default search action
30th APSEC 2023: Seoul, Republic of Korea
- 30th Asia-Pacific Software Engineering Conference, APSEC 2023, Seoul, Republic of Korea, December 4-7, 2023. IEEE 2023, ISBN 979-8-3503-4417-2
- Nils Wild, Horst Lichter:
Unit Test Based Component Integration Testing. 1-10 - Haeun Lee, Hee Dong Yang, Su Geun Ji, Sang Kil Cha:
On the Effectiveness of Synthetic Benchmarks for Evaluating Directed Grey-Box Fuzzers. 11-20 - Rui Xu, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong:
Test Case Level Predictive Mutation Testing Combining PIE and Natural Language Features. 21-30 - Paula Rachow, Marion Wiese, André van Hoorn:
Taxonomy of Architecture Maintainability Smells. 31-40 - Amirali Amiri, Uwe Zdun, André van Hoorn:
Analytical Modeling and Empirical Validation of Performability of Service- and Cloud-Based Dynamic Routing Architecture Patterns. 41-50 - Johan Cederbladh, Jagadish Suryadevara:
Light-Weight MBSE Approach for Construction Equipment Domain - An Experience Report. 51-60 - Huan Xie, Maojin Li, Yan Lei, Jian Hu, Shanshan Li, Xiaoguang Mao, Yue Yu:
On the Reliability of Coverage Data for Fault Localization. 61-70 - Shishuai Yang, Qinsheng Hou, Shuang Li, Wenrui Diao:
Do App Developers Follow the Android Official Data Security Guidelines? An Empirical Measurement on App Data Security. 71-80 - Nanfei Yang, Yuliang Shi, Zhiyuan Su, Xinjun Wang, Zhongmin Yan, Fanyu Kong:
FSFP: A Fine-Grained Online Service System Performance Fault Prediction Method Based on Cross-attention. 81-90 - Meng Wang, Weiliang Fei, Miao Wang, Jin Cui:
Reinforcement Learning Guided Symbolic Execution for Ethereum Smart Contracts. 91-100 - Siqi Zhou, Xian Zhan, Linlin Li, Yepang Liu:
Effective Anomaly Detection for Microservice Systems with Real-Time Feature Selection. 101-110 - Amirali Amiri, Evangelos Ntentos, Uwe Zdun:
Architectural Design Decisions for Data Communication of Cyber-Physical Systems. 111-120 - Yishu Li, Jacky Keung, Kwabena Ebo Bennin, Xiaoxue Ma, Yangyang Huang, Jingyu Zhang:
Towards Requirements Engineering Activities for Machine Learning-Enabled FinTech Applications. 121-130 - Parsa Karami, Ikram Darif, Cristiano Politowski, Ghizlane El-Boussaidi, Sègla Kpodjedo, Imen Benzarti:
On the Impact of Development Frameworks on Mobile Apps. 131-140 - Jiho Shin, Reem Aleithan, Jaechang Nam, Junjie Wang, Nima Shiri Harzevili, Song Wang:
An Empirical Study on the Stability of Explainable Software Defect Prediction. 141-150 - Atsushi Shirafuji, Yusuke Oda, Jun Suzuki, Makoto Morishita, Yutaka Watanobe:
Refactoring Programs Using Large Language Models with Few-Shot Examples. 151-160 - Jiawei Lu, Zhijie Tang, Zhongxin Liu:
Improving Code Refinement for Code Review Via Input Reconstruction and Ensemble Learning. 161-170 - Jeongwhan Choi, Duksan Ryu:
QoS-Aware Graph Contrastive Learning for Web Service Recommendation. 171-180 - Xiaonan Shi, Rui Li, Qingfeng Du, Cheng He, Fulong Tian:
LogFold: Enhancing Log Anomaly Detection Through Sequence Folding and Reconstruction. 181-190 - Jiahao Wei, Xuan Chen, Hongbin Xiao, Shangzhi Tang, Xiaolan Xie, Zhi Li:
Natural Language Processing-Based Requirements Modeling: A Case Study on Problem Frames. 191-200 - Hongyan Wan, Zhiquan An, Bangchao Wang, Teng Xiong:
Sentiment Analysis for Requirements Elicitation from App Reviews: A Systematic Mapping Study. 201-210 - Shuting Kang, Heng Guo, Zitong Bo, Lijun Zhang, Qian Dong, Yunzhi Xue, Yanjun Wu:
SAB: Stacking Action Blocks for Efficiently Generating Diverse Multimodal Critical Driving Scenario. 211-220 - Qianbo Wei, Qian Tan, Yan Zhang, Zhen Xu, Hongyan Tan:
CP Decomposition and Set Theory based Root Cause Analysis in Online Service Systems. 221-228 - Shamsa Abid, Xuemeng Cai, Lingxiao Jiang:
Interpreting CodeBERT for Semantic Code Clone Detection. 229-238 - Sayeedi Mottakin, Maliha Bintay Zaman, Manishankar Mondal, Atanu Shome:
Context-Adaptation Bugs in Micro-Clones. 239-248 - Rulin Xu, Xiaoguang Mao, Luohui Chen:
P-DATA: A Task-Level Parallel Framework for Dependency-Aware Value Flow Taint Analysis. 249-258 - Xiangxin Meng, Shaoxiao Lu, Xu Wang, Xudong Liu, Chunming Hu:
Improving Vulnerability Detection with Hybrid Code Graph Representation. 259-268 - Yuxin Zhao, Xinjun Mao, Tanghaoran Zhang, Zhang Zhang:
MUSE: A Multi-Feature Semantic Fusion Method for ROS Node Search Based on Knowledge Graph. 269-278 - Shulin Zhou, Zhijie Jiang, Shanshan Li, Xiaodong Liu, Zhouyang Jia, Yuanliang Zhang, Jun Ma, Haibo Mi:
WMWatcher: Preventing Workload-Related Misconfigurations in Production Environment. 279-288 - Khairul Alam, Banani Roy, Alexander Serebrenik:
Reusability Challenges of Scientific Workflows: A Case Study for Galaxy. 289-298 - Laurens Studtmann, Selin Aydin, Horst Lichter:
Histree: A Tree-Based Experiment History Tracking Tool for Jupyter Notebooks. 299-308 - Leping Zhang, Qianying Zhang, Xinyue Wang, Ximeng Li, Guohui Wang, Zhiping Shi, Yong Guan:
Formal Verification of Interrupt Isolation for the TrustZone-based TEE. 309-318 - Huanzhang Xiong, Gang Hou, Long Zhu, Jie Wang, Weiqiang Kong:
A Single-sample Pruning and Clustering Method for Neural Network Verification. 319-328 - Jiangwei Hao, Yuanyuan Xia, Fei Li, Hongru Yang, Zongjiang Yi, Bei Zhou, Jianmin Pang:
AMPT: Automatic Mixed-Precision Tuning Based on Accuracy Gain. 329-338 - Georg Simhandl, Philipp Paulweber, Uwe Zdun:
Developer's Cognitive Effort Maintaining Monoliths vs. Microservices - An Eye-Tracking Study. 339-348 - Yoshitake Hirabayashi, Shinji Ohota, Suzuka Fujii, Motoshi Saeki:
Defining Bad Smells and Automating Their Detection in Goal-Oriented Requirement Analysis Method iStar. 349-358 - Yi Yang, Xinjun Mao:
Understanding Developers' Contribution Motivation in Stack Overflow: A Systematic Review. 359-368 - Meenu Mary John, Helena Holmström Olsson, Jan Bosch, Daniel Gillblad:
Exploring Trade-Offs in MLOps Adoption. 369-375 - Tomoji Kishi:
Family-based Model Checking using Probabilistic Model Checker PRISM. 376-385 - Hyeongseok Eun, Eunkyoung Jee, Doo-Hwan Bae, Younggeul Kim, Yoonhee Lee:
Automated Simulation-Based Integration Testing for Multiple PLCs in a Reactor Protection System. 386-395 - Farnoushsadat Nilizadeh, Hamid Dashtbani, Maryam Mouzarani:
Parameterized Search Heuristic Prediction for Concolic Execution. 396-404 - Dhriti Khanna, Subodh Sharma, Rahul Purandare:
Verifying Exception-Handling Code in Concurrent Libraries. 405-414 - Guilong Lu, Xiaolin Ju, Xiang Chen, Shaoyu Yang, Liang Chen, Hao Shen:
Assessing the Effectiveness of Vulnerability Detection via Prompt Tuning: An Empirical Study. 415-424 - Thomas Laurent, Paolo Arcaini, Fuyuki Ishikawa, Hirokazu Kawamoto, Kaoru Sawai, Eiichi Muramoto:
Investigating Multi- and Many-Objective Search for Stability-Aware Configuration of an Autonomous Delivery System. 425-430 - Mikael Ebrahimi Salari, Eduard Paul Enoiu, Cristina Seceleanu, Wasif Afzal, Filip Sebek:
Automating Test Generation of Industrial Control Software Through a PLC-to-Python Translation Framework and Pynguin. 431-440 - Kazuki Yokoi, Eunjong Choi, Norihiro Yoshida, Joji Okada, Yoshiki Higo:
Cost-Benefit Analysis for Modernizing a Large-Scale Industrial System. 441-449 - Tinghui Ouyang, Hoang-Quoc Nguyen-Son, Huy H. Nguyen, Isao Echizen, Yoshiki Seo:
Quality Assurance of A GPT-Based Sentiment Analysis System: Adversarial Review Data Generation and Detection. 450-457 - Tinghui Ouyang, Isao Echizen, Yoshiki Seo:
A Novel Statistical Measure for Out-of-Distribution Detection in Data Quality Assurance. 458-464 - Masahiro Watanabe, Yutaka Matsuno, Toshinori Takai:
A method for requirements elicitation and consensus-building for ideas in the vehicle system concept design using GSN. 465-472 - Muhammad Waseem Anwar, Alessio Bucaioni, Federico Ciccozzi:
Timing-Aware Variability Resolution in EAST-ADL Product Line Architecture. 473-482 - Karim Ghallab, Tewfik Ziadi, Zaak Chalal:
Migrating Individual Applications into Software Product Lines Using the Mobioos Forge Platform. 483-492 - Xun An, Qihang Zhou, Haichao Du, Zhenyu Song, Xiaoqi Jia:
Refining Use-After-Free Defense: Eliminating Dangling Pointers in Registers and Memory. 493-502 - M. Aiswarya Raj, Jan Bosch, Helena Holmström Olsson:
Maturity Assessment Model for Industrial Data Pipelines. 503-513 - Morayo Adedjouma, Fabien Gaudin, Philippe Fiani:
Assessing Safety of an Automated Vehicle Through Model-Driven Analysis and Simulation. 514-523 - Gonzalo Aguirre Dominguez, Keigo Kawaai, Hiroshi Maruyama:
Quality Assurance for ML Devices A Risk-Based Approach. 524-531 - Hyung Ho Kim:
Scalable Fault Tree Analysis for Functional Safety Software. 532-538 - Wantana Areeprayolkij, Mengzhen Li:
A Decision Tree of Bioengineering Study and Career Path for Educational Guidance. 539-543 - Chakkrit Tantithamthavorn, Norman Chen:
Unit Testing Challenges with Automated Marking. 544-548 - Nick Patrikeos, Yuchao Jiang, Fethi Rabhi:
Bridging the Gap Between Academic Curricula and Industrial Practice with DevOps Education. 549-553 - Muhammad Awais, Muhammad Waseem Anwar, Farooque Azam:
A Meta-Model for Outcome-Based Education: Streamlining Evaluation Processes. 554-558 - Zheng Li, Austen Rainer:
Exploiting Paired Concepts to Facilitate Software Engineering Education. 559-563 - Masateru Tsunoda, Hidetsugu Suto, Takeshi Yamada:
Toward Enhancing Software Developers' Persuasion and Engagement in Gamification. 564-568 - Yasin Sazid, Mridha Md. Nafis Fuad, Kazi Sakib:
Automated Detection of Dark Patterns Using In-Context Learning Capabilities of GPT-3. 569-573 - Weitao Pan, Hironori Washizaki, Nobukazu Yoshioka, Yoshiaki Fukazawa, Foutse Khomh, Yann-Gaël Guéhéneuc:
A Machine Learning Based Approach to Detect Machine Learning Design Patterns. 574-578 - Shingo Ariwaka, Tatsuhiro Tsuchiya:
On Mutation Testing of Graph Database Queries in the Cypher Language. 579-583 - Nabhan Suwanachote, Soratouch Pornmaneerattanatri, Yutaro Kashiwa, Kohei Ichikawa, Pattara Leelaprute, Arnon Rungsawang, Bundit Manaskasemsak, Hajimu Iida:
A Pilot Study of Testing Infrastructure as Code for Cloud Systems. 584-588 - Saikat Mondal, Debajyoti Mondal, Chanchal K. Roy:
Investigating Technology Usage Span by Analyzing Users' Q&A Traces in Stack Overflow. 589-593 - Huaian Zhou, Tao Wang, Yang Zhang, Yang Shen:
TLDBERT: Leveraging Further Pre-Trained Model for Issue Typed Links Detection. 594-598 - Rajesh Kumar, Nitish Yadav:
A methodology for resilient safety-critical infrastructures using statistical model checking. 599-603 - Zheheng Liang, Guoquan Wu, Lei Cui, Zhenyue Long:
Performance Diagnosis for Microservice-Based Systems via Intra-/Inter-Trace Analysis. 604-606 - Andrea Rosà, Matteo Basso, Leonardo Bohnhoff, Walter Binder:
Automated Runtime Transition between Virtual and Platform Threads in the Java Virtual Machine. 607-611 - Eun-Young Kang, Thiago Rocha Silva:
Towards Formal Verification of Behaviour-Driven Development Scenarios Using Timed Automata. 612-616 - Eun-Young Kang, Miguel Campusano:
Towards Safety Assessment of Robot Behaviors in SMACH. 617-621 - Zheng Li, Sridhar Sai Gorrepati, Desmond Greer:
On Code Example-Aided Just-In-Time Learning for Programming Education. 622-626 - Shang-Pin Ma, Yan-Cih Liang, Sheng-Kai Wang, Yu-Wen Huang, Wan-Lin You:
TABot: A Teaching Assistant Chatbot for Software Engineering Courses. 627-631 - Michael Fu, Chakkrit Kla Tantithamthavorn, Van Nguyen, Trung Le:
ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We? 632-636 - Shihan Wang, Yuxin Re, Rongrong Shi, Chiyuan Jing, Ying Liu, Haonan Tong:
An Empirical Study on Regression Techniques for Software Defect Number Prediction. 637-638 - Jin Zhang, Xingjin Wu, Yang Zhang, Shunyu Xu:
Detecting Bot on GitHub Leveraging Transformer-based Models: A Preliminary Study. 639-640 - Chansol Park, Robert Young Chul Kim:
Detecting Common Weakness Enumeration Through Training the Core Building Blocks of Similar Languages Based on the CodeBERT Model. 641-642 - Zhenyu Xu, Victor S. Sheng:
Enhancing Logic Error Detection Through Program Pseudocodes. 643-644 - Suhee Jo, Ryeonggu Kwon, Gihwon Kwon:
Exploring Collaboration Patterns in GitHub Using Discrete Time Markov Chain. 645-646 - Jiyoung Chang, Ryeonggu Kwon, Gihwon Kwon:
Exploring Loss Scenarios of STPA with Reinforcement Learning: A Case Study of Platform Screen Door. 647-648 - Georgia M. Kapitsaki, Maria Papoutsoglou:
Funding sources in top Software Engineering conference publications. 649-650 - Hyeonachang Jeon, Seoyeon Kang, Seoksu Lee, Eun-Sun Cho:
Assessing Opaque Predicates: Unveiling the Efficacy of Popular Obfuscators with a Rapid Deobfuscator. 651-652 - Nao Souma, Waka Ito, Momoka Obara, Takako Kawaguchi, Yuka Akinobu, Toshiyuki Kurabayashi, Haruto Tanno, Kimio Kuramitsu:
Can ChatGPT Correct Code Based on Logical Steps? 653-654 - Hoyoung Choi, Hyunjae Park, Young-June Choi, Kyungsik Han:
Consistency of Code: A Prompt Based Approach to Comprehend Functionality. 655-656 - Nenghui Hu, Zheng Bian, Ziqi Shuai, Zhenbang Chen, Yufeng Zhang:
Symbolic Execution of MPI Programs with One-Sided Communications. 657-658 - Jiahao Gong, Shunhui Ji, Pengcheng Zhang:
Test Case Generation for Cross-Blockchain Smart Contract. 659-660 - Ziqi Shuai, Zhenbang Chen, Yufeng Zhang, Hengbiao Yu, Ji Wang:
Unsatisfiable Core Based Constraint Solving Cache in Symbolic Execution. 661-662 - Snmika Jinnouchi, Masateru Tsunoda:
Visualizing Program Behavior with a Ball and Pipes for Computer Science Unplugged. 663-664
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.