The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
ISSN: 0098-5589

Reporting Usability Defects: A Systematic Literature Review (Abstract)

Rajesh Vasa , Faculty of Science, Engineering and Built Environment, Deakin University, Australia. (email: rvasa@swin.edu.au)

Automated Extraction and Clustering of Requirements Glossary Terms (Abstract)

Mehrdad Sabetzadeh , SnT Centre for Security, Reliability, and Trust, University of Luxembourg, Luxembourg, L- 2721. (email: mehrdad.sabetzadeh@uni.lu)

Static analysis of model transformations (Abstract)

Jesus Sanchez Cuadrado , Department of Computer Science, Universidad Autonoma de Madrid, Spain.(Email: jesusc@um.es)

A Qualitative Study of Application-level Caching (Abstract)

Jhonny Mertz , Departamento de Inform´atica Aplicada, Instituto de Informatica, Universidade Federal do Rio Grande do Sul, Brazil.(email:jmamertz@inf.ufrgs.br)

Software Numerical Instability Detection and Diagnosis by Combining Stochastic and Infinite-precision Testing (Abstract)

Enyi Tang , State Key Laboratory for Novel Software Technology and Software Institute of Nanjing University, Jiangsu, China.(email::eytang@nju.edu.cn)

Identifying Extract Method Refactoring Opportunities based on Functional Relevance (Abstract)

Apostolos Ampatzoglou , Institute of Mathematics and Computer Science, University of Groningen, Netherlands (e-mail: a.ampatzoglou@rug.nl).

Language Inclusion Checking of Timed Automata with Non-Zenoness (Abstract)

Ting Wang , College of Computer Science, Zhejiang University of Technology, P.R. China.(email:wangting@zjut.edu.cn)

Using Natural Language Processing to Automatically Detect Self-Admitted Technical Debt (Abstract)

Emad Shihab , Data-driven Analysis of Software (DAS) lab at the Department of Computer Science and Software Engineering, Concordia University, Montreal, Quebec, Canada. (e-mail: eshihab@encs.concordia.ca).

AutoSense: A Framework for Automated Sensitivity Analysis of Program Data (Abstract)

Rajarshi Ray , Department of Computer Science & Engineering, National Institute of Technology Meghalaya, Shillong, India.

Reasoning about Identifier Spaces: How to Make Chord Correct (Abstract)

Pamela Zave , AT&T Laboratories—Research Bedminster, New Jersey 07921, USA (e-mail: pamela@research.att.com).

Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection (Abstract)

Dinghao Wu , College of Information Sciences and Technology, Pennsylvania State University, University Park, PA 16802 (e-mail: dwu@ist.psu.edu).

On the Positive Effect of Reactive Programming on Software Comprehension: An Empirical Study (Abstract)

Guido Salvaneschi , Software Technology Group, Department of Computer Science, Technische Universitat Darmstadt, Darmstadt, Germany.

Empirical Evaluation of the Impact of Object-Oriented Code Refactoring on Quality Attributes: A Systematic Literature Review (Abstract)

Jehad Al Dallal , Department of Information Science, Kuwait University. P.O. Box 5969, Safat 13060, Kuwait. (email: j.aldallal@ku.edu.kw).

Autofolding for Source Code Summarization (Abstract)

Jaroslav Fowkes , School of Informatics, University of Edinburgh, Edinburgh, EH8 9AB, UK (e-mail: jaroslav.fowkes@ed.ac.uk).

Semantic Slicing of Software Version Histories (Abstract)

Yi Li , Department of Computer Science, University of Toronto, Toronto, ON, Canada, M5S3G4.(email:liyi@cs.toronto.edu)

Test-Case Generation for Boolean Expressions by Cell Covering (Abstract)

Lian Yu , School of Software and Microelectronics in Peking University, Beijing, 102600, China.(email:lianyu@ss.pku.edu.cn)

Formulating Criticality-Based Cost-Effective Fault Tolerance Strategies for Multi-Tenant Service-Based Systems (Abstract)

Yun Yang , School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, Australia (e-mail: yyang@swin.edu.au)

Detecting Trivial Mutant Equivalences via Compiler Optimisations (PDF)

Marinos Kintis , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg. (e-mail: marinos.kintis@uni.lu)

Understanding Diverse Usage Patterns from Large-Scale Appstore-Service Profiles (PDF)

Xuanzhe Liu , Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, Beijing, China, 100871 (e-mail: liuxuanzhe@pku.edu.cn).

Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection (Abstract)

Zhenzhou Tian , Z. Tian is with the Ministry of Education Key Lab For Intelligent Networks and Network Security (MOEKLINNS), Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China, and with the School of Computer Science and Technology, Xi’an University of Posts and Telecommunications, Xi’an 710121, China.(email:tianzhenzhou@xupt.edu.cn)

EnergyPatch: Repairing Resource Leaks to Improve Energy-efficiency of Android Apps (Abstract)

Abhijeet Banerjee , School of Computing, National University of Singapore, Singapore (e-mail: abhijeet@comp.nus.edu.sg)

Detecting overly strong preconditions in refactoring engines (Abstract)

Melina Mongiovi , Department of Computing and Systems, Federal University of Campina Grande, Campina Grande, PB, 58429-900 Brazil.(email:melina@computacao.ufcg.edu.br)

Predicting Delivery Capability in Iterative Software Development (Abstract)

Morakot Choetkiertikul , School of Computing and Information Technology, Faculty of Engineering and Information Sciences, University of Wollongong, NSW, Australia, 2522.(email:mc650@uow.edu.au)

Are Fix-Inducing Changes a Moving Target? A Longitudinal Case Study of Just-In-Time Defect Prediction (Abstract)

Shane McIntosh , Department of Electrical and Computer Engineer- ing, McGill University, Canada. (e-mail: shane.mcintosh@mcgill.ca).

Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction (Abstract)

Haipeng Cai , School of Electrical Engineering and Computer Science, Washington State University, Pullman, WA, 99163, USA.(email:hcai@eecs.wsu.edu)

A PVS-Simulink Integrated Environment for Model-Based Analysis of Cyber-Physical Systems (Abstract)

Andrea Domenici , Department of Information Engineering, University of Pisa, Italy. (E-mail: Andrea.Domenici@iet.unipi.it).

A Templating System to Generate Provenance (PDF)

Luc Moreau , Department of Electronics and Computer Science, University of Southampton, SO17 1BJ, Southampton, UK. (e-mail: l.moreau@ecs.soton.ac.uk).

Towards Model Checking Android Applications (Abstract)

Guangdong Bai , Singapore Institute of Technology, Singapore (e-mail: baiguangdong@gmail.com)

Control-Theoretical Software Adaptation: A Systematic Literature Review (Abstract)

Stepan Shevtsov , Linnaeus University Sweden, Växjö, Sweden (e-mail: stepan.shevtsov@lnu.se)

A Survey of Recent Trends in Testing Concurrent Software Systems (Abstract)

Alessandro Margara , Faculty of Informatics, Univerista della Svizzera italiana, USI Lugano.
Mauro Pezze , Faculty of Informatics, Univerista della Svizzera italiana, USI Lugano.

A Formal Specification and Verification Framework for Timed Security Protocols (Abstract)

Li Li , ISTD, Singapore University of Technology and Design, Singapore.(email:li lig@sutd.edu.sg)

Implementing and Evaluating Candidate-Based Invariant Generation (Abstract)

Adam Betts , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: a.betts@imperial.ac.uk)
Nathan Chong , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: nyc03@imperial.ac.uk)
Alastair Donaldson , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland SW7 2AZ (e-mail: alastair.donaldson@imperial.ac.uk)
Pantazis Deligiannis , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: pdegliannis13@imperial.ac.uk)
Jeroen Ketema , Department of Computing, Imperial College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: j.ketema@imperial.ac.uk)

Heterogeneous Defect Prediction (Abstract)

Jaechang Nam , Department of Electrical and Computer Engineering, University of Waterloo, 8430 Waterloo, Ontario Canada (e-mail: jc.nam@uwaterloo.ca)
Wei Fu , Department of Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: wfu@ncsu.edu)
Sunghun Kim , Department of Computer Science, Hong Kong University of Science and, Hong Kong, n/a Hong Kong N/A (e-mail: hunkim@cse.ust.hk)
Tim Menzies , Department of Computer Science, North Carolina State University, 6798 Raleigh, North Carolina United States (e-mail: tim@menzies.us)
Lin Tan , Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Canada N2L 3G1 (e-mail: lintan@uwaterloo.ca)

Specialising Software for Different Downstream Applications Using Genetic Improvement and Code Transplantation (PDF)

