


default search action
33rd ASE 2018: Montpellier, France
- Marianne Huchard

, Christian Kästner, Gordon Fraser:
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, ASE 2018, Montpellier, France, September 3-7, 2018. ACM 2018
Keynotes
- Roberto Di Cosmo:

Software heritage: collecting, preserving, and sharing all our source code (keynote). 1-2 - Jane Cleland-Huang:

Automated requirements engineering challenges with examples from small unmanned aerial systems (keynote). 3 - Lauren Herckis

:
Implementation science for software engineering: bridging the gap between research and practice (keynote). 4 - Gail C. Murphy:

The need for context in software engineering (IEEE CS Harlan Mills award keynote). 5
Performance
- Sarra Habchi

, Xavier Blanc, Romain Rouvoy:
On adopting linters to deal with performance concerns in Android apps. 6-16 - Xue Han, Tingting Yu, David Lo

:
PerfLearner: learning from bug reports to understand and generate performance test frames. 17-28 - Liang Bao, Xin Liu, Ziheng Xu, Baoyin Fang:

AutoConfig: automatic configuration tuning for distributed message systems. 29-40 - Andrew Habib

, Michael Pradel:
Is this class thread-safe? inferring documentation using graph-based learning. 41-52
Testing Studies
- Michael Hilton, Jonathan Bell, Darko Marinov:

A large-scale study of test coverage evolution. 53-63 - Valerio Terragni

, Mauro Pezzè
:
Effectiveness and challenges in generating concurrent tests for thread-safe classes. 64-75
Build and Test Automation
- Gabriël Konat

, Sebastian Erdweg, Eelco Visser:
Scalable incremental building with dynamic task dependencies. 76-86 - Keheliya Gallaba

, Christian Macho, Martin Pinzger, Shane McIntosh:
Noise and heterogeneity in historical build data: an empirical study of Travis CI. 87-97
Quality Assurance for Machine Learning Techniques
- Sakshi Udeshi

, Pryanshu Arora, Sudipta Chattopadhyay:
Automated directed fairness testing. 98-108 - Youcheng Sun

, Min Wu, Wenjie Ruan
, Xiaowei Huang, Marta Kwiatkowska, Daniel Kroening
:
Concolic testing for deep neural networks. 109-119 - Lei Ma, Felix Juefei-Xu, Fuyuan Zhang, Jiyuan Sun, Minhui Xue

, Bo Li, Chunyang Chen
, Ting Su, Li Li, Yang Liu
, Jianjun Zhao, Yadong Wang:
DeepGauge: multi-granularity testing criteria for deep learning systems. 120-131 - Mengshi Zhang, Yuqun Zhang, Lingming Zhang, Cong Liu, Sarfraz Khurshid:

DeepRoad: GAN-based metamorphic testing and input validation framework for autonomous driving systems. 132-142
Variability
- Raja Ben Abdessalem, Annibale Panichella, Shiva Nejati

, Lionel C. Briand, Thomas Stifter:
Testing autonomous cars for feature interaction failures using many-objective search. 143-154 - Mukelabai Mukelabai, Damir Nesic, Salome Maro, Thorsten Berger, Jan-Philipp Steghöfer:

Tackling combinatorial explosion: a study of industrial needs and practices for analyzing highly configurable systems. 155-166 - Dongjie He

, Lian Li, Lei Wang, Hengjie Zheng, Guangwei Li, Jingling Xue
:
Understanding and detecting evolution-induced compatibility issues in Android apps. 167-177
Mining and Crowd Sourcing
- Pinjia He, Zhuangbin Chen, Shilin He, Michael R. Lyu:

Characterizing the natural language descriptions in software logging statements. 178-189 - John-Paul Ore

, Sebastian G. Elbaum, Carrick Detweiler, Lambros Karkazis:
Assessing the type annotation burden. 190-201 - Vladimir Kovalenko, Fabio Palomba

, Alberto Bacchelli:
Mining file histories: should we consider branches? 202-213 - Yi Huang, Chunyang Chen

, Zhenchang Xing, Tian Lin, Yang Liu
:
Tell them apart: distilling technology differences from crowd-scale comparison discussions. 214-224
Security
- Yuju Shen, Yanyan Jiang, Chang Xu, Ping Yu

, Xiaoxing Ma, Jian Lu:
ReScue: crafting regular expression DoS attacks. 225-235 - Jie Liu, Diyu Wu

, Jingling Xue
:
TDroid: exposing app switching attacks in Android with control flow specialization. 236-247 - Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand:

Model-driven run-time enforcement of complex role-based access control policies. 248-258 - Bo Jiang, Ye Liu, W. K. Chan:

ContractFuzzer: fuzzing smart contracts for vulnerability detection. 259-269
Developer Tools
- Steven P. Reiss, Qi Xin, Jeff Huang:

SEEDE: simultaneous execution and editing in a development environment. 270-281 - Xiaoyu Liu, LiGuo Huang

, Vincent Ng:
Effective API recommendation without historical software repositories. 282-292 - Qiao Huang, Xin Xia

, Zhenchang Xing, David Lo
, Xinyu Wang:
API method recommendation without worrying about the task-API knowledge gap. 293-304 - Boyuan Chen

, Jian Song, Peng Xu, Xing Hu, Zhen Ming (Jack) Jiang:
An automated approach to estimating code coverage measures via execution logs. 305-316
Static Analysis
- Andrew Habib

, Michael Pradel:
How many of all bugs do we find? a study of static bug detectors. 317-328 - Hashim Sharif, Muhammad Abubakar, Ashish Gehani, Fareed Zaffar:

TRIMMER: application specialization for code debloating. 329-339 - Dominik Helm

, Florian Kübler, Michael Eichberg, Michael Reif, Mira Mezini:
A unified lattice model and framework for purity analyses. 340-350
Verification 1
- Jianhui Chen, Fei He:

Control flow-guided SMT solving for program verification. 351-361 - Yutaka Nagashima

, Yilun He:
PaMpeR: proof method recommendation system for Isabelle/HOL. 362-372
Maintenance and Machine Learning
- Zhongxin Liu, Xin Xia

, Ahmed E. Hassan, David Lo
, Zhenchang Xing, Xinyu Wang:
Neural-machine-translation-based commit message generation: how far are we? 373-384 - Hui Liu, Zhifeng Xu, Yanzhen Zou:

Deep learning based feature envy detection. 385-396 - Yao Wan, Zhou Zhao, Min Yang, Guandong Xu, Haochao Ying, Jian Wu, Philip S. Yu:

Improving automatic source code summarization via deep reinforcement learning. 397-407
Symbolic Execution
- Sooyoung Cha, Seonho Lee, Hakjoo Oh:

Template-guided concolic testing via online learning. 408-418 - Xiang Gao, Shin Hwei Tan, Zhen Dong, Abhik Roychoudhury

:
Android testing via synthetic symbolic execution. 419-429 - Oscar Soria Dustmann, Klaus Wehrle

, Cristian Cadar
:
PARTI: a multi-interval theory solver for symbolic execution. 430-440
Maintenance
- Federico Mora, Yi Li

, Julia Rubin, Marsha Chechik:
Client-specific equivalence checking. 441-451 - Nipun Arora, Jonathan Bell, Franjo Ivancic, Gail E. Kaiser

, Baishakhi Ray:
Replay without recording of production bugs for service oriented applications. 452-463 - Vahid Alizadeh

, Marouane Kessentini:
Reducing interactive refactoring effort via clustering-based multi-objective search. 464-474
Software Quality
- Caroline Lemieux, Koushik Sen:

FairFuzz: a targeted mutation strategy for increasing greybox fuzz testing coverage. 475-485 - Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu

, Lihua Xu, Geguang Pu:
Efficiently manifesting asynchronous programming errors in Android apps. 486-497 - Wensheng Dou, Shi Han, Liang Xu, Dongmei Zhang, Jun Wei:

Expandable group identification in spreadsheets. 498-508 - Yun Lin, Jun Sun, Lyly Tran, Guangdong Bai

, Haijun Wang, Jin Song Dong:
Break the dead end of dynamic slicing: localizing data and control omission bug. 509-519
Architecture and Requirements
- Renzo Degiovanni

, Facundo Molina
, Germán Regis, Nazareno Aguirre:
A genetic algorithm for goal-conflict identification. 520-531
Mobile Analysis
- Huaxun Huang, Lili Wei

, Yepang Liu, Shing-Chi Cheung
:
Understanding and detecting callback compatibility issues for Android applications. 532-542 - Kevin Moran, Cody Watson, John Hoskins, George Purnell, Denys Poshyvanyk

:
Detecting and summarizing GUI changes in evolving mobile apps. 543-553 - Yixue Zhao

, Paul Wat, Marcelo Schmitt Laser, Nenad Medvidovic:
Empirically assessing opportunities for prefetching and caching in mobile apps. 554-564 - Benno Stein, Lazaro Clapp, Manu Sridharan

, Bor-Yuh Evan Chang
:
Safe stream-based programming with refinement types. 565-576
Repair
- Kaiyuan Wang, Allison Sullivan

