Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Software and Platforms
New Results
Bilateral Contracts and Grants with Industry
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
S. Abiteboul, P. Bourhis, V. Vianu.
Explanations and Transparency in Collaborative Workflows, in: PODS 2018 - 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles Of Database Systems, Houston, Texas, United States, June 2018.
https://hal.inria.fr/hal-01744978
[2]
Y. Al-Dhuraibi, F. Paraiso, N. Djarallah, P. Merle.
Elasticity in Cloud Computing: State of the Art and Research Challenges, in: IEEE Transactions on Services Computing (TSC), March 2018, vol. 11, no 2, pp. 430-447. [ DOI : 10.1109/TSC.2017.2711009 ]
https://hal.inria.fr/hal-01529654
[3]
S. Bliudze, S. Furic, J. Sifakis, A. Viel.
Rigorous Design of Cyber-Physical Systems, in: Software and Systems Modeling, 2019, vol. 18, no 3, pp. 1613–1636. [ DOI : 10.1007/s10270-017-0642-5 ]
https://hal.inria.fr/hal-01636392
[4]
S. Habchi, X. Blanc, R. Rouvoy.
On Adopting Linters to Deal with Performance Concerns in Android Apps, in: ASE18 - Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering, Montpellier, France, ACM Press, September 2018, vol. 11. [ DOI : 10.1145/3238147.3238197 ]
https://hal.inria.fr/hal-01829135
[5]
L. Meftah, R. Rouvoy, I. Chrisment.
FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps, in: 19th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Kongens Lyngby, Denmark, J. Pereira, L. Ricci (editors), Distributed Applications and Interoperable Systems, Springer International Publishing, 2019, vol. LNCS-11534, pp. 116-132. [ DOI : 10.1007/978-3-030-22496-7_8 ]
https://hal.inria.fr/hal-02121311
[6]
M. Naseri, N. P. Borges Jr., A. Zeller, R. Rouvoy.
AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service, in: PETS 2019 - The 19th Privacy Enhancing Technologies Symposium, Stockholm, Sweden, July 2019.
https://hal.inria.fr/hal-01929049
[7]
E. Stachtiari, A. Mavridou, P. Katsaros, S. Bliudze, J. Sifakis.
Early validation of system requirements and design through correctness-by-construction, in: Journal of Systems and Software, 2018, vol. 145, pp. 52-78. [ DOI : 10.1016/j.jss.2018.07.053 ]
https://hal.archives-ouvertes.fr/hal-01873999
[8]
S. Urli, Z. Yu, L. Seinturier, M. Monperrus.
How to Design a Program Repair Bot? Insights from the Repairnator Project, in: 40th International Conference on Software Engineering, Track Software Engineering in Practice, Gothenburg, Sweden, May 2018, pp. 95-104, update for oadoi on Nov 02 2018. [ DOI : 10.1145/3183519.3183540 ]
https://hal.inria.fr/hal-01691496
[9]
A. Vastel, P. Laperdrix, W. Rudametkin, R. Rouvoy.
FP-STALKER: Tracking Browser Fingerprint Evolutions, in: IEEE S&P 2018 - 39th IEEE Symposium on Security and Privacy, San Francisco, United States, B. Parno, C. Kruegel (editors), Proceedings of the 39th IEEE Symposium on Security and Privacy (S&P), IEEE, May 2018, pp. 728-741. [ DOI : 10.1109/SP.2018.00008 ]
https://hal.inria.fr/hal-01652021
[10]
Z. Yu, C. Bai, L. Seinturier, M. Monperrus.
Characterizing the Usage, Evolution and Impact of Java Annotations in Practice, in: IEEE Transactions on Software Engineering, 2019. [ DOI : 10.1109/TSE.2019.2910516 ]
https://hal.inria.fr/hal-02091516
Publications of the year

