dblp: ASE 2016 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


31st ASE 2016: Singapore

jump to

- > Home > Conferences and Workshops > ASE
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

David Lo, Sven Apel
, Sarfraz Khurshid:
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3-7, 2016. ACM 2016, ISBN 978-1-4503-3845-5
Keynotes

Markus Püschel:
Program generation for performance. 1
Wolfram Schulte:
Changing microsoft's build: revolution or evolution. 2
David S. Rosenblum:
The power of probabilistic thinking. 3
Test Evaluation

Michele Tufano, Fabio Palomba
, Gabriele Bavota
, Massimiliano Di Penta, Rocco Oliveto, Andrea De Lucia
, Denys Poshyvanyk
:
An empirical investigation into the nature of test smells. 4-15
Mohammad Amin Alipour
, August Shi, Rahul Gopinath
, Darko Marinov, Alex Groce:
Evaluating non-adequate test-case reduction. 16-26
Peter Ohmann, David Bingham Brown
, Naveen Neelakandan, Jeff T. Linderoth, Ben Liblit
:
Optimizing customized program coverage. 27-38
Willem Visser:
What makes killing a mutant hard. 39-44
Panagiotis Stratis, Ajitha Rajan:
Test case permutation to improve execution time. 45-50
Learning

Bowen Xu, Deheng Ye, Zhenchang Xing, Xin Xia
, Guibin Chen
, Shanping Li:
Predicting semantically linkable knowledge in developer online forums via convolutional neural network. 51-62
Raja Ben Abdessalem, Shiva Nejati
, Lionel C. Briand, Thomas Stifter:
Testing advanced driver assistance systems using multi-objective search and neural networks. 63-74
Fumin Qi
, Xiao-Yuan Jing, Xiaoke Zhu, Fei Wu, Li Cheng:
Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimation. 75-86
Martin White, Michele Tufano, Christopher Vendome, Denys Poshyvanyk
:
Deep learning code fragments for code clone detection. 87-98
Recommendation and Automation

Christoph Hannebauer, Michael Patalas, Sebastian Stünkel, Volker Gruhn:
Automatically recommending code reviewers based on their expertise: an empirical comparison. 99-110
Sebastian Proksch, Sven Amann, Sarah Nadi, Mira Mezini:
Evaluating the evaluations of code recommender systems: a reality check. 111-121
Rahul Krishna, Tim Menzies
, Wei Fu:
Too much automation? the bellwether effect and its implications for transfer learning. 122-131
Marcelino Rodriguez-Cancio, Benoît Combemale, Benoit Baudry:
Automatic microbenchmark generation to prevent dead code elimination and constant folding. 132-143
Model-Based Testing and Oracles

Rachel Tzoref-Brill, Paul A. Wojciak, Shahar Maoz
:
Visualization of combinatorial models and test plans. 144-154
Ivan Bocic, Tevfik Bultan:
Finding access control bugs in web applications with CanCheck. 155-166
Mariano Ceccato
, Cu D. Nguyen, Dennis Appelt, Lionel C. Briand:
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities. 167-177
Junjie Chen, Yanwei Bai, Dan Hao
, Lingming Zhang, Lu Zhang, Bing Xie, Hong Mei:
Supporting oracle construction via static analysis. 178-189
Crowdsourcing

Junjie Wang, Song Wang, Qiang Cui, Qing Wang:
Local-based active classification of test report to assist crowdsourced testing. 190-201
Yang Feng, James A. Jones, Zhenyu Chen, Chunrong Fang
:
Multi-objective test report prioritization using image understanding. 202-213
Xin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun
, Yijun Yu
, Bashar Nuseibeh
, Wenyun Zhao:
CrowdService: serving the individuals through mobile crowdsourcing and service composition. 214-219
Mohammad Masudur Rahman
, Chanchal K. Roy:
QUICKAR: automatic query reformulation for concept location using crowdsourced knowledge. 220-225
Android
Faults

Ming Wen, Rongxin Wu
, Shing-Chi Cheung
:
Locus: locating bugs from software changes. 262-273
Gulsher Laghari, Alessandro Murgia, Serge Demeyer
:
Fine-tuning spectrum based fault localisation with frequent method item sets. 274-285
Rafi Almhana, Wiem Mkaouer
, Marouane Kessentini, Ali Ouni
:
Recommending relevant classes for bug reports using multi-objective search. 286-295
Yibiao Yang
, Mark Harman, Jens Krinke, Syed S. Islam, David W. Binkley, Yuming Zhou, Baowen Xu
:
An empirical study on dependence clusters for effort-aware fault-proneness prediction. 296-307
Program Analysis

Jiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu:
StraightTaint: decoupled offline symbolic taint analysis. 308-319
Tamás Szabó, Sebastian Erdweg
, Markus Voelter:
IncA: a DSL for the definition of incremental program analyses. 320-331
Maria Christakis, Christian Bird:
What developers want and need from program analysis: an empirical study. 332-343
Haipeng Cai
, Douglas Thain
:
DistIA: a cost-effective dynamic impact analysis for distributed programs. 344-355
Locks and Races

