The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 0098-5589
Papers

Vulnerability Discovery with Attack Injection (Abstract)

Miguel Correia , University of Lisboa, Portugal
Paulo Verissimo , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
João Antunes , University of Lisboa, Portugal
Rui Neves , Universidade Técnica de Lisboa, Portugal

How Effectively does Metamorphic Testing Alleviate the Oracle Problem? (Abstract)

Huai Liu , RMIT University, Melbourne
Fei-Ching Kuo , Swinburne University of Technology, Melbourne
Dave Towey , The University of Nottingham Ningbo China, Ningbo
Tsong Yueh Chen , Swinburne University of Technology, Melbourne

Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation (PDF)

Lech Madeyski , Wroclaw University of Technology, Wroclaw
Wojciech Orzeszyna , Wroclaw University of Technology, Wroclaw and Blekinge Institute of Technology, Karlskrona
Richard Torkar , Blekinge Institute of Technology, Karlskrona and Chalmers University of Technology | University of Gothenburg, Göteborg
Mariusz Józala , Wroclaw University of Technology, Wroclaw

Variability Mining: Consistent Semiautomatic Detection of Product-Line Features (Abstract)

Christian Kästner , Carnegie Mellon University, Pittsburgh
Alexander Dreiling , University of Magdeburg and Deutsche Bank, Frankfurt
Klaus Ostermann , Philipps University Marburg, Marburg

Formulating Cost-Effective Monitoring Strategies for Service-based Systems (Abstract)

Qiang He , Swinburne University of Technology, Melbourne
Jun Han , Swinburne University of Technology, Melbourne
Yun Yang , Swinburne University of Technology, Melbourne
Hai Jin , Huazhong University of Science and Technology, Wuhan
Jean-Guy Schneider , Swinburne University of Technology, Melbourne
Steve Versteeg , CA Labs, Melbourne

Modular Software Model Checking for Distributed Systems (Abstract)

Watcharin Leungwattanakit , Chiba University, Chiba
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba
Masami Hagiya , University of Tokyo, Tokyo
Yoshinori Tanabe , National Institute of Informatics (NII), Tokyo
Mitsuharu Yamamoto , Chiba University, Chiba
Koichi Takahashi , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba

GossipKit: A Unified Component Framework for Gossip (Abstract)

François Taïani , University of Rennes 1 / IRISA, Rennes
Shen Lin , SAP Labs, Shanghai
Gordon S. Blair , University of Lancaster, Lancaster

Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis (PDF)

Leandro L. Minku , The University of Birmingham, Birmingham
Dirk Sudholt , The University of Sheffield, Sheffield
Xin Yao , The University of Birmingham, Birmingham

Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach (Abstract)

Cemal Yilmaz , Sabanci University, Istanbul
Emine Dumlu , Sabanci University, Istanbul
Myra B. Cohen , University of Nebraska-Lincoln, Lincoln
Adam A. Porter , University of Maryland, College Park

Specification and Verification of Normative Texts using C-O Diagrams (Abstract)

Gregorio Diaz , University of Castilla-La Mancha, Albacete
María Emilia Cambronero , University of Castilla-La Mancha, Albacete
Enrique Martínez , University of Castilla-La Mancha, Albacete
Gerardo Schneider , Chalmers | University of Gothenburg, Gothenburg

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees (Abstract)

Charles Song , Fraunhofer USA Center for Experimental Software Engineering, College Park,
Adam A. Porter , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems (Abstract)

Alex Groce , Oregon State University, Corvallis
Todd Kulesza , Oregon State University, Corvallis
Chaoqiang Zhang , Oregon State University, Corvallis
Shalini Shamasunder , Oregon State University, Corvallis
Margaret Burnett , Oregon State University, Corvallis
Weng-Keen Wong , Oregon State University, Corvallis
Simone Stumpf , City University London, London
Shubhomoy Das , Oregon State University, Corvallis
Amber Shinsel , Oregon State University, Corvallis
Forrest Bice , Oregon State University, Corvallis
Kevin McIntosh , Oregon State University, Corvallis

