BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
applic (40)
app (31)
detect (19)
base (17)
studi (15)

Stem android$ (all stems)

125 papers:

DATEDATE-2015-CornaFNS #android #detection
Occupancy detection via iBeacon on Android devices for smart building management (AC, LF, AAN, DS), pp. 629–632.
DATEDATE-2015-OhYM #android #compilation #virtual machine
Bytecode-to-C ahead-of-time compilation for Android Dalvik virtual machine (HSO, JHY, SMM), pp. 1048–1053.
ICPCICPC-2015-SohTAW #android #detection #user interface
Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
ICPCICPC-2015-WhiteVJBP #android #debugging #generative
Generating reproducible and replayable bug reports from Android application crashes (MW, MLV, PJ, CBC, DP), pp. 48–59.
ICSMEICSME-2015-TianNLH #android #case study #what
What are the characteristics of high-rated apps? A case study on free Android Applications (YT, MN, DL, AEH), pp. 301–310.
ICSMEICSME-2015-VasquezVLP #android #detection #developer #how #performance
How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
MSRMSR-2015-CoelhoAGD #android #debugging #exception #git
Unveiling Exception Handling Bug Hazards in Android Based on GitHub and Google Code Issues (RC, LA, GG, AvD), pp. 134–145.
MSRMSR-2015-KrutzMMRPFS #android #dataset #open source
A Dataset of Open-Source Android Applications (DEK, MM, SAM, AR, JP, AF, JS), pp. 522–525.
MSRMSR-2015-VasquezWBMP #android #execution #generative #mining
Mining Android App Usages for Generating Actionable GUI-Based Execution Scenarios (MLV, MW, CBC, KM, DP), pp. 111–122.
FMFM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
FMFM-2015-LiuH #analysis #android #case study #kernel #security
Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
ICEISICEIS-v2-2015-NetoKCBM #android #architecture #case study #design
Unveiling the Architecture and Design of Android Applications — An Exploratory Study (ECN, UK, RC, RB, LM), pp. 201–211.
SEKESEKE-2015-HuangWSQ #android #fine-grained #named #policy #security
DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
SEKESEKE-2015-SongHJC #android #generative #testing
Generating various contexts from permissions for testing Android applications (KS, ARH, SJ, SDC), pp. 87–92.
OOPSLAOOPSLA-2015-BastaniAA #android #data flow #verification
Interactively verifying absence of explicit information flows in Android apps (OB, SA, AA), pp. 299–315.
OOPSLAOOPSLA-2015-BielikRV #android #concurrent #detection #scalability
Scalable race detection for Android applications (PB, VR, MTV), pp. 332–348.
OOPSLAOOPSLA-2015-HuAN #android #lightweight
Versatile yet lightweight record-and-replay for Android (YH, TA, IN), pp. 349–366.
SACSAC-2015-VecchiatoVM #android #assessment #security
A security configuration assessment for android devices (DV, MV, EM), pp. 2299–2304.
ESEC-FSEESEC-FSE-2015-Bernal-Cardenas #android #energy
Improving energy consumption in Android apps (CBC), pp. 1048–1050.
ESEC-FSEESEC-FSE-2015-FratantonioMBKV #android #named
CLAPP: characterizing loops in Android applications (YF, AM, AB, CK, GV), pp. 687–697.
ESEC-FSEESEC-FSE-2015-LiLWH #analysis #android #java #string
String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
ESEC-FSEESEC-FSE-2015-Moran #android #debugging
Enhancing Android application bug reporting (KM), pp. 1045–1047.
ESEC-FSEESEC-FSE-2015-MoranVBP #android #debugging
Auto-completing bug reports for Android applications (KM, MLV, CBC, DP), pp. 673–686.
ESEC-FSEESEC-FSE-2015-VasquezBBOPP #android #approach #energy #multi #optimisation #user interface
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach (MLV, GB, CEBC, RO, MDP, DP), pp. 143–154.
ICSEICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
ICSEICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
ICSEICSE-v1-2015-YangYWWR #analysis #android #control flow
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
ICSEICSE-v2-2015-Hecht #android #approach #detection
An Approach to Detect Android Antipatterns (GH), pp. 766–768.
ICSEICSE-v2-2015-HollandDKMR #android #detection #novel #security
Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
ICSEICSE-v2-2015-Imparato #android #testing #user interface
A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps (GI), pp. 760–762.
ICSEICSE-v2-2015-Merwe #android #verification
Verification of Android Applications (HvdM), pp. 931–934.
ICSEICSE-v2-2015-RaudjarvG #android #runtime
JRebel.Android: Runtime Class- and Resource Reloading for Android (RR, ARG), pp. 741–744.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSEICSE-v2-2015-Vasquez #android #testing
Enabling Testing of Android Apps (MLV), pp. 763–765.
