Yves Le Traon

Orcid: 0000-0002-1045-4861

Affiliations:
  • University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust (SnT)


According to our database1, Yves Le Traon authored at least 425 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DNN Testing, Regression Testing and Software Reliability Prediction.
Softw. Test. Verification Reliab., December, 2024

Metamorphic Testing and Web Element Localization.
Softw. Test. Verification Reliab., November, 2024

Fault tolerance and metamorphic relation prediction.
Softw. Test. Verification Reliab., September, 2024

Towards Exploring the Limitations of Test Selection Techniques on Graph Neural Networks: An Empirical Study.
Empir. Softw. Eng., September, 2024

Unsafe code detection in Rust and metamorphic testing of autonomous driving systems.
Softw. Test. Verification Reliab., August, 2024

Test Input Prioritization for 3D Point Clouds.
ACM Trans. Softw. Eng. Methodol., June, 2024

Investigating fault injection techniques in hardware-based deep neural networks and mutation-based fault localization.
Softw. Test. Verification Reliab., June, 2024

Active Code Learning: Benchmarking Sample-Efficient Training of Code Models.
IEEE Trans. Software Eng., May, 2024

Test Optimization in DNN Testing: A Survey.
ACM Trans. Softw. Eng. Methodol., May, 2024

Test code evolution and mutation testing.
Softw. Test. Verification Reliab., May, 2024

A Qualitative Study of App Acquisition and Management.
IEEE Trans. Comput. Soc. Syst., April, 2024

Test Input Prioritization for Machine Learning Classifiers.
IEEE Trans. Software Eng., March, 2024

Bud hunting with directed fuzz testing and source code vulnerability detection with advanced graph neural networks.
Softw. Test. Verification Reliab., March, 2024

KAPE: <i>k</i>NN-based Performance Testing for Deep Code Search.
ACM Trans. Softw. Eng. Methodol., February, 2024

LaF: Labeling-free Model Selection for Automated Deep Neural Network Reusing.
ACM Trans. Softw. Eng. Methodol., January, 2024

GraphPrior: Mutation-based Test Input Prioritization for Graph Neural Networks.
ACM Trans. Softw. Eng. Methodol., January, 2024

Test case prioritization and mutation testing.
Softw. Test. Verification Reliab., January, 2024

Big Code Search: A Bibliography.
ACM Comput. Surv., January, 2024

Distribution-aware fairness test generation.
J. Syst. Softw., 2024

On the effectiveness of hybrid pooling in mixup-based graph learning for language processing.
J. Syst. Softw., 2024

Dynamic maintenance scheduling approach under uncertainty: Comparison between reinforcement learning, genetic algorithm simheuristic, dispatching rules.
Expert Syst. Appl., 2024

Robustness Analysis of AI Models in Critical Energy Systems.
CoRR, 2024

Decentralized Privacy-Preserving Distributionally Robust Restoration of Electricity/Natural-Gas Systems Considering Coordination of Pump Storage Hydropower and Wind Farms.
IEEE Access, 2024

On the Coupling between Vulnerabilities and LLM-Generated Mutants: A Study on Vul4J Dataset.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024

SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Centralized vs Decentralized Federated Learning: A trade-off performance analysis.
Proceedings of the 11th International Conference on Future Internet of Things and Cloud, 2024

2023
Model-based testing, test case prioritization and testing of virtual reality applications.
Softw. Test. Verification Reliab., December, 2023

In vivo testing and integration of proving and testing.
Softw. Test. Verification Reliab., November, 2023

Deep neural network supervision and data flow testing.
Softw. Test. Verification Reliab., September, 2023

Quality assurance for Internet of Things and speech recognition systems.
Softw. Test. Verification Reliab., August, 2023

CalcGraph: taming the high costs of deep learning using models.
Softw. Syst. Model., August, 2023

Syntactic Versus Semantic Similarity of Artificial and Real Faults in Mutation Testing Studies.
IEEE Trans. Software Eng., July, 2023

Combinatorial testing and machine learning for automated test generation.
Softw. Test. Verification Reliab., June, 2023

Test infrastructure and environment.
Softw. Test. Verification Reliab., May, 2023

iBiR: Bug-report-driven Fault Injection.
ACM Trans. Softw. Eng. Methodol., April, 2023

Model-based testing.
Softw. Test. Verification Reliab., March, 2023

DRE: density-based data selection with entropy for adversarial-robust deep learning models.
Neural Comput. Appl., February, 2023

An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities.
ACM Trans. Softw. Eng. Methodol., January, 2023