Variability in Software Systems - A Systematic Literature Review (Abstract)

Matthias Galster , University of Canterbury, Christchurch
Danny Weyns , Linnaeus University, Växjö
Dan Tofan , University of Groningen, Groningen
Bartosz Michalik , Katholieke Universiteit Leuven, Leuven
Paris Avgeriou , University of Groningen, Groningen

Learning Assumptions for Compositional Verification of Timed Systems (Abstract)

Shang-Wei Lin , National University of Singapore, Singapore
Étienne André , Université Paris, LIPN, CNRS, Paris
Yang Liu , Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore

Methodbook: Recommending Move Method Refactorings via Relational Topic Models (Abstract)

Gabriele Bavota , University of Sannio, Benevento
Rocco Oliveto , University of Molise, Pesche
Malcom Gethers , University of Maryland, Baltimore County, Baltimore
Denys Poshyvanyk , The College of William and Mary, Williamsburg
Andrea De Lucia , University of Salerno, Fisciano

Multi-Objective Quality-Driven Service Selection--A Fully Polynomial Time Approximation Scheme (Abstract)

Immanuel Trummer , École Polytechnique Fédérale de Lausanne, Lausanne
Boi Faltings , École Polytechnique Fédérale de Lausanne, Lausanne, Lausanne
Walter Binder , University of Lugano, Lugano

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs (Abstract)

Yan Cai , Y. Cai is with the Department of Computer Science, University of Hong Kong, Hong Kong (e-mail: yancai2-c@my.cityu.edu.hk).

A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection (Abstract)

Lorenzo Bossi , Lorenzo Bossi is with the Department of Computer Science, Purdue University, West Lafayette, IN, 47907, USA. (email: lbossi@purdue.edu)

The Use of Summation to Aggregate Software Metrics Hinders the Performance of Defect Prediction Models (Abstract)

Feng Zhang , F. Zhang is with the School of Computing at Queen’s University, Kingston, Canada.(email:feng@cs.queensu.ca)

Approaches to Co-Evolution of Metamodels and Models: A Survey (Abstract)

Regina Hebig , Regina Hebig is with the Chalmers j University of Gothenburg, Computer Science and Engineering Goteborg, Vastra Gotaland County, Sweden. (email: rhebig@acm.org)

Self-Adaptive and Online QoS Modeling for Cloud-Based Software Services (PDF)

Tao Chen , T. Chen is with CERCIA, School of Computer Science, University of Birmingham, Birmingham, UK, B15 2TT.(email:t.chen@cs.bham.ac.uk)

Model-Based Self-Aware Performance and Resource Management Using the Descartes Modeling Language (Abstract)

Simon Spinner , Chair of Software Engineering, Department of Computer Science, University of Wurzburg, Wurzburg, Germany.(Email: simon.spinner@uni-wuerzburg.de)

The Value of Exact Analysis in Requirements Selection (Abstract)

Lingbo Li , CREST, Department of Computer Science, University College London, Gower Street London, WC1E 6BT, United Kingdom (e-mail: lingbo.li.13@ucl.ac.uk).

Automated Steering of Model-Based Test Oracles to Admit Real Program Behaviors (Abstract)

Gregory Gay , Department of Computer Science & Engineering, University of South Carolina.

Online Reliability Prediction via Motifs-based Dynamic Bayesian Networks for Service-Oriented Systems (Abstract)

hongbing wang , School of Computer Science and Engineering and Key Laboratory of Computer Network and Information Integration, Southeast University, SIPAILOU 2, NanJing 210096, China.

A Framework for Evaluating the Results of the SZZ Approach for Identifying Bug-Introducing Changes (Abstract)

Daniel Alencar da Costa , Department of Informatics and Applied Mathematics (DIMAp), Federal University of Rio Grande do Norte, Brazil.

