2017 24th Asia-Pacific Software Engineering Conference (APSEC)

4-8 Dec. 2017

Filter Results

Displaying Results 1 - 25 of 104
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - xiii
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2017, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2017, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • Short Papers and Posters Committee

    Publication Year: 2017, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2017, Page(s): xxii
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Symbolic Execution with Value-Range Analysis for Floating-Point Exception Detection

    Publication Year: 2017, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Symbolic execution is a classic program analysis technique which uses symbolic inputs to explore feasible program paths. It has been widely used in bug detection and test case generation. However, there is only limited success in applying this technique to detect errors in floating-point programs. The ubiquitous, yet complicated to solve, floating-point constraints make it challenging to apply sym... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Global Search for Inputs Triggering High Floating-Point Inaccuracies

    Publication Year: 2017, Page(s):11 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    Floating-point rounding errors are pervasive when using numerical code to implement the real arithmetic algorithm. In particular, high floating-point inaccuracies may cause serious problems once being triggered. Hence, a testing method that can find concrete test cases to trigger high floating-point inaccuracies, is quite helpful to aid debugging and reduce high inaccuracies. Recently, two testing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Array Invariants Synthesis in Induction-Loop Programs

    Publication Year: 2017, Page(s):21 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (258 KB)

    Abstract interpretation is capable of inferring a wide variety of quantifier-free program invariants. In this paper, we propose a general framework for building universally quantified abstract domains that leverage existing quantifier-free domains in induction-loop programs. This method is sound and converges in finite time. We instantiate this framework using two quantifier-free domains: differen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cultural Factors Influencing International Collaborative Software Engineering Education in China

    Publication Year: 2017, Page(s):31 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    Software engineering (SE) is a rapidly developing international discipline that requires up-to-date knowledge and skills. The need for well-educated professional software engineers is increasing globally. In China, universities are opening opportunities for collaboration and building cooperative relationships with Western universities in technology fields, including SE, to offer Chinese students p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Text-Mining Techniques and Tools for Systematic Literature Reviews: A Systematic Literature Review

    Publication Year: 2017, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Despite the importance of conducting systematic literature reviews (SLRs) for identifying the research gaps in software engineering (SE) research, SLRs are a complex, multi-stage, and time-consuming process if performed manually. Conducting an SLR in line with the guidelines and practice in the SE domain requires considerable effort and expertise. The objective of this SLR is to identify and class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mapping Study on Mining Software Process

    Publication Year: 2017, Page(s):51 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Background: Mining Software Process (MSP) helps distill important information about software process enactment from software data repositories. An increasing amount of research effort is being dedicated to MSP. These studies differ in various aspects (e.g., topics, data, and techniques) of MSP. Objective: We aim to study the state of the art on MSP from following aspects, i.e., research topics, da... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Traceability between Predicates in Event-B Refinement

    Publication Year: 2017, Page(s):61 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (678 KB) | HTML iconHTML

    Event-B requires engineers to satisfy proof obligations and inherit all predicates from abstract models while constructing concrete ones. Engineers typically derive predicates from abstract models through transformation with the intention of gradually refining the models. These kinds of intentions for refinement are essential for other engineers to understand the refinements. However, these are im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How PHP Releases Are Adopted in the Wild?

    Publication Year: 2017, Page(s):71 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    This empirical paper examines the adoption of PHP releases in the the contemporary world wide web. Motivated by continuous software engineering practices and software traceability improvements for release engineering, the empirical analysis is based on big data collected by web crawling. According to the empirical results based on discrete time-homogeneous Markov chain (DTMC) analysis, (i) adoptio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Approach to Traceability Recovery Based on Word Embeddings

    Publication Year: 2017, Page(s):81 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (672 KB) | HTML iconHTML

    Software traceability recovery, which reconstructs links between software artifacts, has become more and more vital to maintaining a software life cycle with the increase of software scale and complexity of software architecture. However, existing approaches mainly rely on information retrieval (IR) techniques. These methods are not very efficient at complex software artifacts which are mixed with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of LSSVM and SMOTE on Seven Open Source Projects for Predicting Refactoring at Class Level

    Publication Year: 2017, Page(s):90 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    Source code refactoring consisting of modifying the structure of the source code without changing its functionality and external behavior. We present a method to predict refactoring candidates at class level which can help developers in improving their design and structure of source code while preserving the behavior. We propose a technique to predict refactoring candidates based on the applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCSharp: An Efficient Three-Phase Code Clone Detector Using Modified PDGs

    Publication Year: 2017, Page(s):100 - 109
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    Detecting code clones in software systems is becoming more and more important with the blossom of open source projects. In spite of numerous active researches, there is still a lack of detecting clones especially high-level clones efficiently and accurately. In this paper, we present CCSharp, a three-phase PDG-based clone detector which can detect much more clones besides high-level ones in softwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Full Initialization Points of Objects to Support Code Refactorings

    Publication Year: 2017, Page(s):110 - 119
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB)

    A common need of refactorings that involve object allocations is to determine precisely the program points at which objects allocated at a given allocation site become fully initialized. In this paper we formalize the notion of full initialization points (FIPs) of allocation sites, and present a static analysis to determine precisely these program points. While this analysis can benefit several al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment

    Publication Year: 2017, Page(s):120 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3440 KB) | HTML iconHTML

    New generation communication technologies (e.g., 5G) enhance interactions in mobile and wireless communication networks between devices by supporting a large-scale data sharing. The vehicle is such kind of device that benefits from these technologies, so vehicles become a significant component of vehicular networks. Thus, as a classic application of Internet of Things (IoT), the vehicular network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noff: A Novel Extendible Parallel Library for High-Performance Network Traffic Monitoring

    Publication Year: 2017, Page(s):130 - 139
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1833 KB) | HTML iconHTML

    Nowadays, an in-depth understanding of the Internet traffic profile is indispensable. Many network monitoring applications claim the connection-oriented analysis. However, many existing capture tools are too low-performance to cope with the large network traffic flow. Though some tools using traffic sampling can handle heavy network stream, there is information loss. While some parallel methods ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reusable Framework for Modeling and Verifying In-Vehicle Networking Systems in the Presence of CAN and FlexRay

    Publication Year: 2017, Page(s):140 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (689 KB) | HTML iconHTML

    In an IVN system, electronic components are connected and communicated through multiple protocols subjected to different requirements. In practice, intelligent vehicles need to exchange data between the body control subsystem and the chassis control subsystem, usually involving both the controller area network (CAN) protocol and the FlexRay protocol. In such a system, delays and congestion of fram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Branch Frequency Spectra to Evaluate Operational Coverage

    Publication Year: 2017, Page(s):150 - 159
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (748 KB) | HTML iconHTML

    Coverage metrics try to quantify how well a software artifact is tested. High coverage numbers instill confidence in the software and might even be necessary to obtain certification. Unfortunately, achieving high coverage numbers does not imply high quality of the test suite. One shortcoming is that coverage metrics do not measure how well test suites cover systems in production. We look at covera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.