default search action
20th ASE 2005: Long Beach, CA, USA
- David F. Redmiles, Thomas Ellman, Andrea Zisman:
20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), November 7-11, 2005, Long Beach, CA, USA. ACM 2005, ISBN 1-58113-993-4 - Alfonso Fuggetta:
The power of software. 1 - William R. Swartout:
Virtual humans: lessons learned in integrating a large-scale AI project. 2 - Richard A. Kemmerer:
Designing and implementing a family of intrusion detection systems. 3
Validation and verification I
- Sujatha Kashyap, Vijay K. Garg:
Exploiting predicate structure for efficient reachability detection. 4-13 - Aysu Betin-Can, Tevfik Bultan, Mikael Lindvall, Benjamin Lux, Stefan Topp:
Application of design for verification with concurrency controllers to air traffic control software. 14-23 - Dezhuang Zhang, Rance Cleaveland:
Efficient temporal-logic query checking for presburger systems. 24-33
Maintenance and evolution
- Steven P. Reiss:
A component model for internet-scale applications. 34-43 - Ada Diaconescu, John Murphy:
Automating the performance management of component-based enterprise systems through the use of redundancy. 44-53 - Zhenchang Xing, Eleni Stroulia:
UMLDiff: an algorithm for object-oriented design differencing. 54-65
Program understanding
- Adrian Lienhard, Stéphane Ducasse, Gabriela Arévalo:
Identifying traits with formal concept analysis. 66-75 - Ana L. Milanova:
Precise identification of composition relationships for UML class diagrams. 76-85 - Rainer Koschke, Jochen Quante:
On dynamic feature location. 86-95
Testing I
- Daniel Hoffman, Kevin Yoo:
Blowtorch: a framework for firewall test automation. 96-103 - Mark Hennessy, James F. Power:
An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software. 104-113 - David Saff, Shay Artzi, Jeff H. Perkins, Michael D. Ernst:
Automatic test factoring for java. 114-123
Code generation
- Gregor Engels, Martin Erwig:
ClassSheets: automatic generation of spreadsheet applications from object-oriented specifications. 124-133 - Karsten Ehrig, Claudia Ermel, Stefan Hänsgen, Gabriele Taentzer:
Generation of visual editors as eclipse plug-ins. 134-143 - Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang Yan, Younggyun Koh, Qinyi Wu, Charles Consel, Akhil Sahai, Koichi Moriyama:
Clearwater: extensible, flexible, modular code generation. 144-153
Configuration management & security
- Eelco Dolstra:
Secure sharing between untrusted users in a transparent source/binary deployment model. 154-163 - Yanyan Wang, Matthew J. Rutherford, Antonio Carzaniga, Alexander L. Wolf:
Automating experimentation on distributed testbeds. 164-173 - William G. J. Halfond, Alessandro Orso:
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. 174-183
Aspect oriented programming
- David C. Shepherd, Jeffrey Palm, Lori L. Pollock, Mark Chu-Carroll:
Timna: a framework for automatically combining aspect mining analyses. 184-193 - Naoyasu Ubayashi, Genki Moriyama, Hidehiko Masuhara, Tetsuo Tamai:
A parameterized interpreter for modeling different AOP mechanisms. 194-203
Software visualization
- Akhil Mehra, John C. Grundy, John G. Hosking:
A generic approach to supporting diagram differencing and merging for collaborative design. 204-213 - Guillaume Langelier, Houari A. Sahraoui, Pierre Poulin:
Visualization-based analysis of quality for large-scale software systems. 214-223
Validation and verification II
- Alex Blewitt, Alan Bundy, Ian Stark:
Automatic verification of design patterns in Java. 224-232 - Rahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott D. Stoller:
Optimized run-time race detection and atomicity checking using partial discovered types. 233-242 - Subash Shankar, Sinan Asa, Vladimir Sipos, Xiaowei Xu:
Reasoning about real-time statecharts in the presence of semantic variations. 243-252
Testing II
- Sara Sprenkle, Emily Gibson, Sreedevi Sampath, Lori L. Pollock:
Automated replay and failure detection for web applications. 253-262 - Neelam Gupta, Haifeng He, Xiangyu Zhang, Rajiv Gupta:
Locating faulty code using failure-inducing chops. 263-272 - James A. Jones, Mary Jean Harrold:
Empirical evaluation of the tarantula automatic fault-localization technique. 273-282
Short papers 1
- Songtao Xia, Ben Di Vito, César A. Muñoz:
Automated test generation for engineering applications. 283-286 - Shiva Nejati, Marsha Chechik:
Let's agree to disagree. 287-290 - Dan Hao, Ying Pan, Lu Zhang, Wei Zhao, Hong Mei, Jiasu Sun:
A similarity-aware approach to testing based fault localization. 291-294 - Aaron G. Cass, Leon J. Osterweil:
Process support to help novices design software faster and better. 295-299 - Magnus Eriksson, Henrik Morast, Jürgen Börstler, Kjell Borg:
The PLUSS toolkit - extending telelogic DOORS and IBM-rational rose to support product line use case modeling. 300-304 - Marcelo F. Frias, Rodolfo Gamarra, Gabriela Steren, Lorena Bourg:
A strategy for efficient verification of relational specifications, based on monotonicity analysis. 305-308 - Tsong Yueh Chen, Robert G. Merkel:
Quasi-random testing. 309-312 - Arnaud Gotlieb, Tristan Denmat, Bernard Botella:
Constraint-based test data generation in the presence of stack-directed pointers. 313-316 - Sonia Ben Mokhtar, Jinshan Liu, Nikolaos Georgantas, Valérie Issarny:
QoS-aware dynamic service composition in ambient intelligence environments. 317-320 - Na Liu, John C. Grundy, John G. Hosking:
A visual language and environment for composing web services. 321-324 - Abhay Vardhan, Mahesh Viswanathan:
Learning to verify branching time properties. 325-328 - Yuanfang Cai, Kevin J. Sullivan:
Simon: modeling and analysis of design space structures. 329-332 - Johannes Mayer:
Lattice-based adaptive random testing. 333-336 - Xiyang Liu, Hehui Liu, Bin Wang, Ping Chen, Xiyao Cai:
A unified fitness function calculation rule for flag conditions to improve evolutionary testing. 337-341 - Dianxiang Xu, Kendall E. Nygard:
A threat-driven approach to modeling and verifying secure software. 342-346 - Tao Wang, Abhik Roychoudhury:
Automated path generation for software fault localization. 347-351 - Américo Sampaio, Ruzanna Chitchyan, Paul Rayson:
EA-Miner: a tool for automating aspect-oriented requirements identification. 352-355
Short papers 2
- David Coppit, Jiexin Lian:
yagg: an easy-to-use generator for structured test inputs. 356-359 - Alexander Egyed, Stefan Biffl, Matthias Heindl, Paul Grünbacher:
Determining the cost-quality trade-off for automated software traceability. 360-363 - Jean-François Couchot, Alain Giorgetti, Nikolai Kosmatov:
A uniform deductive approach for parameterized protocol safety. 364-367 - Johan Fredriksson, Massimo Tivoli, Ivica Crnkovic:
A component-based development framework for supporting functional and non-functional analysis in control system design. 368-371 - Rohit Gheyi, Tiago Massoni, Paulo Borba:
A rigorous approach for proving model refactorings. 372-375 - Alma L. Juarez Dominguez, Nancy A. Day:
Compositional reasoning for port-based distributed systems. 376-379 - Li Tan:
Model-based self-monitoring embedded programs with temporal logic specifications. 380-383 - Tim Menzies, Daniel Port, Zhihao Chen, Jairus Hihn:
Specialization and extrapolation of software cost models. 384-387 - Chouki Tibermacine, Régis Fleurquin, Salah Sadou:
NFRs-aware architectural evolution of component-based software. 388-391 - Jan Jürjens, Mark Yampolskiy:
Code security analysis with assertions. 392-395 - Tristan Denmat, Mireille Ducassé, Olivier Ridoux:
Data mining and cross-checking of execution traces: a re-interpretation of Jones, Harrold and Stasko test information. 396-399 - May Haydar, Sergiy Boroday, Alexandre Petrenko, Houari A. Sahraoui:
Properties and scopes in web model checking. 400-404 - Paola Inverardi, Leonardo Mostarda, Massimo Tivoli, Marco Autili:
Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. 405-409 - Neha Rungta, Eric G. Mercer:
A context-sensitive structural heuristic for guided search model checking. 410-413 - Willem Visser, Corina S. Pasareanu, Radek Pelánek:
Test input generation for red-black trees using abstraction. 414-417 - Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Mossé:
Testing in resource constrained execution environments. 418-422 - Justin Ward, Garrin Kimmell, Perry Alexander:
Prufrock: a framework for constructing polytypic theorem provers. 423-426
Formal tool demo presentations
- Guozheng Ge, E. James Whitehead Jr.:
Bamboo: an architecture modeling and code generation framework for configuration management systems. 427-428 - Jürgen Falb, Roman Popp, Thomas Röck, Helmut Jelinek, Edin Arnautovic, Hermann Kaindl:
Using communicative acts in high-level specifications of user interfaces for their automated synthesis. 429-430 - Jocelyn Simmonds, M. Cecilia Bastarrica:
A tool for automatic UML model consistency checking. 431-432 - Peter Stewart Hearty, Norman E. Fenton, Martin Neil, Patrick Cates:
Automated population of causal models for improved software risk assessment. 433-434
Doctoral symposium
- Steve M. Easterbrook, Sebastián Uchitel:
Introduction to doctoral symposium. 435 - Hui Wu, Jeff Gray:
Automated generation of testing tools for domain-specific languages. 436-439 - Renée C. Bryce, Charles J. Colbourn:
Constructing interaction test suites with greedy algorithms. 440-443 - Gudmund Grov:
Verifying the correctness of hume programs: an approach combining deductive and algorithmic reasoning. 444-447 - Yuehua Lin, Jeff Gray:
A model transformation approach to automatic model construction and evolution. 448-451 - Shiva Nejati:
Formal support for merging and negotiation. 456-460 - Jiang Zheng:
In regression testing selection when source code is not available. 452-455
Workshops
- Carsten Rudolph, Antonio Mana:
Specification and automated processing of security requirements (SAPS'05). 460 - Paul E. Black, Michael Kass:
Software security assurance tools, techniques and metrics (SSATTM). 461 - Jonathan I. Maletic, Giuliano Antoniol, Jane Cleland-Huang, Jane Huffman Hayes:
3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005). 462 - Ewen Denney, Bernd Fischer, Dieter Hutter, Mark Jones:
Software certificate management (SoftCeMent'05). 463 - Andrea Zisman, Thomas Ellman:
2nd Workshop on the state of the art in automated software engineering. 464
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.