


default search action
19th ESEC / 28th SIGSOFT FSE 2020: Virtual Event, USA
- Prem Devanbu, Myra B. Cohen, Thomas Zimmermann:
ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020. ACM 2020, ISBN 978-1-4503-7043-1
Analysis
- Changjian Zhang
, David Garlan, Eunsuk Kang:
A behavioral notion of robustness for software systems. 1-12 - Sahar Badihi, Faridah Akinotcho, Yi Li
, Julia Rubin
:
ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common code. 13-24 - Juan Zhai
, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang
, Shiqing Ma, Lin Tan, Xiangyu Zhang:
C2S: translating natural language comments to formal program specifications. 25-37 - Mingxue Zhang, Wei Meng
:
Detecting and understanding JavaScript global identifier conflicts on the web. 38-49 - Dirk Beyer
, Karlheinz Friedberger
:
Domain-independent interprocedural program analysis using block-abstraction memoization. 50-62 - Profir-Petru Pârtachi
, Santanu Kumar Dash
, Miltiadis Allamanis
, Earl T. Barr
:
Flexeme: untangling commits using lexical flows. 63-74 - Zifan Nan, Hui Guan, Xipeng Shen:
HISyn: human learning-inspired natural language programming. 75-86 - Shivam Handa, Martin C. Rinard:
Inductive program synthesis over noisy data. 87-98 - Shahar Maoz
, Rafi Shalom
:
Inherent vacuity for GR(1) specifications. 99-110 - Rongchen Xu, Fei He
, Bow-Yaw Wang:
Interval counterexamples for loop invariant learning. 111-122 - Vaibhav Sharma
, Soha Hussein
, Michael W. Whalen
, Stephen McCamant, Willem Visser
:
Java Ranger: statically summarizing regions for efficient symbolic execution of Java. 123-134 - Bobby R. Bruce
, Tianyi Zhang, Jaspreet Arora, Guoqing Harry Xu
, Miryung Kim:
JShrink: in-depth investigation into debloating modern Java applications. 135-146 - Sooyoung Cha, Hakjoo Oh:
Making symbolic execution promising by learning aggressive state-pruning strategy. 147-158 - Khouloud Gaaloul, Claudio Menghi
, Shiva Nejati, Lionel C. Briand, David Wolfe:
Mining assumptions for software components using machine learning. 159-171 - Rahul Gopinath
, Björn Mathis, Andreas Zeller
:
Mining input grammars from dynamic control flow. 172-183 - Dominik Helm
, Florian Kübler, Michael Reif, Michael Eichberg, Mira Mezini:
Modular collaborative program analysis in OPAL. 184-196 - David Trabish, Timotej Kapus
, Noam Rinetzky, Cristian Cadar
:
Past-sensitive pointer analysis for symbolic execution. 197-208 - Michael Pradel, Georgios Gousios, Jason Liu, Satish Chandra:
TypeWriter: neural type prediction with search-based validation. 209-220 - Yizhuo Zhai
, Yu Hao
, Hang Zhang, Daimeng Wang, Chengyu Song
, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy
, Paul L. Yu
:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. 221-232
APIs
- Jiawei Wang, Li Li, Kui Liu
, Haipeng Cai
:
Exploring how deprecated Python library APIs are (not) handled. 233-244 - Enrique Larios Vargas, Maurício Finavaro Aniche, Christoph Treude
, Magiel Bruntink, Georgios Gousios:
Selecting third-party libraries: the practitioners' perspective. 245-256
Cloud / Services
- Alan Cha, Erik Wittern, Guillaume Baudart, James C. Davis
, Louis Mandel, Jim Alain Laredo:
A principled approach to GraphQL query cost analysis. 257-268 - Alex Cummaudo
, Scott Barnett
, Rajesh Vasa
, John C. Grundy
, Mohamed Abdelrazek
:
Beware the evolving 'intelligent' web service! an integration architecture tactic to guard AI-first components. 269-280 - Malik Bouchet, Byron Cook, Bryant Cutler, Anna Druzkina, Andrew Gacek, Liana Hadarean, Ranjit Jhala, Brad Marshall, Daniel Peebles, Neha Rungta, Cole Schlesinger, Chriss Stephens, Carsten Varming, Andy Warfield:
Block public access: trust safety verification of access control policies. 281-291 - Jiazhen Gu, Chuan Luo, Si Qin, Bo Qiao
, Qingwei Lin, Hongyu Zhang
, Ze Li, Yingnong Dang, Shaowei Cai
, Wei Wu, Yangfan Zhou, Murali Chintalapati, Dongmei Zhang:
Efficient incident identification from multi-dimensional issue reports via meta-heuristic search. 292-303 - Yujun Chen, Xian Yang
, Hang Dong, Xiaoting He, Hongyu Zhang
, Qingwei Lin, Junjie Chen, Pu Zhao, Yu Kang, Feng Gao, Zhangwei Xu, Dongmei Zhang:
Identifying linked incidents in large-scale online service systems. 304-314 - Nengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei
:
Real-time incident prediction for online service systems. 315-326
Configuration
- Carmine Vassallo
, Sebastian Proksch
, Anna Jancso, Harald C. Gall, Massimiliano Di Penta:
Configuration smells in continuous delivery pipelines: a linter and a six-month study on GitLab. 327-337 - Norbert Siegmund
, Nicolai Ruckel
, Janet Siegmund:
Dimensions of software configuration: on the configuration context in modern software development. 338-349 - Liu Liu, Sibren Isaacman
, Ulrich Kremer:
Global cost/quality management across multiple applications. 350-361 - Qingrong Chen, Teng Wang
, Owolabi Legunsen, Shanshan Li, Tianyin Xu:
Understanding and discovering software configuration dependencies in cloud and datacenter systems. 362-374
Documentation
- Samim Mirhosseini, Chris Parnin:
Docable: evaluating the executability of software tutorials. 375-385 - Sahar Mehrpour, Thomas D. LaToza, Hamed Sarvari:
RulePad: interactive authoring of checkable design rules. 386-397
Empirical
- Xin Tan, Minghui Zhou, Zeyu Sun:
A first look at good first issues on GitHub. 398-409 - Phillip Merlin Uesbeck
, Cole S. Peterson, Bonita Sharif
, Andreas Stefik:
A randomized controlled trial on the effects of embedded computer language switching. 410-420 - Jefferson De Oliveira Silva, Igor Wiese, Daniel M. Germán, Christoph Treude
, Marco Aurélio Gerosa
, Igor Steinmacher:
A theory of the engagement in open source projects via summer of code programs. 421-431 - Jacob Krüger
, Thorsten Berger:
An empirical analysis of the costs of clone- and platform-oriented software reuse. 432-444 - Linda Erlenhov
, Francisco Gomes de Oliveira Neto, Philipp Leitner
:
An empirical study of bots in software development: characteristics and challenges from a practitioner's perspective. 445-455 - Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander
, Westley Weimer:
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines. 456-468 - Ben Hermann
, Stefan Winter, Janet Siegmund:
Community expectations for research artifacts and evaluation processes. 469-480 - Mahnaz Behroozi, Shivani Shirolkar, Titus Barik, Chris Parnin:
Does stress impact technical interview performance? 481-492 - Yvonne Dittrich
, Christian Bo Michelsen, Paolo Tell
, Pernille Lous, Allan Ebdrup:
Exploring the evolution of software practices. 493-504 - Hemank Lamba, Asher Trockman, Daniel Armanios
, Christian Kästner, Heather Miller, Bogdan Vasilescu
:
Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystem. 505-517 - Kaifeng Huang, Bihuan Chen, Bowen Shi, Ying Wang, Congying Xu, Xin Peng:
Interactive, effort-aware library version harmonization. 518-529 - Jaeseong Lee, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
On the naturalness of hardware descriptions. 530-542 - Umme Ayda Mannan, Iftekhar Ahmed, Carlos Jensen, Anita Sarma
:
On the relationship between design discussions and design quality: a case study of Apache projects. 543-555 - Massimiliano Di Penta, Gabriele Bavota