Doctoral Dissertations and Habilitation Theses

[11]
B. Danglot.
Automatic Unit Test Amplification For DevOps, Université de Lille, November 2019.
https://tel.archives-ouvertes.fr/tel-02396530
[12]
S. Habchi.
Understanding Mobile-Specific Code Smells, Université de Lille, December 2019.
https://tel.archives-ouvertes.fr/tel-02414928
[13]
L. Meftah.
Towards Privacy-sensitive Mobile Crowdsourcing, University of Lille, December 2019.
https://tel.archives-ouvertes.fr/tel-02399716
[14]
A. Vastel.
Tracking Versus Security: Investigating the Two Facets of Browser Fingerprinting, Université de Lille Nord de France, October 2019.
https://tel.archives-ouvertes.fr/tel-02343930

Articles in International Peer-Reviewed Journals

[15]
Y. Al-Dhuraibi, F. Zalila, N. Djarallah, P. Merle.
Model-Driven Elasticity Management with OCCI, in: IEEE transactions on cloud computing, 2019, vol. 99, 1 p, forthcoming. [ DOI : 10.1109/TCC.2019.2923686 ]
https://hal.inria.fr/hal-02375362
[16]
A. Amarilli, P. Bourhis, M. Monet, P. Senellart.
Evaluating Datalog via Tree Automata and Cycluits, in: Theory of Computing Systems, 2019, vol. 63, no 7, pp. 1620-1678, https://arxiv.org/abs/1808.04663. [ DOI : 10.1007/s00224-018-9901-2 ]
https://hal.inria.fr/hal-01891811
[17]
E. Baranov, S. Bliudze.
Expressiveness of component-based frameworks: A study of the expressiveness of BIP, in: Acta Informatica, 2019, forthcoming. [ DOI : 10.1007/s00236-019-00337-7 ]
https://hal.archives-ouvertes.fr/hal-02149934
[18]
M. Benedikt, P. Bourhis, G. Gottlob, P. Senellart.
Monadic Datalog, Tree Validity, and Limited Access Containment, in: ACM Transactions on Computational Logic, October 2019, vol. 21, no 1, pp. 6:1-6:45. [ DOI : 10.1145/3344514 ]
https://hal.inria.fr/hal-02307999
[19]
S. Bliudze, S. Furic, J. Sifakis, A. Viel.
Rigorous Design of Cyber-Physical Systems : Linking Physicality and Computation, in: Software and Systems Modeling, 2019, vol. 18, no 3, pp. 1613–1636, forthcoming. [ DOI : 10.1007/s10270-017-0642-5 ]
https://hal.inria.fr/hal-01636392
[20]
H. Brabra, A. Mtibaa, F. Petrillo, P. Merle, L. Sliman, N. Moha, W. Gaaloul, Y.-G. Gueheneuc, B. Benatallah, F. Gargouri.
On semantic detection of cloud API (anti)patterns, in: Information and Software Technology, March 2019, vol. 107, pp. 65 - 82. [ DOI : 10.1016/j.infsof.2018.10.012 ]
https://hal.inria.fr/hal-02375380
[21]
B. Danglot, O. L. Vera-Pérez, B. Baudry, M. Monperrus.
Automatic Test Improvement with DSpot: a Study with Ten Mature Open-Source Projects, in: Empirical Software Engineering, 2019, pp. 1-35. [ DOI : 10.1007/s10664-019-09692-y ]
https://hal.inria.fr/hal-01923575
[22]
B. Danglot, O. L. Vera-Pérez, Z. Yu, A. Zaidman, M. Monperrus, B. Baudry.
A Snowballing Literature Study on Test Amplification, in: Journal of Systems and Software, August 2019, vol. 157, pp. 1-16. [ DOI : 10.1016/j.jss.2019.110398 ]
https://hal.inria.fr/hal-02290742
[23]
T. Hartmann, F. Fouquet, A. Moawad, R. Rouvoy, Y. Le Traon.
GreyCat: Efficient What-If Analytics for Data in Motion at Scale, in: Information Systems, 2019, vol. 83, pp. 101-117, forthcoming. [ DOI : 10.1016/j.is.2019.03.004 ]
https://hal.inria.fr/hal-02059882
[24]
M. Monperrus, S. Urli, T. Durieux, M. Martinez, B. Baudry, L. Seinturier.
Repairnator patches programs automatically, in: Ubiquity, July 2019, vol. July, no 2, pp. 1-12, https://arxiv.org/abs/1910.06247. [ DOI : 10.1145/3349589 ]
https://hal.inria.fr/hal-02267512
[25]
Z. Yu, C. Bai, L. Seinturier, M. Monperrus.
Characterizing the Usage, Evolution and Impact of Java Annotations in Practice, in: IEEE Transactions on Software Engineering, 2019, forthcoming. [ DOI : 10.1109/TSE.2019.2910516 ]
https://hal.inria.fr/hal-02091516
[26]
F. Zalila, S. Challita, P. Merle.
Model-Driven Cloud Resource Management with OCCIware, in: Future Generation Computer Systems, October 2019, vol. 99, pp. 260 - 277. [ DOI : 10.1016/j.future.2019.04.015 ]
https://hal.inria.fr/hal-02375378

