default search action
26th APSEC 2019: Putrajaya, Malaysia
- 26th Asia-Pacific Software Engineering Conference, APSEC 2019, Putrajaya, Malaysia, December 2-5, 2019. IEEE 2019, ISBN 978-1-7281-4648-5
Software Project Management
- R. P. Jagadeesh Chandra Bose, Kanchanjot Kaur Phokela, Vikrant Kaulgud, Sanjay Podder:
BLINKER: A Blockchain-Enabled Framework for Software Provenance. 1-8 - Sharifah Mashita Syed-Mohamad, Nur Shazwani Md. Akhir:
SoReady: An Extension of the Test and Defect Coverage-Based Analytics Model for Pull-Based Software Development. 9-14
Requirements Engineering
- Weikai Miao, Qianqian Yan, Yihao Huang, Jincao Feng, Hanyue Zheng:
A Domain Experts Centric Approach to Formal Requirements Modeling and V&V of Embedded Control Software. 15-22 - Lei Chen, Dandan Wang, Junjie Wang, Qing Wang:
Enhancing Unsupervised Requirements Traceability with Sequential Semantics. 23-30 - Muhammad Abbas, Irum Inayat, Naila Jan, Mehrdad Saadatmand, Eduard Paul Enoiu, Daniel Sundmark:
MBRP: Model-Based Requirements Prioritization Using PageRank Algorithm. 31-38 - Shiheng Wang, Tong Li, Zhen Yang:
Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. 39-46
Software Architecture, Modelling, and Design
- Feng Sheng, Huibiao Zhu, Zongyuan Yang:
Towards the Mechanized Semantics and Refinement of UML Class Diagrams. 47-54 - Sandra Schröder, Georg Buchgeher:
Formalizing Architectural Rules with Ontologies - An Industrial Evaluation. 55-62
Testing, Verification, and Validation
- Chengcheng Lv, Long Zhang, Fanping Zeng, Jian Zhang:
Adaptive Random Testing for XSS Vulnerability. 63-69 - Thu-Trang Nguyen, Toshiaki Aoki, Takashi Tomita, Iori Yamada:
Multiple Program Analysis Techniques Enable Precise Check for SEI CERT C Coding Standard. 70-77 - Ziqi Chen, Huiyan Wang, Chang Xu, Xiaoxing Ma, Chun Cao:
VISION: Evaluating Scenario Suitableness for DNN Models by Mirror Synthesis. 78-85 - Thuy Nguyen, Toshiaki Aoki, Takashi Tomita, Junpei Endo:
Integrating Static Program Analysis Tools for Verifying Cautions of Microcontroller. 86-93 - Thomas Laurent, Paolo Arcaini, Fuyuki Ishikawa, Anthony Ventresque:
A Mutation-Based Approach for Assessing Weight Coverage of a Path Planner. 94-101 - Ran Chen, Wenhui Zhang:
Verification of CTL_BDI Properties by Symbolic Model Checking. 102-109 - Konrad Fögen, Horst Lichter:
Semi-Automatic Repair of Over-Constrained Models for Combinatorial Robustness Testing. 110-117 - Hirofumi Akimoto, Yuto Isogami, Takashi Kitamura, Natsuko Noda, Tomoji Kishi:
A Prioritization Method for SPL Pairwise Testing Based on User Profiles. 118-125
Software Maintenance and Evolution
- Ran Mo, Mengya Zhan:
History Coupling Space: A New Model to Represent Evolutionary Relations. 126-133 - Hiroshi Yonai, Yasuhiro Hayase, Hiroyuki Kitagawa:
Mercem: Method Name Recommendation Based on Call Graph Embedding. 134-141 - Chen Zhi, Shuiguang Deng, Jianwei Yin, Min Fu, Hai Zhu, Yuanping Li, Tao Xie:
Quality Assessment for Large-Scale Industrial Software Systems: Experience Report at Alibaba. 142-149
Configuration Management and Deployment
- Yongfeng Gu, Yuntianyi Chen, Xiangyang Jia, Jifeng Xuan:
Multi-Objective Configuration Sampling for Performance Ranking in Configurable Systems. 150-157
Cloud and Service-Oriented Computing
- Ammar Lanui, Thiam Kian Chiew:
A Cloud-Based Solution for Testing Applications' Compatibility and Portability on Fragmented Android Platform. 158-164 - Shang-Pin Ma, I-Hsiu Liu, Chun-Yu Chen, Jiun-Ting Lin, Nien-Lin Hsueh:
Version-Based Microservice Analysis, Monitoring, and Visualization. 165-172 - Thilini Bhagya, Jens Dietrich, Hans W. Guesgen:
Generating Mock Skeletons for Lightweight Web-Service Testing. 181-188
Cyber-Physical Systems and Internet of Things
- Xiaotong Chi, Min Zhang, Xiao Xu:
An Algebraic Approach to Modeling and Verifying Policy-Driven Smart Devices in IoT Systems. 189-196 - Daneth Horn, Nazakat Ali, Jang-Eui Hong:
Automatic Identifying Interaction Components in Collaborative Cyber-Physical Systems. 197-203 - Mengyu Ma, Liwei Chen, Gang Shi:
Dam: A Practical Scheme to Mitigate Data-Oriented Attacks with Tagged Memory Based on Hardware. 204-211 - Sangwon Hyun, Jiyoung Song, Seungchyul Shin, Doo-Hwan Bae:
Statistical Verification Framework for Platooning System of Systems with Uncertainty. 212-219 - Dehui Du, Tong Guo, Yao Wang:
SHML: Stochastic Hybrid Modeling Language for CPS Behavior. 220-227 - Nguyen Khoi Tran, Muhammad Ali Babar, Quan Z. Sheng, John C. Grundy:
A Framework for Internet of Things Search Engines Engineering. 228-235
Debugging, Defect Prediction, and Fault Localization
- Kazuya Yasuda, Shinji Itoh, Ryota Mibe, Yoshinori Jodai, Fumie Nakaya:
Inferring Faults in Business Specifications Extracted from Source Code. 236-243 - Guisheng Fan, Xuyang Diao, Huiqun Yu, Kang Yang, Liqiong Chen:
Deep Semantic Feature Learning with Embedded Static Metrics for Software Defect Prediction. 244-251 - Meiling Zhou, Jie Chen, Haiyang Hu, JiaCheng Yu, Zhongjin Li, Hua Hu:
DeepTLE: Learning Code-Level Features to Predict Code Performance before It Runs. 252-259 - Chenghao Cai, Jing Sun, Gillian Dobbie, Scott Uk-Jin Lee:
Achieving Abstract Machine Reachability with Learning-Based Model Fulfilment. 260-267 - Yuexing Wang, Min Zhou, Ming Gu, Jiaguang Sun:
Necessity and Capability of Flow, Context, Field and Quasi Path Sensitive Points-to Analysis. 268-275 - Zheng Li, Xingyao Zhang, Junxia Guo, Ying Shang:
Class Imbalance Data-Generation for Software Defect Prediction. 276-283
Empirical Software Engineering
- Tasuku Nakagawa, Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
How Compact Will My System Be? A Fully-Automated Way to Calculate LoC Reduced by Clone Refactoring. 284-291 - Anas Shatnawi, Tewfik Ziadi, Mohamed Yassin Mohamadi:
Understanding Source Code Variability in Cloned Android Families: An Empirical Study on 75 Families. 292-299 - Zhiwen Zheng, Liang Wang, Yue Cao, Yuqian Zhuang, Xianping Tao:
Towards Non-Invasive Recognition of Developers' Flow States with Computer Interaction Traces. 300-307 - Saurabh Tiwari, Santosh Singh Rathore:
Teaching Software Process Models to Software Engineering Students: An Exploratory Study. 308-315 - Supatsara Wattanakriengkrai, Napat Srisermphoak, Sahawat Sintoplertchaikul, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Hideaki Hata, Kenichi Matsumoto:
Automatic Classifying Self-Admitted Technical Debt Using N-Gram IDF. 316-322 - Xueying Li, Peng Liang, Tianqing Liu:
Decisions and Their Making in OSS Development: An Exploratory Study Using the Hibernate Developer Mailing List. 323-330
Formal Methods
- Yongxin Zhao, Xiujuan Zhang, Ling Shi, Gan Zeng, Feng Sheng, Shuang Liu:
Towards a Formal Approach to Defining and Computing the Complexity of Component Based Software. 331-338 - Zhangtao Chen, Jing Liu, Xi Ding, Miaomiao Zhang:
RBML: A Refined Behavior Modeling Language for Safety-Critical Hybrid Systems. 339-346 - Sapna Jaidka, Steve Reeves, Judy Bowen:
A Coloured Petri Net Approach to Model and Analyze Safety-Critical Interactive Systems. 347-354 - Leping Zhang, Qianying Zhang, Guohui Wang, Zhiping Shi, Minhua Wu, Yong Guan:
Formal Modelling and Verification of Spinlocks at Instruction Level. 355-362
Model-Driven and Domain-Specific Engineering
- Jamal El Hachem, Ali Sedaghatbaf, Elena Lisova, Aida Causevic:
Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems. 363-370 - Maya R. A. Setyautami, Rafiano R. Rubiantoro, Ade Azurat:
Model-Driven Engineering for Delta-Oriented Software Product Lines. 371-377
Open Source Development
- Yi Ren, Jianbo Guan, Jun Ma, Yusong Tan, Qingbo Wu, Yan Ding:
CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System Packages. 378-385 - Ruiyin Li, Peng Liang, Chen Yang, Georgios Digkas, Alexander Chatzigeorgiou, Zhuang Xiong:
Automatic Identification of Assumptions from the Hibernate Developer Mailing List. 394-401 - Subhajit Datta:
Influence, Information and Team Outcomes in Large Scale Software Development. 402-409
Security, Reliability, and Privacy
- Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu:
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A. 410-417 - Denghui Zhang, Guisai Wang, Wei Xu, Kevin Gao:
SGXPy: Protecting Integrity of Python Applications with Intel SGX. 418-425 - Hui Zhao, Frédéric Mallet, Ludovic Apvrille:
A Language-Based Multi-View Approach for Combining Functional and Security Models. 426-433 - Hongliang Liang, Tianqi Yang, Lin Jiang, Yixiu Chen, Zhuosi Xie:
Witness: Detecting Vulnerabilities in Android Apps Extensively and Verifiably. 434-441 - Mohd Hafeez Osman, Stefan Kugele, Sina Shafaei:
Run-Time Safety Monitoring Framework for AI-Based Systems: Automated Driving Cases. 442-449 - Anand Tirkey, Ramesh Kumar Mohapatra, Lov Kumar:
Anatomizing Android Malwares. 450-457
Software Engineering Tools and Environments
- Wei Li, Shuhan Yan, Beijun Shen, Yuting Chen:
Reinforcement Learning of Code Search Sessions. 458-465 - Chao Peng, Sefa Akca, Ajitha Rajan:
SIF: A Framework for Solidity Contract Instrumentation and Analysis. 466-473 - Nozomi Nakajima, Shinsuke Matsumoto, Shinji Kusumoto:
Jact: A Playground Tool for Comparison of JavaScript Frameworks. 474-481 - Sefa Akca, Ajitha Rajan, Chao Peng:
SolAnalyser: A Framework for Analysing and Testing Smart Contracts. 482-489
Software Repository Mining and Data Analytics
- Duo Wang, Jian Cao, Shiyou Qian, Qing Qi:
Investigating Cross-Repository Socially Connected Teams on GitHub. 490-497 - Shintaro Kurimoto, Yasuhiro Hayase, Hiroshi Yonai, Hiroyoshi Ito, Hiroyuki Kitagawa:
Class Name Recommendation Based on Graph Embedding of Program Elements. 498-505 - Liting Wang, Li Zhang, Jing Jiang:
Detecting Duplicate Questions in Stack Overflow via Deep Learning Approaches. 506-513 - Syed Fatiul Huq, Ali Zafar Sadiq, Kazi Sakib:
Understanding the Effect of Developer Sentiment on Fix-Inducing Changes: An Exploratory Study on GitHub Pull Requests. 514-521
Software Comprehension, Visualization, and Traceability
- Minghao Chen, Xiaojun Wan:
Neural Comment Generation for Source Code with Auxiliary Code Classification Task. 522-529
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.