The objective of the ASE 2019 Demonstrations Track is to excite the software engineering community about new advances in our field through compelling demonstrations that help advance research and practice. The track is a highly interactive venue where researchers and practitioners can demonstrate their tools and discuss them with attendees.
Accepted Papers
Call for Contributions
Demonstrations should be tool-based and describe novel aspects of early prototypes or mature tools.
The tool demonstrations must communicate clearly the following information to the audience:
- the envisioned users;
- the software engineering challenge it proposes to address;
- the methodology it implies for its users; and
- the results of validation studies already conducted for mature tools,
- or the design of planned studies for early prototypes.
Highlighting scientific contributions through concrete artifacts is a critical supplement to the traditional ASE research papers. A demonstration provides the opportunity to communicate how the scientific approach has been implemented or how a specific hypothesis has been assessed, including details such as implementation and usage issues, data models and representations, APIs for tool and data access. Authors of regular research papers are thus also encouraged to submit an accompanying demonstration paper, stating clearly the contributions of the tool paper over the research paper.
EVALUATION
Each submission will be reviewed by at least three members of the demonstrations selection committee. The evaluation criteria include:
- the relevance of the proposed demonstration for the ASE audience;
- the technical soundness of the demonstrated tool;
- the originality of its underlying ideas;
- the quality of the optionally provided video, code, and datasets;
- and the degree to which it considers the relevant literature.
Tool demos that can demonstrate real-world applicability of the underlying ideas, e.g. by references to industrial case studies, will be particularly appreciated.
SUBMISSION
Submissions must conform to the ASE 2019 formatting and submission instructions (IEEE format). In particular, submissions of demonstrations papers must meet the following criteria:
- A demonstration submission must not exceed four pages (including all text, references, and figures).
- Authors are encouraged to submit a short video (between three and five minutes long) illustrating the demonstration. The video should be made available on YouTube at the time of submission. Videos should (i) provide an overview of the tool’s capabilities; (ii) walk through (some of) the tool capabilities; (iii) where appropriate, provide clarifying voice-over and/or annotation highlights; and (iv) be engaging and exciting for the watcher!
- Authors are encouraged to make their code and datasets open source, and to provide a URL for the code and datasets with the submission.
- A submission must not have been previously published in a demonstration form and must not simultaneously be submitted to another symposium other than ASE.
- Submissions for the tool track will NOT follow double-blind review process. If a tool track submission is accompanying a submission to the research track (which is double blind), please email the track chairs notifying them about this. The chairs will ensure that tool papers and research papers are not reviewed by the same people, to avoid revealing the authorship of research papers.
- The paper submission must be in PDF.
Submissions that do not comply with the instructions will be rejected without review. For further information, please email the track chairs.
Papers must be submitted electronically through HotCRP by June 19, 2019. At the end of the abstract, please append the URLs, if any, at which your demo video, code, and datasets can be found. Please note that for consistency, we require that ALL videos be uploaded to YouTube and made accessible during the time of reviewing. Authors of successful submissions will have the opportunity to revise the paper, the video (and its hosting location), the code, and the datasets by the camera-ready deadline.
Tue 12 Nov
10:00 - 10:40 Demonstration | Pangolin: An SFL-based Toolset for Feature Localization Bruno Miguel Sotto-Mayor de Castro MachadoIST, University of Lisbon, Alexandre PerezPalo Alto Research Center, Rui AbreuInstituto Superior Técnico, U. Lisboa & INESC-ID | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | A Quantitative Analysis Framework for Recurrent Neural Network Xiaoning DuNanyang Technological University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Ares: Inferring Error Specifications through Static Analysis Li ChiTsinghua University, Zuxing GuSchool of Software, Tsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Hongyu ZhangThe University of Newcastle | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-based Analysis of Variant-Rich Software Dennis ReulingSoftware Engineering Group, University of Siegen, Udo KelterSoftware Engineering Group, University of Siegen, Sebastian RulandTU Darmstadt, Real-time Systems Lab, Malte LochauTU Darmstadt Pre-print Media Attached File Attached | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | VeriAbs : Verification by Abstraction and Test Generation Mohammad AfzalTata Cosultancy Services, A AsiaTata Cosultancy Services, Avriti ChauhanTata Cosultancy Services, Bharti ChimdyalwarTata Consultancy Services, Priyanka DarkeTata Consultancy Services, Advaita DatarTata Consultancy Services Ltd, Shrawan KumarTata Cosultancy Services, R VenkateshTata Research Development and Design Centre | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks Xiaofei XieNanyang Technological University, Hongxu ChenNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs Xutong MaInstitute of Software, Chinese Academy of Sciences, Jiwei YanInstitute of Software, Chinese Academy of Sciences, Yaqi LiInstitute of Software, Chinese Academy of Sciences, Jun YanInstitute of Software, Chinese Academy of Sciences, Jian ZhangInstitute of Software, Chinese Academy of Sciences | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Yang FengUniversity of California, Irvine, Wenyuan ZhaoNanjing University, Zhenyu ChenNanjing University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing Xiao LiuSchool of Information Technology, Deakin University, Lingmin FanSchool of Computer Science and Technology, Anhui University, Jia XuSchool of Computer Science and Technology, Anhui University, Xuejun LiSchool of Computer Science and Technology, Anhui University, Lina GongSchool of Computer Science and Technology, Anhui University, John GrundyMonash University, Yun YangSwinburne University of Technology | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection Da LiState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang XuNanjing University, Ruiqing ZhangSearch Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing MaState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | FPChecker: Detecting Floating-Point Exceptions in GPU Applications Ignacio LagunaLawrence Livermore National Laboratory | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | PMExec: An Execution Engine of Partial UML-RT Models Mojtaba BagherzadehQueen's University, Karim JahedQueen's University, Nafiseh KahaniQueen's University, Juergen DingelQueen's University, Kingston, Ontario Pre-print |
10:40 - 11:00 Talk | Assessing the Generalizability of code2vec Token Embeddings Kang Hong JinSchool of Information Systems, Singapore Management University, Tegawendé F. BissyandéSnT, University of Luxembourg, David LoSingapore Management University Pre-print | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | Multi-Modal Attention Network Learning for Semantic Source Code Retrieval Yao WanZhejiang University, Jingdong ShuZhejiang University, Yulei SuiUniversity of Technology Sydney, Australia, Guandong XuUniversity of Technology, Sydney, Zhou ZhaoZhejiang University, Jian WuZhejiang University, philip yuUniversity of Illinois at Chicago | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | Experience Paper: Search-based Testing in Automated Driving Control ApplicationsACM SIGSOFT Distinguished Paper Award Christoph GladischCorporate Research, Robert Bosch GmbH, Thomas HeinzCorporate Research, Robert Bosch GmbH, Christian HeinzemannCorporate Research, Robert Bosch GmbH, Jens OehlerkingCorporate Research, Robert Bosch GmbH, Anne von VietinghoffCorporate Research, Robert Bosch GmbH, Tim PfitzerRobert Bosch Automotive Steering GmbH | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | Machine Translation-Based Bug Localization Technique for Bridging Lexical Gap Yan XiaoDepartment of Computer Science, City University of Hong Kong, Jacky KeungDepartment of Computer Science, City University of Hong Kong, Kwabena E. BenninBlekinge Institute of Technology, SERL Sweden, Qing MiDepartment of Computer Science, City University of Hong Kong Link to publication | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Talk | AutoFocus: Interpreting Attention-based Neural Networks by Code Perturbation Nghi Duy Quoc BuiSingapore Management University, Singapore, Yijun YuThe Open University, UK, Lingxiao JiangSingapore Management University Pre-print | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Demonstration | A Quantitative Analysis Framework for Recurrent Neural Network Xiaoning DuNanyang Technological University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University |
10:40 - 11:00 Talk | Test Transfer Across Mobile Apps Through Semantic Mapping Jun-Wei LinUniversity of California, Irvine, Reyhaneh JabbarvandUniversity of California, Irvine, Sam MalekUniversity of California, Irvine | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | Test Migration Between Mobile Apps with Similar Functionality | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | DaPanda: Detecting Aggressive Push Notification in Android Apps Tianming LiuBeijing University of Posts and Telecommunications, China, Haoyu WangBeijing University of Posts and Telecommunications, China, Li LiMonash University, Australia, Guangdong BaiGriffith University, Yao GuoPeking University, Guoai Xu Beijing University of Posts and Telecommunications | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | Automatic, highly accurate app permission recommendation Zhongxin LiuZhejiang University, Xin XiaMonash University, David LoSingapore Management University, John GrundyMonash University Link to publication | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Demonstration | LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform Shengcheng YuNanjing University, China, Chunrong FangNanjing University, Yang FengUniversity of California, Irvine, Wenyuan ZhaoNanjing University, Zhenyu ChenNanjing University | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Demonstration | Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing Yuanchun LiPeking University, Ziyue YangPeking University, Yao GuoPeking University, Xiangqun ChenPeking University |
10:40 - 12:20: Papers - Testing and Coverage at Cortez 1 Chair(s): Jonathan BellGeorge Mason University | ||||||||||||||||||||||||||||||||||||||||||
