The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 0098-5589
Papers

Vulnerability Discovery with Attack Injection (Abstract)

Miguel Correia , University of Lisboa, Portugal
Paulo Verissimo , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
João Antunes , University of Lisboa, Portugal
Rui Neves , Universidade Técnica de Lisboa, Portugal

How Effectively does Metamorphic Testing Alleviate the Oracle Problem? (Abstract)

Huai Liu , RMIT University, Melbourne
Fei-Ching Kuo , Swinburne University of Technology, Melbourne
Dave Towey , The University of Nottingham Ningbo China, Ningbo
Tsong Yueh Chen , Swinburne University of Technology, Melbourne

Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation (PDF)

Lech Madeyski , Wroclaw University of Technology, Wroclaw
Wojciech Orzeszyna , Wroclaw University of Technology, Wroclaw and Blekinge Institute of Technology, Karlskrona
Richard Torkar , Blekinge Institute of Technology, Karlskrona and Chalmers University of Technology | University of Gothenburg, Göteborg
Mariusz Józala , Wroclaw University of Technology, Wroclaw

Variability Mining: Consistent Semiautomatic Detection of Product-Line Features (Abstract)

Christian Kästner , Carnegie Mellon University, Pittsburgh
Alexander Dreiling , University of Magdeburg and Deutsche Bank, Frankfurt
Klaus Ostermann , Philipps University Marburg, Marburg

Formulating Cost-Effective Monitoring Strategies for Service-based Systems (Abstract)

Qiang He , Swinburne University of Technology, Melbourne
Jun Han , Swinburne University of Technology, Melbourne
Yun Yang , Swinburne University of Technology, Melbourne
Hai Jin , Huazhong University of Science and Technology, Wuhan
Jean-Guy Schneider , Swinburne University of Technology, Melbourne
Steve Versteeg , CA Labs, Melbourne

Modular Software Model Checking for Distributed Systems (Abstract)

Watcharin Leungwattanakit , Chiba University, Chiba
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba
Masami Hagiya , University of Tokyo, Tokyo
Yoshinori Tanabe , National Institute of Informatics (NII), Tokyo
Mitsuharu Yamamoto , Chiba University, Chiba
Koichi Takahashi , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba

GossipKit: A Unified Component Framework for Gossip (Abstract)

François Taïani , University of Rennes 1 / IRISA, Rennes
Shen Lin , SAP Labs, Shanghai
Gordon S. Blair , University of Lancaster, Lancaster

Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis (PDF)

Leandro L. Minku , The University of Birmingham, Birmingham
Dirk Sudholt , The University of Sheffield, Sheffield
Xin Yao , The University of Birmingham, Birmingham

Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach (Abstract)

Cemal Yilmaz , Sabanci University, Istanbul
Emine Dumlu , Sabanci University, Istanbul
Myra B. Cohen , University of Nebraska-Lincoln, Lincoln
Adam A. Porter , University of Maryland, College Park

Specification and Verification of Normative Texts using C-O Diagrams (Abstract)

Gregorio Diaz , University of Castilla-La Mancha, Albacete
María Emilia Cambronero , University of Castilla-La Mancha, Albacete
Enrique Martínez , University of Castilla-La Mancha, Albacete
Gerardo Schneider , Chalmers | University of Gothenburg, Gothenburg

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees (Abstract)

Charles Song , Fraunhofer USA Center for Experimental Software Engineering, College Park,
Adam A. Porter , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems (Abstract)

Alex Groce , Oregon State University, Corvallis
Todd Kulesza , Oregon State University, Corvallis
Chaoqiang Zhang , Oregon State University, Corvallis
Shalini Shamasunder , Oregon State University, Corvallis
Margaret Burnett , Oregon State University, Corvallis
Weng-Keen Wong , Oregon State University, Corvallis
Simone Stumpf , City University London, London
Shubhomoy Das , Oregon State University, Corvallis
Amber Shinsel , Oregon State University, Corvallis
Forrest Bice , Oregon State University, Corvallis
Kevin McIntosh , Oregon State University, Corvallis

Variability in Software Systems - A Systematic Literature Review (Abstract)

Matthias Galster , University of Canterbury, Christchurch
Danny Weyns , Linnaeus University, Växjö
Dan Tofan , University of Groningen, Groningen
Bartosz Michalik , Katholieke Universiteit Leuven, Leuven
Paris Avgeriou , University of Groningen, Groningen

Learning Assumptions for Compositional Verification of Timed Systems (Abstract)

Shang-Wei Lin , National University of Singapore, Singapore
Étienne André , Université Paris, LIPN, CNRS, Paris
Yang Liu , Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore

Methodbook: Recommending Move Method Refactorings via Relational Topic Models (Abstract)

Gabriele Bavota , University of Sannio, Benevento
Rocco Oliveto , University of Molise, Pesche
Malcom Gethers , University of Maryland, Baltimore County, Baltimore
Denys Poshyvanyk , The College of William and Mary, Williamsburg
Andrea De Lucia , University of Salerno, Fisciano

Multi-Objective Quality-Driven Service Selection--A Fully Polynomial Time Approximation Scheme (Abstract)

Immanuel Trummer , École Polytechnique Fédérale de Lausanne, Lausanne
Boi Faltings , École Polytechnique Fédérale de Lausanne, Lausanne, Lausanne
Walter Binder , University of Lugano, Lugano

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs (Abstract)

Yan Cai , Y. Cai is with the Department of Computer Science, University of Hong Kong, Hong Kong (e-mail: yancai2-c@my.cityu.edu.hk).

