Abstract is missing.
- BOOM: Experiences in language and tool design for distributed systems (keynote)Joseph M. Hellerstein. 1 [doi]
- The challenges of verification and validation of automated planning systems (keynote)Jeremy Frank. 2 [doi]
- Big problems in industry (panel)John Penix. 3 [doi]
- Round-up: Runtime checking quasi linearizability of concurrent data structuresLu Zhang, Arijit Chattopadhyay, Chao Wang. 4-14 [doi]
- Constraint-based automatic symmetry detectionShao Jie Zhang, Jun Sun 0001, Chengnian Sun, Yang Liu, Junwei Ma, Jin Song Dong. 15-25 [doi]
- Proving MCAPI executions are correct using SMTYu Huang, Eric Mercer, Jay McCarthy. 26-36 [doi]
- Efficient data race prediction with incremental reasoning on time-stamped lock historyMalay K. Ganai. 37-47 [doi]
- PIEtrace: Platform independent executable traceYonghwi Kwon, Xiangyu Zhang, Dongyan Xu. 48-58 [doi]
- Improving efficiency of dynamic analysis with dynamic dependence summariesVijay Krishna Palepu, Guoqing (Harry) Xu, James A. Jones. 59-69 [doi]
- Efficient parametric runtime verification with deterministic string rewritingPatrick O'Neil Meredith, Grigore Rosu. 70-80 [doi]
- Identifying execution points for dynamic analysesWilliam N. Sumner, Xiangyu Zhang. 81-91 [doi]
- Operator-based and random mutant selection: Better togetherLingming Zhang, Milos Gligoric, Darko Marinov, Sarfraz Khurshid. 92-102 [doi]
- Testing properties of dataflow program operatorsZhihong Xu, Martin Hirzel, Gregg Rothermel, Kun-Lung Wu. 103-113 [doi]
- Bita: Coverage-guided, automatic testing of actor programsSamira Tasharofi, Michael Pradel, Yu Lin, Ralph E. Johnson. 114-124 [doi]
- SABRINE: State-based robustness testing of operating systemsDomenico Cotroneo, Domenico Di Leo, Francesco Fucci, Roberto Natella. 125-135 [doi]
- BLITZ: Compositional bounded model checking for real-world programsChia Yuan Cho, Vijay D'Silva, Dawn Song. 136-146 [doi]
- Ranger: Parallel analysis of alloy models by range partitioningNicolás Rosner, Junaid Haroon Siddiqui, Nazareno Aguirre, Sarfraz Khurshid, Marcelo F. Frias. 147-157 [doi]
- Automated verification of pattern-based interaction invariants in Ajax applicationsYuta Maezawa, Hironori Washizaki, Yoshinori Tanabe, Shinichi Honiden. 158-168 [doi]
- Software model checking for distributed systems with selector-based, non-blocking communicationCyrille Artho, Masami Hagiya, Richard Potter, Yoshinori Tanabe, Franz Weitl, Mitsuharu Yamamoto. 169-179 [doi]
- A study of repetitiveness of code changes in software evolutionHoan Anh Nguyen, Anh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, Hridesh Rajan. 180-190 [doi]
- Consistency-preserving edit scripts in model versioningTimo Kehrer, Udo Kelter, Gabriele Taentzer. 191-201 [doi]
- JFlow: Practical refactorings for flow-based parallelismNicholas Chen, Ralph E. Johnson. 202-212 [doi]
- Automated planning for software architecture evolutionJeffrey M. Barnes, Ashutosh Pandey 0002, David Garlan. 213-223 [doi]
- Automatically synthesizing SQL queries from input-output examplesSai Zhang, Yuyin Sun. 224-234 [doi]
- SEDGE: Symbolic example data generation for dataflow programsKaituo Li, Christoph Reichenbach, Yannis Smaragdakis, Yanlei Diao, Christoph Csallner. 235-245 [doi]
- Characteristic studies of loop problems for structural test generation via symbolic executionXusheng Xiao, Sihan Li, Tao Xie, Nikolai Tillmann. 246-256 [doi]
- Entropy-based test generation for improved fault localizationJosé Campos, Rui Abreu, Gordon Fraser, Marcelo d'Amorim. 257-267 [doi]
- Detecting bad smells in source code using change history informationFabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrea De Lucia, Denys Poshyvanyk. 268-278 [doi]
- Personalized defect predictionTian Jiang, Lin Tan, Sunghun Kim. 279-289 [doi]
- Automatic recommendation of API methods from feature requestsFerdian Thung, Shaowei Wang, David Lo, Julia L. Lawall. 290-300 [doi]
- Variability-aware performance prediction: A statistical learning approachJianmei Guo, Krzysztof Czarnecki, Sven Apel, Norbert Siegmund, Andrzej Wasowski. 301-311 [doi]
- A scalable approach for malware detection through bounded feature space behavior modelingMahinthan Chandramohan, Hee Beng Kuan Tan, Lionel C. Briand, Lwin Khin Shar, Bindu Madhavi Padmanabhuni. 312-322 [doi]
