The Community for Technology Leaders
2013 IEEE/ACM 28th International Conference on Automated Software Engineering (ASE) (2013)
Silicon Valley, CA
Nov. 11, 2013 to Nov. 15, 2013
ISBN: 978-1-4799-0215-6
TABLE OF CONTENTS

[Front matter] (PDF)

pp. i-ii

Contents (PDF)

pp. 1-6

Message from the Chairs (PDF)

pp. iii-viii

Round-up: Runtime checking quasi linearizability of concurrent data structures (PDF)

Lu Zhang , Department of ECE, Virginia Tech, Blacksburg, 24061, USA
Arijit Chattopadhyay , Department of ECE, Virginia Tech, Blacksburg, 24061, USA
Chao Wang , Department of ECE, Virginia Tech, Blacksburg, 24061, USA
pp. 4-14

Constraint-based automatic symmetry detection (PDF)

Shao Jie Zhang , Singapore University of Technology and Design, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Chengnian Sun , National University of Singapore, Singapore
Yang Liu , Nanyang Technological University, Singapore
Junwei Ma , Singapore University of Technology and Design, Singapore
Jin Song Dong , National University of Singapore, Singapore
pp. 15-25

Proving MCAPI executions are correct using SMT (PDF)

Yu Huang , Department of Computer Science, Brigham Young University, Provo, UT, 84602, USA
Eric Mercer , Department of Computer Science, Brigham Young University, Provo, UT, 84602, USA
Jay McCarthy , Department of Computer Science, Brigham Young University, Provo, UT, 84602, USA
pp. 26-36

PIEtrace: Platform independent executable trace (PDF)

Yonghwi Kwon , Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
Xiangyu Zhang , Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
Dongyan Xu , Department of Computer Science, Purdue University, West Lafayette, Indiana, USA
pp. 48-58

Improving efficiency of dynamic analysis with dynamic dependence summaries (PDF)

Vijay Krishna Palepu , University of California, Irvine, USA
Guoqing Xu , University of California, Irvine, USA
James A. Jones , University of California, Irvine, USA
pp. 59-69

Efficient parametric runtime verification with deterministic string rewriting (PDF)

Patrick Meredith , University of Illinois at Urbana-Champaign, United States of America
Grigore Rosu , University of Illinois at Urbana-Champaign, United States of America
pp. 70-80

Identifying execution points for dynamic analyses (PDF)

William N. Sumner , School of Computing Science, Simon Fraser University, Canada
Xiangyu Zhang , Department of Computer Science, Purdue University, USA
pp. 81-91

Operator-based and random mutant selection: Better together (PDF)

Lingming Zhang , University of Texas, Austin, 78712, USA
Milos Gligoric , University of Illinois, Urbana, 61801, USA
Darko Marinov , University of Illinois, Urbana, 61801, USA
Sarfraz Khurshid , University of Texas, Austin, 78712, USA
pp. 92-102

Testing properties of dataflow program operators (PDF)

Zhihong Xu , University of Nebraska, Lincoln, USA
Martin Hirzel , IBM Watson Research, Yorktown Heights, NY, USA
Gregg Rothermel , University of Nebraska, Lincoln, USA
Kun-Lung Wu , IBM Watson Research, Yorktown Heights, NY, USA
pp. 103-113

Bita: Coverage-guided, automatic testing of actor programs (PDF)

Samira Tasharofi , Department of Computer Science, University of Illinois, Urbana, 61801, USA
Michael Pradel , Department of Computer Science, ETH Zurich, Switzerland
Yu Lin , Department of Computer Science, University of Illinois, Urbana, 61801, USA
Ralph Johnson , Department of Computer Science, University of Illinois, Urbana, 61801, USA
pp. 114-124

SABRINE: State-based robustness testing of operating systems (PDF)

Domenico Cotroneo , DIETI department, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Italy
Domenico Di Leo , DIETI department, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Italy
Francesco Fucci , DIETI department, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Italy
Roberto Natella , DIETI department, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Italy
pp. 125-135

BLITZ: Compositional bounded model checking for real-world programs (PDF)

