


default search action
27th ASE 2012: Essen, Germany
- Michael Goedicke, Tim Menzies, Motoshi Saeki:

IEEE/ACM International Conference on Automated Software Engineering, ASE'12, Essen, Germany, September 3-7, 2012. ACM 2012, ISBN 978-1-4503-1204-2
Keynotes
- Mark Harman

, William B. Langdon, Yue Jia, David Robert White, Andrea Arcuri, John A. Clark:
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper). 1-14 - Ivar Jacobson, Ian Spence, Pontus Johnson

, Mira Kajko-Mattsson:
Re-founding software engineering - SEMAT at the age of three (keynote abstract). 15-19
Debugging I
- Kai Yu, Mengxiang Lin, Jin Chen, Xiangyu Zhang:

Practical isolation of failure-inducing changes for debugging regression faults. 20-29 - Liang Gong, David Lo

, Lingxiao Jiang
, Hongyu Zhang
:
Diversity maximization speedup for fault localization. 30-39 - Divya Gopinath, Razieh Nokhbeh Zaeem, Sarfraz Khurshid:

Improving the effectiveness of spectra-based fault localization using specifications. 40-49
Debugging II
- Ferdian Thung, Lucia, David Lo

, Lingxiao Jiang
, Foyzur Rahman, Premkumar T. Devanbu
:
To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools. 50-59 - Tegawendé F. Bissyandé, Laurent Réveillère, Julia Lawall, Gilles Muller:

Diagnosys: automatic generation of a debugging interface to the Linux kernel. 60-69 - Anh Tuan Nguyen, Tung Thanh Nguyen

, Tien N. Nguyen, David Lo
, Chengnian Sun:
Duplicate bug report detection with a combination of information retrieval and topic modeling. 70-79
Privacy, Security, and Performance
- Xusheng Xiao

, Nikolai Tillmann, Manuel Fähndrich, Jonathan de Halleux, Michal Moskal
:
User-aware privacy control via extended static-information-flow analysis. 80-89 - Sonia Haiduc, Gabriele Bavota

, Rocco Oliveto, Andrea De Lucia
, Andrian Marcus
:
Automatic query performance assessment during the retrieval of software artifacts. 90-99 - Mohamed Almorsy, John Grundy

, Amani S. Ibrahim:
Supporting automated vulnerability analysis using formalized vulnerability signatures. 100-109
Configuration Management and QoS
- Rick Rabiser

, Paul Grünbacher
, Martin Lehofer:
A qualitative study on user guidance capabilities in product configuration tools. 110-119 - Sven Apel

, Olaf Leßenich
, Christian Lengauer:
Structured merge with auto-tuning: balancing precision and performance. 120-129 - Ayman A. Amin

, Lars Grunske
, Alan Colman
:
An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling. 130-139
Testing and Monitoring
- Ning Chen, Sunghun Kim:

Puzzle-based automatic testing: bringing humans into the loop by solving puzzles. 140-149 - Kari Kähkönen, Olli Saarikivi

, Keijo Heljanko
:
Using unfoldings in automated testing of multithreaded programs. 150-159 - Adel Noureddine

, Aurelien Bourdon, Romain Rouvoy
, Lionel Seinturier
:
Runtime monitoring of software energy hotspots. 160-169
Prediction
- Xiaoyin Wang, Yingnong Dang, Lu Zhang, Dongmei Zhang, Erica Lan, Hong Mei:

Can I clone this piece of code here? 170-179 - Hyunmin Seo, Sunghun Kim:

Predicting recurring crash stacks. 180-189 - Dennis Westermann, Jens Happe, Rouven Krebs, Roozbeh Farahbod:

Automated inference of goal-oriented performance prediction functions. 190-199
Validation, Verification, and Consistency
- Achraf Ghabi, Alexander Egyed:

Code patterns for automatically validating requirements-to-code traces. 200-209 - Jaideep Nijjar, Tevfik Bultan:

Unbounded data model verification using SMT solvers. 210-219 - Alexander Reder, Alexander Egyed:

Computing repair trees for resolving inconsistencies in design models. 220-229
Re-engineering, Program Understanding, and Model Transformation (Short Papers)
- Mohamed Almorsy, John Grundy

, Amani S. Ibrahim:
Supporting automated software re-engineering using re-aspects. 230-233 - Amani S. Ibrahim, John Grundy

, James H. Hamlyn-Harris, Mohamed Almorsy:
Supporting operating system kernel data disambiguation using points-to analysis. 234-237 - Moria Abadi, Yishai A. Feldman:

Automatic recovery of statecharts from procedural code. 238-241 - Julia Rubin, Marsha Chechik:

Locating distinguishing features using diff sets. 242-245 - Katsuhisa Maruyama, Eijiro Kitsu, Takayuki Omori, Shinpei Hayashi

:
Slicing and replaying code change history. 246-249 - Martin Faunes, Houari A. Sahraoui, Mounir Boukadoum

:
Generating model transformation rules from examples using an evolutionary algorithm. 250-253
Testing and Code Analysis (Short Papers)
- Konrad Jamrozik, Gordon Fraser, Nikolai Tillmann, Jonathan de Halleux:

Augmented dynamic symbolic execution. 254-257 - Domenico Amalfitano

, Anna Rita Fasolino
, Porfirio Tramontana
, Salvatore De Carmine, Atif M. Memon:
Using GUI ripping for automated testing of Android applications. 258-261 - Lucia, David Lo