, Fiorella Zampetti:
On the relationship between refactoring actions and bugs: a differentiated replication. 556-567 - Hennie Huijgens, Ayushi Rastogi
, Ernst Mulders, Georgios Gousios, Arie van Deursen
:
Questions for data scientists in software engineering: a replication. 568-579 - Yi Wang, Min Zhang
:
Reducing implicit gender biases in software development: does intergroup contact theory work? 580-592 - Sergio García, Daniel Strüber, Davide Brugali, Thorsten Berger, Patrizio Pelliccione
:
Robotics software engineering: a perspective from the service robotics domain. 593-604 - Dan Gopstein, Anne-Laure Fayard
, Sven Apel
, Justin Cappos:
Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusion. 605-616 - Yiling Lou, Zhenpeng Chen
, Yanbin Cao, Dan Hao
, Lu Zhang:
Understanding build issue resolution in practice: symptoms and fix patterns. 617-628 - Ameya Ketkar, Nikolaos Tsantalis
, Danny Dig
:
Understanding type changes in Java. 629-641
Fairness
- Sumon Biswas
, Hridesh Rajan
:
Do the machine learning models on a crowd sourced platform exhibit bias? an empirical study on model fairness. 642-653 - Joymallya Chakraborty, Suvodeep Majumder, Zhe Yu, Tim Menzies:
Fairway: a way to build fair ML software. 654-665 - Ye Liu, Yi Li
, Shang-Wei Lin, Rong Zhao:
Towards automated verification of smart contract fairness. 666-677
Fuzzing
- Marcel Böhme
, Valentin J. M. Manès, Sang Kil Cha
:
Boosting fuzzer efficiency: an information theoretic perspective. 678-689 - Suhwan Song, Chengyu Song
, Yeongjin Jang, Byoungyoung Lee:
CrFuzz: fuzzing multi-purpose programs through input validation. 690-700 - Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang:
Detecting critical bugs in SMT solvers using blackbox mutational fuzzing. 701-712 - Marcel Böhme
, Brandon Falk:
Fuzzing: on the exponential cost of vulnerability discovery. 713-724 - Patrice Godefroid, Bo-Yuan Huang
, Marina Polishchuk:
Intelligent REST API data fuzzing. 725-736 - Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray:
MTFuzz: fuzzing with a multi-task neural network. 737-749
Machine Learning
- Zhenpeng Chen
, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie
, Xuanzhe Liu
:
A comprehensive study on challenges in deploying deep learning based software. 750-762 - José Pablo Cambronero, Jürgen Cito, Martin C. Rinard:
AMS: generating AutoML search spaces from weak specifications. 763-774 - Shenao Yan
, Guanhong Tao, Xuwei Liu, Juan Zhai
, Shiqing Ma, Lei Xu, Xiangyu Zhang:
Correlations between deep neural network model coverage criteria and model quality. 775-787 - Zan Wang, Ming Yan
, Junjie Chen, Shuang Liu, Dongdi Zhang:
Deep learning library testing via effective model generation. 788-799 - Fuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis:
DeepSearch: a simple and effective blackbox attack for deep neural networks. 800-812 - Simin Chen, Soroush Bateni
, Sampath Grandhi, Xiaodi Li
, Cong Liu, Wei Yang:
DENAS: automated rule generation by knowledge extraction from neural networks. 813-825 - Yuhao Zhang, Luyao Ren, Liqian Chen, Yingfei Xiong, Shing-Chi Cheung
, Tao Xie
:
Detecting numerical bugs in neural network architectures. 826-837 - Ziqi Zhang, Yuanchun Li, Yao Guo
, Xiangqun Chen, Yunxin Liu:
Dynamic slicing for deep neural networks. 838-850 - Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quanquan Gu, Miryung Kim:
Is neuron coverage a meaningful measure for testing deep neural networks? 851-862 - Shashij Gupta, Pinjia He, Clara Meister, Zhendong Su
:
Machine translation testing via pathological invariance. 863-875 - Vincenzo Riccio
, Paolo Tonella