International Conferences with Proceedings

[27]
A. Amarilli, P. Bourhis, S. Mengel, M. Niewerth.
Constant-Delay Enumeration for Nondeterministic Document Spanners, in: ICDT, Lisbon, Portugal, 22nd International Conference on Database Theory (ICDT 2019), March 2019, https://arxiv.org/abs/1807.09320 - 25 pages including 17 pages of main material. Integrates all reviewer feedback. Outside of possible minor formatting differences, this paper is exactly the same as the ICDT'19 paper except that it contains 6 pages of technical appendix. [ DOI : 10.4230/LIPIcs.ICDT.2019.19 ]
https://hal.telecom-paristech.fr/hal-02338344
[28]
A. Amarilli, P. Bourhis, S. Mengel, M. Niewerth.
Enumeration on Trees with Tractable Combined Complexity and Efficient Updates, in: PODS, Amsterdam, France, Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, ACM Press, June 2019, pp. 89-103, https://arxiv.org/abs/1812.09519. [ DOI : 10.1145/3294052.3319702 ]
https://hal.archives-ouvertes.fr/hal-02326243
[29]
M. Benedikt, P. Bourhis, L. Jachiet, M. Thomazo.
Reasoning about disclosure in data integration in the presence of source constraints, in: IJCAI 2019 - 28th International Joint Conference on Artificial Intelligence, Macao, China, August 2019, https://arxiv.org/abs/1906.00624.
https://hal.inria.fr/hal-02145369
[30]
M. Bienvenu, P. Bourhis.
Mixed-World Reasoning with Existential Rules under Active-Domain Semantics, in: Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI), Macao, Macau SAR China, August 2019. [ DOI : 10.24963/ijcai.2019/216 ]
https://hal.archives-ouvertes.fr/hal-02342129
[31]
S. Bliudze, L. Henrio, E. Madelaine.
Verification of concurrent design patterns with data, in: 21th International Conference on Coordination Languages and Models (COORDINATION), Kongens Lyngby, Denmark, H. R. Nielson, E. Tuosto (editors), Coordination Models and Languages, Springer International Publishing, 2019, vol. LNCS-11533, pp. 161-181, t Part 4: Coordination Patterns. [ DOI : 10.1007/978-3-030-22397-7_10 ]
https://hal.archives-ouvertes.fr/hal-02143782
[32]
P. Bourhis, M. Leclère, M.-L. Mugnier, S. Tison, F. Ulliana, L. Galois.
Oblivious and Semi-Oblivious Boundedness for Existential Rules, in: IJCAI 2019 - International Joint Conference on Artificial Intelligence, Macao, China, August 2019.
https://hal-lirmm.ccsd.cnrs.fr/lirmm-02148142
[33]
S. Habchi, N. Moha, R. Rouvoy.
The Rise of Android Code Smells: Who Is to Blame?, in: MSR 2019 - Proceedings of the 16th International Conference on Mining Software Repositories, Montréal, Canada, B. Adams, S. Haiduc (editors), May 2019.
https://hal.inria.fr/hal-02054788
[34]
S. Habchi, R. Rouvoy, N. Moha.
On the Survival of Android Code Smells in the Wild, in: MOBILESoft 2019 - 6th IEEE/ACM International Conference on Mobile Software Engineering and Systems, Montréal, Canada, D. Poshyvanyk, I. Malavolta (editors), May 2019.
