default search action
28th APSEC 2021: Taipei, Taiwan
- 28th Asia-Pacific Software Engineering Conference, APSEC 2021, Taipei, Taiwan, December 6-9, 2021. IEEE 2021, ISBN 978-1-6654-3784-4
- Aiping Zhang, Kui Liu, Liming Fang, Qianjun Liu, Xinyu Yun, Shouling Ji:
Learn To Align: A Code Alignment Network For Code Clone Detection. 1-11 - Mouna Hammoudi, Christoph Mayr-Dorn, Atif Mashkoor, Alexander Egyed:
TraceRefiner: An Automated Technique for Refining Coarse-Grained Requirement-to-Class Traces. 12-21 - Kejun Li, Taiming Wang, Hui Liu:
NameChecker: Detecting Inconsistency between Method Names and Method Bodies. 22-31 - Stefan Schulz, Emanuel Herrendorf, Christoph Bockisch:
Thread-Sensitive Data Race Detection for Java. 32-42 - Asma Razgallah, Raphaël Khoury:
Behavioral classification of Android applications using system calls. 43-52 - Yu Wang, Huaxiao Liu, Shanquan Gao, Shujia Li:
Categorizing npm Packages by Analyzing the Text Information in Software Repositories. 53-60 - Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:
Tree-based Mining of Fine-grained Code Changes to Detect Unknown Change Patterns. 61-71 - Yang Yu, Minglai Shao, Hongyan Xu, Ying Sun, Wenjun Wang, Bofei Ma:
PGraph: A Graph-based Structure for Interactive Event Exploration on Social Media. 72-81 - Hongbing Wang, Qi Li:
Effective Bug Triage Based on a Hybrid Neural Network. 82-91 - Lingjia Li, Jian Cao, Qing Qi:
Monitoring Negative Sentiment-Related Events in Open Source Software Projects. 92-100 - Huaxi Jiang, Jie Zhu, Li Yang, Geng Liang, Chun Zuo:
DeepRelease: Language-agnostic Release Notes Generation from Pull Requests of Open-source Software. 101-110 - Zhifang Liao, Wenlong Li, Yan Zhang, Song Yu:
Detecting Duplicate Questions in Stack Overflow via Semantic and Relevance Approaches. 111-119 - Jessica Turner, Judy Bowen, Nikki van Zandwijk:
Interaction Modelling for IoT. 120-129 - Akira Mizutani, Masami Noro, Atsushi Sawada:
Design of Software Architecture for Neural Network Cooperation: Case of Forgery Detection. 130-140 - Elena N. Akimova, Alexander Yu. Bersenev, Artem A. Deikov, Konstantin S. Kobylkin, Anton V. Konygin, Ilya P. Mezentsev, Vladimir E. Misilov:
PyTraceBugs: A Large Python Code Dataset for Supervised Machine Learning in Software Defect Prediction. 141-151 - Weigang He, Xia Mao, Ting Su, Yanhong Huang, Jianqi Shi:
Data Flow Testing for PLC Programs via Dynamic Symbolic Execution. 152-160 - Hushuang Zeng, Jingxin Chen, Beijun Shen, Hao Zhong:
Mining API Constraints from Library and Client to Detect API Misuses. 161-170 - Jingxuan Zhang, Weiqin Zou, Zhiqiu Huang:
An Empirical Study on the Usage and Evolution of Identifier Styles in Practice. 171-180 - Xin Huang, He Zhang, Xin Zhou, Dong Shao, Letizia Jaccheri:
A Research Landscape of Software Engineering Education. 181-191 - Siyuan Liu, Jingxuan Zhang, Jiahui Liang, Junpeng Luo, Yong Xu, Chenxing Sun:
CHIS: A Novel Hybrid Granularity Identifier Splitting Approach. 192-201 - Yuxuan Li, Ruitao Feng, Sen Chen, Qianyu Guo, Lingling Fan, Xiaohong Li:
IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps. 202-212 - Guang Yang, Yanlin Zhou, Xiang Chen, Chi Yu:
Fine-grained Pseudo-code Generation Method via Code Feature Extraction and Transformer. 213-222 - Yusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow:
Improving Semantic Consistency of Variable Names with Use-Flow Graph Analysis. 223-232 - Yuchu Liu, David Issa Mattos, Jan Bosch, Helena Holmström Olsson, Jonn Lantz:
Bayesian propensity score matching in automotive embedded software engineering. 233-242 - Anas Dakkak, Hongyi Zhang, David Issa Mattos, Jan Bosch, Helena Holmström Olsson:
Towards Continuous Data Collection from In-service Products: Exploring the Relation Between Data Dimensions and Collection Challenges. 243-252 - Xiang Du, Liangze Yin, Haining Feng, Wei Dong:
Program Verification Enhanced Precise Analysis of Interrupt-Driven Program Vulnerabilities. 253-263 - Bo Gao, Siyuan Shen, Ling Shi, Jiaying Li, Jun Sun, Lei Bu:
Verification Assisted Gas Reduction for Smart Contracts. 264-274 - Sindre Beba, Magnus Melseth Karlsen, Jingyue Li, Bing Zhang:
Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports. 275-284 - Benjamin Koh, Mojtaba Shahin, Annette Ong, Soo Ying Yeap, Priyanka Saxena, Manvendra Singh, Chunyang Chen:
Pandemic Software Development: The Student Experiences from Developing a COVID-19 Information Dashboard. 285-295 - Yong-Jun Shin, Joon-Young Bae, Doo-Hwan Bae:
Concepts and Models of Environment of Self-Adaptive Systems: A Systematic Literature Review. 296-305 - Selin Aydin, Andreas Steffens, Horst Lichter:
Automated Construction of Continuous Delivery Pipelines from Architecture Models. 306-316 - Wenjie Li, Yanyan Jiang, Jun Ma, Chang Xu:
Automatic Performance Testing for Image Displaying in Android Apps. 317-326 - Kien-Tuan Ngo, Dinh-Truong Do, Thu-Trang Nguyen, Hieu Dinh Vo:
Ranking Warnings of Static Analysis Tools Using Representation Learning. 327-337 - Azeem Ahmad, Francisco Gomes de Oliveira Neto, Zhixiang Shi, Kristian Sandahl, Ola Leifler:
A Multi-factor Approach for Flaky Test Detection and Automated Root Cause Analysis. 338-348 - Lwin Khin Shar, Ta Nguyen Binh Duong, David Lo:
Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection. 349-359 - Yusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow:
How Do Programmers Express High-Level Concepts using Primitive Data Types? 360-368 - Wangshu Liu, Yongteng Zhu, Xiang Chen, Qing Gu, Xingya Wang, Shenkai Gu:
S2 LMMD: Cross-Project Software Defect Prediction via Statement Semantic Learning and Maximum Mean Discrepancy. 369-379 - Gregorius Airlangga, Alan Liu:
A Novel Architectural Design for Solving Lost-Link Problems in UAV Collaboration. 380-389 - Kiat Kian Anthony Chua, Doo-Hwan Bae, Eunkyoung Jee:
Metamorphic Testing for Reliability in System of Systems. 390-400 - Nataliya Berbyuk Lindström, Dina Koutsikouri, Miroslaw Staron, Wilhelm Meding, Ola Söder:
Understanding Metrics Team-Stakeholder Communication in Agile Metrics Service Delivery. 401-409 - Ishita Bardhan, Subhajit Datta, Subhashis Majumder:
Degree doesn't Matter: Identifying the Drivers of Interaction in Software Development Ecosystems. 410-420 - Stefan Fischer, Rudolf Ramler, Lukas Linsbauer:
Comparing Automated Reuse of Scripted Tests and Model-Based Tests for Configurable Software. 421-430 - Yizhen Chen, Ninad Chaudhari, Mei-Hwa Chen:
Context-Aware Regression Test Selection. 431-440 - Guangwei Li, Ting Yuan, Jie Lu, Lian Li, Xiaobin Zhang, Xu Song, Kejun Zhang:
Exposing Vulnerable Paths: Enhance Static Analysis with Lightweight Symbolic Execution. 441-451 - Pouya Ataei, Alan T. Litchfield:
NeoMycelia: A software reference architecturefor big data systems. 452-462 - M. Aiswarya Raj, Jan Bosch, Helena Holmström Olsson, Anders Jansson:
On the Impact of ML use cases on Industrial Data Pipelines. 463-472 - Chi Li, Yuexing Wang, Min Zhou, Ming Gu:
Scalable Fault Detection Based on Precise Access Path. 473-481 - Liming Dong, He Zhang, Lanxin Yang, Zhiluo Weng, Xin Yang, Xin Zhou, Zifan Pan:
