default search action
29th APSEC 2022: Virtual Event, Japan
- 29th Asia-Pacific Software Engineering Conference, APSEC 2022, Virtual Event, Japan, December 6-9, 2022. IEEE 2022, ISBN 978-1-6654-5537-4
- Wenyin Li, Meng Wang, Bin Yu, Yuhang Shi, Mingxin Fu, You Shao:
Grey-box Fuzzing Based on Execution Feedback for EOSIO Smart Contracts. 1-10 - Xiaoya Xia, Zhenjie Weng, Wei Wang, Shengyu Zhao:
Exploring Activity and Contributors on GitHub: Who, What, When, and Where. 11-20 - Nitsan Amit, Dror G. Feitelson:
The Language of Programming: On the Vocabulary of Names. 21-30 - Chenyang Zhu, Yujie Cai, Can Hu, Jia Bi:
Efficient Reinforcement Learning with Generalized-Reactivity Specifications. 31-40 - Xiaodong Zhang, Jing Zhou:
UTCache: Updatable Transactional Cache For Database-Driven Applications. 41-50 - Tianming Zheng, Zhixin Tong, Ping Yi, Yue Wu:
Automated Generation of Bug Samples Based on Source Code Analysis. 51-60 - Aizaz Sharif, Dusica Marijan:
Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving Policies. 61-70 - Yuki Osumi, Naotaka Umekawa, Hitomi Komata, Shinpei Hayashi:
Empirical Study of Co-Renamed Identifiers. 71-80 - Kicheol Kim, Misoo Kim, Eunseok Lee:
Systematic Analysis of Defect-Specific Code Abstraction for Neural Program Repair. 81-89 - Anna Mitchell, Dharini Balasubramaniam, Jade Fletcher:
Incorporating Ethics in Software Engineering: Challenges and Opportunities. 90-98 - Anh Tuan Nguyen, Tien N. Nguyen:
Incremental Relational Topic Model for Duplicate Bug Report Detection. 99-108 - Jia Lu, Ming Xu:
Bisection Value Iteration. 109-118 - Lwin Khin Shar, Wei Minn, Ta Nguyen Binh Duong, Jiani Fan, Lingxiao Jiang, Daniel Lim Wai Kiat:
DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning. 119-128 - Ismaïl Mendil, Peter Riviere, Yamine Aït Ameur, Neeraj Kumar Singh, Dominique Méry, Philippe A. Palanque:
Non-Intrusive Annotation-Based Domain-Specific Analysis to Certify Event-B Models Behaviours. 129-138 - Jean-Guy Schneider, Sung Une Lee:
An Experimental Comparison of Clone Detection Techniques using Java Bytecode. 139-148 - Shunhui Ji, Shaoqing Zhu, Pengcheng Zhang, Hai Dong:
Data Flow Reduction Based Test Case Generation for Smart Contracts. 149-158 - Guohuan Ding, Jing Liu:
SysML Flow Model. 159-168 - Xiaoliang Wu, Ajitha Rajan:
Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking. 169-178 - Guofeng Zhang, Zhenbang Chen, Ziqi Shuai:
Symbolic Execution of Floating-point Programs: How far are we? 179-188 - Jialong Li, Mingyue Zhang, Zhenyu Mao, Haiyan Zhao, Zhi Jin, Shinichi Honiden, Kenji Tei:
Goal-oriented Knowledge Reuse via Curriculum Evolution for Reinforcement Learning-based Adaptation. 189-198 - Liang Tan, Christoph Bockisch:
Diff Feature Matching Network in Refactoring Detection. 199-208 - Esther Cho, Yong-Jun Shin, Sangwon Hyun, Hansu Kim, Doo-Hwan Bae:
Automatic Generation of Metamorphic Relations for a Cyber-Physical System-of-Systems Using Genetic Algorithm. 209-218 - Yin Liu, Shuangyi Li, Eli Tilevich:
Toward a Better Alignment Between the Research and Practice of Code Search Engines. 219-228 - Tingrui Yu, Xiaodong Gu, Beijun Shen:
Code Question Answering via Task-Adaptive Sequence-to-Sequence Pre-training. 229-238 - Daisuke Yamaguchi, Takuya Iwatsuka:
Two-Stage Patch Synthesis for API Migration from Single API Usage Example. 239-248 - Aparna Pisolkar, Md Tajmilur Rahman:
An Empirical Study of Predicting Fault-prone Components and their Evolution. 249-258 - Anissa Kheireddine, Etienne Renault, Souheib Baarir:
Tuning SAT solvers for LTL Model Checking. 259-268 - Yanze Wang, Shanshan Li, Huikun Liu, He Zhang, Bo Pan:
A Reference Architecture for Blockchain-based Traceability Systems Using Domain-Driven Design and Microservices. 269-278 - Sejin Jung, Junbeom Yoo:
An Approach for Hazard Analysis of Multiple-Cooperative Systems Considering Dynamic Configuration Uncertainty. 279-288 - Guoming Long, Tao Chen, Georgina Cosma:
Multifaceted Hierarchical Report Identification for Non-Functional Bugs in Deep Learning Frameworks. 289-298 - Meixi Liu, Ziqi Shuai, Luyao Liu, Kelin Ma, Ke Ma:
Optimal Refinement-based Array Constraint Solving for Symbolic Execution. 299-308 - Oleksandr Zaitsev, Stéphane Ducasse, Nicolas Anquetil, Arnaud Thiefaine:
How Libraries Evolve: A Survey of Two Industrial Companies and an Open-Source Community. 309-317 - Xuanying Liu, Zonghao Li, Jiaqi Zou, Haonan Tong:
An Empirical Study on Multi-Source Cross-Project Defect Prediction Models. 318-327 - Guofeng Zhang, Zhenbang Chen, Ziqi Shuai, Yufeng Zhang, Ji Wang:
Synergizing Symbolic Execution and Fuzzing By Function-level Selective Symbolization. 328-337 - Chenghu Ma, Liqian Chen, Xin Yi, Guangsheng Fan, Ji Wang:
NuMFUZZ: A Floating-Point Format Aware Fuzzer for Numerical Programs. 338-347 - Shun Yang, Bo Cai:
Multi-Perspective Alignment Mechanism for Code Search. 348-356 - Zhihan Li, Yi Cheng, Haiyang Yang, Li Kuang, Lingyan Zhang:
Retrieve-Guided Commit Message Generation with Semantic Similarity And Disparity. 357-366 - Jiayi Chen, Zhixing Wang, Yuchen Jiang, Jun Pang, Tian Zhang, Minxue Pan, Jianwen Sun:
NEGAR: Network Embedding Guided Architecture Recovery for Software Systems. 367-376 - Gwen Salaün:
Quantifying the Similarity of BPMN Processes. 377-386 - Maiko Onishi, Shinpei Ogata, Kozo Okano, Daisuke Bekki:
Reducing Syntactic Complexity for Information Extraction from Japanese Requirement Specifications. 387-396 - Zheng Wang, Xin Yi, Hengbiao Yu, Banghu Yin:
Detecting High Floating-Point Errors via Ranking Analysis. 397-406 - Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong:
Bounded Model Checking of Synchronous Reactive Models in Ptolemy II. 407-416 - Changze Huang, Hailian Zhou, Hongbing Zhao, Wenting Cai, Zhi Quan Zhou, Mingyue Jiang:
On the Usefulness of Crossover in Search-Based Test Case Generation: An Industrial Report. 417-421 - Noshin Tahsin, Kazi Sakib:
Refactoring Community Smells: An Empirical Study on the Software Practitioners of Bangladesh. 422-426 - Minhao Zhou, Zhe Quan, Xing Huang:
Unified program cross-architecture migration framework model. 427-431 - Shinobu Saito, Kenji Takahashi, Yasuyuki Hamada, Jan Vermeulen:
RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution Data. 432-436 - Ikkaku Kawaguchi, Yasuhiro Hayase, Kyohei Kobayashi, Chiemi Watanabe:
AMF: A Field to Realize the Values of Agile Manifesto through Retrospectives. 437-441 - Tinghui Ouyang, Yoshiki Seo, Yutaka Oiwa:
Quality assurance study with mismatched data in sentiment analysis. 442-446 - Trung Kien Tran, Hieu Dinh Vo:
SCAR: Smart Contract Alarm Ranking. 447-451 - Saurabh Tiwari, Kumar Iyer, Eduard Paul Enoiu:
Combining Model-Based Testing and Automated Analysis of Behavioural Models using GraphWalker and UPPAAL. 452-456 - Natanon Ritta, Tasha Settewong, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Kenichi Matsumoto:
Reusing My Own Code: Preliminary Results for Competitive Coding in Jupyter Notebooks. 457-461 - Tasha Settewong, Natanon Ritta, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Kenichi Matsumoto:
Why Visualize Data When Coding? Preliminary Categories for Coding in Jupyter Notebooks. 462-466 - Chu-Fei Wu, Shang-Pin Ma, An-Chi Shau, Hang-Wei Yeh:
Testing for Event-Driven Microservices Based on Consumer-Driven Contracts and State Models. 467-471 - Indira Febriyanti, Raula Gaikovina Kula, Ruksit Rojpaisarnkit, Kanchanok Kannee, Yusuf Sulistyo Nugroho, Kenichi Matsumoto:
Visualizing Contributor Code Competency for PyPI Libraries: Preliminary Results. 472-476 - Yu-Te Wang, Shang-Pin Ma, Yue-Jun Lai, Yan-Cih Liang:
Analyzing and Monitoring Kubernetes Microservices based on Distributed Tracing and Service Mesh. 477-481 - Mridha Md. Nafis Fuad, Kazi Sakib:
eBAT: An Efficient Automated Web Application Testing Approach Based on Tester's Behavior. 482-486 - Yuriko Takatsuka, Masateru Tsunoda:
Preliminary Analysis of the Influence of the Stereotype Threat on Computer Programming. 487-491 - Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto:
Preliminary Analysis of Review Method Selection Based on Bandit Algorithms. 492-496 - Alvine Boaye Belle, Yixi Zhao:
A checklist-based approach to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews. 502-506 - Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Apirak Hoonlor, Mores Prachyabrued:
Virtual Reality for Software Engineering Presentations. 507-516 - Diego Vallespir, Silvana Moreno:
How students design simple programs: a study on the effort and perceptions of the design activity. 517-526 - Sebastian Geiss, Tim Jentzsch, Nils Wild, Christian Plewnia:
Automatic Programming Assessment System for a Computer Science Bridge Course - An Experience Report. 527-536 - Ruoqing Wang, Snezhina Milusheva, Stephan Krusche:
Balancing between Creativity and Efficiency in Software Engineering Project Courses. 537-546 - Usman Nasir, Muhammad Laiq:
Threshold Concepts and Skills in Software Architecture: Instructors' Perspectives. 547-553 - Kanon Harada, Katsuhisa Maruyama:
A Preliminary Finding on Programs Fixed by an APR Tool based on a Genetic Algorithm. 554-555 - Ryota Shinhama, Erina Makihara, Keiko Ono, Akitaka Yaguchi, Ayumu Taisho:
Comparison of Different Keyphrase Extraction Algorithms for Supporting Problem Selection in Online Judge System. 556-557 - Taiga Wakamatsu, Yutaro Mikaduki, Noriyuki Kushiro:
A Support Tool for Test Case First : * Trial for improving quality of specification document through writing system specifications and test cases concurrently. 558-559 - Satoshi Munakata, Caterina Urban, Haruki Yokoyama, Koji Yamamoto, Kazuki Munakata:
Verifying Attention Robustness of Deep Neural Networks against Semantic Perturbations. 560-561 - Jiaxuan Zhang, Kun Ma:
EDPS: Early Dropout Prediction System of MOOC Courses. 562-563 - Aiden Cheung, Jacky Keung:
On the Scrutinization of the NFT Valuation Factors. 564-565 - Qifan Yu, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji:
Bytecode Obfuscation for Smart Contracts. 566-567 - Hodaka Shinbori, Masateru Tsunoda:
How Does Grit Affect the Performance of Software Developers? 568-569 - Anivesh Panjiyar, Debanjan Sadhya:
Defending against code injection attacks using Secure Design Pattern. 570-571 - Sentaro Onizuka, Tetsuya Kanda, Katsuro Inoue:
Comparison of Developer's Work Efficiency between Different Editors. 572-573 - Luiz Fernando Capretz, Abdul Rehman Gilal:
What Pakistani Computer Science and Software Engineering Students Think about Software Testing? 574-575 - Alvine Boaye Belle, Yixi Zhao:
A new measure to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews. 576-577 - Mihato Ueda, Yousuke Asano, Hane Kondo, Oh Sato, Atsuo Hazeyama:
SceneCommitter: a screen scenario review system using the GitHub and Figma WebAPI in the waterfall based software development. 578-579 - Teruno Kajiura, Nao Souma, Miyu Sato, Mai Takahashi, Kimio Kuramitsu:
An additional approach to pre-trained code model with multilingual natural languages. 580-581 - Ryo Soga, Hideyuki Kanuka, Daisuke Fukui, Masayoshi Mase:
Risk assessment to design business process incorporating AI tasks. 582-583 - Hane Kondo, Atsuo Hazeyama:
Systematic Literature Review on Educational Effectiveness of Project-Based Learning for Software Development. 584-585 - Shinobu Saito:
DigiSoC - Digital Software City - toward Software 3R: Reduce, Reuse, and Recycle. 586-587 - Ikuto Yamagata, Masateru Tsunoda, Keitaro Nakasai:
How Does Future Perspective Affect Job Satisfaction and Turnover Intention of Software Engineers? 588-589 - Lorenz Graf-Vlachy:
Battle of the Blocs: Quantity and Quality of Software Engineering Research by Origin. 590-591
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.