Travelled to:
1 × Belgium
1 × Brazil
1 × China
1 × Hungary
1 × Japan
1 × Norway
1 × Portugal
1 × South Korea
1 × Switzerland
2 × Austria
2 × Spain
2 × The Netherlands
3 × Germany
3 × Italy
3 × United Kingdom
4 × France
6 × Canada
7 × USA
Collaborated with:
B.Baudry M.Papadakis J.Klein J.Jézéquel T.Mouelhi F.Fleurey F.Fouquet C.Henard T.Hartmann T.Ziadi G.Perrouin G.Sunyé C.Nebut J.Martinez T.F.Bissyandé A.Moawad R.Delamare E.C.d.Almeida M.Harman G.Nain J.Mottu A.Bartel A.Pretschner V.L.Hanh F.Munoz J.Simonin B.Morin P.Valduriez E.Brottier O.Barais J.A.Meira M.Monperrus D.E.Kateb B.Nicolas D.Octeau M.E.Delamaro Y.Elrakaiby D.Deveaux T.T.Chekam Y.Jia S.Ghosh S.Pickin K.Akif D.Pollet S.Arzt S.Rasthofer E.Bodden P.McDaniel M.Ziane J.Hwang T.Xie E.Abgrall S.Gombault S.Sen J.E.Marynowski D.Touzet P.H.Nguyen K.Yskout T.Heyman R.Scandariato M.Ackerman R.Mazo P.Dhaussy P.Y.Pillain S.Creff A.Raji F.Alizon J.Deschrevel M.Jimenez R.Rwemalika F.Sarro S.Bardin M.Delahaye R.David N.Kosmatov J.Marion A.Benelallam L.Mouline J.Bourcier A.Koyuncu K.L.0001 D.K.0001 F.Chauvel M.Amrani L.Lúcio G.M.K.Selim B.Combemale J.Dingel H.Vangheluwe J.R.Cordy S.Jha M.Dering P.D.McDaniel L.L.0029 C.Fritz L.Li
Talks about:
test (30) model (24) softwar (10) analysi (10) product (9) approach (8) line (8) requir (7) secur (7) mutat (7)
♂ Person: Yves Le Traon
DBLP: Traon:Yves_Le
Facilitated 5 volumes:
Contributed to:
Wrote 64 papers:
- ICSE-v1-2015-HenardPHT #configuration management #constraints #multi #product line #scalability #theorem proving
- Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines (CH, MP, MH, YLT), pp. 517–528.
- ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
- ICSE-v1-2015-PapadakisJHT #compilation #detection #effectiveness #empirical #equivalence #performance #scalability
- Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
- ICST-2015-BardinDDKPTM #detection #requirements
- Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
- MoDELS-2015-HartmannMFNKT #distributed #modelling #peer-to-peer #runtime
- Stream my models: Reactive peer-to-peer distributed models@run.time (TH, AM, FF, GN, JK, YLT), pp. 80–89.
- MoDELS-2015-Moawad0FNKT #modelling #performance
- Beyond discrete modeling: A continuous and efficient model for IoT (AM, TH, FF, GN, JK, YLT), pp. 90–99.
- MoDELS-2015-NguyenYHKST #design pattern #named #security
- SoSPa: A system of Security design Patterns for systematically engineering secure systems (PHN, KY, TH, JK, RS, YLT), pp. 246–255.
- SAC-2015-Moawad0FKT #adaptation #privacy #ubiquitous
- Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
- SPLC-2015-MartinezZBKT #approach #bottom-up #product line
- Bottom-up adoption of software product lines: a generic and extensible approach (JM, TZ, TFB, JK, YLT), pp. 101–110.
- ECMFA-2014-MartinezZKT #identification #variability #visualisation
- Identifying and Visualising Commonality and Variability in Model Variants (JM, TZ, JK, YLT), pp. 117–131.
- ICST-2014-PapadakisHT #analysis #combinator #interactive #mutation testing #testing
- Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
- PLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
- FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
- SAC-2014-KatebFNMAT #framework #modelling #multi #optimisation #platform #runtime
- Generic cloud platform multi-objective optimization leveraging models@run.time (DEK, FF, GN, JAM, MA, YLT), pp. 343–350.
- SAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
- Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
- SAC-2014-ZiadiHPZT #approach #independence #product line #towards
- Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
- SEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime #using
- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
- VISSOFT-2014-MartinezZMBKT #constraints #graph #paradigm #product line #visualisation
- Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines (JM, TZ, RM, TFB, JK, YLT), pp. 50–59.
- ICSE-2013-HenardPPKT #automation #feature model #modelling #testing #towards
- Towards automated testing and fixing of re-engineered feature models (CH, MP, GP, JK, YLT), pp. 1245–1248.
- SAC-2013-PapadakisT #classification #mutation testing #testing #using
- Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
- SCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using
- Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
- SPLC-2013-HenardPPKT #generative #multi #product line #testing
- Multi-objective test generation for software product lines (CH, MP, GP, JK, YLT), pp. 62–71.
- ASE-2012-BartelKTM #android #automation
- Automatically securing permission-based software by reducing the attack surface: an application to Android (AB, JK, YLT, MM), pp. 274–277.
- ASE-2012-HwangXKMT #evolution #policy #security #testing
- Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
- ICSE-2012-PerrouinMCFKTBJ #adaptation #evolution #flexibility #towards
- Towards flexible evolution of Dynamically Adaptive Systems (GP, BM, FC, FF, JK, YLT, OB, JMJ), pp. 1353–1356.
- ICST-2012-AmraniLSCDVTC #approach #model transformation #verification
- A Tridimensional Approach for Studying the Formal Verification of Model Transformations (MA, LL, GMKS, BC, JD, HV, YLT, JRC), pp. 921–928.
- ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
- ICST-2012-MeiraATS #peer-to-peer #testing
- Peer-to-Peer Load Testing (JAM, ECdA, YLT, GS), pp. 642–647.
- ICST-2012-PapadakisT #fault #using
- Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
- ICST-2011-MouelhiTABG #testing #web
- Tailored Shielding and Bypass Testing of Web Applications (TM, YLT, EA, BB, SG), pp. 210–219.
- ASE-2010-MorinMFTBJ #adaptation #modelling
- Security-driven model-based dynamic adaptation (BM, TM, FF, YLT, OB, JMJ), pp. 205–214.
- ICST-2010-PerrouinSKBT #automation #generative #product line #scalability #testing
- Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines (GP, SS, JK, BB, YLT), pp. 459–468.
- ICTSS-2010-AlmeidaMSTV #architecture #distributed #performance #scalability
- Efficient Distributed Test Architectures for Large-Scale Systems (ECdA, JEM, GS, YLT, PV), pp. 174–187.
- ICTSS-2010-DelamareMBT #aspect-oriented #impact analysis #named #testing #weaving
- Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases (RD, FM, BB, YLT), pp. 250–265.
- ICSM-2009-MunozBDT #aspect-oriented #empirical #programming
- Inquiring the usage of aspect-oriented programming: An empirical study (FM, BB, RD, YLT), pp. 137–146.
- ICST-2009-DelamareBGT #approach #aspect-oriented #aspectj #testing
- A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ (RD, BB, SG, YLT), pp. 376–385.
- ICST-2009-MouelhiTB #functional #policy #security #testing
- Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
- MoDELS-2009-DhaussyPCRTB #validation
- Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation (PD, PYP, SC, AR, YLT, BB), pp. 438–452.
- REFSQ-2009-PerrouinBBT #consistency #detection #modelling #nondeterminism #perspective #requirements
- Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective (GP, EB, BB, YLT), pp. 89–103.
- ASE-2008-AlmeidaSTV #testing
- Testing Peers’ Volatility (ECdA, GS, YLT, PV), pp. 419–422.
- EDOC-2008-SimoninADTJN #architecture #development #enterprise #named
- EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method (JS, FA, JPD, YLT, JMJ, BN), pp. 279–285.