Justyna Petke , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland WC1E 6BT (e-mail: j.petke@ucl.ac.uk)
Mark Harman , CS, UCL, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: mark.harman@ucl.ac.uk)
William B. Langdon , Computer Science, University College London, London, London United Kingdom of Great Britain and Northern Ireland (e-mail: W.Langdon@cs.ucl.ac.uk)
Westley Weimer , Computer Science, University of Virginia, Charlottesville, Virginia United States 22903 (e-mail: weimer@cs.virginia.edu)

A Comparative Study to Benchmark Cross-project Defect Prediction Approaches (Abstract)

Steffen Herbold , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany 37077 (e-mail: herbold@cs.uni-goettingen.de)
Alexander Trautsch , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany (e-mail: alexander.trautsch@stud.uni-goettingen.de)
Jens Grabowski , Institute for Computer Science, Georg-August-Universitat Gottingen, Gottingen, Lower Saxony Germany (e-mail: grabowski@cs.uni-goettingen.de)

Blindness and Program Comprehension (Abstract)

Ameer Armaly , Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana United States 46656 (e-mail: aarmaly@nd.edu)
Paige Rodeghero , Department of Computer Science and Engineering, University of Notre Dame, South Bend, Indiana United States 46628 (e-mail: prodeghe@nd.edu)
Collin McMillan , Computer Science, University of Notre Dame, South Bend, Virginia United States 46545 (e-mail: cmc@nd.edu)

Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy (Abstract)

Le Yu , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: yulele08@gmail.com)
Xiapu Luo , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: csxluo@comp.polyu.edu.hk)
Chenxiong Qian , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: chenxiongqian@gmail.com)
Shuai Wang , Department of Computing, Hong Kong Polytechnic University, 26680 Kowloon, Hong Kong Hong Kong (e-mail: waishuai@hotmail.com)
Hareton K.N. Leung , Department of Computing, The Hong Kong Polytechnic University, Hong Kong, Hong Kong Hong Kong (e-mail: hareton.leung@polyu.edu.hk)

Authors' Reply to “Comments on 'Researcher Bias: The Use of Machine Learning in Software Defect Prediction' ” (Abstract)

Martin Shepperd , IS & Computing, Brunel University, Uxbridge, Middx United Kingdom of Great Britain and Northern Ireland UB8 3PH (e-mail: martin.shepperd@brunel.ac.uk)
Tracy Hall , Information systems and computing, Brunel University, Middlesex, Middlesex United Kingdom of Great Britain and Northern Ireland AL10 9AB (e-mail: tracy.hall@brunel.ac.uk)
David Bowes , Computer Science, University of Hertfordshire, Hatfield, Hertfordshire United Kingdom of Great Britain and Northern Ireland AL10 9AB (e-mail: d.h.bowes@herts.ac.uk)

Two-phase Assessment Approach to Improve the Efficiency of Refactoring Identification (Abstract)

Ah-Rim Han , Computer Science and Engineering, Korea University, Seoul, Seongbuk Korea (the Republic of) (e-mail: arhan@se.kaist.ac.kr)
Sungdeok Cha , Computer Science and Engineering, Korea University, Seoul, Seongbuk Korea (the Republic of) (e-mail: scha@korea.ac.kr)

MAHAKIL:Diversity based Oversampling Approach to Alleviate the Class Imbalance Issue in Software Defect Prediction (Abstract)

Kwabena Ebo Bennin , Computer Science, City University of Hong Kong, 53025 Kowloon Tong, Kowloon Hong Kong (e-mail: ebotuk38@gmail.com)
Jacky Keung , Department of Computer Science, City University of Hong Kong, Kowloon, Kowloon Tong Hong Kong KLN (e-mail: Jacky.Keung@cityu.edu.hk)
Passakorn Phannachitta , College of Arts, Media and Technology, Chiang Mai University, 26682 Chiang Mai, Chiang Mai University Thailand (e-mail: passakorn.p@cmu.ac.th)
Akito Monden , Graduate School of Natural Science and Technology, Okayama University, Okayama, Okayama Japan (e-mail: monden@okayama-u.ac.jp)
Solomon Mensah , Computer Science, City University of Hong Kong, Kowloon Tong, Kowloon Hong Kong (e-mail: smensah2-c@my.cityu.edu.hk)

A Theoretical and Empirical Study of Diversity-aware Mutation Adequacy Criterion (Abstract)

Donghwan Shin , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: donghwan@se.kaist.ac.kr)
Shin Yoo , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: shin.yoo@kaist.ac.kr)
Doo-Hwan Bae , School of Computing, Korea Advanced Institute of Science and Technology, 34968 Daejeon, Daejeon Korea (the Republic of) (e-mail: bae@se.kaist.ac.kr)

