Accepted Papers

There are 42 Accepted Papers (to be published in the IEEE CS Digital Library as 8 page papers and presented as talks at the conference).

There are 16 Short Accepted Papers (to be published in the IEEE CS Digital Library as 4 page papers and presented as posters at the conference). Posters should be A1 portrait (594mm x 841mm).

Papers

  • Find your Open Source License now!
    Georgia Kapitsaki and Georgia Charalambous
  • Defining a Domain-Specific Design Pattern for Driver Assistance Systems
    Hela Marouane, Achraf Makni, Rafik Bouaziz, Claude Duvallet and Bruno Sadeg
  • Does It Fit Me Better? User Segmentation in Requirements Engineering
    Mohammadhossein Sherkat, Tim Miller and Antonette Mendoza
  • Dataset Coverage for Testing Machine Learning Computer Programs
    Shin Nakajima and Hai Ngoc Bui
  • Task Recommendation with Developer Social Network in Software Crowdsourcing
    Ning Li, Wenkai Mo and Beijun Shen
  • The Floating-point Extension of Symbolic Execution Engine for Bug Detection
    Xingming Wu, Zhenbo Xu, Dong Yan, Tianyong Wu, Jun Yan and Jian Zhang
  • EXPSOL: Recommending Online Threads for Exception-related Bugs Reports
    Xiaoning Liu, Beijun Shen, Hao Zhong and Jiangang Zhu
  • Mind the Gap: Addressing Behavioural Inconsistencies with Formal Methods
    Juliana Küster Filipe Bowles and Marco B. Caminati
  • What Influences Usability Defect Reporting? – A Survey of Software Development Practitioners
    Nor Shahida Mohamad Yusop, John Grundy, Rajesh Vasa and Jean-Guy Schneider
  • A Model for Defining Coupling Metrics
    Ewan Tempero and Paul Ralph
  • Does the Role Matter? An Investigation of Casual Contributors’ Code Quality in GitHub
    Yao Lu, Xinjun Mao, Zude Li, Yang Zhang, Tao Wang and Gang Yin
  • The Introduction of Technical Debt Tracking in Large Companies
    Antonio Martini, Terese Besker and Jan Bosch
  • Examination of Coding Violations Focusing on Their Change Patterns over Releases
    Aji Ery Burhandenny, Hirohisa Aman and Minoru Kawahara
  • Testing Android Apps via Guided Gesture Event Generation
    Xiangyu Wu, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma and Jian Lu
  • Heterogeneous Cross-Company Effort Estimation through Transfer Learning
    Shensi Tong, Qing He, Yuting Chen, Ye Yang and Beijun Shen
  • An Algorithmic-based Change Effort Estimation Model for Software Development
    Sufyan Basri, Nazri Kama, Haslina Md Sarkan, Saiful Adli and Faizura Haneem
  • Filter-INC: Handling Effort-Inconsistency in Software Effort Estimation Datasets
    Passakorn Phannachitta, Jacky Keung, Kwabena Bennin, Akito Monden and Kenichi Matsumoto
  • Analytical Study of Cognitive Layered Approach for Understanding Security Requirements using Problem Domain Ontology
    Bongjae Kim and Seok-Won Lee
  • Splitting Commits via Past Code Changes
    Hiroyuki Kirinuki, Yoshiki Higo, Keisuke Hotta and Shinji Kusumoto
  • Does the “Project Manager” still exist in Agile Software Development Projects?
    Yogeshwar Shastri, Rashina Hoda and Robert Amor
  • Minimalist Qualitative Models for Model Checking Cyber-physical Feature Coordination
    Michael Rathmair, Christoph Luckeneder and Hermann Kaindl
  • An empirical study into the relationship between class features and test smells
    Amjed Tahir, Steve Counsell and Stephen MacDonell
  • Effectively Manifesting Concurrency Bugs in Android Apps
    Qiwei Li, Yanyan Jiang, Tianxiao Gu, Chang Xu, Jun Ma, Xiaoxing Ma and Jian Lu
  • Improving Reliability of Dynamic Software Updating Using Runtime Recovery
    Tianxiao Gu, Zelin Zhao, Xiaoxing Ma, Chang Xu, Chun Cao and Jian Lü
  • A Model Checking Based Approach for Containment Checking of UML Sequence Diagrams
    Faiz Ul Muram, Huy Tran and Uwe Zdun
  • Model-Based Continuous Verification
    Lingling Fan, Sen Chen, Lihua Xu, Zongyuan Yang and Huibiao Zhu
  • Masking Soft Errors with Static Bitwise Analysis
    Jianjun Xu, Xiankai Meng, Qingping Tan and Jingling Xue
  • Model Driven Software Security Architecture of Systems-of-Systems
    Jamal El Hachem, Zi Yang Pang, Vanea Chiprianov, Ali Babar and Philippe Aniorte
  • Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising
    Yauhen Arnatovich, Minh Ngoc Ngo, Tan Hee Beng Kuan and Charlie Soh
  • LibSift: Automated Detection of Third-Party Libraries in Android Applications
    Charlie Soh, Hee Beng Kuan Tan, Yauhen Arnatovich, Annamalai Narayanan and Lipo Wang
  • A Map of Threats to Validity of Systematic Literature Reviews in Software Engineering
    Xin Zhou, Yuqin Jin, He Zhang, Shanshan Li and Xin Huang
  • Automated Test Sequence Generation for Function Block Diagram Programs
    Jiyoung Song, Eunkyoung Jee and Doo-Hwan Bae
  • CURE: Automated Patch Generation for Dynamic Software Update
    Zelin Zhao, Tianxiao Gu, Xiaoxing Ma, Chang Xu and Jian Lü
  • Automated Deployement of Data Collection Policies over Heterogeneous Shared Sensing Infrastructures
    Cyril Cecchinel, Sebastien Mosser and Philippe Collet
  • Retrieving Design Pattern Usage Examples using Domain Matching
    Shamsa Abid, Zohaa Qamar, Natasha Khan, Muhammad Shayan and Hamid Abdul Basit
  • Model-based API-call constraint checking for automotive control software
    Dongwoo Kim, Yoohee Chung and Yunja Choi
  • An Incremental V-Model Process for Automotive Development
    Bohan Liu, He Zhang and Saichun Zhu
  • Toward Developer-like Automated Program Repair - Modification Comparisons between GenProg and Developers
    Hiroki Nakajima, Yoshiki Higo, Haruki Yokoyama and Shinji Kusumoto
  • Formalization and Verification of the Powerlink Protocol using CSP
    Haiping Pang, Ju Li, Yijia Ruan, Yanhong Huang, Jianqi Shi and Shengchao Qin
  • Integrating Goal Model into Rule-based Adaptation
    Tianqi Zhao, Tao Zan, Haiyan Zhao, Zhenjiang Hu and Zhi Jin
  • An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel
    Matthieu Jimenez, Mike Papadakis and Yves Le Traon
  • Projected Control Graph for Accurate and Efficient Analysis of Safety and Security Vulnerabilities
    Ahmed Tamrawi and Suresh Kothari
  • Compositional Symbolic Execution: Incremental Solving Revisited
    Yude Lin, Tim Miller and Harald Sondergaard

