Yves Le Traon

According to our database1, Yves Le Traon authored at least 253 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Linked Vocabulary Recommendation Tools for Internet of Things: A Survey.
ACM Comput. Surv., 2019

2018
Detecting Trivial Mutant Equivalences via Compiler Optimisations.
IEEE Trans. Software Eng., 2018

Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index.
Knowl.-Based Syst., 2018

Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants.
Information & Software Technology, 2018

Comparison of metadata quality in open data portals using the Analytic Hierarchy Process.
Government Information Quarterly, 2018

How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults.
Empirical Software Engineering, 2018

Cloud providers viability - How to address it from an IT and legal perspective?
Electronic Markets, 2018

A training-resistant anomaly detection system.
Computers & Security, 2018

[Engineering Paper] Enabling the Continuous Analysis of Security Vulnerabilities with VulData7.
Proceedings of the 18th IEEE International Working Conference on Source Code Analysis and Manipulation, 2018

Continuous Identification in Smart Environments Using Wrist-Worn Inertial Sensors.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Bench4BL: reproducibility study on the performance of IR-based bug localization.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Mutant Quality Indicators.
Proceedings of the 2018 IEEE International Conference on Software Testing, 2018

Towards Estimating and Predicting User Perception on Software Product Variants.
Proceedings of the New Opportunities for Software Reuse - 17th International Conference, 2018

A Closer Look at Real-World Patches.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

TUNA: TUning Naturalness-Based Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

On the Impact of Tokenizer and Parameters on N-Gram Based Code Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Augmenting and structuring user queries to support efficient free-form code search.
Proceedings of the 40th International Conference on Software Engineering, 2018

FaCoY: a code-to-code search engine.
Proceedings of the 40th International Conference on Software Engineering, 2018

Predicting the fault revelation utility of mutants.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

O-MI/O-DF vs. MQTT: A performance analysis.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Are mutants really natural?: a study on how "naturalness" helps mutant selection.
Proceedings of the 12th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2018

Extracting Statistical Graph Features for Accurate and Efficient Time Series Classification.
Proceedings of the 21th International Conference on Extending Database Technology, 2018

2017
Variability Management and Assessment for User Interface Design.
Proceedings of the Human Centered Software Product Lines, 2017

Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting.
IEEE Trans. Information Forensics and Security, 2017

On Locating Malicious Code in Piggybacked Android Apps.
J. Comput. Sci. Technol., 2017

Static analysis of android apps: A systematic literature review.
Information & Software Technology, 2017

Efficiently computing the likelihoods of cyclically interdependent risk scenarios.
Computers & Security, 2017

Analyzing Complex Data in Motion at Scale with Temporal Graphs.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Sensing by proxy in buildings with agglomerative clustering of indoor temperature movements.
Proceedings of the Symposium on Applied Computing, 2017

Weaving Rules into Models@run.time for Embedded Smart Systems.
Proceedings of the Companion to the first International Conference on the Art, 2017

Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Raising Time Awareness in Model-Driven Engineering: Vision Paper.
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017

The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling.
Proceedings of the 20th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2017

PROFICIENT: Productivity Tool for Semantic Interoperability in an Open IoT Ecosystem.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

Impact of tool support in patch construction.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Assessing and Improving the Mutation Testing Practice of PIT.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Bottom-up technologies for reuse: automated extractive adoption of software product lines.
Proceedings of the 39th International Conference on Software Engineering, 2017

Automatically Locating Malicious Packages in Piggybacked Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption.
Proceedings of the 39th International Conference on Software Engineering, 2017

Understanding Android app piggybacking.
Proceedings of the 39th International Conference on Software Engineering, 2017

The multi-generation repackaging hypothesis.
Proceedings of the 39th International Conference on Software Engineering, 2017

Towards semantic interoperability in an open IoT ecosystem for connected vehicle services.
Proceedings of the Global Internet of Things Summit, 2017

Knowledge-based consistency index for fuzzy pairwise comparison matrices.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

Enriching a Situation Awareness Framework for IoT with Knowledge Base and Reasoning Components.
Proceedings of the Modeling and Using Context, 2017

2016
A systematic review on the engineering of software for ubiquitous systems.
Journal of Systems and Software, 2016

Privacy challenges in Ambient Intelligence systems.
JAISE, 2016

Time Series Classification with Discrete Wavelet Transformed Data.
International Journal of Software Engineering and Knowledge Engineering, 2016

A state-of the-art survey & testbed of fuzzy AHP (FAHP) applications.
Expert Syst. Appl., 2016

Empirical assessment of machine learning-based malware detectors for Android - Measuring the gap between in-the-lab and in-the-wild validation scenarios.
Empirical Software Engineering, 2016

Parameter Values of Android APIs: A Preliminary Study on 100, 000 Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

An Investigation into the Use of Common Libraries in Android Apps.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Name suggestions during feature identification: the variclouds approach.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Mining families of android applications for extractive SPL adoption.
Proceedings of the 20th International Systems and Software Product Line Conference, 2016

Time Series Classification with Discrete Wavelet Transformed Data: Insights from an Empirical Study.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

Vulnerability Prediction Models: A Case Study on the Linux Kernel.
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016

Towards a generic framework for automating extensive analysis of Android applications.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Near real-time electric load approximation in low voltage cables of smart grids with models@run.time.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

AndroZoo: collecting millions of Android apps for the research community.
Proceedings of the 13th International Conference on Mining Software Repositories, 2016

DSCo: A Language Modeling Approach for Time Series Classification.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2016

Threats to the validity of mutation-based test assessment.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Building Lifecycle Management System for Enhanced Closed Loop Collaboration.
Proceedings of the Product Lifecycle Management for Digital Transformation of Industries, 2016

O-MI/O-DF standards as interoperability enablers for Industrial Internet: A performance analysis.
Proceedings of the IECON 2016, 2016

DSCo-NG: A Practical Language Modeling Approach for Time Series Classification.
Proceedings of the Advances in Intelligent Data Analysis XV - 15th International Symposium, 2016

Feature Location Benchmark for Software Families Using Eclipse Community Releases.
Proceedings of the Software Reuse: Bridging with Social-Awareness, 2016

Accessing Inaccessible Android APIs: An Empirical Study.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Strong mutation-based test data generation using hill climbing.
Proceedings of the 9th International Workshop on Search-Based Software Testing, 2016

Comparing white-box and black-box test prioritization.
Proceedings of the 38th International Conference on Software Engineering, 2016

Micro-billing Framework for IoT: Research & Technological Foundations.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

UAV degradation identification for pilot notification using machine learning techniques.
Proceedings of the 21st IEEE International Conference on Emerging Technologies and Factory Automation, 2016

On the Lack of Consensus in Anti-Virus Decisions: Metrics and Insights on Building Ground Truths of Android Malware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

Open Data Portal Quality Comparison using AHP.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

"Overloaded!" - A Model-Based Approach to Database Stress Testing.
Proceedings of the Database and Expert Systems Applications, 2016

Dynamic Risk Analyses and Dependency-Aware Root Cause Model for Critical Infrastructures.
Proceedings of the Critical Information Infrastructures Security, 2016

An Empirical Analysis of Vulnerabilities in OpenSSL and the Linux Kernel.
Proceedings of the 23rd Asia-Pacific Software Engineering Conference, 2016

2015
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets.
IEEE Trans. Computers, 2015

Metallaxis-FL: mutation-based fault localization.
Softw. Test., Verif. Reliab., 2015

Conviviality-driven access control policy.
Requir. Eng., 2015

Formal Verification Techniques for Model Transformations: A Tridimensional Classification.
Journal of Object Technology, 2015

Roundtable: Research Opportunities and Challenges for Emerging Software Systems.
J. Comput. Sci. Technol., 2015