Measuring Program Comprehension: A Large-Scale Field Study with Professionals (Abstract)

Xin Xia , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China 310000 (e-mail: xxkidd@zju.edu.cn)
Lingfeng Bao , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: lingfengbao@zju.edu.cn)
David Lo , School of Information Systems, Singapore Management University, Singapore, Singapore Singapore 17890 (e-mail: davidlo@smu.edu.sg)
Zhenchang Xing , Research School of Computer Science, Australian National University, Canberra, Victoria Australia (e-mail: zhenchang.xing@anu.edu.au)
Ahmed E. Hassan , School of Computing, Queen's University, Kingston, Ontario Canada K7L 3N6 (e-mail: ahmed@cs.queensu.ca)
Shanping Li , College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang China (e-mail: shan@zju.edu.cn)

Coordination Challenges in Large-Scale Software Development: A Case Study of Planning Misalignment in Hybrid Settings (Abstract)

Saskia Bick , Cloud Platform Services, SAP SE, Walldorf 69190, Germany (e-mail: saskia.bick@sap.com)
Kai Spohrer , Department of General Management and Information Systems, University of Mannheim, Mannheim 68161, Germany (e-mail: spohrer@uni-mannheim.de)
Rashina Hoda , Department of Electrical and Computer Engineering, The University of Auckland, Auckland, New Zealand (e-mail: r.hoda@auckland.ac.nz)
Alexander Scheerer , Globalization Services, SAP SE, Walldorf 69190, Germany (e-mail: alexander.scheerer@sap.com)
Armin Heinzl , Department of General Management and Information Systems, University of Mannheim, Mannheim 68161, Germany (e-mail: heinzl@uni-mannheim.de)

Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases (Abstract)

Radu Calinescu , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: radu.calinescu@york.ac.uk)
Danny Weyns , Computer Science, Linnaeus University, Vaxjo, Smaland Sweden SE-35195 (e-mail: Danny.Weyns@gmail.com)
Simos Gerasimou , Computer Science, University of York, 8748 York, North Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5DD (e-mail: simos.gerasimou@york.ac.uk)
Muhammad Usman Iftikhar , Department of Computer Science, Linneuniversitet - Vaxjo, 8180 Vaxjo, Kronoberg Sweden 351 95 (e-mail: usman.iftikhar@lnu.se)
Ibrahim Habli , Computer Science, University of York, York, Yorkshire United Kingdom of Great Britain and Northern Ireland YO10 5GH (e-mail: Ibrahim.Habli@york.ac.uk)
Tim Kelly , Computer Science, University of York, York, North Yorkshire United Kingdom of Great Britain and Northern Ireland (e-mail: tim.kelly@york.ac.uk)
Papers

Vulnerability Discovery with Attack Injection (Abstract)

Miguel Correia , University of Lisboa, Portugal
Paulo Verissimo , University of Lisboa, Portugal
Nuno Neves , University of Lisboa, Portugal
João Antunes , University of Lisboa, Portugal
Rui Neves , Universidade Técnica de Lisboa, Portugal

How Effectively does Metamorphic Testing Alleviate the Oracle Problem? (Abstract)

Huai Liu , RMIT University, Melbourne
Fei-Ching Kuo , Swinburne University of Technology, Melbourne
Dave Towey , The University of Nottingham Ningbo China, Ningbo
Tsong Yueh Chen , Swinburne University of Technology, Melbourne

Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation (PDF)

Lech Madeyski , Wroclaw University of Technology, Wroclaw
Wojciech Orzeszyna , Wroclaw University of Technology, Wroclaw and Blekinge Institute of Technology, Karlskrona
Richard Torkar , Blekinge Institute of Technology, Karlskrona and Chalmers University of Technology | University of Gothenburg, Göteborg
Mariusz Józala , Wroclaw University of Technology, Wroclaw

Variability Mining: Consistent Semiautomatic Detection of Product-Line Features (Abstract)

Christian Kästner , Carnegie Mellon University, Pittsburgh
Alexander Dreiling , University of Magdeburg and Deutsche Bank, Frankfurt
Klaus Ostermann , Philipps University Marburg, Marburg

Formulating Cost-Effective Monitoring Strategies for Service-based Systems (Abstract)