:
Model-based exploration of the frontier of behaviours for deep learning system testing. 876-888 - Rangeet Pan
, Hridesh Rajan
:
On decomposing a deep neural network into modules. 889-900 - Zenan Li, Xiaoxing Ma, Chang Xu, Jingwei Xu, Chun Cao, Jian Lu:
Operational calibration: debugging confidence errors for DNNs in the field. 901-913
Mobile
- Yutian Tang
, Yulei Sui
, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. 914-926 - Reyhaneh Jabbarvand, Forough Mehralian, Sam Malek:
Automated construction of energy test oracles for Android. 927-938 - Jun Gao
, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein
:
Borrowing your enemy's arrows: the case of code reuse in Android via direct inter-app code invocation. 939-951 - Linjie Pan, Baoquan Cui, Hao Liu, Jiwei Yan, Siqi Wang, Jun Yan, Jian Zhang:
Static asynchronous component misuse detection for Android applications. 952-963
Performance / QoS
- Yutong Zhao
, Lu Xiao, Pouria Babvey, Lei Sun
, Sunny Wong, Angel A. Martinez, Xiao Wang:
Automatically identifying performance issue reports with heuristic linguistic patterns. 964-975 - Timur Babakol
, Anthony Canino, Khaled Mahmoud
, Rachit Saxena, Yu David Liu:
Calm energy accounting for multithreaded Java applications. 976-988 - Christoph Laaber
, Stefan Würsten, Harald C. Gall, Philipp Leitner
:
Dynamically reconfiguring software microbenchmarks: reducing execution time without sacrificing result quality. 989-1001 - Claudio Mandrioli
, Martina Maggio
:
Testing self-adaptive software with probabilistic guarantees on performance metrics. 1002-1014
Recommendation
- Wenkai Xie, Xin Peng, Mingwei Liu
, Christoph Treude
, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao:
API method recommendation via explicit matching of functionality verb phrases. 1015-1026 - Tam Nguyen, Phong Vu, Tung Nguyen:
Code recommendation for exception handling. 1027-1038 - Arman Shahbazian, Suhrid Karthik, Yuriy Brun
, Nenad Medvidovic
:
eQual: informing early design decisions. 1039-1051 - Sonal Mahajan, Negarsadat Abolhassani, Mukul R. Prasad:
Recommending stack overflow posts for fixing runtime exceptions using failure scenario matching. 1052-1064 - Chris Brown
, Chris Parnin:
Understanding the impact of GitHub suggested changes on recommendations between developers. 1065-1076
Security
- Kripa Shanker, Arun Joseph
, Vinod Ganapathy:
An evaluation of methods to port legacy code to SGX enclaves. 1077-1088 - Salah Ghamizi, Maxime Cordy, Martin Gubri
, Mike Papadakis
, Andrey Boytsov, Yves Le Traon
, Anne Goujon:
Search-based adversarial testing and improvement of constrained credit scoring systems. 1089-1100 - Pan Bian, Bin Liang, Jianjun Huang
, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. 1101-1113
Testing
- Eduard Baranov, Axel Legay, Kuldeep S. Meel:
Baital: an adaptive weighted sampling approach for improved t-wise coverage. 1114-1126 - Giovani Guizzo
, Federica Sarro
, Mark Harman:
Cost measures matter for mutation testing study validity. 1127-1139 - Manuel Rigger, Zhendong Su
:
Detecting optimization bugs in database engines via non-optimizing reference engine construction. 1140-1152 - M. Ammar Ben Khadra, Dominik Stoffel, Wolfgang Kunz:
Efficient binary-level coverage analysis. 1153-1164 - Chu-Pan Wong, Jens Meinicke, Leo Chen, João Paulo Diniz, Christian Kästner, Eduardo Figueiredo:
Efficiently finding higher-order mutants. 1165-1177 - Valerio Terragni
, Gunel Jahangirova, Paolo Tonella
, Mauro Pezzè
:
Evolutionary improvement of assertion oracles. 1178-1189 - Yixue Zhao
, Justin Chen, Adriana Sejfia, Marcelo Schmitt Laser, Jie Zhang, Federica Sarro
