The Community for Technology Leaders
2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011) (2012)
Essen, Germany Germany
Sept. 3, 2012 to Sept. 7, 2012
ISBN: 978-1-4503-1204-2
TABLE OF CONTENTS
Papers

The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper) (Abstract)

Mark Harman , University College London, UK
William B. Langdon , University College London, UK
Yue Jia , University College London, UK
David R. White , University of Glasgow, UK
Andrea Arcuri , Simula Research Laboratory, Norway
John A. Clark , University of York, UK
pp. 1-14

Re-founding software engineering -- SEMAT at the age of three (keynote abstract) (Abstract)

Ivar Jacobson , Ivar Jacobson International, UK
Ian Spence , Ivar Jacobson International, UK
Pontus Johnson , KTH Royal Institute of Technology, Sweden
Mira Kajko-Mattsson , KTH Royal Institute of Technology, Sweden
pp. 15-19

Practical isolation of failure-inducing changes for debugging regression faults (Abstract)

Kai Yu , Beihang University, China
Mengxiang Lin , Beihang University, China
Jin Chen , Beihang University, China
Xiangyu Zhang , Beihang University, China
pp. 20-29

Diversity maximization speedup for fault localization (Abstract)

Liang Gong , Tsinghua University, China
David Lo , Singapore Management University, Singapore
Lingxiao Jiang , Singapore Management University, Singapore
Hongyu Zhang , Tsinghua University, China
pp. 30-39

Improving the effectiveness of spectra-based fault localization using specifications (Abstract)

Divya Gopinath , University of Texas at Austin, USA
Razieh Nokhbeh Zaeem , University of Texas at Austin, USA
Sarfraz Khurshid , University of Texas at Austin, USA
pp. 40-49

To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools (Abstract)

Ferdian Thung , Singapore Management University, Singapore
Lucia , Singapore Management University, Singapore
David Lo , Singapore Management University, Singapore
Lingxiao Jiang , Singapore Management University, Singapore
Foyzur Rahman , UC Davis, USA
Premkumar T. Devanbu , UC Davis, USA
pp. 50-59

Diagnosys: automatic generation of a debugging interface to the Linux kernel (Abstract)

Tegawende F. Bissyande , University of Bordeaux, France
Laurent Reveillere , University of Bordeaux, France
Julia L. Lawall , INRIA, France
Gilles Muller , INRIA, France
pp. 60-69

Duplicate bug report detection with a combination of information retrieval and topic modeling (Abstract)

Anh Tuan Nguyen , Iowa State University, USA
Tung Thanh Nguyen , Iowa State University, USA
Tien N. Nguyen , Iowa State University, USA
David Lo , Singapore Management University, Singapore
Chengnian Sun , National University of Singapore, Singapore
pp. 70-79

User-aware privacy control via extended static-information-flow analysis (Abstract)

Xusheng Xiao , North Carolina State University, USA
Nikolai Tillmann , Microsoft Research, USA
Manuel Fahndrich , Microsoft Research, USA
Jonathan De Halleux , Microsoft Research, USA
Michal Moskal , Microsoft Research, USA
pp. 80-89

Automatic query performance assessment during the retrieval of software artifacts (Abstract)

Sonia Haiduc , Wayne State University, USA
Gabriele Bavota , University of Salerno, Italy
Rocco Oliveto , University of Molise, Italy
Andrea De Lucia , University of Salerno, Italy
Andrian Marcus , Wayne State University, USA
pp. 90-99

Supporting automated vulnerability analysis using formalized vulnerability signatures (Abstract)

Mohamed Almorsy , Swinburne University of Technology, Australia
John Grundy , Swinburne University of Technology, Australia
Amani S. Ibrahim , Swinburne University of Technology, Australia
pp. 100-109

A qualitative study on user guidance capabilities in product configuration tools (Abstract)

Rick Rabiser , JKU Linz, Austria
Paul Grunbacher , JKU Linz, Austria
Martin Lehofer , Siemens, Austria
pp. 110-119

Structured merge with auto-tuning: balancing precision and performance (Abstract)

Sven Apel , University of Passau, Germany
Olaf Lessenich , University of Passau, Germany
Christian Lengauer , University of Passau, Germany
pp. 120-129

An automated approach to forecasting QoS attributes based on linear and non-linear time series modeling (Abstract)

Ayman Amin , Swinburne University of Technology, Australia
Lars Grunske , University of Kaiserslautern, Germany
Alan Colman , Swinburne University of Technology, Australia
pp. 130-139

Puzzle-based automatic testing: bringing humans into the loop by solving puzzles (Abstract)

Ning Chen , Hong Kong University of Science and Technology, China
Sunghun Kim , Hong Kong University of Science and Technology, China
pp. 140-149