- ICST-2008-PretschnerMT #data access #modelling #policy #testing
- Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
- ICST-2008-TraonMPB #assessment #data access #legacy #testing
- Test-Driven Assessment of Access Control in Legacy Applications (YLT, TM, AP, BB), pp. 238–247.
- MoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
- EDOC-2007-BaudryNT #analysis #modelling #requirements
- Model-Driven Engineering for Requirements Analysis (BB, CN, YLT), pp. 459–466.
- EDOC-2007-BrottierBTTN #multi #specification
- Producing a Global Requirement Model from Multiple Requirement Specifications (EB, BB, YLT, DT, BN), pp. 390–404.
- EDOC-2007-SimoninTJ #architecture #development #enterprise
- An Enterprise Architecture Alignment Measure for Telecom Service Development (JS, YLT, JMJ), pp. 476–483.
- ECMDA-FA-2006-MottuBT #analysis #model transformation #mutation testing #testing
- Mutation Analysis Testing for Model Transformations (JMM, BB, YLT), pp. 376–390.
- ICSE-2006-BaudryFT #fault #locality #performance #testing
- Improving test suites for efficient fault localization (BB, FF, YLT), pp. 82–91.
- MoDELS-2006-MottuBT #approach #component #reuse
- Reusable MDA Components: A Testing-for-Trust Approach (JMM, BB, YLT), pp. 589–603.
- SPL-BOOK-2006-NebutTJ #product line #requirements #testing
- System Testing of Product Lines: From Requirements to Test Cases (CN, YLT, JMJ), pp. 447–477.
- ASE-2004-FleureyTB #approach #automation #testing
- From Testing to Diagnosis: An Automated Approach (FF, YLT, BB), pp. 306–309.
- ASE-2003-NebutPTJ #automation #generative #product line #testing
- Automated Requirements-based Generation of Test Cases for Product Families (CN, SP, YLT, JMJ), pp. 263–266.
- ASE-2002-BaudryFJT #adaptation #automation #component #dot-net #optimisation #testing #using
- Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component (BB, FF, JMJ, YLT), pp. 253–256.
- ECOOP-2001-HanhATJ #comparison #integration #object-oriented #performance #testing
- Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies (VLH, KA, YLT, JMJ), pp. 381–401.
- UML-2001-SunyePTJ #modelling #refactoring #uml
- Refactoring UML Models (GS, DP, YLT, JMJ), pp. 134–148.
- TOOLS-EUROPE-2000-BaudryHT #component #named #search-based
- Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification (BB, VLH, YLT), pp. 108–119.
- TOOLS-EUROPE-1999-TraonDJ #component #self #testing
- Self-Testable Components: From Pragmatic Tests to Design-for-Testability Methodology (YLT, DD, JMJ), pp. 96–107.
- ASE-2015-MartinezZBKT #automation #modelling #product line
- Automating the Extraction of Model-Based Software Product Lines from Model Variants (T) (JM, TZ, TFB, JK, YLT), pp. 396–406.
- MoDELS-2017-BenelallamHMFBB #modelling
- Raising Time Awareness in Model-Driven Engineering: Vision Paper (AB, TH, LM, FF, JB, OB, YLT), pp. 181–188.
- MoDELS-2017-HartmannMFT #domain model #evolution #integration #machine learning #modelling
- The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling (TH, AM, FF, YLT), p. 180.
- ESEC-FSE-2019-ChekamPT #generative #named
- Mart: a mutant generation tool for LLVM (TTC, MP, YLT), pp. 1080–1084.
- ESEC-FSE-2019-JimenezRPSTH #predict
- The importance of accounting for real-world labelling when predicting software vulnerabilities (MJ, RR, MP, FS, YLT, MH), pp. 695–705.
- ESEC-FSE-2019-KoyuncuLB0MKT #debugging #named #program repair
- iFixR: bug report driven program repair (AK, KL0, TFB, DK0, MM, JK, YLT), pp. 314–325.
- POPL-2016-OcteauJDMB0KT #android #component #modelling #probability #static analysis
- Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (DO, SJ, MD, PDM, AB, LL0, JK, YLT), pp. 469–484.