BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Belgium
1 × Brazil
1 × China
1 × Hungary
1 × Japan
1 × Norway
1 × Portugal
1 × South Korea
1 × Switzerland
2 × Austria
2 × Spain
2 × The Netherlands
3 × Germany
3 × Italy
3 × United Kingdom
4 × France
6 × Canada
7 × USA
Collaborated with:
B.Baudry M.Papadakis J.Klein J.Jézéquel T.Mouelhi F.Fleurey F.Fouquet C.Henard T.Hartmann T.Ziadi G.Perrouin G.Sunyé C.Nebut J.Martinez T.F.Bissyandé A.Moawad R.Delamare E.C.d.Almeida M.Harman G.Nain J.Mottu A.Bartel A.Pretschner V.L.Hanh F.Munoz J.Simonin B.Morin P.Valduriez E.Brottier O.Barais J.A.Meira M.Monperrus D.E.Kateb B.Nicolas D.Octeau M.E.Delamaro Y.Elrakaiby D.Deveaux T.T.Chekam Y.Jia S.Ghosh S.Pickin K.Akif D.Pollet S.Arzt S.Rasthofer E.Bodden P.McDaniel M.Ziane J.Hwang T.Xie E.Abgrall S.Gombault S.Sen J.E.Marynowski D.Touzet P.H.Nguyen K.Yskout T.Heyman R.Scandariato M.Ackerman R.Mazo P.Dhaussy P.Y.Pillain S.Creff A.Raji F.Alizon J.Deschrevel M.Jimenez R.Rwemalika F.Sarro S.Bardin M.Delahaye R.David N.Kosmatov J.Marion A.Benelallam L.Mouline J.Bourcier A.Koyuncu K.L.0001 D.K.0001 F.Chauvel M.Amrani L.Lúcio G.M.K.Selim B.Combemale J.Dingel H.Vangheluwe J.R.Cordy S.Jha M.Dering P.D.McDaniel L.L.0029 C.Fritz L.Li
Talks about:
test (30) model (24) softwar (10) analysi (10) product (9) approach (8) line (8) requir (7) secur (7) mutat (7)

♂ Person: Yves Le Traon

DBLP DBLP: Traon:Yves_Le

Facilitated 5 volumes:

MoDELS 2015PrCo
MoDELS 2014PrCo
MoDELS 2013PrCo

Contributed to:

ICSE 20152015
ICST 20152015
MoDELS 20152015
SAC 20152015
SPLC 20152015
ECMFA 20142014
ICST 20142014
PLDI 20142014
SAC 20142014
SEKE 20142014
VISSOFT 20142014
ICSE 20132013
SAC 20132013
SCAM 20132013
SPLC 20132013
ASE 20122012
ICSE 20122012
ICST 20122012
ICST 20112011
ASE 20102010
ICST 20102010
ICTSS 20102010
ICSM 20092009
ICST 20092009
MoDELS 20092009
REFSQ 20092009
ASE 20082008
EDOC 20082008
ICST 20082008
MoDELS 20082008
EDOC 20072007
ECMDA-FA 20062006
ICSE 20062006
MoDELS 20062006
SPL Book 20062006
ASE 20042004
ASE 20032003
ASE 20022002
ECOOP 20012001
UML 20012001
TOOLS Europe 20002000
TOOLS Europe 19991999
ASE 20152015
MoDELS 20172017
ESEC/FSE 20192019
POPL 20162016

Wrote 64 papers:

ICSE-v1-2015-HenardPHT #configuration management #constraints #multi #product line #scalability #theorem proving
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines (CH, MP, MH, YLT), pp. 517–528.
ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
ICSE-v1-2015-PapadakisJHT #compilation #detection #effectiveness #empirical #equivalence #performance #scalability
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
ICST-2015-BardinDDKPTM #detection #requirements
Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
MoDELS-2015-HartmannMFNKT #distributed #modelling #peer-to-peer #runtime
Stream my models: Reactive peer-to-peer distributed models@run.time (TH, AM, FF, GN, JK, YLT), pp. 80–89.
MoDELS-2015-Moawad0FNKT #modelling #performance
Beyond discrete modeling: A continuous and efficient model for IoT (AM, TH, FF, GN, JK, YLT), pp. 90–99.
MoDELS-2015-NguyenYHKST #design pattern #named #security
SoSPa: A system of Security design Patterns for systematically engineering secure systems (PHN, KY, TH, JK, RS, YLT), pp. 246–255.
SAC-2015-Moawad0FKT #adaptation #privacy #ubiquitous
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services (AM, TH, FF, JK, YLT), pp. 2271–2278.
SPLC-2015-MartinezZBKT #approach #bottom-up #product line
Bottom-up adoption of software product lines: a generic and extensible approach (JM, TZ, TFB, JK, YLT), pp. 101–110.
ECMFA-2014-MartinezZKT #identification #variability #visualisation
Identifying and Visualising Commonality and Variability in Model Variants (JM, TZ, JK, YLT), pp. 117–131.
ICST-2014-PapadakisHT #analysis #combinator #interactive #mutation testing #testing
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
PLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
SAC-2014-KatebFNMAT #framework #modelling #multi #optimisation #platform #runtime
Generic cloud platform multi-objective optimization leveraging models@run.time (DEK, FF, GN, JAM, MA, YLT), pp. 343–350.
SAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SAC-2014-ZiadiHPZT #approach #independence #product line #towards
Towards a language-independent approach for reverse-engineering of software product lines (TZ, CH, MP, MZ, YLT), pp. 1064–1071.
SEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime #using
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
VISSOFT-2014-MartinezZMBKT #constraints #graph #paradigm #product line #visualisation
Feature Relations Graphs: A Visualisation Paradigm for Feature Constraints in Software Product Lines (JM, TZ, RM, TFB, JK, YLT), pp. 50–59.
ICSE-2013-HenardPPKT #automation #feature model #modelling #testing #towards
Towards automated testing and fixing of re-engineered feature models (CH, MP, GP, JK, YLT), pp. 1245–1248.
SAC-2013-PapadakisT #classification #mutation testing #testing #using
Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
SCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
SPLC-2013-HenardPPKT #generative #multi #product line #testing
Multi-objective test generation for software product lines (CH, MP, GP, JK, YLT), pp. 62–71.
ASE-2012-BartelKTM #android #automation
Automatically securing permission-based software by reducing the attack surface: an application to Android (AB, JK, YLT, MM), pp. 274–277.
ASE-2012-HwangXKMT #evolution #policy #security #testing
Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
ICSE-2012-PerrouinMCFKTBJ #adaptation #evolution #flexibility #towards
Towards flexible evolution of Dynamically Adaptive Systems (GP, BM, FC, FF, JK, YLT, OB, JMJ), pp. 1353–1356.
ICST-2012-AmraniLSCDVTC #approach #model transformation #verification
A Tridimensional Approach for Studying the Formal Verification of Model Transformations (MA, LL, GMKS, BC, JD, HV, YLT, JRC), pp. 921–928.
ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICST-2012-MeiraATS #peer-to-peer #testing
Peer-to-Peer Load Testing (JAM, ECdA, YLT, GS), pp. 642–647.
ICST-2012-PapadakisT #fault #using
Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
ICST-2011-MouelhiTABG #testing #web
Tailored Shielding and Bypass Testing of Web Applications (TM, YLT, EA, BB, SG), pp. 210–219.
ASE-2010-MorinMFTBJ #adaptation #modelling
Security-driven model-based dynamic adaptation (BM, TM, FF, YLT, OB, JMJ), pp. 205–214.
ICST-2010-PerrouinSKBT #automation #generative #product line #scalability #testing
Automated and Scalable T-wise Test Case Generation Strategies for Software Product Lines (GP, SS, JK, BB, YLT), pp. 459–468.
ICTSS-2010-AlmeidaMSTV #architecture #distributed #performance #scalability
Efficient Distributed Test Architectures for Large-Scale Systems (ECdA, JEM, GS, YLT, PV), pp. 174–187.
ICTSS-2010-DelamareMBT #aspect-oriented #impact analysis #named #testing #weaving
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases (RD, FM, BB, YLT), pp. 250–265.
ICSM-2009-MunozBDT #aspect-oriented #empirical #programming