Yan Cai
, Zijiang Yang:
Radius aware probabilistic testing of deadlocks with guarantees. 356-367
Ziyi Lin, Hao Zhong
, Yuting Chen, Jianjun Zhao:
LockPeeker: detecting latent locks in Java APIs. 368-378
Daniel Kroening
, Daniel Poetzl, Peter Schrammel
, Björn Wachter:
Sound static deadlock analysis for C/Pthreads. 379-390
Vesal Vojdani
, Kalmer Apinis
, Vootele Rõtov, Helmut Seidl, Varmo Vene, Ralf Vogler:
Static race detection for device drivers: the Goblint approach. 391-402
Empirical Studies and New Ideas

Martin Hentschel, Reiner Hähnle
, Richard Bubel:
An empirical evaluation of two user interfaces of an interactive program verifier. 403-413
Salome Maro, Anthony Anjorin
, Rebekka Wohlrab
, Jan-Philipp Steghöfer:
Traceability maintenance: factors and guidelines. 414-425
Michael Hilton
, Timothy Tunnell, Kai Huang, Darko Marinov, Danny Dig:
Usage, costs, and benefits of continuous integration in open-source projects. 426-437
Ana Pescador, Juan de Lara
:
DSL-maps: from requirements to design of domain-specific languages. 438-443
Dimitar Asenov, Peter Müller, Lukas Vogel:
The IDE as a scriptable information system. 444-449
Inference

Zvonimir Pavlinovic, Akash Lal, Rahul Sharma:
Inferring annotations for device drivers from verification histories. 450-460
Alisa J. Maas, Henrique Nazaré, Ben Liblit
:
Array length inference for C library bindings. 461-471
Yuan Jochen Kang, Baishakhi Ray, Suman Jana:
APEx: automated inference of error specifications for C APIs. 472-482
Interactions, Deltas, Goals

Jens Meinicke, Chu-Pan Wong, Christian Kästner, Thomas Thüm, Gunter Saake:
On essential configuration complexity: measuring interactions in highly-configurable systems. 483-494
Yi Li
, Chenguang Zhu
, Julia Rubin, Marsha Chechik:
Precise semantic history slicing through dynamic delta refinement. 495-506
Renzo Degiovanni
, Nicolás Ricci, Dalal Alrajeh, Pablo F. Castro, Nazareno Aguirre:
Goal-conflict detection based on temporal satisfiability checking. 507-518
Symbolic Execution

Muhammad Suleman Mahmood, Maryam Abdul Ghafoor, Junaid Haroon Siddiqui
:
Symbolic execution of stored procedures in database management systems. 519-530
Shengjian Guo, Markus Kusano, Chao Wang:
Conc-iSE: incremental symbolic execution of concurrent software. 531-542
Van-Thuan Pham
, Marcel Böhme
, Abhik Roychoudhury
:
Model-based whitebox fuzzing for program binaries. 543-553
Xin Li, Yongjuan Liang, Hong Qian, Yi-Qi Hu, Lei Bu
, Yang Yu, Xin Chen, Xuandong Li:
Symbolic execution of complex program driven by machine learning based constraint solving. 554-559
Masataka Nishi:
Towards bounded model checking using nonlinear programming solver. 560-565
Design and Specs

Jitendra Singh Thakur
, Atul Gupta
:
Identifying domain elements from textual specifications. 566-577
Sven Peldszus
, Géza Kulcsár, Malte Lochau, Sandro Schulze
:
Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching. 578-589
Andreas Demuth, Markus Riedl-Ehrenleitner, Alexander Egyed:
Efficient detection of inconsistencies in a multi-developer engineering environment. 590-601
Owolabi Legunsen, Wajih Ul Hassan, Xinyue Xu, Grigore Rosu, Darko Marinov:
How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications. 602-613
Test Generation

Akihisa Yamada
, Armin Biere
, Cyrille Artho, Takashi Kitamura
, Eun-Hye Choi
:
Greedy combinatorial test case generation using unsatisfiable cores. 614-624
Benwen Zhang, Emily Hill, James Clause:
Towards automatically generating descriptive names for unit tests. 625-636
Nan Li, Yu Lei, Haider Riaz Khan
, Jingshu Liu, Yun Guo:
Applying combinatorial test data generation to big data applications. 637-647
Hongyin Tang, Guoquan Wu, Jun Wei, Hua Zhong:
Generating test cases to expose concurrency bugs in Android applications. 648-653
Matthew Patrick, Matthew D. Castle
, Richard O. J. H. Stutt, Christopher A. Gilligan:
Automatic test image generation using procedural noise. 654-659
Code Comparison and Transformation