Chia Yuan Cho , University of California, Berkeley, USA
Vijay D'Silva , DSO National Laboratories, Singapore
Dawn Song , DSO National Laboratories, Singapore
pp. 136-146

Ranger: Parallel analysis of alloy models by range partitioning (PDF)

Nicolas Rosner , Department of Computer Science, FCEyN, UBA, Argentina
Junaid H. Siddiqui , Department of Computer Science, LUMS School of Science and Engineering, Pakistan
Nazareno Aguirre , Department of Computer Science, FCEFQyN, UNRC, Argentina
Sarfraz Khurshid , Department of Electrical and Computer Engineering, The University of Texas at Austin, USA
Marcelo F. Frias , Department of Software Engineering, Instituto Tecnológico de Buenos Aires, Argentina
pp. 147-157

Automated verification of pattern-based interaction invariants in Ajax applications (PDF)

Yuta Maezawa , The University of Tokyo, Japan
Hironori Washizaki , Waseda University, Tokyo, Japan
Yoshinori Tanabe , National Institute of Informatics, Tokyo, Japan
Shinichi Honiden , The University of Tokyo, National Institute of Informatics, Japan
pp. 158-168

Software model checking for distributed systems with selector-based, non-blocking communication (PDF)

Cyrille Artho , AIST/RISEC, Amagasaki, Japan
Masami Hagiya , The University of Tokyo, Japan
Richard Potter , The University of Tokyo, Japan
Yoshinori Tanabe , National Institute of Informatics, Tokyo, Japan
Franz Weitl , Chiba University, Japan
Mitsuharu Yamamoto , Chiba University, Japan
pp. 169-179

A study of repetitiveness of code changes in software evolution (PDF)

Hoan Anh Nguyen , Iowa State University, USA
Anh Tuan Nguyen , Iowa State University, USA
Tung Thanh Nguyen , Iowa State University, USA
Tien N. Nguyen , Iowa State University, USA
Hridesh Rajan , Iowa State University, USA
pp. 180-190

Consistency-preserving edit scripts in model versioning (PDF)

Timo Kehrer , Software Engineering Group, University of Siegen, Germany
Udo Kelter , Software Engineering Group, University of Siegen, Germany
Gabriele Taentzer , Philipps-Universität Marburg, Germany
pp. 191-201

JFlow: Practical refactorings for flow-based parallelism (PDF)

Nicholas Chen , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Ralph E. Johnson , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
pp. 202-212

Automated planning for software architecture evolution (PDF)

Jeffrey M. Barnes , Institute for Software Research, Carnegie Mellon University, Pittsburgh, PA, USA
Ashutosh Pandey , Institute for Software Research, Carnegie Mellon University, Pittsburgh, PA, USA
David Garlan , Institute for Software Research, Carnegie Mellon University, Pittsburgh, PA, USA
pp. 213-223

Automatically synthesizing SQL queries from input-output examples (PDF)

Sai Zhang , Computer Science & Engineering, University of Washington, USA
Yuyin Sun , Computer Science & Engineering, University of Washington, USA
pp. 224-234

SEDGE: Symbolic example data generation for dataflow programs (PDF)

Kaituo Li , Computer Science Department, University of Massachusetts, Amherst, USA
Christoph Reichenbach , Institute of Informatics, Goethe University Frankfurt, Germany
Yannis Smaragdakis , Department of Informatics, University of Athens, Greece
Yanlei Diao , Computer Science Department, University of Massachusetts, Amherst, USA
Christoph Csallner , Computer Science and Engineering, University of Texas at Arlington, USA
pp. 235-245

Characteristic studies of loop problems for structural test generation via symbolic execution (PDF)

Xusheng Xiao , North Carolina State University, Raleigh, USA
Sihan Li , University of Illinois at Urbana-Champaign, USA
Tao Xie , University of Illinois at Urbana-Champaign, USA
Nikolai Tillmann , Microsoft Research, Redmond, WA, USA
pp. 246-256

Entropy-based test generation for improved fault localization (PDF)

Jose Campos , Faculty of Engineering of University of Porto, Portugal
Rui Abreu , Faculty of Engineering of University of Porto, Portugal
Gordon Fraser , University of Sheffield, United Kingdom
Marcelo d'Amorim , Federal University of Pernambuco, Brazil
pp. 257-267

