default search action
20th ESEC / 29th SIGSOFT FSE 2021: Athens, Greece
- Diomidis Spinellis, Georgios Gousios, Marsha Chechik, Massimiliano Di Penta:
ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Athens, Greece, August 23-28, 2021. ACM 2021, ISBN 978-1-4503-8562-6
Invited Presentations
- Mira Mezini:
Programming and execution models for next generation code intelligence systems (keynote). 1-2 - Nachiappan Nagappan:
The 4ps: product, process, people, and productivity: a data-driven approach to improve software engineering (keynote). 3 - Gerard J. Holzmann:
Interactive analysis of large code bases (invited talk). 4 - Han Schaminée:
Managers hate uncertainty: good and bad experiences with adaptive project management (invited talk). 5 - John Micco:
Industrial best practices for continuous integration (CI) and continuously delivery (CD) (invited talk). 6 - Wilson Wang:
Huawei's practices on trusted software engineering capability improvement (invited talk). 7
Cyber-Physical Systems
- Michael Vierhauser, Md Nafee Al Islam, Ankit Agrawal, Jane Cleland-Huang, James Mason:
Hazard analysis for human-on-the-loop interactions in sUAS systems. 8-19 - Dinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu, Yulei Sui:
An exploratory study of autopilot software bugs in unmanned aerial vehicles. 20-31 - Yuqi Chen, Christopher M. Poskitt, Jun Sun:
Code integrity attestation for PLCs using black box neural network predictions. 32-44 - Sayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang, Sebastian G. Elbaum:
PHYSFRAME: type checking physical frames of reference for robotic systems. 45-56
Continuous Integration and Delivery
- Daniel Sokolowski, Pascal Weisenburger, Guido Salvaneschi:
Automating serverless deployments for DevOps organizations. 57-69
Mobile Analysis and Testing
- Sydur Rahaman, Iulian Neamtiu, Xin Yin:
Algebraic-datatype taint tracking, with applications to understanding Android identifier leaks. 70-82 - Wenyu Wang, Wei Yang, Tianyin Xu, Tao Xie:
Vet: identifying and avoiding UI exploration tarpits. 83-94 - Zhen Zhang, Yu Feng, Michael D. Ernst, Sebastian Porst, Isil Dillig:
Checking conformance of applications against GUI policies. 95-106
Mobile Human-Computer Interaction
- Forough Mehralian, Navid Salehnamadi, Sam Malek:
Data-driven accessibility repair revisited: on the effectiveness of generating labels for icons in Android apps. 107-118 - Ting Su, Jue Wang, Zhendong Su:
Benchmarking automated GUI testing for Android against real-world bugs. 119-130
Model Checking
- Minjian Zhang, Umang Mathur, Mahesh Viswanathan:
Checking LTL[F, G, X] on compressed traces in polynomial time. 131-143 - Jie Su, Cong Tian, Zhenhua Duan:
Conditional interpolation: making concurrent program verification more effective. 144-154
Model-Driven Software Engineering
- Changjian Zhang, Ryan Wagner, Pedro Orvalho, David Garlan, Vasco Manquinho, Ruben Martins, Eunsuk Kang:
AlloyMax: bringing maximum satisfaction to relational specifications. 155-167 - Yanxiang Tong, Yi Qin, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma:
Timely and accurate detection of model deviation in self-adaptive software-intensive systems. 168-180
Dependability
- Martin Kellogg, Narges Shadab, Manu Sridharan, Michael D. Ernst:
Lightweight and modular resource leak verification. 181-192 - Mingxue Zhang, Wei Meng:
JSISOLATE: lightweight in-browser JavaScript isolation. 193-204