Georg Dotzler, Michael Philippsen
:
Move-optimized source code tree differencing. 660-671
Davood Mazinanian, Nikolaos Tsantalis
:
Migrating cascading style sheets to preprocessors by introducing mixins. 672-683
Tianxiao Gu, Chengnian Sun, Xiaoxing Ma
, Jian Lü, Zhendong Su
:
Automatic runtime recovery via error handler synthesis. 684-695
Xiao Cheng, Zhiming Peng, Lingxiao Jiang
, Hao Zhong
, Haibo Yu, Jianjun Zhao:
Mining revision histories to detect cross-language clones without intermediates. 696-701
Jürgen Cito, Julia Rubin, Phillip Stanley-Marbell
, Martin C. Rinard:
Battery-aware transformations in mobile applications. 702-707
Language

Song Wang, Devin Chollak, Dana Movshovitz-Attias, Lin Tan:
Bugram: bug detection with n-gram language models. 708-719
Matthias Höschele, Andreas Zeller
:
Mining input grammars from dynamic taints. 720-725
Phong Minh Vu, Hung Viet Pham, Tam The Nguyen, Tung Thanh Nguyen
:
Phrase-based extraction of user opinions in mobile app reviews. 726-731
Mining and Retrieval
Mobile and Security

Li Li
, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein
:
Reflection-aware static analysis of Android apps. 756-761
Tianyong Wu, Jierui Liu, Xi Deng, Jun Yan, Jian Zhang:
Relda2: an effective static analysis tool for resource leak detection in Android apps. 762-767
Zhongyi Zhai, Bo Cheng
, Meng Niu, Zhaoning Wang, Yimeng Feng
, Junliang Chen:
An end-user oriented tool suite for development of mobile applications. 768-773
Huafeng Zhang
, Yu Jiang, Han Liu, Hehua Zhang, Ming Gu, Jia-Guang Sun:
Model driven design of heterogeneous synchronous embedded systems. 774-779
Saahil Ognawala, Martín Ochoa
, Alexander Pretschner, Tobias Limmer:
MACKE: compositional analysis of low-level vulnerabilities with symbolic execution. 780-785
Fengjuan Gao, Linzhang Wang, Xuandong Li:
BovInspector: automatic inspection and repair of buffer overflow vulnerabilities. 786-791
Performance, Recommendation, and Analysis

Mohammad Masudur Rahman
, Chanchal Kumar Roy, Jesse Redl, Jason A. Collins:
CORRECT: code reviewer recommendation at GitHub for Vendasta technologies. 792-797
Mushtaq Raza
, João Pascoal Faria
:
ProcessPAIR: a tool for automated performance analysis and improvement recommendation in software development. 798-803
Gillian J. Greene, Bernd Fischer
:
CVExplorer: identifying candidate developers by mining and exploring their open source contributions. 804-809
Thomas Kowark, Christoph Matthies
, Matthias Uflacker, Hasso Plattner:
Lightweight collection and storage of software repository data with DataRover. 810-815
Abdullah M. Alshanqiti
, Reiko Heckel, Timo Kehrer:
Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis. 816-821
Felix Schwägerl
, Bernhard Westfechtel:
SuperMod: tool support for collaborative filtered model-driven software product line engineering. 822-827
Jitendra Singh Thakur
, Atul Gupta
:
AnModeler: a tool for generating domain models from textual specifications. 828-833
Chunyang Chen
, Zhenchang Xing:
SimilarTech: automatically recommend analogical libraries across different programming languages. 834-839
Testing, Validation, and Verification

Jian Liu, John C. Grundy
, Iman Avazpour, Mohamed Almorsy Abdelrazek:
TeeVML: tool support for semi-automatic integration testing environment emulation. 840-845
Martin Hentschel, Reiner Hähnle
, Richard Bubel:
The interactive verification debugger: effective understanding of interactive proof attempts. 846-851
Yixiao Yang, Yu Jiang, Ming Gu, Jia-Guang Sun:
Verifying simulink stateflow model: timed automata approach. 852-857
Lin Cheng, Jialiang Chang, Zijiang Yang, Chao Wang:
GUICat: GUI testing as a service. 858-863
Nor Aiza Moketar
, Massila Kamalrudin
, Safiah Sidek, Mark Robinson, John C. Grundy
:
An automated collaborative requirements engineering tool for better validation of requirements. 864-869
Tamás Szabó, Simon Alperovich, Markus Voelter, Sebastian Erdweg
:
An extensible framework for variable-precision data-flow analyses in MPS. 870-875
Doctoral Symposium

Xuan-Bach Dinh Le:
Towards efficient and effective automatic program repair. 876-879
Joseph Chan Joo Keng:
Automated testing and notification of mobile app privacy leak-cause behaviours. 880-883
Davoud Mougouei
:
Factoring requirement dependencies in software requirement selection using graphs and integer programming. 884-887
Önder Babur
:
Statistical analysis of large sets of models. 888-891
Jürgen Cito:
Developer targeted analytics: supporting software development decisions with runtime information. 892-895
Ferdian Thung:
API recommendation system for software development. 896-899

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