Using unfoldings in automated testing of multithreaded programs (Abstract)

Kari Kahkonen , Aalto University, Finland
Olli Saarikivi , Aalto University, Finland
Keijo Heljanko , Aalto University, Finland
pp. 150-159

Runtime monitoring of software energy hotspots (Abstract)

Adel Noureddine , INRIA, France / University of Lille, France
Aurelien Bourdon , INRIA, France / University of Lille, France
Romain Rouvoy , INRIA, France / University of Lille, France
Lionel Seinturier , INRIA, France / University of Lille, France / Institut Universitaire de France, France
pp. 160-169

Predicting recurring crash stacks (Abstract)

Hyunmin Seo , Hong Kong University of Science and Technology, China
Sunghun Kim , Hong Kong University of Science and Technology, China
pp. 180-189

Automated inference of goal-oriented performance prediction functions (Abstract)

Dennis Westermann , SAP Research, Germany
Jens Happe , SAP Research, Germany
Rouven Krebs , SAP Research, Germany
Roozbeh Farahbod , SAP Research, Germany
pp. 190-199

Unbounded data model verification using SMT solvers (Abstract)

Jaideep Nijjar , UC Santa Barbara, USA
Tevfik Bultan , UC Santa Barbara, USA
pp. 210-219

Supporting automated software re-engineering using re-aspects (Abstract)

Mohamed Almorsy , Swinburne University of Technology, Australia
John Grundy , Swinburne University of Technology, Australia
Amani S. Ibrahim , Swinburne University of Technology, Australia
pp. 230-233

Supporting operating system kernel data disambiguation using points-to analysis (Abstract)

Amani S. Ibrahim , Swinburne University of Technology, Australia
John Grundy , Swinburne University of Technology, Australia
James Hamlyn-Harris , Swinburne University of Technology, Australia
Mohamed Almorsy , Swinburne University of Technology, Australia
pp. 234-237

Can I clone this piece of code here? (Abstract)

Xiaoyin Wang , Peking University, China
Yingnong Dang , Microsoft Research, China
Lu Zhang , Peking University, China
Dongmei Zhang , Microsoft Research, China
Erica Lan , Microsoft, USA
Hong Mei , Peking University, China
pp. 170-179

Automatic recovery of statecharts from procedural code (Abstract)

Moria Abadi , Tel Aviv University, Israel
Yishai A. Feldman , IBM Research, Israel
pp. 238-241

Locating distinguishing features using diff sets (Abstract)

Julia Rubin , University of Toronto, Canada / IBM Research, Israel
Marsha Chechik , University of Toronto, Canada
pp. 242-245

Slicing and replaying code change history (Abstract)

Katsuhisa Maruyama , Ritsumeikan University, Japan
Eijiro Kitsu , Ritsumeikan University, Japan
Takayuki Omori , Ritsumeikan University, Japan
Shinpei Hayashi , Tokyo Institute of Technology, Japan
pp. 246-249

Generating model transformation rules from examples using an evolutionary algorithm (Abstract)

Martin Faunes , Université de Montréal, Canada
Houari Sahraoui , Université de Montréal, Canada
Mounir Boukadoum , Université du Québec à Montréal, Canada
pp. 250-253

Augmented dynamic symbolic execution (Abstract)

Konrad Jamrozik , Saarland University, Germany
Gordon Fraser , University of Sheffield, UK
Nikolai Tillmann , Microsoft Research, USA
Jonathan De Halleux , Microsoft Research, USA
pp. 254-257

Using GUI ripping for automated testing of Android applications (Abstract)

Domenico Amalfitano , Università Federico II Napoli, Italy
Anna Rita Fasolino , Università Federico II Napoli, Italy
Porfirio Tramontana , Università Federico II Napoli, Italy
Salvatore De Carmine , Università Federico II Napoli, Italy
Atif M. Memon , University of Maryland, USA
pp. 258-261

kbe-anonymity: test data anonymization for evolving programs (Abstract)

Lucia , Singapore Management University, Singapore
David Lo , Singapore Management University, Singapore
Lingxiao Jiang , Singapore Management University, Singapore
Aditya Budi , Singapore Management University, Singapore
pp. 262-265

Selection of regression system tests for security policy evolution (Abstract)

JeeHyun Hwang , North Carolina State University, USA
Tao Xie , North Carolina State University, USA
Donia El Kateb , University of Luxembourg, Luxembourg
Tejeddine Mouelhi , University of Luxembourg, Luxembourg
Yves Le Traon , University of Luxembourg, Luxembourg
pp. 266-269

Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (Abstract)

