


default search action
29th APSEC 2022: Virtual Event, Japan
- 29th Asia-Pacific Software Engineering Conference, APSEC 2022, Virtual Event, Japan, December 6-9, 2022. IEEE 2022, ISBN 978-1-6654-5537-4

- Wenyin Li, Meng Wang, Bin Yu, Yuhang Shi, Mingxin Fu, You Shao:

Grey-box Fuzzing Based on Execution Feedback for EOSIO Smart Contracts. 1-10 - Xiaoya Xia, Zhenjie Weng, Wei Wang, Shengyu Zhao:

Exploring Activity and Contributors on GitHub: Who, What, When, and Where. 11-20 - Nitsan Amit, Dror G. Feitelson:

The Language of Programming: On the Vocabulary of Names. 21-30 - Chenyang Zhu, Yujie Cai, Can Hu

, Jia Bi:
Efficient Reinforcement Learning with Generalized-Reactivity Specifications. 31-40 - Xiaodong Zhang, Jing Zhou:

UTCache: Updatable Transactional Cache For Database-Driven Applications. 41-50 - Tianming Zheng, Zhixin Tong, Ping Yi, Yue Wu:

Automated Generation of Bug Samples Based on Source Code Analysis. 51-60 - Aizaz Sharif, Dusica Marijan:

Adversarial Deep Reinforcement Learning for Improving the Robustness of Multi-agent Autonomous Driving Policies. 61-70 - Yuki Osumi, Naotaka Umekawa, Hitomi Komata, Shinpei Hayashi:

Empirical Study of Co-Renamed Identifiers. 71-80 - Kicheol Kim, Misoo Kim

, Eunseok Lee:
Systematic Analysis of Defect-Specific Code Abstraction for Neural Program Repair. 81-89 - Anna Mitchell, Dharini Balasubramaniam

, Jade Fletcher
:
Incorporating Ethics in Software Engineering: Challenges and Opportunities. 90-98 - Anh Tuan Nguyen, Tien N. Nguyen:

Incremental Relational Topic Model for Duplicate Bug Report Detection. 99-108 - Jia Lu, Ming Xu:

Bisection Value Iteration. 109-118 - Lwin Khin Shar

, Wei Minn
, Ta Nguyen Binh Duong, Jiani Fan
, Lingxiao Jiang
, Daniel Lim Wai Kiat:
DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning. 119-128 - Ismaïl Mendil, Peter Riviere

, Yamine Aït Ameur, Neeraj Kumar Singh, Dominique Méry, Philippe A. Palanque:
Non-Intrusive Annotation-Based Domain-Specific Analysis to Certify Event-B Models Behaviours. 129-138 - Jean-Guy Schneider, Sung Une Lee:

An Experimental Comparison of Clone Detection Techniques using Java Bytecode. 139-148 - Shunhui Ji, Shaoqing Zhu, Pengcheng Zhang, Hai Dong

:
Data Flow Reduction Based Test Case Generation for Smart Contracts. 149-158 - Guohuan Ding, Jing Liu:

SysML Flow Model. 159-168 - Xiaoliang Wu, Ajitha Rajan:

Catch Me If You Can: Blackbox Adversarial Attacks on Automatic Speech Recognition using Frequency Masking. 169-178 - Guofeng Zhang

, Zhenbang Chen, Ziqi Shuai:
Symbolic Execution of Floating-point Programs: How far are we? 179-188 - Jialong Li, Mingyue Zhang, Zhenyu Mao, Haiyan Zhao, Zhi Jin, Shinichi Honiden, Kenji Tei:

Goal-oriented Knowledge Reuse via Curriculum Evolution for Reinforcement Learning-based Adaptation. 189-198 - Liang Tan, Christoph Bockisch:

Diff Feature Matching Network in Refactoring Detection. 199-208 - Esther Cho, Yong-Jun Shin, Sangwon Hyun, Hansu Kim, Doo-Hwan Bae:

Automatic Generation of Metamorphic Relations for a Cyber-Physical System-of-Systems Using Genetic Algorithm. 209-218 - Yin Liu

, Shuangyi Li, Eli Tilevich:
Toward a Better Alignment Between the Research and Practice of Code Search Engines. 219-228 - Tingrui Yu, Xiaodong Gu, Beijun Shen:

Code Question Answering via Task-Adaptive Sequence-to-Sequence Pre-training. 229-238 - Daisuke Yamaguchi

, Takuya Iwatsuka:
Two-Stage Patch Synthesis for API Migration from Single API Usage Example. 239-248 - Aparna Pisolkar, Md Tajmilur Rahman:

An Empirical Study of Predicting Fault-prone Components and their Evolution. 249-258 - Anissa Kheireddine, Etienne Renault, Souheib Baarir:

Tuning SAT solvers for LTL Model Checking. 259-268 - Yanze Wang, Shanshan Li, Huikun Liu, He Zhang, Bo Pan:

A Reference Architecture for Blockchain-based Traceability Systems Using Domain-Driven Design and Microservices. 269-278 - Sejin Jung, Junbeom Yoo:

An Approach for Hazard Analysis of Multiple-Cooperative Systems Considering Dynamic Configuration Uncertainty. 279-288 - Guoming Long, Tao Chen, Georgina Cosma

:
Multifaceted Hierarchical Report Identification for Non-Functional Bugs in Deep Learning Frameworks. 289-298 - Meixi Liu, Ziqi Shuai, Luyao Liu, Kelin Ma, Ke Ma:

Optimal Refinement-based Array Constraint Solving for Symbolic Execution. 299-308 - Oleksandr Zaitsev

, Stéphane Ducasse, Nicolas Anquetil, Arnaud Thiefaine:
How Libraries Evolve: A Survey of Two Industrial Companies and an Open-Source Community. 309-317 - Xuanying Liu, Zonghao Li, Jiaqi Zou, Haonan Tong:

An Empirical Study on Multi-Source Cross-Project Defect Prediction Models. 318-327 - Guofeng Zhang

, Zhenbang Chen, Ziqi Shuai
, Yufeng Zhang, Ji Wang:
Synergizing Symbolic Execution and Fuzzing By Function-level Selective Symbolization. 328-337 - Chenghu Ma, Liqian Chen, Xin Yi, Guangsheng Fan, Ji Wang:

NuMFUZZ: A Floating-Point Format Aware Fuzzer for Numerical Programs. 338-347 - Shun Yang, Bo Cai

:
Multi-Perspective Alignment Mechanism for Code Search. 348-356 - Zhihan Li, Yi Cheng, Haiyang Yang, Li Kuang, Lingyan Zhang:

Retrieve-Guided Commit Message Generation with Semantic Similarity And Disparity. 357-366 - Jiayi Chen, Zhixing Wang, Yuchen Jiang, Jun Pang, Tian Zhang, Minxue Pan, Jianwen Sun:

NEGAR: Network Embedding Guided Architecture Recovery for Software Systems. 367-376 - Gwen Salaün:

Quantifying the Similarity of BPMN Processes. 377-386 - Maiko Onishi, Shinpei Ogata, Kozo Okano, Daisuke Bekki:

Reducing Syntactic Complexity for Information Extraction from Japanese Requirement Specifications. 387-396 - Zheng Wang, Xin Yi

, Hengbiao Yu, Banghu Yin:
Detecting High Floating-Point Errors via Ranking Analysis. 397-406 - Xiaozhen Zhang, Zhaoming Yang, Hui Kong, Weiqiang Kong:

Bounded Model Checking of Synchronous Reactive Models in Ptolemy II. 407-416 - Changze Huang, Hailian Zhou, Hongbing Zhao, Wenting Cai, Zhi Quan Zhou, Mingyue Jiang:

On the Usefulness of Crossover in Search-Based Test Case Generation: An Industrial Report. 417-421 - Noshin Tahsin, Kazi Sakib:

Refactoring Community Smells: An Empirical Study on the Software Practitioners of Bangladesh. 422-426 - Minhao Zhou, Zhe Quan, Xing Huang:

Unified program cross-architecture migration framework model. 427-431 - Shinobu Saito

, Kenji Takahashi, Yasuyuki Hamada, Jan Vermeulen:
RP2A: Rare Process-Pattern Analysis - Identifying Potential Problem Process-Patterns by Analyzing System Execution Data. 432-436 - Ikkaku Kawaguchi, Yasuhiro Hayase, Kyohei Kobayashi, Chiemi Watanabe:

AMF: A Field to Realize the Values of Agile Manifesto through Retrospectives. 437-441 - Tinghui Ouyang, Yoshiki Seo, Yutaka Oiwa:

Quality assurance study with mismatched data in sentiment analysis. 442-446 - Trung Kien Tran, Hieu Dinh Vo:

SCAR: Smart Contract Alarm Ranking. 447-451 - Saurabh Tiwari

, Kumar Iyer, Eduard Paul Enoiu:
Combining Model-Based Testing and Automated Analysis of Behavioural Models using GraphWalker and UPPAAL. 452-456 - Natanon Ritta, Tasha Settewong, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta

, Kenichi Matsumoto:
Reusing My Own Code: Preliminary Results for Competitive Coding in Jupyter Notebooks. 457-461 - Tasha Settewong, Natanon Ritta, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta

, Kenichi Matsumoto:
Why Visualize Data When Coding? Preliminary Categories for Coding in Jupyter Notebooks. 462-466 - Chu-Fei Wu, Shang-Pin Ma, An-Chi Shau, Hang-Wei Yeh:

Testing for Event-Driven Microservices Based on Consumer-Driven Contracts and State Models. 467-471 - Indira Febriyanti

