Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ASE
ASE 2011
Generate Citations
2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011)
Nov. 6 2011 to Nov. 10 2011
Lawrence, KS, USA
ISBN: 978-1-4577-1638-6
Table of Contents
Papers
Welcome Message from the Chairs
Freely available from IEEE.
pp. iii-viii
Contents
Freely available from IEEE.
pp. 1-7
Papers
Wikipedia and how to use it for semantic document representation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1
by
Ian H. Witten
Papers
Unifying testing and analysis through behavioral coverage
Full-text access may be available. Sign in or learn about subscription options.
pp. 2
by
Matthew B. Dwyer
Papers
Automated web application testing using search based software engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-12
by
Nadia Alshahwan
,
Mark Harman
Papers
Auto-locating and fix-propagating for HTML validation errors to PHP server-side code
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-22
by
Hung Viet Nguyen
,
Hoan Anh Nguyen
,
Tung Thanh Nguyen
,
Tien N. Nguyen
Papers
Scaling up automated test generation: Automatically generating maintainable regression unit tests for programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-32
by
Brian Robinson
,
Michael D. Ernst
,
Jeff H. Perkins
,
Vinay Augustine
,
Nuo Li
Papers
Heap cloning: Enabling dynamic symbolic execution of java programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-42
by
Saswat Anand
,
Mary Jean Harrold
Papers
Automatic generation of load tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-52
by
Pingyu Zhang
,
Sebastian Elbaum
,
Matthew B. Dwyer
Papers
Symbolic search-based testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-62
by
Arthur Baars
,
Mark Harman
,
Youssef Hassoun
,
Kiran Lakhotia
,
Phil McMinn
,
Paolo Tonella
,
Tanja Vos
Papers
Automated documentation inference to explain failed tests
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-72
by
Sai Zhang
,
Cheng Zhang
,
Michael D. Ernst
Papers
Prioritizing tests for fault localization through ambiguity group reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-92
by
Alberto Gonzalez-Sanchez
,
Rui Abreu
,
Hans-Gerhard Gross
,
Arjan J.C. van Gemund
Generating program inputs for database application testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Kai Pan
,
Xintao Wu
,
Tao Xie
Papers
Identifying future field accesses in exhaustive state space traversal
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-102
by
Pavel Parizek
,
Pavel Parízek
,
Ondrej Lhotak
Papers
Model checking distributed systems by combining caching and process checkpointing
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-112
by
Watcharin Leungwattanakit
,
Cyrille Artho
,
Masami Hagiya
,
Yoshinori Tanabe
,
Mitsuharu Yamamoto
Papers
Supporting domain-specific state space reductions through local partial-order reduction
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-122
by
Peter Bokor
,
Johannes Kinder
,
Marco Serafini
,
Neeraj Suri
Papers
Scalable and precise symbolic analysis for atomicity violations
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-132
by
Malay K. Ganai
Papers
DC2: A framework for scalable, scope-bounded software verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-142
by
Franjo Ivancic
,
Gogul Balakrishnan
,
Aarti Gupta
,
Sriram Sankaranarayanan
,
Naoto Maeda
,
Hiroki Tokuoka
,
Takashi Imoto
,
Yoshiaki Miyazaki
Papers
Formalizing hardware/software interface specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-152
by
Juncao Li
,
Fei Xie
,
Thomas Ball
,
Vladimir Levin
,
Con McGarvey
Papers
Safe asynchronous multicore memory operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-162
by
Matko Botincan
,
Mike Dodds
,
Alastair F. Donaldson
,
Matthew J. Parkinson
Papers
A rule-based approach to the semantic lifting of model differences in the context of model versioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-172
by
Timo Kehrer
,
Udo Kelter
,
Gabriele Taentzer
Papers
A model-driven framework for guided design space exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 173-182
by
Abel Hegedus
,
Akos Horvath
,
Istvan Rath
,
Daniel Varro
Papers
Automated extraction of architecture-level performance models of distributed component-based systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-192
by
Fabian Brosig
,
Nikolaus Huber
,
Samuel Kounev
Papers
Precomputing possible configuration error diagnoses
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-202
by
Ariel Rabkin
,
Randy Katz
Papers
An optimal strategy for algorithmic debugging
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-212
by
David Insa
,
Josep Silva
Papers
Localizing SQL faults in database applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 213-222
by
Sarah R. Clark
,
Jake Cobb
,
Gregory M. Kapfhammer
,
James A. Jones
,
Mary Jean Harrold
Papers
Improving automated documentation to code traceability by combining retrieval techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-232
by
Xiaofan Chen
,
John Grundy
Papers
Iterative mining of resource-releasing specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-242