CAVCAV-2015-OzkanET #android #debugging
Systematic Asynchrony Bug Exploration for Android Apps (BKO, ME, ST), pp. 455–461.
ICSTICST-2015-WanJLH #android #detection #energy
Detecting Display Energy Hotspots in Android Apps (MW, YJ, DL, WGJH), pp. 1–10.
ISSTAISSTA-2015-AdamsenMM #android #execution #testing
Systematic execution of Android test suites in adverse conditions (CQA, GM, AM), pp. 83–93.
ISSTAISSTA-2015-HayTP #android #communication #detection
Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
ISSTAISSTA-2015-HuangDMD #analysis #android #precise #scalability
Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
ISSTAISSTA-2015-WangGMC #android #approach #clone detection #detection #named #scalability
WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
ASEASE-2014-RenCL #android #named
Droidmarking: resilient software watermarking for impeding android application repackaging (CR, KC, PL), pp. 635–646.
CASECASE-2014-HabibDBHP #android #learning
Learning human-like facial expressions for Android Phillip K. Dick (AH, SKD, ICB, DH, DOP), pp. 1159–1165.
DATEDATE-2014-AlamPTSN #android #energy #optimisation
Energy optimization in Android applications through wakelock placement (FA, PRP, NT, NS, SN), pp. 1–4.
DATEDATE-2014-KimSXWPC #android #fine-grained #monitoring #named #smarttech
FEPMA: Fine-grained event-driven power meter for android smartphones based on device driver layer event monitoring (KK, DS, QX, YW, MP, NC), pp. 1–6.
DATEDATE-2014-MembarthRHT #android #architecture #code generation #embedded
Code generation for embedded heterogeneous architectures on android (RM, OR, FH, JT), pp. 1–6.
DATEDATE-2014-MercatiBPRB #android #mobile #reliability
A Linux-governor based Dynamic Reliability Manager for android mobile devices (PM, AB, FP, TSR, LB), pp. 1–4.
ICPCICPC-2014-VasquezBPOP #android #api #case study #how #stack overflow
How do API changes trigger stack overflow discussions? a study on the Android SDK (MLV, GB, MDP, RO, DP), pp. 83–94.
ICSMEICSME-2014-BeyerP #android #categorisation #development #stack overflow
A Manual Categorization of Android App Development Issues on Stack Overflow (SB, MP), pp. 531–535.
ICSMEICSME-2014-LiHGH #android #empirical #energy
An Empirical Study of the Energy Consumption of Android Applications (DL, SH, JG, WGJH), pp. 121–130.
MSRMSR-2014-VasquezBBOPP #android #api #empirical #energy #mining
Mining energy-greedy API usage patterns in Android apps: an empirical study (MLV, GB, CBC, RO, MDP, DP), pp. 2–11.
MSRMSR-2014-VasquezHBP #android #library #obfuscation #reuse
Revisiting Android reuse studies in the context of code obfuscation and library usages (MLV, AH, CBC, DP), pp. 242–251.
PEPMPEPM-2014-PayetS #android #process #semantics
An operational semantics for android activities (ÉP, FS), pp. 121–132.
PLDIPLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
PLDIPLDI-2014-MaiyaKM #android #concurrent #detection
Race detection for Android applications (PM, AK, RM), p. 34.
FMFM-2014-GunadiT #android #case study #logic #metric #monitoring #operating system #performance #runtime
Efficient Runtime Monitoring with Metric Temporal Logic: A Case Study in the Android Operating System (HG, AT), pp. 296–311.
HCIDUXU-DI-2014-MullingLC #android #design #gesture #interactive #interface
Gestural Interfaces Touchscreen: Thinking Interactions beyond the Button from Interaction Design for Gmail Android App (TM, CL, AC), pp. 279–288.
SEKESEKE-2014-ArnatovichTDLS #android #comparison #empirical
Empirical Comparison of Intermediate Representations for Android Applications (YA, HBKT, SD, KL, LKS), pp. 205–210.
SACSAC-2014-Cooper #android #detection #research #student
Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
SACSAC-2014-CorralGSS #android #energy #implementation
Method reallocation to reduce energy consumption: an implementation in Android OS (LC, ABG, AS, GS), pp. 1213–1218.
SACSAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
SACSAC-2014-Le #android #framework #modelling
A model driven framework for modeling and composing service based Android applications (CL), pp. 450–457.
FSEFSE-2014-FengADA #android #detection #named #semantics #static analysis
Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSEFSE-2014-KhalidNSH #android #case study #game studies
Prioritizing the devices to test your app on: a case study of Android game apps (HK, MN, ES, AEH), pp. 610–620.
FSEFSE-2014-LinRD #android #concurrent #refactoring
Retrofitting concurrency for Android applications through refactoring (YL, CR, DD), pp. 341–352.
FSEFSE-2014-MahmoodMM #android #named #testing
EvoDroid: segmented evolutionary testing of Android apps (RM, NM, SM), pp. 599–609.
ICSEICSE-2014-ChenLZ #android #detection #scalability
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets (KC, PL, YZ), pp. 175–186.
ICSEICSE-2014-HuangZTWL #android #behaviour #detection #named #user interface
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
ASPLOSASPLOS-2014-AndrusHADVN #android #execution #named
Cider: native execution of iOS apps on android (JA, AVH, NA, CD, NV, JN), pp. 367–382.
CGOCGO-2014-RountevY #analysis #android #user interface
Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
ASEASE-2013-GuoZYZZ #android #detection
Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
ASEASE-2013-HolavanalliMNRSKZ #android
Flow Permissions for Android (SH, DM, VN, BR, FS, SYK, LZ), pp. 652–657.
ASEASE-2013-HolderSDT #android #execution
Cloud Twin: Native execution of android applications on the Windows Phone (EH, ES, MD, ET), pp. 598–603.
ITiCSEITiCSE-2013-EdwardsA #android #framework #named
Sofia: the simple open framework for inventive android applications (SHE, AA), p. 321.
ITiCSEITiCSE-2013-QianM #android #embedded
A fostering embedded system educationwith android sensory embedded system labware (KQ, KM), p. 336.
TACASTACAS-2013-BackesGHMS #android #named #requirements
AppGuard — Enforcing User Requirements on Android Apps (MB, SG, CH, MM, PvSR), pp. 543–548.
CSMRCSMR-2013-BhattacharyaUNK #analysis #android #debugging #empirical #open source
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
CSMRCSMR-2013-BorrielloMC #android #architecture #migration #towards
Migrating Android Applications towards Service-centric Architectures with Sip2Share (AB, FM, GC), pp. 413–416.
ICSMEICSM-2013-McDonnellRK #android #api #ecosystem #empirical
An Empirical Study of API Stability and Adoption in the Android Ecosystem (TM, BR, MK), pp. 70–79.
MSRMSR-2013-MukadamBR #android #bibliography #code review
Gerrit software code review data from Android (MM, CB, PCR), pp. 45–48.
MSRMSR-2013-StevensGFDC #android
Asking for (and about) permissions used by Android apps (RS, JG, VF, PTD, HC), pp. 31–40.
MSRMSR-2013-WangG #android #api #case study #detection #developer
Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
HCIHCI-III-2013-GronliGH #adaptation #android #user interface
Sensor-Based Adaptation of User Interface on Android Phones (TMG, GG, JH), pp. 56–61.
SEKESEKE-2013-Perez-CastilloGGFP #android #migration #user interface #visual notation
ANDRIU. A Technique for Migrating Graphical User Interfaces to Android (S) (RPC, IGRdG, RGC, MFR, MP), pp. 516–519.
OOPSLAOOPSLA-2013-AzimN #android #testing
Targeted and depth-first exploration for systematic testing of android apps (TA, IN), pp. 641–660.
OOPSLAOOPSLA-2013-ChoiNS #android #approximate #learning #testing #user interface
Guided GUI testing of android apps with minimal restart and approximate learning (WC, GCN, KS), pp. 623–640.
SACSAC-2013-JangJHJKJ #android
Protecting Android applications with steganography-based software watermarking (JJ, HJ, JH, JJ, DK, SKJ), pp. 1657–1658.
SACSAC-2013-JeonKKC #android #security
Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
SACSAC-2013-ShinYR #android #security #visual notation
Supporting visual security cues for WebView-based Android apps (DS, HY, UR), pp. 1867–1876.
SACSAC-2013-SpreitzenbarthFESH #android #named
Mobile-sandbox: having a deeper look into android applications (MS, FCF, FE, TS, JH), pp. 1808–1815.
ESEC-FSEESEC-FSE-2013-MachiryTN #android #generative #named
Dynodroid: an input generation system for Android apps (AM, RT, MN), pp. 224–234.
ESEC-FSEESEC-FSE-2013-VasquezBBPOP #android #api #fault
API change and fault proneness: a threat to the success of Android apps (MLV, GB, CBC, MDP, RO, DP), pp. 477–487.
ICSEICSE-2013-GomezNAM #android #named
RERAN: timing- and touch-sensitive record and replay for Android (LG, IN, TA, TDM), pp. 72–81.
CGOCGO-2013-WangWC #android #bytecode #named
Acceldroid: Co-designed acceleration of Android bytecode (CW, YW, MC), p. 10.
ISSTAISSTA-2013-LiHHG #android #energy
Calculating source line level energy information for Android applications (DL, SH, WGJH, RG), pp. 78–89.
ASEASE-2012-AmalfitanoFTCM #android #automation #testing #user interface #using
Using GUI ripping for automated testing of Android applications (DA, ARF, PT, SDC, AMM), pp. 258–261.
