Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
APSEC
APSEC 2014
Generate Citations
2014 21st Asia-Pacific Software Engineering Conference (APSEC)
Dec. 1 2014 to Dec. 4 2014
Jeju, South Korea
Volume:
1
2
Table of Contents
[Title page i - Vol 1]
Freely available from IEEE.
pp. i-i
[Title page iii - Vol 1]
Freely available from IEEE.
pp. iii-iii
[Copyright notice - Vol 1]
Freely available from IEEE.
pp. iv-iv
Table of contents - Vol 1
Freely available from IEEE.
pp. v-x
Message from the General Chair - Volume 1
Freely available from IEEE.
pp. xi-xi
Message from the Program Chairs - Volume 1
Freely available from IEEE.
pp. xii-xiii
Committee Organizers - Volume 1
Freely available from IEEE.
pp. xiv-xiv
Program Committee - Volume 1
Freely available from IEEE.
pp. xv-xvi
Steering Committee - Volume 1
Freely available from IEEE.
pp. xvii-xvii
A Test Scenario Design Methodology Based on Business Context Modeling and Its Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-10
by
Norifumi Nomura
,
Yasuhiro Kikushima
,
Mikio Aoyama
Test Scenario Generation for Reliability Tactics from UML Sequence Diagram
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-18
by
Xiang Qiu
,
Li Zhang
Test Case Prioritization Based on Information Retrieval Concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Jung-Hyun Kwon
,
In-Young Ko
,
Gregg Rothermel
,
Matt Staats
User Guided Automation for Testing Mobile Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-34
by
Xiujiang Li
,
Yanyan Jiang
,
Yepang Liu
,
Chang Xu
,
Xiaoxing Ma
,
Jian Lu
Modeling and Testing of GUIs Using IOLTS
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-42
by
Shengbo Chen
,
Dashen Sun
,
Huaikou Miao
,
Hongwei Zeng
Improving Testing Coverage for Safety-Critical System by Mutated Specification
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-46
by
Tingliang Zhou
,
Haiying Sun
,
Jing Liu
,
Xiaohong Chen
,
Dehui Du
A Framework for Distributed Testing of Timed Composite Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-54
by
Huu Nghia Nguyen
,
Fatiha Zaidi
,
Ana Cavalli
SAT-Based Bounded Software Model Checking for Embedded Software: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Yunho Kim
,
Moonzoo Kim
Model Checking of Software Product Lines in Presence of Nondeterminism and Probabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-70
by
Mahsa Varshosaz
,
Ramtin Khosravi
Effect of Model Based Software Development on Productivity of Enhancement Tasks -- An Industrial Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-77
by
Damodaram Kamma
,
G. Sasi Kumar
pIML -- An Interrupt Program Modelling Language for Real-Time and Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 78-85
by
Xin Li
,
Yanhong Huang
,
Jianqi Shi
,
Jian Guo
,
Huibiao Zhu
,
Yuanmin Xu
Formal Modeling and Analyzing the Reliability for Service Composition
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-93
by
Guisheng Fan
,
Huiqun Yu
,
Liqiong Chen
,
Dongmei Liu
Early Experience with Model-Driven Development of MapReduce Based Big Data Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-97
by
Asha Rajbhoj
,
Vinay Kulkarni
,
Nikhil Bellarykar
Modeling Web Attachment Storage for Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-102
by
Vijay Jain
,
Amol Kolambkar
A Context-Role Based Modeling Framework for Engineering Adaptive Software Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-110
by
Tetsuo Tamai
,
Supasit Monpratarnchai
A Model-Driven Approach to Generate Mobile Applications for Multiple Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-118
by
Muhammad Usman
,
Muhammad Zohaib Iqbal
,
Muhammad Uzair Khan
Predicting Next Changes at the Fine-Grained Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-126
by
Hiroaki Murakami
,
Keisuke Hotta
,
Yoshiki Higo
,
Shinji Kusumoto
Synchronization Error Detection of MPI Programs by Symbolic Execution
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-134
by
Xianjin Fu
,
Zhenbang Chen
,
Chun Huang
,
Wei Dong
,
Ji Wang
Guidelines for the Use of Function Block Diagram in Reactor Protection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-142
by
Dong-Ah Lee
,
Junbeom Yoo
,
Jang-Soo Lee
Traceability-Driven System Development and its Application to Automotive System Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-146