by
Qian Wu
,
Guangtai Liang
,
Qianxiang Wang
,
Tao Xie
,
Hong Mei
Papers
Flexible design pattern detection based on feature types
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-252
by
Ghulam Rasool
,
Patrick Mader
Papers
Towards more accurate retrieval of duplicate bug reports
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-262
by
Chengnian Sun
,
David Lo
,
Siau-Cheng Khoo
,
Jing Jiang
Papers
A topic-based approach for narrowing the search space of buggy files from a bug report
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-272
by
Anh Tuan Nguyen
,
Tung Thanh Nguyen
,
Jafar Al-Kofahi
,
Hung Viet Nguyen
,
Tien N. Nguyen
Papers
Specifying and detecting meaningful changes in programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-282
by
Yijun Yu
,
Thein Than Tun
,
Bashar Nuseibeh
Papers
Self-adaptive software meets control theory: A preliminary approach supporting reliability requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 283-292
by
Antonio Filieri
,
Carlo Ghezzi
,
Alberto Leva
,
Martina Maggio
Papers
Generalizing evolutionary coupling with stochastic dependencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-302
by
Sunny Wong
,
Yuanfang Cai
Papers
Differential precondition checking: A lightweight, reusable analysis for refactoring tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-312
by
Jeffrey L. Overbey
,
Ralph E. Johnson
Papers
A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature models
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-322
by
Richard Pohl
,
Kim Lauenroth
,
Klaus Pohl
Papers
Finding relevant answers in software forums
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-332
by
Swapna Gottipati
,
David Lo
,
Jing Jiang
Papers
Software process evaluation: A machine learning approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-342
by
Ning Chen
,
Steven C. H. Hoi
,
Xiaokui Xiao
Papers
Local vs. global models for effort estimation and defect prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-351
by
Tim Menzies
,
Andrew Butcher
,
Andrian Marcus
,
Thomas Zimmermann
,
David Cok
Papers
Capacity planning for event-based systems using automated performance predictions
Full-text access may be available. Sign in or learn about subscription options.
pp. 352-361
by
Christoph Rathfelder
,
Samuel Kounev
,
David Evans
Papers
Ecological inference in empirical software engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-371
by
Daryl Posnett
,
Vladimir Filkov
,
Premkumar Devanbu
Papers
Detection of feature interactions using feature-aware verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-375
by
Sven Apel
,
Hendrik Speidel
,
Philipp Wendler
,
Alexander von Rhein
,
Dirk Beyer
Papers
Querying source code with natural language
Full-text access may be available. Sign in or learn about subscription options.
pp. 376-379
by
Markus Kimmig
,
Martin Monperrus
,
Mira Mezini
Papers
Coverage rewarded: Test input generation via adaptation-based programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 380-383
by
Alex Groce
Papers
Mendel: Source code recommendation based on a genetic metaphor
Full-text access may be available. Sign in or learn about subscription options.
pp. 384-387
by
Angela Lozano
,
Andy Kellens
,
Kim Mens
Papers
Optimizing the automatic test generation by SAT and SMT solving for Boolean expressions
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-391
by
Paolo Arcaini
,
Angelo Gargantini
,
Elvinia Riccobene
Papers
Code-based automated program fixing
Full-text access may be available. Sign in or learn about subscription options.
pp. 392-395
by
Yu Pei
,
Yi Wei
,
Carlo A. Furia
,
Martin Nordio
,
Bertrand Meyer
Papers
Taming changes With 1.x-Way architecture-implementation mapping
Full-text access may be available. Sign in or learn about subscription options.
pp. 396-399
by
Yongjie Zheng
,
Richard N. Taylor
Papers
Evaluating test selection strategies for end-user specified flow-based applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 400-403
by
Kristina Winbladh
,
Anand Ranganathan
Papers
Towards dynamic backward slicing of model transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 404-407
by
Zoltan Ujhelyi
,
Akos Horvath
,
Daniel Varro
Papers
Mining test oracles of web search engines
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-411
by
Wujie Zheng
,
Hao Ma
,
Michael R. Lyu
,
Tao Xie
,
Irwin King
Papers
AutoODC: Automated generation of Orthogonal Defect Classifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 412-415
by
LiGuo Huang
,
Vincent Ng
,
Isaac Persing
,
Ruili Geng
,
Xu Bai
,
Jeff Tian
Papers
Observations on the connectedness between requirements-to-code traces and calling relationships for trace validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 416-419
by
Achraf Ghabi
,
Alexander Egyed
Papers
Proximity based weighting of test cases to improve spectrum based fault localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 420-423
by
Aritra Bandyopadhyay
,
Sudipto Ghosh
Papers
Slicing feature models
Full-text access may be available. Sign in or learn about subscription options.