Mutation Testing in Evolving Systems: Studying the Relevance of Mutants to Code Evolution.
ACM Trans. Softw. Eng. Methodol., January, 2023

Decision support system for blockchain (DLT) platform selection based on ITU recommendations: A systematic literature review approach.
Expert Syst. Appl., January, 2023

Cerebro: Static Subsuming Mutant Selection.
IEEE Trans. Software Eng., 2023

Fuzz testing for digital TV receivers and multitasking control software verification.
Softw. Test. Verification Reliab., 2023

Smells in system user interactive tests.
Empir. Softw. Eng., 2023

Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data.
CoRR, 2023

Hazards in Deep Learning Testing: Prevalence, Impact and Recommendations.
CoRR, 2023

Evaluating the Robustness of Test Selection Methods for Deep Neural Networks.
CoRR, 2023

CodeLens: An Interactive Tool for Visualizing Code Representations.
CoRR, 2023

RNNS: Representation Nearest Neighbor Search Black-Box Attack on Code Models.
CoRR, 2023

Going Further: Flatness at the Rescue of Early Stopping for Adversarial Example Transferability.
CoRR, 2023

Boosting Source Code Learning with Data Augmentation: An Empirical Study.
CoRR, 2023

Vulnerability Mimicking Mutants.
CoRR, 2023

The Importance of Discerning Flaky from Fault-triggering Test Failures: A Case Study on the Chromium CI.
CoRR, 2023

Assertion Inferring Mutants.
CoRR, 2023

Efficient Mutation Testing via Pre-Trained Language Models.
CoRR, 2023

MixCode: Enhancing Code Classification by Mixup-Based Data Augmentation.
Proceedings of the IEEE International Conference on Software Analysis, 2023

On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Enabling Efficient Assertion Inference.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

AI is a game-changing technology: how to test and robustify Machine-Learning software?
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2023

Poster: Distribution-aware Fairness Test Generation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

CodeS: Towards Code Model Generalization Under Distribution Shift.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results, 2023

Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks.
Proceedings of the International Conference on Machine Learning, 2023

ACoRe: Automated Goal-Conflict Resolution.
Proceedings of the Fundamental Approaches to Software Engineering, 2023

An Empirical Study of the Imbalance Issue in Software Vulnerability Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Black-Box Attack on Code Models via Representation Nearest Neighbor Search.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Towards Understanding Model Quantization for Reliable Deep Neural Network Deployment.
Proceedings of the 2nd IEEE/ACM International Conference on AI Engineering, 2023

On Comparing Mutation Testing Tools through Learning-based Mutant Selection.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

FlakyCat: Predicting Flaky Tests Categories using Few-Shot Learning.
Proceedings of the IEEE/ACM International Conference on Automation of Software Test, 2023

On Evaluating Adversarial Robustness of Chest X-ray Classification.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

Bottom-Up Technologies for Reuse: A Framework to Support Extractive Software Product Line Adoption Activities.
Proceedings of the Handbook of Re-Engineering Software Intensive Systems into Software Product Lines, 2023

2022
What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning.
ACM Trans. Softw. Eng. Methodol., 2022

An Empirical Study on Data Distribution-Aware Test Selection for Deep Learning Enhancement.
ACM Trans. Softw. Eng. Methodol., 2022

Combinatorial testing and model checking.
Softw. Test. Verification Reliab., 2022

Integration testing and metamorphic testing.
Softw. Test. Verification Reliab., 2022

Multi-agent deep reinforcement learning based Predictive Maintenance on parallel machines.
Robotics Comput. Integr. Manuf., 2022

DigBug - Pre/post-processing operator selection for accurate bug localization.
J. Syst. Softw., 2022

A variable neighborhood search simheuristic algorithm for reliability optimization of smart grids under uncertainty.
Int. Trans. Oper. Res., 2022

SSPCatcher: Learning to catch security patches.
Empir. Softw. Eng., 2022

Learning from what we know: How to perform vulnerability prediction using noisy historical data.
Empir. Softw. Eng., 2022

On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices.
CoRR, 2022

Enhancing Mixup-Based Graph Learning for Language Processing via Hybrid Pooling.
CoRR, 2022

Enhancing Code Classification by Mixup-Based Data Augmentation.
CoRR, 2022

Predicting Flaky Tests Categories using Few-Shot Learning.
CoRR, 2022

Efficient Testing of Deep Neural Networks via Decision Boundary Analysis.
CoRR, 2022

CodeS: A Distribution Shift Benchmark Dataset for Source Code Learning.
CoRR, 2022