ASEASE-2012-BartelKTM #android #automation
Automatically securing permission-based software by reducing the attack surface: an application to Android (AB, JK, YLT, MM), pp. 274–277.
ASEASE-2012-FalconeC #android #aspect-oriented #embedded #in the cloud #programming
Weave droid: aspect-oriented programming on Android devices: fully embedded or in the cloud (YF, SC), pp. 350–353.
ICPCICPC-2012-RuizNAH #android #comprehension #reuse
Understanding reuse in the Android Market (IJMR, MN, BA, AEH), pp. 113–122.
ICSMEICSM-2012-AmalfitanoFTCI #android #testing #tool support #user interface
A toolset for GUI testing of Android applications (DA, ARF, PT, SDC, GI), pp. 650–653.
ICSMEICSM-2012-KhomhYZ #adaptation #android #empirical #linux #mobile
Adapting Linux for mobile platforms: An empirical study of Android (FK, HY, YZ), pp. 629–632.
MSRMSR-2012-AsaduzzamanBRS #android #case study #debugging
Bug introducing changes: A case study with Android (MA, MCB, CKR, KAS), pp. 116–119.
MSRMSR-2012-GuanaRHS #analysis #android #architecture #multi
Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
MSRMSR-2012-HuHHW #android #architecture #dependence
The build dependency perspective of Android’s concrete architecture (WH, DH, AH, KW), pp. 128–131.
MSRMSR-2012-MartiePSL #android #debugging #roadmap #topic
Trendy bugs: Topic trends in the Android bug reports (LM, VKP, HS, CVL), pp. 120–123.
MSRMSR-2012-ReinaR #android #locality #mining
Mining for localization in Android (LAR, GR), pp. 136–139.
MSRMSR-2012-ShihabKB #android #challenge #framework #mining
Mining challenge 2012: The Android platform (ES, YK, PB), pp. 112–115.
MSRMSR-2012-SinhaMG #android #mining #named
MINCE: Mining change history of Android project (VSS, SM, MG), pp. 132–135.
WCREWCRE-2012-HanZFHWS #analysis #android #comprehension #debugging #topic
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
WCREWCRE-2012-KimF #android #named #query
AQUA: Android QUery Analyzer (CJK, PF), pp. 395–404.
OOPSLAOOPSLA-2012-Zhang0LZMY #android #java #on-demand #refactoring
Refactoring android Java code for on-demand computation offloading (YZ, GH, XL, WZ, HM, SY), pp. 233–248.
SACSAC-2012-MannS #android #detection #framework #privacy #static analysis
A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
SACSAC-2012-SchrecklingPH #android #data access #named
Constroid: data-centric access control for android (DS, JP, DH), pp. 1478–1485.
FSEFSE-2012-OcteauJM #android #bytecode #java
Retargeting Android applications to Java bytecode (DO, SJ, PM), p. 6.
CSEETCSEET-2011-HeckmanHS #android #education #java #re-engineering
Teaching second-level Java and software engineering with Android (SSH, TBH, MS), pp. 540–542.
CSEETCSEET-2011-ReedJ #android #education
Contextual Android education (JR, DSJ), pp. 487–491.
SCAMSCAM-2011-SyerAZH #android #case study #development
Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms (MDS, BA, YZ, AEH), pp. 55–64.
WCREWCRE-2011-BergerBS #android #case study #security
An Android Security Case Study with Bauhaus (BJB, MB, KS), pp. 179–183.
HCIHCI-ITE-2011-GronliHG #adaptation #android
Integrated Context-Aware and Cloud-Based Adaptive Home Screens for Android Phones (TMG, JH, GG), pp. 427–435.
HCIHIMI-v1-2011-KlimaS #android
Vector Keyboard for Android Platform-Based Devices (MK, PS), pp. 435–442.
ICEISICEIS-v3-2011-CorralSS #android
Managing TETRA Channel Communications in Android (LC, AS, GS), pp. 307–312.
MODELSMoDELS-2011-Kraemer #android #process #uml
Engineering Android Applications Based on UML Activities (FAK), pp. 183–197.
MODELSMoDELS-2011-Kraemer #android #process #uml
Engineering Android Applications Based on UML Activities (FAK), pp. 183–197.
SACSAC-2011-HuN #android #debugging #framework #user interface
A GUI bug finding framework for Android applications (CH, IN), pp. 1490–1491.
CADECADE-2011-PayetS #android #source code #static analysis
Static Analysis of Android Programs (ÉP, FS), pp. 439–445.
ICSTICST-2011-TakalaKH #android #case study #experience #modelling #testing #user interface
Experiences of System-Level Model-Based GUI Testing of an Android Application (TT, MK, JH), pp. 377–386.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.