Welcome to ICECCS'17!

The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017), The Kyushu University, November 5-8, 2017, Fukuoka, Japan. Complex computer systems are common in many sectors, such as manufacturing, communications, defense, transportation, aerospace, hazardous environments, energy, and health care. These systems are frequently distributed over heterogeneous networks, and are driven by many diverse requirements on performance, real-time behavior, fault tolerance, security, adaptability, development time and cost, long life concerns, and other areas. Such requirements frequently conflict, and their satisfaction therefore requires managing the trade-off among them during system development and throughout the entire system life. The goal of this conference is to bring together industrial, academic, and government experts, from a variety of user domains and software disciplines, to determine how the disciplines' problems and solution techniques interact within the whole system. Researchers, practitioners, tool developers and users, and technology transition experts are all welcome. The scope of interest includes long-term research issues, near-term complex system requirements and promising tools, existing complex systems, and commercially available tools.

Sunday, October 2nd, 2016
  • 9:00 - 9:15
    Conference Opening
  • 9:15 - 10:30
    Keynote by
  • 10:30 - 11:00
    Coffee Break
  • 11:00 - 12:30
    Session 1:

    Session Chair: David Lo

    Matthieu Jimenez, Mike Papadakis and Yves Le Traon. Vulnerability Prediction Models: A case study on the Linux Kernel
    Alessio Viticchie, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella and Roberto Tiella. Assessment of Source Code Obfuscation Techniques
    Marco di Biase, Magiel Bruntink and Alberto Bacchelli. A security perspective on code review: The case of Chromium
  • 12:30 - 13:00
    Lunch
  • 13:30 - 15:00
    Session 2: Supporting Software Developers

    Session Chair: Leon Moonen

    Xueliang Li and John P. Gallagher. A Source-level Energy Optimization Framework for Mobile Applications
    Maurício Aniche, Christoph Treude, Andy Zaidman, Arie van Deursen and Marco Gerosa. SATT: Tailoring Code Metric Thresholds for Different Software Architectures
    Andrea D'Souza, Di Yang and Cristina Lopes. Collective Intelligence for Smarter API Recommendations in Python
  • 15:00 - 15:30
    Coffee Break
  • 15:30 - 17:30
    Session 3: Engineering Track Papers
    Jiang Ming, Dinghao Wu. BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling
    Allan Blanchard, Nikolai Kosmatov, Matthieu Lemerre, Frederic Loulergue. CONC2SEQ : A FRAMA-C Plugin for Verification of Parallel Compositions of C Programs
    Tushar Sharma, Girish Suryanarayana. Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact Analysis
    Benjamin Holland, Ganesh Ram Santhanam, Payas Awadhutkar, Suraj Kothari. Statically-informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities
    Quentin Stiévenart, Maarten Vandercammen, Wolfgang De Meuter, Coen De Roover. SCALA-AM: A Modular Static Analysis Framework
    Jochen Quante. A Generic Program Interpreter for Arbitrary Abstractions
Monday, October 3rd, 2016
  • 9:00 - 10:30
    Session 4: Code Similarity and Fault Localization

    Session Chair: Árpád Beszédes

     
    Vincenzo Musco, Martin Monperrus and Philippe Preux.Mutation-Based Graph Inference for Fault Localization
    Adriano de Paula, Eduardo Guerra, Hitesh Sajnani, Cristina Lopes and Otavio Lemos. An Exploratory Study of Interface Redundancy in Code Repositories
    Chaiyong Ragkhitwetsagul, Jens Krinke and David Clark. Similarity of Source Code in the Presence of Pervasive Modifications
  • 10:30 - 11:00
    Coffee Break
  • 11:00 - 12:30
    Session 5: Software Testing

    Session Chair: Mariano Ceccato

    Min Gao, Lei He, Rupak Majumdar and Zilong Wang. llsplat: Improving Concolic Testing by Bounded Model Checking
    Gergő Balogh, Tamás Gergely, Árpád Beszédes and Tibor Gyimóthy. Are My Unit Tests in the Right Package?
    Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis and Nicos Malevris. Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study
  • 12:30 - 13:00
    Lunch
  • 13:30 - 15:00
    Session 6: Code Transformation and Static

    Session Chair: Andrea Mocci

    Tukaram Muske and Alexander Serebrenik. Survey of Approaches for Handling Static Analysis Alarms
    Nelson Lossing, Pierre Guillou and Francois Irigoin. Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers
    Gábor Antal, Dávid Havas, István Siket, Árpád Beszédes, Rudolf Ferenc and József Mihalicza. Transforming C++11 Code to C++03 to Support Legacy Compilation Environments
  • 15:00 - 15:30
    Coffee Break
  • 15:30 - 17:00
    Session 7: Empirical Studies