Lei Shang , University of New South Wales, Australia
Yi Lu , University of New South Wales, Australia
Jingling Xue , University of New South Wales, Australia
pp. 270-273

Automatically securing permission-based software by reducing the attack surface: an application to Android (Abstract)

Alexandre Bartel , University of Luxembourg, Luxembourg / SnT, Luxembourg
Jacques Klein , University of Luxembourg, Luxembourg / SnT, Luxembourg
Yves Le Traon , University of Luxembourg, Luxembourg / SnT, Luxembourg
Martin Monperrus , University of Lille, France / INRIA, France
pp. 274-277

Support vector machines for anti-pattern detection (Abstract)

Abdou Maiga , Université de Montréal, Canada
Nasir Ali , École Polytechnique de Montréal, Canada
Neelesh Bhattacharya , École Polytechnique de Montréal, Canada
Aminata Sabane , École Polytechnique de Montréal, Canada
Yann-Gael Gueheneuc , École Polytechnique de Montréal, Canada
Giuliano Antoniol , École Polytechnique de Montréal, Canada
Esma Aimeur , Université de Montréal, Canada
pp. 278-281

Detection of embedded code smells in dynamic web applications (Abstract)

Hung Viet Nguyen , Iowa State University, USA
Hoan Anh Nguyen , Iowa State University, USA
Tung Thanh Nguyen , Iowa State University, USA
Anh Tuan Nguyen , Iowa State University, USA
Tien N. Nguyen , Iowa State University, USA
pp. 282-285

Boreas: an accurate and scalable token-based approach to code clone detection (Abstract)

Yang Yuan , Peking University, China
Yao Guo , Peking University, China
pp. 286-289

Refactorings without names (Abstract)

Friedrich Steimann , Fernuniversität in Hagen, Germany
Jens von Pilgrim , Fernuniversität in Hagen, Germany
pp. 290-293

Automated API migration in a user-extensible refactoring tool for Erlang programs (Abstract)

Huiqing Li , University of Kent, UK
Simon Thompson , University of Kent, UK
pp. 294-297

Using mobile devices for collaborative requirements engineering (Abstract)

Rainer Lutz , University of Trier, Germany
Sascha Schafer , University of Trier, Germany
Stephan Diehl , University of Trier, Germany
pp. 298-301

Adaptability of model comparison tools (Abstract)

Timo Kehrer , University of Siegen, Germany
Udo Kelter , University of Siegen, Germany
Pit Pietsch , University of Siegen, Germany
Maik Schmidt , University of Siegen, Germany
pp. 306-309

Predicting common web application vulnerabilities from input validation and sanitization code patterns (Abstract)

Lwin Khin Shar , Nanyang Technological University, Singapore
Hee Beng Kuan Tan , Nanyang Technological University, Singapore
pp. 310-313

Software defect prediction using semi-supervised learning with dimension reduction (Abstract)

Huihua Lu , West Virginia University, USA
Bojan Cukic , West Virginia University, USA
Mark Culp , West Virginia University, USA
pp. 314-317

Healing online service systems via mining historical issue repositories (Abstract)

Rui Ding , Microsoft Research, China
Qiang Fu , Microsoft Research, China
Jian-Guang Lou , Microsoft Research, China
Qingwei Lin , Microsoft Research, China
Dongmei Zhang , Microsoft Research, USA
Jiajun Shen , Shanghai Jiao Tong University, China
Tao Xie , North Carolina State University, USA
pp. 318-321

Automated evaluation of syntax error recovery (Abstract)

Maartje de Jonge , TU Delft, Netherlands
Eelco Visser , TU Delft, Netherlands
pp. 322-325

MaramaAI: tool support for capturing and managing consistency of multi-lingual requirements (Abstract)

Massila Kamalrudin , Universiti Teknikal Malaysia Melaka, Malaysia
John Grundy , Swinburne University of Technology, Australia
John Hosking , Australian National University, Australia
pp. 326-329

GUITest: a Java library for fully automated GUI robustness testing (Abstract)

Sebastian Bauersfeld , Universitat Politècnica de València, Spain
Tanja E. J. Vos , Universitat Politècnica de València, Spain
pp. 330-333

Observatory of trends in software related microblogs (Abstract)

Palakorn Achananuparp , Singapore Management University, Singapore
Ibrahim Nelman Lubis , Singapore Management University, Singapore
Yuan Tian , Singapore Management University, Singapore
David Lo , Singapore Management University, Singapore
Ee-Peng Lim , Singapore Management University, Singapore
pp. 334-337

Arcade.PLC: a verification platform for programmable logic controllers (Abstract)

Sebastian Biallas , RWTH Aachen University, Germany
Jorg Brauer , Verified Systems International, Germany
Stefan Kowalewski , RWTH Aachen University, Germany
pp. 338-341