https://hal.inria.fr/hal-02059097
[35]
J. Leveau, X. Blanc, L. Réveillère, J.-R. Falleri, R. Rouvoy.
Fostering the Diversity of Exploratory Testing in Web Applications, in: IEEE International Conference on Software Testing, Verification and Validation (ICST), Porto, Portugal, C. Pasareanu, A. Zeller (editors), March 2020.
https://hal.inria.fr/hal-02398969
[36]
F. Madeiral, S. Urli, M. Maia, M. Monperrus.
Bears: An Extensible Java Bug Benchmark for Automatic Program Repair Studies, in: SANER 2019 - 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hangzhou, China, February 2019, https://arxiv.org/abs/1901.06024 - Proceedings of the 26th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER '19).
https://hal.inria.fr/hal-01990052
[37]
Best Paper
L. Meftah, R. Rouvoy, I. Chrisment.
FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps, in: 19th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), Kongens Lyngby, Denmark, J. Pereira, L. Ricci (editors), Distributed Applications and Interoperable Systems, Springer International Publishing, 2019, vol. LNCS-11534, pp. 116-132. [ DOI : 10.1007/978-3-030-22496-7_8 ]
https://hal.inria.fr/hal-02121311
[38]
L. Meftah, R. Rouvoy, I. Chrisment.
Testing Nearby Peer-to-Peer Mobile Apps at Large, in: MOBILESoft 2019 - 6th IEEE/ACM International Conference on Mobile Software Engineering and Systems, Montréal, Canada, D. Poshyvanyk, I. Malavolta (editors), May 2019.
https://hal.inria.fr/hal-02059088
[39]
Best Paper
P. Merle, A. Ndeye Sylla, M. Ouzzif, F. Klamm, K. Guillouard.
A Lightweight Toolchain to Validate, Visualize, Analyze, and Deploy ETSI NFV Topologies, in: NetSoft 2019 - The 5th IEEE International Conference on Network Softwarization, Paris, France, June 2019. [ DOI : 10.1109/NETSOFT.2019.8806632 ]
https://hal.archives-ouvertes.fr/hal-02124164
[40]
V. Mishra, P. Laperdrix, A. Vastel, W. Rudametkin, R. Rouvoy, M. Lopatka.
Don’t count me out: On the relevance of IP addresses in the tracking ecosystem, in: The Web Conference, Tapeï, Taiwan, B. Crispo, N. Nikiforakis (editors), Proceedings of The Web Conference (WWW'20), April 2020, vol. Security, Privacy, and Trust.
https://hal.inria.fr/hal-02435622
[41]
M. Naseri, N. P. Borges Jr., A. Zeller, R. Rouvoy.
AccessiLeaks: Investigating Privacy Leaks Exposed by the Android Accessibility Service, in: PETS 2019 - The 19th Privacy Enhancing Technologies Symposium, Stockholm, Sweden, July 2019.
https://hal.inria.fr/hal-01929049
[42]
Z. Ournani, M. C. Belgaid, R. Rouvoy, P. Rust, J. Penhoat, L. Seinturier.
Taming Energy Consumption Variations in Systems Benchmarking, in: International Conference on Performance Engineering (ICPE), Edmonton, Canada, C. Trubiani, A. Iosup (editors), Proceedings of the 11th ACM/SPEC International Conference on Performance Engineering (ICPE'20), April 2020.
https://hal.inria.fr/hal-02403379