Detecting bad smells in source code using change history information (PDF)

Fabio Palomba , University of Salerno, Fisciano, Italy
Gabriele Bavota , University of Sannio, Benevento, Italy
Massimiliano Di Penta , University of Sannio, Benevento, Italy
Rocco Oliveto , University of Molise, Pesche (IS), Italy
Andrea De Lucia , University of Salerno, Fisciano, Italy
Denys Poshyvanyk , The College of William and Mary, Williamsburg, VA, USA
pp. 268-278

Personalized defect prediction (PDF)

Tian Jiang , University of Waterloo, ON, Canada
Lin Tan , University of Waterloo, ON, Canada
Sunghun Kim , Hong Kong University of Science and Technology, China
pp. 279-289

Automatic recommendation of API methods from feature requests (PDF)

Ferdian Thung , Singapore Management University, Singapore
Shaowei Wang , Singapore Management University, Singapore
David Lo , Singapore Management University, Singapore
Julia Lawall , Inria/Lip6 Regal, France
pp. 290-300

Variability-aware performance prediction: A statistical learning approach (PDF)

Jianmei Guo , University of Waterloo, Canada
Krzysztof Czarnecki , University of Waterloo, Canada
Sven Apel , University of Passau, Germany
Norbert Siegmund , University of Passau, Germany
Andrzej Wasowski , IT University of Copenhagen, Denmark
pp. 301-311

A scalable approach for malware detection through bounded feature space behavior modeling (PDF)

Mahinthan Chandramohan , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
Hee Beng Kuan Tan , SnT Centre, University of Luxembourg, Luxembourg
Lionel C. Briand , SnT Centre, University of Luxembourg, Luxembourg
Lwin Khin Shar , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
Bindu Madhavi Padmanabhuni , School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore
pp. 312-322

Automatically partition software into least privilege components using dynamic data dependency analysis (PDF)

Yongzheng Wu , Singapore University of Technology and Design, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Yang Liu , Nanyang Technological University, Singapore
Jin Song Dong , School of Computing, National University of Singapore, Singapore
pp. 323-333

Finding architectural flaws using constraints (PDF)

Radu Vanciu , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
Marwan Abi-Antoun , Department of Computer Science, Wayne State University, Detroit, Michigan, USA
pp. 334-344

Improving bug localization using structured information retrieval (PDF)

Ripon K. Saha , Department of Electrical and Computer Engineering, The University of Texas at Austin, USA
Matthew Lease , School of Information, The University of Texas at Austin, USA
Sarfraz Khurshid , Department of Electrical and Computer Engineering, The University of Texas at Austin, USA
Dewayne E. Perry , Department of Electrical and Computer Engineering, The University of Texas at Austin, USA
pp. 345-355

Leveraging program equivalence for adaptive program repair: Models and first results (PDF)

Westley Weimer , Computer Science Department, University of Virginia, Charlottesville, USA
Zachary P. Fry , Computer Science Department, University of Virginia, Charlottesville, USA
Stephanie Forrest , Computer Science Department, University of New Mexico, Albuquerque, USA
pp. 356-366

Detecting and characterizing semantic inconsistencies in ported code (PDF)

Baishakhi Ray , The University of Texas at Austin, USA
Miryung Kim , The University of Texas at Austin, USA
Suzette Person , NASA Langley Research Center, Hampton, USA
Neha Rungta , NASA Ames Research Center, Mountain View, USA
pp. 367-377

Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PDF)

Peter Ohmann , University of Wisconsin-Madison, USA
Ben Liblit , University of Wisconsin-Madison, USA
pp. 378-388

Characterizing and detecting resource leaks in Android applications (PDF)

Chaorong Guo , State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences, Beijing, China
Jian Zhang , State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences, Beijing, China
Jun Yan , Technology Center of Software Engineering Institute of Software, Chinese Academy of Sciences, Beijing, China
Zhiqiang Zhang , State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences, Beijing, China
Yanli Zhang , State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences, Beijing, China
pp. 389-398