    Session Chair: Alexander Serebrenik

    Dave Binkley and Dawn Lawrie. A Case for Software Specific Natural Language Techniques
    Stefan Fischer, Lukas Linsbauer, Roberto Erick Lopez-Herrejon and Alexander Egyed. A Source Level Empirical Study of Features and Their Interactions in Variable Software
    Leon Moonen, Stefano Di Alesio, Thomas Rolfsnes and Dave Binkley. Exploring the Effects of History Length and Age on Mining Software Change Impact
  • 17:00 - 17:15
    Conference Closing
  • 17:15 - 18:00
    Open Steering Committee Meeting

Banquet

The banquet will be held Sunday night at 7pm @ the Boxcar Arcade, less than a 10 minute walk from the convention center. The Boxcar features over 70 original games (e.g., Tetris, Mortal Kombat, NBA Jam, etc.), pinball, air hockey, and shuffle board that attendees can play while socializing. The evening will feature an informal spread from The Pit, featuring BBQ AND excellent vegetarian options, and of course a selection from Boxcar’s rotating 24 craft drafts.

Post-Conference Bike Ride

On the Tuesday following the conference (Oct. 4th) there will be a group bike ride from the conference venue to the Trophy Brewery, an approximately 3.2 mile (5.15 km) trip in one direction. More info and signup on the ICSME social events page.

Overview

Over the past several years, we have seen a rapid rising emphasis on design, implement and manage complex computer systems which are present in every aspect of human activities, such as manufacturing, communications, defense, transportation, aerospace, hazardous environments, energy, and health care. The complex computer systems are frequently distributed over heterogeneous networks and processing large amount data. Complexity arises from many factors, including the dynamic environments and scenarios these systems operate in; demanding and sometimes conflicting requirements in functionality, efficiency, scalability, security, dependability and adaptability; as well as the large variation in development methodology, programming languages and implementation details. The key issues in these systems include performance, real-time behavior, fault tolerance, security, adaptability, development time and cost, and long life concerns.

The goal of this conference is to bring together industrial, academic, and government experts, from a variety of application domains and software disciplines, to discuss how the disciplines' problems and solution techniques interact within the whole system. Researchers, practitioners, tool developers and users, and technology transfer experts are all welcome. The scope of interest includes long-term research issues; near-term requirements and challenges; established complex systems; emerging promising tools; and retrospective and prospective reflections of research and development into complex systems.

Scope and Topics

Authors are invited to submit papers describing original, unpublished research results, case studies and toolsed research results, case studies and tools. Papers are solicited in all areas related to complex computer-based systems, including the causes of complexity and means of avoiding, controlling, or coping with complexity. Topic areas include, but are not limited to:

  • Requirement specification and analysis
  • Verification and validation
  • Security and privacy of complex systems
  • Model-driven development
  • Reverse engineering and refactoring
  • Achitecture software
  • Big Data Management
  • Ambient intelligence, pervasive computing
  • Ubiquitous computing, context awareness, sensor networks
  • Design by contract
  • Agile methods
  • Safety-critical & fault-tolerant architectures
  • Adaptive, self-managing and multi-agent systems
  • Real-time, hybrid and embedded systems
  • Systems of systems
  • Cyber-physical systems and Internet of Things (IoT)
  • Tools and tool integration
  • Industrial case studies
  • ...

Different kinds of contributions are sought, including novel research, lessons learned, experience reports, and discussions of practical problems faced by industry and user domains. The ultimate goal is to build a rich and comprehensive conference program that can fit the interests and needs of different classes of attendees: professionals, researchers, managers, and students. A program goal is to organize several sessions that include both academic and industrial papers on a given topic and culminate panels to discuss relationships between industrial and academic research.

Full Papers

Full papers are divided into two categories: Technical Papers and Experience Reports. The papers submitted to both categories will be reviewed by program committee members, and papers accepted in either category will be published in the conference proceedings. Technical papers should describe original research, and experience reports should present practical projects carried out in industry, and reflect on the lessons learnt from them.

Short Papers

Short paper submissions describe early-stage, ongoing or PhD research. All short papers will be reviewed by program committee members, and accepted short papers will be published in the conference proceedings.

Paper Submissions

Submitted manuscripts should be in English and formatted in the style of the double-column IEEE format. Full papers should not exceed 10 pages, and short papers should not exceed 4 pages, including figures, references, and appendices. All submissions should be in PDF format. Submissions not adhering to the specified format and length may be rejected immediately, without review.

