Keynote Speech
     We have three keynote speakers.
Prof. Bashar Nuseibeh Photo
Chief Scientist
Lero – The Irish Software Engineering Research Centre
Department of Computer Science & Information Systems
University of Limerick, Limerick, Ireland
Open University, UK
Time
09:10~10:10, Tuesday, December 6
Bio

Bashar Nuseibeh is Professor of Software Engineering and Chief Scientist at Lero - the Irish Software Engineering Research Centre. He is also a Professor of Computing at the Open University, UK, where he served as Director of Research (2002-2008), and a Visiting Professor at Imperial College London and the National Institute of Informatics, Japan.
Previously he was a Reader at Imperial College London and Head of its Software Engineering Laboratory. His research interests are in software requirements engineering and design, software process modelling and technology, security and privacy, and technology transfer. He has published over 160 refereed papers and consulted widely with industry, working with organisations such as the UK National Air Traffic Services (NATS), Texas Instruments, Praxis Critical Systems, Philips Research Labs, and NASA. Bashar is Editor-in-Chief of IEEE Transactions on Software Engineering, Editor Emeritus of of the Automated Software Engineering Journal, and a member of the Editorial Board of several other international journals.
He has served as programme chair of ASE'98, RE'01, and ICSE'05, was Chair of the Steering Committee of ICSE, and is Chair IFIP Working Group 2.9 (Requirements Engineering). He received a 2002 Philip Leverhulme Prize, an ICSE'2003 Most Influential Paper award, a Senior Research Fellowship of the Royal Academy of Engineering and Leverhulme Trust (2005-2007), and a Microsoft Research Award (2011). He was elected a Fellow of Automated Software Engineering in 2007, and is a Fellow of the BCS and IET, and a Chartered Engineer.

Title
Towards Adaptive Security and Privacy
Abstract

The proliferation of ubiquitous¡ªsometimes termed pervasive¡ªcomputing systems is radically affecting the ways in which people manage their lives ¨C at work, at home, and socially. Two substantive dimensions of ubiquitous computing (ubicomp) technology are: (i) the software that runs on it and (ii) the users who interact with it. In order for ubicomp software to operate effectively in the different environments¡ªalso termed contexts¡ªin which it is used, it must be adaptive to the changing requirements and characteristics of these environments. As ubicomp systems are used increasingly to manage personal information, threats to personal privacy and security are also increasing. A key difficulty however, is that these threats themselves are changing, and indeed change from one context to another, requiring systems to adapt and communicate with their users in order to ensure that the users, their personal information, and any other assets that they value are protected. This talk explores some of the challenges facing software engineering research, to address the multidisciplinary challenges that ubicomp brings.


Prof. Zhi Jin Photo
Professor, Peking University
Senior member of the Institute of Electrical and Electronic Engineers (IEEE)
The National Science Fund for Distinguished Young Scholars of China
Time
13:30~14:30, Tuesday, December 6
Bio

Prof. Zhi Jin held a post-doctor position in Institute of Mathematics, Chinese Academy of Sciences from 1992 to 1994 and then became an associate professor. She has been a full professor in Academy of Mathematics and System Science at Chinese Academy of Sciences since 2001. She currently is a full professor in Peking University.
Prof Zhi Jin is vice director of the Key Laboratory of High Confidence Software Technologies of the Ministry of Education, and vice director of the Key Laboratory on Management, Decision and Information Systems of Chinese Academy of Sciences.
Prof. Zhi Jin was a visiting scholar in INRIA, France, from November 1996 to May 1997 and in Ulster University, UK, from December 1997 to November 1998 and from October 2000 to May 2001. She was visiting professor in Queen's University at Belfast, UK, from January 2004 to March 2004 and from July 2004 to September 2004. She was a visiting professor in Oxford Brookes University, UK, from July 2008 to September 2008. She is also an adjunct professor in Institute of Computing Technology at Chinese Academy of Sciences since 2004.

Title
Modeling Trustworthy Requirements: Does Control Theory Help?
Abstract

Software systems are increasingly used in many critical areas and their operating environments become more and more complex. This poses great demand on the software system's trustworthiness. To meet this demand, one important but still open issue is how to model trustworthy requirements. This talk explores a control theory based approach. The basic idea is to treat a software system as a feedback-feedforward control system. Two kinds of controllers have been eexplicitly captured and represented, namely, the feedback controllers and the feedforward controllers. The main feature of this thinking on trustworthy requirements is the systematical and unified way to modeling different concerns in trustworthiness. The result can be specified as an autonomic system.


Prof. Tao Xie Photo
Associate Professor
Director of Automated Software Engineering Research Group
North Carolina State University, NC
Time
08:30~09:30, Wednesday, December 7
Bio

Tao Xie is an Associate Professor in the Department of Computer Science of the College of Engineering at North Carolina State University. He received his Ph.D. in Computer Science from the University of Washington in 2005, advised by David Notkin. Before that, he received an M.S. in Computer Science from the University of Washington in 2002, an M.S. in Computer Science from Peking University in 2000, advised by Hong Mei, and a B.S. in Computer Science from Fudan University in 1997. He has worked as a visiting researcher at Microsoft Research Redmond and Microsoft Research Asia. His research interests are in software engineering, with a focus on improving software reliability and dependability, including software testing and analysis and software analytics. He leads the Automated Software Engineering Research Group at North Carolina State University.
He has contributed to broad software engineering and computing research communities with extensive professional services. He has served as the ACM SIGSOFT History Liaison in the SIGSOFT Executive Committee as well as a member of the ACM History Committee. He is an ACM Distinguished Speaker and an IEEE Computer Society Distinguished Visitor. He received a National Science Foundation Faculty Early Career Development (CAREER) Award in 2009. He received a 2011 Microsoft Research Software Engineering Innovation Foundation (SEIF) Award, 2008, 2009, and 2010 IBM Faculty Awards, and a 2008 IBM Jazz Innovation Award. He received 2010 North Carolina State University Sigma Xi Faculty Research Award. He received the ASE 2009 Best Paper Award and an ACM SIGSOFT Distinguished Paper Award. His research has been supported by NSF, NIST, ARO, IBM, Microsoft Research, and ABB Research. He was Program Co-Chair of 2009 IEEE International Conference on Software Maintenance (ICSM) and is Program Co-Chair of 2011 and 2012 International Working Conference on Mining Software Repositories (MSR). He has served on program committees of various conferences, including ICSE, ASE, ISSTA, and WWW.

Title
Evolving Testing and Analysis for Evolving Software
Abstract

Software programs evolve throughout their lifetime undergoing various changes. Such changes pose both opportunities and challenges for software testing and analysis. For example, applying testing and analysis on the whole program may be often infeasible due to high cost. However, it could be more feasible to focus testing and analysis on the changes being made on the program over its lifetime. For a program, it could be costly to provide test oracles or properties under checking for testing and analysis. However, it comes almost for free to have the previous program version's behavior as baseline behavior under checking for testing and analysis of an evolved program. On the other hand, changes pose challenges for software testing and analysis. For example, reusing existing regression tests for an old version of the program may be insufficient for testing changes being made in newer versions of the program. There is a strong need of test augmentation: adding new tests to target at the changes. This talk discusses these opportunities and challenges for software testing and analysis of evolving software.