Default Cover Image

2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)

Nov. 6 2011 to Nov. 10 2011

Lawrence, KS, USA

ISBN: 978-1-4577-1638-6

Table of Contents

Papers
Welcome Message from the ChairsFreely available from IEEE.pp. iii-viii
ContentsFreely available from IEEE.pp. 1-7
Papers
Wikipedia and how to use it for semantic document representationFull-text access may be available. Sign in or learn about subscription options.pp. 1
Papers
Unifying testing and analysis through behavioral coverageFull-text access may be available. Sign in or learn about subscription options.pp. 2
Papers
Automated web application testing using search based software engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 3-12
Papers
Auto-locating and fix-propagating for HTML validation errors to PHP server-side codeFull-text access may be available. Sign in or learn about subscription options.pp. 13-22
Papers
Heap cloning: Enabling dynamic symbolic execution of java programsFull-text access may be available. Sign in or learn about subscription options.pp. 33-42
Papers
Automatic generation of load testsFull-text access may be available. Sign in or learn about subscription options.pp. 43-52
Papers
Symbolic search-based testingFull-text access may be available. Sign in or learn about subscription options.pp. 53-62
Papers
Automated documentation inference to explain failed testsFull-text access may be available. Sign in or learn about subscription options.pp. 63-72
Papers
Prioritizing tests for fault localization through ambiguity group reductionFull-text access may be available. Sign in or learn about subscription options.pp. 83-92
Generating program inputs for database application testingFull-text access may be available. Sign in or learn about subscription options.pp. 73-82
Papers
Identifying future field accesses in exhaustive state space traversalFull-text access may be available. Sign in or learn about subscription options.pp. 93-102
Papers
Supporting domain-specific state space reductions through local partial-order reductionFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Papers
Scalable and precise symbolic analysis for atomicity violationsFull-text access may be available. Sign in or learn about subscription options.pp. 123-132
Papers
Formalizing hardware/software interface specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 143-152
Papers
Safe asynchronous multicore memory operationsFull-text access may be available. Sign in or learn about subscription options.pp. 153-162
Papers
A rule-based approach to the semantic lifting of model differences in the context of model versioningFull-text access may be available. Sign in or learn about subscription options.pp. 163-172
Papers
A model-driven framework for guided design space explorationFull-text access may be available. Sign in or learn about subscription options.pp. 173-182
Papers
Automated extraction of architecture-level performance models of distributed component-based systemsFull-text access may be available. Sign in or learn about subscription options.pp. 183-192
Papers
Precomputing possible configuration error diagnosesFull-text access may be available. Sign in or learn about subscription options.pp. 193-202
Papers
An optimal strategy for algorithmic debuggingFull-text access may be available. Sign in or learn about subscription options.pp. 203-212
Papers
Localizing SQL faults in database applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 213-222
Papers
Improving automated documentation to code traceability by combining retrieval techniquesFull-text access may be available. Sign in or learn about subscription options.pp. 223-232
Papers
Iterative mining of resource-releasing specificationsFull-text access may be available. Sign in or learn about subscription options.pp. 233-242
Papers
Flexible design pattern detection based on feature typesFull-text access may be available. Sign in or learn about subscription options.pp. 243-252
Papers
Towards more accurate retrieval of duplicate bug reportsFull-text access may be available. Sign in or learn about subscription options.pp. 253-262
Papers
A topic-based approach for narrowing the search space of buggy files from a bug reportFull-text access may be available. Sign in or learn about subscription options.pp. 263-272
Papers
Specifying and detecting meaningful changes in programsFull-text access may be available. Sign in or learn about subscription options.pp. 273-282
Papers
Self-adaptive software meets control theory: A preliminary approach supporting reliability requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 283-292
Papers
Generalizing evolutionary coupling with stochastic dependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 293-302
Papers
Differential precondition checking: A lightweight, reusable analysis for refactoring toolsFull-text access may be available. Sign in or learn about subscription options.pp. 303-312
Papers