A Dissection of Test-Driven Development: Does It Really Matter to Test-First or to Test-Last? (Abstract)

Davide Fucci , Department of Information Processing Science, University of Oulu, Finland. (email: davide.fucci@oulu.fi)

A Feature-based Classification of Model Repair Approaches (Abstract)

Nuno Macedo , High-assurance Software Laboratory (HASLab), INESC TEC and Universidade do Minho.

Supporting Change Impact Analysis Using a Recommendation System: An Industrial Case Study in a Safety-Critical Context (Abstract)

Markus Borg , SICS Swedish ICT AB, Ideon Science Park, Building Beta 2, Scheelevagen 17, SE-223 70 Lund, Sweden.

Preventing Defects: The Impact of Requirements Traceability Completeness on Software Quality (Abstract)

patrick rempel , Technische Universitat Ilmenau Software Engineering for Safety-Critical Systems Group.(email:patrick.rempel@tu-ilmenau.de)

Keyword Search for Building Service-Based Systems (Abstract)

Qiang He , State Key Laboratory of Software Engineering, Wuhan University, Wuhan 430072, China and the School of Software Engi-neering and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC 3122, Australia. (e-mail: qhe@swin.edu).

Automatic Contract Insertion with CCBot (Abstract)

Scott A. Carr , Department of Computer Science, Purdue University, West Lafayette, Indiana 47907 USA (e-mail: carr27@purdue.edu)

Locating Software Faults Based on Minimum Debugging Frontier Set (Abstract)

Feng Li , State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences. (email: lifeng2005@ ict.ac.cn)

Imprecise Matching of Requirements Specifications for Software Services using Fuzzy Logic (Abstract)

Marie Platenius , Software Engineering Heinz Nixdorf Institute Paderborn University, Germany.(email:m.platenius@upb.de)

Reporting Usability Defects: A Systematic Literature Review (Abstract)

Rajesh Vasa , Faculty of Science, Engineering and Built Environment, Deakin University, Australia. (email: rvasa@swin.edu.au)

Automated Extraction and Clustering of Requirements Glossary Terms (Abstract)

Mehrdad Sabetzadeh , SnT Centre for Security, Reliability, and Trust, University of Luxembourg, Luxembourg, L- 2721. (email: mehrdad.sabetzadeh@uni.lu)

Static analysis of model transformations (Abstract)

Jesus Sanchez Cuadrado , Department of Computer Science, Universidad Autonoma de Madrid, Spain.(Email: jesusc@um.es)

A Qualitative Study of Application-level Caching (Abstract)

Jhonny Mertz , Departamento de Inform´atica Aplicada, Instituto de Informatica, Universidade Federal do Rio Grande do Sul, Brazil.(email:jmamertz@inf.ufrgs.br)

Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-precision Testing (Abstract)

Enyi Tang , State Key Laboratory for Novel Software Technology and Software Institute of Nanjing University, Jiangsu, China.(email::eytang@nju.edu.cn)

Identifying Extract Method Refactoring Opportunities based on Functional Relevance (Abstract)

Apostolos Ampatzoglou , Institute of Mathematics and Computer Science, University of Groningen, Netherlands (e-mail: a.ampatzoglou@rug.nl).

Language Inclusion Checking of Timed Automata with Non-Zenoness (Abstract)

Ting Wang , College of Computer Science, Zhejiang University of Technology, P.R. China.(email:wangting@zjut.edu.cn)

Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt (Abstract)

Emad Shihab , Data-driven Analysis of Software (DAS) lab at the Department of Computer Science and Software Engineering, Concordia University, Montreal, Quebec, Canada. (e-mail: eshihab@encs.concordia.ca).

AutoSense: A Framework for Automated Sensitivity Analysis of Program Data (Abstract)

Rajarshi Ray , Department of Computer Science & Engineering, National Institute of Technology Meghalaya, Shillong, India.

