Default Cover Image

2014 21st Asia-Pacific Software Engineering Conference (APSEC)

Dec. 1 2014 to Dec. 4 2014

Jeju, South Korea

Volume:

Table of Contents

[Title page i - Vol 1]Freely available from IEEE.pp. i-i
[Title page iii - Vol 1]Freely available from IEEE.pp. iii-iii
[Copyright notice - Vol 1]Freely available from IEEE.pp. iv-iv
Table of contents - Vol 1Freely available from IEEE.pp. v-x
Message from the General Chair - Volume 1Freely available from IEEE.pp. xi-xi
Message from the Program Chairs - Volume 1Freely available from IEEE.pp. xii-xiii
Committee Organizers - Volume 1Freely available from IEEE.pp. xiv-xiv
Program Committee - Volume 1Freely available from IEEE.pp. xv-xvi
Steering Committee - Volume 1Freely available from IEEE.pp. xvii-xvii
A Test Scenario Design Methodology Based on Business Context Modeling and Its EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
Test Scenario Generation for Reliability Tactics from UML Sequence DiagramFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Test Case Prioritization Based on Information Retrieval ConceptsFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
User Guided Automation for Testing Mobile AppsFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
Modeling and Testing of GUIs Using IOLTSFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
Improving Testing Coverage for Safety-Critical System by Mutated SpecificationFull-text access may be available. Sign in or learn about subscription options.pp. 43-46
A Framework for Distributed Testing of Timed Composite SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 47-54
SAT-Based Bounded Software Model Checking for Embedded Software: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 55-62
Model Checking of Software Product Lines in Presence of Nondeterminism and ProbabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 63-70
Effect of Model Based Software Development on Productivity of Enhancement Tasks -- An Industrial StudyFull-text access may be available. Sign in or learn about subscription options.pp. 71-77
pIML -- An Interrupt Program Modelling Language for Real-Time and Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 78-85
Formal Modeling and Analyzing the Reliability for Service CompositionFull-text access may be available. Sign in or learn about subscription options.pp. 86-93
Early Experience with Model-Driven Development of MapReduce Based Big Data ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 94-97
Modeling Web Attachment Storage for Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 98-102
A Context-Role Based Modeling Framework for Engineering Adaptive Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 103-110
A Model-Driven Approach to Generate Mobile Applications for Multiple PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 111-118
Predicting Next Changes at the Fine-Grained LevelFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
Synchronization Error Detection of MPI Programs by Symbolic ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 127-134
Guidelines for the Use of Function Block Diagram in Reactor Protection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Traceability-Driven System Development and its Application to Automotive System DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 143-146
Handling Emergency Mode Switch for Component-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 151-158
Interactive Scalable Abstraction of Reverse Engineered UML Class DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 159-166
Context Sensitive Dynamic Slicing of Concurrent Aspect-Oriented ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
An Efficient Application-Device Matching Method for the Mobile Software EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
Experience on a Microservice-Based Reference Architecture for Measurement SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 183-190
Customer Requirements Validation Method Based on Mental ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
Outliers and Replication in Software EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
An Empirical Study on the Adequacy of Testing in Open Source ProjectsFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
Recovery of Object Oriented Features from C++ BinariesFull-text access may be available. Sign in or learn about subscription options.pp. 231-238
Process Cube for Software Defect ResolutionFull-text access may be available. Sign in or learn about subscription options.pp. 239-246
Improving Fuzzy Analogy Based Software Development Effort EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 247-254
Runtime Verification by Convergent Formula ProgressionFull-text access may be available. Sign in or learn about subscription options.pp. 255-262
Reviewing Formal Specification for Validation Using Animation and Trace LinksFull-text access may be available. Sign in or learn about subscription options.pp. 263-270
A Symbolic Partial Order Method for Verifying SystemCFull-text access may be available. Sign in or learn about subscription options.pp. 271-278
A Probabilistic Neural Network-Based Approach for Related Software Changes DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 279-286
Using Genetic Algorithms to Repair JUnit Test CasesFull-text access may be available. Sign in or learn about subscription options.pp. 287-294
Evaluation of Maude as a Test Generation Engine for Automotive Operating SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 295-302
Learning Summaries of Recursive FunctionsFull-text access may be available. Sign in or learn about subscription options.pp. 303-310
A Tool to Suggest Similar Program Element ModificationsFull-text access may be available. Sign in or learn about subscription options.pp. 311-318
GAIN: GPU-Based Constraint Checking for Context ConsistencyFull-text access may be available. Sign in or learn about subscription options.pp. 319-326
Who Should Review this Pull-Request: Reviewer Recommendation to Expedite Crowd CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 335-342
A Exploratory Study of @-Mention in GitHub's Pull-RequestsFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
Verifying Secure Interface Composition for Component-Based System DesignsFull-text access may be available. Sign in or learn about subscription options.pp. 359-366
Security Weaknesses Detection by Symbolic Analysis of ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 367-374
Formal Design and Verification of Zone ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 375-382
Mining Developer Mailing List to Predict Software DefectsFull-text access may be available. Sign in or learn about subscription options.pp. 383-390
SHAP: Suppressing the Detection of Inconsistency Hazards by Pattern LearningFull-text access may be available. Sign in or learn about subscription options.pp. 391-398
Automatic Classification of UML Class Diagrams from ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 399-406
Runtime Checking for Paired Functions in Device DriversFull-text access may be available. Sign in or learn about subscription options.pp. 407-414
BP-Miner: Mining Paired Functions from the Binary Code of Drivers for Error HandlingFull-text access may be available. Sign in or learn about subscription options.pp. 415-422
Data Flow Based Integration Testing for Embedded System Using Interaction ModelFull-text access may be available. Sign in or learn about subscription options.pp. 423-429
An Efficient Method for Assessing the Impact of Refactoring Candidates on Maintainability Based on Matrix ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 430-437
A Proved Approach for Building Correct Instances of UML Associations: Multiplicities SatisfactionFull-text access may be available. Sign in or learn about subscription options.pp. 438-445
Author index - Vol 1Freely available from IEEE.pp. 446-448
[Publisher's information - Vol 2]Freely available from IEEE.pp. 450-450
Showing 69 out of 69