Gisselaire, Florian Cario, Quentin Guerre-Berthelot, Bastien Zigmann, Lydie du Bousquet, Masahide Nakamura:

Toward Evaluation of Deployment Architecture of ML-Based Cyber-Physical Systems. 90-93 - Xukun Wang, Matthias Lee, Angie Pinchbeck, Fatemeh H. Fard

:
Where Does LDA Sit for GitHub? 94-97 - Beyza Eken

, Rifat Atar, Sahra Sertalp, Ayse Tosun
:
Predicting Defects with Latent and Semantic Features from Commit Logs in an Industrial Setting. 98-105 - Janardan Misra, Sanjay Podder

:
Mining Text in Incident Repositories: Experiences and Perspectives on Adopting Machine Learning Solutions in Practice. 106-113 - Nicholas Saccente, Josh Dehlinger

, Lin Deng
, Suranjan Chakraborty, Yin Xiong:
Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network. 114-121 - James Ivers

, Ipek Ozkaya
, Robert L. Nord:
Can AI Close the Design-Code Abstraction Gap? 122-125 - Evgeny Kusmenko, Svetlana Pavlitskaya, Bernhard Rumpe

, Sebastian Stüber:
On the Engineering of AI-Powered Systems. 126-133 - Hanzhang Wang, Chirag Shah, Praseeda Sathaye, Amit Nahata, Sanjeev Katariya:

Service Application Knowledge Graph and Dependency System. 134-136

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