Conferences without Proceedings

[43]
Z. Abou Khalil, E. Constantinou, T. Mens, L. Duchien, C. Quinton.
A Longitudinal Analysis of Bug Handling Across Eclipse Releases, in: ICSME 2019 - 35th IEEE International Conference on Software Maintenance and Evolution, Cleveland, United States, September 2019.
https://hal.archives-ouvertes.fr/hal-02179172
[44]
A. N. Sylla, K. Guillouard, F. Klamm, M. Ouzzif, P. Merle, S. Ben Rayana, J.-B. Stefani.
Formal Verification of Orchestration Templates for Reliable Deployment with OpenStack Heat, in: CNSM 2019 - 15th International Conference on Network and Service Management, Halifax, Canada, October 2019, pp. 1-5.
https://hal.inria.fr/hal-02375386
[45]
M. White, M. Tufano, M. Martinez, M. Monperrus, D. Poshyvanyk.
Sorting and Transforming Program Repair Ingredients via Deep Learning Code Similarities, in: SANER 2019 - 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, Hangzhou, China, February 2019, https://arxiv.org/abs/1707.04742.
https://hal.archives-ouvertes.fr/hal-01581170

Scientific Books (or Scientific Book chapters)

[46]
SPLC '19: Proceedings of the 23rd International Systems and Software Product Line Conference - Volume A, 2019.
https://hal.archives-ouvertes.fr/hal-02386136
[47]
Proceedings of the 23rd International Systems and Software Product Line Conference - Volume B (SPLC) : Paris, France — September 09 - 13, 2019, 2019.
https://hal.archives-ouvertes.fr/hal-02386175
[48]
Proceedings of the 13th European Conference on Software Architecture, ECSA 2019, Companion Proceedings (Proceedings Volume 2),, ACM Press, Paris, France, September 2019. [ DOI : 10.1145/3344948 ]
https://hal.archives-ouvertes.fr/hal-02378574

Books or Proceedings Editing

[49]
T. Bures, L. Duchien, P. Inverardi (editors)
13th European Conference on Software Architecture, ECSA 2019, Lecture Notes in Computer Science, Springer, September 2019, no 11681. [ DOI : 10.1007/978-3-030-29983-5 ]
https://hal.archives-ouvertes.fr/hal-02378494

