ICSE Shanghai 2006

28th International Conference on Software Engineering

Conference Center
Conference: May 20-28, 2006 | Main Program: May 24-26, 2006 | Co-located Events / Workshops / Tutorials: May 20-24 & 27-28, 2006
Online registration | Obtaining a Required Visa | Early Registration Deadline: April 10, 2006
Obtaining a Required Visa | Shanghai Information | Shanghai Attractions
Fuqing Yang | Barry Boehm | Reinhold Achatz
Keynotes | Research | Experience | Far East Exp. | Education | Achievements | Demos | Emerging | Workshops | Tutorials | More...
Organizing Committee | Program Committee

Research Demonstrations

Verification and Testing

Thursday, May 25 - 11:00-12:30pm - Yangtze River Hall

Session Chair: Kokichi Futatsugi (Japan Advanced Institute of Science and Technology - JAIST)

LTSA-WS: A Tool for Model-Based Verification of Web Service Compositions and Choreography, Howard Foster, Sebastian Uchitel, Jeff Magee, Jeff Kramer, Imperial College London, UK

HighSpec: a Tool for Building and Checking OZTA Models, Ping Hao, Xian Zhang, National University of Singapore, Singapore; Sheng Chao Qin, University of Durham, UK; Jin Song Dong, National University of Singapore, Singapore

GridUnit: Software Testing on the Grid, Alexandre Duarte, Walfredo Cirne, Francisco Brasileiro, Patrícia Machado, Universidade Federal de Campina Grande, Brazil

Development and Transformation

Thursday, May 25 - 2:00-3:30pm - Yangtze River Hall

Session Chair: Alessandro Orso (Georgia Institute of Technology)

ASADAL : A Tool System for Co-Development of Software and Test Environment Based on Product Line Engineering, Kyungseok Kim, Hyejung Kim, Miyoung Ahn, Minseok Suh, Yeop Chang, Kyo Kang, Pohang University of Science and Technology, Korea

Developing and Executing Java AWT Applications on Limited Devices with TCPTE, Gerardo Canfora, Giuseppe Di Santo, Eugenio Zimeo, RCOST - University of Sannio, Italy

Interactive Transformation of Java Programs in Eclipse, Marat Boshernitsan, Susan Graham, University of California, Berkeley, USA

Data Base and Business Process

Thursday, May 25 - 4:00-5:30pm - Yangtze River Hall

Session Chair: Matthew Dwyer (University of Nebraska)

Preventing SQL Injection Attacks Using AMNESIA, William Halfond, Alessandro Orso, Georgia Institute of Technology, USA

A Framework for Automatic Generation of Evolvable E-Commerce Workplaces Using Business Processes, Ying Zou, Qi Zhang, Queen’s University, Canada

LISFS: a Logical Information System as a File System, Yoann Padioleau, École des Mines de Nantes, France; Benjamin Sigonneau, Olivier Ridoux, Sébastien Ferré, IFSIC/IRISA, France; Mireille Ducassé, INSA/IRISA, France; Olivier Bedel, Peggy Cellier, IFSIC/IRISA, France

Informal Demonstrations

Friday, May 26 - 10:30-12:30pm and 2:00-3:30pm - Gate of Yangtze River Hall

Accepted research demonstrations, including those above and below, will be demonstrated

LtRules: an Automated Software Library Usage Rule Extraction Tool, Chang Liu, En Ye, Ohio University, USA; Debra Richardson, University of California, Irvine, USA

Relational Programming with CrocoPat, Dirk Beyer, EPFL, Switzerland

FormulaBuilder: A Tool for Graph-Based Modelling and Generation of Formulae, Sven Jörges, University of Dortmund, Germany

MuJava: A Mutation System for Java, Yu-Seung Ma, Electronics and Telecommuniation Research Institute, Korea; Jeff Offutt, George Mason University, USA; Yong-Rae Kwon, Korea Advanced Institute of Science and Technology, Korea

3D Visualization for Concept Location in Source Code, Xinrong Xie, Denys Poshyvanyk, Andrian Marcus, Wayne State University, USA

Addressing Crosscutting Deployment and Configuration Concerns of Distributed Real-time and Embedded Systems via Aspect-oriented & Model-driven Software Development, Gan Deng, Douglas Schmidt, Aniruddha Gokhale, Vanderbilt University, USA

Tools for Model-based Security Engineering, Jan Jürjens, Jorge Fox, TU Munich, Germany

Automatic Extraction of Abstract-Object-State Machines from Unit-Test Executions, Tao Xie, Evan Martin, Hai Yuan, North Carolina State University, USA

A Tool for Analyzing and Detecting Malicious Mobile Code, Akira Mori, Tomonori Izumida, AIST, Japan; Toshimi Sawada, Tadashi Inoue, SRA Key-Tech Laboratories, Japan

Valid XHTML 1.0 Strict! Valid CSS!