


default search action
28th APSEC 2021: Taipei, Taiwan
- 28th Asia-Pacific Software Engineering Conference, APSEC 2021, Taipei, Taiwan, December 6-9, 2021. IEEE 2021, ISBN 978-1-6654-3784-4

- Aiping Zhang, Kui Liu

, Liming Fang, Qianjun Liu, Xinyu Yun, Shouling Ji:
Learn To Align: A Code Alignment Network For Code Clone Detection. 1-11 - Mouna Hammoudi, Christoph Mayr-Dorn, Atif Mashkoor, Alexander Egyed:

TraceRefiner: An Automated Technique for Refining Coarse-Grained Requirement-to-Class Traces. 12-21 - Kejun Li, Taiming Wang, Hui Liu:

NameChecker: Detecting Inconsistency between Method Names and Method Bodies. 22-31 - Stefan Schulz, Emanuel Herrendorf, Christoph Bockisch:

Thread-Sensitive Data Race Detection for Java. 32-42 - Asma Razgallah, Raphaël Khoury:

Behavioral classification of Android applications using system calls. 43-52 - Yu Wang, Huaxiao Liu, Shanquan Gao, Shujia Li:

Categorizing npm Packages by Analyzing the Text Information in Software Repositories. 53-60 - Yoshiki Higo, Junnosuke Matsumoto, Shinji Kusumoto:

Tree-based Mining of Fine-grained Code Changes to Detect Unknown Change Patterns. 61-71 - Yang Yu, Minglai Shao, Hongyan Xu, Ying Sun, Wenjun Wang, Bofei Ma:

PGraph: A Graph-based Structure for Interactive Event Exploration on Social Media. 72-81 - Hongbing Wang, Qi Li:

Effective Bug Triage Based on a Hybrid Neural Network. 82-91 - Lingjia Li, Jian Cao, Qing Qi:

Monitoring Negative Sentiment-Related Events in Open Source Software Projects. 92-100 - Huaxi Jiang, Jie Zhu, Li Yang, Geng Liang, Chun Zuo:

DeepRelease: Language-agnostic Release Notes Generation from Pull Requests of Open-source Software. 101-110 - Zhifang Liao, Wenlong Li, Yan Zhang, Song Yu:

Detecting Duplicate Questions in Stack Overflow via Semantic and Relevance Approaches. 111-119 - Jessica Turner

, Judy Bowen, Nikki van Zandwijk:
Interaction Modelling for IoT. 120-129 - Akira Mizutani, Masami Noro, Atsushi Sawada:

Design of Software Architecture for Neural Network Cooperation: Case of Forgery Detection. 130-140 - Elena N. Akimova, Alexander Yu. Bersenev, Artem A. Deikov, Konstantin S. Kobylkin, Anton V. Konygin, Ilya P. Mezentsev, Vladimir E. Misilov:

PyTraceBugs: A Large Python Code Dataset for Supervised Machine Learning in Software Defect Prediction. 141-151 - Weigang He, Xia Mao, Ting Su, Yanhong Huang, Jianqi Shi:

Data Flow Testing for PLC Programs via Dynamic Symbolic Execution. 152-160 - Hushuang Zeng, Jingxin Chen, Beijun Shen, Hao Zhong

:
Mining API Constraints from Library and Client to Detect API Misuses. 161-170 - Jingxuan Zhang, Weiqin Zou, Zhiqiu Huang:

An Empirical Study on the Usage and Evolution of Identifier Styles in Practice. 171-180 - Xin Huang, He Zhang, Xin Zhou, Dong Shao, Letizia Jaccheri:

A Research Landscape of Software Engineering Education. 181-191 - Siyuan Liu, Jingxuan Zhang, Jiahui Liang, Junpeng Luo, Yong Xu, Chenxing Sun:

CHIS: A Novel Hybrid Granularity Identifier Splitting Approach. 192-201 - Yuxuan Li, Ruitao Feng

, Sen Chen, Qianyu Guo, Lingling Fan, Xiaohong Li:
IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps. 202-212 - Guang Yang

, Yanlin Zhou, Xiang Chen, Chi Yu:
Fine-grained Pseudo-code Generation Method via Code Feature Extraction and Transformer. 213-222 - Yusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow:

Improving Semantic Consistency of Variable Names with Use-Flow Graph Analysis. 223-232 - Yuchu Liu, David Issa Mattos, Jan Bosch, Helena Holmström Olsson, Jonn Lantz:

Bayesian propensity score matching in automotive embedded software engineering. 233-242 - Anas Dakkak, Hongyi Zhang, David Issa Mattos, Jan Bosch, Helena Holmström Olsson:

Towards Continuous Data Collection from In-service Products: Exploring the Relation Between Data Dimensions and Collection Challenges. 243-252 - Xiang Du, Liangze Yin, Haining Feng, Wei Dong:

Program Verification Enhanced Precise Analysis of Interrupt-Driven Program Vulnerabilities. 253-263 - Bo Gao, Siyuan Shen, Ling Shi, Jiaying Li, Jun Sun, Lei Bu

:
Verification Assisted Gas Reduction for Smart Contracts. 264-274 - Sindre Beba, Magnus Melseth Karlsen, Jingyue Li

, Bing Zhang:
Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports. 275-284 - Benjamin Koh, Mojtaba Shahin, Annette Ong, Soo Ying Yeap, Priyanka Saxena, Manvendra Singh, Chunyang Chen

:
Pandemic Software Development: The Student Experiences from Developing a COVID-19 Information Dashboard. 285-295 - Yong-Jun Shin, Joon-Young Bae

, Doo-Hwan Bae:
Concepts and Models of Environment of Self-Adaptive Systems: A Systematic Literature Review. 296-305 - Selin Aydin

, Andreas Steffens, Horst Lichter:
Automated Construction of Continuous Delivery Pipelines from Architecture Models. 306-316 - Wenjie Li, Yanyan Jiang, Jun Ma, Chang Xu:

Automatic Performance Testing for Image Displaying in Android Apps. 317-326 - Kien-Tuan Ngo, Dinh-Truong Do, Thu-Trang Nguyen

, Hieu Dinh Vo:
Ranking Warnings of Static Analysis Tools Using Representation Learning. 327-337 - Azeem Ahmad, Francisco Gomes de Oliveira Neto, Zhixiang Shi, Kristian Sandahl, Ola Leifler:

A Multi-factor Approach for Flaky Test Detection and Automated Root Cause Analysis. 338-348 - Lwin Khin Shar

, Ta Nguyen Binh Duong, David Lo
:
Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection. 349-359 - Yusuke Shinyama, Yoshitaka Arahori, Katsuhiko Gondow:

How Do Programmers Express High-Level Concepts using Primitive Data Types? 360-368 - Wangshu Liu, Yongteng Zhu, Xiang Chen, Qing Gu, Xingya Wang

, Shenkai Gu:
S2 LMMD: Cross-Project Software Defect Prediction via Statement Semantic Learning and Maximum Mean Discrepancy. 369-379 - Gregorius Airlangga, Alan Liu

:
A Novel Architectural Design for Solving Lost-Link Problems in UAV Collaboration. 380-389 - Kiat Kian Anthony Chua, Doo-Hwan Bae, Eunkyoung Jee:

Metamorphic Testing for Reliability in System of Systems. 390-400 - Nataliya Berbyuk Lindström, Dina Koutsikouri, Miroslaw Staron

, Wilhelm Meding, Ola Söder:
Understanding Metrics Team-Stakeholder Communication in Agile Metrics Service Delivery. 401-409 - Ishita Bardhan, Subhajit Datta, Subhashis Majumder:

Degree doesn't Matter: Identifying the Drivers of Interaction in Software Development Ecosystems. 410-420 - Stefan Fischer, Rudolf Ramler, Lukas Linsbauer:

Comparing Automated Reuse of Scripted Tests and Model-Based Tests for Configurable Software. 421-430 - Yizhen Chen, Ninad Chaudhari

, Mei-Hwa Chen:
Context-Aware Regression Test Selection. 431-440 - Guangwei Li, Ting Yuan, Jie Lu, Lian Li, Xiaobin Zhang, Xu Song, Kejun Zhang:

Exposing Vulnerable Paths: Enhance Static Analysis with Lightweight Symbolic Execution. 441-451 - Pouya Ataei

, Alan T. Litchfield
:
NeoMycelia: A software reference architecturefor big data systems. 452-462 - M. Aiswarya Raj, Jan Bosch, Helena Holmström Olsson, Anders Jansson:

On the Impact of ML use cases on Industrial Data Pipelines. 463-472 - Chi Li, Yuexing Wang, Min Zhou, Ming Gu:

Scalable Fault Detection Based on Precise Access Path. 473-481 - Liming Dong, He Zhang, Lanxin Yang, Zhiluo Weng, Xin Yang, Xin Zhou, Zifan Pan:

Survey on Pains and Best Practices of Code Review. 482-491 - Tran Manh Cuong, Trung Kien Tran, Tan M. Nguyen, Thu-Trang Nguyen

, Son Nguyen, Hieu Dinh Vo:
API parameter recommendation based on language model and program analysis. 492-496 - Yoriyuki Yamagata

, Fabien Hervé, Yuji Fujiwara, Katsuro Inoue:
Finding repeated strings in code repositories and its applications to code-clone detection. 497-502 - Puneet Bhateja:

Probabilistic testing of asynchronously communicating systems. 503-508 - Rakshit Mittal

, Dominique Blouin, Soumyadip Bandyopadhyay:
PNPEq: Verification of Scheduled Conditional Behavior in Embedded Software using Petri Nets. 509-514 - Hiroto Watanabe, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto, Toshiyuki Kurabayashi, Hiroyuki Kirinuki, Haruto Tanno:

Applying Multi-Objective Genetic Algorithm for Efficient Selection on Program Generation. 515-519 - Chong Wang, Tianyang Liu

, Peng Liang
, Maya Daneva, Marten van Sinderen
:
The Role of User Reviews in App Updates: A Preliminary Investigation on App Release Notes. 520-525 - Ryoko Izuta, Shinsuke Matsumoto, Hiroshi Igaki, Sachio Saiki, Naoki Fukuyasu, Shinji Kusumoto:

Detecting Functional Differences using Automatic Test Generation for Automated Assessment in Programming Education. 526-530 - Humphrey O. Obie

, Mojtaba Shahin, John Grundy, Burak Turhan, Li Li, Waqar Hussain, Jon Whittle:
Does Domain Change the Opinion of Individuals on Human Values? A Preliminary Investigation on eHealth Apps End-users. 531-535 - Yuwei Wang, Denis Conan, Sophie Chabridon

, Kavoos Bojnourdi, Jingxuan Ma:
Runtime models and evolution graphs for the version management of microservice architectures. 536-541 - Kapil Singi, Kanchanjot Kaur Phokela, Sukhavasi Narendranath, Vikrant Kaulgud:

Framework for Recommending Data Residency Compliant Application Architecture. 542-546 - Anton V. Uzunov, Matthew Brennan, Mohan Baruwal Chhetri

, Quoc Bao Vo, Ryszard Kowalczyk, John Wondoh
:
AWaRE2-MM: A Meta-Model for Goal-Driven, Contract-Mediated, Team-Centric Autonomous Middleware Frameworks for Antifragility. 547-552 - Akira Fujimoto, Yoshiki Higo, Shinji Kusumoto:

Towards Accurate File Tracking Based on AST Differences. 553-558 - Scott Lupton

, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa:
Literature Review on Log Anomaly Detection Approaches Utilizing Online Parsing Methodology. 559-563 - Ben Wang, Hanting Chu, Pengcheng Zhang, Hai Dong

:
Smart Contract Vulnerability Detection Using Code Representation Fusion. 564-565 - Yi-Chun Yen

, Bing-Yun Wang, Xin-Zhe Zhong, Wei-Yi Chiang, Chin-Yun Hsieh, Yu Chin Cheng:
Applying Problem Frames in Behavior-Driven Development for Smart Cone System. 566-567 - Aki Hongo, Naoya Nitta:

Towards a Dynamic Visualization of Complex Reverse-Engineered Object Collaboration. 568-569 - Norihiro Yoshida, Takahiro Shimizu, Ryota Yamamoto, Hiroaki Takada:

Extracting a Micro State Transition Table Using the KLEE Symbolic Execution Engine. 570-571 - Irving Rodriguez, Xiaoyin Wang:

Topic Trends in Issue Tracking System of Extended Reality Frameworks. 572-573 - Shaikh Mostafa, Xiaoyin Wang:

An Exploration Study On the Dependency Among Vulnerabilities and Bugs. 574-575 - Chu-Ti Lin, Sheng-Hsiang Yuan, Jutarporn Intasara:

A Learning-to-Rank Based Approach for Improving Regression Test Case Prioritization. 576-577 - Hasnaa E. L. Jihad, Morayo Adedjouma, Matteo Morelli:

Automated Fault Tree generation in Open-PSA from UML Models. 578-579 - Liqian Chen, Taoqing Chen, Guangsheng Fan, Banghu Yin:

Static Analysis of Resource Usage Bounds for Imperative Programs. 580-581 - Dongwook Choi, Jinseok Heo, Eunseok Lee

:
Automated Feedback Generation for Multiple Function Programs. 582-583

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