Other Publications

[50]
P. Bourhis, L. Hélouët, R. Singh, Z. Miklós.
Data Centric Workflows for Crowdsourcing, September 2019, working paper or preprint.
https://hal.inria.fr/hal-01976280
References in notes
[51]
L. Capra, W. Emmerich, C. Mascolo.
A micro-economic approach to conflict resolution in mobile computing, in: SIGSOFT FSE, 2002, pp. 31-40.
[52]
M. Colmant.
Multi-Dimensional Analysis of Software Power Consumptions in Multi-Core Architectures, Université Lille 1 - Sciences et Technologies, November 2016.
https://tel.archives-ouvertes.fr/tel-01403559
[53]
M. Colmant, P. Felber, R. Rouvoy, L. Seinturier.
WattsKit: Software-Defined Power Monitoring of Distributed Systems, in: 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Madrid, Spain, F. Capello, G. Fox, J. Garcia-Blas (editors), Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), IEEE, January 2017, 10 p.
https://hal.inria.fr/hal-01439889
[54]
V. Dallmeier, A. Zeller, B. Meyer.
Generating Fixes from Object Behavior Anomalies, in: Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering, Washington, DC, USA, ASE '09, IEEE Computer Society, 2009, pp. 550–554.
http://dx.doi.org/10.1109/ASE.2009.15
[55]
T. Durieux.
From Runtime Failures to Patches: Study of Patch Generation in Production, University of Lille, September 2018.
https://tel.archives-ouvertes.fr/tel-01883676
[56]
F. Fouquet, E. Daubert, N. Plouzeau, O. Barais, J. Bourcier, J.-M. Jézéquel.
Dissemination of Reconfiguration Policies on Mesh Networks, in: Proceedings of 12th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS'12), Stockholm, Sweden, K. M. Göschka, S. Haridi (editors), Lecture Notes in Computer Science, Springer, June 2012, vol. 7272, pp. 16-30.
[57]
M. Goldmann, G. Kreitz.
Measurements on the spotify peer-assisted music-on-demand streaming system, in: Peer-to-Peer Computing, T. Asami, T. Higashino (editors), IEEE, 2011, pp. 206-211.
[58]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I. H. Witten.
The WEKA data mining software: an update, in: SIGKDD Explorer Newsletter, 2009, vol. 11, no 1, pp. 10–18.
[59]
M. Harman.
Automated patching techniques: the fix is in, in: Communications of the ACM, May 2010, vol. 53, no 5, pp. 108–108.
http://doi.acm.org/10.1145/1735223.1735248
[60]
A. Havet, V. Schiavoni, P. Felber, M. Colmant, R. Rouvoy, C. Fetzer.
GenPack: A Generational Scheduler for Cloud Data Centers, in: 5th IEEE International Conference on Cloud Engineering (IC2E), Vancouver, Canada, I. Gupta, J. Liu (editors), Proceedings of the 5th IEEE International Conference on Cloud Engineering (IC2E), IEEE, April 2017, 10 p.
https://hal.inria.fr/hal-01403486
[61]
V. Issarny, N. Georgantas, S. Hachem, A. Zarras, P. Vassiliadis, M. Autili, M. A. Gerosa, A. Ben Hamida.
Service-Oriented Middleware for the Future Internet: State of the Art and Research Directions, in: Journal of Internet Services and Applications, May 2011, vol. 2, no 1, pp. 23-45.
http://dx.doi.org/10.1007/s13174-011-0021-3
[62]
D. Jackson.
Alloy: A Lightweight Object Modelling Notation, in: ACM Transactions on Software Engineering and Methodology, April 2002, vol. 11, no 2, pp. 256-290.
[63]
P. Laperdrix, W. Rudametkin, B. Baudry.
Beauty and the Beast: Diverting modern web browsers to build unique browser fingerprints, in: 37th IEEE Symposium on Security and Privacy (S&P 2016), San Jose, United States, May 2016.
https://hal.inria.fr/hal-01285470
[64]
W. Li, S. Hu, J. Li, H.-A. Jacobsen.
Community Clustering for Distributed Publish/Subscribe Systems, in: CLUSTER, IEEE, 2012, pp. 81-89.
[65]
M. Léger, T. Ledoux, T. Coupaye.
Reliable Dynamic Reconfigurations in a Reflective Component Model, in: CBSE, L. Grunske, R. Reussner, F. Plasil (editors), Lecture Notes in Computer Science, Springer, 2010, vol. 6092, pp. 74-92.
[66]
L. Meftah, M. Gomez, R. Rouvoy, I. Chrisment.
AndroFleet: Testing WiFi Peer-to-Peer Mobile Apps in the Large, in: ASE 2017 - 32nd IEEE/ACM International Conference on Automated Software Engineering , Urbana-Champaign, Illinois, United States, ASE 2017 - The 32nd IEEE/ACM International Conference on Automated Software Engineering - Tool demonstration, October 2017.
https://hal.inria.fr/hal-01574466
[67]
P. Merle, J.-B. Stefani.
A formal specification of the Fractal component model in Alloy, Inria, November 2008, no 6721, 44 p.
http://hal.inria.fr/inria-00338987
[68]
A. Noureddine.