Dangling references in multi-configuration and dynamic PHP-based Web applications (PDF)

Hung Viet Nguyen , Electrical and Computer Engineering Department, Iowa State University, USA
Hoan Anh Nguyen , Electrical and Computer Engineering Department, Iowa State University, USA
Tung Thanh Nguyen , Electrical and Computer Engineering Department, Iowa State University, USA
Anh Tuan Nguyen , Electrical and Computer Engineering Department, Iowa State University, USA
Tien N. Nguyen , Electrical and Computer Engineering Department, Iowa State University, USA
pp. 399-409

Dynamically transforming data structures (PDF)

Erik Osterlund , Software Technology Group, Linnaeus University, Växjö, Sweden
Welf Lowe , Software Technology Group, Linnaeus University, Växjö, Sweden
pp. 410-420

Towards precise metrics for predicting graph query performance (PDF)

Benedek Izso , Department of Measurement and Information Systems, Budapest University of Technology and Economics, Hungary
Zoltan Szatmari , Department of Measurement and Information Systems, Budapest University of Technology and Economics, Hungary
Gabor Bergmann , Department of Measurement and Information Systems, Budapest University of Technology and Economics, Hungary
Akos Horvath , Department of Measurement and Information Systems, Budapest University of Technology and Economics, Hungary
Istvan Rath , Department of Measurement and Information Systems, Budapest University of Technology and Economics, Hungary
pp. 421-431

TzuYu: Learning stateful typestates (PDF)

Hao Xiao , School of Computer Engineering, Nanyang Technological University, Singapore
Jun Sun , Singapore University of Technology and Design, Singapore
Yang Liu , School of Computer Engineering, Nanyang Technological University, Singapore
Shang-Wei Lin , Temasek Laboratories, National University of Singapore, Singapore
Chengnian Sun , School of Computing, National University of Singapore, Singapore
pp. 432-442

Mining branching-time scenarios (PDF)

Dirk Fahland , Eindhoven University of Technology, The Netherlands
David Lo , Singapore Management University, Singapore
Shahar Maoz , Tel Aviv University, Israel
pp. 443-453

Measuring the structural complexity of feature models (PDF)

Richard Pohl , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Gerlingstr. 16, 45127, Germany
Vanessa Stricker , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Gerlingstr. 16, 45127, Germany
Klaus Pohl , paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Gerlingstr. 16, 45127, Germany
pp. 454-464

Scalable product line configuration: A straw to break the camel's back (PDF)

Abdel Salam Sayyad , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA
Joseph Ingram , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA
Tim Menzies , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA
Hany Ammar , Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA
pp. 465-474

Software analytics for incident management of online services: An experience report (PDF)

Jian-Guang Lou , Microsoft Research Asia, Beijing, China
Qingwei Lin , Microsoft Research Asia, Beijing, China
Rui Ding , Microsoft Research Asia, Beijing, China
Qiang Fu , Microsoft Research Asia, Beijing, China
Dongmei Zhang , Microsoft Research Asia, Beijing, China
Tao Xie , University of Illinois at Urbana-Champaign, USA
pp. 475-485

A comparative analysis of software architecture recovery techniques (PDF)

Joshua Garcia , Computer Science Department, University of Southern California, Los Angeles, 90089, USA
Igor Ivkovic , Wilfrid Laurier University, 75 University Avenue West, Waterloo, ON, N2L 3C5, Canada
Nenad Medvidovic , Computer Science Department, University of Southern California, Los Angeles, 90089, USA
pp. 486-496

Towards contextual and on-demand code clone management by continuous monitoring (PDF)

Gang Zhang , School of Computer Science, Fudan University, Shanghai, China
Xin Peng , School of Computer Science, Fudan University, Shanghai, China
Zhenchang Xing , School of Computer Engineering, Nanyang Technological University, Singapore
Shihai Jiang , School of Computer Science, Fudan University, Shanghai, China
Hai Wang , School of Computer Science, Fudan University, Shanghai, China
Wenyun Zhao , School of Computer Science, Fudan University, Shanghai, China
pp. 497-507

The potential of polyhedral optimization: An empirical study (PDF)