An Enhanced Bailout Protocol for Mixed Criticality Embedded Software (Abstract)

Iain Bate , Iain Bate is with Department of Computer Science, University of York, York, UK.

Mining Sequences of Developer Interactions in Visual Studio for Usage Smells (Abstract)

Kostadin Damevski , Kostadin Damevski is with the Department of Computer Science, Virginia Commonwealth University, Richmond, VA, 23284, U.S.A. (e-mail: damevski@acm.org).
David Shepherd , Kostadin Damevski is with the Department of Computer Science, Virginia Commonwealth University, Richmond, VA, 23284, U.S.A. (e-mail: damevski@acm.org).
Johannes Schneider , Kostadin Damevski is with the Department of Computer Science, Virginia Commonwealth University, Richmond, VA, 23284, U.S.A. (e-mail: damevski@acm.org).
Lori Pollock , Kostadin Damevski is with the Department of Computer Science, Virginia Commonwealth University, Richmond, VA, 23284, U.S.A. (e-mail: damevski@acm.org).

Efficient Dynamic Updates of Distributed Components through Version Consistency (Abstract)

Luciano Baresi , L. Baresi is with the Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano, 20133 Milano, Italy.(email:fluciano.baresijcarlo.ghezzig@polimi.it)

Test Oracle Strategies for Model-based Testing (Abstract)

Nan Li , N. Li is with research and development division at Medidata solutions, New York, NY, USA.(email:nli@mdsol.com)

An Improved SDA based Defect Prediction Framework for both Within-project and Cross-project Class-imbalance Problems (Abstract)

Xiao-Yuan Jing , Xiao-Yuan Jing is with the State Key Laboratory of Software Engineering, School of Computer, Wuhan University, and the College of Automation, Nanjing University of Posts and Telecommunications. (email: jingxy_2000@126.com)

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection (Abstract)

Lorenzo Bossi , Lorenzo Bossi is with the Department of Computer Science, Purdue University, West Lafayette, IN, 47907, USA. (email: lbossi@purdue.edu)

The Use of Summation to Aggregate Software Metrics Hinders the Performance of Defect Prediction Models (Abstract)

Feng Zhang , F. Zhang is with the School of Computing at Queen’s University, Kingston, Canada.(email:feng@cs.queensu.ca)

Approaches to Co-Evolution of Metamodels and Models: A Survey (Abstract)

Regina Hebig , Regina Hebig is with the Chalmers j University of Gothenburg, Computer Science and Engineering Goteborg, Vastra Gotaland County, Sweden. (email: rhebig@acm.org)

Self-Adaptive and Online QoS Modeling for Cloud-Based Software Services (PDF)

Tao Chen , T. Chen is with CERCIA, School of Computer Science, University of Birmingham, Birmingham, UK, B15 2TT.(email:t.chen@cs.bham.ac.uk)

Model-Based Self-Aware Performance and Resource Management Using the Descartes Modeling Language (Abstract)

Simon Spinner , Chair of Software Engineering, Department of Computer Science, University of Wurzburg, Wurzburg, Germany.(Email: simon.spinner@uni-wuerzburg.de)

The Value of Exact Analysis in Requirements Selection (Abstract)

Lingbo Li , CREST, Department of Computer Science, University College London, Gower Street London, WC1E 6BT, United Kingdom (e-mail: lingbo.li.13@ucl.ac.uk).

Automated Steering of Model-Based Test Oracles to Admit Real Program Behaviors (Abstract)

Gregory Gay , Department of Computer Science & Engineering, University of South Carolina.

Online Reliability Prediction via Motifs-based Dynamic Bayesian Networks for Service-Oriented Systems (Abstract)

hongbing wang , School of Computer Science and Engineering and Key Laboratory of Computer Network and Information Integration, Southeast University, SIPAILOU 2, NanJing 210096, China.

A Framework for Evaluating the Results of the SZZ Approach for Identifying Bug-Introducing Changes (Abstract)

Daniel Alencar da Costa , Department of Informatics and Applied Mathematics (DIMAp), Federal University of Rio Grande do Norte, Brazil.

A Dissection of Test-Driven Development: Does It Really Matter to Test-First or to Test-Last? (Abstract)

Davide Fucci , Department of Information Processing Science, University of Oulu, Finland. (email: davide.fucci@oulu.fi)

A Feature-based Classification of Model Repair Approaches (Abstract)

Nuno Macedo , High-assurance Software Laboratory (HASLab), INESC TEC and Universidade do Minho.