Towards a Better Understanding of the Energy Consumption of Software Systems, Université des Sciences et Technologie de Lille - Lille I, March 2014.
https://tel.archives-ouvertes.fr/tel-00961346
[69]
F. Paraiso, P. Merle, L. Seinturier.
soCloud: A service-oriented component-based PaaS for managing portability, provisioning, elasticity, and high availability across multiple clouds, in: Springer Computing, May 2016, vol. 98, no 5, pp. 539-565. [ DOI : 10.1007/s00607-014-0421-x ]
https://hal.inria.fr/hal-01019385
[70]
L. Provensi, F. Eliassen, R. Vitenberg, R. Rouvoy.
Improving Context Interpretation by Using Fuzzy Policies: The Case of Adaptive Video Streaming, in: 28th ACM Symposium on Applied Computing (SAC) - 8th Track on Dependable and Adaptive Distributed Systems (DADS), Coimbra, Portugal, K. M. Göschka, R. Oliveira, P. Pietzuch, G. Russello (editors), ACM, March 2013, vol. 1, pp. 415-422, Best paper award.
http://hal.inria.fr/hal-00799136
[71]
M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, W. Beebee Jr.
Enhancing server availability and security through failure-oblivious computing, in: Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation (OSDI'06), USENIX Association, 2004, pp. 21–21.
[72]
M. Salehie, L. Tahvildari.
Self-adaptive software: Landscape and research challenges, in: ACM Transactions on Autonomous and Adaptive Systems, May 2009, vol. 4, no 2, pp. 14:1–14:42.
http://doi.acm.org/10.1145/1516533.1516538
[73]
H. Schaffers, M. Sharpe.
Services in the Future Internet, April 2011, FP8 Expert Group, EU Directorate-General Information Society & Media.
http://cordis.europa.eu/fp7/ict/ssai/docs/softwareconsultationreportfeb2011.pdf
[74]
L. Schubert, K. Jeffery, B. Neidecker-Lutz.
A Roadmap for Advanced Cloud Technologies under H2020, Dec 2012.
http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-expert-group/roadmap-dec2012-vfinal.pdf
[75]
L. Seinturier, P. Merle, R. Rouvoy, D. Romero, V. Schiavoni, J.-B. Stefani.
A Component-Based Middleware Platform for Reconfigurable Service-Oriented Architectures, in: Software: Practice and Experience, May 2012, vol. 42, no 5, pp. 559-583. [ DOI : 10.1002/spe.1077 ]
http://hal.inria.fr/inria-00567442
[76]
R. Sommerard, R. Rouvoy.
Towards Privacy-Preserving Data Dissemination in Crowd-Sensing Middleware Platform, in: 11èmes journées francophones Mobilité et Ubiquité (UbiMob'16), Lorient, France, July 2016, 6 p.
https://hal.inria.fr/hal-01332588
[77]
J. Urban.
NESSI Research Priorities for the next Framework Programme for Research and Technological Development FP8, May 2011.
http://www.nessi-europe.eu/files/Docs/NESSI%20SRA_update_May_2011_V1-0.pdf
[78]
Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, A. Zeller.
Automated fixing of programs with contracts, in: Proceedings of the 19th international symposium on Software testing and analysis, New York, NY, USA, ISSTA '10, ACM, 2010, pp. 61–72.
http://doi.acm.org/10.1145/1831708.1831716
[79]
C. Weiss, R. Premraj, T. Zimmermann, A. Zeller.
How long will it take to fix this bug?, in: Proceedings of the Fourth International Workshop on Mining Software Repositories, IEEE Computer Society, 2007, 1 p.
[80]
T. Xie, S. Thummalapenta, D. Lo, C. Liu.
Data Mining for Software Engineering, in: IEEE Computer, August 2009, vol. 42, no 8, pp. 55-62.
http://doi.ieeecomputersociety.org/10.1109/MC.2009.256
[81]
W. Xu, L. Huang, A. Fox, D. A. Patterson, M. I. Jordan.
Detecting large-scale system problems by mining console logs, in: Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP'09), Big Sky, Montana, USA, J. N. Matthews, T. E. Anderson (editors), ACM, October 2009, pp. 117-132.
[82]
R. de Lemos, H. Giese, H. A. Muller, M. Shaw, J. Andersson, L. Baresi, B. Becker, N. Bencomo, Y. Brun, B. Cukic, R. Desmarais, S. Dustdar, G. Engels, K. Geihs, K. M. Göschka, A. Gorla, V. Grassi, P. Inverardi, G. Karsai, J. Kramer, M. Litoiu, A. Lopes, J. Magee, S. Malek, S. Mankovskii, R. Mirandola, J. Mylopoulos, O. Nierstrasz, M. Pezzè, C. Prehofe, W. Schäfer, R. Schlichting, B. Schmerl, D. B. Smith, J. P. Sousa, G. Tamura, L. Tahvildari, N. M. Villegas, T. Vogel, D. Weyns, K. Wong, J. Wuttke.
Software Engineering for Self-Adaptive Systems: A Second Research Roadmap, in: Software Engineering for Self-Adaptive Systems, R. de Lemos, H. Giese, H. Müller, M. Shaw (editors), Dagstuhl Seminar Proceedings, Springer, 2013, vol. 7475, pp. 1-26.
http://hal.inria.fr/inria-00638157