Qiang He , Swinburne University of Technology, Melbourne
Jun Han , Swinburne University of Technology, Melbourne
Yun Yang , Swinburne University of Technology, Melbourne
Hai Jin , Huazhong University of Science and Technology, Wuhan
Jean-Guy Schneider , Swinburne University of Technology, Melbourne
Steve Versteeg , CA Labs, Melbourne

Modular Software Model Checking for Distributed Systems (Abstract)

Watcharin Leungwattanakit , Chiba University, Chiba
Cyrille Artho , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba
Masami Hagiya , University of Tokyo, Tokyo
Yoshinori Tanabe , National Institute of Informatics (NII), Tokyo
Mitsuharu Yamamoto , Chiba University, Chiba
Koichi Takahashi , National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba

GossipKit: A Unified Component Framework for Gossip (Abstract)

François Taïani , University of Rennes 1 / IRISA, Rennes
Shen Lin , SAP Labs, Shanghai
Gordon S. Blair , University of Lancaster, Lancaster

Improved Evolutionary Algorithm Design for the Project Scheduling Problem Based on Runtime Analysis (PDF)

Leandro L. Minku , The University of Birmingham, Birmingham
Dirk Sudholt , The University of Sheffield, Sheffield
Xin Yao , The University of Birmingham, Birmingham

Reducing Masking Effects in Combinatorial Interaction Testing: A Feedback Driven Adaptive Approach (Abstract)

Cemal Yilmaz , Sabanci University, Istanbul
Emine Dumlu , Sabanci University, Istanbul
Myra B. Cohen , University of Nebraska-Lincoln, Lincoln
Adam A. Porter , University of Maryland, College Park

Specification and Verification of Normative Texts using C-O Diagrams (Abstract)

Gregorio Diaz , University of Castilla-La Mancha, Albacete
María Emilia Cambronero , University of Castilla-La Mancha, Albacete
Enrique Martínez , University of Castilla-La Mancha, Albacete
Gerardo Schneider , Chalmers | University of Gothenburg, Gothenburg

iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees (Abstract)

Charles Song , Fraunhofer USA Center for Experimental Software Engineering, College Park,
Adam A. Porter , University of Maryland, College Park
Jeffrey S. Foster , University of Maryland, College Park

You Are the Only Possible Oracle: Effective Test Selection for End Users of Interactive Machine Learning Systems (Abstract)

Alex Groce , Oregon State University, Corvallis
Todd Kulesza , Oregon State University, Corvallis
Chaoqiang Zhang , Oregon State University, Corvallis
Shalini Shamasunder , Oregon State University, Corvallis
Margaret Burnett , Oregon State University, Corvallis
Weng-Keen Wong , Oregon State University, Corvallis
Simone Stumpf , City University London, London
Shubhomoy Das , Oregon State University, Corvallis
Amber Shinsel , Oregon State University, Corvallis
Forrest Bice , Oregon State University, Corvallis
Kevin McIntosh , Oregon State University, Corvallis

Variability in Software Systems - A Systematic Literature Review (Abstract)

Matthias Galster , University of Canterbury, Christchurch
Danny Weyns , Linnaeus University, Växjö
Dan Tofan , University of Groningen, Groningen
Bartosz Michalik , Katholieke Universiteit Leuven, Leuven
Paris Avgeriou , University of Groningen, Groningen

Learning Assumptions for Compositional Verification of Timed Systems (Abstract)

Shang-Wei Lin , National University of Singapore, Singapore
Étienne André , Université Paris, LIPN, CNRS, Paris
Yang Liu , Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore

Methodbook: Recommending Move Method Refactorings via Relational Topic Models (Abstract)

Gabriele Bavota , University of Sannio, Benevento
Rocco Oliveto , University of Molise, Pesche
Malcom Gethers , University of Maryland, Baltimore County, Baltimore
Denys Poshyvanyk , The College of William and Mary, Williamsburg
Andrea De Lucia , University of Salerno, Fisciano

Multi-Objective Quality-Driven Service Selection--A Fully Polynomial Time Approximation Scheme (Abstract)

Immanuel Trummer , École Polytechnique Fédérale de Lausanne, Lausanne
Boi Faltings , École Polytechnique Fédérale de Lausanne, Lausanne, Lausanne
Walter Binder , University of Lugano, Lugano

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs (Abstract)

Yan Cai , Y. Cai is with the Department of Computer Science, University of Hong Kong, Hong Kong (e-mail: yancai2-c@my.cityu.edu.hk).
87 ms
(Ver 3.3 (11022016))