Reasoning about Identifier Spaces: How to Make Chord Correct (Abstract)

Pamela Zave , AT&T Laboratories—Research Bedminster, New Jersey 07921, USA (e-mail: pamela@research.att.com).

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection (Abstract)

Dinghao Wu , College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802 (e-mail: dwu@ist.psu.edu).

On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study (Abstract)

Guido Salvaneschi , Software Technology Group, Department of Computer Science, Technische Universitat Darmstadt, Darmstadt, Germany.

Empirical Evaluation of the Impact of Object-Oriented Code Refactoring on Quality Attributes: A Systematic Literature Review (Abstract)

Jehad Al Dallal , Department of Information Science, Kuwait University. P.O. Box 5969, Safat 13060, Kuwait. (email: j.aldallal@ku.edu.kw).

Autofolding for Source Code Summarization (Abstract)

Jaroslav Fowkes , School of Informatics, University of Edinburgh, Edinburgh, EH8 9AB, UK (e-mail: jaroslav.fowkes@ed.ac.uk).

Semantic Slicing of Software Version Histories (Abstract)

Yi Li , Department of Computer Science, University of Toronto, Toronto, ON, Canada, M5S3G4.(email:liyi@cs.toronto.edu)

Test-Case Generation for Boolean Expressions by Cell Covering (Abstract)

Lian Yu , School of Software and Microelectronics in Peking University, Beijing, 102600, China.(email:lianyu@ss.pku.edu.cn)

Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems (Abstract)

Yun Yang , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia (e-mail: yyang@swin.edu.au)

Detecting Trivial Mutant Equivalences via Compiler Optimisations (PDF)

Marinos Kintis , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg. (e-mail: marinos.kintis@uni.lu)

Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles (PDF)

Xuanzhe Liu , Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing, China, 100871 (e-mail: liuxuanzhe@pku.edu.cn).

Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection (Abstract)

Zhenzhou Tian , Z. Tian is with the Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China, and with the School of Computer Science and Technology, Xi’an University of Posts and Telecommunications, Xi’an 710121, China.(email:tianzhenzhou@xupt.edu.cn)

EnergyPatch: Repairing Resource Leaks to Improve Energy-efficiency of Android Apps (Abstract)

Abhijeet Banerjee , School of Computing, National University of Singapore, Singapore (e-mail: abhijeet@comp.nus.edu.sg)

Detecting overly strong preconditions in refactoring engines (Abstract)

Melina Mongiovi , Department of Computing and Systems, Federal University of Campina Grande, Campina Grande, PB, 58429-900 Brazil.(email:melina@computacao.ufcg.edu.br)

Predicting Delivery Capability in Iterative Software Development (Abstract)

Morakot Choetkiertikul , School of Computing and Information Technology, Faculty of Engineering and Information Sciences, University of Wollongong, NSW, Australia, 2522.(email:mc650@uow.edu.au)

Are Fix-Inducing Changes a Moving Target? A Longitudinal Case Study of Just-In-Time Defect Prediction (Abstract)

Shane McIntosh , Department of Electrical and Computer Engineer- ing, McGill University, Canada. (e-mail: shane.mcintosh@mcgill.ca).

Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction (Abstract)

Haipeng Cai , School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, 99163, USA.(email:hcai@eecs.wsu.edu)

A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems (Abstract)

Andrea Domenici , Department of Information Engineering, University of Pisa, Italy. (E-mail: Andrea.Domenici@iet.unipi.it).

A Templating System to Generate Provenance (PDF)

Luc Moreau , Department of Electronics and Computer Science, University of Southampton, SO17 1BJ, Southampton, UK. (e-mail: l.moreau@ecs.soton.ac.uk).

Towards Model Checking Android Applications (Abstract)

Guangdong Bai , Singapore Institute of Technology, Singapore (e-mail: baiguangdong@gmail.com)
193 ms
(Ver 3.3 (11022016))