Short Papers

  • Schemata, Acculturation, and Cognition: Expatriates in Japan's Software Industry
    William Baber and Arto Ojala
  • A Review of Six Years of Asia-Pacific Software Engineering Conference
    Lov Kumar, Saikrishna Sripada and Ashish Sureka
  • Identifying practitioners’ arguments and evidence in blogs: insights from a pilot study
    Ashley Williams and Austen Rainer
  • An Empirical Investigation into Code Smell Elimination Sequences for Energy Efficient Software
    Garima Dhaka and Paramvir Singh
  • Combatting Use Case Points’ Limitations with COCOMO(R) II and Relative Difficulty
    Anandi Hira and Barry Boehm
  • The Improvement of the Trustworthiness of Android App Stores in China
    Yao Wang, Yi Ying Ng, Yuan Dong, Hucheng Zhou and Zhiyuan Ji
  • Detecting and Localizing Visual Inconsistencies in Web Applications
    Sonal Mahajan, Krupa Benhur Gadde, William G.J. Halfond and Anjaneyulu Pasala
  • Developers Expertise and Roles on Software Technologies
    Eleni Constantinou and Georgia Kapitsaki
  • Adoption and Suitability of Software Development Methods and Practices
    Sherlock A. Licorish, Johannes Holvitie, Sami Hyrynsalmi, Ville Leppänen, Rodrigo O. Spínola, Thiago S. Mendes, Stephen G. MacDonell and Jim Buchan
  • Predictive Tool for Software Team Performance
    Tri Nguyen and Caslon Chua
  • Our Journey to becoming Agile: Experiences with agile transformation in Samsung Electronics
    Suhyun Kim, Hyungjong Lee, Yonghwi Kwon, Myeongsang Yu and Hyeeun Jo
  • Design and Implementation of Training Course for Software Process Improvement Engineers
    Noriyoshi Kuno and Tsuyoshi Nakajima
  • History-based Test Case Prioritization for Failure Information
    Younghwan Cho, Jeongho Kim and Eunseok Lee
  • System Product Line Engineering for Small Appliances with Driver Derivation
    Shintaro Hosoai, Natsuko Noda and Tomoji Kishi
  • Guiding Identification of Missing Scenarios for Dynamic Feature Location
    Shinpei Hayashi, Hiroshi Kazato, Takashi Kobayashi, Tsuyoshi Oshima, Katsuyuki Natsukawa, Takashi Hoshino and Motoshi Saeki
  • RE_PROV: Modeling Requirement Provenance with PROV
    Yangfan He and Xiaojian Li