Software Fairness: An Analysis and Survey.
CoRR, 2022

Characterizing and Understanding the Behavior of Quantized Models for Reliable Deployment.
CoRR, 2022

Labeling-Free Comparison Testing of Deep Learning Models.
CoRR, 2022

Efficient and transferable adversarial examples from bayesian neural networks.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

CodeBERT-nt: Code Naturalness via CodeBERT.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

GraphCode2Vec: Generic Code Embedding via Lexical and Program Dependence Analyses.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022

A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

A Qualitative Study on the Sources, Impacts, and Mitigation Strategies of Flaky Tests.
Proceedings of the 15th IEEE Conference on Software Testing, Verification and Validation, 2022

What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity.
Proceedings of the Computer Vision - ECCV 2022, 2022

Influence-driven data poisoning in graph-based semi-supervised classifiers.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

Robust active learning: sample-efficient training of robust deep learning models.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

Android Malware Detection Using BERT.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Adversarial Robustness in Multi-Task Learning: Promises and Illusions.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Mining Fix Patterns for FindBugs Violations.
IEEE Trans. Software Eng., 2021

Guest Editorial: A Retrospective of Special Sections on Software Testing and Program Analysis.
IEEE Trans. Reliab., 2021

Test Selection for Deep Learning Systems.
ACM Trans. Softw. Eng. Methodol., 2021

Killing Stubborn Mutants with Symbolic Execution.
ACM Trans. Softw. Eng. Methodol., 2021

A Systematic Approach for Evaluating Artificial Intelligence Models in Industrial Settings.
Sensors, 2021

Permissioned blockchain frameworks in the industry: A comparison.
ICT Express, 2021

Syntactic Vs. Semantic similarity of Artificial and Real Faults in Mutation Testing Studies.
CoRR, 2021

Discerning Legitimate Failures From False Alerts: A Study of Chromium's Continuous Integration.
CoRR, 2021

MUTEN: Boosting Gradient-Based Adversarial Attacks via Mutant-Based Ensembles.
CoRR, 2021

On the Use of Mutation in Injecting Test Order-Dependency.
CoRR, 2021

BlockPerf: A Hybrid Blockchain Emulator/Simulator Framework.
IEEE Access, 2021

Confuzzion: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

A Replication Study on the Usability of Code Vocabulary in Predicting Flaky Tests.
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021

Towards Exploring the Limitations of Active Learning: An Empirical Study.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

2020
A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0.
Sensors, 2020

FixMiner: Mining relevant fix patterns for automated program repair.
Empir. Softw. Eng., 2020

Selecting fault revealing mutants.
Empir. Softw. Eng., 2020

Learning To Predict Vulnerabilities From Vulnerability-Fixes: A Machine Translation Approach.
CoRR, 2020

Effective and Efficient Data Poisoning in Semi-Supervised Learning.
CoRR, 2020

FlexiRepair: Transparent Program Repair with Generic Patches.
CoRR, 2020

Efficient and Transferable Adversarial Examples from Bayesian Neural Networks.
CoRR, 2020

What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning.
CoRR, 2020

Learning to Catch Security Patches.
CoRR, 2020

LOVBench: Ontology Ranking Benchmark.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Load approximation for uncertain topologies in the low-voltage grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Search-based adversarial testing and improvement of constrained credit scoring systems.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Preventing Overloading Incidents on Smart Grids: A Multiobjective Combinatorial Optimization Approach.
Proceedings of the Optimization and Learning - Third International Conference, 2020

Data-driven Simulation and Optimization for Covid-19 Exit Strategies.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

FeatureNET: diversity-driven generation of deep learning models.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

Muteria: An Extensible and Flexible Multi-Criteria Software Testing Framework.
Proceedings of the AST@ICSE 2020: IEEE/ACM 1st International Conference on Automation of Software Test, 2020

On the efficiency of test suite based program repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Musti: Dynamic Prevention of Invalid Object Initialization Attacks.
IEEE Trans. Inf. Forensics Secur., 2019

The next evolution of MDE: a seamless integration of machine learning into domain modeling.
Softw. Syst. Model., 2019

Watch out for this commit! A study of influential software changes.
J. Softw. Evol. Process., 2019

Revisiting the impact of common libraries for android-related investigations.
J. Syst. Softw., 2019

GreyCat: Efficient what-if analytics for data in motion at scale.
Inf. Syst., 2019

Linked Vocabulary Recommendation Tools for Internet of Things: A Survey.
ACM Comput. Surv., 2019

