By Topic

2016 23rd Asia-Pacific Software Engineering Conference (APSEC)

6-9 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 70
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3927 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chairs

    Publication Year: 2016, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the Program Chairs

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2016, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2016, Page(s):xv - xvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (111 KB)

    Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorials

    Publication Year: 2016, Page(s):xviii - xxii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (74 KB)

    These tutorials discuss the following: Weka Data Mining Tool; Applying Model Driven Engineering Technologies in the Creation of Domain Specific Modeling Languages; SOUFFLÉ: Datalog Compiler for Static Program Analysis; Interaction Design for Specifying Requirements; Dynamic analysis of JavaScript with Jalangi. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Find your Open Source License Now!

    Publication Year: 2016, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Open Source software is widely used from end-users, software engineers and researchers. The license that accompanies such software is very important for its further use and distribution. However, engineers and researchers are many times not able to choose the appropriate license based on the purpose of the product under development due to the lack of sufficient information on the specifics of each... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Task Recommendation with Developer Social Network in Software Crowdsourcing

    Publication Year: 2016, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Recently, crowdsourcing has been increasingly used in software industry to lower costs and increase innovations, by utilizing experiences, labor, or creativity of developers worldwide. In software crowdsourcing platforms, developers expect to find suitable tasks for their interests and abilities. So it is significant for software crowdsourcing to build a recommender system to match developers with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Influences Usability Defect Reporting? — A Survey of Software Development Practitioners

    Publication Year: 2016, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    Software development organizations invest in test automation tools and methods to optimize defect discovery rates. The true value of these tools is realized when the defects are addressed before release, and hence good quality defect reports are critical. We describe a survey we conducted to better understand usability defect reporting, in particular, influences on the quality of usability defect ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EXPSOL: Recommending Online Threads for Exception-Related Bug Reports

    Publication Year: 2016, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    An exception-related bug is a kind of program bug which causes exceptions. During software maintenance, when programmers repair exception-related bugs, they typically analyze thrown exceptions to understand the root causes of such bugs. When encountering unfamiliar thrown exceptions, programmers often refer to online forum threads (e.g. StackOverflow) to understand how to fix them. Although some g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Retrieving Design Pattern Usage Examples using Domain Matching

    Publication Year: 2016, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Software design patterns provide well-known solutions to recurring problems faced by developers. However, not all developers are proficient with the use of design patterns. To facilitate developers in this regard, we propose a design pattern usage examples retrieval system. The retrieval is based on analyzing the developer's development context to provide design pattern usage examples from project... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LibSift: Automated Detection of Third-Party Libraries in Android Applications

    Publication Year: 2016, Page(s):41 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Android applications typically contain multiple third-party libraries and recent studies have shown that the presence of third-party libraries may introduce privacy risks and security threats. Furthermore, researchers have reported the importance of considering the third-party libraries for their program analysis tasks. A reason being that the presence of third-party libraries may dilute the featu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the Role Matter? An Investigation of the Code Quality of Casual Contributors in GitHub

    Publication Year: 2016, Page(s):49 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB) | HTML iconHTML

    For popular Open Source Software (OSS) projects there are always a large number of worldwide developers who have been glued to making code contributions, while most of these developers play the role of casual contributors due to their very limited code commits (for fixing defects and enhancing features, casually). The frequent turnover of such group of casual developers and the wide variations amo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does the “Project Manager” Still Exist in Agile Software Development Projects?

    Publication Year: 2016, Page(s):57 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    The project manager has been a ubiquitous feature of traditional software development projects. However, agile software development (ASD) methods which emphasize selforganizing teams and rapid response to change have done away with the project manager's title. New job titles such as the scrum master and product owner have been introduced instead. It is unclear as to what extent the "project manage... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does it Fit Me Better? User Segmentation in Requirements Engineering

    Publication Year: 2016, Page(s):65 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    Deriving requirements that satisfy the needs and desires of users is crucial in software engineering. However, to be able to specify these requirements, potential users must be identified and perhaps prioritised first. In organisational and commercial settings, users often have well-defined roles and responsibilities tied to specific work-flows, which are exploited in requirements engineering meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Model Checking Based Approach for Containment Checking of UML Sequence Diagrams

    Publication Year: 2016, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    The main challenge in software development process is to detect and fix the deviations of system's behaviors at different abstraction levels in early phases. For this purpose, UML 2 sequence diagrams are widely used for describing and analyzing the communication behavior of software systems. This paper describes a containment checking approach for UML 2 sequence diagrams to verify whether the beha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model-Based Continuous Verification

    Publication Year: 2016, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Model-based engineering has emerged as a key set of technologies to engineer software systems. While system source code is expected to match with the designed model, legacy systems and workarounds during deployment would undoubtedly change the source code, making the actual running implementation mismatch with its model. Such mismatch poses a challenge of maintaining the conformance between the mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Driven Software Security Architecture of Systems-of-Systems

    Publication Year: 2016, Page(s):89 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (701 KB) | HTML iconHTML

    Recently, there is a growing interest in Systems of Systems (SoS), their architecture, security and application domains. However, their specific characteristics such as the operational independence of SoS constituent systems (CS), the absence of central authority and their emergent behavior make the modeling of their structure, behavior and security a complex task. One of the current main security... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical Study of Cognitive Layered Approach for Understanding Security Requirements Using Problem Domain Ontology

    Publication Year: 2016, Page(s):97 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1929 KB) | HTML iconHTML

    Socio-technical Systems (STS) consist of complicated requirements that consider a variety of stakeholders' viewpoints, and are inherently complex due to heterogeneity characteristics of STS components. However, security in STS is still a major issue, which can be explained by the resulting cost and the impact of the STS intrusion on the whole enterprise. However, research related to recommending s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel

    Publication Year: 2016, Page(s):105 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (171 KB) | HTML iconHTML

    Vulnerabilities are one of the main concerns faced by practitioners when working with security critical applications. Unfortunately, developers and security teams, even experienced ones, fail to identify many of them with severe consequences. Vulnerabilities are hard to discover since they appear in various forms, caused by many different issues and their identification requires an attacker's mind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Projected Control Graph for Accurate and Efficient Analysis of Safety and Security Vulnerabilities

    Publication Year: 2016, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (965 KB) | HTML iconHTML

    The goal of path-sensitive analysis (PSA) is to achieve accuracy by accounting precisely for the execution behavior along each path of a control flow graph (CFG). A practical adoption of PSA is hampered by two roadblocks: (a) the exponential growth of the number of CFG paths, and (b) the exponential complexity of a path feasibility check. We introduce projected control graph (PCG) as an optimal ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.