pp. 424-427
by
Mathieu Acher
,
Philippe Collet
,
Philippe Lahire
,
Robert B. France
Papers
Using model checking to analyze static properties of declarative models
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-431
by
Amirhossein Vakili
,
Nancy A. Day
Papers
Finding the merits and drawbacks of software resources from comments
Full-text access may be available. Sign in or learn about subscription options.
pp. 432-435
by
Changsheng Liu
,
Yanzhen Zou
,
Sibo Cai
,
Bing Xie
,
Hong Mei
Papers
Combining search-based and constraint-based testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 436-439
by
Jan Malburg
,
Gordon Fraser
Papers
Stateful testing: Finding more errors in code and contracts
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-443
by
Yi Wei
,
Hannes Roth
,
Carlo A. Furia
,
Yu Pei
,
Alexander Horton
,
Michael Steindorfer
,
Martin Nordio
,
Bertrand Meyer
Papers
Do software engineers benefit from source code navigation with traceability? -- An experiment in software change management
Full-text access may be available. Sign in or learn about subscription options.
pp. 444-447
by
Patrick Mader
,
Alexander Egyed
Papers
Automating analysis of qualitative preferences in goal-oriented requirements engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 448-451
by
Zachary J. Oster
,
Ganesh Ram Santhanam
,
Samik Basu
Papers
History slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-455
by
Francisco Servant
,
James A. Jones
Papers
Analyzing temporal API usage patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-459
by
Gias Uddin
,
Barthelemy Dagenais
,
Martin P. Robillard
Papers
Isomorphism in model tools and editors
Full-text access may be available. Sign in or learn about subscription options.
pp. 460-463
by
George Edwards
,
Yuriy Brun
,
Nenad Medvidovic
Papers
A case for alloy annotations for efficient incremental analysis via domain specific solvers
Full-text access may be available. Sign in or learn about subscription options.
pp. 464-467
by
Svetoslav Ganov
,
Sarfraz Khurshid
,
Dewayne E. Perry
Papers
Exploring caching for efficient collection operations
Full-text access may be available. Sign in or learn about subscription options.
pp. 468-471
by
Swetha Surapaneni
,
Venkata Krishna Suhas Nerella
,
Sanjay K Madria
,
Thomas Weigert
Papers
Tracing requirements to tests with high precision and recall
Full-text access may be available. Sign in or learn about subscription options.
pp. 472-475
by
Celal Ziftci
,
Ingolf Krueger
Papers
Extracting structured data from natural language documents with island parsing
Full-text access may be available. Sign in or learn about subscription options.
pp. 476-479
by
Alberto Bacchelli
,
Anthony Cleve
,
Michele Lanza
,
Andrea Mocci
Papers
GRoundTram: An integrated framework for developing well-behaved bidirectional model transformations
Full-text access may be available. Sign in or learn about subscription options.
pp. 480-483
by
Soichiro Hidaka
,
Zhenjiang Hu
,
Kazuhiro Inaba
,
Hiroyuki Kato
,
Keisuke Nakano
Papers
Run-time systems failure prediction via proactive monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 484-487
by
Pengcheng Zhang
,
Henry Muccini
,
Andrea Polini
,
Xuandong Li
Papers
Towards an approach and framework for test-execution plan derivation
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-491
by
Soham Sundar Chakraborty
,
Vipul Shah
Papers
Statistical debugging with elastic predicates
Full-text access may be available. Sign in or learn about subscription options.
pp. 492-495
by
Ross Gore
,
Paul F. Reynolds
,
David Kamensky
Papers
Diagnosis of software failures using computational geometry
Full-text access may be available. Sign in or learn about subscription options.
pp. 496-499
by
Edward Stehle
,
Kevin Lynch
,
Maxim Shevertalov
,
Chris Rorres
,
Spiros Mancoridis
Papers
GitBAC: Flexible access control for non-modular concerns
Full-text access may be available. Sign in or learn about subscription options.
pp. 500-503
by
Mark Robinson
,
Jianwei Niu
,
Macneil Shonle
Papers
Client-side web application slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 504-507
by
Josip Maras
,
Jan Carlson
,
Ivica Crnkovic
Papers
Supporting activity based computing paradigm in global software development
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-511
by
Paolo Tell
,
Muhammad Ali Babar
Papers
Inferred dependence coverage to support fault contextualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 512-515
by
Fang Deng
,
James A. Jones
Papers
Using model-based assurance to strengthen diagnostic procedures
Full-text access may be available. Sign in or learn about subscription options.