by
Hyun Cho
A Lifecycle-Based Design Methodology of the Lightweight Ontology and Its Application to Cultivating High Quality Mandarin Orange
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-150
by
Reiko Fujimoto
,
Mikio Aoyama
Handling Emergency Mode Switch for Component-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-158
by
Yin Hang
,
Hans Hansson
Interactive Scalable Abstraction of Reverse Engineered UML Class Diagrams
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-166
by
Mohd Hafeez Osman
,
Michel R.V. Chaudron
,
Peter Van Der Putten
Context Sensitive Dynamic Slicing of Concurrent Aspect-Oriented Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-174
by
Jagannath Singh
,
Dishant Munjal
,
Durga Prasad Mohapatra
An Efficient Application-Device Matching Method for the Mobile Software Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-182
by
Heuijin Lee
,
Sungwon Kang
,
Myungchul Kim
Experience on a Microservice-Based Reference Architecture for Measurement Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-190
by
Matthias Vianden
,
Horst Lichter
,
Andreas Steffens
Run-Time Monitoring-Based Evaluation and Communication Integrity Validation of Software Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-198
by
Ana Dragomir
,
Horst Lichter
,
Johannes Dohmen
,
Hongyu Chen
Customer Requirements Validation Method Based on Mental Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-206
by
Youn Kyu Lee
,
Hoh Peter In
,
Rick Kazman
Outliers and Replication in Software Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Henrik Larsson
,
Erik Lindqvist
,
Richard Torkar
An Empirical Study on the Adequacy of Testing in Open Source Projects
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-222
by
Pavneet Singh Kochhar
,
Ferdian Thung
,
David Lo
,
Julia Lawall
A Novel Developer Ranking Algorithm for Automatic Bug Triage Using Topic Model and Developer Relations
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-230
by
Tao Zhang
,
Geunseok Yang
,
Byungjeong Lee
,
Eng Keong Lua
Recovery of Object Oriented Features from C++ Binaries
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-238
by
Kyungjin Yoo
,
Rajeev Barua
Process Cube for Software Defect Resolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-246
by
Monika Gupta
,
Ashish Sureka
Improving Fuzzy Analogy Based Software Development Effort Estimation
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-254
by
Fatima Azzahra Amazal
,
Ali Idri
,
Alain Abran
Runtime Verification by Convergent Formula Progression
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-262
by
Yan Shen
,
Jianwen Li
,
Zheng Wang
,
Ting Su
,
Bin Fang
,
Geguang Pu
,
Wanwei Liu
,
Mingsong Chen
Reviewing Formal Specification for Validation Using Animation and Trace Links
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-270
by
Mo Li
,
Shaoying Liu
A Symbolic Partial Order Method for Verifying SystemC
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-278
by
Naiju Zeng
,
Wenhui Zhang
A Probabilistic Neural Network-Based Approach for Related Software Changes Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-286
by
Yuan Huang
,
Xiangping Chen
,
Qiwen Zou
,
Xiaonan Luo
Using Genetic Algorithms to Repair JUnit Test Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 287-294
by
Yong Xu
,
Bo Huang
,
Guoqing Wu
,
Mengting Yuan
Evaluation of Maude as a Test Generation Engine for Automotive Operating Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-302
by
Yunja Choi
,
Min Zhang
,
Kazuhiro Ogata
Learning Summaries of Recursive Functions
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-310
by
Yu-Fang Chen
,
Bow-Yaw Wang
,
Kai-Chun Yang
A Tool to Suggest Similar Program Element Modifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 311-318
by
Yujiang Yang
,
Kazunori Sakamoto
,
Hironori Washizaki
,
Yoshiaki Fukazawa
GAIN: GPU-Based Constraint Checking for Context Consistency
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-326
by
Jun Sui
,
Chang Xu
,
Wang Xi
,
Yanyan Jiang
,
Chun Cao
,
Xiaoxin Ma
,
Jian Lu
Factors Affecting the Project Performance of Information Systems Development: Comparison of Organizational Cultures
Full-text access may be available. Sign in or learn about subscription options.