, Sarfraz Khurshid:
Automated model repair for Alloy. 577-588 - Huarui Lin, Zan Wang, Shuang Liu

, Jun Sun, Dongdi Zhang, Guangning Wei:
PFix: fixing concurrency bugs based on memory access patterns. 589-600 - Mohammad Bajammal, Davood Mazinanian, Ali Mesbah

:
Generating reusable web components from mockups. 601-611 - Rijnard van Tonder

, John Kotheimer, Claire Le Goues
:
Semantic crash bucketing. 612-622
Verification 2
- Hung-En Wang, Shih-Yu Chen, Fang Yu, Jie-Hong R. Jiang:

A symbolic model checking approach to the analysis of string and length constraints. 623-633 - Dirk Beyer

, Karlheinz Friedberger
:
Domain-independent multi-threaded software model checking. 634-644 - Liangze Yin, Wei Dong, Wanwei Liu, Ji Wang:

Scheduling constraint based abstraction refinement for weak memory models. 645-655
Code Differencing and Merging
- Chungha Sung

, Shuvendu K. Lahiri, Constantin Enea, Chao Wang:
Datalog-based scalable semantic diffing of concurrent programs. 656-666 - Bingchang Liu

, Wei Huo, Chao Zhang, Wenchao Li, Feng Li, Aihua Piao, Wei Zou:
αDiff: cross-version binary code similarity detection with DNN. 667-678 - Kaifeng Huang, Bihuan Chen, Xin Peng, Daihong Zhou

, Ying Wang, Yang Liu
, Wenyun Zhao:
ClDiff: generating concise linked code differences. 679-690
Mobile Security
- Jiwei Yan

, Xi Deng, Ping Wang, Tianyong Wu, Jun Yan, Jian Zhang:
Characterizing and identifying misexposed activities in Android applications. 691-701 - Jiajun Hu, Lili Wei

, Yepang Liu, Shing-Chi Cheung
, Huaxun Huang:
A tale of two cities: how WebView induces bugs to Android applications. 702-713 - Zhenhao Tang, Juan Zhai

, Minxue Pan, Yousra Aafer, Shiqing Ma, Xiangyu Zhang, Jianhua Zhao:
Dual-force: understanding WebView malware via cross-language forced execution. 714-725 - Mahmoud Hammad

, Joshua Garcia
, Sam Malek:
Self-protection of Android systems from inter-component communication attacks. 726-737
Experience Papers
- Wenyu Wang

, Dengfeng Li, Wei Yang, Yurui Cao, Zhenwen Zhang, Yuetang Deng, Tao Xie:
An empirical study of Android test generation tools in industrial cases. 738-748 - Davrondzhon Gafurov, Arne Erik Hurum, Martin Markman:

Achieving test automation with testers without coding skills: an industrial report. 749-756 - Mikaela Cashman

, Myra B. Cohen, Priya Ranjan, Robert W. Cottingham
:
Navigating the maze: the impact of configurability in bioinformatics software. 757-767 - Alexandra Bugariu, Valentin Wüstholz, Maria Christakis, Peter Müller:

Automatically testing implementations of numerical abstract domains. 768-778 - Ran Mo, Will Snipes, Yuanfang Cai, Srini Ramaswamy, Rick Kazman, Martin Naedele:

Experiences applying automated architecture analysis tool suites. 779-789
New Ideas Papers
- Carmine Vassallo, Fabio Palomba

, Alberto Bacchelli, Harald C. Gall
:
Continuous code quality: are we (really) doing that? 790-795 - Foyzul Hassan, Rodney Rodriguez, Xiaoyin Wang:

RUDSEA: recommending updates of Dockerfiles via software environment analysis. 796-801 - Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Wenhai Li, Chao Ji, Dan Ding:

Delta debugging microservice systems. 802-807 - Luting Ye, Hailong Sun, Xu Wang, Jiaruijue Wang:

Personalized teammate recommendation for crowdsourced software developers. 808-813 - Han Liu, Chao Liu, Wenqi Zhao, Yu Jiang, Jiaguang Sun:

S-gram: towards semantic-aware security auditing for Ethereum smart contracts. 814-819 - Jianghao Wang, Hamid Bagheri, Myra B. Cohen:

An evolutionary approach for analyzing Alloy specifications. 820-825 - Qingying Chen, Minghui Zhou:

A neural framework for retrieval and summarization of source code. 826-831 - Michele Tufano, Cody Watson, Gabriele Bavota

, Massimiliano Di Penta, Martin White, Denys Poshyvanyk
:
An empirical investigation into learning bug-fixing patches in the wild via neural machine translation. 832-837 - Jianxiong Gao, Steven S. Lumetta:

Loop path reduction by state pruning. 838-843 - Yu Qu

, Ting Liu, Jianlei Chi, Yangxu Jin, Di Cui, Ancheng He, Qinghua Zheng:
node2defect: using network embedding to improve software defect prediction. 844-849 - Manasi Patwardhan, Abhishek Sainani, Richa Sharma, Shirish Karande, Smita Ghaisas:

Towards automating disambiguation of regulations: using the wisdom of crowds. 850-855
Tool Demonstrations
- Rui Pereira

, Pedro Simão, Jácome Cunha
, João Saraiva
:
jStanley: placing a green thumb on Java collections. 856-859 - Farah Hariri, August Shi:

SRCIROR: a toolset for mutation testing of C source code and LLVM intermediate representation. 860-863 - Alim Ozdemir, Ayse Tosun

, Hakan Erdogmus
, Rui Abreu
:
Lightweight source code monitoring with Triggr. 864-867 - Simone Scalabrino

, Giovanni Grano
, Dario Di Nucci
, Michele Guerra
, Andrea De Lucia
, Harald C. Gall
, Rocco Oliveto:
OCELOT: a search-based test-data generation tool for C. 868-871 - Julián Grigera

, Juan Cruz Gardey, Alejandra Garrido
, Gustavo Rossi:
Live versioning of web applications through refactoring. 872-875 - Andrea Janes

, Michael Mairegger, Barbara Russo:
code_call_lens: raising the developer awareness of critical code. 876-879 - Gharib Gharibi, Rashmi Tripathi, Yugyung Lee:

Code2graph: automatic generation of static call graphs for Python source code. 880-883 - Julien Brunel, David Chemouil

, Alcino Cunha
, Nuno Macedo
:
The electrum analyzer: model checking relational first-order temporal specifications. 884-887 - Mikhail Y. R. Gadelha, Felipe R. Monteiro, Jeremy Morse, Lucas C. Cordeiro, Bernd Fischer, Denis A. Nicole:

ESBMC 5.0: an industrial-strength C model checker. 888-891 - Jialun Cao, Yongjian Li, Jun Pang:

L-CMP: an automatic learning-based parameterized verification tool. 892-895 - Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Jiaguang Sun:

VulSeeker: a semantic learning based vulnerability seeker for cross-platform binary. 896-899 - Dirk Beyer

, Thomas Lemberger:
CPA-SymExec: efficient symbolic execution in CPAchecker. 900-903 - Chungha Sung

, Brandon Paulsen, Chao Wang:
CANAL: a cache timing analysis framework via LLVM transformation. 904-907 - Oscar Luis Vera-Pérez, Martin Monperrus

, Benoit Baudry:
Descartes: a PITest engine to detect pseudo-tested methods: tool demonstration. 908-911 - Mohammad Roohitavaf, Sandeep S. Kulkarni:

DKVF: a framework for rapid prototyping and evaluating distributed key-value stores. 912-915 - Nataniel P. Borges Jr.

, Jenny Hotzkow, Andreas Zeller
:
DroidMate-2: a platform for Android test generation. 916-919
Session 1
- Philipp Haindl

:
Assessing and evaluating functional suitability of software. 920-923
Session 2
- Thomas Krismayer:

Automatic mining of constraints for monitoring systems of systems. 924-927 - Rokiatou Diarra:

Towards automatic restrictification of CUDA kernel arguments. 928-931 - Florian Galinier:

A DSL for requirements in the context of a seamless approach. 932-935
Session 3
- Luca Traini

:
A multi-objective framework for effective performance fault injection in distributed systems. 936-939 - David Sferruzza:

Top-down model-driven engineering of web services from extended OpenAPI models. 940-943 - Yannic Noller

:
Differential program analysis with fuzzing and symbolic execution. 944-947 - Julien Delplanque:

Software engineering techniques applied to relational databases. 948-951
Journal-First Papers
- Nada Almasri

, Luay Tahat
, Bogdan Korel:
Automatically quantifying the impact of a change in systems (journal-first abstract). 952 - Davide Falessi, Massimiliano Di Penta, Gerardo Canfora, Giovanni Cantone:

Estimating the number of remaining links in traceability recovery (journal-first abstract). 953 - Felipe R. Monteiro, Mário A. P. Garcia, Lucas C. Cordeiro, Eddie Batista de Lima Filho:

Bounded model checking of C++ programs based on the Qt cross-platform framework (journal-first abstract). 954 - Paola R. G. Accioly

, Paulo Borba, Guilherme Cavalcanti:
Understanding Semi-structured merge conflict characteristics in open-source Java projects (journal-first abstract). 955

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