pp. 516-519
by
Robyn Lutz
,
Jeremy Johnson
,
Ann Patterson-Hine
Papers
Fault-localization using dynamic slicing and change impact analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 520-523
by
Elton Alves
,
Milos Gligoric
,
Vilas Jagannath
,
Marcelo d'Amorim
Papers
Improving source code search with natural language phrasal representations of method signatures
Full-text access may be available. Sign in or learn about subscription options.
pp. 524-527
by
Emily Hill
,
Lori Pollock
,
K. Vijay-Shanker
Papers
Deviation management during process execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 528-531
by
Marcos Aurelio Almeida da Silva
,
Xavier Blanc
,
Reda Bendraou
Papers
PRECIS: Inferring invariants using program path guided clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 532-535
by
Parth Sagdeo
,
Viraj Athavale
,
Sumant Kowshik
,
Shobha Vasudevan
Papers
Automated planning for feature model configuration based on stakeholders' business concerns
Full-text access may be available. Sign in or learn about subscription options.
pp. 536-539
by
Samaneh Soltani
,
Mohsen Asadi
,
Marek Hatala
,
Dragan Gasevic
,
Ebrahim Bagheri
Papers
An adaptive approach to impact analysis from change requests to source code
Full-text access may be available. Sign in or learn about subscription options.
pp. 540-543
by
Malcom Gethers
,
Huzefa Kagdi
,
Bogdan Dit
,
Denys Poshyvanyk
Papers
Domain and value checking of web application invocation arguments
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-547
by
William G.J. Halfond
Papers
Mixed constraints for test input generation - An initial exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 548-551
by
Shadi Abdul Khalek
,
Vidya Priyadarshini Narayanan
,
Sarfraz Khurshid
Papers
Enhancing architectural recovery using concerns
Full-text access may be available. Sign in or learn about subscription options.
pp. 552-555
by
Joshua Garcia
,
Daniel Popescu
,
Chris Mattmann
,
Nenad Medvidovic
,
Yuanfang Cai
Papers
Search-based fault localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 556-559
by
Shaowei Wang
,
David Lo
,
Lingxiao Jiang
,
Lucia
,
Hoong Chuin Lau
Papers
Towards requirements aware systems: Run-time resolution of design-time assumptions
Full-text access may be available. Sign in or learn about subscription options.
pp. 560-563
by
Kristopher Welsh
,
Pete Sawyer
,
Nelly Bencomo
Papers
Generating essential user interface prototypes to validate requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 564-567
by
Massila Kamalrudin
,
John Grundy
Papers
Automatically exploring how uncertainty impacts behavior of dynamically adaptive systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 568-571
by
Andres J. Ramirez
,
Adam C. Jensen
,
Betty H. C. Cheng
,
David B. Knoester
Papers
iDiff: Interaction-based program differencing tool
Full-text access may be available. Sign in or learn about subscription options.
pp. 572-575
by
Hoan Anh Nguyen
,
Tung Thanh Nguyen
,
Hung Viet Nguyen
,
Tien N. Nguyen
Papers
CloneDifferentiator: Analyzing clones by differentiation
Full-text access may be available. Sign in or learn about subscription options.
pp. 576-579
by
Zhenchang Xing
,
Yinxing Xue
,
Stan Jarzabek
Papers
Implementing efficient model validation in EMF tools
Full-text access may be available. Sign in or learn about subscription options.
pp. 580-583
by
Gabor Bergmann
,
Abel Hegedus
,
Akos Horvath
,
Istvan Rath
,
Zoltan Ujhelyi
,
Daniel Varro
Papers
JPF-AWT: Model checking GUI applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 584-587
by
Peter Mehlitz
,
Oksana Tkachuk
,
Mateusz Ujma
Papers
The CORE system: Animation and functional correctness of pointer programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 588-591
by
Ewen Maclean
,
Andrew Ireland
,
Gudmund Grov
APIExample: An effective web search based usage example recommendation system for java APIs
Full-text access may be available. Sign in or learn about subscription options.
pp. 592-595
by
Lijie Wang
,
Lu Fang
,
Leye Wang
,
Ge Li
,
Bing Xie
,
Fuqing Yang
Papers
BEST: A symbolic testing tool for predicting multi-threaded program failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 596-599
by
Malay K. Ganai
,
Nipun Arora
,
Chao Wang
,
Aarti Gupta
,
Gogul Balakrishnan
Papers
Decomposing feature models: language, environment, and applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 600-603
by
Mathieu Acher
,
Philippe Collet
,
Philippe Lahire
,
Robert B. France
Papers
SAUML: A tool for symbolic analysis of UML-RT models
Full-text access may be available. Sign in or learn about subscription options.
pp. 604-607
by
Karolina Zurowska
,
Juergen Dingel
Showing 100 out of 114
Load More
Load All