- Automatically partition software into least privilege components using dynamic data dependency analysisYongzheng Wu, Jun Sun 0001, Yang Liu, Jin Song Dong. 323-333 [doi]
- Finding architectural flaws using constraintsRadu Vanciu, Marwan Abi-Antoun. 334-344 [doi]
- Improving bug localization using structured information retrievalRipon K. Saha, Matthew Lease, Sarfraz Khurshid, Dewayne E. Perry. 345-355 [doi]
- Leveraging program equivalence for adaptive program repair: Models and first resultsWestley Weimer, Zachary P. Fry, Stephanie Forrest. 356-366 [doi]
- Detecting and characterizing semantic inconsistencies in ported codeBaishakhi Ray, Miryung Kim, Suzette Person, Neha Rungta. 367-377 [doi]
- Lightweight control-flow instrumentation and postmortem analysis in support of debuggingPeter Ohmann, Ben Liblit. 378-388 [doi]
- Characterizing and detecting resource leaks in Android applicationsChaorong Guo, Jian Zhang, Jun Yan, Zhiqiang Zhang, Yanli Zhang. 389-398 [doi]
- Dangling references in multi-configuration and dynamic PHP-based Web applicationsHung Viet Nguyen, Hoan Anh Nguyen, Tung Thanh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen. 399-409 [doi]
- Dynamically transforming data structuresErik Österlund, Welf Löwe. 410-420 [doi]
- Towards precise metrics for predicting graph query performanceBenedek Izsó, Zoltán Szatmári, Gábor Bergmann, Ákos Horváth, István Ráth. 421-431 [doi]
- TzuYu: Learning stateful typestatesHao Xiao, Jun Sun 0001, Yang Liu, Shang-Wei Lin, Chengnian Sun. 432-442 [doi]
- Mining branching-time scenariosDirk Fahland, David Lo, Shahar Maoz. 443-453 [doi]
- Measuring the structural complexity of feature modelsRichard Pohl, Vanessa Stricker, Klaus Pohl. 454-464 [doi]
- Scalable product line configuration: A straw to break the camel's backAbdel Salam Sayyad, Joseph Ingram, Tim Menzies, Hany Ammar. 465-474 [doi]
- Software analytics for incident management of online services: An experience reportJian-Guang Lou, Qingwei Lin, Rui Ding, Qiang Fu, Dongmei Zhang, Tao Xie. 475-485 [doi]
- A comparative analysis of software architecture recovery techniquesJoshua Garcia, Igor Ivkovic, Nenad Medvidovic. 486-496 [doi]
- Towards contextual and on-demand code clone management by continuous monitoringGang Zhang, Xin Peng, Zhenchang Xing, Shihai Jiang, Hai Wang, Wenyun Zhao. 497-507 [doi]
- The potential of polyhedral optimization: An empirical studyAndreas Simburger, Sven Apel, Armin Größlinger, Christian Lengauer. 508-518 [doi]
- Automated unit testing of large industrial embedded software using concolic testingYunho Kim, Youil Kim, Taeksu Kim, Gunwoo Lee, Yoonkyu Jang, Moonzoo Kim. 519-528 [doi]
- Minimizing CPU time shortage risks in integrated embedded softwareShiva Nejati, Morayo Adedjouma, Lionel C. Briand, Jonathan Hellebaut, Julien Begey, Yves Clement. 529-539 [doi]
- Model based test validation and oracles for data acquisition systemsDaniel Di Nardo, Nadia Alshahwan, Lionel C. Briand, Elizabeta Fourneret, Tomislav Nakic-Alfirevic, Vincent Masquelier. 540-550 [doi]
- Automated verification of interactive rule-based configuration systemsDeepak Dhungana, Ching Hoo Tang, Christoph Weidenbach, Patrick Wischnewski. 551-561 [doi]
- AutoComment: Mining question and answer sites for automatic comment generationEdmund Wong, Jinqiu Yang, Lin Tan. 562-567 [doi]
- Detecting system use cases and validations from documentsSmita Ghaisas, Manish Motwani, Preethu Rose Anish. 568-573 [doi]
- Multi-user variability configuration: A game theoretic approachJesús García-Galán, Pablo Trinidad, Antonio Ruiz Cortés. 574-579 [doi]
- From comparison matrix to Variability Model: The Wikipedia case studyNicolas Sannier, Mathieu Acher, Benoit Baudry. 580-585 [doi]
- Learning effective query transformations for enhanced requirements trace retrievalTimothy Dietrich, Jane Cleland-Huang, Yonghee Shin. 586-591 [doi]
- Environment rematching: Toward dependability improvement for self-adaptive applicationsChang Xu, Wenhua Yang, Xiaoxing Ma, Chun Cao, Jian Lu. 592-597 [doi]
- Cloud Twin: Native execution of android applications on the Windows PhoneEthan Holder, Eeshan Shah, Mohammed Davoodi, Eli Tilevich. 598-603 [doi]