An extensive systematic review on the Model-Driven Development of secure systems.
Information & Software Technology, 2015

Similarity testing for access control.
Information & Software Technology, 2015

Inroads in Testing Access Control.
Advances in Computers, 2015

Bottom-up adoption of software product lines: a generic and extensible approach.
Proceedings of the 19th International Conference on Software Product Line, 2015

Suspicious electric consumption detection based on multi-profiling using live machine learning.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Keynote - Model-driven Analytics with Models@run.time: The Case of Cyber-Physical-Systems.
Proceedings of the 2nd International Workshop on Model-Driven Engineering for Component-Based Software Systems co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages & Systems (MoDELS 2015), 2015

SoSPa: A system of Security design Patterns for systematically engineering secure systems.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Beyond discrete modeling: A continuous and efficient model for IoT.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Stream my models: Reactive peer-to-peer distributed models@run.time.
Proceedings of the 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2015

Automating the Extraction of Model-Based Software Product Lines from Model Variants (T).
Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering, 2015

Flattening or not of the combinatorial interaction testing models?
Proceedings of the Eighth IEEE International Conference on Software Testing, 2015

Sound and Quasi-Complete Detection of Infeasible Test Requirements.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

IccTA: Detecting Inter-Component Privacy Leaks in Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Cloud Providers Viability: How to Address it from an IT and Legal Perspective?
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2015

Estimating and Predicting Average Likability on Computer-Generated Artwork Variants.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

2014
Validation of Access Control Systems.
Proceedings of the Engineering Secure Future Internet Services and Systems, 2014

Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-Wise Test Configurations for Software Product Lines.
IEEE Trans. Software Eng., 2014

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges and Solutions for Analyzing Android.
IEEE Trans. Software Eng., 2014

Mitigating the effects of equivalent mutants with mutant classification strategies.
Sci. Comput. Program., 2014

Model-based testing of global properties on large-scale distributed systems.
Information & Software Technology, 2014

Tools for Conviviality in Multi-Context Systems.
FLAP, 2014

Advances in Model-Driven Security.
Advances in Computers, 2014

Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines.
Proceedings of the Second IEEE Working Conference on Software Visualization, 2014

Automatically Exploiting Potential Component Leaks in Android Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Model-Driven Security with A System of Aspect-Oriented Security Design Patterns.
Proceedings of the 2nd Workshop on View-Based, 2014

Mutation-Based Generation of Software Product Line Test Configurations.
Proceedings of the Search-Based Software Engineering - 6th International Symposium, 2014

Reactive Security for Smart Grids Using Models@run.time-Based Simulation and Reasoning.
Proceedings of the Smart Grid Security - Second International Workshop, 2014

Generating realistic Smart Grid communication topologies based on real-data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Model-based time-distorted Contexts for efficient temporal Reasoning.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Towards a language-independent approach for reverse-engineering of software product lines.
Proceedings of the Symposium on Applied Computing, 2014

Effective fault localization via mutation analysis: a selective mutation approach.
Proceedings of the Symposium on Applied Computing, 2014

Generic cloud platform multi-objective optimization leveraging models@run.time.
Proceedings of the Symposium on Applied Computing, 2014

Model-Based Testing of Obligations.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Optimizing Multi-objective Evolutionary Algorithms to Enable Quality-Aware Software Provisioning.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

A Native Versioning Concept to Support Historized Models at Runtime.
Proceedings of the Model-Driven Engineering Languages and Systems, 2014

A state machine for database non-functional testing.
Proceedings of the 18th International Database Engineering & Applications Symposium, 2014

Intra-query adaptivity for MapReduce query processing systems.
Proceedings of the 18th International Database Engineering & Applications Symposium, 2014

Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

MutaLog: A Tool for Mutating Logic Formulas.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Coverage-Based Test Cases Selection for XACML Policies.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Empirical Investigation of the Web Browser Attack Surface under Cross-Site Scripting: An Urgent Need for Systematic Security Regression Testing.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

Modeling, Composing, and Testing of Security Concerns in a Model-Driven Security Approach.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Detecting Privacy Leaks in Android Apps.
Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), 2014

Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

Identifying and Visualising Commonality and Variability in Model Variants.
Proceedings of the Modelling Foundations and Applications - 10th European Conference, 2014

Towards a Full Support of Obligations in XACML.
Proceedings of the Risks and Security of Internet and Systems, 2014

A Forensic Analysis of Android Malware - How is Malware Written and How it Could Be Detected?
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

API Document Quality for Resolving Deprecated APIs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management.
Trans. Aspect-Oriented Software Development, 2013

Stress Testing of Transactional Database Systems.
JIDM, 2013

Under Pressure Benchmark for DDBMS Availability.
JIDM, 2013

Usage and testability of AOP: An empirical study of AspectJ.
Information & Software Technology, 2013

Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

PLEDGE: a product line editor and test generation tool.
Proceedings of the 17th International Software Product Line Conference co-located workshops, 2013

Multi-objective test generation for software product lines.
Proceedings of the 17th International Software Product Line Conference, 2013

Proteum/FL: A tool for localizing faults using mutation analysis.
Proceedings of the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, 2013

Mutation testing strategies using mutant classification.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

R-CoRe: A Rule-based Contextual Reasoning Platform for AmI.
Proceedings of the Joint Proceedings of the 7th International Rule Challenge, 2013

A Rule-Based Contextual Reasoning Platform for Ambient Intelligence Environments.
Proceedings of the Theory, Practice, and Applications of Rules on the Web, 2013

Information Dependencies in MCS: Conviviality-Based Model and Metrics.
Proceedings of the PRIMA 2013: Principles and Practice of Multi-Agent Systems, 2013

Got issues? Who cares about it? A large scale investigation of issue trackers from GitHub.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

Access control enforcement testing.
Proceedings of the 8th International Workshop on Automation of Software Test, 2013

Towards automated testing and fixing of re-engineered feature models.
Proceedings of the 35th International Conference on Software Engineering, 2013

A Systematic Review of Model-Driven Security.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

Model-driven adaptive delegation.
Proceedings of the Aspect-Oriented Software Development, 2013

The NOAH Project: Giving a Chance to Threatened Species in Africa with UAVs.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

Sustainable ICT4D in Africa: Where Do We Go from Here?
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2013

A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués.
Technique et Science Informatiques, 2012

Pairwise testing for software product lines: comparison of two approaches.
Software Quality Journal, 2012

Refactoring access control policies for performance improvement.
Proceedings of the Third Joint WOSP/SIPEW International Conference on Performance Engineering, 2012

A model-based approach to automated testing of access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Dexpler: converting Android Dalvik bytecode to Jimple for static analysis with Soot.
Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, 2012

Selection of regression system tests for security policy evolution.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Automatically securing permission-based software by reducing the attack surface: an application to Android.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Using Mutants to Locate "Unknown" Faults.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Peer-to-Peer Load Testing.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Testing Obligation Policy Enforcement Using Mutation Analysis.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

A Tridimensional Approach for Studying the Formal Verification of Model Transformations.
Proceedings of the Fifth IEEE International Conference on Software Testing, 2012

Towards flexible evolution of Dynamically Adaptive Systems.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
An approach for testing pointcut descriptors in AspectJ.
Softw. Test., Verif. Reliab., 2011

VAST 2011 workshop summary.
ACM SIGSOFT Software Engineering Notes, 2011

Verifying Access Control in Statecharts.
ECEASST, 2011

Tailored Shielding and Bypass Testing of Web Applications.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Model Driven Mutation Applied to Adaptative Systems Testing.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

Preventing data leakage in service orchestration.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Construction de tests qualifiés de transformations de modèles.
Technique et Science Informatiques, 2010

Testing peer-to-peer systems.
Empirical Software Engineering, 2010

Barriers to systematic model transformation testing.
Commun. ACM, 2010

Composing Models at Two Modeling Levels to Capture Heterogeneous Concerns in Requirements.
Proceedings of the Software Composition, 9th International Conference, SC 2010, Malaga, 2010

Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases.
Proceedings of the Testing Software and Systems, 2010

Efficient Distributed Test Architectures for Large-Scale Systems.
Proceedings of the Testing Software and Systems, 2010

Security-driven model-based dynamic adaptation.
Proceedings of the ASE 2010, 2010

Language-Specific vs. Language-Independent Approaches: Embedding Semantics on a Metamodel for Testing and Verifying Access Control Policies.
Proceedings of the Third International Conference on Software Testing, 2010

Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines.
Proceedings of the Third International Conference on Software Testing, 2010

Business and Information System Alignment: A Formal Solution for Telecom Services.
Proceedings of the Fifth International Conference on Software Engineering Advances, 2010

Model-Based Testing for the Cloud.
Proceedings of the Practical Software Testing: Tool Automation and Human Factors, 14.03., 2010

2009
Qualifying input test data for model transformations.
Software and System Modeling, 2009

Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation.
Proceedings of the Model Driven Engineering Languages and Systems, 2009

Transforming and Selecting Functional Test Cases for Security Policy Testing.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

AjMutator: A Tool for the Mutation Analysis of AspectJ Pointcut Descriptors.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Inquiring the usage of aspect-oriented programming: An empirical study.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

Runtime verification of declassification for imperative programs: Formal foundations.
Proceedings of the CRiSIS 2009, 2009

2008
Mutating DAC and MAC Security Policies: A Generic Metamodel Based Approach.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A Model-Based Framework for Security Policy Specification, Deployment and Testing.
Proceedings of the Model Driven Engineering Languages and Systems, 2008

Testing Peers' Volatility.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

A Framework for Testing Peer-to-Peer Systems.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

Test-Driven Assessment of Access Control in Legacy Applications.
Proceedings of the First International Conference on Software Testing, 2008

Model-Based Tests for Access Control Policies.
Proceedings of the First International Conference on Software Testing, 2008

Model transformation testing: oracle issue.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

Regression test selection when evolving software with aspects.
Proceedings of the 2008 AOSD workshop on Linking aspect technology and evolution, 2008

2007
Test Synthesis from UML Models of Distributed Software.
IEEE Trans. Software Eng., 2007

Testing Security Policies: Going Beyond Functional Testing.
Proceedings of the ISSRE 2007, 2007

An Enterprise Architecture Alignment Measure for Telecom Service Development.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Producing a Global Requirement Model from Multiple Requirement Specifications.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Model-Driven Engineering for Requirements Analysis.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

2006
Design by Contract to Improve Software Vigilance.
IEEE Trans. Software Eng., 2006

Automatic Test Generation: A Use Case Driven Approach.
IEEE Trans. Software Eng., 2006

System Testing of Product Lines: From Requirements to Test Cases.
Proceedings of the Software Product Lines - Research Issues in Engineering and Management, 2006

Reusable MDA Components: A Testing-for-Trust Approach.
Proceedings of the Model Driven Engineering Languages and Systems, 2006

Test d'intégration d'un système à objets - planification de l'ordre d'intégration.
Proceedings of the Actes des journéees Langages et Modèles à Objets, 2006

Test et diagnostic - des objets aux modèles.
Proceedings of the Actes des journéees Langages et Modèles à Objets, 2006

Metamodel-based Test Generation for Model Transformations: an Algorithm and a Tool.
Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 2006

Improving test suites for efficient fault localization.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006

Mutation Analysis Testing for Model Transformations.
Proceedings of the Model Driven Architecture, 2006

Le test et le diagnostic en vue de la m maintenance : des objets aux modéles.
Proceedings of the 1er Conférence francophone sur les Architectures Logicielles (CAL 2006), 2006

2005
From genetic to bacteriological algorithms for mutation-based testing.
Softw. Test., Verif. Reliab., 2005

Automatic Test Case Optimization: A Bacteriologic Algorithm.
IEEE Software, 2005

Measuring design testability of a UML class diagram.
Information & Software Technology, 2005

2004
Automated Functional Test Case Synthesis from THALES industrial Requirements.
Proceedings of the 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), 2004

From Testing to Diagnosis: An Automated Approach.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

2003
From diagnosis to diagnosability: axiomatization, measurement and application.
Journal of Systems and Software, 2003

A Requirement-Based Approach to Test Product Families.
Proceedings of the Software Product-Family Engineering, 5th International Workshop, 2003

Measuring and Improving Design Patterns Testability.
Proceedings of the 9th IEEE International Software Metrics Symposium (METRICS 2003), 2003

Automated Requirements-based Generation of Test Cases for Product Families.
Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE 2003), 2003

Requirements by Contracts allow Automated System Testing.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

2002
Testability Analysis of a UML Class Diagram.
Proceedings of the 8th IEEE International Software Metrics Symposium (METRICS 2002), 2002

Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component.
Proceedings of the 17th IEEE International Conference on Automated Software Engineering (ASE 2002), 2002

Genes and Bacteria for Automatic Test Cases Optimization in the .NET Environment.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

System Test Synthesis from UML Models of Distributed Software.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2002

2001
Reliable Objects: Lightweight Testing for OO Languages.
IEEE Software, 2001

Refactoring UML Models.
Proceedings of the «UML» 2001, 2001

Robustness and Diagnosability of OO Systems Designed by Contracts.
Proceedings of the 7th IEEE International Software Metrics Symposium (METRICS 2001), 2001

Towards a 'Safe' Use of Design Patterns to Improve OO Software Testability.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies.
Proceedings of the ECOOP 2001, 2001

2000
Efficient object-oriented integration and regression testing.
IEEE Trans. Reliability, 2000

Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification.
Proceedings of the TOOLS 2000: 33rd International Conference on Technology of Object-Oriented Languages and Systems, 2000

Analyzing Testability on Data Flow Designs.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

Building Trust into OO Components Using a Genetic Analogy.
Proceedings of the 11th International Symposium on Software Reliability Engineering (ISSRE 2000), 2000

1999
Composants objets fiables : une approche pragmatique.
L'OBJET, 1999

Self-Testable Components: From Pragmatic Tests to Design-for-Testability Methodology.
Proceedings of the TOOLS Europe 1999: 29th International Conference on Technology of Object-Oriented Languages and Systems, 1999

Efficient strategies for integration and regression testing of OO systems.
Proceedings of the 10th International Symposium on Software Reliability Engineering, 1999

1998
Towards an automatic diagnosis for high-level design validation.
Proceedings of the Proceedings IEEE International Test Conference 1998, 1998

Software diagnosability.
Proceedings of the Ninth International Symposium on Software Reliability Engineering, 1998

1997
Impact of System Partitioning on Test Cost.
IEEE Design & Test of Computers, 1997

Testability Measurements for Data Flow Designs.
Proceedings of the 4th IEEE International Software Metrics Symposium (METRICS 1997), 1997

1996
Testability-Oriented Hardware/Software Partitioning.
Proceedings of the Proceedings IEEE International Test Conference 1996, 1996

Considering Test Economics in the Process of Hardware/Software Partitioning.
Proceedings of the 22rd EUROMICRO Conference '96, 1996

1995
From Hardware to Software Testability.
Proceedings of the Proceedings IEEE International Test Conference 1995, 1995

Towards a unified approach to the testability of co-designed systems.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

Testability analysis of co-designed systems.
Proceedings of the 4th Asian Test Symposium (ATS '95), 1995


  Loading...