10:40 - 11:00 Talk | Automatic Self-Validation for Code Coverage Profilers Yibiao YangHuazhong University of Science and Technology, Yanyan JiangNanjing University, Zhiqiang ZuoNanjing University, China, Yang WangNanjing University, Hao SunUnaffiliated, Hongmin LuNanjing University, Yuming ZhouNanjing University, Baowen XuNanjing University Pre-print | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | Efficient Test Generation Guided by Field Coverage Criteria Ariel GodioDept. of Software Engineering Instituto Tecnológico de Buenos Aires, Valeria BengoleaDept. of Computer Science FCEFQyN, University of Rio Cuarto, Pablo PonzioDept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto, Marcelo F. FriasDept. of Software Engineering Instituto Tecnológico de Buenos Aires | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | Exploring Output-Based Coverage for Testing PHP Web Applications Hung Viet NguyenGoogle LLC, USA, Hung Dang PhanECpE Department, Iowa State University, Christian KästnerCarnegie Mellon University, Tien N. NguyenUniversity of Texas at Dallas Link to publication | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | PHANTA: Diversified Test Code Quality Measurement for Modern Software Development Media Attached | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Demonstration | TestCov: Robust Test-Suite Execution and Coverage Measurement Pre-print Media Attached File Attached | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Demonstration | VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization Chijin ZhouTsinghua University, Mingzhe WangTsinghua University, Jie LiangTsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Chengnian SunWaterloo University, Yu JiangTsinghua University |
13:40 - 15:20: Papers - Natural Language and Human Aspects at Cortez 2&3 Chair(s): Bogdan VasilescuCarnegie Mellon University | ||||||||||||||||||||||||||||||||||||||||||
13:40 - 14:00 Talk | Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Xin XiaMonash University, Guoqiang LiShanghai Jiao Tong University, Jianling SunZhejiang University Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:00 - 14:20 Talk | Automating App Review Response Generation Cuiyun GaoNanyang Technological University, Singapore, Jichuan ZengThe Chinese University of Hong Kong, Xin XiaMonash University, David LoSingapore Management University, Michael LyuThe Chinese University of Hong Kong, Irwin KingThe Chinese University of Hong Kong Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:20 - 14:40 Talk | Automatic Generation of Pull Request DescriptionsACM SIGSOFT Distinguished Paper Award Zhongxin LiuZhejiang University, Xin XiaMonash University, Christoph TreudeThe University of Adelaide, David LoSingapore Management University, Shanping LiZhejiang University Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:40 - 15:00 Talk | Recommending Who to Follow in the Software Engineering Twitter Space Abhishek Sharma Singapore Management University, Singapore, Yuan TianQueens University, Kingston, Canada, Agus SulistyaSchool of Information Systems, Singapore Management University, Dinusha WijedasaSchool of Information Systems, Singapore Management University, David LoSingapore Management University Pre-print | |||||||||||||||||||||||||||||||||||||||||
15:00 - 15:10 Demonstration | Developer Reputation Estimator (DRE) Sadika AmreenUniversity of Tennessee Knoxville, Andrey KarnauchUniversity of Tennessee Knoxville, Audris MockusUniversity of Tennessee - Knoxville | |||||||||||||||||||||||||||||||||||||||||
15:10 - 15:20 Demonstration | CocoQa: Question Answering for Coding Conventions over Knowledge Graphs Tianjiao DuShanghai JiaoTong University, Junming CaoShanghai JiaoTong University, Qinyue WuShanghai JiaoTong University, Wei LiShanghai JiaoTong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting ChenShanghai Jiao Tong University |
13:40 - 15:20: Papers - Testing and Verification at Cortez 1 Chair(s): Weihang WangUniversity at Buffalo, SUNY | ||||||||||||||||||||||||||||||||||||||||||
13:40 - 14:00 Talk | Systematically Covering Input Structure Nikolas HavrikovCISPA Helmholtz Center for Information Security, Andreas ZellerCISPA Helmholtz Center for Information Security Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:00 - 14:20 Talk | SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:20 - 14:40 Talk | Detecting Error-Handling Bugs without Error Specification Input Zhouyang JiaNational University of Defense Technology, Shanshan LiNational University of Defense Technology, Tingting YuUniversity of Kentucky, Xiangke LiaoNational University of Defense Technology, China, Ji WangNational University of Defense Technology, Xiaodong LiuNational University of Defense Technology, Yunhuai LiuPeking University | |||||||||||||||||||||||||||||||||||||||||
14:40 - 15:00 Talk | Test Automation and its Limitations Ahyoung SungSamsung Electronics, Yangsu KimSamsung Electronics, Sangjun KimSamsung Electronics, Jongin KimSamsung Electronics, Neo JangSamsung Electronics | |||||||||||||||||||||||||||||||||||||||||
15:00 - 15:10 Talk | Grading-Based Test Suite Augmentation Jonathan Osei-OwusuUniversity of Illinois at Urbana-Champaign, Angello AstorgaUniversity of Illinois at Urbana-Champaign, Liia ButlerUniversity of Illinois at Urbana-Champaign, Tao XiePeking University, Geoffrey ChallenUniversity of Illinois at Urbana-Champaign | |||||||||||||||||||||||||||||||||||||||||
15:10 - 15:20 Demonstration | MutAPK: Source-Codeless Mutant Generation for Android Apps Camilo Escobar-VelásquezUniversidad de los Andes, Michael Osorio-RiañoUniversidad de los Andes, Mario Linares-VásquezSystems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia |
16:00 - 16:20 Talk | Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisACM SIGSOFT Distinguished Paper Award Dongjie HeUniversity of New South Wales; Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Haofeng LiInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Lei WangInstitute of Computing Technology, Chinese Academy of Science, Haining MengInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Hengjie ZhengInstitute of Computing Technology, CAS; University of Chinese Academy of Sciences, Jie LiuUniversity of New South Wales, Shuangwei Huvivo AI Lab, Lian LiInstitute of Computing Technology at Chinese Academy of Sciences, China, Jingling XueUNSW Sydney | |||||||||||||||||||||||||||||||||||||||||
16:20 - 16:40 Talk | Characterizing Android App Signing Issues Haoyu WangBeijing University of Posts and Telecommunications, China, Hongxuan LiuPeking University, Xusheng XiaoCase Western Reserve University, Guozhu MengInstitute of Information Engineering, Chinese Academy of Sciences, Yao GuoPeking University | |||||||||||||||||||||||||||||||||||||||||
16:40 - 17:00 Talk | OAuthLint: An Empirical Study on OAuth Bugs in Android Applications Tamjid Al RahatUniversity of Virginia, Yu FengUniversity of California, Santa Barbara, Yuan TianUniversity of Virginia Pre-print | |||||||||||||||||||||||||||||||||||||||||
17:00 - 17:20 Talk | Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities? Link to publication DOI Pre-print Media Attached | |||||||||||||||||||||||||||||||||||||||||
17:20 - 17:30 Demonstration | SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods Goran PiskachevFraunhofer IEM, Lisa Nguyen Quang DoGoogle, Oshando JohnsonFraunhofer IEM, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM Pre-print Media Attached File Attached | |||||||||||||||||||||||||||||||||||||||||
17:30 - 17:40 Demonstration | Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs Ayesha SadiqMonash University, Li LiMonash University, Australia, Yuan-Fang LiMonash University, Ijaz AhmedUniversity of Lahore, Sea LingMonash University |
16:00 - 17:40: Papers - Testing and Visualization at Cortez 1 Chair(s): Amin AlipourUniversity of Houston | ||||||||||||||||||||||||||||||||||||||||||
16:00 - 16:20 Talk | History-Guided Configuration Diversification for Compiler Test-Program GenerationACM SIGSOFT Distinguished Paper Award Junjie ChenTianjin University, Guancheng WangPeking University, Dan HaoPeking University, Yingfei XiongPeking University, Hongyu ZhangThe University of Newcastle, Lu ZhangPeking University | |||||||||||||||||||||||||||||||||||||||||
16:20 - 16:40 Talk | Data-Driven Compiler Testing and Debugging Junjie ChenTianjin University | |||||||||||||||||||||||||||||||||||||||||
16:40 - 17:00 Talk | Targeted Example Generation for Compilation Errors Umair Z. AhmedNational University of Singapore, Renuka SindhgattaQueensland University of Technology, Australia, Nisheeth SrivastavaIndian Institute of Technology, Kanpur, Amey KarkareIIT Kanpur Link to publication Pre-print | |||||||||||||||||||||||||||||||||||||||||
17:00 - 17:20 Talk | Lightweight Assessment of Test-Case Effectiveness using Source-Code-Quality Indicators Giovanni GranoUniversity of Zurich, Fabio PalombaDepartment of Informatics, University of Zurich, Harald GallUniversity of Zurich Link to publication Pre-print | |||||||||||||||||||||||||||||||||||||||||
17:20 - 17:30 Demonstration | Visual Analytics for Concurrent Java Executions Cyrille ArthoKTH Royal Institute of Technology, Sweden, Monali PandeKTH Royal Institute of Technology, Qiyi TangUniversity of Oxford | |||||||||||||||||||||||||||||||||||||||||
17:30 - 17:40 Demonstration | NeuralVis: Visualizing and Interpreting Deep Learning Models Xufan ZhangState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue YinState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang FengUniversity of California, Irvine, Qingkai ShiHong Kong University of Science and Technology, Jia LiuState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu ChenNanjing University |
Wed 13 Nov
10:00 - 10:40 Demonstration | TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis Yuexing WangTsinghua University, Guang ChenTsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Jiaguang SunTsinghua University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules Pavan ChittimalliTCS Research, Kritika AnandTCS Research, Shrishti PradhanTCS Research, Sayandeep MitraTCS Research, Chandan PrakashTCS Research, Rohit ShereTCS Research, Ravindra NaikTCS Research, TRDDC, India | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Lancer: Your Code Tell Me What You Need Shufan ZhouSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | TestCov: Robust Test-Suite Execution and Coverage Measurement Pre-print Media Attached File Attached | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Prema: A Tool for Precise Requirements Editing, Modeling and Analysis Yihao HuangEast China Normal University, Jincao FengEast China Normal University, Hanyue ZhengEast China Normal University, Jiayi ZhuEast China Normal University, Shang WangEast China Normal University, Siyuan JiangEastern Michigan University, Weikai MiaoShanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang PuEast China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | XRaSE: Towards Virtually Tangible Software using Augmented Reality Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | MuSC: A Tool for Mutation Testing of Ethereum Smart Contract Zixin LiNanjing University, Haoran WuState Key Laboratory for Novel Software Technology, Nanjing University, Jiehui XuNanjing University, Xingya WangState Key