


default search action
27th APSEC 2020: Virtual Event, Singapore
- 27th Asia-Pacific Software Engineering Conference, APSEC 2020, Singapore, December 1-4, 2020. IEEE 2020, ISBN 978-1-7281-9553-7

- Yingying Shi, Shengping Xiao, Jianwen Li, Jian Guo, Geguang Pu:

SAT-Based Automata Construction for LTL over Finite Traces. 1-10 - Mingyue Jiao, Yanhong Huang, Jianqi Shi, Fangda Cai, Rongfeng Lin:

Fault Diagnosis of Simplified Fault Trees using State Transition Diagrams. 11-20 - Duong Dinh Tran

, Dang Duy Bui, Parth Gupta, Kazuhiro Ogata:
Lemma Weakening for State Machine Invariant Proofs. 21-30 - Kazi Zakia Sultana, Zadia Codabux, Byron J. Williams:

Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities. 31-40 - Yanxin Zhang, Guanping Xiao

, Zheng Zheng, Tianqing Zhu, Ivor W. Tsang
, Yulei Sui:
An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps. 41-50 - Sandip Ghosal

, R. K. Shyamasundar:
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs. 51-60 - Wei Yuan

, Binhang Qi, Hailong Sun, Xudong Liu:
DependLoc: A Dependency-based Framework For Bug Localization. 61-70 - Bo Lin, Shangwen Wang

, Ming Wen, Zhang Zhang
, Hongjun Wu, Yihao Qin, Xiaoguang Mao
:
Understanding the Non-Repairability Factors of Automated Program Repair Techniques. 71-80 - Tianhang Zhang, Qingfeng Du, Jincheng Xu, Jiechu Li, Xiaojun Li

:
Software Defect Prediction and Localization with Attention-Based Models and Ensemble Learning. 81-90 - Irman Faqrizal

, Gwen Salaün:
Clusters of Faulty States for Debugging Behavioural Models. 91-99 - Xinjun Mao, Hao Huang, Shuo Wang:

Software Engineering for Autonomous Robot: Challenges, Progresses and Opportunities. 100-108 - Rui Li, Hao Shi, Wanwei Liu, Wei Dong:

Synthesizing Cooperative Controllers from Global Tasks of Multi-robot Systems. 109-118 - Muhammad Waseem

, Peng Liang
, Gastón Márquez, Amleto Di Salle
:
Testing Microservices Architecture-Based Applications: A Systematic Mapping Study. 119-128 - Ashalatha Kunnappilly, Peter Backeman, Cristina Seceleanu

:
UML-based Modeling and Analysis of 5G Service Orchestration. 129-138 - Ismaïl Mendil, Neeraj Kumar Singh, Yamine Aït Ameur, Dominique Méry, Philippe A. Palanque:

An Integrated Framework for the Formal Analysis of Critical Interactive Systems. 139-148 - Yuwei Ma, Qianying Zhang, Shijun Zhao, Guohui Wang, Ximeng Li, Zhiping Shi:

Formal Verification of Memory Isolation for the TrustZone-based TEE. 149-158 - Wenbo Zhou

, Philippe Dague, Lei Liu, Lina Ye, Fatiha Zaïdi:
A Coloured Petri Nets Based Attack Tolerance Framework. 159-168 - Tengfei Li

, Jing Liu, Jiexiang Kang, Haiying Sun, Xiaohong Chen, Li Han:
Model Checking of Spatial Logic. 169-177 - Nan Messe, Nicolas Belloir

, Vanea Chiprianov, Jamal El Hachem, Régis Fleurquin, Salah Sadou:
An Asset-Based Assistance for Secure by Design. 178-187 - Duoyuan Ma, Yude Bai, Zhenchang Xing, Lintan Sun, Xiaohong Li:

A Knowledge Graph-based Sensitive Feature Selection for Android Malware Classification. 188-197 - Ningning Chen, Huibiao Zhu, Yuan Fei, Lili Xiao, Jiaqi Yin:

Modeling and Verifying Data Access Mechanism of NLSR Trust Model. 198-207 - Bakheet Aljedaani, Aakash Ahmad

, Mansooreh Zahedi
, Muhammad Ali Babar:
An Empirical Study on Developing Secure Mobile Health Apps: The Developers' Perspective. 208-217 - Jaydeb Sarker

, Asif Kamal Turzo
, Amiangshu Bosu:
A Benchmark Study of the Contemporary Toxicity Detectors on Software Engineering Interactions. 218-227 - Jacob Stringer, Amjed Tahir, Kelly Blincoe, Jens Dietrich

:
Technical Lag of Dependencies in Major Package Managers. 228-237 - Chenhui Feng, Tao Wang, Yue Yu, Yang Zhang, Yanzhi Zhang, Huaimin Wang:

Sia-RAE: A Siamese Network based on Recursive AutoEncoder for Effective Clone Detection. 238-246 - Yiwen Wu, Yang Zhang, Tao Wang, Huaimin Wang:

Dockerfile Changes in Practice: A Large-Scale Empirical Study of 4, 110 Projects on GitHub. 247-256 - Chaojin Wang, Jian Shen:

Floating Point Accuracy Testing in Deep Neural Network Computations via Hypothesis Testing. 257-265 - Lingjun Zhou, Bing Yu, David Berend, Xiaofei Xie

, Xiaohong Li, Jianjun Zhao, Xusheng Liu:
An Empirical Study on Robustness of DNNs with Out-of-Distribution Awareness. 266-275 - Lei Shen, Wangshu Liu, Xiang Chen, Qing Gu, Xuejun Liu:

Improving Machine Learning-Based Code Smell Detection via Hyper-Parameter Optimization. 276-285 - Hongzhen Zhong, Hai Wan, Weilin Luo, Zhanhao Xiao, Jia Li, Biqing Fang:

Structural Similarity of Boundary Conditions and an Efficient Local Search Algorithm for Goal Conflict Identification. 286-295 - Noriko Hanakawa:

An education model for project-based learning using ability map in various target products. 296-305 - Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara

, Hajimu Iida:
Understanding Build Errors in Agile Software Development Project-Based Learning. 306-315 - Antonio Martini, Terese Besker

, Jan Bosch:
Process Debt: a First Exploration. 316-325 - Sangwon Hyun, Jiyoung Song, Seungchyul Shin, Young Min Baek, Doo-Hwan Bae:

Pattern-based Analysis of Interaction Failures in Systems-of-Systems: a Case Study on Platooning. 326-335 - Young Min Baek, Zelalem Mihret, Yong-Jun Shin, Doo-Hwan Bae:

A Modeling Method for Model-based Analysis and Design of a System-of-Systems. 336-345 - Aiswarya Raj Munappy, Jan Bosch, Helena Holmström Olsson, Tian J. Wang:

Towards Automated Detection of Data Pipeline Faults. 346-355 - Canh Minh Do

, Kazuhiro Ogata:
A divide & conquer approach to testing concurrent programs with JPF*. 356-364 - Lwin Khin Shar

, Ta Nguyen Binh Duong, Lingxiao Jiang
, David Lo
, Wei Minn
, Glenn Kiah Yong Yeo, Eugene Kim:
SmartFuzz: An Automated Smart Fuzzing Approach for Testing SmartThings Apps. 365-374 - Aleksandr Pilgun

:
Don't Trust Me, Test Me: 100% Code Coverage for a 3rd-party Android App. 375-384 - Hongyi Zhang, Jan Bosch, Helena Holmström Olsson:

Federated Learning Systems: Architecture Alternatives. 385-394 - Meenu Mary John, Helena Holmström Olsson, Jan Bosch:

AI Deployment Architecture: Multi-Case Study for Key Factor Identification. 395-404 - Hugo Sica de Andrade, Christian Berger, Ivica Crnkovic