- SBFR: A search based approach for reproducing failures of programs with grammar based inputFitsum Meshesha Kifetew, Wei Jin, Roberto Tiella, Alessandro Orso, Paolo Tonella. 604-609 [doi]
- PYTHIA: Generating test cases with oracles for JavaScript applicationsShabnam Mirshokraie, Ali Mesbah, Karthik Pattabiraman. 610-615 [doi]
- Randomizing regression tests using game theoryNupul Kukreja, William G. J. Halfond, Milind Tambe. 616-621 [doi]
- Automated inference of classifications and dependencies for combinatorial testingDuy Cu Nguyen, Paolo Tonella. 622-627 [doi]
- Adding context to fault localization with integration coverageHigor Amario de Souza, Marcos Lordello Chaim. 628-633 [doi]
- Using automatically generated invariants for regression testing and bug localizationParth Sagdeo, Nicholas Ewalt, Debjit Pal, Shobha Vasudevan. 634-639 [doi]
- Class level fault prediction using software clusteringGiuseppe Scanniello, Carmine Gravino, Andrian Marcus, Tim Menzies. 640-645 [doi]
- ExPort: Detecting and visualizing API usages in large source code repositoriesEvan Moritz, Mario Linares Vásquez, Denys Poshyvanyk, Mark Grechanik, Collin McMillan, Malcom Gethers. 646-651 [doi]
- Flow Permissions for AndroidShashank Holavanalli, Don Manuel, Vishwas Nanjundaswamy, Brian Rosenberg, Feng Shen, Steven Y. Ko, Lukasz Ziarek. 652-657 [doi]
- A pattern-based approach to parametric specification miningGiles Reger, Howard Barringer, David E. Rydeheard. 658-663 [doi]
- Semi-automatic generation of metamodels from model sketchesDustin Wüest, Norbert Seyff, Martin Glinz. 664-669 [doi]
- Assessing the maturity of requirements through argumentation: A good enough approachVarsha Veerappa, Rachel Harrison. 670-675 [doi]
- Natural language requirements quality analysis based on business domain modelsK. M. Annervaz, Vikrant S. Kaulgud, Shubhashis Sengupta, Milind Savagaonkar. 676-681 [doi]
- Model/code co-refactoring: An MDE approachJens von Pilgrim, Bastian Ulke, Andreas Thies, Friedrich Steimann. 682-687 [doi]
- Recovering model transformation traces using multi-objective optimizationHajer Saada, Marianne Huchard, Clémentine Nebut, Houari A. Sahraoui. 688-693 [doi]
- Model repair and transformation with EchoNuno Macedo, Tiago Guimaraes, Alcino Cunha. 694-697 [doi]
- Smart Cloud Broker: Finding your home in the cloudsMohan Baruwal Chhetri, Sergei Chichin, Quoc Bao Vo, Ryszard Kowalczyk. 698-701 [doi]
- OCRA: A tool for checking the refinement of temporal contractsAlessandro Cimatti, Michele Dorigatti, Stefano Tonetta. 702-705 [doi]
- The bounded model checker LLBMCStephan Falke, Florian Merz, Carsten Sinz. 706-709 [doi]
- CSeq: A concurrency pre-processor for sequential C verification toolsBernd Fischer 0002, Omar Inverso, Gennaro Parlato. 710-713 [doi]
- Automated testing of cloud-based elastic systems with AUToCLESAlessio Gambi, Waldemar Hummer, Schahram Dustdar. 714-717 [doi]
- Tool support for automatic model transformation specification using concrete visualisationsIman Avazpour, John Grundy, Lars Grunske. 718-721 [doi]
- CCmutator: A mutation generator for concurrency constructs in multithreaded C/C++ applicationsMarkus Kusano, Chao Wang. 722-725 [doi]
- Crushinator: A framework towards game-independent testingChristopher Schaefer, Hyunsook Do, Brian M. Slator. 726-729 [doi]
- Pex4Fun: A web-based environment for educational gaming via automated test generationNikolai Tillmann, Jonathan de Halleux, Tao Xie, Judith Bishop. 730-733 [doi]
- Developing self-verifying service-based systemsRadu Calinescu, Kenneth Johnson, Yasmin Rafiq. 734-737 [doi]
- TRAM: A tool for transforming textual requirements into analysis modelsKeletso Letsholo, Liping Zhao, Erol-Valeriu Chioasca. 738-741 [doi]
- iProbe: A lightweight user-level dynamic instrumentation toolNipun Arora, Hui Zhang 0002, Junghwan Rhee, Kenji Yoshihira, Guofei Jiang. 742-745 [doi]
- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent methodFatemeh Hendijani Fard. 746-749 [doi]
- Synthesizing fault-tolerant programs from deontic logic specificationsRamiro Demasi. 750-753 [doi]
- Supporting bug investigation using history analysisFrancisco Servant. 754-757 [doi]
- Context-aware task allocation for distributed agile teamJun Lin. 758-761 [doi]
- Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualizationMehdi Mirakhorli. 762-765 [doi]