Laboratory for Novel Software Technology, Nanjing University, Lingming ZhangThe University of Texas at Dallas, Zhenyu ChenNanjing University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq Bernd FischerStellenbosch University, Salvatore La TorreUniversità degli Studi di Salerno, Gennaro ParlatoUniversity of Molise | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | DeepMutation++: a Mutation Testing Framework for Deep Learning Systems Qiang HuKyushu University, Japan, Lei MaKyushu University, Xiaofei XieNanyang Technological University, Bing YuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts Mark MossbergTrail of Bits, Felipe ManzanoTrail of Bits, Eric HennenfentTrail of Bits, Alex GroceTrail of Bits, Gustavo GriecoTrail of Bits, Josselin FeistTrail of Bits, Trent BrunsonTrail of Bits, Artem DinaburgTrail of Bits Media Attached | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities Ruijie MengUniversity of Chinese Academy of Sciences, Biyun ZhuUniversity of Chinese Academy of Sciences, Hao YunUniversity of Chinese Academy of Sciences, Haicheng LiUniversity of Chinese Academy of Sciences, Yan CaiInstitute of Software, Chinese Academy of Sciences, Zijiang YangWestern Michigan University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines Reza AhmadiQueen's University, Karim JahedQueen's University, Juergen DingelQueen's University, Kingston, Ontario |
10:40 - 11:00 Talk | Understanding Exception-Related Bugs in Large-Scale Cloud Systems Haicheng ChenThe Ohio State University, Wensheng DouInstitute of Software, Chinese Academy of Sciences, Yanyan JiangNanjing University, Feng QinOhio State University, USA Pre-print | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | iFeedback: Exploiting User Feedback for Real-time Issue Detection in Large-Scale Online Service Systems Wujie ZhengTencent, Inc., Haochuan LuFudan University, Yangfan ZhouFudan University, Jianming LiangTencent, Haibing ZhengTencent, Yuetang DengTencent, Inc. | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | Software Microbenchmarking in the Cloud. How Bad is it Really? Christoph LaaberUniversity of Zurich, Joel ScheunerChalmers | University of Gothenburg, Philipp LeitnerChalmers University of Technology & University of Gothenburg Link to publication Pre-print | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | Continuous Incident Triage for Large-Scale Online Service Systems Junjie ChenTianjin University, Xiaoting HeMicrosoft, Qingwei LinMicrosoft Research, China, Hongyu ZhangThe University of Newcastle, Dan HaoPeking University, Feng GaoMicrosoft, Zhangwei XuMicrosoft, Yingnong DangMicrosoft Azure, Dongmei ZhangMicrosoft Research, China | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Demonstration | Kotless: a Serverless Framework for Kotlin Vladislav TankovJetBrains, ITMO University, Yaroslav GolubevJetBrains Research, ITMO University, Timofey BryksinJetBrains Research, Saint-Petersburg State University | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Demonstration | FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing Xiao LiuSchool of Information Technology, Deakin University, Lingmin FanSchool of Computer Science and Technology, Anhui University, Jia XuSchool of Computer Science and Technology, Anhui University, Xuejun LiSchool of Computer Science and Technology, Anhui University, Lina GongSchool of Computer Science and Technology, Anhui University, John GrundyMonash University, Yun YangSwinburne University of Technology |
13:40 - 15:20: Papers - Verification and Bug Detection at Cortez 1 Chair(s): Raghavan KomondoorIndian Institute of Science, Bangalore | ||||||||||||||||||||||||||||||||||||||||||
13:40 - 14:00 Talk | Mutation Analysis for Coq Ahmet CelikThe University of Texas at Austin, Karl PalmskogUniversity of Texas at Austin, Marinela ParovicThe University of Texas at Austin, Emilio Jesús Gallego AriasMINES ParisTech, Milos GligoricThe University of Texas at Austin | |||||||||||||||||||||||||||||||||||||||||
14:00 - 14:20 Talk | Verifying Arithmetic in Cryptographic C Programs Jiaxiang LiuShenzhen University, Xiaomu ShiShenzhen University, Ming-Hsien TsaiAcademia Sinica, Taiwan, Bow-Yaw WangAcademia Sinica, Bo-Yin YangAcademia Sinica Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:20 - 14:40 Talk | Model checking embedded control software using OS-in-the-loop CEGAR Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:40 - 15:00 Talk | Get rid of inline assembly through verification-oriented lifting Frédéric RecoulesCEA LIST, Sebastien BardinCEA LIST, Richard BonichonCEA LIST, Laurent MounierUniversité Grenoble Alpes, Marie-Laure PotetUniversité Grenoble Alpes DOI Pre-print | |||||||||||||||||||||||||||||||||||||||||
15:00 - 15:10 Demonstration | VeriAbs : Verification by Abstraction and Test Generation Mohammad AfzalTata Cosultancy Services, A AsiaTata Cosultancy Services, Avriti ChauhanTata Cosultancy Services, Bharti ChimdyalwarTata Consultancy Services, Priyanka DarkeTata Consultancy Services, Advaita DatarTata Consultancy Services Ltd, Shrawan KumarTata Cosultancy Services, R VenkateshTata Research Development and Design Centre | |||||||||||||||||||||||||||||||||||||||||
15:10 - 15:20 Demonstration | SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection Da LiState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan WangState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang XuNanjing University, Ruiqing ZhangSearch Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi CheungDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing MaState Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University |
