Castro, T., Teixeira, L., Alves, V., Apel, S., Cordy, M., & Gheyi, R. (in press). A Formal Framework of Software Product Line Analyses. ACM Transactions on Software Engineering and Methodology.
Peer reviewed
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (in press). Selecting Fault Revealing Mutants. Empirical Software Engineering.
Peer reviewed
Ghamizi, S., Cordy, M., Papadakis, M., & Le Traon, Y. (2021, October 11). Evasion Attack STeganography: Turning Vulnerability Of Machine Learning ToAdversarial Attacks Into A Real-world Application. Proceedings of International Conference on Computer Vision 2021.
Peer reviewed
Evasion Attacks have been commonly seen as a weakness of Deep Neural Networks. In this paper, we flip the paradigm and envision this vulnerability as a useful application. We propose EAST, a new ...
Benedick, P.-L. (2021, September 15). A Systematic Approach for Evaluating Artificial Intelligence Models in Industrial Settings. Sensors.
Peer reviewed
Samhi, J., & Bartel, A. (2021, August). On The (In)Effectiveness of Static Logic Bomb Detector for Android Apps. IEEE Transactions on Dependable and Secure Computing.
Peer reviewed
Android is present in more than 85% of mobile devices, making it a prime target for malware. Malicious code is becoming increasingly sophisticated and relies on logic bombs to hide itself from dynamic analysis ...
Polge, J., Ghatpande, S., Kubler, S., Robert, J., & Le Traon, Y. (2021). BlockPerf: A Hybrid Blockchain Emulator/Simulator Framework. IEEE Access, 9, 107858 - 107872.
Peer reviewed
Blockchain is increasingly used for registering, authenticating and validating digital assets (financial assets, real estate, etc.) and transactions, governing interactions, recording data and managing ...
Ma, W., Papadakis, M., Tsakmalis, A., Cordy, M., & Le Traon, Y. (2021). Test Selection for Deep Learning Systems. ACM Transactions on Software Engineering and Methodology, 30(2), 13:1--13:22.
Peer reviewed
Titcheu Chekam, T., Papadakis, M., Cordy, M., & Le Traon, Y. (2021). Killing Stubborn Mutants with Symbolic Execution. ACM Transactions on Software Engineering and Methodology, 30(2), 19:1--19:23.
Peer reviewed
Polge, J., Robert, J., & Le Traon, Y. (2020). A Case Driven Study of the Use of Time Series Classification for Flexibility in Industry 4.0. Sensors, 20(24).
Peer reviewed
With the Industry 4.0 paradigm comes the convergence of the Internet Technologies and Operational Technologies, and concepts, such as Industrial Internet of Things (IIoT), cloud manufacturing, Cyber-Physical ...
Polge, J., Robert, J., & Le Traon, Y. (2020, September 12). Permissioned Blockchain Frameworks in the Industry: A Comparison. ICT Express.
Peer reviewed
Permissioned and private blockchain platforms are increasingly used in today’s industry. This paper provides a comprehensive and comparative study of the 5 major frameworks (Fabric, Ethereum, Quorum ...
Koyuncu, A., Liu, K., Bissyande, T. F. D. A., Kim, D., Klein, J., Monperrus, M., & Le Traon, Y. (2020, March 14). FixMiner: Mining relevant fix patterns for automated program repair. Empirical Software Engineering.
Peer reviewed (verified by ORBilu)
Patching is a common activity in software development. It is generally performed on a source code base to address bugs or add new functionalities. In this context, given the recurrence of bugs across projects ...
Javed, A., Robert, J., Heljanko, K., & Främling, K. (2020). IoTEF: A Federated Edge-Cloud Architecture for Fault-Tolerant IoT Applications. Journal of Grid Computing.
Peer reviewed (verified by ORBilu)
The evolution of Internet of Things (IoT) technology has led to an increased emphasis on edge computing for Cyber-Physical Systems (CPS), in which applications rely on processing data closer to the data ...
Robert, J., Kubler, S., & Ghatpande, S. (2020). Enhanced Lightning Network (off-chain)-based micropayment in IoT ecosystems. Future Generation Computer Systems.
Peer reviewed
Information is being seen as the new “oil” for companies. Trading and negotiating personal data, which includes data generated by owned smart devices, is gaining attention and acceptance in the Internet of ...
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2020). Selecting fault revealing mutants. Empirical Software Engineering.
Peer reviewed
Titcheu Chekam, T., Papadakis, M., Bissyande, T. F. D. A., Le Traon, Y., & Sen, K. (2019, December 18). Selecting fault revealing mutants. Empirical Software Engineering, 1-54.
Peer reviewed (verified by ORBilu)
Mutant selection refers to the problem of choosing, among a large number of mutants, the (few) ones that should be used by the testers. In view of this, we investigate the problem of selecting the fault ...
Cordy, M., & Legay, A. (2019). Verification and abstraction of real-time variability-intensive systems. International Journal on Software Tools for Technology Transfer, 21(6), 635-649.
Peer reviewed (verified by ORBilu)
Li, L., Riom, T., Bissyande, T. F. D. A., Wang, H., Klein, J., & Le Traon, Y. (2019). Revisiting the impact of common libraries for android-related investigations. Journal of Systems and Software, 154, 157-175.
Peer reviewed (verified by ORBilu)
Li, D., Li, L., Kim, D., Bissyande, T. F. D. A., Lo, D., & Le Traon, Y. (2019, April). Watch out for This Commit! A Study of Influential Software Changes. Journal of Software: Evolution and Process.
Peer reviewed
One single code change can significantly influence a wide range of software systems and their users. For example, 1) adding a new feature can spread defects in several modules, while 2) changing an API method ...
Bartel, A., Klein, J., & Le Traon, Y. (2019). MUSTI: Dynamic Prevention of Invalid Object Initialization Attacks. IEEE Transactions on Information Forensics and Security.
Peer reviewed (verified by ORBilu)
Invalid object initialization vulnerabilities have been identified since the 1990’s by a research group at Princeton University. These vulnerabilities are critical since they can be used to ...
Kolbe, N., Kubler, S., Robert, J., Le Traon, Y., & Zaslavsky, A. (2019). Linked Vocabulary Recommendation Tools for Internet of Things: A Survey. ACM Computing Surveys.
Peer reviewed
The Semantic Web emerged with the vision of eased integration of heterogeneous, distributed data on the Web. The approach fundamentally relies on the linkage between and reuse of previously published ...
Molina, F., Cornejo, C., Degiovanni, R. G., Regis, G., Castro, P. F., Aguirre, N., & Frias, M. F. (2019). An evolutionary approach to translating operational specifications into declarative specifications. Science of Computer Programming, 181, 47--63.
Peer reviewed (verified by ORBilu)
Various tools for program analysis, including run-time assertion checkers and static analyzers such as verification and test generation tools, require formal specifications of the programs being analyzed ...
Shin, D., Yoo, S., Papadakis, M., & Bae, D.-H. (2019). Empirical Evaluation of Mutation-based Test Prioritization Techniques. Software Testing, Verification and Reliability, 29(1-2).
Peer reviewed (verified by ORBilu)
Karpenko, A., Kinnunen, T., Madhikermi, M., Robert, J., Främling, K., Dave, B., & Nurminen, A. (2018, December 13). Data Exchange Interoperability in IoT Ecosystem for Smart Parking and EV Charging. Sensors.
Peer reviewed (verified by ORBilu)
Many domains are trying to integrate with the Internet of Things (IoT) ecosystem, such as public administrations starting smart city initiatives all over the world. Cities are becoming smart in many ways ...
Kubler, S., Derigent, W., Voisin, A., Robert, J., Le Traon, Y., & Herrera Viedma, E. (2018, September 27). Measuring inconsistency and deriving priorities from fuzzy pairwise comparison matrices using the knowledge-based consistency index. Knowledge-Based Systems.
Peer reviewed (verified by ORBilu)
Mouline, L., Benelallam, A., Hartmann, T., Fouquet, F., Bourcier, J., Morin, B., & Barais, O. (2018, April 09). Enabling Temporal-Aware Contexts for Adaptative Distributed Systems. SAC 2018: SAC 2018: Symposium on Applied Computing , April 9--13, 2018, Pau, France.
Peer reviewed
Distributed adaptive systems are composed of federated entities offering remote inspection and reconfiguration abilities. This is often realized using a MAPE-K loop, which constantly evaluates system and ...
Ruan, M., Titcheu Chekam, T., Zhai, E., Li, Z., Liu, Y., E, J., Cui, Y., & Xu, H. (2018). On the Synchronization Bottleneck of OpenStack Swift-like Cloud Storage Systems. IEEE Transactions on Parallel and Distributed Systems, PP(99), 1-1.
Peer reviewed (verified by ORBilu)
As one type of the most popular cloud storage services, OpenStack Swift and its follow-up systems replicate each object across multiple storage nodes and leverage object sync protocols to achieve high ...
Bartolini, C., El Kateb, D., Le Traon, Y., & Hagen, D. (2018). Cloud Providers Viability: How to Address it from an IT and Legal Perspective? Electron Markets, 28(1), 53-75.
Peer reviewed (verified by ORBilu)
A major part of the commercial Internet is moving toward the cloud paradigm. This phenomenon has a drastic impact onthe organizational structures of enterprizes and introduces new challenges that must be ...
Kubler, S., Robert, J., Neumaier, S., Umbrich, J., & Le Traon, Y. (2018, January 01). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly.
Peer reviewed (verified by ORBilu)
Sirres, R., Bissyande, T. F. D. A., Kim, D., Lo, D., Klein, J., & Le Traon, Y. (2018). Augmenting and Structuring User Queries to Support Efficient Free-Form Code Search. Empirical Software Engineering, 90, 27-39.
Peer reviewed (verified by ORBilu)
Devroey, X., Perrouin, G., Papadakis, M., Legay, A., Schobbens, P.-Y., & Heymans, P. (2018). Model-based mutant equivalence detection using automata language equivalence and simulations. Journal of Systems and Software.
Peer reviewed (verified by ORBilu)
Kintis, M., Papadakis, M., Papadopoulos, A., Valvis, E., Malevris, N., & Le Traon, Y. (2018). How effective are mutation testing tools? An empirical analysis of Java mutation testing tools with manual analysis and real faults. Empirical Software Engineering.
Peer reviewed
Mutation analysis is a well-studied, fault-based testing technique. It requires testers to design tests based on a set of artificial defects. The defects help in performing testing activities by measuring ...
Liu, K., Kim, D., Bissyande, T. F. D. A., Yoo, S., & Le Traon, Y. (2018). Mining Fix Patterns for FindBugs Violations. IEEE Transactions on Software Engineering.
Peer reviewed (verified by ORBilu)
Several static analysis tools, such as Splint or FindBugs, have been proposed to the software development community to help detect security vulnerabilities or bad programming practices. However, the adoption ...
Martinez, J., Ziadi, T., Papadakis, M., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2018). Feature location benchmark for extractive software product line adoption research using realistic and synthetic Eclipse variants. Information and Software Technology.
Peer reviewed (verified by ORBilu)
Muller, S., Lancrenon, J., Harpes, C., Le Traon, Y., Gombault, S., & Bonnin, J.-M. (2018). A training-resistant anomaly detection system. Computers and Security, 76, 1-11.
Peer reviewed (verified by ORBilu)
Modern network intrusion detection systems rely on machine learning techniques to detect traffic anomalies and thus intruders. However, the ability to learn the network behaviour in real-time comes at a cost ...
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Cai, H., Lo, D., & Le Traon, Y. (2017, November). On Locating Malicious Code in Piggybacked Android Apps. Journal of Computer Science and Technology.
Peer reviewed (verified by ORBilu)
To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to ...
Hartmann, T., Moawad, A., Fouquet, F., & Le Traon, Y. (2017, May 29). The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling. Software & Systems Modeling.
Peer reviewed (verified by ORBilu)
Machine learning algorithms are designed to resolve unknown behaviors by extracting commonalities over massive datasets. Unfortunately, learning such global behaviors can be inaccurate and slow for systems ...
Antoniadis, N., & Sifaleras, A. (2017). A hybrid CPU-GPU parallelization scheme of variable neighborhood search for inventory optimization problems. Electronic Notes in Discrete Mathematics, 58, 47 - 54.
Peer reviewed
In this paper, we study various parallelization schemes for the Variable Neighborhood Search (VNS) metaheuristic on a CPU-GPU system via OpenMP and OpenACC. A hybrid parallel VNS method is applied to recent ...
Kintis, M., Papadakis, M., Jia, Y., Malevris, N., Le Traon, Y., & Harman, M. (2017, March 20). Detecting Trivial Mutant Equivalences via Compiler Optimisations. IEEE Transactions on Software Engineering.
Peer reviewed (verified by ORBilu)
Kubler, S., Robert, J., Främling, K., Hefnawy, A., Cherifi, C., & Bouras, A. (2017). Open IoT Ecosystem for Sporting Event Management. IEEE Access, 5(1), 7064-7079.
Peer reviewed (verified by ORBilu)
By connecting devices, people, vehicles, and infrastructures everywhere in a city, governments and their partners can improve community well-being and other economic and financial aspects (e.g., cost and ...
Li, L., Li, D., Bissyande, T. F. D. A., Klein, J., Le Traon, Y., Lo, D., & Cavallaro, L. (2017, January). Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting. IEEE Transactions on Information Forensics and Security.
Peer reviewed
The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base. Although recent research has ...
Kubler, S., Robert, J., Umbrich, J., Neumaier, S., & Le Traon, Y. (2017). Comparison of metadata quality in open data portals using the Analytic Hierarchy Process. Government Information Quarterly.
Peer reviewed (verified by ORBilu)
Li, L., Bissyande, T. F. D. A., Papadakis, M., Rasthofer, S., Bartel, A., Octeau, D., Klein, J., & Le Traon, Y. (2017). Static Analysis of Android Apps: A Systematic Literature Review. Information and Software Technology.
Peer reviewed
Context: Static analysis exploits techniques that parse program source code or bytecode, often traversing program paths to check some program properties. Static analysis approaches have been proposed for ...
Muller, S., Harpes, C., Le Traon, Y., Gombault, S., & Bonnin, J.-M. (2017). Efficiently computing the likelihoods of cyclically interdependent risk scenarios. Computers and Security, 64, 59-68.
Peer reviewed (verified by ORBilu)
Quantitative risk assessment provides a holistic view of risk in an organisation, which is, however, often biased by the fact that risk shared by several assets is encoded multiple times in a risk analysis. An ...
Kubler, S., Robert, J., William, D., Alexandre, V., & Le Traon, Y. (2016). A state-of the-art survey & testbed of Fuzzy AHP (FAHP) applications. Expert Systems with Applications, 65, 398--422.
Peer reviewed (verified by ORBilu)
As a practical popular methodology for dealing with fuzziness and uncertainty in Multiple Criteria Decision-Making (MCDM), Fuzzy AHP (FAHP) has been applied to a wide range of applications. As of the time of ...
Li, D., Bissyande, T. F. D. A., Klein, J., & Le Traon, Y. (2016). Time Series Classification with Discrete Wavelet Transformed Data. International Journal of Software Engineering and Knowledge Engineering, 26(9&10), 1361–1377.
Peer reviewed (verified by ORBilu)
Sanchez Guinea, A., Nain, G., & Le Traon, Y. (2016). A systematic review on the engineering of software for ubiquitous systems. Journal of Systems and Software, 118, 251-276.
Peer reviewed (verified by ORBilu)
Context: Software engineering for ubiquitous systems has experienced an important and rapid growth, however the vast research corpus makes it difficult to obtain valuable information from it. Objective: To ...
Madhikermi, M., Kubler, S., Robert, J., Buda, A., & Främling, K. (2016, June 28). Data Quality Assessment of Maintenance Reporting Procedures. Expert Systems with Applications.
Peer reviewed (verified by ORBilu)
Today’s largest and fastest growing companies’ assets are no longer physical, but rather digital (software, algorithms...). This is all the more true in the manufacturing, and particularly in the maintenance ...
Caire, P., Moawad, A., Efthymiou, V., bikakis, A., & Le Traon, Y. (2016). Privacy Challenges in Ambient Intelligence Systems. Journal of Ambient Intelligence and Smart Environments.
Peer reviewed (verified by ORBilu)
Today, privacy is a key concept. It is also one which is rapidly evolving with technological advances, and there is no consensus on a single definition for it. In fact, the concept of privacy has been defined ...
Nguyen, P. H., Kramer, M., Klein, J., & Le Traon, Y. (2015). An Extensive Systematic Review on the Model-Driven Development of Secure Systems. Information and Software Technology, 68(December 2015), 62-81.
Peer reviewed (verified by ORBilu)
Context: Model-Driven Security (MDS) is as a specialised Model-Driven Engineering research area for supporting the development of secure systems. Over a decade of research on MDS has resulted in a large number ...
Amrani, M., Combemale, B., Lúcio, L., Selim, G. M. K., Dingel, J., Le Traon, Y., Vangheluwe, H., & Cordy, J. R. (2015). Formal verification techniques for model transformations: A tridimensional classification. Journal of Object Technology, 14(3).
Peer reviewed (verified by ORBilu)
In Model Driven Engineering (Mde), models are first-class citizens, and model transformation is Mde's "heart and soul". Since model transformations are executed for a family of (conforming) models, their ...
Bertolino, A., Daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., Lonetti, F., Marchetti, E., Mouelhi, T., & Papadakis, M. (2015). Similarity testing for access control. Information and Software Technology, 58, 355-372.
Peer reviewed (verified by ORBilu)
Context: Access control is among the most important security mechanisms, and XACML is the de facto standard for specifying, storing and deploying access control policies. Since it is critical that enforced ...
El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2015). Conviviality-driven access control policy. Requirements Engineering, 20(4), 363-382.
Peer reviewed (verified by ORBilu)
Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information ...
Kintis, M., Papadakis, M., & Malevris, N. (2015). Employing second-order mutation for isolating first-order equivalent mutants. Software Testing, Verification & Reliability, 25(5-7), 508-535.
Peer reviewed (verified by ORBilu)
The equivalent mutant problem is a major hindrance to mutation testing. Being undecidable in general, it is only susceptible to partial solutions. In this paper, mutant classification is utilised for isolating ...
Li, L., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2015). An Investigation into the Use of Common Libraries in Android Apps. arXiv preprint arXiv:1511.06554.
Peer reviewed
The packaging model of Android apps requires the entire code necessary for the execution of an app to be shipped into one single apk file. Thus, an analysis of Android apps often visits code which is not part ...
Papadakis, M., & Le Traon, Y. (2015). Metallaxis-FL: mutation-based fault localization. Software Testing : Verification & Reliability, 25, 605-628.
Peer reviewed
Xu, D., Kent, M., Thomas, L., Mouelhi, T., & Le Traon, Y. (2015). Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets. IEEE Transactions on Computers, 64(9), 2490-2505.
Peer reviewed (verified by ORBilu)
Role-based access control is an important access control method for securing computer systems. A role-based access control policy can be implemented incorrectly due to various reasons, such as programming ...
Zhang, X., Zhang, D., Le Traon, Y., Wang, Q., & Zhang, L. (2015). Roundtable: Research Opportunities and Challenges for Emerging Software Systems. Journal of Computer Science and Technology, 30(5), 935-941.
Peer reviewed (verified by ORBilu)
For this special section on software systems, several research leaders in software systems, as guest editors for this special section, discuss important issues that will shape this field’s future directions ...
Allix, K., Bissyande, T. F. D. A., Jerome, Q., Klein, J., State, R., & Le Traon, Y. (2014, December 24). Empirical assessment of machine learning-based malware detectors for Android: Measuring the Gap between In-the-Lab and In-the-Wild Validation Scenarios. Empirical Software Engineering, 1-29.
Peer reviewed (verified by ORBilu)
To address the issue of malware detection through large sets of applications, researchers have recently started to investigate the capabilities of machine-learning techniques for proposing effective approaches ...
Papadakis, M., Delamaro, E. M., & Le Traon, Y. (2014). Mitigating the Effects of Equivalent Mutants with Mutant Classification Strategies. Science of Computer Programming, 95, 298-319.
Peer reviewed
Mutation Testing has been shown to be a powerful technique in detecting software faults. Despite this advantage, in practice there is a need to deal with the equivalent mutants’ problem. Automatically ...
Bertolino, A., daoudagh, S., El Kateb, D., Henard, C., Le Traon, Y., lonetti, F., marchetti, E., Mouelhi, T., & Papadakis, M. (2014, July 21). Similarity testing for access control. Information and Software Technology.
Bartel, A., Klein, J., Monperrus, M., & Le Traon, Y. (2014). Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android. IEEE Transactions on Software Engineering, 40(6), 617-632.
Peer reviewed
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted ...
Amrani, M., Lúcio, L., Selim, G., Combemale, B., Dingel, J., Vangheluwe, H., Le Traon, Y., & Cordy, J. (2014). A Survey of Formal Verification Techniques for Model Transformations: A Tridimensional Classification. Journal of Technology.
Peer reviewed
bikakis, A., Caire, P., & Le Traon, Y. (2014). Tools for Conviviality in Multi-Context Systems. IfCoLog Journal of Logics and Their Applications, 1(1).
Peer reviewed
A common feature of many distributed systems, including web social networks, peer-to-peer systems and Ambient Intelligence systems, is cooperation in terms of information exchange among heterogeneous entities ...
El Kateb, D., Zannone, N., Moawad, A., Caire, P., Nain, G., Mouelhi, T., & Le Traon, Y. (2014). Conviviality-Driven Access Control Policy. Requirements Engineering.
Peer reviewed (verified by ORBilu)
Henard, C., Papadakis, M., Perrouin, G., Klein, J., Heymans, P., & Le Traon, Y. (2014). Bypassing the Combinatorial Explosion: Using Similarity to Generate and Prioritize T-wise Test Configurations for Software Product Lines. IEEE Transactions on Software Engineering, 40(7), 650-670.
Peer reviewed
Nguyen, P. H., Nain, G., Klein, J., Mouelhi, T., & Le Traon, Y. (2014). Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management. Transactions on Aspect-Oriented Software Development, 11, 109-144.
Peer reviewed
Model-Driven Security (Mds) is a specialized Model-Driven Engineering (Mde) approach for supporting the development of secure systems. Model-Driven Security aims at improving the productivity of the ...
Sunyé, G., De Almeida, E. C., Le Traon, Y., Baudry, B., & Jézéquel, J.-M. (2014). Model-based testing of global properties on large-scale distributed systems. Information and Software Technology, 56(7), 749-762.
Peer reviewed (verified by ORBilu)
Context Large-scale distributed systems are becoming commonplace with the large popularity of peer-to-peer and cloud computing. The increasing importance of these systems contrasts with the lack of integrated ...
Fior, A. G., Meira, J. A., Almeida, E. C. D., Coelho, R. G., Del Fabro, M. D., & Le Traon, Y. (2013). Under Pressure Benchmark for DDBMS Availability. Journal of Information and Data Management.
Peer reviewed
The availability of Distributed Database Management Systems (DDBMS) is related to the probability of being up and running at a given point in time and to the management of failures. One well-known and widely ...
Meira, J. A., Almeida, E. C. D., Sunyé, G., Le Traon, Y., & Valduriez, P. (2013). Stress Testing of Transactional Database Systems. Journal of Information and Data Management.
Peer reviewed
Transactional database management systems (DBMS) have been successful at supporting traditional transaction processing workloads. However, web-based applications that tend to generate huge numbers of ...
Munoz, F., Baudry, B., Delamare, R., & Le Traon, Y. (2013). Usage and testability of AOP: An empirical study of AspectJ. Information and Software Technology, 55(2), 252-266.
Peer reviewed (verified by ORBilu)
Context: Back in 2001, the MIT announced aspect-oriented programming as a key technology in the next 10 years. Nowadays, 10 years later, AOP is still not widely adopted. Objective: The objective of this work ...
Dhaussy, P., Boniol, F., Roger, J.-C., Raji, A., Le Traon, Y., & Baudry, B. I. (2012). Formalisation de contextes et d'exigences pour la validation formelle de logiciels embarqués. TSI. Technique et science informatiques, 31(6), 797--825.
Peer reviewed
Un défi bien connu dans le domaine des méthodes formelles est d'améliorer leur intégration dans les processus de développement industriel. Dans le contexte des systèmes embarqués, l’utilisation des ...
Papadakis, M., & Malevris, N. (2012). Mutation Based Test Case Generation via a Path Selection Strategy. Information and Software Technology, 54(9), 915-932.
Peer reviewed (verified by ORBilu)
Context: Generally, mutation analysis has been identified as a powerful testing method. Researchers have shown that its use as a testing criterion exercises quite thoroughly the system under test while it ...
Perrouin, G., Oster, S., Sen, S., Klein, J., Baudry, B., & Le Traon, Y. (2012). Pairwise testing for software product lines: Comparison of two approaches. Software Quality Journal, 20(3), 605-643.
Peer reviewed (verified by ORBilu)
Software Product Lines (SPL) are difficult to validate due to combinatorics induced by variability, which in turn leads to combinatorial explosion of the number of derivable products. Exhaustive testing in such ...