Adversarial Embedding: A robust and elusive Steganography and Watermarking technique.
CoRR, 2019

Automated Search for Configurations of Deep Neural Network Architectures.
CoRR, 2019

D&C: A Divide-and-Conquer Approach to IR-based Bug Localization.
CoRR, 2019

Chapter Six - Mutation Testing Advances: An Analysis and Survey.
Adv. Comput., 2019

Automated search for configurations of convolutional neural network architectures.
Proceedings of the 23rd International Systems and Software Product Line Conference, 2019

A Replicable Comparison Study of NER Software: StanfordNLP, NLTK, OpenNLP, SpaCy, Gate.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

iFixR: bug report driven program repair.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

The importance of accounting for real-world labelling when predicting software vulnerabilities.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Mart: a mutant generation tool for LLVM.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Popularity-Driven Ontology Ranking Using Qualitative Features.
Proceedings of the Semantic Web - ISWC 2019, 2019

Meta-Modelling Meta-Learning.
Proceedings of the 22nd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2019

Smart discovery of periodic-frequent human routines for home automation.
Proceedings of the MobiQuitous 2019, 2019

Ukwikora: continuous inspection for keyword-driven testing.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Semantic fuzzing with zest.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Search-based test and improvement of machine-learning-based anomaly detection systems.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

TRIDENT: A Three-Steps Strategy to Digitise an Industrial System for Stepping into Industry 4.0.
Proceedings of the IECON 2019, 2019

On the Evolution of Keyword-Driven Test Suites.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

An Industrial Study on the Differences between Pre-Release and Post-Release Bugs.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

Validity fuzzing and parametric generators for effective random testing.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Learning to spot and refactor inconsistent method names.
Proceedings of the 41st International Conference on Software Engineering, 2019

Assessing transition-based test selection algorithms at Google.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

Assessing the impact of attacks on OPC-UA applications in the Industry 4.0 era.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Detecting Trivial Mutant Equivalences via Compiler Optimisations.
IEEE Trans. Software Eng., 2018

Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index.
Knowl. Based Syst., 2018

Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants.
Inf. Softw. Technol., 2018

Comparison of metadata quality in open data portals using the Analytic Hierarchy Process.
Gov. Inf. Q., 2018

Augmenting and structuring user queries to support efficient free-form code search.
Empir. Softw. Eng., 2018

How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults.
Empir. Softw. Eng., 2018

Cloud providers viability - How to address it from an IT and legal perspective?
Electron. Mark., 2018

Zest: Validity Fuzzing and Parametric Generators for Effective Random Testing.
CoRR, 2018

A training-resistant anomaly detection system.
Comput. Secur., 2018

[Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7.
Proceedings of the 18th IEEE International Working Conference on Source Code Analysis and Manipulation, 2018

Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Bench4BL: reproducibility study on the performance of IR-based bug localization.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Mutant Quality Indicators.
Proceedings of the 2018 IEEE International Conference on Software Testing, 2018

Towards Estimating and Predicting User Perception on Software Product Variants.
Proceedings of the New Opportunities for Software Reuse - 17th International Conference, 2018

A Closer Look at Real-World Patches.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

TUNA: TUning Naturalness-Based Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

FaCoY: a code-to-code search engine.
Proceedings of the 40th International Conference on Software Engineering, 2018

Predicting the fault revelation utility of mutants.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

O-MI/O-DF vs. MQTT: A performance analysis.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Are mutants really natural?: a study on how "naturalness" helps mutant selection.
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2018

Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

Can We Automate Away the Main Challenges of End-To-End Testing?
Proceedings of the 17th Belgium-Netherlands Software Evolution Workshop, Delft, the Netherlands, December 10th - to, 2018

2017
Variability Management and Assessment for User Interface Design.
Proceedings of the Human Centered Software Product Lines, 2017

Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Inf. Forensics Secur., 2017

On Locating Malicious Code in Piggybacked Android Apps.
J. Comput. Sci. Technol., 2017

Static analysis of android apps: A systematic literature review.
Inf. Softw. Technol., 2017

AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community.
CoRR, 2017

Visualizing and Exploring Dynamic High-Dimensional Datasets with LION-tSNE.
CoRR, 2017

Model-Driven Analytics: Connecting Data, Domain Knowledge, and Learning.
CoRR, 2017

Efficiently computing the likelihoods of cyclically interdependent risk scenarios.
Comput. Secur., 2017

Analyzing Complex Data in Motion at Scale with Temporal Graphs.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements.
Proceedings of the Symposium on Applied Computing, 2017

