Program
October 11, Saturday
Registration (8:00 - 8:40)
Opening
(8:45 - 9:00)
  • Shinichi Honiden (NII)
  • Zhi Jin (Peking University)
  • Keynote Talk
    (9:00-10:00)

    Chair: Hong Mei
    Data Protection from Insider Threats - Concepts and Research Issues
  • Elisa Bertino (Purdue University)
  • Tea Break (10:00 - 10:30)
    Session 1:
    Software Analysis
    (10:30 - 12:00)

    Chair: Fuyuki Ishikawa
    Mining Quality Requirements in Software Requirements Specifications
  • Tetsuo Tamai (Hosei University)
  • From Clone Detection to Clone Management: Why Developers Clone and What Can be Changed
  • Xin Peng (Fudan University)
  • Scalable Detection of Refactoring Opportunities
  • Siau-Cheng Khoo (National University of Singapore)
  • Lunch (12:00 - 13:30)
    Session 2:
    Adaptive Systems
    (13:30 - 15:00)

    Chair: Yang Liu
    Adaptivity Modelling and Management for Self-adaptive Systems
  • Haiyan Zhao (Peking University)
  • Protocol Composition Techniques on Self-Adaptive Systems
  • Ryuichi Takahashi (Waseda University)
  • A Development Process of Adaptation Engine for Control-loop-based Adaptable Software
  • Kenji Tei (NII)
  • Tea Break (15:00 - 15:15)
    Session 3:
    Cloud and Service Computing
    (15:15-16:45)

    Chair: Tetsuo Tamai
    Understanding the Behavior of a Networked Software System: A Predicate Detection-based Approach
  • Yu Huang (Nanjing University)
  • Refinement Engineering for Reducing Complexity in Reliability Assurance
  • Fuyuki Ishikawa (NII)
  • Automatic, High Accuracy Prediction of Reopened Bugs
  • Xin Xia (Zhejiang University)
  • Tea Break (16:45 - 17:00)
    Session 4:
    Bidirectional Transformation and Formal Specification
    (17:00-18:30)

    Chair: Lu Zhang
    Towards Trace-based Approach to Increasing the Comprehensibility and Predictability of Bidirectional Graph Transformations
  • Soichiro Hidaka (NII)
  • Program Synchronization via Bidirectional Transformation
  • Jianjun Zhao (Shanghai Jiao Tong University)
  • Integration of Specification Animation and SOFL Three-Step Specification Approach for Requirements Engineering
  • Shaoying Liu (Hosei University)
  • Evening (19:30) Banquet



    October 12, Sunday
    Keynote Talk
    (9:00-10:00)

    Chair: Zhenjiang Hu
    Software Engineering Challenges for Collaborative Ambient Security
  • Bashar Nuseibeh (The Open University (UK) and Lero (Ireland))
  • Tea Break (10:00 - 10:30)
    Session 5:
    Security and Privacy
    (10:30 - 12:00)

    Chair: Bing Xie
    Integrated Framework for Security and Privacy Requirements
  • Nobukazu Yoshioka (NII)
  • Mobile Forensics of Private Data Leaks: Towards Large-Scale User-Oriented Privacy Notification and Protection
  • Lingxiao Jiang (Singapore Management University)
  • How to Apply Software Engineering Techniques in the Malware and Vulnerability Detection
  • Yang Liu (Nanyang Technological University)
  • Lunch (12:00 - 13:30)
    Session 6:
    Code Analysis
    (13:30 - 15:00)

    Chair: Jian Zhang
    Tracking Code History in OSS Space
  • Katsuro Inoue (Osaka Univeristy)
  • Are slice-based cohesion metrics actually useful in effort-aware fault-proneness prediction? An empirical study
  • Yibiao Yang (Nanjing University)
  • Semi-Automated Generation of Source Code Analysis and Manipulation Tools for Various languages
  • Kazunori Sakamoto (NII)
  • Tea Break (15:00 - 15:15)
    Session 7:
    Software Testing and Analysis
    (15:15-16:45)

    Chair: Katsuro Inoue
    Reuse Distances to the Rescue: Adapting Traceability to Performance Bottlenecks in Binary Programs
  • Yijun Yu (Open University)
  • Extensions to SMT Solving and Applications to Software Engineering
  • Jian Zhang (Institute of Software, Chinese Academy of Science)
  • A Soft Constraint-Based Approach to Error Localization
  • Hiroshi Hosobe (Hosei University)
  • Tea Break (16:45 - 17:00)
    Session 8:
    Optimization and Transformation
    (17:00-18:00)

    Chair: Jianjun Zhao
    Optimization of LTL search in Java PathFinder
  • Yoshinori Tanabe (NII)
  • Transformations you can trust --Towards high-confidence program transformations
  • Yingfei Xiong (Peking University)
  • Closing
    (18:00 - 18:15)
  • Zhenjiang Hu (NII)