default search action
34th ASE 2019: San Diego, CA, USA - Workshops
- 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, ASE Workshops 2019, San Diego, CA, USA, November 11-15, 2019. IEEE 2019, ISBN 978-1-7281-4136-7
- Felix Pauck, Shikun Zhang:
Android App Merging for Benchmark Speed-Up and Analysis Lift-Up. 7-12 - Joydeep Mitra, Venkatesh-Prasad Ranganath, Aditya Narkar:
BenchPress: Analyzing Android App Vulnerability Benchmark Suites. 13-18 - Joydeep Mitra, Venkatesh-Prasad Ranganath:
SeMA: A Design Methodology for Building Secure Android Apps. 19-22 - Amit Kumar Mondal, Chanchal K. Roy, Banani Roy, Kevin A. Schneider:
Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based Features. 23-28 - Marcus Nachtigall, Lisa Nguyen Quang Do, Eric Bodden:
Explaining Static Analysis - A Perspective. 29-32 - Albert Zündorf, Sebastian Copei, Ira Diethelm, Claude Draude, Adrian Kunz, Ulrich Norbisrath:
Explaining Business Process Software with Fulib-Scenarios. 33-36 - Sophie F. Jentzsch, Nico Hochgeschwender:
Don't Forget Your Roots! Using Provenance Data for Transparent and Explainable Development of Machine Learning Models. 37-40 - Thomas Witte, Matthias Tichy:
A Hybrid Editor for Fast Robot Mission Prototyping. 41-44 - R. P. Jagadeesh Chandra Bose, Kapil Singi, Vikrant Kaulgud, Kanchanjot Kaur Phokela, Sanjay Podder:
Framework for Trustworthy Software Development. 45-48 - Laurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen:
Towards Automated Security Design Flaw Detection. 49-56 - Ákos Kiss, Renáta Hodován:
Security-Related Commits in Open Source Web Browser Projects. 57-60 - Sridhar Adepu, Eunsuk Kang, Aditya P. Mathur:
Challenges in Secure Engineering of Critical Infrastructure Systems. 61-64 - Patrick Kwaku Kudjo, Jinfu Chen, Selasie Brown Aformaley, Solomon Mensah:
The Effect of Weighted Moving Windows on Security Vulnerability Prediction. 65-68 - Jaturong Kongmanee, Phongphun Kijsanayothin, Rattikorn Hewett:
Securing Smart Contracts in Blockchain. 69-76 - Panuchart Bunyakiati, Usa Sammapun:
On Secret Management and Handling in Mobile Application Development Life Cycle: A Position Paper. 77-80 - Tim Nelson, Natasha Danas, Theophilos Giannakopoulos, Shriram Krishnamurthi:
Synthesizing Mutable Configurations: Setting up Systems for Success. 81-85 - Maike Basmer, Timo Kehrer:
Encoding Adaptability of Software Engineering Tools as Algorithm Configuration Problem: A Case Study. 86-89 - Lucas Gisselaire, Florian Cario, Quentin Guerre-Berthelot, Bastien Zigmann, Lydie du Bousquet, Masahide Nakamura:
Toward Evaluation of Deployment Architecture of ML-Based Cyber-Physical Systems. 90-93 - Xukun Wang, Matthias Lee, Angie Pinchbeck, Fatemeh H. Fard:
Where Does LDA Sit for GitHub? 94-97 - Beyza Eken, Rifat Atar, Sahra Sertalp, Ayse Tosun:
Predicting Defects with Latent and Semantic Features from Commit Logs in an Industrial Setting. 98-105 - Janardan Misra, Sanjay Podder:
Mining Text in Incident Repositories: Experiences and Perspectives on Adopting Machine Learning Solutions in Practice. 106-113 - Nicholas Saccente, Josh Dehlinger, Lin Deng, Suranjan Chakraborty, Yin Xiong:
Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network. 114-121 - James Ivers, Ipek Ozkaya, Robert L. Nord:
Can AI Close the Design-Code Abstraction Gap? 122-125 - Evgeny Kusmenko, Svetlana Pavlitskaya, Bernhard Rumpe, Sebastian Stüber:
On the Engineering of AI-Powered Systems. 126-133 - Hanzhang Wang, Chirag Shah, Praseeda Sathaye, Amit Nahata, Sanjeev Katariya:
Service Application Knowledge Graph and Dependency System. 134-136
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.