Weaving Rules into Models@run.time for Embedded Smart Systems.
Proceedings of the Companion to the first International Conference on the Art, 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Raising Time Awareness in Model-Driven Engineering: Vision Paper.
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017

PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Impact of tool support in patch construction.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Assessing and Improving the Mutation Testing Practice of PIT.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Bottom-up technologies for reuse: automated extractive adoption of software product lines.
Proceedings of the 39th International Conference on Software Engineering, 2017

Automatically Locating Malicious Packages in Piggybacked Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption.
Proceedings of the 39th International Conference on Software Engineering, 2017

Understanding Android app piggybacking.
Proceedings of the 39th International Conference on Software Engineering, 2017

The multi-generation repackaging hypothesis.
Proceedings of the 39th International Conference on Software Engineering, 2017

Towards semantic interoperability in an open IoT ecosystem for connected vehicle services.
Proceedings of the Global Internet of Things Summit, 2017

Knowledge-based consistency index for fuzzy pairwise comparison matrices.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components.
Proceedings of the Modeling and Using Context, 2017

2016
A systematic review on the engineering of software for ubiquitous systems.
J. Syst. Softw., 2016

Privacy challenges in Ambient Intelligence systems.
J. Ambient Intell. Smart Environ., 2016

Time Series Classification with Discrete Wavelet Transformed Data.
Int. J. Softw. Eng. Knowl. Eng., 2016

A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications.
Expert Syst. Appl., 2016

Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empir. Softw. Eng., 2016

Assessing and Improving the Mutation Testing Practice of PIT.
CoRR, 2016

Assessing and Comparing Mutation-based Fault Localization Techniques.
CoRR, 2016

Parameter Values of Android APIs: A Preliminary Study on 100, 000 Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

An Investigation into the Use of Common Libraries in Android Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Name suggestions during feature identification: the variclouds approach.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Mining families of android applications for extractive SPL adoption.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Vulnerability Prediction Models: A Case Study on the Linux Kernel.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

Towards a generic framework for automating extensive analysis of Android applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Near real-time electric load approximation in low voltage cables of smart grids with models@run.time.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

AndroZoo: collecting millions of Android apps for the research community.
Proceedings of the 13th International Conference on Mining Software Repositories, 2016

DSCo: A Language Modeling Approach for Time Series Classification.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Threats to the validity of mutation-based test assessment.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Building Lifecycle Management System for Enhanced Closed Loop Collaboration.
Proceedings of the Product Lifecycle Management for Digital Transformation of Industries, 2016

O-MI/O-DF standards as interoperability enablers for Industrial Internet: A performance analysis.
Proceedings of the IECON 2016, 2016

DSCo-NG: A Practical Language Modeling Approach for Time Series Classification.
Proceedings of the Advances in Intelligent Data Analysis XV - 15th International Symposium, 2016

Feature Location Benchmark for Software Families Using Eclipse Community Releases.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

Accessing Inaccessible Android APIs: An Empirical Study.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Strong mutation-based test data generation using hill climbing.
Proceedings of the 9th International Workshop on Search-Based Software Testing, 2016

Comparing white-box and black-box test prioritization.
Proceedings of the 38th International Conference on Software Engineering, 2016

Profiling household appliance electricity usage with N-gram language modeling.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

Micro-billing Framework for IoT: Research & Technological Foundations.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

UAV degradation identification for pilot notification using machine learning techniques.
Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation, 2016

On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Open Data Portal Quality Comparison using AHP.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

"Overloaded!" - A Model-Based Approach to Database Stress Testing.
Proceedings of the Database and Expert Systems Applications, 2016

Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2016

An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2015
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets.
IEEE Trans. Computers, 2015

Metallaxis-FL: mutation-based fault localization.
Softw. Test. Verification Reliab., 2015

Conviviality-driven access control policy.
Requir. Eng., 2015

Formal Verification Techniques for Model Transformations: A Tridimensional Classification.
J. Object Technol., 2015

Roundtable: Research Opportunities and Challenges for Emerging Software Systems.
J. Comput. Sci. Technol., 2015

An extensive systematic review on the Model-Driven Development of secure systems.
Inf. Softw. Technol., 2015

Similarity testing for access control.
Inf. Softw. Technol., 2015

Inroads in Testing Access Control.
Adv. Comput., 2015

Bottom-up adoption of software product lines: a generic and extensible approach.
Proceedings of the 19th International Conference on Software Product Line, 2015