Andreas Simburger , University of Passau, Germany
Sven Apel , University of Passau, Germany
Armin Grosslinger , University of Passau, Germany
Christian Lengauer , University of Passau, Germany
pp. 508-518

Automated unit testing of large industrial embedded software using concolic testing (PDF)

Yunho Kim , CS Dept. KAIST, South Korea
Youil Kim , Samsung Electronics, South Korea
Taeksu Kim , Samsung Electronics, South Korea
Gunwoo Lee , Samsung Electronics, South Korea
Yoonkyu Jang , Samsung Electronics, South Korea
Moonzoo Kim , CS Dept. KAIST, South Korea
pp. 519-528

Minimizing CPU time shortage risks in integrated embedded software (PDF)

Shiva Nejati , SnT Center, University of Luxembourg, Luxembourg
Morayo Adedjouma , SnT Center, University of Luxembourg, Luxembourg
Lionel C. Briand , SnT Center, University of Luxembourg, Luxembourg
Jonathan Hellebaut , Delphi Automotive Systems, Luxembourg
Julien Begey , Delphi Automotive Systems, Luxembourg
Yves Clement , Delphi Automotive Systems, Luxembourg
pp. 529-539

Model based test validation and oracles for data acquisition systems (PDF)

Daniel Di Nardo , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
Nadia Alshahwan , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
Lionel C. Briand , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
Elizabeta Fourneret , Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Luxembourg
Tomislav Nakic-Alfirevic , SES S.A., Betzdorf, Luxembourg
Vincent Masquelier , SES S.A., Betzdorf, Luxembourg
pp. 540-550

Automated verification of interactive rule-based configuration systems (PDF)

Deepak Dhungana , Siemens AG Österreich, Vienna, Austria
Ching Hoo Tang , Max Planck Institute for Informatics, Saarbrücken, Germany
Christoph Weidenbach , Max Planck Institute for Informatics, Saarbrücken, Germany
Patrick Wischnewski , Logic4Business GmbH, Saarbrücken, Germany
pp. 551-561

AutoComment: Mining question and answer sites for automatic comment generation (PDF)

Edmund Wong , University of Waterloo, Ontario, Canada
Jinqiu Yang , University of Waterloo, Ontario, Canada
Lin Tan , University of Waterloo, Ontario, Canada
pp. 562-567

Detecting system use cases and validations from documents (PDF)

Smita Ghaisas , Tata Research, Development and Design Center, 54 Hadapsar Industrial Estates, Pune, 411013, India
Manish Motwani , Tata Research, Development and Design Center, 54 Hadapsar Industrial Estates, Pune, 411013, India
Preethu Rose Anish , Tata Research, Development and Design Center, 54 Hadapsar Industrial Estates, Pune, 411013, India
pp. 568-573

Multi-user variability configuration: A game theoretic approach (PDF)

Jesus Garcia-Galan , Dept. Languages and Computer Systems, University of Seville, Spain
Pablo Trinidad , Dept. Languages and Computer Systems, University of Seville, Spain
Antonio Ruiz-Cortes , Dept. Languages and Computer Systems, University of Seville, Spain
pp. 574-579

From comparison matrix to Variability Model: The Wikipedia case study (PDF)

Nicolas Sannier , University of Rennes 1, Irisa/Inria, Campus Universitaire de Beaulieu, 35042 cedex, France
Mathieu Acher , University of Rennes 1, Irisa/Inria, Campus Universitaire de Beaulieu, 35042 cedex, France
Benoit Baudry , University of Rennes 1, Irisa/Inria, Campus Universitaire de Beaulieu, 35042 cedex, France
pp. 580-585

Learning effective query transformations for enhanced requirements trace retrieval (PDF)

Timothy Dietrich , Center of Excellence for Software Traceability (CoEST), School of Computing, DePaul University, Chicago, IL, USA
Jane Cleland-Huang , Center of Excellence for Software Traceability (CoEST), School of Computing, DePaul University, Chicago, IL, USA
Yonghee Shin , Center of Excellence for Software Traceability (CoEST), School of Computing, DePaul University, Chicago, IL, USA
pp. 586-591