Survey on Pains and Best Practices of Code Review. 482-491 - Tran Manh Cuong, Trung Kien Tran, Tan M. Nguyen, Thu-Trang Nguyen, Son Nguyen, Hieu Dinh Vo:
API parameter recommendation based on language model and program analysis. 492-496 - Yoriyuki Yamagata, Fabien Hervé, Yuji Fujiwara, Katsuro Inoue:
Finding repeated strings in code repositories and its applications to code-clone detection. 497-502 - Puneet Bhateja:
Probabilistic testing of asynchronously communicating systems. 503-508 - Rakshit Mittal, Dominique Blouin, Soumyadip Bandyopadhyay:
PNPEq: Verification of Scheduled Conditional Behavior in Embedded Software using Petri Nets. 509-514 - Hiroto Watanabe, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto, Toshiyuki Kurabayashi, Hiroyuki Kirinuki, Haruto Tanno:
Applying Multi-Objective Genetic Algorithm for Efficient Selection on Program Generation. 515-519 - Chong Wang, Tianyang Liu, Peng Liang, Maya Daneva, Marten van Sinderen:
The Role of User Reviews in App Updates: A Preliminary Investigation on App Release Notes. 520-525 - Ryoko Izuta, Shinsuke Matsumoto, Hiroshi Igaki, Sachio Saiki, Naoki Fukuyasu, Shinji Kusumoto:
Detecting Functional Differences using Automatic Test Generation for Automated Assessment in Programming Education. 526-530 - Humphrey O. Obie, Mojtaba Shahin, John Grundy, Burak Turhan, Li Li, Waqar Hussain, Jon Whittle:
Does Domain Change the Opinion of Individuals on Human Values? A Preliminary Investigation on eHealth Apps End-users. 531-535 - Yuwei Wang, Denis Conan, Sophie Chabridon, Kavoos Bojnourdi, Jingxuan Ma:
Runtime models and evolution graphs for the version management of microservice architectures. 536-541 - Kapil Singi, Kanchanjot Kaur Phokela, Sukhavasi Narendranath, Vikrant Kaulgud:
Framework for Recommending Data Residency Compliant Application Architecture. 542-546 - Anton V. Uzunov, Matthew Brennan, Mohan Baruwal Chhetri, Quoc Bao Vo, Ryszard Kowalczyk, John Wondoh:
AWaRE2-MM: A Meta-Model for Goal-Driven, Contract-Mediated, Team-Centric Autonomous Middleware Frameworks for Antifragility. 547-552 - Akira Fujimoto, Yoshiki Higo, Shinji Kusumoto:
Towards Accurate File Tracking Based on AST Differences. 553-558 - Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology. 559-563 - Ben Wang, Hanting Chu, Pengcheng Zhang, Hai Dong:
Smart Contract Vulnerability Detection Using Code Representation Fusion. 564-565 - Yi-Chun Yen, Bing-Yun Wang, Xin-Zhe Zhong, Wei-Yi Chiang, Chin-Yun Hsieh, Yu Chin Cheng:
Applying Problem Frames in Behavior-Driven Development for Smart Cone System. 566-567 - Aki Hongo, Naoya Nitta:
Towards a Dynamic Visualization of Complex Reverse-Engineered Object Collaboration. 568-569 - Norihiro Yoshida, Takahiro Shimizu, Ryota Yamamoto, Hiroaki Takada:
Extracting a Micro State Transition Table Using the KLEE Symbolic Execution Engine. 570-571 - Irving Rodriguez, Xiaoyin Wang:
Topic Trends in Issue Tracking System of Extended Reality Frameworks. 572-573 - Shaikh Mostafa, Xiaoyin Wang:
An Exploration Study On the Dependency Among Vulnerabilities and Bugs. 574-575 - Chu-Ti Lin, Sheng-Hsiang Yuan, Jutarporn Intasara:
A Learning-to-Rank Based Approach for Improving Regression Test Case Prioritization. 576-577 - Hasnaa E. L. Jihad, Morayo Adedjouma, Matteo Morelli:
Automated Fault Tree generation in Open-PSA from UML Models. 578-579 - Liqian Chen, Taoqing Chen, Guangsheng Fan, Banghu Yin:
Static Analysis of Resource Usage Bounds for Imperative Programs. 580-581 - Dongwook Choi, Jinseok Heo, Eunseok Lee:
Automated Feedback Generation for Multiple Function Programs. 582-583
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.