Suspicious electric consumption detection based on multi-profiling using live machine learning.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Keynote - Model-driven Analytics with Models@run.time: The Case of Cyber-Physical-Systems.
Proceedings of the 2nd International Workshop on Model-Driven Engineering for Component-Based Software Systems co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2015), 2015

SoSPa: A system of Security design Patterns for systematically engineering secure systems.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Beyond discrete modeling: A continuous and efficient model for IoT.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Stream my models: Reactive peer-to-peer distributed models@run.time.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Automating the Extraction of Model-Based Software Product Lines from Model Variants (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Flattening or not of the combinatorial interaction testing models?
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Sound and Quasi-Complete Detection of Infeasible Test Requirements.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Estimating and Predicting Average Likability on Computer-Generated Artwork Variants.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Validation of Access Control Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines.
IEEE Trans. Software Eng., 2014

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android.
IEEE Trans. Software Eng., 2014

Mitigating the effects of equivalent mutants with mutant classification strategies.
Sci. Comput. Program., 2014

Model-based testing of global properties on large-scale distributed systems.
Inf. Softw. Technol., 2014

Tools for Conviviality in Multi-Context Systems.
FLAP, 2014

I know what leaked in your pocket: uncovering privacy leaks on Android Apps with Static Taint Analysis.
CoRR, 2014

Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms.
CoRR, 2014

Leveraging Time Distortion for seamless Navigation into Data Space-Time Continuum.
CoRR, 2014

Advances in Model-Driven Security.
Adv. Comput., 2014

Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines.
Proceedings of the Second IEEE Working Conference on Software Visualization, 2014

Automatically Exploiting Potential Component Leaks in Android Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Model-Driven Security with A System of Aspect-Oriented Security Design Patterns.
Proceedings of the 2nd Workshop on View-Based, 2014

Mutation-Based Generation of Software Product Line Test Configurations.
Proceedings of the Search-Based Software Engineering - 6th International Symposium, 2014

Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Generating realistic Smart Grid communication topologies based on real-data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Model-based time-distorted Contexts for efficient temporal Reasoning.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Towards a language-independent approach for reverse-engineering of software product lines.
Proceedings of the Symposium on Applied Computing, 2014

Effective fault localization via mutation analysis: a selective mutation approach.
Proceedings of the Symposium on Applied Computing, 2014

Generic cloud platform multi-objective optimization leveraging models@run.time.
Proceedings of the Symposium on Applied Computing, 2014

Model-Based Testing of Obligations.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Optimizing Multi-objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

A Native Versioning Concept to Support Historized Models at Runtime.
Proceedings of the Model-Driven Engineering Languages and Systems, 2014

A state machine for database non-functional testing.
Proceedings of the 18th International Database Engineering & Applications Symposium, 2014

Intra-query adaptivity for MapReduce query processing systems.
Proceedings of the 18th International Database Engineering & Applications Symposium, 2014

Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

MutaLog: A Tool for Mutating Logic Formulas.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Coverage-Based Test Cases Selection for XACML Policies.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Detecting Privacy Leaks in Android Apps.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Identifying and Visualising Commonality and Variability in Model Variants.
Proceedings of the Modelling Foundations and Applications - 10th European Conference, 2014

Towards a Full Support of Obligations in XACML.
Proceedings of the Risks and Security of Internet and Systems, 2014

A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

API Document Quality for Resolving Deprecated APIs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management.
LNCS Trans. Aspect Oriented Softw. Dev., 2013

Stress Testing of Transactional Database Systems.
J. Inf. Data Manag., 2013

Under Pressure Benchmark for DDBMS Availability.
J. Inf. Data Manag., 2013

Usage and testability of AOP: An empirical study of AspectJ.
Inf. Softw. Technol., 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

PLEDGE: a product line editor and test generation tool.
Proceedings of the 17th International Software Product Line Conference co-located workshops, 2013

Multi-objective test generation for software product lines.
Proceedings of the 17th International Software Product Line Conference, 2013

Proteum/FL: A tool for localizing faults using mutation analysis.
Proceedings of the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, 2013

Mutation testing strategies using mutant classification.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

R-CoRe: A Rule-based Contextual Reasoning Platform for AmI.
Proceedings of the Joint Proceedings of the 7th International Rule Challenge, 2013

A Rule-Based Contextual Reasoning Platform for Ambient Intelligence Environments.
Proceedings of the Theory, Practice, and Applications of Rules on the Web, 2013

Information Dependencies in MCS: Conviviality-Based Model and Metrics.
Proceedings of the PRIMA 2013: Principles and Practice of Multi-Agent Systems, 2013

Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Access control enforcement testing.
Proceedings of the 8th International Workshop on Automation of Software Test, 2013

Towards automated testing and fixing of re-engineered feature models.
Proceedings of the 35th International Conference on Software Engineering, 2013

A Systematic Review of Model-Driven Security.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

Model-driven adaptive delegation.
Proceedings of the Aspect-Oriented Software Development, 2013

The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Sustainable ICT4D in Africa: Where Do We Go from Here?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués.
Tech. Sci. Informatiques, 2012

Pairwise testing for software product lines: comparison of two approaches.
Softw. Qual. J., 2012

Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Suites for Large Software Product Lines
CoRR, 2012

XSS-FP: Browser Fingerprinting using HTML Parser Quirks
CoRR, 2012

Improving Privacy on Android Smartphones Through In-Vivo Bytecode Instrumentation
CoRR, 2012

Refactoring access control policies for performance improvement.
Proceedings of the Third Joint WOSP/SIPEW International Conference on Performance Engineering, 2012

A model-based approach to automated testing of access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Selection of regression system tests for security policy evolution.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Automatically securing permission-based software by reducing the attack surface: an application to Android.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Using Mutants to Locate "Unknown" Faults.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Peer-to-Peer Load Testing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Testing Obligation Policy Enforcement Using Mutation Analysis.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

A Tridimensional Approach for Studying the Formal Verification of Model Transformations.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Towards flexible evolution of Dynamically Adaptive Systems.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
An approach for testing pointcut descriptors in AspectJ.
Softw. Test. Verification Reliab., 2011

VAST 2011 workshop summary.
ACM SIGSOFT Softw. Eng. Notes, 2011

Verifying Access Control in Statecharts.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011

Tailored Shielding and Bypass Testing of Web Applications.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Model Driven Mutation Applied to Adaptative Systems Testing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Preventing data leakage in service orchestration.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Construction de tests qualifiés de transformations de modèles.
Tech. Sci. Informatiques, 2010

Testing peer-to-peer systems.
Empir. Softw. Eng., 2010

Barriers to systematic model transformation testing.
Commun. ACM, 2010

Composing Models at Two Modeling Levels to Capture Heterogeneous Concerns in Requirements.
Proceedings of the Software Composition - 9th International Conference, 2010

Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases.
Proceedings of the Testing Software and Systems, 2010

Efficient Distributed Test Architectures for Large-Scale Systems.
Proceedings of the Testing Software and Systems, 2010

Security-driven model-based dynamic adaptation.
Proceedings of the ASE 2010, 2010

Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies.
Proceedings of the Third International Conference on Software Testing, 2010

Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines.
Proceedings of the Third International Conference on Software Testing, 2010

Business and Information System Alignment: A Formal Solution for Telecom Services.
Proceedings of the Fifth International Conference on Software Engineering Advances, 2010

Model-Based Testing for the Cloud.
Proceedings of the Practical Software Testing: Tool Automation and Human Factors, 14.03., 2010

2009
Qualifying input test data for model transformations.
Softw. Syst. Model., 2009

Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation.
Proceedings of the Model Driven Engineering Languages and Systems, 2009

Transforming and Selecting Functional Test Cases for Security Policy Testing.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

AjMutator: A Tool for the Mutation Analysis of AspectJ Pointcut Descriptors.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Inquiring the usage of aspect-oriented programming: An empirical study.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

Runtime verification of declassification for imperative programs: Formal foundations.
Proceedings of the CRiSIS 2009, 2009

2008
Mutating DAC and MAC Security Policies: A Generic Metamodel Based Approach.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A Model-Based Framework for Security Policy Specification, Deployment and Testing.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

Testing Peers' Volatility.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

A Framework for Testing Peer-to-Peer Systems.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

Test-Driven Assessment of Access Control in Legacy Applications.
Proceedings of the First International Conference on Software Testing, 2008

Model-Based Tests for Access Control Policies.
Proceedings of the First International Conference on Software Testing, 2008

Model transformation testing: oracle issue.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Regression test selection when evolving software with aspects.
Proceedings of the 2008 AOSD workshop on Linking aspect technology and evolution, 2008

2007
Test Synthesis from UML Models of Distributed Software.
IEEE Trans. Software Eng., 2007

Testing Security Policies: Going Beyond Functional Testing.
Proceedings of the ISSRE 2007, 2007

An Enterprise Architecture Alignment Measure for Telecom Service Development.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Producing a Global Requirement Model from Multiple Requirement Specifications.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Model-Driven Engineering for Requirements Analysis.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