Environment rematching: Toward dependability improvement for self-adaptive applications (PDF)

Chang Xu , State Key Laboratory for Novel Software Technology, Nanjing University, Jiangsu, China
Wenhua Yang , State Key Laboratory for Novel Software Technology, Nanjing University, Jiangsu, China
Xiaoxing Ma , State Key Laboratory for Novel Software Technology, Nanjing University, Jiangsu, China
Chun Cao , State Key Laboratory for Novel Software Technology, Nanjing University, Jiangsu, China
Jian Lu , State Key Laboratory for Novel Software Technology, Nanjing University, Jiangsu, China
pp. 592-597

Cloud Twin: Native execution of android applications on the Windows Phone (PDF)

Ethan Holder , Dept. of Computer Science, Virginia Tech, Blacksburg, 24061, USA
Eeshan Shah , Dept. of Computer Science, Virginia Tech, Blacksburg, 24061, USA
Mohammed Davoodi , Dept. of Computer Science, Virginia Tech, Blacksburg, 24061, USA
Eli Tilevich , Dept. of Computer Science, Virginia Tech, Blacksburg, 24061, USA
pp. 598-603

SBFR: A search based approach for reproducing failures of programs with grammar based input (PDF)

Fitsum Meshesha Kifetew , Fondazione Bruno Kessler, Trento, Italy
Wei Jin , Georgia Institute of Technology, USA
Roberto Tiella , Fondazione Bruno Kessler, Trento, Italy
Alessandro Orso , Georgia Institute of Technology, USA
Paolo Tonella , Fondazione Bruno Kessler, Trento, Italy
pp. 604-609

PYTHIA: Generating test cases with oracles for JavaScript applications (PDF)

Shabnam Mirshokraie , University of British Columbia, Vancouver, Canada
Ali Mesbah , University of British Columbia, Vancouver, Canada
Karthik Pattabiraman , University of British Columbia, Vancouver, Canada
pp. 610-615

Randomizing regression tests using game theory (PDF)

Nupul Kukreja , University of Southern California, Los Angeles, USA
William G. J. Halfond , University of Southern California, Los Angeles, USA
Milind Tambe , University of Southern California, Los Angeles, USA
pp. 616-621

Automated inference of classifications and dependencies for combinatorial testing (PDF)

Cu Duy Nguyen , Fondazione Bruno Kessler, Trento, ITALY
Paolo Tonella , Fondazione Bruno Kessler, Trento, ITALY
pp. 622-627

Adding context to fault localization with integration coverage (PDF)

Higor Amario de Souza , Institute of Mathematics and Statistics, University of Sao Paulo, Brazil
Marcos Lordello Chaim , School of Arts, Sciences and Humanities, University of Sao Paulo, Brazil
pp. 628-633

Using automatically generated invariants for regression testing and bug localization (PDF)

Parth Sagdeo , University of Illinois at Urbana-Champaign, 61801, USA
Nicholas Ewalt , University of Illinois at Urbana-Champaign, 61801, USA
Debjit Pal , University of Illinois at Urbana-Champaign, 61801, USA
Shobha Vasudevan , University of Illinois at Urbana-Champaign, 61801, USA
pp. 634-639

Class level fault prediction using software clustering (PDF)

Giuseppe Scanniello , University of Basilicata, Italy
Carmine Gravino , University of Salerno, Italy
Andrian Marcus , Wayne State University, USA
Tim Menzies , West Virginia University, USA
pp. 640-645

ExPort: Detecting and visualizing API usages in large source code repositories (PDF)

Evan Moritz , The College of William and Mary, Williamsburg, VA, USA
Mario Linares-Vasquez , The College of William and Mary, Williamsburg, VA, USA
Denys Poshyvanyk , The College of William and Mary, Williamsburg, VA, USA
Mark Grechanik , University of Illinois at Chicago, USA
Collin McMillan , University of Notre Dame, IN, USA
Malcom Gethers , University of Maryland Baltimore County, USA
pp. 646-651

Flow Permissions for Android (PDF)

