By Topic

21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06)

18-22 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 74
  • 21st IEEE International Conference on Automated Software Engineering - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (172 KB)
    Freely Available from IEEE
  • 21st IEEE International Conference on Automated Software Engineering - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • 21st IEEE International Conference on Automated Software Engineering - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • 21st IEEE International Conference on Automated Software Engineering - Table of contents

    Publication Year: 2006, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (43 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Expert reviewer panel

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Introduction to tool demonstrations

    Publication Year: 2006, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Verifying Specifications with Proof Scores in CafeOBJ

    Publication Year: 2006, Page(s):3 - 10
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (129 KB) | HTML iconHTML

    Verifying specifications is still one of the most important undeveloped research topics in software engineering. It is important because quite a few critical bugs are caused at the level of domains, requirements, and/or designs. It is also important for the cases where no program codes are generated and specifications are analyzed and verified only for justifying models of problems in real world. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Winning the DARPA Grand Challenge: A Robot Race through the Mojave Desert

    Publication Year: 2006
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB) | HTML iconHTML

    Summary form only given. The DARPA Grand Challenge was the most significant event in the field of robotics in more than a decade. A mobile ground robot had to traverse 132 miles of punishing desert terrain in less than ten hours. In 2004, the best robot only made 7.3 miles. A year later, Stanford won this historical challenge and cashed the } prize. This talk, delivered by the leader of the Stanfo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Property Checking for Software: Past, Present and Future

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (55 KB) | HTML iconHTML

    Summary form only given. Over the past few years, we have seen several automatic static analysis tools being developed and deployed in industrial-strength software development. I will survey several of these tools ranging from heuristic and scalable analysis tools (such as PREFix, PREFast and Metal), to sound analysis tools based on counter example driven refinement (such as SLAM). Then, I will pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Information Aggregation for Scaling Scale-Resistant Services

    Publication Year: 2006, Page(s):15 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Machine learning provides techniques to monitor system behavior and predict failures from sensor data. However, such algorithms are "scale resistant" $high computational complexity and not parallelizable. The problem then becomes identifying and delivering the relevant subset of the vast amount of sensor data to each monitoring node, despite the lack of explicit "relevance" labels. The simplest so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating Domain-Specific Visual Language Editors from High-level Tool Specifications

    Publication Year: 2006, Page(s):25 - 36
    Cited by:  Papers (12)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1255 KB) | HTML iconHTML

    Domain-specific visual language editors are useful in many areas of software engineering but developing such editors is challenging and time-consuming. We describe an approach to generating a wide range of these graphical editors for use as plug-ins to the Eclipse environment. Tool specifications from an existing meta-tool, Pounamu, are interpreted to produce dynamic, multi-view, multiuser Eclipse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automated Formal Approach to Managing Dynamic Reconfiguration

    Publication Year: 2006, Page(s):37 - 46
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (309 KB) | HTML iconHTML

    Dynamic reconfiguration is the process of making changes to software at run-time. The motivation for this is typically to facilitate adaptive systems which change their behavior in response to changes in their operating environment or to allow systems with a requirement for continuous service to evolve uninterrupted. To enable development of reconfigurable applications, we have developed OpenRec, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Differencing and Merging of Architectural Views

    Publication Year: 2006, Page(s):47 - 58
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Existing approaches to differencing and merging architectural views are based on restrictive assumptions such as requiring view elements to have unique identifiers or exactly matching types. We propose an approach based on structural information by generalizing a published polynomial-time tree-to-tree correction algorithm (that detects inserts, renames and deletes) into a novel algorithm to additi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing

    Publication Year: 2006, Page(s):59 - 68
    Cited by:  Papers (18)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Testing involves two major activities: generating test inputs and determining whether they reveal faults. Automated test generation techniques include random generation and symbolic execution. Automated test classification techniques include ones based on uncaught exceptions and violations of operational models inferred from manually provided tests. Previous research on unit testing for object-ori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Command-Form Coverage for Testing Database Applications

    Publication Year: 2006, Page(s):69 - 80
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    The testing of database applications poses new challenges for software engineers. In particular, it is difficult to thoroughly test the interactions between an application and its underlying database, which typically occur through dynamically-generated database commands. Because traditional code-based coverage criteria focus only on the application code, they are often inadequate in exercising the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Identification of Bug-Introducing Changes

    Publication Year: 2006, Page(s):81 - 90
    Cited by:  Papers (55)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1181 KB) | HTML iconHTML

    Bug-fixes are widely used for predicting bugs or finding risky parts of software. However, a bug-fix does not contain information about the change that initially introduced a bug. Such bug-introducing changes can help identify important properties of software bugs such as correlated factors or causalities. For example, they reveal which developers or what kinds of source code changes introduce mor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modularity Analysis of Logical Design Models

    Publication Year: 2006, Page(s):91 - 102
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectural modeling and analysis approach, and automated tool support, for improved reasoning in these terms. However, the complexity of constraint satisfaction limited the size of models that we could analyze. The contribution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Portable Compiler-Integrated Approach to Permanent Checking

    Publication Year: 2006, Page(s):103 - 112
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyday development tools. To radically change the situation, we explore the integration of simple user-defined checks into the core of every development process: the compiler. The checks we implement express constrained reach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating and Scheduling an Open Set of Static Analyses

    Publication Year: 2006, Page(s):113 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    To improve the productivity of the development process, more and more tools for static software analysis are tightly integrated into the incremental build process of an IDE. If multiple interdependent analyses are used simultaneously, the coordination between the analyses becomes a major obstacle to keep the set of analyses open. We propose an approach to integrating and scheduling an open set of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering of Design Patterns from Java Source Code

    Publication Year: 2006, Page(s):123 - 134
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (567 KB) | HTML iconHTML

    Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated pattern detection approach. The new approach is based on our reclassification of the GoF patterns by their pattern intent. We argue that the GoF pattern catalog classifies design patterns in the forward-engineering sense; our r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ArchTrace: Policy-Based Support for Managing Evolving Architecture-to-Implementation Traceability Links

    Publication Year: 2006, Page(s):135 - 144
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Traditional techniques of traceability detection and management are not equipped to handle evolution. This is a problem for the field of software architecture, where it is critical to keep synchronized an evolving conceptual architecture with its realization in an evolving code base. ArchTrace is a new tool that addresses this problem through a policy-based infrastructure for automatically updatin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.