Thu 14 Nov
10:00 - 10:40 Demonstration | PraPR: Practical Program Repair via Bytecode Mutation | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Kotless: a Serverless Framework for Kotlin Vladislav TankovJetBrains, ITMO University, Yaroslav GolubevJetBrains Research, ITMO University, Timofey BryksinJetBrains Research, Saint-Petersburg State University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | PeASS: A Tool for Identifying Performance Changes at Code Level David Georg ReicheltUniversität Leipzig, Stefan KühneUniversität Leipzig, Wilhelm HasselbringKiel University Pre-print Media Attached File Attached | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | MutAPK: Source-Codeless Mutant Generation for Android Apps Camilo Escobar-VelásquezUniversidad de los Andes, Michael Osorio-RiañoUniversidad de los Andes, Mario Linares-VásquezSystems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | CocoQa: Question Answering for Coding Conventions over Knowledge Graphs Tianjiao DuShanghai JiaoTong University, Junming CaoShanghai JiaoTong University, Qinyue WuShanghai JiaoTong University, Wei LiShanghai JiaoTong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting ChenShanghai Jiao Tong University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:03 Demonstration | Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing Yuanchun LiPeking University, Ziyue YangPeking University, Yao GuoPeking University, Xiangqun ChenPeking University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Developer Reputation Estimator (DRE) Sadika AmreenUniversity of Tennessee Knoxville, Andrey KarnauchUniversity of Tennessee Knoxville, Audris MockusUniversity of Tennessee - Knoxville | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | NeuralVis: Visualizing and Interpreting Deep Learning Models Xufan ZhangState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue YinState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang FengUniversity of California, Irvine, Qingkai ShiHong Kong University of Science and Technology, Jia LiuState Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu ChenNanjing University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Visual Analytics for Concurrent Java Executions Cyrille ArthoKTH Royal Institute of Technology, Sweden, Monali PandeKTH Royal Institute of Technology, Qiyi TangUniversity of Oxford | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs Ayesha SadiqMonash University, Li LiMonash University, Australia, Yuan-Fang LiMonash University, Ijaz AhmedUniversity of Lahore, Sea LingMonash University | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods Goran PiskachevFraunhofer IEM, Lisa Nguyen Quang DoGoogle, Oshando JohnsonFraunhofer IEM, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM Pre-print Media Attached File Attached | |||||||||||||||||||||||||||||||||||||||||
10:00 - 10:40 Demonstration | VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization Chijin ZhouTsinghua University, Mingzhe WangTsinghua University, Jie LiangTsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Chengnian SunWaterloo University, Yu JiangTsinghua University |
10:40 - 11:00 Talk | MAP-Coverage: a Novel Coverage Criterion for Testing Thread-Safe Classes Zan WangCollege of Intelligence and Computing, Tianjin University, Yingquan ZhaoCollege of Intelligence and Computing, Tianjin University, Shuang LiuCollege of Intelligence and Computing, Tianjin University, Jun SunSingapore Management University, Singapore, Xiang ChenSchool of Information Science and Technology, Nantong University, Huarui LinCollege of Intelligence and Computing, Tianjin University | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | Automating Non-Blocking Synchronization In Concurrent Data Abstractions Jiange ZhangUniversity of Colorado Colorado Springs, Qing YiUniversity of Colorado Colorado Springs, Damian DechevUniversity of Central Florida Pre-print | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | Automating CUDA Synchronization via Program Transformation Mingyuan WuSouthern University of Science and Technology, Lingming ZhangThe University of Texas at Dallas, Cong LiuEindhoven University of Technology, Shin Hwei TanSouthern University of Science and Technology, Yuqun ZhangSouthern University of Science and Technology | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs Ernest Bota PobeeCity University of Hong Kong, Xiupei MeiCity University of Hong Kong, Wing-Kwong ChanCity University of Hong Kong, Hong Kong | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Demonstration | VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq Bernd FischerStellenbosch University, Salvatore La TorreUniversità degli Studi di Salerno, Gennaro ParlatoUniversity of Molise | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Demonstration | ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities Ruijie MengUniversity of Chinese Academy of Sciences, Biyun ZhuUniversity of Chinese Academy of Sciences, Hao YunUniversity of Chinese Academy of Sciences, Haicheng LiUniversity of Chinese Academy of Sciences, Yan CaiInstitute of Software, Chinese Academy of Sciences, Zijiang YangWestern Michigan University |
10:40 - 12:20: Papers - Deep Models at Cortez 2&3 Chair(s): Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto | ||||||||||||||||||||||||||||||||||||||||||