Please prepare your manuscripts in accordance to the IEEE guidelines: http://www.ieee.org/conferences_events/conferences/publishing/templates.html.

We invite all prospective authors to submit their manuscripts via the ICECCS'17 portal, hosted on EasyChair https://easychair.org/conferences/?conf=iceccs2017

Conference Proceedings

The conference proceedings will be published by IEEE Conference Publishing Services (EI indexed).

Important Dates

  • Abstract submission: 5th June 2017
  • Paper submission: 19th June 2017
  • Notification of acceptance: 14th August 2017
  • Camera ready copy due: 4th September 2017

ATTENTION

Submission dates for workshop papers may differ, so please check separate Calls for Papers on the workshop websites. For enquiries, please contact iceccs2017@easychair.org

Overview

The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017) is calling for proposals for workshops to be held in conjunction with the main conference. ICECCS workshops provide a forum for scientific and industrial communities to discuss topics in Engineering of Complex Computer Systems. If you would like to bring together researchers on a specific topic related to ICECCS, you should consider submitting a workshop proposal.
Workshop papers will be published in a companion proceeding of ICECCS by IEEE Conference Publishing Services (EI indexed). The tentative length of workshop papers is up to 4 pages.

Important Dates

  • Deadline for workshop proposals submission: May 26, 2017
  • Deadline for notification: May 29, 2017
  • Workshop date: November 5-8, 2017 (one or two days)
  • We suggest the following deadlines for workshop papers submission:
  • Workshop papers submission: September 1, 2017
  • Workshop papers notification: September 20, 2017
  • Workshop papers camera-ready: September 25, 2017

Workshop Chairs

  • Walter Binder, University of Lugano (USI), Switzerland
  • Jifeng Xuan, Wuhan University, China

Workshlp Proposal Guidelines

Workshop organizers should send an email to the workshop chairs for their proposal. Each proposal should contain the following information:
  • Contact details of each organizer
  • A brief biography of each organizer
  • The motivation, goals, and topics of the workshop
  • The expected dates for submission and notification for papers, names of proposed or confirmed program committee members
  • The number of expected participants

How To Submit

Workshop proposals should be sent to the workshop chairs via emails:

Call for Engineering Track Papers

In addition to the research track (see separate CFP), the 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2016) will also feature an Engineering Track. This track welcomes six-page papers that report on the design and implementation of tools for source code analysis and manipulation, as well as libraries, infrastructure, and the real world studies enabled by these advances. To be clear, this is not the addition of a new track to SCAM, which will remain a two track conference, but a significant expansion to the scope of the tools track of previous SCAMs.

What artefacts qualify as “engineering track” material?

  • tools: software (or hardware!) programs that facilitate SCAMmy activities.
  • libraries: reusable API-enabled frameworks for the above.
  • infrastructure: while libraries are purely software, infrastructure can include projects that provide/facilitate access to data and analysis.
  • data: reusable datasets for other researchers to replicated and innovate with.
  • real world studies enabled by these advances. Here the focus is on how the {tool,infrastructure, etc} enabled the study, and not so much the study itself. Novelty of the research question is less important than the engineering challenges faced in the study.

A successful SCAM engineering track paper should:

  1. Fall under the topics mentioned for the SCAM 2016 research track.
  2. Discuss engineering work artefacts that has NOT been published before. However, previous work involving the tool, but for which the tool was not the main contribution, are acceptable.
  3. Motivate the use cases (and hence the existence) of the engineering work.
  4. Relate the engineering project to earlier work.
  5. Describe the experiences gained in developing this contribution.

Optionally (and encouraged):

  1. Any empirical results or user feedback is welcome.
  2. Contain the URL of a website where the tool/library/data etcetera can be downloaded, together with example data and installation guidelines, preferably but not necessarily open source.
  3. Contain the URL to a video demonstrating the usage of the contribution.

Note that the submission length has a limit of six pages, compared to the two to four pages of traditional tool demo papers. This gives authors enough space to discuss artefact motivation, design, and use cases in much more detail. For example, a use case would be well illustrated by a demo scenario with screenshots. The papers should be submitted electronically via the conference web site.

Each submission will be reviewed by at least three members of the engineering track program committee. Authors of accepted papers will be required to present their artefacts at the conference. All accepted engineering track papers will be published in the conference proceedings. The key criterion for acceptance is that the paper should (a) follow the above mentioned guidelines and (b) make an original contribution that can benefit practitioners in the field now and/or others designing and building artefacts for source code analysis and manipulation. The artefacts can be in an early research prototype or a polished product ready for deployment. Papers about commercial products are allowed, as long as the guidelines described above are followed.