, Lingxiao Jiang
, Aditya Budi:
kbe-anonymity: test data anonymization for evolving programs. 262-265 - JeeHyun Hwang, Tao Xie, Donia El Kateb, Tejeddine Mouelhi, Yves Le Traon

:
Selection of regression system tests for security policy evolution. 266-269 - Lei Shang, Yi Lu, Jingling Xue

:
Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience. 270-273
Detection and Refactoring (Short Papers)
- Alexandre Bartel, Jacques Klein

, Yves Le Traon
, Martin Monperrus
:
Automatically securing permission-based software by reducing the attack surface: an application to Android. 274-277 - Abdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabané, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Esma Aïmeur:

Support vector machines for anti-pattern detection. 278-281 - Hung Viet Nguyen, Hoan Anh Nguyen, Tung Thanh Nguyen

, Anh Tuan Nguyen, Tien N. Nguyen:
Detection of embedded code smells in dynamic web applications. 282-285 - Yang Yuan, Yao Guo

:
Boreas: an accurate and scalable token-based approach to code clone detection. 286-289 - Friedrich Steimann

, Jens von Pilgrim:
Refactorings without names. 290-293 - Huiqing Li, Simon J. Thompson

:
Automated API migration in a user-extensible refactoring tool for Erlang programs. 294-297
Requirements Engineering and Model based Development (Short Papers)
- Rainer Lutz, Sascha Schäfer, Stephan Diehl

:
Using mobile devices for collaborative requirements engineering. 298-301 - Andreas Demuth, Roberto E. Lopez-Herrejon, Alexander Egyed:

Automatically generating and adapting model constraints to support co-evolution of design models. 302-305 - Timo Kehrer, Udo Kelter, Pit Pietsch, Maik Schmidt:

Adaptability of model comparison tools. 306-309
Defect Prediction and Recovery (Short Papers)
- Lwin Khin Shar

, Hee Beng Kuan Tan:
Predicting common web application vulnerabilities from input validation and sanitization code patterns. 310-313 - Huihua Lu, Bojan Cukic

, Mark Vere Culp:
Software defect prediction using semi-supervised learning with dimension reduction. 314-317 - Rui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Jiajun Shen

, Tao Xie:
Healing online service systems via mining historical issue repositories. 318-321 - Maartje de Jonge, Eelco Visser

:
Automated evaluation of syntax error recovery. 322-325
Tool Demonstrations 1
- Massila Kamalrudin

, John Grundy
, John G. Hosking
:
MaramaAI: tool support for capturing and managing consistency of multi-lingual requirements. 326-329 - Sebastian Bauersfeld, Tanja E. J. Vos:

GUITest: a Java library for fully automated GUI robustness testing. 330-333 - Palakorn Achananuparp

, Ibrahim Nelman Lubis, Yuan Tian, David Lo
, Ee-Peng Lim
:
Observatory of trends in software related microblogs. 334-337 - Sebastian Biallas, Jörg Brauer, Stefan Kowalewski:

Arcade.PLC: a verification platform for programmable logic controllers. 338-341 - Yves Ledru, Germán Vega

, Taha Triki, Lydie du Bousquet:
Test suite selection based on traceability annotations. 342-345 - Fu Song, Tayssir Touili:

PuMoC: a CTL model-checker for sequential programs. 346-349 - Yliès Falcone, Sebastian Currea:

Weave droid: aspect-oriented programming on Android devices: fully embedded or in the cloud. 350-353 - Inah Omoronyia, Liliana Pasquale, Mazeiar Salehie, Luca Cavallaro, Gavin J. Doherty

, Bashar Nuseibeh:
Caprice: a tool for engineering adaptive privacy. 354-357
Tool Demonstrations 2
- Laura Moreno, Andrian Marcus

:
JStereoCode: automatically identifying method and class stereotypes in Java code. 358-361 - Antonio Cicchetti

, Federico Ciccozzi, Silvia Mazzini, Stefano Puri, Marco Panunzio, Alessandro Zovi, Tullio Vardanega
:
CHESS: a model-driven engineering tool environment for aiding the development of complex industrial systems. 362-365 - Ahmed Tamrawi, Hoan Anh Nguyen, Hung Viet Nguyen, Tien N. Nguyen:

SYMake: a build code analysis and refactoring tool for makefiles. 366-369 - Cameron M. Hine, Jean-Guy Schneider

, Jun Han, Steven Versteeg:
Quokka: visualising interactions of enterprise software environment emulators. 370-373 - Stefan Dösinger, Richard Mordinyi, Stefan Biffl:

Communicating continuous integration servers for increasing effectiveness of automated testing. 374-377 - José Campos

, André Riboira, Alexandre Perez
, Rui Abreu
:
GZoltar: an eclipse plug-in for testing and debugging. 378-381 - Jesper Andersen, Anh Cuong Nguyen, David Lo

, Julia L. Lawall, Siau-Cheng Khoo:
Semantic patch inference. 382-385 - Tuong Huan Nguyen, Bao Quoc Vo, Markus Lumpe, John Grundy

:
REInDetector: a framework for knowledge-based requirements engineering. 386-389
Doctoral Symposium
- Sebastian Gabmeyer:

Formal verification techniques for model transformations specified by-demonstration. 390-393 - Luis Quesada:

A model-driven parser generator with reference resolution support. 394-397 - Yosuke Yamamoto:

Property-preserving program refinement. 398-401 - Ana Filipa Nogueira

:
Predicting software complexity by means of evolutionary testing. 402-405 - Panita Meananeatra:

Identifying refactoring sequences for improving software maintainability. 406-409

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