, Raula Gaikovina Kula, Ruksit Rojpaisarnkit, Kanchanok Kannee, Yusuf Sulistyo Nugroho
, Kenichi Matsumoto:
Visualizing Contributor Code Competency for PyPI Libraries: Preliminary Results. 472-476 - Yu-Te Wang, Shang-Pin Ma, Yue-Jun Lai, Yan-Cih Liang:

Analyzing and Monitoring Kubernetes Microservices based on Distributed Tracing and Service Mesh. 477-481 - Mridha Md. Nafis Fuad, Kazi Sakib:

eBAT: An Efficient Automated Web Application Testing Approach Based on Tester's Behavior. 482-486 - Yuriko Takatsuka, Masateru Tsunoda:

Preliminary Analysis of the Influence of the Stereotype Threat on Computer Programming. 487-491 - Takuto Kudo, Masateru Tsunoda, Amjed Tahir, Kwabena Ebo Bennin, Koji Toda, Keitaro Nakasai, Akito Monden, Kenichi Matsumoto:

Preliminary Analysis of Review Method Selection Based on Bandit Algorithms. 492-496 - Alvine Boaye Belle, Yixi Zhao:

A checklist-based approach to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews. 502-506 - Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Apirak Hoonlor

, Mores Prachyabrued:
Virtual Reality for Software Engineering Presentations. 507-516 - Diego Vallespir, Silvana Moreno:

How students design simple programs: a study on the effort and perceptions of the design activity. 517-526 - Sebastian Geiss, Tim Jentzsch, Nils Wild, Christian Plewnia:

Automatic Programming Assessment System for a Computer Science Bridge Course - An Experience Report. 527-536 - Ruoqing Wang, Snezhina Milusheva, Stephan Krusche:

Balancing between Creativity and Efficiency in Software Engineering Project Courses. 537-546 - Usman Nasir

, Muhammad Laiq
:
Threshold Concepts and Skills in Software Architecture: Instructors' Perspectives. 547-553 - Kanon Harada, Katsuhisa Maruyama:

A Preliminary Finding on Programs Fixed by an APR Tool based on a Genetic Algorithm. 554-555 - Ryota Shinhama, Erina Makihara, Keiko Ono, Akitaka Yaguchi, Ayumu Taisho:

Comparison of Different Keyphrase Extraction Algorithms for Supporting Problem Selection in Online Judge System. 556-557 - Taiga Wakamatsu, Yutaro Mikaduki, Noriyuki Kushiro:

A Support Tool for Test Case First : * Trial for improving quality of specification document through writing system specifications and test cases concurrently. 558-559 - Satoshi Munakata, Caterina Urban, Haruki Yokoyama, Koji Yamamoto, Kazuki Munakata:

Verifying Attention Robustness of Deep Neural Networks against Semantic Perturbations. 560-561 - Jiaxuan Zhang, Kun Ma:

EDPS: Early Dropout Prediction System of MOOC Courses. 562-563 - Aiden Cheung, Jacky Keung

:
On the Scrutinization of the NFT Valuation Factors. 564-565 - Qifan Yu, Pengcheng Zhang, Hai Dong

, Yan Xiao, Shunhui Ji:
Bytecode Obfuscation for Smart Contracts. 566-567 - Hodaka Shinbori, Masateru Tsunoda:

How Does Grit Affect the Performance of Software Developers? 568-569 - Anivesh Panjiyar, Debanjan Sadhya

:
Defending against code injection attacks using Secure Design Pattern. 570-571 - Sentaro Onizuka, Tetsuya Kanda, Katsuro Inoue:

Comparison of Developer's Work Efficiency between Different Editors. 572-573 - Luiz Fernando Capretz, Abdul Rehman Gilal

:
What Pakistani Computer Science and Software Engineering Students Think about Software Testing? 574-575 - Alvine Boaye Belle, Yixi Zhao:

A new measure to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews. 576-577 - Mihato Ueda, Yousuke Asano, Hane Kondo

, Oh Sato
, Atsuo Hazeyama:
SceneCommitter: a screen scenario review system using the GitHub and Figma WebAPI in the waterfall based software development. 578-579 - Teruno Kajiura, Nao Souma, Miyu Sato, Mai Takahashi, Kimio Kuramitsu

:
An additional approach to pre-trained code model with multilingual natural languages. 580-581 - Ryo Soga, Hideyuki Kanuka, Daisuke Fukui, Masayoshi Mase:

Risk assessment to design business process incorporating AI tasks. 582-583 - Hane Kondo

, Atsuo Hazeyama:
Systematic Literature Review on Educational Effectiveness of Project-Based Learning for Software Development. 584-585 - Shinobu Saito

:
DigiSoC - Digital Software City - toward Software 3R: Reduce, Reuse, and Recycle. 586-587 - Ikuto Yamagata, Masateru Tsunoda, Keitaro Nakasai:

How Does Future Perspective Affect Job Satisfaction and Turnover Intention of Software Engineers? 588-589 - Lorenz Graf-Vlachy:

Battle of the Blocs: Quantity and Quality of Software Engineering Research by Origin. 590-591

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