Shashank Holavanalli , University at Buffalo, The State University of New York, USA
Don Manuel , University at Buffalo, The State University of New York, USA
Vishwas Nanjundaswamy , University at Buffalo, The State University of New York, USA
Brian Rosenberg , University at Buffalo, The State University of New York, USA
Feng Shen , University at Buffalo, The State University of New York, USA
Steven Y. Ko , University at Buffalo, The State University of New York, USA
Lukasz Ziarek , University at Buffalo, The State University of New York, USA
pp. 652-657

A pattern-based approach to parametric specification mining (PDF)

Giles Reger , University of Manchester, United Kingdom
Howard Barringer , University of Manchester, United Kingdom
David Rydeheard , University of Manchester, United Kingdom
pp. 658-663

Semi-automatic generation of metamodels from model sketches (PDF)

Dustin Wuest , Department of Informatics, University of Zurich, Switzerland
Norbert Seyff , Department of Informatics, University of Zurich, Switzerland
Martin Glinz , Department of Informatics, University of Zurich, Switzerland
pp. 664-669

Assessing the maturity of requirements through argumentation: A good enough approach (PDF)

Varsha Veerappa , Oxford Brookes University, UK
Rachel Harrison , Oxford Brookes University, UK
pp. 670-675

Natural language requirements quality analysis based on business domain models (PDF)

K.M. Annervaz , Accenture Technology Labs, Bangalore, India
Vikrant Kaulgud , Accenture Technology Labs, Bangalore, India
Shubhashis Sengupta , Accenture Technology Labs, Bangalore, India
Milind Savagaonkar , Accenture Technology Labs, Bangalore, India
pp. 676-681

Model/code co-refactoring: An MDE approach (PDF)

Jens von Pilgrim , Lehrgebiet Programmiersysteme, Fernuniversität in Hagen, Germany
Bastian Ulke , Lehrgebiet Programmiersysteme, Fernuniversität in Hagen, Germany
Andreas Thies , Lehrgebiet Programmiersysteme, Fernuniversität in Hagen, Germany
Friedrich Steimann , Lehrgebiet Programmiersysteme, Fernuniversität in Hagen, Germany
pp. 682-687

Recovering model transformation traces using multi-objective optimization (PDF)

Hajer Saada , LIRMM, Université Montpellier 2 et CNRS, France
Marianne Huchard , LIRMM, Université Montpellier 2 et CNRS, France
Clementine Nebut , LIRMM, Université Montpellier 2 et CNRS, France
Houari Sahraoui , DIRO, Université de Montréal, Canada
pp. 688-693

Model repair and transformation with Echo (PDF)

Nuno Macedo , HASLAB - High Assurance Software Laboratory, INESC TEC & Universidade do Minho, Braga, Portugal
Tiago Guimaraes , HASLAB - High Assurance Software Laboratory, INESC TEC & Universidade do Minho, Braga, Portugal
Alcino Cunha , HASLAB - High Assurance Software Laboratory, INESC TEC & Universidade do Minho, Braga, Portugal
pp. 694-697

Smart Cloud Broker: Finding your home in the clouds (PDF)

Mohan Baruwal Chhetri , Faculty of Information and Communication Technologies, Swinburrne University of Technology, Melbourne, Victoria 3122, Australia
Sergei Chichin , Faculty of Information and Communication Technologies, Swinburrne University of Technology, Melbourne, Victoria 3122, Australia
Quoc Bao Vo , Faculty of Information and Communication Technologies, Swinburrne University of Technology, Melbourne, Victoria 3122, Australia
Ryszard Kowalczyk , Faculty of Information and Communication Technologies, Swinburrne University of Technology, Melbourne, Victoria 3122, Australia
pp. 698-701

OCRA: A tool for checking the refinement of temporal contracts (PDF)

Alessandro Cimatti , FBK-irst, Trento, Italy
Michele Dorigatti , FBK-irst, Trento, Italy
Stefano Tonetta , FBK-irst, Trento, Italy
pp. 702-705

The bounded model checker LLBMC (PDF)

Stephan Falke , Institute for Theoretical Computer Science, Karlsruhe Institute of Technology (KIT), Germany
Florian Merz , Institute for Theoretical Computer Science, Karlsruhe Institute of Technology (KIT), Germany
Carsten Sinz , Institute for Theoretical Computer Science, Karlsruhe Institute of Technology (KIT), Germany
pp. 706-709