10:40 - 11:00 Talk | Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningACM SIGSOFT Distinguished Paper Award Yan ZhengTianjin University, Xiaofei XieNanyang Technological University, Ting SuETH Zurich, Lei MaKyushu University, Jianye HaoTianjin University, Zhaopeng MengTianjin University, Yang LiuNanyang Technological University, Singapore, Ruimin ShenFuxi AI Lab in Netease, Yinfeng ChenFuxi AI Lab in Netease, Changjie FanFuxi AI Lab in Netease | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | A Study of Oracle Approximations in Testing Deep Learning Libraries | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | Property Inference for Deep Neural Networks Divya GopinathCarnegie Mellon University, Hayes ConverseThe University of Texas at Austin, Corina S. PasareanuCarnegie Mellon University Silicon Valley, NASA Ames Research Center, Ankur TalyGoogle | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms Qianyu GuoTianjin University, Sen ChenNanyang Technological University, Singapore, Xiaofei XieNanyang Technological University, Lei MaKyushu University, Qiang HuKyushu University, Japan, Hongtao LiuTianjin University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University, Li XiaohongTianJin University Pre-print | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Demonstration | DeepMutation++: a Mutation Testing Framework for Deep Learning Systems Qiang HuKyushu University, Japan, Lei MaKyushu University, Xiaofei XieNanyang Technological University, Bing YuKyushu University, Japan, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Demonstration | DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks Xiaofei XieNanyang Technological University, Hongxu ChenNanyang Technological University, Yi LiNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University |
10:40 - 12:20: Papers - Refactoring and Software Production at Hillcrest Chair(s): Cyrille ArthoKTH Royal Institute of Technology, Sweden | ||||||||||||||||||||||||||||||||||||||||||
10:40 - 11:00 Talk | RefBot: Intelligent Software Refactoring Bot Vahid AlizadehUniversity of Michigan, Mohamed Amine OualiUniversity of Michigan, Marouane KessentiniUniversity of Michigan, Meriem ChaterUniversity of Michigan | |||||||||||||||||||||||||||||||||||||||||
11:00 - 11:20 Talk | Automated Refactoring to Reactive Programming | |||||||||||||||||||||||||||||||||||||||||
11:20 - 11:40 Talk | Trusted Software Supply Chain Kapil SingiAccenture, R.P. Jagadeesh Chandra BoseAccenture Labs, Sanjay PodderAccenture, Adam P. BurdenAccenture | |||||||||||||||||||||||||||||||||||||||||
11:40 - 12:00 Talk | A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software Delivery Vibhu Saujanya SharmaAccenture Labs, Rohit MehraAccenture Labs, India, Sanjay PodderAccenture, Adam P. BurdenAccenture | |||||||||||||||||||||||||||||||||||||||||
12:00 - 12:10 Demonstration | Prema: A Tool for Precise Requirements Editing, Modeling and Analysis Yihao HuangEast China Normal University, Jincao FengEast China Normal University, Hanyue ZhengEast China Normal University, Jiayi ZhuEast China Normal University, Shang WangEast China Normal University, Siyuan JiangEastern Michigan University, Weikai MiaoShanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang PuEast China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd | |||||||||||||||||||||||||||||||||||||||||
12:10 - 12:20 Talk | Empirical Study of Programming to an Interface Benoît VerhaegheINRIA, Christopher FuhrmanÉcole de technologie supérieure, Nicolas AnquetilINRIA, Latifa GuerroujÉcole de Technologie Supérieure, Stéphane Ducasse INRIA Lille Pre-print Media Attached |
13:40 - 15:20: Papers - Mining and Bug Detection at Cortez 2&3 Chair(s): Chanchal K. RoyUniversity of Saskatchewan | ||||||||||||||||||||||||||||||||||||||||||
13:40 - 14:00 Talk | Automatically 'Verifying' Complex Systems through Learning, Abstraction and Refinement Jingyi WangNational University of Singapore, Singapore, Jun SunSingapore Management University, Singapore, Shengchao QinUniversity of Teesside, Cyrille JegourelISTD, Singapore University of Technology and Design Link to publication | |||||||||||||||||||||||||||||||||||||||||
14:00 - 14:20 Talk | Interactive semi-automated specification mining for debugging: An experience report Mohammad Jafar MashhadiUniversity of Calgary, Taha R. SiddiquiInfoMagnetics Technologies Corp, Hadi HemmatiUniversity of Calgary, Howard W. LoewenDepartment of Electrical & Computer Engineering, University of Calgary Link to publication | |||||||||||||||||||||||||||||||||||||||||
14:20 - 14:40 Talk | Improving reusability of software libraries through usage pattern mining Mohamed Aymen SaiedConcordia University, Ali OuniETS Montreal, University of Quebec, Houari SahraouiUniversité de Montréal, Raula Gaikovina KulaNAIST, Katsuro InoueOsaka University, David LoSingapore Management University Link to publication | |||||||||||||||||||||||||||||||||||||||||
14:40 - 15:00 Talk | Rule-based specification mining leveraging learning to rank Zherui CaoZhejiang University, Yuan TianQueens University, Kingston, Canada, Tien-Duy B. LeSchool of Information Systems, Singapore Management University, David LoSingapore Management University Link to publication | |||||||||||||||||||||||||||||||||||||||||
15:00 - 15:10 Demonstration | TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis Yuexing WangTsinghua University, Guang ChenTsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Jiaguang SunTsinghua University | |||||||||||||||||||||||||||||||||||||||||
15:10 - 15:20 Demonstration | Ares: Inferring Error Specifications through Static Analysis Li ChiTsinghua University, Zuxing GuSchool of Software, Tsinghua University, Min ZhouTsinghua University, Ming GuTsinghua University, Hongyu ZhangThe University of Newcastle |
13:40 - 15:20: Papers - Models and Logs at Hillcrest Chair(s): Timo KehrerHumboldt-Universtität zu Berlin | ||||||||||||||||||||||||||||||||||||||||||
