Fast Abstracts Program

 

Date: Tuesday, October 29, 2024

(16:00 - 16:05) Welcome Message from the Track Chair (Stefan Winter / Hui Xu)

(16:05 - 16:15) How Maintainable is Proficient Code? A Case Study of Three PyPI Libraries
Indira Febriyanti (Nara Institute of Science and Technology, Japan), Youmei Fan (Nara Institute of Science and Technology, Japan), Kazumasa Shimari (Nara Institute of Science and Technology, Japan), Kenichi Matsumoto (Nara Institute of Science and Technology, Japan), and Raula Gaikovina Kula (Nara Institute of Science and Technology, Japan)

(16:15 - 16:25) Coding Pitfalls: Demystifying the Potential API Compatibility Risk of Variadic Parameters in Python
Shuai Zhang (Nanjing University of Aeronautics and Astronautics, China), Gangqiang He (Nanjing University of Aeronautics and Astronautics, China), and Guanping Xiao (Nanjing University of Aeronautics and Astronautics, China)

(16:25 - 16:35) Linking Code and Documentation Churn: Preliminaries from GitHub
Ani Hovhannisyan (Nara Institute of Science and Technology, Japan), Youmei Fan (Nara Institute of Science and Technology, Japan), Raula Gaikovina Kula (Nara Institute of Science and Technology, Japan), and Gema Rodriguez-Perez (The University of British Columbia, Canada)

(16:35 - 16:45) Initial Investigation of Behavioral Changes of Obfuscated Programs Caused by Code Optimization
Tetsuya Kitaoka (Nara Institute of Science and Technology, Japan), Yuichiro Kanzaki (National Institute of Technology, Kumamoto College, Japan), Takashi Ishio (Future University Hakodate, Japan), Kazumasa Shimari (Nara Institute of Science and Technology, Japan), and Kenichi Matsumoto (Nara Institute of Science and Technology, Japan)

(16:45 - 16:55) On Applying Bandit Algorithm to Fault Localization Techniques
Masato Nakao (Kindai University, Japan), Kensei Hamamoto (Kindai University, Japan), Masateru Tsunoda (Kindai University, Japan), Amjed Tahir (Massey University, New Zealand), Koji Toda (Fukuoka Institute of Technology, Japan), Akito Monden (Okayama University, Japan), Keitaro Nakasai (Osaka Metropolitan University College of Technology, Japan), and Kenichi Matsumoto (Nara Institute of Science and Technology, Japan)

(16:55 - 17:05) Dynamic Testing for Mobile Privacy Compliance
Jingyi Lei (Xi'an Jiaotong University, China), Yi Wu (China Academy of Information and Communications Technology, China), Nan Hu (Xi'an Jiaotong University, China), Junjie Tao (Xi'an Jiaotong University, China), Yin Wang (Xi'an Jiaotong University, China), Ming Fan (Xi'an Jiaotong University, China), and Haijun Wang (Xi'an Jiaotong University, China)

(17:05 - 17:15) Assuring Data Integrity on Commercial Gamification Software Considering Productivity: an Industrial Case Study
Masateru Tsunoda (Kindai University, Japan), Shohei Sinto (Nissho Elektron Co., LTD., Japan), Takeshi Yamada (Kindai University, Japan), and Hidetsugu Suto (Kindai University, Japan)

(17:15 - 17:25) n-Pipeline Log Anomaly Detection Drift Mitigation
Scott Lupton (Waseda University, Japan), Hironori Washizaki (Waseda University, Japan), Naoyasu Ubayashi (Waseda University, Japan), and Nobukazu Yoshioka (Waseda University, Japan)

(17:25 - 17:35) Towards N-version Quantum Software Systems for Reliable Classical-Quantum Computing
Shinobu Saito (NTT Corporation, Japan), Suguru Endo (NTT Corporation, Japan), and Yasunari Suzuki (NTT Corporation, Japan)