, Mark Harman, Nenad Medvidovic
:
FrUITeR: a framework for evaluating UI test reuse. 1190-1201 - Jieshan Chen
, Mulong Xie, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu
, Guoqiang Li:
Object detection for graphical user interface: old fashioned or deep learning or a combination? 1202-1214 - Rahmadi Trimananda, Seyed Amir Hossein Aqajari, Jason Chuang, Brian Demsky, Guoqing Harry Xu
, Shan Lu:
Understanding and automatically detecting conflicting interactions between smart home IoT applications. 1215-1227 - Alexander Kampmann
, Nikolas Havrikov
, Ezekiel O. Soremekun
, Andreas Zeller
:
When does my program do this? learning circumstances of software behavior. 1228-1239
Industry Papers
- Zi Peng, Jinqiu Yang, Tse-Hsun (Peter) Chen
, Lei Ma:
A first look at the integration of machine learning models in complex autonomous driving systems: a case study on Apollo. 1240-1250 - Alexander Suh
:
Adapting bug prediction models to predict reverted commits at Wayfair. 1251-1262 - Shinobu Saito
, Yukako Iimura, Emad Aghayi
, Thomas D. LaToza:
Can microtask programming work in industry? 1263-1273 - Bennett Mackenzie, Vera Pantelic, Gordon Marks, Stephen Wynn-Williams, Gehan M. K. Selim, Mark Lawford, Alan Wassyng, Moustapha Diab, Feisel Weslati:
Change impact analysis in Simulink designs of embedded systems. 1274-1284 - Linyi Li
, Zhenwen Li, Weijie Zhang, Jun Zhou, Pengcheng Wang, Jing Wu, Guanghua He, Xia Zeng, Yuetang Deng, Tao Xie
:
Clustering test steps in natural language toward automating test automation. 1285-1295 - Jiazhen Gu, Jiaqi Wen, Zijian Wang, Pu Zhao, Chuan Luo, Yu Kang, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Bo Qiao
, Liqun Li, Qingwei Lin, Dongmei Zhang:
Efficient customer incident triage via linking with system incidents. 1296-1307 - Meng Yan
, Xin Xia, Yuanrui Fan, David Lo
, Ahmed E. Hassan, Xindong Zhang:
Effort-aware just-in-time defect identification in practice: a case study at Alibaba. 1308-1319 - Yu Liu, Cheng Chen, Ru Zhang, Tingting Qin, Xiang Ji, Haoxiang Lin
, Mao Yang:
Enhancing the interoperability between deep learning frameworks by model conversion. 1320-1330 - Cem Sürücü, Bianying Song, Jacob Krüger
, Gunter Saake, Thomas Leich:
Establishing key performance indicators for measuring software-development processes at a large organization. 1331-1341 - Yanjie Gao, Yu Liu, Hongyu Zhang
, Zhengxian Li, Yonghao Zhu, Haoxiang Lin
, Mao Yang:
Estimating GPU memory consumption of deep learning models. 1342-1352 - Celeste Barnaby, Koushik Sen, Tianyi Zhang, Elena L. Glassman, Satish Chandra:
Exempla gratis (E.G.): code examples for free. 1353-1364 - He Zhang, Huang Huang
, Dong Shao, Xin Huang:
Fireteam: a small-team development practice in industry. 1365-1375 - Jincao Feng, Weikai Miao, Hanyue Zheng, Yihao Huang, Jianwen Li, Zheng Wang, Ting Su, Bin Gu, Geguang Pu, Mengfei Yang, Jifeng He:
FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain. 1376-1386 - Xiaofeng Guo, Xin Peng, Hanzhang Wang, Wanxue Li, Huai Jiang, Dan Ding, Tao Xie
, Liangfei Su:
Graph-based trace analysis for microservice architecture understanding and problem diagnosis. 1387-1397 - Valentin Wüstholz, Maria Christakis:
Harvey: a greybox fuzzer for smart contracts. 1398-1409 - Jiajun Jiang, Weihai Lu, Junjie Chen, Qingwei Lin, Pu Zhao, Yu Kang, Hongyu Zhang
, Yingfei Xiong, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
How to mitigate the incident? an effective troubleshooting guide recommendation technique for online service systems. 1410-1420 - Frederico Araujo, Teryl Taylor:
Improving cybersecurity hygiene through JIT patching. 1421-1432 - Alexey Svyatkovskiy, Shao Kun Deng, Shengyu Fu, Neel Sundaresan:
IntelliCode compose: code generation using transformer. 1433-1443 - Lin Shi
, Mingyang Li, Mingzhe Xing, Yawen Wang
, Qing Wang, Xinhua Peng, Weimin Liao, Guizhen Pi, Haiqing Wang:
Learning to extract transaction function from requirements: an industrial case on financial software. 1444-1454 - Gvozden Marinkovic, Nikola Lukic, Nenad Medvidovic
:
Online sports betting through the prism of software engineering. 1455-1465 - Jinhan Kim, Jeongil Ju, Robert Feldt, Shin Yoo:
Reducing DNN labelling cost using surprise adequacy: an industrial case study for autonomous driving. 1466-1476 - Jie Wang, Yunguang Wu, Gang Zhou, Yiming Yu, Zhenyu Guo, Yingfei Xiong:
Scaling static taint analysis to industrial SOA applications: a case study at Alibaba. 1477-1486 - Zhuangbin Chen, Yu Kang, Liqun Li, Xu Zhang, Hongyu Zhang
, Hui Xu, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Yingnong Dang, Feng Gao, Pu Zhao, Bo Qiao
, Qingwei Lin, Dongmei Zhang, Michael R. Lyu:
Towards intelligent incident management: why we need it and how we make it. 1487-1497 - Zhenyue Long, Guoquan Wu, Xiaojiang Chen, Wei Chen, Jun Wei:
WebRR: self-replay enhanced robust record/replay for web application testing. 1498-1508
Visions and Reflections
- Christoph Treude
, Justin Middleton, Thushari Atapattu:
Beyond accuracy: assessing software documentation quality. 1509-1512 - Anh Nguyen-Duc, Pekka Abrahamsson:
Continuous experimentation on artificial intelligence software: a research agenda. 1513-1516 - Paul Gazzillo
:
Inferring and securing software configurations using automated reasoning. 1517-1520 - James Ivers
, Ipek Ozkaya
, Robert L. Nord, Chris Seifried:
Next generation automated software evolution refactoring at scale. 1521-1524 - Vard Antinyan
:
Revealing the complexity of automotive software. 1525-1528 - Sridhar Chimalakonda, Akhila Sri Manasa Venigalla:
Software documentation and augmented reality: love or arranged marriage? 1529-1532 - Md Sohel Ahmed
, Fuyuki Ishikawa
, Mahito Sugiyama
:
Testing machine learning code using polyhedral region. 1533-1536 - Haipeng Cai
, Shiv Raj Pant, Wen Li:
Towards learning visual semantics. 1537-1540
Tool Demonstrations
- Jiayi Yang
, Wenxi Wang, Darko Marinov, Sarfraz Khurshid:
AlloyMC: Alloy meets model counting. 1541-1545 - Marcelo Schmitt Laser, Nenad Medvidovic
, Duc Minh Le, Joshua Garcia:
ARCADE: an extensible workbench for architecture recovery, change, and decay evaluation. 1546-1550 - Yang Song, Oscar Chaparro
:
BEE: a tool for structuring and analyzing bug reports. 1551-1555 - Ratnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang
, Thong Hoang, David Lo
, Eng Lieh Ouh:
BugsInPy: a database of existing bugs in Python programs to enable controlled testing and debugging studies. 1556-1560 - Kaan Ünlü
, Baris Ardiç
, Eray Tüzün
:
CRSG: a serious game for teaching code review. 1561-1565 - Xiaoqin Fu, Haipeng Cai
, Li Li:
Dads: dynamic slicing continuously-running distributed programs with budget constraints. 1566-1570 - Boao Li, Meng Yan
, Xin Xia, Xing Hu, Ge Li, David Lo
:
DeepCommenter: a deep code comment generation tool with hybrid lexical and syntactical information. 1571-1575 - Han Wang, Chunyang Chen, Zhenchang Xing, John C. Grundy
:
DiffTech: a tool for differencing similar technologies from question-and-answer discussions. 1576-1580 - Lingfeng Bao, Shengyi Pan, Zhenchang Xing, Xin Xia, David Lo
, Xiaohu Yang:
Enhancing developer interactions with programming screencasts through accurate code extraction. 1581-1585 - Fangcheng Qiu, Meng Yan
, Xin Xia, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo
:
JITO: a tool for just-in-time defect identification and localization. 1586-1590 - Rehab El Hajj, Sarah Nadi:
LibComp: an IntelliJ plugin for comparing Java libraries. 1591-1595 - Abtin Molavi
, Mara Downing, Tommy Schneider, Lucas Bang:
MCBAT: a practical tool for model counting constraints on bounded integer arrays. 1596-1600 - Ye Liu, Yi Li
, Shang-Wei Lin, Qiang Yan:
ModCon: a model-based testing platform for smart contracts. 1601-1605 - Anup K. Kalia, Jin Xiao, Chen Lin, Saurabh Sinha, John J. Rofrano, Maja Vukovic, Debasish Banerjee:
Mono2Micro: an AI-based toolchain for evolving monolithic enterprise applications to a microservice architecture. 1606-1610 - Camilo Escobar-Velásquez
, Diego Riveros, Mario Linares-Vásquez:
MutAPK 2.0: a tool for reducing mutation testing effort of Android apps. 1611-1615 - Rebecca Brunner, Robert Dyer
, Maria Paquin, Elena Sherman:
PAClab: a program analysis collaboratory. 1616-1620 - Wen Li, Haipeng Cai
, Yulei Sui
, David O. Manz:
PCA: memory leak detection using partial call-path analysis. 1621-1625 - Ali Ghanbari
, Andrian Marcus
:
PRF: a framework for building automatic program repair prototypes for JVM-based languages. 1626-1629 - Renjue Li, Jianlin Li
, Cheng-Chao Huang, Pengfei Yang, Xiaowei Huang, Lijun Zhang
, Bai Xue, Holger Hermanns
:
PRODeep: a platform for robustness verification of deep neural networks. 1630-1634 - Xie Li, Yi Li, Yong Li
, Xuechao Sun, Andrea Turrini
, Lijun Zhang
:
SVMRanker: a general termination analysis framework of loop programs via SVM. 1635-1639 - Daniil Tiganov, Jeff Cho, Karim Ali, Julian Dolby:
SWAN: a static analysis framework for swift. 1640-1644 - Alex Cummaudo
, Scott Barnett
, Rajesh Vasa
, John C. Grundy
:
Threshy: supporting safe usage of intelligent web services. 1645-1649 - Anthony Peruma
, Khalid Almalki, Christian D. Newman
, Mohamed Wiem Mkaouer
, Ali Ouni
, Fabio Palomba:
tsDetect: an open source test smells detection tool. 1650-1654 - Mulong Xie, Sidong Feng, Zhenchang Xing, Jieshan Chen
, Chunyang Chen:
UIED: a hybrid tool for GUI element detection. 1655-1659 - Mohammad Alahmadi
, Ahmad Tayeb
, Abdulkarim Khormi, Esteban Parra, Sonia Haiduc:
UIScreens: extracting user interface screens from mobile programming video tutorials. 1660-1664 - Konner Macias
, Mihir Mathur, Bobby R. Bruce
, Tianyi Zhang, Miryung Kim:
WebJShrink: a web service for debloating Java bytecode. 1665-1669
Doctoral Symposium
- Zhendong Wang:
Assisting the elite-driven open source development through activity data. 1670-1673 - Mairieli Santos Wessel:
Enhancing developers' support on pull requests activities with software bots. 1674-1677 - Ján Cegin:
Machine learning based test data generation for safety-critical software. 1678-1681 - Camila Mariane Costa Silva
:
Reusing software engineering knowledge from developer communication. 1682-1685 - Orges Cico:
Towards transferring lean software startup practices in software engineering education. 1686-1689
Student Research Competition
- Rozaliya Amirova:
Attention tracking for developers. 1690-1692 - Zamira Kholmatova:
Impact of programming languages on energy consumption for mobile devices. 1693-1695 - Dragos Strugar:
Recommender systems: metric suggestion mechanisms applied to adaptable software dashboards. 1696-1698 - Yuchi Tian:
Repairing confusion and bias errors for DNN-based image classifiers. 1699-1700 - Joshua Gisi:
Synthesizing correct code for machine learning programs. 1701-1703

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.