13:40 - 14:00 Talk | Statistical Log Differencing Lingfeng BaoInstitute of Information Engineering, Chinese Academy of Sciences, Nimrod BusanyTel Aviv University, David LoSingapore Management University, Shahar MaozTel Aviv University Pre-print | |||||||||||||||||||||||||||||||||||||||||
14:00 - 14:20 Talk | Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression Jinyang LiuSun Yat-Sen University, Jieming ZhuHuawei Noah's Ark Lab, Shilin HeChinese University of Hong Kong, Pinjia HeETH Zurich, Zibin ZhengSun Yat-Sen University, Michael LyuThe Chinese University of Hong Kong | |||||||||||||||||||||||||||||||||||||||||
14:20 - 14:40 Talk | Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling Artur BoronatUniversity of Leicester | |||||||||||||||||||||||||||||||||||||||||
14:40 - 15:00 Talk | Size and Accuracy in Model Inference Nimrod BusanyTel Aviv University, Shahar MaozTel Aviv University, Yehonatan YulazariTel Aviv University Pre-print | |||||||||||||||||||||||||||||||||||||||||
15:00 - 15:10 Demonstration | PMExec: An Execution Engine of Partial UML-RT Models Mojtaba BagherzadehQueen's University, Karim JahedQueen's University, Nafiseh KahaniQueen's University, Juergen DingelQueen's University, Kingston, Ontario Pre-print | |||||||||||||||||||||||||||||||||||||||||
15:10 - 15:20 Demonstration | mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines Reza AhmadiQueen's University, Karim JahedQueen's University, Juergen DingelQueen's University, Kingston, Ontario |
16:00 - 17:40: Papers - Emerging Domains at Cortez 1 Chair(s): Joshua GarciaUniversity of California, Irvine | ||||||||||||||||||||||||||||||||||||||||||
16:00 - 16:20 Talk | Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility Jeffrey PalmerinoRochester Institute of Technology, Qi YuRochester Institute of Technology, Travis Desell University of North Dakota, Daniel KrutzRochester Institute of Technology Pre-print | |||||||||||||||||||||||||||||||||||||||||
16:20 - 16:40 Talk | Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences Yuqi ChenSingapore University of Technology and Design, Singapore, Chris PoskittSingapore University of Technology and Design, Jun SunSingapore Management University, Singapore, Sridhar AdepuSingapore University of Technology and Design, Singapore, Fan ZhangZhejiang University, Zhejiang Lab, and Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China Pre-print File Attached | |||||||||||||||||||||||||||||||||||||||||
16:40 - 17:00 Talk | Uncertainty-wise Test Case Generation and Minimization for Cyber-Physical Systems Man ZhangKristiania University, Shaukat AliSimula Research Lab, Tao YueNanjing University of Aeronautics and Astronautics & Simula Research Laboratory Link to publication | |||||||||||||||||||||||||||||||||||||||||
17:00 - 17:20 Talk | Finding Trends in Software Research George MathewDepartment of Computer Science, North Carolina State University, Amritanshu AgrawalWayfair, Tim MenziesNorth Carolina State University Link to publication | |||||||||||||||||||||||||||||||||||||||||
17:20 - 17:30 Demonstration | XRaSE: Towards Virtually Tangible Software using Augmented Reality Rohit MehraAccenture Labs, India, Vibhu Saujanya SharmaAccenture Labs, Vikrant KaulgudAccenture Labs, India, Sanjay PodderAccenture | |||||||||||||||||||||||||||||||||||||||||
17:30 - 17:40 Demonstration | MuSC: A Tool for Mutation Testing of Ethereum Smart Contract Zixin LiNanjing University, Haoran WuState Key Laboratory for Novel Software Technology, Nanjing University, Jiehui XuNanjing University, Xingya WangState Key Laboratory for Novel Software Technology, Nanjing University, Lingming ZhangThe University of Texas at Dallas, Zhenyu ChenNanjing University |
16:00 - 16:20 Talk | What is Wrong with Topic Modeling? (and How to Fix it Using Search-based Software Engineering) Amritanshu AgrawalWayfair, Wei FuDepartment of Computer Science, North Carolina State University, Tim MenziesNorth Carolina State University Link to publication | |||||||||||||||||||||||||||||||||||||||||
16:20 - 16:40 Talk | Cautious Adaptation of Defiant Components Paulo MaiaState University of Ceará, Lucas VieiraState University of Ceará, Matheus ChagasState University of Ceará, Yijun YuThe Open University, UK, Andrea ZismanThe Open University, Bashar NuseibehThe Open University (UK) & Lero (Ireland) | |||||||||||||||||||||||||||||||||||||||||
16:40 - 17:00 Talk | Better Development of Safety Critical Systems:Chinese High Speed Railway System Development Experience Report Zhiwei WuEast China Normal University, Jing LiuEast China Normal University, Xiang ChenCASCO Signal Ltd. | |||||||||||||||||||||||||||||||||||||||||
17:00 - 17:20 Talk | Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation Qiong FengDrexel University, Yuanfang Cai Drexel University, Rick KazmanUniversity of Hawai‘i at Mānoa, Di CuiXi'an Jiaotong University, Ting LiuXi'an Jiaotong University, Hongzhou FangDrexel University | |||||||||||||||||||||||||||||||||||||||||
17:20 - 17:30 Talk | Automated Trainability Evaluation for Smart Software Functions Ilias GerostathopoulosTechnical University of Munich, Stefan KugeleTechnical University of Munich, Christoph SeglerBMW Group Research, New Technologies, Innovations, Tomas BuresCharles University, Czech Republic, Alois KnollTechnical University of Munich Pre-print | |||||||||||||||||||||||||||||||||||||||||
17:30 - 17:40 Demonstration | Lancer: Your Code Tell Me What You Need Shufan ZhouSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun ShenSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University |