default search action
19th ESEC / 28th SIGSOFT FSE 2020: Virtual Event, USA
- Prem Devanbu, Myra B. Cohen, Thomas Zimmermann:
ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020. ACM 2020, ISBN 978-1-4503-7043-1
Analysis
- Changjian Zhang, David Garlan, Eunsuk Kang:
A behavioral notion of robustness for software systems. 1-12 - Sahar Badihi, Faridah Akinotcho, Yi Li, Julia Rubin:
ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common code. 13-24 - Juan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. 25-37 - Mingxue Zhang, Wei Meng:
Detecting and understanding JavaScript global identifier conflicts on the web. 38-49 - Dirk Beyer, Karlheinz Friedberger:
Domain-independent interprocedural program analysis using block-abstraction memoization. 50-62 - Profir-Petru Pârtachi, Santanu Kumar Dash, Miltiadis Allamanis, Earl T. Barr:
Flexeme: untangling commits using lexical flows. 63-74 - Zifan Nan, Hui Guan, Xipeng Shen:
HISyn: human learning-inspired natural language programming. 75-86 - Shivam Handa, Martin C. Rinard:
Inductive program synthesis over noisy data. 87-98 - Shahar Maoz, Rafi Shalom:
Inherent vacuity for GR(1) specifications. 99-110 - Rongchen Xu, Fei He, Bow-Yaw Wang:
Interval counterexamples for loop invariant learning. 111-122 - Vaibhav Sharma, Soha Hussein, Michael W. Whalen, Stephen McCamant, Willem Visser:
Java Ranger: statically summarizing regions for efficient symbolic execution of Java. 123-134 - Bobby R. Bruce, Tianyi Zhang, Jaspreet Arora, Guoqing Harry Xu, Miryung Kim:
JShrink: in-depth investigation into debloating modern Java applications. 135-146 - Sooyoung Cha, Hakjoo Oh:
Making symbolic execution promising by learning aggressive state-pruning strategy. 147-158 - Khouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, David Wolfe:
Mining assumptions for software components using machine learning. 159-171 - Rahul Gopinath, Björn Mathis, Andreas Zeller:
Mining input grammars from dynamic control flow. 172-183 - Dominik Helm, Florian Kübler, Michael Reif, Michael Eichberg, Mira Mezini:
Modular collaborative program analysis in OPAL. 184-196 - David Trabish, Timotej Kapus, Noam Rinetzky, Cristian Cadar:
Past-sensitive pointer analysis for symbolic execution. 197-208 - Michael Pradel, Georgios Gousios, Jason Liu, Satish Chandra:
TypeWriter: neural type prediction with search-based validation. 209-220 - Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul L. Yu:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. 221-232
APIs
- Jiawei Wang, Li Li, Kui Liu, Haipeng Cai:
Exploring how deprecated Python library APIs are (not) handled. 233-244 - Enrique Larios Vargas, Maurício Finavaro Aniche, Christoph Treude, Magiel Bruntink, Georgios Gousios:
Selecting third-party libraries: the practitioners' perspective. 245-256
Cloud / Services
- Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo:
A principled approach to GraphQL query cost analysis. 257-268 - Alex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek:
Beware the evolving 'intelligent' web service! an integration architecture tactic to guard AI-first components. 269-280 - Malik Bouchet, Byron Cook, Bryant Cutler, Anna Druzkina, Andrew Gacek, Liana Hadarean, Ranjit Jhala, Brad Marshall, Daniel Peebles, Neha Rungta, Cole Schlesinger, Chriss Stephens, Carsten Varming, Andy Warfield:
Block public access: trust safety verification of access control policies. 281-291 - Jiazhen Gu, Chuan Luo, Si Qin, Bo Qiao, Qingwei Lin, Hongyu Zhang, Ze Li, Yingnong Dang, Shaowei Cai, Wei Wu, Yangfan Zhou, Murali Chintalapati, Dongmei Zhang:
Efficient incident identification from multi-dimensional issue reports via meta-heuristic search. 292-303 - Yujun Chen, Xian Yang, Hang Dong, Xiaoting He, Hongyu Zhang, Qingwei Lin, Junjie Chen, Pu Zhao, Yu Kang, Feng Gao, Zhangwei Xu, Dongmei Zhang:
Identifying linked incidents in large-scale online service systems. 304-314 - Nengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei:
Real-time incident prediction for online service systems. 315-326
Configuration