A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature modelsFull-text access may be available. Sign in or learn about subscription options.pp. 313-322
Papers
Finding relevant answers in software forumsFull-text access may be available. Sign in or learn about subscription options.pp. 323-332
Papers
Software process evaluation: A machine learning approachFull-text access may be available. Sign in or learn about subscription options.pp. 333-342
Papers
Local vs. global models for effort estimation and defect predictionFull-text access may be available. Sign in or learn about subscription options.pp. 343-351
Papers
Capacity planning for event-based systems using automated performance predictionsFull-text access may be available. Sign in or learn about subscription options.pp. 352-361
Papers
Ecological inference in empirical software engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 362-371
Papers
Detection of feature interactions using feature-aware verificationFull-text access may be available. Sign in or learn about subscription options.pp. 372-375
Papers
Querying source code with natural languageFull-text access may be available. Sign in or learn about subscription options.pp. 376-379
Papers
Coverage rewarded: Test input generation via adaptation-based programmingFull-text access may be available. Sign in or learn about subscription options.pp. 380-383
Papers
Mendel: Source code recommendation based on a genetic metaphorFull-text access may be available. Sign in or learn about subscription options.pp. 384-387
Papers
Optimizing the automatic test generation by SAT and SMT solving for Boolean expressionsFull-text access may be available. Sign in or learn about subscription options.pp. 388-391
Papers
Code-based automated program fixingFull-text access may be available. Sign in or learn about subscription options.pp. 392-395
Papers
Taming changes With 1.x-Way architecture-implementation mappingFull-text access may be available. Sign in or learn about subscription options.pp. 396-399
Papers
Evaluating test selection strategies for end-user specified flow-based applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 400-403
Papers
Towards dynamic backward slicing of model transformationsFull-text access may be available. Sign in or learn about subscription options.pp. 404-407
Papers
Mining test oracles of web search enginesFull-text access may be available. Sign in or learn about subscription options.pp. 408-411
Papers
AutoODC: Automated generation of Orthogonal Defect ClassificationsFull-text access may be available. Sign in or learn about subscription options.pp. 412-415
Papers
Observations on the connectedness between requirements-to-code traces and calling relationships for trace validationFull-text access may be available. Sign in or learn about subscription options.pp. 416-419
Papers
Proximity based weighting of test cases to improve spectrum based fault localizationFull-text access may be available. Sign in or learn about subscription options.pp. 420-423
Papers
Slicing feature modelsFull-text access may be available. Sign in or learn about subscription options.pp. 424-427
Papers
Using model checking to analyze static properties of declarative modelsFull-text access may be available. Sign in or learn about subscription options.pp. 428-431
Papers
Finding the merits and drawbacks of software resources from commentsFull-text access may be available. Sign in or learn about subscription options.pp. 432-435
Papers
Combining search-based and constraint-based testingFull-text access may be available. Sign in or learn about subscription options.pp. 436-439
Papers
Stateful testing: Finding more errors in code and contractsFull-text access may be available. Sign in or learn about subscription options.pp. 440-443
Papers
Do software engineers benefit from source code navigation with traceability? -- An experiment in software change managementFull-text access may be available. Sign in or learn about subscription options.pp. 444-447
Papers
Automating analysis of qualitative preferences in goal-oriented requirements engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 448-451
Papers
History slicingFull-text access may be available. Sign in or learn about subscription options.pp. 452-455
Papers
Analyzing temporal API usage patternsFull-text access may be available. Sign in or learn about subscription options.pp. 456-459
Papers
Isomorphism in model tools and editorsFull-text access may be available. Sign in or learn about subscription options.pp. 460-463
Papers
A case for alloy annotations for efficient incremental analysis via domain specific solversFull-text access may be available. Sign in or learn about subscription options.pp. 464-467
Papers
Exploring caching for efficient collection operationsFull-text access may be available. Sign in or learn about subscription options.pp. 468-471
Papers
Tracing requirements to tests with high precision and recallFull-text access may be available. Sign in or learn about subscription options.pp. 472-475
Papers
Extracting structured data from natural language documents with island parsingFull-text access may be available. Sign in or learn about subscription options.pp. 476-479
Papers
Run-time systems failure prediction via proactive monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 484-487
Papers
Towards an approach and framework for test-execution plan derivationFull-text access may be available. Sign in or learn about subscription options.pp. 488-491
Papers
Statistical debugging with elastic predicatesFull-text access may be available. Sign in or learn about subscription options.pp. 492-495
Papers
Diagnosis of software failures using computational geometryFull-text access may be available. Sign in or learn about subscription options.pp. 496-499
Papers
GitBAC: Flexible access control for non-modular concernsFull-text access may be available. Sign in or learn about subscription options.pp. 500-503
Papers
Client-side web application slicingFull-text access may be available. Sign in or learn about subscription options.pp. 504-507
Papers
Supporting activity based computing paradigm in global software developmentFull-text access may be available. Sign in or learn about subscription options.pp. 508-511
Papers
Inferred dependence coverage to support fault contextualizationFull-text access may be available. Sign in or learn about subscription options.pp. 512-515
Papers
Using model-based assurance to strengthen diagnostic proceduresFull-text access may be available. Sign in or learn about subscription options.pp. 516-519
Papers
Fault-localization using dynamic slicing and change impact analysisFull-text access may be available. Sign in or learn about subscription options.pp. 520-523
Papers
Improving source code search with natural language phrasal representations of method signaturesFull-text access may be available. Sign in or learn about subscription options.pp. 524-527
Papers
Deviation management during process executionFull-text access may be available. Sign in or learn about subscription options.pp. 528-531
Papers
PRECIS: Inferring invariants using program path guided clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 532-535
Papers
Automated planning for feature model configuration based on stakeholders' business concernsFull-text access may be available. Sign in or learn about subscription options.pp. 536-539
Papers
An adaptive approach to impact analysis from change requests to source codeFull-text access may be available. Sign in or learn about subscription options.pp. 540-543
Papers
Domain and value checking of web application invocation argumentsFull-text access may be available. Sign in or learn about subscription options.pp. 544-547
Papers
Mixed constraints for test input generation - An initial explorationFull-text access may be available. Sign in or learn about subscription options.pp. 548-551
Papers
Enhancing architectural recovery using concernsFull-text access may be available. Sign in or learn about subscription options.pp. 552-555
Papers
Search-based fault localizationFull-text access may be available. Sign in or learn about subscription options.pp. 556-559
Papers
Towards requirements aware systems: Run-time resolution of design-time assumptionsFull-text access may be available. Sign in or learn about subscription options.pp. 560-563
Papers
Generating essential user interface prototypes to validate requirementsFull-text access may be available. Sign in or learn about subscription options.pp. 564-567
Papers
Automatically exploring how uncertainty impacts behavior of dynamically adaptive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 568-571
Papers
iDiff: Interaction-based program differencing toolFull-text access may be available. Sign in or learn about subscription options.pp. 572-575
Papers
CloneDifferentiator: Analyzing clones by differentiationFull-text access may be available. Sign in or learn about subscription options.pp. 576-579
Papers
Implementing efficient model validation in EMF toolsFull-text access may be available. Sign in or learn about subscription options.pp. 580-583
Papers
JPF-AWT: Model checking GUI applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 584-587
Papers
The CORE system: Animation and functional correctness of pointer programsFull-text access may be available. Sign in or learn about subscription options.pp. 588-591
APIExample: An effective web search based usage example recommendation system for java APIsFull-text access may be available. Sign in or learn about subscription options.pp. 592-595
Papers
BEST: A symbolic testing tool for predicting multi-threaded program failuresFull-text access may be available. Sign in or learn about subscription options.pp. 596-599
Papers
Decomposing feature models: language, environment, and applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 600-603
Papers
SAUML: A tool for symbolic analysis of UML-RT modelsFull-text access may be available. Sign in or learn about subscription options.pp. 604-607
Showing 100 out of 114