default search action
20th SIGSOFT FSE 2012: Cary, NC, USA
- Will Tracz, Martin P. Robillard, Tevfik Bultan:
20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), SIGSOFT/FSE'12, Cary, NC, USA - November 11 - 16, 2012. ACM 2012, ISBN 978-1-4503-1614-9
Program analysis
- Mark Gabel, Zhendong Su:
Testing mined specifications. 4 - Taeho Kwon, Zhendong Su:
Detecting and analyzing insecure component usage. 5 - Damien Octeau, Somesh Jha, Patrick D. McDaniel:
Retargeting Android applications to Java bytecode. 6
Tool demo session 1
- Gianpaolo Cugola, Carlo Ghezzi, Leandro Sales Pinto, Giordano Tamburrelli:
SelfMotion: a declarative language for adaptive service-oriented mobile apps. 7 - Baishakhi Ray, Christopher Wiley, Miryung Kim:
REPERTOIRE: a cross-system porting analysis tool for forked software projects. 8 - Vinay Augustine:
Automating adaptive maintenance changes with SrcML and LINQ. 9
Text analysis
- Wing-Kwan Chan, Hong Cheng, David Lo:
Searching connected API subgraph via text phrases. 10 - Senthil Mani, Rose Catherine, Vibha Singhal Sinha, Avinava Dubey:
AUSUM: approach for unsupervised bug report summarization. 11 - Xusheng Xiao, Amit M. Paradkar, Suresh Thummalapenta, Tao Xie:
Automated extraction of security policies from natural-language software documents. 12
Research demos session 2
- Mithun Acharya, Brian Robinson:
Practical change impact analysis based on static program slicing for industrial software systems. 13 - Elvira Albert, Antonio Flores-Montoya, Samir Genaim:
MayPar: a may-happen-in-parallel analyzer for concurrent objects. 14 - David C. Shepherd, Kostadin Damevski, Bartosz Ropski, Thomas Fritz:
Sando: an extensible local code search framework. 15
Dynamic analysis
- Xiaoyin Wang, Lu Zhang, Tao Xie, Yingfei Xiong, Hong Mei:
Automating presentation changes in dynamic web applications via collaborative hybrid analysis. 16 - (Withdrawn) T-Morph: revealing buggy behaviors of TinyOS applications via rule mining and visualization. 17
Research demos session 3
- Liliana Pasquale, Claudio Menghi, Mazeiar Salehie, Luca Cavallaro, Inah Omoronyia, Bashar Nuseibeh:
SecuriTAS: a tool for engineering adaptive security. 19 - Bora Caglayan, Ayse Tosun Misirli, Gul Calikli, Ayse Bener, Turgay Aytac, Burak Turhan:
Dione: an integrated measurement and defect prediction solution. 20
NIER papers
- Naeem Esfahani, Kaveh Razavi, Sam Malek:
Dealing with uncertainty in early software architecture. 21 - Dawei Qi, Jooyong Yi, Abhik Roychoudhury:
Software change contracts. 22 - Nicholas DiGiuseppe, James A. Jones:
Semantic fault diagnosis: automatic natural-language fault descriptions. 23 - Janet Siegmund, André Brechmann, Sven Apel, Christian Kästner, Jörg Liebig, Thomas Leich, Gunter Saake:
Toward measuring program comprehension with functional magnetic resonance imaging. 24 - Kathryn T. Stolee, Sebastian G. Elbaum:
Toward semantic search via SMT solver. 25 - Ana L. Milanova, Wei Huang:
Inference and checking of context-sensitive pluggable types. 26 - Mahinthan Chandramohan, Hee Beng Kuan Tan, Lwin Khin Shar:
Scalable malware clustering through coarse-grained behavior modeling. 27 - Kaiping Liu, Hee Beng Kuan Tan, Mahinthan Chandramohan:
Has this bug been reported? 28 - Nicholas DiGiuseppe, James A. Jones:
Concept-based failure clustering. 29 - Matthias Book, Simon Grapenthin, Volker Gruhn:
Seeing the forest and the trees: focusing team interaction on value and effort drivers. 30 - Han Xu, Oliver Creighton, Naoufel Boulila, Bernd Bruegge:
From pixels to bytes: evolutionary scenario based design with video. 31 - Dionysis Athanasopoulos, Apostolos V. Zarras, Panos Vassiliadis:
Service selection for happy users: making user-intuitive quality abstractions. 32
Test suites
- Leandro Sales Pinto, Saurabh Sinha, Alessandro Orso:
Understanding myths and realities of test-suite evolution. 33 - Razieh Nokhbeh Zaeem, Sarfraz Khurshid:
Test input generation using dynamic programming. 34 - Sangmin Park, B. M. Mainul Hossain, Ishtiaque Hussain, Christoph Csallner, Mark Grechanik, Kunal Taneja, Chen Fu, Qing Xie:
CarFast: achieving higher statement coverage faster. 35 - Emina Torlak:
Scalable test data generation from multidimensional models. 36
Research demos session 4
- Asadullah Shaikh, Uffe Kock Wiil:
UMLtoCSP (UOST): a tool for efficient verification of UML/OCL class diagrams through model slicing. 37 - Wei Huang, Ana L. Milanova:
ReImInfer: method purity inference for Java. 38 - Nikolai Tillmann, Michal Moskal, Jonathan de Halleux, Manuel Fähndrich, Sebastian Burckhardt:
TouchDevelop: app development on mobile devices. 39 - Lingming Zhang, Miryung Kim, Sarfraz Khurshid:
FaultTracer: a change impact and regression fault analysis tool for evolving Java programs. 40 - Suresh Thummalapenta, Nimit Singhania, Pranavadatta Devaki, Saurabh Sinha, Satish Chandra, Achin K. Das, Srinivas Mangipudi:
Efficiently scripting change-resilient tests. 41
Decision support
- Emerson R. Murphy-Hill, Rahul Jiresal, Gail C. Murphy:
Improving software developers' fluency by recommending development environment commands. 42 - Francisco Servant, James A. Jones:
History slicing: assisting code-evolution tasks. 43 - Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, Sebastiano Panichella:
Who is going to mentor newcomers in open source projects? 44 - Christian Bird, Thomas Zimmermann:
Assessing the value of branches with what-if analysis. 45
Concurrency
- Malay K. Ganai, Dongyoon Lee, Aarti Gupta:
DTAM: dynamic taint analysis of multi-threaded programs for relevancy. 46 - Azadeh Farzan, P. Madhusudan, Niloofar Razavi, Francesco Sorrentino:
Predicting null-pointer dereferences in concurrent programs. 47 - Michael Emmi, Akash Lal, Shaz Qadeer:
Asynchronous programs with prioritized task-buffers. 48
Modularity
- Robert J. Walker, Shreya Rawal, Jonathan Sillito:
Do crosscutting concerns cause modularity problems? 49 - Miryung Kim, Thomas Zimmermann, Nachiappan Nagappan:
A field study of refactoring challenges and benefits. 50 - Yida Tao, Yingnong Dang, Tao Xie, Dongmei Zhang, Sunghun Kim:
How do software engineers understand code changes?: an exploratory study in industry. 51 - Mehdi Mirakhorli, Patrick Mäder, Jane Cleland-Huang:
Variability points and design pattern usage in architectural tactics. 52
Empirical studies
- Baishakhi Ray, Miryung Kim:
A case study of cross-system porting in forked projects. 53 - Semih Okur, Danny Dig:
How do developers use parallel libraries? 54 - Bradley Cossette, Robert J. Walker:
Seeking the ground truth: a retroactive study on the evolution and migration of software libraries. 55 - Romain Robbes, Mircea Lungu, David Röthlisberger:
How do developers react to API deprecation?: the case of a smalltalk ecosystem. 56
Verification
- Dirk Beyer, Thomas A. Henzinger, M. Erkan Keremoglu, Philipp Wendler:
Conditional model checking: a technique to pass information between verifiers. 57 - Willem Visser, Jaco Geldenhuys, Matthew B. Dwyer:
Green: reducing, reusing and recycling constraints in program analysis. 58 - Saswat Anand, Mayur Naik, Mary Jean Harrold, Hongseok Yang:
Automated concolic testing of smartphone apps. 59 - Joseph P. Near, Daniel Jackson:
Rubicon: bounded verification of web applications. 60
Bug prediction
- Foyzur Rahman, Daryl Posnett, Premkumar T. Devanbu:
Recalling the "imprecision" of cross-project defect prediction. 61 - Emad Shihab, Ahmed E. Hassan, Bram Adams, Zhen Ming Jiang:
An industrial study on the risk of software changes. 62 - Anh Tuan Nguyen, Tung Thanh Nguyen, Hoan Anh Nguyen, Tien N. Nguyen:
Multi-layered approach for recovering links between bug reports and fixes. 63
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.