Supporting Change Impact Analysis Using a Recommendation System: An Industrial Case Study in a Safety-Critical Context (Abstract)

Markus Borg , SICS Swedish ICT AB, Ideon Science Park, Building Beta 2, Scheelevagen 17, SE-223 70 Lund, Sweden.

Preventing Defects: The Impact of Requirements Traceability Completeness on Software Quality (Abstract)

patrick rempel , Technische Universitat Ilmenau Software Engineering for Safety-Critical Systems Group.(email:patrick.rempel@tu-ilmenau.de)

Keyword Search for Building Service-Based Systems (Abstract)

Qiang He , State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China and the School of Software Engi-neering and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC 3122, Australia. (e-mail: qhe@swin.edu).

Automatic Contract Insertion with CCBot (Abstract)

Scott A. Carr , Department of Computer Science, Purdue University, West Lafayette, Indiana 47907 USA (e-mail: carr27@purdue.edu)

Locating Software Faults Based on Minimum Debugging Frontier Set (Abstract)

Feng Li , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences. (email: lifeng2005@ ict.ac.cn)

Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic (Abstract)

Marie Platenius , Software Engineering Heinz Nixdorf Institute Paderborn University, Germany.(email:m.platenius@upb.de)

Reporting Usability Defects: A Systematic Literature Review (Abstract)

Rajesh Vasa , Faculty of Science, Engineering and Built Environment, Deakin University, Australia. (email: rvasa@swin.edu.au)

Automated Extraction and Clustering of Requirements Glossary Terms (Abstract)

Mehrdad Sabetzadeh , SnT Centre for Security, Reliability, and Trust, University of Luxembourg, Luxembourg, L- 2721. (email: mehrdad.sabetzadeh@uni.lu)

Static analysis of model transformations (Abstract)

Jesus Sanchez Cuadrado , Department of Computer Science, Universidad Autonoma de Madrid, Spain.(Email: jesusc@um.es)

A Qualitative Study of Application-level Caching (Abstract)

Jhonny Mertz , Departamento de Inform´atica Aplicada, Instituto de Informatica, Universidade Federal do Rio Grande do Sul, Brazil.(email:jmamertz@inf.ufrgs.br)

Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-precision Testing (Abstract)

Enyi Tang , State Key Laboratory for Novel Software Technology and Software Institute of Nanjing University, Jiangsu, China.(email::eytang@nju.edu.cn)

Identifying Extract Method Refactoring Opportunities based on Functional Relevance (Abstract)

Apostolos Ampatzoglou , Institute of Mathematics and Computer Science, University of Groningen, Netherlands (e-mail: a.ampatzoglou@rug.nl).

Language Inclusion Checking of Timed Automata with Non-Zenoness (Abstract)

Ting Wang , College of Computer Science, Zhejiang University of Technology, P.R. China.(email:wangting@zjut.edu.cn)

Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt (Abstract)

Emad Shihab , Data-driven Analysis of Software (DAS) lab at the Department of Computer Science and Software Engineering, Concordia University, Montreal, Quebec, Canada. (e-mail: eshihab@encs.concordia.ca).

AutoSense: A Framework for Automated Sensitivity Analysis of Program Data (Abstract)

Rajarshi Ray , Department of Computer Science & Engineering, National Institute of Technology Meghalaya, Shillong, India.

Reasoning about Identifier Spaces: How to Make Chord Correct (Abstract)

Pamela Zave , AT&T Laboratories—Research Bedminster, New Jersey 07921, USA (e-mail: pamela@research.att.com).

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection (Abstract)

Dinghao Wu , College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802 (e-mail: dwu@ist.psu.edu).

On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study (Abstract)

Guido Salvaneschi , Software Technology Group, Department of Computer Science, Technische Universitat Darmstadt, Darmstadt, Germany.

Empirical Evaluation of the Impact of Object-Oriented Code Refactoring on Quality Attributes: A Systematic Literature Review (Abstract)

Jehad Al Dallal , Department of Information Science, Kuwait University. P.O. Box 5969, Safat 13060, Kuwait. (email: j.aldallal@ku.edu.kw).

Autofolding for Source Code Summarization (Abstract)

Jaroslav Fowkes , School of Informatics, University of Edinburgh, Edinburgh, EH8 9AB, UK (e-mail: jaroslav.fowkes@ed.ac.uk).

Semantic Slicing of Software Version Histories (Abstract)

Yi Li , Department of Computer Science, University of Toronto, Toronto, ON, Canada, M5S3G4.(email:liyi@cs.toronto.edu)

Test-Case Generation for Boolean Expressions by Cell Covering (Abstract)

Lian Yu , School of Software and Microelectronics in Peking University, Beijing, 102600, China.(email:lianyu@ss.pku.edu.cn)

Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems (Abstract)

Yun Yang , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia (e-mail: yyang@swin.edu.au)

Detecting Trivial Mutant Equivalences via Compiler Optimisations (PDF)

Marinos Kintis , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg. (e-mail: marinos.kintis@uni.lu)

Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles (PDF)

Xuanzhe Liu , Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing, China, 100871 (e-mail: liuxuanzhe@pku.edu.cn).
97 ms
(Ver 3.3 (11022016))