Inquiring the usage of aspect-oriented programming: An empirical study (FM, BB, RD, YLT), pp. 137–146.
ICST-2009-DelamareBGT #approach #aspect-oriented #aspectj #testing
A Test-Driven Approach to Developing Pointcut Descriptors in AspectJ (RD, BB, SG, YLT), pp. 376–385.
ICST-2009-MouelhiTB #functional #policy #security #testing
Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
MoDELS-2009-DhaussyPCRTB #validation
Evaluating Context Descriptions and Property Definition Patterns for Software Formal Validation (PD, PYP, SC, AR, YLT, BB), pp. 438–452.
REFSQ-2009-PerrouinBBT #consistency #detection #modelling #nondeterminism #perspective #requirements
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective (GP, EB, BB, YLT), pp. 89–103.
ASE-2008-AlmeidaSTV #testing
Testing Peers’ Volatility (ECdA, GS, YLT, PV), pp. 419–422.
EDOC-2008-SimoninADTJN #architecture #development #enterprise #named
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method (JS, FA, JPD, YLT, JMJ, BN), pp. 279–285.
ICST-2008-PretschnerMT #data access #modelling #policy #testing
Model-Based Tests for Access Control Policies (AP, TM, YLT), pp. 338–347.
ICST-2008-TraonMPB #assessment #data access #legacy #testing
Test-Driven Assessment of Access Control in Legacy Applications (YLT, TM, AP, BB), pp. 238–247.
MoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
EDOC-2007-BaudryNT #analysis #modelling #requirements
Model-Driven Engineering for Requirements Analysis (BB, CN, YLT), pp. 459–466.
EDOC-2007-BrottierBTTN #multi #specification
Producing a Global Requirement Model from Multiple Requirement Specifications (EB, BB, YLT, DT, BN), pp. 390–404.
EDOC-2007-SimoninTJ #architecture #development #enterprise
An Enterprise Architecture Alignment Measure for Telecom Service Development (JS, YLT, JMJ), pp. 476–483.
ECMDA-FA-2006-MottuBT #analysis #model transformation #mutation testing #testing
Mutation Analysis Testing for Model Transformations (JMM, BB, YLT), pp. 376–390.
ICSE-2006-BaudryFT #fault #locality #performance #testing
Improving test suites for efficient fault localization (BB, FF, YLT), pp. 82–91.
MoDELS-2006-MottuBT #approach #component #reuse
Reusable MDA Components: A Testing-for-Trust Approach (JMM, BB, YLT), pp. 589–603.
SPL-BOOK-2006-NebutTJ #product line #requirements #testing
System Testing of Product Lines: From Requirements to Test Cases (CN, YLT, JMJ), pp. 447–477.
ASE-2004-FleureyTB #approach #automation #testing
From Testing to Diagnosis: An Automated Approach (FF, YLT, BB), pp. 306–309.
ASE-2003-NebutPTJ #automation #generative #product line #testing
Automated Requirements-based Generation of Test Cases for Product Families (CN, SP, YLT, JMJ), pp. 263–266.
ASE-2002-BaudryFJT #adaptation #automation #component #dot-net #optimisation #testing #using
Automatic Test Cases Optimization Using a Bacteriological Adaptation Model: Application to .NET Component (BB, FF, JMJ, YLT), pp. 253–256.
ECOOP-2001-HanhATJ #comparison #integration #object-oriented #performance #testing
Selecting an Efficient OO Integration Testing Strategy: An Experimental Comparison of Actual Strategies (VLH, KA, YLT, JMJ), pp. 381–401.
UML-2001-SunyePTJ #modelling #refactoring #uml
Refactoring UML Models (GS, DP, YLT, JMJ), pp. 134–148.
TOOLS-EUROPE-2000-BaudryHT #component #named #search-based
Testing-for-Trust: The Genetic Selection Model Applied to Component Qualification (BB, VLH, YLT), pp. 108–119.
TOOLS-EUROPE-1999-TraonDJ #component #self #testing
Self-Testable Components: From Pragmatic Tests to Design-for-Testability Methodology (YLT, DD, JMJ), pp. 96–107.
ASE-2015-MartinezZBKT #automation #modelling #product line
Automating the Extraction of Model-Based Software Product Lines from Model Variants (T) (JM, TZ, TFB, JK, YLT), pp. 396–406.
MoDELS-2017-BenelallamHMFBB #modelling
Raising Time Awareness in Model-Driven Engineering: Vision Paper (AB, TH, LM, FF, JB, OB, YLT), pp. 181–188.
MoDELS-2017-HartmannMFT #domain model #evolution #integration #machine learning #modelling
The Next Evolution of MDE: A Seamless Integration of Machine Learning into Domain Modeling (TH, AM, FF, YLT), p. 180.
ESEC-FSE-2019-ChekamPT #generative #named
Mart: a mutant generation tool for LLVM (TTC, MP, YLT), pp. 1080–1084.
ESEC-FSE-2019-JimenezRPSTH #predict
The importance of accounting for real-world labelling when predicting software vulnerabilities (MJ, RR, MP, FS, YLT, MH), pp. 695–705.
ESEC-FSE-2019-KoyuncuLB0MKT #debugging #named #program repair
iFixR: bug report driven program repair (AK, KL0, TFB, DK0, MM, JK, YLT), pp. 314–325.
POPL-2016-OcteauJDMB0KT #android #component #modelling #probability #static analysis
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (DO, SJ, MD, PDM, AB, LL0, JK, YLT), pp. 469–484.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.