Videos and other demo material may be taken into account by reviewers as they review the paper. However, such material will not become part of the permanent record of the conference, so the paper should be self contained. In order to preserve the anonymity of the reviewers, such material should be hosted on an anonymous public source (e.g., youtube), or made available in such a way that the tools chair can download them once and redistribute them to reviewers.

Proceedings

All accepted papers will appear in the proceedings which will be published by the IEEE Computer Society Press.

Important Dates

  • Abstract Deadline: 20 June 2016
  • Paper Deadline: 24 June 2016
  • Notification: 29 July 2016
  • Camera Ready Deadline: 12 August 2016

Submission

Six pages IEEE format and can be submitted via EasyChair. Please use the IEEE templates in preparing your manuscripts:

General Co-Chairs

Program Co-Chairs

Workshop Co-Chairs

Publicity Co-Chairs

Publication Chair

  • Yun Lin, National University of Singapore, Singapore

Local Co-Chairs

  • Yaokai Feng, Kyushu University, Japan
  • Haibo Yu, Shanghai Jiao Tong University, China

Program Chair

  • Zhenjiang Hu, National Institute of Informatics, Japan
  • Guangdong Bai, Singapore Institute of Technology, Singapore

Program Committee Member

  • Etienne Andre, Universite Paris 13, France
  • Cyrille Artho, KTH Royal Institute of Technology, Sweden
  • Luciano Baresi DEI, Politecnico di Milano, Italy
  • Amel Bennaceur, Open University, UK
  • Radu Calinescu, University of York, UK
  • Naipeng Dong, National University of Singapore, Singapore
  • Carlo Alberto, Furia Chalmers University of Technology, Sweden
  • Sebastien, Gerard, CEA LIST, France
  • Esther, Guerra, Universidad Autonoma de Madrid, Spain
  • Fei He, Tsinghua University, China
  • Daniel Kroening, Oxford University, UK
  • Kung-Kiu, Lau The University of Manchester, UK
  • Yang Liu, Nanyang Technological University, Singapore
  • David Lo, Singapore Management University, Singapore
  • Gerald Luettgen, University of Bamberg, Germany
  • Lei Ma, Harbin Institute of Technology, China
  • Xiaoxin Ma, Nanjing University, China
  • Tiziana Margaria, University of Potsdam, Germany
  • Dominique Mery, Universite de Lorraine, LORIA, France
  • Paolo Nesi, University of Florence, Italy
  • Jun Pang, University of Luxembourg, Luxembourg
  • Robert Pettit, United States, United States
  • Christian Prehofer, Munich, Germany
  • Bernhard Rumpe, RWTH Aachen University, Germany
  • Cristina Seceleanu, Malardalen University, Sweden
  • Volker Stolz, University of Oslo, Norway
  • Jing Sun, The University of Auckland, New Zealand
  • Jun Sun, Singapore University of Technology and Design, Singapore
  • Kenji Tei, National Institute of Informaics, Japan
  • Cong Tian, Xidian Univerity, China
  • Naoyasu Ubayashi, Kyushu University, Japan
  • Andre Van Hoorn, University of Stuttgart, Germany
  • Tullio Vardanega, University of Padua, Italy
  • Hai Wang, University of Aston, UK
  • Hironori Washizaki, Waseda University, Japan
  • Jing Xu, Nankai University, China
  • Naijun Zhan, Lab of Computer Science, Institute of Software, Chinese Academy of Sciences, China
  • Cheng Zhang, Google Canada, Canada
  • Huibiao Zhu, East China Normal University, China

ICECCS Steering Committee

  • Jin Song Dong, National University of Singapore, Singapore
  • Mike Hinchey, University of Limerick, Ireland
  • Mark Lawford, McMaster University, Canada
  • Xiaohong Li, Tianjin University, China
  • Shaoying Liu, Hosei University, Japan
  • Andrew Martin, University of Oxford
  • Roy Sterritt, University of Ulster, USA
  • Jing Sun, University of Auckland, New Zealand

Conference Venue

ICECCS 2017 will take place at the Nishijin Plaza of Kyushu University, Fukuoka, Japan.

Address

2-16-23 Nishijin, Sawara-ku, Fukuoka-shi, Fukuoka-ken
814-0002 Japan

Google Maps

1F
Information zone

More information on the Industrial-Academic Exchange Building

2F
Meeting zone