- Carmine Vassallo, Sebastian Proksch, Anna Jancso, Harald C. Gall, Massimiliano Di Penta:
Configuration smells in continuous delivery pipelines: a linter and a six-month study on GitLab. 327-337 - Norbert Siegmund, Nicolai Ruckel, Janet Siegmund:
Dimensions of software configuration: on the configuration context in modern software development. 338-349 - Liu Liu, Sibren Isaacman, Ulrich Kremer:
Global cost/quality management across multiple applications. 350-361 - Qingrong Chen, Teng Wang, Owolabi Legunsen, Shanshan Li, Tianyin Xu:
Understanding and discovering software configuration dependencies in cloud and datacenter systems. 362-374
Documentation
- Samim Mirhosseini, Chris Parnin:
Docable: evaluating the executability of software tutorials. 375-385 - Sahar Mehrpour, Thomas D. LaToza, Hamed Sarvari:
RulePad: interactive authoring of checkable design rules. 386-397
Empirical
- Xin Tan, Minghui Zhou, Zeyu Sun:
A first look at good first issues on GitHub. 398-409 - Phillip Merlin Uesbeck, Cole S. Peterson, Bonita Sharif, Andreas Stefik:
A randomized controlled trial on the effects of embedded computer language switching. 410-420 - Jefferson De Oliveira Silva, Igor Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher:
A theory of the engagement in open source projects via summer of code programs. 421-431 - Jacob Krüger, Thorsten Berger:
An empirical analysis of the costs of clone- and platform-oriented software reuse. 432-444 - Linda Erlenhov, Francisco Gomes de Oliveira Neto, Philipp Leitner:
An empirical study of bots in software development: characteristics and challenges from a practitioner's perspective. 445-455 - Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander, Westley Weimer:
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines. 456-468 - Ben Hermann, Stefan Winter, Janet Siegmund:
Community expectations for research artifacts and evaluation processes. 469-480 - Mahnaz Behroozi, Shivani Shirolkar, Titus Barik, Chris Parnin:
Does stress impact technical interview performance? 481-492 - Yvonne Dittrich, Christian Bo Michelsen, Paolo Tell, Pernille Lous, Allan Ebdrup:
Exploring the evolution of software practices. 493-504 - Hemank Lamba, Asher Trockman, Daniel Armanios, Christian Kästner, Heather Miller, Bogdan Vasilescu:
Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystem. 505-517 - Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, effort-aware library version harmonization. 518-529 - Jaeseong Lee, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
On the naturalness of hardware descriptions. 530-542 - Umme Ayda Mannan, Iftekhar Ahmed, Carlos Jensen, Anita Sarma:
On the relationship between design discussions and design quality: a case study of Apache projects. 543-555 - Massimiliano Di Penta, Gabriele Bavota, Fiorella Zampetti:
On the relationship between refactoring actions and bugs: a differentiated replication. 556-567 - Hennie Huijgens, Ayushi Rastogi, Ernst Mulders, Georgios Gousios, Arie van Deursen:
Questions for data scientists in software engineering: a replication. 568-579 - Yi Wang, Min Zhang:
Reducing implicit gender biases in software development: does intergroup contact theory work? 580-592 - Sergio García, Daniel Strüber, Davide Brugali, Thorsten Berger, Patrizio Pelliccione:
Robotics software engineering: a perspective from the service robotics domain. 593-604 - Dan Gopstein, Anne-Laure Fayard, Sven Apel, Justin Cappos:
Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion. 605-616 - Yiling Lou, Zhenpeng Chen, Yanbin Cao, Dan Hao, Lu Zhang:
Understanding build issue resolution in practice: symptoms and fix patterns. 617-628 - Ameya Ketkar, Nikolaos Tsantalis, Danny Dig:
Understanding type changes in Java. 629-641
Fairness
- Sumon Biswas, Hridesh Rajan:
Do the machine learning models on a crowd sourced platform exhibit bias? an empirical study on model fairness. 642-653 - Joymallya Chakraborty, Suvodeep Majumder, Zhe Yu, Tim Menzies:
Fairway: a way to build fair ML software. 654-665 - Ye Liu, Yi Li, Shang-Wei Lin, Rong Zhao:
Towards automated verification of smart contract fairness. 666-677
Fuzzing
- Marcel Böhme, Valentin J. M. Manès, Sang Kil Cha:
Boosting fuzzer efficiency: an information theoretic perspective. 678-689 - Suhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee:
CrFuzz: fuzzing multi-purpose programs through input validation. 690-700 - Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Detecting critical bugs in SMT solvers using blackbox mutational fuzzing. 701-712 - Marcel Böhme, Brandon Falk:
Fuzzing: on the exponential cost of vulnerability discovery. 713-724 - Patrice Godefroid, Bo-Yuan Huang, Marina Polishchuk:
Intelligent REST API data fuzzing. 725-736 - Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray:
MTFuzz: fuzzing with a multi-task neural network. 737-749
Machine Learning
- Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
A comprehensive study on challenges in deploying deep learning based software. 750-762 - José Pablo Cambronero, Jürgen Cito, Martin C. Rinard:
AMS: generating AutoML search spaces from weak specifications. 763-774 - Shenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. 775-787 - Zan Wang, Ming Yan, Junjie Chen, Shuang Liu, Dongdi Zhang:
Deep learning library testing via effective model generation. 788-799 - Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis:
DeepSearch: a simple and effective blackbox attack for deep neural networks. 800-812 - Simin Chen, Soroush Bateni, Sampath Grandhi, Xiaodi Li, Cong Liu, Wei Yang:
DENAS: automated rule generation by knowledge extraction from neural networks. 813-825 - Yuhao Zhang, Luyao Ren, Liqian Chen, Yingfei Xiong, Shing-Chi Cheung, Tao Xie:
Detecting numerical bugs in neural network architectures. 826-837 - Ziqi Zhang, Yuanchun Li, Yao Guo, Xiangqun Chen, Yunxin Liu:
Dynamic slicing for deep neural networks. 838-850 - Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quanquan Gu, Miryung Kim:
Is neuron coverage a meaningful measure for testing deep neural networks? 851-862 - Shashij Gupta, Pinjia He, Clara Meister, Zhendong Su:
Machine translation testing via pathological invariance. 863-875 - Vincenzo Riccio, Paolo Tonella:
Model-based exploration of the frontier of behaviours for deep learning system testing. 876-888 - Rangeet Pan, Hridesh Rajan:
On decomposing a deep neural network into modules. 889-900 - Zenan Li, Xiaoxing Ma, Chang Xu, Jingwei Xu, Chun Cao, Jian Lu:
Operational calibration: debugging confidence errors for DNNs in the field. 901-913
Mobile
- Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. 914-926 - Reyhaneh Jabbarvand, Forough Mehralian, Sam Malek:
Automated construction of energy test oracles for Android. 927-938 - Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
Borrowing your enemy's arrows: the case of code reuse in Android via direct inter-app code invocation. 939-951 - Linjie Pan, Baoquan Cui, Hao Liu, Jiwei Yan, Siqi Wang, Jun Yan, Jian Zhang:
Static asynchronous component misuse detection for Android applications. 952-963
Performance / QoS
- Yutong Zhao, Lu Xiao, Pouria Babvey, Lei Sun, Sunny Wong, Angel A. Martinez, Xiao Wang:
Automatically identifying performance issue reports with heuristic linguistic patterns. 964-975 - Timur Babakol, Anthony Canino, Khaled Mahmoud, Rachit Saxena, Yu David Liu:
Calm energy accounting for multithreaded Java applications. 976-988 - Christoph Laaber, Stefan Würsten, Harald C. Gall, Philipp Leitner:
Dynamically reconfiguring software microbenchmarks: reducing execution time without sacrificing result quality. 989-1001 - Claudio Mandrioli, Martina Maggio:
Testing self-adaptive software with probabilistic guarantees on performance metrics. 1002-1014
Recommendation
- Wenkai Xie, Xin Peng, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao:
API method recommendation via explicit matching of functionality verb phrases. 1015-1026 - Tam Nguyen, Phong Vu, Tung Nguyen:
Code recommendation for exception handling. 1027-1038 - Arman Shahbazian, Suhrid Karthik, Yuriy Brun, Nenad Medvidovic:
eQual: informing early design decisions. 1039-1051 - Sonal Mahajan, Negarsadat Abolhassani, Mukul R. Prasad:
Recommending stack overflow posts for fixing runtime exceptions using failure scenario matching. 1052-1064 - Chris Brown, Chris Parnin:
Understanding the impact of GitHub suggested changes on recommendations between developers. 1065-1076
Security
- Kripa Shanker, Arun Joseph, Vinod Ganapathy:
An evaluation of methods to port legacy code to SGX enclaves. 1077-1088 - Salah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boytsov, Yves Le Traon, Anne Goujon:
Search-based adversarial testing and improvement of constrained credit scoring systems. 1089-1100 - Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. 1101-1113
Testing
- Eduard Baranov, Axel Legay, Kuldeep S. Meel:
Baital: an adaptive weighted sampling approach for improved t-wise coverage. 1114-1126 - Giovani Guizzo, Federica Sarro, Mark Harman:
Cost measures matter for mutation testing study validity. 1127-1139 - Manuel Rigger, Zhendong Su:
Detecting optimization bugs in database engines via non-optimizing reference engine construction. 1140-1152 - M. Ammar Ben Khadra, Dominik Stoffel, Wolfgang Kunz:
Efficient binary-level coverage analysis. 1153-1164 - Chu-Pan Wong, Jens Meinicke, Leo Chen, João Paulo Diniz, Christian Kästner, Eduardo Figueiredo:
Efficiently finding higher-order mutants. 1165-1177 - Valerio Terragni, Gunel Jahangirova, Paolo Tonella, Mauro Pezzè:
Evolutionary improvement of assertion oracles. 1178-1189 - Yixue Zhao, Justin Chen, Adriana Sejfia, Marcelo Schmitt Laser, Jie Zhang, Federica Sarro, Mark Harman, Nenad Medvidovic:
FrUITeR: a framework for evaluating UI test reuse. 1190-1201 - Jieshan Chen, Mulong Xie, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li:
Object detection for graphical user interface: old fashioned or deep learning or a combination? 1202-1214 - Rahmadi Trimananda, Seyed Amir Hossein Aqajari, Jason Chuang, Brian Demsky, Guoqing Harry Xu, Shan Lu:
Understanding and automatically detecting conflicting interactions between smart home IoT applications. 1215-1227 - Alexander Kampmann, Nikolas Havrikov, Ezekiel O. Soremekun, Andreas Zeller:
When does my program do this? learning circumstances of software behavior. 1228-1239
Industry Papers
- Zi Peng, Jinqiu Yang, Tse-Hsun (Peter) Chen, Lei Ma:
A first look at the integration of machine learning models in complex autonomous driving systems: a case study on Apollo. 1240-1250 - Alexander Suh:
Adapting bug prediction models to predict reverted commits at Wayfair. 1251-1262 - Shinobu Saito, Yukako Iimura, Emad Aghayi, Thomas D. LaToza:
Can microtask programming work in industry? 1263-1273 - Bennett Mackenzie, Vera Pantelic, Gordon Marks, Stephen Wynn-Williams, Gehan M. K. Selim, Mark Lawford, Alan Wassyng, Moustapha Diab, Feisel Weslati:
Change impact analysis in Simulink designs of embedded systems. 1274-1284 - Linyi Li, Zhenwen Li, Weijie Zhang, Jun Zhou, Pengcheng Wang, Jing Wu, Guanghua He, Xia Zeng, Yuetang Deng, Tao Xie:
Clustering test steps in natural language toward automating test automation. 1285-1295 - Jiazhen Gu, Jiaqi Wen, Zijian Wang, Pu Zhao, Chuan Luo, Yu Kang, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Bo Qiao, Liqun Li, Qingwei Lin, Dongmei Zhang:
Efficient customer incident triage via linking with system incidents. 1296-1307 - Meng Yan, Xin Xia, Yuanrui Fan, David Lo, Ahmed E. Hassan, Xindong Zhang:
Effort-aware just-in-time defect identification in practice: a case study at Alibaba. 1308-1319 - Yu Liu, Cheng Chen, Ru Zhang, Tingting Qin, Xiang Ji, Haoxiang Lin, Mao Yang:
Enhancing the interoperability between deep learning frameworks by model conversion. 1320-1330 - Cem Sürücü, Bianying Song, Jacob Krüger, Gunter Saake, Thomas Leich:
Establishing key performance indicators for measuring software-development processes at a large organization. 1331-1341 - Yanjie Gao, Yu Liu, Hongyu Zhang, Zhengxian Li, Yonghao Zhu, Haoxiang Lin, Mao Yang:
Estimating GPU memory consumption of deep learning models. 1342-1352 - Celeste Barnaby, Koushik Sen, Tianyi Zhang, Elena L. Glassman, Satish Chandra:
Exempla gratis (E.G.): code examples for free. 1353-1364 - He Zhang, Huang Huang, Dong Shao, Xin Huang:
Fireteam: a small-team development practice in industry. 1365-1375 - Jincao Feng, Weikai Miao, Hanyue Zheng, Yihao Huang, Jianwen Li, Zheng Wang, Ting Su, Bin Gu, Geguang Pu, Mengfei Yang, Jifeng He:
FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain. 1376-1386 - Xiaofeng Guo, Xin Peng, Hanzhang Wang, Wanxue Li, Huai Jiang, Dan Ding, Tao Xie, Liangfei Su:
Graph-based trace analysis for microservice architecture understanding and problem diagnosis. 1387-1397 - Valentin Wüstholz, Maria Christakis:
Harvey: a greybox fuzzer for smart contracts. 1398-1409 - Jiajun Jiang, Weihai Lu, Junjie Chen, Qingwei Lin, Pu Zhao, Yu Kang, Hongyu Zhang, Yingfei Xiong, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
How to mitigate the incident? an effective troubleshooting guide recommendation technique for online service systems. 1410-1420 - Frederico Araujo, Teryl Taylor:
Improving cybersecurity hygiene through JIT patching. 1421-1432 - Alexey Svyatkovskiy, Shao Kun Deng, Shengyu Fu, Neel Sundaresan:
IntelliCode compose: code generation using transformer. 1433-1443 - Lin Shi, Mingyang Li, Mingzhe Xing, Yawen Wang, Qing Wang, Xinhua Peng, Weimin Liao, Guizhen Pi, Haiqing Wang:
Learning to extract transaction function from requirements: an industrial case on financial software. 1444-1454 - Gvozden Marinkovic, Nikola Lukic, Nenad Medvidovic:
Online sports betting through the prism of software engineering. 1455-1465 - Jinhan Kim, Jeongil Ju, Robert Feldt, Shin Yoo:
Reducing DNN labelling cost using surprise adequacy: an industrial case study for autonomous driving. 1466-1476 - Jie Wang, Yunguang Wu, Gang Zhou, Yiming Yu, Zhenyu Guo, Yingfei Xiong:
Scaling static taint analysis to industrial SOA applications: a case study at Alibaba. 1477-1486 - Zhuangbin Chen, Yu Kang, Liqun Li, Xu Zhang, Hongyu Zhang, Hui Xu, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Yingnong Dang, Feng Gao, Pu Zhao, Bo Qiao, Qingwei Lin, Dongmei Zhang, Michael R. Lyu:
Towards intelligent incident management: why we need it and how we make it. 1487-1497 - Zhenyue Long, Guoquan Wu, Xiaojiang Chen, Wei Chen, Jun Wei:
WebRR: self-replay enhanced robust record/replay for web application testing. 1498-1508
Visions and Reflections
- Christoph Treude, Justin Middleton, Thushari Atapattu:
Beyond accuracy: assessing software documentation quality. 1509-1512 - Anh Nguyen-Duc, Pekka Abrahamsson:
Continuous experimentation on artificial intelligence software: a research agenda. 1513-1516 - Paul Gazzillo:
Inferring and securing software configurations using automated reasoning. 1517-1520 - James Ivers, Ipek Ozkaya, Robert L. Nord, Chris Seifried:
Next generation automated software evolution refactoring at scale. 1521-1524 - Vard Antinyan:
Revealing the complexity of automotive software. 1525-1528 - Sridhar Chimalakonda, Akhila Sri Manasa Venigalla:
Software documentation and augmented reality: love or arranged marriage? 1529-1532 - Md Sohel Ahmed, Fuyuki Ishikawa, Mahito Sugiyama:
Testing machine learning code using polyhedral region. 1533-1536 - Haipeng Cai, Shiv Raj Pant, Wen Li:
Towards learning visual semantics. 1537-1540
Tool Demonstrations
- Jiayi Yang, Wenxi Wang, Darko Marinov, Sarfraz Khurshid:
AlloyMC: Alloy meets model counting. 1541-1545 - Marcelo Schmitt Laser, Nenad Medvidovic, Duc Minh Le, Joshua Garcia:
ARCADE: an extensible workbench for architecture recovery, change, and decay evaluation. 1546-1550 - Yang Song, Oscar Chaparro:
BEE: a tool for structuring and analyzing bug reports. 1551-1555 - Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo, Eng Lieh Ouh:
BugsInPy: a database of existing bugs in Python programs to enable controlled testing and debugging studies. 1556-1560 - Kaan Ünlü, Baris Ardiç, Eray Tüzün:
CRSG: a serious game for teaching code review. 1561-1565 - Xiaoqin Fu, Haipeng Cai, Li Li:
Dads: dynamic slicing continuously-running distributed programs with budget constraints. 1566-1570 - Boao Li, Meng Yan, Xin Xia, Xing Hu, Ge Li, David Lo:
DeepCommenter: a deep code comment generation tool with hybrid lexical and syntactical information. 1571-1575 - Han Wang, Chunyang Chen, Zhenchang Xing, John C. Grundy:
DiffTech: a tool for differencing similar technologies from question-and-answer discussions. 1576-1580 - Lingfeng Bao, Shengyi Pan, Zhenchang Xing, Xin Xia, David Lo, Xiaohu Yang:
Enhancing developer interactions with programming screencasts through accurate code extraction. 1581-1585 - Fangcheng Qiu, Meng Yan, Xin Xia, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo:
JITO: a tool for just-in-time defect identification and localization. 1586-1590 - Rehab El Hajj, Sarah Nadi:
LibComp: an IntelliJ plugin for comparing Java libraries. 1591-1595 - Abtin Molavi, Mara Downing, Tommy Schneider, Lucas Bang:
MCBAT: a practical tool for model counting constraints on bounded integer arrays. 1596-1600 - Ye Liu, Yi Li, Shang-Wei Lin, Qiang Yan:
ModCon: a model-based testing platform for smart contracts. 1601-1605 - Anup K. Kalia, Jin Xiao, Chen Lin, Saurabh Sinha, John J. Rofrano, Maja Vukovic, Debasish Banerjee:
Mono2Micro: an AI-based toolchain for evolving monolithic enterprise applications to a microservice architecture. 1606-1610 - Camilo Escobar-Velásquez, Diego Riveros, Mario Linares-Vásquez:
MutAPK 2.0: a tool for reducing mutation testing effort of Android apps. 1611-1615 - Rebecca Brunner, Robert Dyer, Maria Paquin, Elena Sherman:
PAClab: a program analysis collaboratory. 1616-1620 - Wen Li, Haipeng Cai, Yulei Sui, David O. Manz:
PCA: memory leak detection using partial call-path analysis. 1621-1625 - Ali Ghanbari, Andrian Marcus:
PRF: a framework for building automatic program repair prototypes for JVM-based languages. 1626-1629 - Renjue Li, Jianlin Li, Cheng-Chao Huang, Pengfei Yang, Xiaowei Huang, Lijun Zhang, Bai Xue, Holger Hermanns:
PRODeep: a platform for robustness verification of deep neural networks. 1630-1634 - Xie Li, Yi Li, Yong Li, Xuechao Sun, Andrea Turrini, Lijun Zhang:
SVMRanker: a general termination analysis framework of loop programs via SVM. 1635-1639 - Daniil Tiganov, Jeff Cho, Karim Ali, Julian Dolby:
SWAN: a static analysis framework for swift. 1640-1644 - Alex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy:
Threshy: supporting safe usage of intelligent web services. 1645-1649 - Anthony Peruma, Khalid Almalki, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni, Fabio Palomba:
tsDetect: an open source test smells detection tool. 1650-1654 - Mulong Xie, Sidong Feng, Zhenchang Xing, Jieshan Chen, Chunyang Chen:
UIED: a hybrid tool for GUI element detection. 1655-1659 - Mohammad Alahmadi, Ahmad Tayeb, Abdulkarim Khormi, Esteban Parra, Sonia Haiduc:
UIScreens: extracting user interface screens from mobile programming video tutorials. 1660-1664 - Konner Macias, Mihir Mathur, Bobby R. Bruce, Tianyi Zhang, Miryung Kim:
WebJShrink: a web service for debloating Java bytecode. 1665-1669
Doctoral Symposium
- Zhendong Wang:
Assisting the elite-driven open source development through activity data. 1670-1673 - Mairieli Santos Wessel:
Enhancing developers' support on pull requests activities with software bots. 1674-1677 - Ján Cegin:
Machine learning based test data generation for safety-critical software. 1678-1681 - Camila Mariane Costa Silva:
Reusing software engineering knowledge from developer communication. 1682-1685 - Orges Cico:
Towards transferring lean software startup practices in software engineering education. 1686-1689
Student Research Competition
- Rozaliya Amirova:
Attention tracking for developers. 1690-1692 - Zamira Kholmatova:
Impact of programming languages on energy consumption for mobile devices. 1693-1695 - Dragos Strugar:
Recommender systems: metric suggestion mechanisms applied to adaptable software dashboards. 1696-1698 - Yuchi Tian:
Repairing confusion and bias errors for DNN-based image classifiers. 1699-1700 - Joshua Gisi:
Synthesizing correct code for machine learning programs. 1701-1703
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.