, Jan Bosch:
Principles for Re-architecting Software for Heterogeneous Platforms. 405-414 - Qian Liu, Robert de Simone, Xiaohong Chen, Jiexiang Kang, Jing Liu, Wei Yin, Hui Wang:

Multiform Logical Time & Space for Mobile Cyber-Physical System With Automated Driving Assistance System. 415-424 - Zhang Zhang

, Xinjun Mao, Yao Lu, Shangwen Wang
, Jinyu Lu:
An Empirical Study on the Influence of Social Interactions for the Acceptance of Answers in Stack Overflow. 425-434 - Iris Figalist, Marco Dieffenbacher, Isabella Eigner, Jan Bosch, Helena Holmström Olsson, Christoph Elsner:

Mining Customer Satisfaction on B2B Online Platforms using Service Quality and Web Usage Metrics. 435-444 - Yoshiki Higo, Shinsuke Matsumoto, Taeyoung Kim, Shinji Kusumoto:

How Weak Reference is Used in Java Projects? 445-449 - Rui Song, Tong Li, Zhiming Ding:

Automatically Identifying Requirements-Oriented Reviews Using a Top-Down Feature Extraction Approach. 450-454 - Tasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto:

CLIONE: Clone Modification Support for Pull Request Based Development. 455-459 - Miaoying Wang, Weixing Ji, Dejiang Jing, Hui Liu:

Identification of Misleading Location Information in Compiler Diagnoses. 460-464 - Sajid Anwer, Lian Wen, Zhe Wang:

A Formal Model for Behavior Trees Based on Context - Free Grammar. 465-469 - Chen Zhi, Jianwei Yin, Junxiao Han, Shuiguang Deng

:
A Preliminary Study on Sensitive Information Exposure Through Logging. 470-474 - Masanao Asato, Hirohisa Aman

, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Mahalanobis Distance-Based Integration of Suspicious Scores For Bug Localization. 475-479 - Puneet Bhateja:

Asynchronous test equivalence for probabilistic processes. 480-484 - Satish Siddharth, Sircar Saurav, Kan Jiang

, Bimlesh Wadhwa, Jin Song Dong:
Model Driven Inputs to aid Athlete's Decision Making. 485-489 - Xinhao Zheng, Lin Li, Dong Zhou:

An Attentive Deep Supervision based Semantic Matching Framework For Tag Recommendation in Software Information Sites. 490-494 - Yuekang Li

, Hongxu Chen, Cen Zhang, Siyang Xiong, Chaoyi Liu, Yi Wang
:
Ori: A Greybox Fuzzer for SOME/IP Protocols in Automotive Ethernet. 495-499 - Kun Ma, Kun Liu, Lixin Du:

Automated Assessment and Evaluation of Contribution of Collaborative Software Engineering Development Process. 500-504 - Chetna Gupta, Varun Gupta:

Requirements Risk Estimation Using TOPSIS Method. 505-506 - Ryo Soga

, Tetsuya Yonemitsu, Mitsuo Inagaki, Yasushi Fujisaki, Hiroo Sugou, Hideyuki Kanuka:
A Program Simplification Method for Generating Test Input Values Using Symbolic Execution. 507-508 - Zhuoyao Wang, Changguo Guo, Jiaqi Gao, Shazhou Yang:

Towards tracking the development process of the server ecosystems using open-source data. 509-510 - Youngkyoung Kim

, Misoo Kim
, Eunseok Lee
:
Feature Combination to Alleviate Hubness Problem of Source Code Representation for Bug Localization. 511-512 - Meng Zhang, Pengcheng Zhang, Xiapu Luo, Feng Xiao:

Source Code Obfuscation for Smart Contracts. 513-514 - Md. Masudur Rahman

, Abdus Satter:
A Context Based Approach for Recommending Move Class Refactoring. 515-516

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














