Conferences in DBLP
Alfonso Fuggetta The power of software. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:1- [Conf ] William R. Swartout Virtual humans: lessons learned in integrating a large-scale AI project. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:2- [Conf ] Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:3- [Conf ] Sujatha Kashyap , Vijay K. Garg Exploiting predicate structure for efficient reachability detection. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:4-13 [Conf ] Aysu Betin-Can , Tevfik Bultan , Mikael Lindvall , Benjamin Lux , Stefan Topp Application of design for verification with concurrency controllers to air traffic control software. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:14-23 [Conf ] Dezhuang Zhang , Rance Cleaveland Efficient temporal-logic query checking for presburger systems. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:24-33 [Conf ] Steven P. Reiss A component model for internet-scale applications. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:34-43 [Conf ] Ada Diaconescu , John Murphy Automating the performance management of component-based enterprise systems through the use of redundancy. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:44-53 [Conf ] Zhenchang Xing , Eleni Stroulia UMLDiff: an algorithm for object-oriented design differencing. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:54-65 [Conf ] Adrian Lienhard , Stéphane Ducasse , Gabriela Arévalo Identifying traits with formal concept analysis. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:66-75 [Conf ] Ana Milanova Precise identification of composition relationships for UML class diagrams. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:76-85 [Conf ] Rainer Koschke , Jochen Quante On dynamic feature location. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:86-95 [Conf ] Daniel Hoffman , Kevin Yoo Blowtorch: a framework for firewall test automation. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:96-103 [Conf ] Mark Hennessy , James F. Power An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:104-113 [Conf ] David Saff , Shay Artzi , Jeff H. Perkins , Michael D. Ernst Automatic test factoring for java. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:114-123 [Conf ] Gregor Engels , Martin Erwig ClassSheets: automatic generation of spreadsheet applications from object-oriented specifications. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:124-133 [Conf ] Karsten Ehrig , Claudia Ermel , Stefan Hänsgen , Gabriele Taentzer Generation of visual editors as eclipse plug-ins. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:134-143 [Conf ] Galen S. Swint , Calton Pu , Gueyoung Jung , Wenchang Yan , Younggyun Koh , Qinyi Wu , Charles Consel , Akhil Sahai , Koichi Moriyama Clearwater: extensible, flexible, modular code generation. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:144-153 [Conf ] Eelco Dolstra Secure sharing between untrusted users in a transparent source/binary deployment model. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:154-163 [Conf ] Yanyan Wang , Matthew J. Rutherford , Antonio Carzaniga , Alexander L. Wolf Automating experimentation on distributed testbeds. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:164-173 [Conf ] William G. J. Halfond , Alessandro Orso AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:174-183 [Conf ] David Shepherd , Jeffrey Palm , Lori L. Pollock , Mark Chu-Carroll Timna: a framework for automatically combining aspect mining analyses. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:184-193 [Conf ] Naoyasu Ubayashi , Genki Moriyama , Hidehiko Masuhara , Tetsuo Tamai A parameterized interpreter for modeling different AOP mechanisms. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:194-203 [Conf ] Akhil Mehra , John C. Grundy , John G. Hosking A generic approach to supporting diagram differencing and merging for collaborative design. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:204-213 [Conf ] Guillaume Langelier , Houari A. Sahraoui , Pierre Poulin Visualization-based analysis of quality for large-scale software systems. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:214-223 [Conf ] Alex Blewitt , Alan Bundy , Ian Stark Automatic verification of design patterns in Java. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:224-232 [Conf ] Rahul Agarwal , Amit Sasturkar , Liqiang Wang , Scott D. Stoller Optimized run-time race detection and atomicity checking using partial discovered types. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:233-242 [Conf ] Subash Shankar , Sinan Asa , Vladimir Sipos , Xiaowei Xu Reasoning about real-time statecharts in the presence of semantic variations. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:243-252 [Conf ] Sara Sprenkle , Emily Gibson , Sreedevi Sampath , Lori L. Pollock Automated replay and failure detection for web applications. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:253-262 [Conf ] Neelam Gupta , Haifeng He , Xiangyu Zhang , Rajiv Gupta Locating faulty code using failure-inducing chops. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:263-272 [Conf ] James A. Jones , Mary Jean Harrold Empirical evaluation of the tarantula automatic fault-localization technique. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:273-282 [Conf ] Songtao Xia , Ben Di Vito , César Muñoz Automated test generation for engineering applications. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:283-286 [Conf ] Shiva Nejati , Marsha Chechik Let's agree to disagree. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:287-290 [Conf ] Dan Hao , Ying Pan , Lu Zhang , Wei Zhao , Hong Mei , Jiasu Sun A similarity-aware approach to testing based fault localization. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:291-294 [Conf ] Aaron G. Cass , Leon J. Osterweil Process support to help novices design software faster and better. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:295-299 [Conf ] Magnus Eriksson , Henrik Morast , Jürgen Börstler , Kjell Borg The PLUSS toolkit - extending telelogic DOORS and IBM-rational rose to support product line use case modeling. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:300-304 [Conf ] Marcelo F. Frias , Rodolfo Gamarra , Gabriela Steren , Lorena Bourg A strategy for efficient verification of relational specifications, based on monotonicity analysis. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:305-308 [Conf ] Tsong Yueh Chen , Robert G. Merkel Quasi-random testing. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:309-312 [Conf ] Arnaud Gotlieb , Tristan Denmat , Bernard Botella Constraint-based test data generation in the presence of stack-directed pointers. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:313-316 [Conf ] Sonia Ben Mokhtar , Jinshan Liu , Nikolaos Georgantas , Valérie Issarny QoS-aware dynamic service composition in ambient intelligence environments. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:317-320 [Conf ] Na Liu , John C. Grundy , John G. Hosking A visual language and environment for composing web services. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:321-324 [Conf ] Abhay Vardhan , Mahesh Viswanathan Learning to verify branching time properties. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:325-328 [Conf ] Yuanfang Cai , Kevin J. Sullivan Simon: modeling and analysis of design space structures. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:329-332 [Conf ] Johannes Mayer Lattice-based adaptive random testing. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:333-336 [Conf ] Xiyang Liu , Hehui Liu , Bin Wang , Ping Chen , Xiyao Cai A unified fitness function calculation rule for flag conditions to improve evolutionary testing. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:337-341 [Conf ] Dianxiang Xu , Kendall E. Nygard A threat-driven approach to modeling and verifying secure software. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:342-346 [Conf ] Tao Wang , Abhik Roychoudhury Automated path generation for software fault localization. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:347-351 [Conf ] Américo Sampaio , Ruzanna Chitchyan , Paul Rayson EA-Miner: a tool for automating aspect-oriented requirements identification. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:352-355 [Conf ] David Coppit , Jiexin Lian yagg: an easy-to-use generator for structured test inputs. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:356-359 [Conf ] Alexander Egyed , Stefan Biffl , Matthias Heindl , Paul Grünbacher Determining the cost-quality trade-off for automated software traceability. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:360-363 [Conf ] Jean-Francois Couchot , Alain Giorgetti , Nikolai Kosmatov A uniform deductive approach for parameterized protocol safety. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:364-367 [Conf ] Johan Fredriksson , Massimo Tivoli , Ivica Crnkovic A component-based development framework for supporting functional and non-functional analysis in control system design. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:368-371 [Conf ] Rohit Gheyi , Tiago Massoni , Paulo Borba A rigorous approach for proving model refactorings. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:372-375 [Conf ] Alma L. Juarez Dominguez , Nancy A. Day Compositional reasoning for port-based distributed systems. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:376-379 [Conf ] Li Tan Model-based self-monitoring embedded programs with temporal logic specifications. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:380-383 [Conf ] Tim Menzies , Daniel Port , Zhihao Chen , Jairus Hihn Specialization and extrapolation of software cost models. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:384-387 [Conf ] Chouki Tibermacine , Régis Fleurquin , Salah Sadou NFRs-aware architectural evolution of component-based software. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:388-391 [Conf ] Jan Jürjens , Mark Yampolskiy Code security analysis with assertions. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:392-395 [Conf ] Tristan Denmat , Mireille Ducassé , Olivier Ridoux Data mining and cross-checking of execution traces: a re-interpretation of Jones, Harrold and Stasko test information. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:396-399 [Conf ] May Haydar , Sergiy Boroday , Alexandre Petrenko , Houari A. Sahraoui Properties and scopes in web model checking. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:400-404 [Conf ] Paola Inverardi , Leonardo Mostarda , Massimo Tivoli , Marco Autili Synthesis of correct and distributed adaptors for component-based systems: an automatic approach. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:405-409 [Conf ] Neha Rungta , Eric G. Mercer A context-sensitive structural heuristic for guided search model checking. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:410-413 [Conf ] Willem Visser , Corina S. Pasareanu , Radek Pelánek Test input generation for red-black trees using abstraction. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:414-417 [Conf ] Gregory M. Kapfhammer , Mary Lou Soffa , Daniel Mossé Testing in resource constrained execution environments. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:418-422 [Conf ] Justin Ward , Garrin Kimmell , Perry Alexander Prufrock: a framework for constructing polytypic theorem provers. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:423-426 [Conf ] Guozheng Ge , E. James Whitehead Jr. Bamboo: an architecture modeling and code generation framework for configuration management systems. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:427-428 [Conf ] Jürgen Falb , Roman Popp , Thomas Röck , Helmut Jelinek , Edin Arnautovic , Hermann Kaindl Using communicative acts in high-level specifications of user interfaces for their automated synthesis. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:429-430 [Conf ] Jocelyn Simmonds , M. Cecilia Bastarrica A tool for automatic UML model consistency checking. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:431-432 [Conf ] Peter Hearty , Norman E. Fenton , Martin Neil , Patrick Cates Automated population of causal models for improved software risk assessment. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:433-434 [Conf ] Steve M. Easterbrook , Sebastián Uchitel Introduction to doctoral symposium. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:435- [Conf ] Hui Wu , Jeff Gray Automated generation of testing tools for domain-specific languages. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:436-439 [Conf ] Renée C. Bryce , Charles J. Colbourn Constructing interaction test suites with greedy algorithms. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:440-443 [Conf ] Gudmund Grov Verifying the correctness of hume programs: an approach combining deductive and algorithmic reasoning. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:444-447 [Conf ] Yuehua Lin , Jeff Gray A model transformation approach to automatic model construction and evolution. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:448-451 [Conf ] Jiang Zheng In regression testing selection when source code is not available. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:452-455 [Conf ] Shiva Nejati Formal support for merging and negotiation. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:456-460 [Conf ] Carsten Rudolph , Antonio Mana Specification and automated processing of security requirements (SAPS'05). [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:460- [Conf ] Paul E. Black , Michael Kass Software security assurance tools, techniques and metrics (SSATTM). [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:461- [Conf ] Jonathan I. Maletic , Giuliano Antoniol , Jane Cleland-Huang , Jane Huffman Hayes 3rd international workshop on traceability in emerging forms of software engineering (TEFSE 2005). [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:462- [Conf ] Ewen Denney , Bernd Fischer , Dieter Hutter , Mark Jones Software certificate management (SoftCeMent'05). [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:463- [Conf ] Andrea Zisman , Thomas Ellman 2nd Workshop on the state of the art in automated software engineering. [Citation Graph (0, 0)][DBLP ] ASE, 2005, pp:464- [Conf ]