Code Recommendation
- George Mathew, Kathryn T. Stolee:
Cross-language code search using static and dynamic analyses. 205-217 - Zhipeng Gao, Xin Xia, David Lo, John C. Grundy, Thomas Zimmermann:
Automating the removal of obsolete TODO comments. 218-229
Fuzzing
- Marcel Böhme, Danushka Liyanage, Valentin Wüstholz:
Estimating residual risk in greybox fuzzing. 230-241 - Qian Zhang, Jiyuan Wang, Miryung Kim:
HeteroFuzz: fuzz testing to detect platform dependent divergence for heterogeneous applications. 242-254
Defect Prediction and Effort Estimation
- Yan Cai, Hao Yun, Jinqiu Wang, Lei Qiao, Jens Palsberg:
Sound and efficient concurrency bug prediction. 255-267
Vulnerabilities
- Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao:
Detecting Node.js prototype pollution vulnerabilities via object lookup analysis. 268-279 - Kunpeng Yu, Chenxu Wang, Yan Cai, Xiapu Luo, Zijiang Yang:
Detecting concurrency vulnerabilities based on partial orders of memory and thread events. 280-291 - Yi Li, Shaohua Wang, Tien N. Nguyen:
Vulnerability detection with fine-grained interpretations. 292-303 - Adriana Sejfia, Yixue Zhao, Nenad Medvidovic:
Identifying casualty changes in software patches. 304-315 - Yang Hu, Wenxi Wang, Casen Hunger, Riley Wood, Sarfraz Khurshid, Mohit Tiwari:
ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilities. 316-327
Program Repair
- Dowon Song, Woosuk Lee, Hakjoo Oh:
Context-aware and data-driven feedback generation for programming assignments. 328-340 - Qihao Zhu, Zeyu Sun, Yuan-an Xiao, Wenjie Zhang, Kang Yuan, Yingfei Xiong, Lu Zhang:
A syntax-guided edit decoder for neural program repair. 341-353 - Chu-Pan Wong, Priscila Santiesteban, Christian Kästner, Claire Le Goues:
VarFix: balancing edit expressiveness and search effectiveness in automated program repair. 354-366
Flaky Tests
- Zhen Dong, Abhishek Tiwari, Xiao Liang Yu, Abhik Roychoudhury:
Flaky test detection in Android via event order exploration. 367-378
Collaborative Software Engineering
- Bo Shen, Wei Zhang, Christian Kästner, Haiyan Zhao, Zhao Wei, Guangtai Liang, Zhi Jin:
SmartCommit: a graph-based interactive assistant for activity-oriented commits. 379-390 - Lin Shi, Xiao Chen, Ye Yang, Hanzhi Jiang, Ziyou Jiang, Nan Niu, Qing Wang:
A first look at developers' live chat on Gitter. 391-403 - Souti Chattopadhyay, Thomas Zimmermann, Denae Ford:
Reel life vs. real life: how software developers share their daily life through vlogs. 404-415
Cloud Computing
- Jinfeng Wen, Zhenpeng Chen, Yi Liu, Yiling Lou, Yun Ma, Gang Huang, Xin Jin, Xuanzhe Liu:
An empirical study on challenges of application development in serverless computing. 416-428
Search Based Software Engineering
- Joymallya Chakraborty, Suvodeep Majumder, Tim Menzies:
Bias in machine learning software: why? how? what to do? 429-440 - Md. Rafiqul Islam Rabin, Vincent J. Hellendoorn, Mohammad Amin Alipour:
Understanding neural code intelligence through program simplification. 441-452 - Tao Chen, Miqing Li:
Multi-objectivizing software configuration tuning. 453-465
Libraries and APIs
- Bo Li, Qiang He, Feifei Chen, Xin Xia, Li Li, John C. Grundy, Yun Yang:
Embedding app-library graph for neural third party library recommendation. 466-477 - Hao He, Runzhi He, Haiqiao Gu, Minghui Zhou:
A large-scale empirical study on Java library migrations: prevalence, trends, and rationales. 478-490 - Mingwei Liu, Xin Peng, Andrian Marcus, Christoph Treude, Xuefang Bai, Gang Lyu, Jiazhan Xie, Xiaoxin Zhang:
Learning-based extraction of first-order logic representations of API directives. 491-502
Development Tools
- Xiuheng Wu, Chenguang Zhu, Yi Li:
DIFFBASE: a differential factbase for effective software evolution management. 503-515 - Zehao Wang, Haoxiang Zhang, Tse-Hsun (Peter) Chen, Shaowei Wang:
Would you like a quick peek? providing logging support to monitor data processing in big data applications. 516-526
Code Review and Changes
- Nengwen Zhao, Junjie Chen, Zhaoyang Yu, Honglin Wang, Jiesong Li, Bin Qiu, Hongyu Xu, Wenchi Zhang, Kaixin Sui, Dan Pei:
Identifying bad software changes via multimodal anomaly detection for online service systems. 527-539
Refactoring
- Xiao Wang, Lu Xiao, Tingting Yu, Anne Woepse, Sunny Wong:
An automatic refactoring framework for replacing test-production inheritance by mocking mechanism. 540-552
Blockchain
- Wuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu, Shing-Chi Cheung:
ÐArcher: detecting on-chain-off-chain synchronization bugs in decentralized applications. 553-565 - Yibo Wang, Qi Zhang, Kai Li, Yuzhe Tang, Jiaqi Chen, Xiapu Luo, Ting Chen:
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations. 566-577
Recommender Systems
- Yanjie Jiang, Hui Liu, Yuxia Zhang, Nan Niu, Yuhai Zhao, Lu Zhang:
Which abbreviations should be expanded? 578-589
Testing of Machine Learning Models
- Songqiang Chen, Shuo Jin, Xiaoyuan Xie:
Validation on machine reading comprehension software without annotated labels: a property-based method. 590-602 - Saikat Dutta, August Shi, Sasa Misailovic:
FLEX: fixing flaky tests in machine learning projects by updating assertion bounds. 603-614
Analysis and Testing of Unconventional Software
- Sangeeta Chowdhary, Santosh Nagarakatte:
Parallel shadow execution to accelerate the debugging of numerical errors. 615-626 - Ming Yan, Junjie Chen, Xiangyu Zhang, Lin Tan, Gan Wang, Zan Wang:
Exposing numerical bugs in deep learning via gradient back-propagation. 627-638 - Muhammad Numair Mansur, Maria Christakis, Valentin Wüstholz:
Metamorphic testing of Datalog engines. 639-650
Human Computer Interaction
- Dylan Lukes, John Sarracino, Cora Coleman, Hila Peleg, Sorin Lerner, Nadia Polikarpova:
Synthesis of web layouts from examples. 651-663
Machine Learning for Software Engineering
- Yiling Lou, Qihao Zhu, Jinhao Dong, Xia Li, Zeyu Sun, Dan Hao, Lu Zhang, Lingming Zhang:
Boosting coverage-based fault localization via graph-based representation learning. 664-676 - Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena:
SynGuar: guaranteeing generalization in programming by example. 677-689 - Kexin Pei, Jonas Guan, Matthew Broughton, Zhongtian Chen, Songchen Yao, David Williams-King, Vikas Ummadisetty, Junfeng Yang, Baishakhi Ray, Suman Jana:
StateFormer: fine-grained type recovery from binaries using generative state modeling. 690-702 - Nadezhda Chirkova, Sergey Troshin:
Empirical study of transformers for source code. 703-715 - Jürgen Cito, Isil Dillig, Seohyun Kim, Vijayaraghavan Murali, Satish Chandra:
Explaining mispredictions of machine learning models using rule induction. 716-727 - Yi Ding, Ahsan Pervaiz, Michael Carbin, Henry Hoffmann:
Generalizable and interpretable learning for configuration extrapolation. 728-740
Program Comprehension
- Shangwen Wang, Ming Wen, Bo Lin, Xiaoguang Mao:
Lightweight global and local contexts guided method name recommendation with prior knowledge. 741-753 - Madeline Endres, Madison Fansher, Priti Shah, Westley Weimer:
To read or to rotate? comparing the effects of technical reading training and spatial skills training on novice programming ability. 754-766 - Zachary Karas, Andrew Jahn, Westley Weimer, Yu Huang:
Connecting the dots: rethinking the relationship between code and prose writing with functional connectivity. 767-779
Software Security
- Duc-Ly Vu, Fabio Massacci, Ivan Pashchenko, Henrik Plate, Antonino Sabetta:
LastPyMile: identifying the discrepancy between sources and packages. 780-792 - Nesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar:
A grounded theory of the role of coordination in software security patch management. 793-805 - Chengxu Yang, Yuanchun Li, Mengwei Xu, Zhenpeng Chen, Yunxin Liu, Gang Huang, Xuanzhe Liu:
TaintStream: fine-grained taint tracking for big data platforms through dynamic code translation. 806-817
Debugging
- Yida Tao, Zhihui Chen, Yepang Liu, Jifeng Xuan, Zhiwu Xu, Shengchao Qin:
Demystifying "bad" error messages in data science libraries. 818-829 - Tasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto:
NIL: large-scale detection of large-variance clones. 830-841 - Zhengyi Qiu, Shudi Shao, Qi Zhao, Guoliang Jin:
Understanding and detecting server-side request races in web applications. 842-854 - Paul T. Chiou, Ali S. Alotaibi, William G. J. Halfond:
Detecting and localizing keyboard accessibility failures in web applications. 855-867 - Chijung Jung, Ali Ahad, Jinho Jung, Sebastian G. Elbaum, Yonghwi Kwon:
Swarmbug: debugging configuration bugs in swarm robotics. 868-880 - Guancheng Wang, Ruobing Shen, Junjie Chen, Yingfei Xiong, Lu Zhang:
Probabilistic Delta debugging. 881-892
Bug Characterization and Fixing
- Jeho Oh, Necip Fazil Yildiran, Julian Braha, Paul Gazzillo:
Finding broken Linux configuration specifications by statically analyzing the Kconfig language. 893-905 - Jibesh Patra, Michael Pradel:
Semantic bug seeding: a learning-based approach for creating realistic bugs. 906-918
Mining Software Repositories
- Jiakun Liu, Sebastian Baltes, Christoph Treude, David Lo, Yun Zhang, Xin Xia:
Characterizing search activities on stack overflow. 919-931 - Egor Bogomolov, Vladimir Kovalenko, Yurii Rebryk, Alberto Bacchelli, Timofey Bryksin:
Authorship attribution of source code: a language-agnostic approach and applicability in software engineering. 932-944
Software Engineering for Machine Learning
- Sahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari:
Probing model signal-awareness via prediction-preserving input minimization. 945-955 - Shu Lin, Na Meng, Wenxin Li:
Generating efficient solvers from constraint models. 956-967 - Qingchao Shen, Haoyang Ma, Junjie Chen, Yongqiang Tian, Shing-Chi Cheung, Xiang Chen:
A comprehensive study of deep learning compiler bugs. 968-980 - Sumon Biswas, Hridesh Rajan:
Fair preprocessing: towards understanding compositional fairness of data transformers in machine learning pipeline. 981-993 - Max Hort, Jie M. Zhang, Federica Sarro, Mark Harman:
Fairea: a model behaviour mutation approach to benchmarking bias mitigation methods. 994-1006
Software Evolution
- Paul Maximilian Bittner, Alexander Schultheiß, Thomas Thüm, Timo Kehrer, Jeffrey M. Young, Lukas Linsbauer:
Feature trace recording. 1007-1020 - César Soto-Valero, Thomas Durieux, Benoit Baudry:
A longitudinal analysis of bloated Java dependencies. 1021-1031
Software Practices
- Nicholas Maltbie, Nan Niu, Matthew Van Doren, Reese Johnson:
XAI tools in the public sector: a case study on predicting combined sewer overflows. 1032-1044 - Dong Jae Kim, Bo Yang, Jinqiu Yang, Tse-Hsun (Peter) Chen:
How disabled tests manifest in test maintainability challenges? 1045-1055
Software Processes
- Likang Yin, Zhuangzhi Chen, Qi Xuan, Vladimir Filkov:
Sustainability forecasting for Apache incubator projects. 1056-1067
Test Generation
- Yun Lin, You Sheng Ong, Jun Sun, Gordon Fraser, Jin Song Dong:
Graph-based seed object synthesis for search-based unit testing. 1068-1080 - Chuan Luo, Binqi Sun, Bo Qiao, Junjie Chen, Hongyu Zhang, Jinkun Lin, Qingwei Lin, Dongmei Zhang:
LS-sampling: an effective local search based sampling approach for achieving high t-wise coverage. 1081-1092 - Ke Chen, Yufei Li, Yingfeng Chen, Changjie Fan, Zhipeng Hu, Wei Yang:
GLIB: towards automated test oracle for graphically-rich applications. 1093-1104
Metrics
- Devjeet Roy, Sarah Fakhoury, Venera Arnaoudova:
Reassessing automatic evaluation metrics for code summarization tasks. 1105-1116
Programming Languages
- Jialiang Tan, Yu Chen, Zhenming Liu, Bin Ren, Shuaiwen Leon Song, Xipeng Shen, Xu Liu:
Toward efficient interactions between Python and native libraries. 1117-1128 - Joonyoung Park, Jihyeok Park, Dongjun Youn, Sukyoung Ryu:
Accelerating JavaScript static analysis via dynamic shortcuts. 1129-1140
Approximations in Program Analysis and Testing
- Peisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang:
Skeletal approximation enumeration for SMT solver testing. 1141-1153 - Tianyi Chen, Kihong Heo, Mukund Raghothaman:
Boosting static analysis accuracy with instrumented test executions. 1154-1165 - Yicheng Luo, Antonio Filieri, Yuan Zhou:
Symbolic parallel adaptive importance sampling for probabilistic program analysis. 1166-1177
Static Analysis and Symbolic Execution
- Linghui Luo, Martin Schäf, Daniel Sanchez, Eric Bodden:
IDE support for cloud-based static analyses. 1178-1189 - David Trabish, Shachar Itzhaky, Noam Rinetzky:
A bounded symbolic-size model for symbolic execution. 1190-1201
Dynamic Analysis
- Nikos Vasilakis, Grigoris Ntousakis, Veit Heller, Martin C. Rinard:
Efficient module-level dynamic analysis for dynamic languages with module recontextualization. 1202-1213
Industry Papers
- Anup K. Kalia, Jin Xiao, Rahul Krishna, Saurabh Sinha, Maja Vukovic, Debasish Banerjee:
Mono2Micro: a practical and effective tool for decomposing monolithic Java applications to microservices. 1214-1224 - Sonu Mehta, Farima Farmahinifarahani, Ranjita Bhagwan, Suraj Guptha, Sina Jafari, Rahul Kumar, Vaibhav Saini, Anirudh Santhiar:
Data-driven test selection at scale. 1225-1235 - Hang Dong, Si Qin, Yong Xu, Bo Qiao, Shandan Zhou, Xian Yang, Chuan Luo, Pu Zhao, Qingwei Lin, Hongyu Zhang, Abulikemu Abuduweili, Sanjay Ramanujan, Karthikeyan Subramanian, Andrew Zhou, Saravanakumar Rajmohan, Dongmei Zhang, Thomas Moscibroda:
Effective low capacity status prediction for cloud systems. 1236-1241 - Adam Welc:
Automated code transformation for context propagation in Go. 1242-1252 - Xu Zhang, Yong Xu, Si Qin, Shilin He, Bo Qiao, Ze Li, Hongyu Zhang, Xukun Li, Yingnong Dang, Qingwei Lin, Murali Chintalapati, Saravanakumar Rajmohan, Dongmei Zhang:
Onion: identifying incident-indicating logs for cloud systems. 1253-1263 - Jon Ayerdi, Valerio Terragni, Aitor Arrieta, Paolo Tonella, Goiuria Sagardui, Maite Arratibel:
Generating metamorphic relations for cyber-physical systems with genetic programming: an industrial case study. 1264-1274 - Vivek Joshi, Preethu Rose Anish, Smita Ghaisas:
Domain adaptation for an automated classification of deontic modalities in software engineering contracts. 1275-1280 - Roman Haas, Daniel Elsner, Elmar Jürgens, Alexander Pretschner, Sven Apel:
How can manual testing processes be optimized? developer survey, optimization guidelines, and case studies. 1281-1291 - Martin P. Robillard:
Turnover-induced knowledge loss in practice. 1292-1302 - Yaroslav Golubev, Zarina Kurbatova, Eman Abdullah AlOmar, Timofey Bryksin, Mohamed Wiem Mkaouer:
One thousand and one stories: a large-scale survey of software refactoring. 1303-1313 - Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li:
A comprehensive study on learning-based PE malware family classification methods. 1314-1325 - Charles Weir, Sammy Migues, Mike Ware, Laurie A. Williams:
Infiltrating security into development: exploring the world's largest software security study. 1326-1336 - David van der Leij, Jasper Binda, Robbert van Dalen, Pieter Vallen, Yaping Luo, Maurício Aniche:
Data-driven extract method recommendations: a study at ING. 1337-1347 - Miguel Terra-Neves, João Nadkarni, Miguel Ventura, Pedro Resende, Hugo Veiga, António Alegria:
Duplicated code pattern mining in visual programming languages. 1348-1359 - Meng Ren, Fuchen Ma, Zijing Yin, Ying Fu, Huizhong Li, Wanli Chang, Yu Jiang:
Making smart contract development more secure and easier. 1360-1370 - Maaz Hafeez Ur Rehman, Peter C. Rigby:
Quantifying no-fault-found test failures to prioritize inspection of flaky tests at Ericsson. 1371-1380 - Johannes Lampel, Sascha Just, Sven Apel, Andreas Zeller:
When life gives you oranges: detecting and diagnosing intermittent job failures at Mozilla. 1381-1392 - Jonathan Metzman, László Szekeres, Laurent Simon, Read Sprabery, Abhishek Arya:
FuzzBench: an open fuzzer benchmarking platform and service. 1393-1403 - Nengwen Zhao, Honglin Wang, Zeyan Li, Xiao Peng, Gang Wang, Zhu Pan, Yong Wu, Zhen Feng, Xidao Wen, Wenchi Zhang, Kaixin Sui, Dan Pei:
An empirical investigation of practical log anomaly detection for online service systems. 1404-1415 - Michael Emmi, Liana Hadarean, Ranjit Jhala, Lee Pike, Nicolás Rosner, Martin Schäf, Aritra Sengupta, Willem Visser:
RAPID: checking API usage for the cloud in the cloud. 1416-1426 - Jiaming Ye, Ke Chen, Xiaofei Xie, Lei Ma, Ruochen Huang, Yingfeng Chen, Yinxing Xue, Jianjun Zhao:
An empirical study of GUI widget detection for industrial mobile games. 1427-1437 - Bo Qiao, Fangkai Yang, Chuan Luo, Yanan Wang, Johnny Li, Qingwei Lin, Hongyu Zhang, Mohit Datta, Andrew Zhou, Thomas Moscibroda, Saravanakumar Rajmohan, Dongmei Zhang:
Intelligent container reallocation at Microsoft 365. 1438-1443 - Parastoo Mohagheghi, Casper Lassenius:
Organizational implications of agile adoption: a case study from the public sector. 1444-1454
Ideas, Visions, and Reflections
- Adrian Hoff, Michael Nieke, Christoph Seidl:
Towards immersive software archaeology: regaining legacy systems' design knowledge via interactive exploration in virtual reality. 1455-1458 - Gabin An, Shin Yoo:
Reducing the search space of bug inducing commits using failure coverage. 1459-1462 - Gustavo Ansaldi Oliva, Ahmed E. Hassan:
The gas triangle and its challenges to the development of blockchain-powered applications. 1463-1466 - Yu-Seung Ma, Shin Yoo, Taeho Kim:
Selecting test inputs for DNNs using differential testing with subspecialized model instances. 1467-1470 - Janusan Baskararajah, Lei Zhang, Andriy V. Miranskyy:
Term interrelations and trends in software engineering. 1471-1474 - Justyna Petke, David Clark, William B. Langdon:
Software robustness: a survey, a theory, and prospects. 1475-1478 - Vincent J. Hellendoorn, Jason Tsay, Manisha Mukherjee, Martin Hirzel:
Towards automating code review at scale. 1479-1482 - Kevin Jesse, Premkumar T. Devanbu, Toufique Ahmed:
Learning type annotation: is big data enough? 1483-1486 - Tsong Yueh Chen, T. H. Tse:
New visions on metamorphic testing after a quarter of a century of inception. 1487-1490 - Noura El Moussa, Davide Molinelli, Mauro Pezzè, Martin Tappler:
Health of smart ecosystems. 1491-1494
Demonstrations
- Guannan Wei, Shangyin Tan, Oliver Bracevac, Tiark Rompf:
LLSC: a parallel symbolic execution compiler for LLVM IR. 1495-1499 - Yuhui Su, Zhe Liu, Chunyang Chen, Junjie Wang, Qing Wang:
OwlEyes-online: a fully automated platform for detecting and localizing UI display issues. 1500-1504 - Robert Heumüller, Sebastian Nielebock, Frank Ortmeier:
Exploit those code reviews! bigger data for deeper learning. 1505-1509 - Yu Zhou, Haonan Jin, Xinying Yang, Taolue Chen, Krishna Narasimhan, Harald C. Gall:
BRAID: an API recommender supporting implicit user feedback. 1510-1514 - Xiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu, Jianling Sun:
KGAMD: an API-misuse detector driven by fine-grained API-constraint knowledge graph. 1515-1519 - Hrishikesh Terdalkar, Arnab Bhattacharya:
Sangrahaka: a tool for annotating and querying knowledge graphs. 1520-1524 - Zhipeng Gao, Xin Xia, David Lo, John C. Grundy, Yuan-Fang Li:
Code2Que: a tool for improving question titles from mined code snippets in stack overflow. 1525-1529 - Islem Saidani, Ali Ouni, Moataz Chouchen, Mohamed Wiem Mkaouer:
BF-detector: an automated tool for CI build failure detection. 1530-1534 - Tanvir Ahmed Khan, Allison Sullivan, Kaiyuan Wang:
AlloyFL: a fault localization framework for Alloy. 1535-1539 - Zhou Yang, Muhammad Hilmi Asyrofi, David Lo:
BiasRV: uncovering biased sentiment predictions at runtime. 1540-1544 - Chehara Pathmabandu, John C. Grundy, Mohan Baruwal Chhetri, Zubair A. Baig:
ICME: an informed consent management engine for conformance in smart building environments. 1545-1549 - Akhila Sri Manasa Venigalla, Sridhar Chimalakonda:
StackEmo: towards enhancing user experience by augmenting stack overflow with emojis. 1550-1554 - A. Eashaan Rao, Dheeraj Vagavolu, Sridhar Chimalakonda:
AC²: towards understanding architectural changes in Python projects. 1555-1559 - Nuri Almarimi, Ali Ouni, Moataz Chouchen, Mohamed Wiem Mkaouer:
csDetector: an open source tool for community smells detection. 1560-1564 - Georgios Nikitopoulos, Konstantina Dritsa, Panos Louridas, Dimitris Mitropoulos:
CrossVul: a cross-language vulnerability dataset with commit data. 1565-1569 - Khaled Ahmed, Mieszko Lis, Julia Rubin:
Slicer4J: a dynamic slicer for Java. 1570-1574 - Muhammad Hilmi Asyrofi, Zhou Yang, David Lo:
CrossASR++: a modular differential testing framework for automatic speech recognition. 1575-1579 - Konstantin Kuznetsov, Chen Fu, Song Gao, David N. Jansen, Lijun Zhang, Andreas Zeller:
Frontmatter: mining Android user interfaces at scale. 1580-1584 - Stanly Samuel, Deepak D'Souza, Raghavan Komondoor:
GenSys: a scalable fixed-point engine for maximal controller synthesis over infinite state spaces. 1585-1589 - Erik Horlings, Sung-Shik Jongmans:
Analysis of specifications of multiparty sessions with dcj-lint. 1590-1594
Reuse, Reproduction, and Replication
- Rahul Yedida, Tim Menzies:
Documenting evidence of a reuse of 'a systematic study of the class imbalance problem in convolutional neural networks'. 1595 - Rahul Yedida, Tim Menzies:
Documenting evidence of a reuse of 'on the number of linear regions of deep neural networks'. 1596 - Andre Lustosa, Tim Menzies:
Documenting evidence of a reuse of 'a systematic literature review of techniques and metrics to reduce the cost of mutation testing'. 1597 - Andre Lustosa, Tim Menzies:
Documenting evidence of a reuse of 'RefactoringMiner 2.0'. 1598 - Kewen Peng, Tim Menzies:
Documenting evidence of a reuse of 'what is a feature? a qualitative study of features in industrial software product lines'. 1599 - Kewen Peng, Tim Menzies:
Documenting evidence of a reuse of '"why should I trust you?": explaining the predictions of any classifier'. 1600 - Xueqi Yang, Tim Menzies:
Documenting evidence of a replication of 'populating a release history database from version control and bug tracking systems'. 1601 - Xueqi Yang, Tim Menzies:
Documenting evidence of a replication of 'analyze this! 145 questions for data scientists in software engineering'. 1602 - Xueqi Yang, Tim Menzies:
Documenting evidence of a reproduction of 'is there a "golden" feature set for static warning identification? - an experimental evaluation'. 1603 - Jordan Winkler, Abhimanyu Agarwal, Caleb Tung, Dario Rios Ugalde, Young Jin Jung, James C. Davis:
A replication of 'DeepBugs: a learning approach to name-based bug detection'. 1604
Doctoral Symposium
- Jirat Pasuksmit:
Investigating documented information for accurate effort estimation in agile software development. 1605-1609 - Danushka Liyanage:
Security guarantees for automated software testing. 1610-1614 - Anderson G. Uchôa:
Unveiling multiple facets of design degradation in modern code review. 1615-1619 - Haoran Wang:
Freeing hybrid distributed AI training configuration. 1620-1624 - Paul A. Akiki:
Towards an approach for resource-driven adaptation. 1625-1629 - Daniel Sokolowski:
Deployment coordination for cross-functional DevOps teams. 1630-1634 - Martin Kellogg:
Lightweight verification via specialized typecheckers. 1635-1639 - Ya Xiao:
Multi-location cryptographic code repair with neural-network-based methodologies. 1640-1644 - Rajshakhar Paul:
Improving the effectiveness of peer code review in identifying security defects. 1645-1649 - Xianhao Jin:
Reducing cost in continuous integration with a collection of build selection approaches. 1650-1654 - Sara Fernandes:
A live environment for inspection and refactoring of software systems. 1655-1659
Undergraduate Students
- Chaofan Shou:
PorkFuzz: testing stateful software-defined network applications with property graphs. 1660-1662 - Helen Dong:
A qualitative study of cleaning in Jupyter notebooks. 1663-1665 - Juan C. