BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Belgium
1 × China
1 × Denmark
1 × France
1 × Germany
1 × Hungary
1 × Norway
1 × Portugal
1 × South Africa
1 × Switzerland
2 × Canada
2 × Italy
6 × USA
Collaborated with:
N.Esfahani H.Bagheri N.Medvidović R.Jabbarvand A.Sadeghi C.Seo M.Hammad E.Yuan K.Razavi G.Edwards J.Garcia E.Kouroshfar H.Gomaa D.A.Menascé B.R.Schmerl D.Garlan J.Gennari R.Mahmood N.Mirzaei K.R.Canavera A.M.Elkhodary J.Lin E.Kang D.Jackson D.Cooray R.Roshandel D.Kilgore N.Ghorbani K.Hashimoto M.Kim J.P.Sousa S.Ravula B.Petrus M.Mirakhorli L.Xiao Y.Cai J.Cámara
Talks about:
softwar (15) architectur (13) system (11) android (9) adapt (6) self (6) analysi (5) framework (4) distribut (4) energi (4)

♂ Person: Sam Malek

DBLP DBLP: Malek:Sam

Facilitated 1 volumes:

CBSE 2012PrCo

Contributed to:

FM 20152015
ICSE 20152015
MSR 20152015
FASE 20142014
FSE 20142014
ICSE 20132013
QoSA 20132013
FSE 20122012
ESEC/FSE 20112011
ASE 20102010
ECSA 20102010
FSE 20102010
ICSE 20102010
SAC 20102010
MoDELS 20092009
CBSE 20082008
WICSA 20082008
ASE 20072007
FASE 20072007
ICSE 20072007
FSE 20162016
ESEC/FSE 20172017
ASE 20182018
ASE 20192019
ECSA 20162016
WICSA 20162016
ICSA 20172017

Wrote 31 papers:

FM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
ICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
MSR-2015-KouroshfarMBXMC #architecture #case study #evolution #quality
A Study on the Role of Software Architecture in the Evolution and Quality of Software (EK, MM, HB, LX, SM, YC), pp. 246–257.
FASE-2014-SadeghiEM #analysis #mining #repository #security
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
FSE-2014-MahmoodMM #android #named #testing
EvoDroid: segmented evolutionary testing of Android apps (RM, NM, SM), pp. 599–609.
ICSE-2013-EsfahaniMR #architecture #named #nondeterminism
GuideArch: guiding the exploration of architectural solution space under uncertainty (NE, SM, KR), pp. 43–52.
QoSA-2013-YuanMSGG #architecture #self
Architecture-based self-protecting software systems (EY, SM, BRS, DG, JG), pp. 33–42.
FSE-2012-CanaveraEM #adaptation #execution #mining
Mining the execution history of a software system to infer the best time for its adaptation (KRC, NE, SM), p. 18.
FSE-2012-EsfahaniRM #architecture #nondeterminism
Dealing with uncertainty in early software architecture (NE, KR, SM), p. 21.
ESEC-FSE-2011-EsfahaniKM #adaptation #nondeterminism #self
Taming uncertainty in self-adaptive software (NE, EK, SM), pp. 234–244.
ASE-2010-CoorayMRK #configuration management #reliability
RESISTing reliability degradation through proactive reconfiguration (DC, SM, RR, DK), pp. 83–92.
ECSA-2010-EsfahaniM #adaptation #architecture #middleware #on the #platform
On the Role of Architectural Styles in Improving the Adaptation Support of Middleware Platforms (NE, SM), pp. 433–440.
FSE-2010-ElkhodaryEM #adaptation #framework #named #self
FUSION: a framework for engineering self-tuning self-adaptive software systems (AME, NE, SM), pp. 7–16.
ICSE-2010-EsfahaniM #adaptation #network #paradigm #pervasive #self #social
Social computing networks: a new paradigm for engineering self-adaptive pervasive software systems (NE, SM), pp. 159–162.
SAC-2010-GomaaHKMM #adaptation #architecture
Software adaptation patterns for service-oriented architectures (HG, KH, MK, SM, DAM), pp. 462–469.
MoDELS-2009-EsfahaniMSGM #composition #modelling
A Modeling Language for Activity-Oriented Composition of Service-Oriented Software Systems (NE, SM, JPS, HG, DAM), pp. 591–605.
CBSE-2008-SeoMM #component #distributed #energy #estimation
Component-Level Energy Consumption Estimation for Distributed Java-Based Software Systems (CS, SM, NM), pp. 97–113.
WICSA-2008-Malek #architecture #aspect-oriented #effectiveness
Effective Realization of Software Architectural Styles with Aspects (SM), pp. 313–316.
WICSA-2008-SeoEMM #architecture #distributed #energy #framework #impact analysis
A Framework for Estimating the Impact of a Distributed Software System’s Architectural Style on its Energy Consumption (CS, GE, SM, NM), pp. 277–280.
ASE-2007-SeoMM #distributed #energy #framework
An energy consumption framework for distributed java-based systems (CS, SM, NM), pp. 421–424.
FASE-2007-EdwardsMM #architecture #distributed #dynamic analysis
Scenario-Driven Dynamic Analysis of Distributed Architectures (GE, SM, NM), pp. 125–139.
ICSE-2007-MalekSRPM #architecture #concept #embedded #product line
Reconceptualizing a Family of Heterogeneous Embedded Systems via Explicit Architectural Support (SM, CS, SR, BP, NM), pp. 591–601.
FSE-2016-BagheriM #alloy #analysis #evolution #named #performance #specification
Titanium: efficient analysis of evolving alloy specifications (HB, SM), pp. 27–38.
ESEC-FSE-2017-GarciaHGM #android #automation #communication #component #generative
Automatic generation of inter-component communication exploits for Android applications (JG, MH, NG, SM), pp. 661–671.
ESEC-FSE-2017-JabbarvandM #android #energy #framework #mutation testing #named #testing
µDroid: an energy-aware mutation testing framework for Android (RJ, SM), pp. 208–219.
ESEC-FSE-2017-SadeghiJM #android #named #testing #user interface
PATDroid: permission-aware GUI testing of Android (AS, RJ, SM), pp. 220–232.
ASE-2018-HammadGM #android #communication #component #self
Self-protection of Android systems from inter-component communication attacks (MH, JG, SM), pp. 726–737.
ASE-2019-LinJM #mobile #semantics
Test Transfer Across Mobile Apps Through Semantic Mapping (JWL, RJ, SM), pp. 42–53.
ECSA-2016-SchmerlGSBMCG #analysis #android #architecture #modelling #security
Architecture Modeling and Analysis of Security in Android Systems (BRS, JG, AS, HB, SM, JC, DG), pp. 274–290.
WICSA-2016-YuanM #architecture #component #detection #interactive #mining #security
Mining Software Component Interactions to Detect Security Threats at the Architectural Level (EY, SM), pp. 211–220.
ICSA-2017-HammadBM #android #architecture
Determination and Enforcement of Least-Privilege Architecture in Android (MH, HB, SM), pp. 59–68.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.