CSeq: A concurrency pre-processor for sequential C verification tools (PDF)

Bernd Fischer , Division of Computer Science, Stellenbosch University, South Africa
Omar Inverso , Electronics and Computer Science, University of Southampton, UK
Gennaro Parlato , Electronics and Computer Science, University of Southampton, UK
pp. 710-713

Automated testing of cloud-based elastic systems with AUToCLES (PDF)

Alessio Gambi , University of Lugano, Switzerland
Waldemar Hummer , Vienna University of Technology, Austria
Schahram Dustdar , Vienna University of Technology, Austria
pp. 714-717

Tool support for automatic model transformation specification using concrete visualisations (PDF)

Iman Avazpour , Faculty of ICT, Centre for Computing and Engineering Software and Systems (SUCCESS), Swinburne University of Technology, Hawthorn 3122, VIC, Australia
John Grundy , Faculty of ICT, Centre for Computing and Engineering Software and Systems (SUCCESS), Swinburne University of Technology, Hawthorn 3122, VIC, Australia
Lars Grunske , Institute of Software Technology, Universität Stuttgart, Universitätsstraße 38, D-70569, Germany
pp. 718-721

CCmutator: A mutation generator for concurrency constructs in multithreaded C/C++ applications (PDF)

Markus Kusano , Virginia Tech, Blacksburg, 24061, USA
Chao Wang , Virginia Tech, Blacksburg, 24061, USA
pp. 722-725

Crushinator: A framework towards game-independent testing (PDF)

Christopher Schaefer , North Dakota State University, Computer Science, Fargo, USA
Hyunsook Do , North Dakota State University, Computer Science, Fargo, USA
Brian M. Slator , North Dakota State University, Computer Science, Fargo, USA
pp. 726-729

Pex4Fun: A web-based environment for educational gaming via automated test generation (PDF)

Nikolai Tillmann , Microsoft Research, One Microsoft Way, Redmond, WA, USA
Jonathan de Halleux , Microsoft Research, One Microsoft Way, Redmond, WA, USA
Tao Xie , Department of Computer Science, University of Illinois at Urbana-Champaign, USA
Judith Bishop , Microsoft Research, One Microsoft Way, Redmond, WA, USA
pp. 730-733

Developing self-verifying service-based systems (PDF)

Radu Calinescu , Department of Computer Science, University of York, UK
Kenneth Johnson , Department of Computer Science, University of York, UK
Yasmin Rafiq , Department of Computer Science, University of York, UK
pp. 734-737

TRAM: A tool for transforming textual requirements into analysis models (PDF)

Keletso J. Letsholo , School of Computer Science, The University of Manchester, U.K.
Liping Zhao , School of Computer Science, The University of Manchester, U.K.
Erol-Valeriu Chioasca , School of Computer Science, The University of Manchester, U.K.
pp. 738-741

iProbe: A lightweight user-level dynamic instrumentation tool (PDF)

Nipun Arora , NEC Laboratories America, USA
Hui Zhang , NEC Laboratories America, USA
Junghwan Rhee , NEC Laboratories America, USA
Kenji Yoshihira , NEC Laboratories America, USA
Guofei Jiang , NEC Laboratories America, USA
pp. 742-745

Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (PDF)

Fatemeh Hendijani Fard , Department of Electrical and Computer Engineering, University of Calgary, 2500 University DR., N.W., Alberta, Canada (T2N 1N4)
pp. 746-749

Synthesizing fault-tolerant programs from deontic logic specifications (PDF)

Ramiro Demasi , Department of Computing and Software, McMaster University, Hamilton, Ontario, Canada, L8S 4K1
pp. 750-753

Supporting bug investigation using history analysis (PDF)

Francisco Servant , University of California, Irvine, U.S.A.
pp. 754-757

Context-aware task allocation for distributed agile team (PDF)

Jun Lin , School of Computer Engineering, Nanyang Technological University, Singapore
pp. 758-761
87 ms
(Ver 3.3 (11022016))