Test suite selection based on traceability annotations (Abstract)

Yves Ledru , UJF-Grenoble 1, France / Grenoble-INP, France / UPMF-Grenoble2, France / CNRS, France
German Vega , UJF-Grenoble 1, France / Grenoble-INP, France / UPMF-Grenoble2, France / CNRS, France
Taha Triki , UJF-Grenoble 1, France / Grenoble-INP, France / UPMF-Grenoble2, France / CNRS, France
Lydie du Bousquet , UJF-Grenoble 1, France / Grenoble-INP, France / UPMF-Grenoble2, France / CNRS, France
pp. 342-345

PuMoC: a CTL model-checker for sequential programs (Abstract)

Fu Song , CNRS, France / University Paris Diderot, France
Tayssir Touili , CNRS, France / University Paris Diderot, France
pp. 346-349

Weave droid: aspect-oriented programming on Android devices: fully embedded or in the cloud (Abstract)

Ylies Falcone , UJF-Grenoble 1, France / LIG, France
Sebastian Currea , UJF-Grenoble 1, France / LIG, France
pp. 350-353

Caprice: a tool for engineering adaptive privacy (Abstract)

Inah Omoronyia , Lero, Ireland / University of Limerick, Ireland
Liliana Pasquale , Lero, Ireland / University of Limerick, Ireland
Mazeiar Salehie , Lero, Ireland / University of Limerick, Ireland
Luca Cavallaro , Lero, Ireland / University of Limerick, Ireland
Gavin Doherty , Lero, Ireland / Trinity College Dublin, Ireland
Bashar Nuseibeh , Lero, Ireland / University of Limerick, Ireland / Open University, UK
pp. 354-357

JStereoCode: automatically identifying method and class stereotypes in Java code (Abstract)

Laura Moreno , Wayne State University, USA
Andrian Marcus , Wayne State University, USA
pp. 358-361

CHESS: a model-driven engineering tool environment for aiding the development of complex industrial systems (Abstract)

Antonio Cicchetti , Mälardalen University, Sweden
Federico Ciccozzi , Mälardalen University, Sweden
Silvia Mazzini , Intecs, Italy
Stefano Puri , Intecs, Italy
Marco Panunzio , University of Padova, Italy
Alessandro Zovi , University of Padova, Italy
Tullio Vardanega , University of Padova, Italy
pp. 362-365

SYMake: a build code analysis and refactoring tool for makefiles (Abstract)

Ahmed Tamrawi , Iowa State University, USA
Hoan Anh Nguyen , Iowa State University, USA
Hung Viet Nguyen , Iowa State University, USA
Tien N. Nguyen , Iowa State University, USA
pp. 366-369

Quokka: visualising interactions of enterprise software environment emulators (Abstract)

Cameron Hine , Swinburne University of Technology, Australia
Jean-Guy Schneider , Swinburne University of Technology, Australia
Jun Han , Swinburne University of Technology, Australia
Steve Versteeg , CA Labs, Australia
pp. 370-373

GZoltar: an eclipse plug-in for testing and debugging (Abstract)

Jose Campos , University of Porto, Portugal
Andre Riboira , University of Porto, Portugal
Alexandre Perez , University of Porto, Portugal
Rui Abreu , University of Porto, Portugal
pp. 378-381

Semantic patch inference (Abstract)

Jesper Andersen , University of Copenhagen, Denmark
Anh Cuong Nguyen , National University of Singapore, Singapore
David Lo , Singapore Management University, Singapore
Julia L. Lawall , INRIA, France
Siau-Cheng Khoo , National University of Singapore, Singapore
pp. 382-385

REInDetector: a framework for knowledge-based requirements engineering (Abstract)

Tuong Huan Nguyen , Swinburne University of Technology, Australia
Bao Quoc Vo , Swinburne University of Technology, Australia
Markus Lumpe , Swinburne University of Technology, Australia
John Grundy , Swinburne University of Technology, Australia
pp. 386-389

A model-driven parser generator with reference resolution support (Abstract)

Luis Quesada , University of Granada, Spain
pp. 394-397

Property-preserving program refinement (Abstract)

Yosuke Yamamoto , University of Saskatchewan, Canada
pp. 398-401

Predicting software complexity by means of evolutionary testing (Abstract)

Ana Filipa Nogueira , University of Coimbra, Portugal
pp. 402-405

Identifying refactoring sequences for improving software maintainability (Abstract)

Panita Meananeatra , Thammasat University, Thailand / National Electronics and Computer Technology Center, Thailand
pp. 406-409
105 ms
(Ver 3.1 (10032016))