2006
Design by Contract to Improve Software Vigilance.
IEEE Trans. Software Eng., 2006

Automatic Test Generation: A Use Case Driven Approach.
IEEE Trans. Software Eng., 2006

System Testing of Product Lines: From Requirements to Test Cases.
Proceedings of the Software Product Lines - Research Issues in Engineering and Management, 2006

Reusable MDA Components: A Testing-for-Trust Approach.
Proceedings of the Model Driven Engineering Languages and Systems, 2006

Test d'intégration d'un système à objets - planification de l'ordre d'intégration.
Proceedings of the Actes des journéees Langages et Modèles à Objets, 2006

Test et diagnostic - des objets aux modèles.
Proceedings of the Actes des journéees Langages et Modèles à Objets, 2006

Metamodel-based Test Generation for Model Transformations: an Algorithm and a Tool.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

Improving test suites for efficient fault localization.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Mutation Analysis Testing for Model Transformations.
Proceedings of the Model Driven Architecture, 2006

Le test et le diagnostic en vue de la m maintenance : des objets aux modéles.
Proceedings of the 1er Conférence francophone sur les Architectures Logicielles (CAL 2006), 2006

2005
From genetic to bacteriological algorithms for mutation-based testing.
Softw. Test. Verification Reliab., 2005

Automatic Test Case Optimization: A Bacteriologic Algorithm.
IEEE Softw., 2005

Measuring design testability of a UML class diagram.
Inf. Softw. Technol., 2005

2004
Automated Functional Test Case Synthesis from THALES industrial Requirements.
Proceedings of the 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), 2004

From Testing to Diagnosis: An Automated Approach.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

2003
From diagnosis to diagnosability: axiomatization, measurement and application.
J. Syst. Softw., 2003

A Requirement-Based Approach to Test Product Families.
Proceedings of the Software Product-Family Engineering, 5th International Workshop, 2003

Measuring and Improving Design Patterns Testability.
Proceedings of the 9th IEEE International Software Metrics Symposium (METRICS 2003), 2003

Automated Requirements-based Generation of Test Cases for Product Families.
Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003), 2003

Requirements by Contracts allow Automated System Testing.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

2002
Testability Analysis of a UML Class Diagram.
Proceedings of the 8th IEEE International Software Metrics Symposium (METRICS 2002), 2002

Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component.
Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE 2002), 2002

Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

System Test Synthesis from UML Models of Distributed Software.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2002

2001
Reliable Objects: Lightweight Testing for OO Languages.
IEEE Softw., 2001

Refactoring UML Models.
Proceedings of the «UML» 2001, 2001

Robustness and Diagnosability of OO Systems Designed by Contracts.
Proceedings of the 7th IEEE International Software Metrics Symposium (METRICS 2001), 2001

Towards a 'Safe' Use of Design Patterns to Improve OO Software Testability.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies.
Proceedings of the ECOOP 2001, 2001

2000
Efficient object-oriented integration and regression testing.
IEEE Trans. Reliab., 2000

Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification.
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000

Analyzing Testability on Data Flow Designs.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

Building Trust into OO Components Using a Genetic Analogy.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

1999
Composants objets fiables : une approche pragmatique.
Obj. Logiciel Base données Réseaux, 1999

Self-Testable Components: From Pragmatic Tests to Design-for-Testability Methodology.
Proceedings of the TOOLS Europe 1999: 29th International Conference on Technology of Object-Oriented Languages and Systems, 1999

Efficient strategies for integration and regression testing of OO systems.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999

1998
Towards an automatic diagnosis for high-level design validation.
Proceedings of the Proceedings IEEE International Test Conference 1998, 1998

Software diagnosability.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

1997
Impact of System Partitioning on Test Cost.
IEEE Des. Test Comput., 1997

Testability Measurements for Data Flow Designs.
Proceedings of the 4th IEEE International Software Metrics Symposium (METRICS 1997), 1997

1996
Testability-Oriented Hardware/Software Partitioning.
Proceedings of the Proceedings IEEE International Test Conference 1996, 1996

Considering Test Economics in the Process of Hardware/Software Partitioning.
Proceedings of the 22rd EUROMICRO Conference '96, 1996

1995
From Hardware to Software Testability.
Proceedings of the Proceedings IEEE International Test Conference 1995, 1995

Towards a unified approach to the testability of co-designed systems.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

Testability analysis of co-designed systems.
Proceedings of the 4th Asian Test Symposium (ATS '95), 1995


  Loading...