pp. 327-334
by
Tomoyuki Kawamura
,
Kenichi Takano
Who Should Review this Pull-Request: Reviewer Recommendation to Expedite Crowd Collaboration
Full-text access may be available. Sign in or learn about subscription options.
pp. 335-342
by
Yue Yu
,
Huaimin Wang
,
Gang Yin
,
Charles X. Ling
A Exploratory Study of @-Mention in GitHub's Pull-Requests
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-350
by
Yang Zhang
,
Gang Yin
,
Yue Yu
,
Huaimin Wang
Predicting Time Range of Development Based on Generalized Software Reliability Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-358
by
Kiyoshi Honda
,
Hidenori Nakai
,
Hironori Washizaki
,
Yoshiaki Fukazawa
,
Ken Asoh
,
Kazuyoshi Takahashi
,
Kentarou Ogawa
,
Maki Mori
,
Takashi Hino
,
Yosuke Hayakawa
,
Yasuyuki Tanaka
,
Shinichi Yamada
,
Daisuke Miyazaki
Verifying Secure Interface Composition for Component-Based System Designs
Full-text access may be available. Sign in or learn about subscription options.
pp. 359-366
by
Cong Sun
,
Ning Xi
,
Jinku Li
,
Qingsong Yao
,
Jianfeng Ma
Security Weaknesses Detection by Symbolic Analysis of Scenarios
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-374
by
Boutheina Bannour
,
Jose Escobedo
,
Christophe Gaston
,
Pascale Le Gall
,
Gabriel Pedroza
Formal Design and Verification of Zone Controller
Full-text access may be available. Sign in or learn about subscription options.
pp. 375-382
by
Jie Qian
,
Jing Liu
,
Xiang Chen
,
Junfeng Sun
Mining Developer Mailing List to Predict Software Defects
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-390
by
Yu Zhang
,
Beijun Shen
,
Yuting Chen
SHAP: Suppressing the Detection of Inconsistency Hazards by Pattern Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 391-398
by
Wang Xi
,
Chang Xu
,
Wenhua Yang
,
Ping Yu
,
Xiaoxing Ma
,
Jiang Lu
Automatic Classification of UML Class Diagrams from Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 399-406
by
Truong Ho-Quang
,
Michel R.V. Chaudron
,
Ingimar Samúelsson
,
Jóel Hjaltason
,
Bilal Karasneh
,
Hafeez Osman
Runtime Checking for Paired Functions in Device Drivers
Full-text access may be available. Sign in or learn about subscription options.
pp. 407-414
by
Jia-Ju Bai
,
Hu-Qiu Liu
,
Yu-Ping Wang
,
Shi-Min Hu
BP-Miner: Mining Paired Functions from the Binary Code of Drivers for Error Handling
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-422
by
Hu-Qiu Liu
,
Jia-Ju Bai
,
Yu-Ping Wang
,
Shi-Min Hu
Data Flow Based Integration Testing for Embedded System Using Interaction Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-429
by
Hossain Muhammad Iqbal
,
Woo Jin Lee
An Efficient Method for Assessing the Impact of Refactoring Candidates on Maintainability Based on Matrix Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 430-437
by
Ah-Rim Han
,
Doo-Hwan Bae
A Proved Approach for Building Correct Instances of UML Associations: Multiplicities Satisfaction
Full-text access may be available. Sign in or learn about subscription options.
pp. 438-445
by
Amel Mammar
,
Regine Laleau
Author index - Vol 1
Freely available from IEEE.
pp. 446-448
[Publisher's information - Vol 2]
Freely available from IEEE.
pp. 450-450
Showing 69 out of 69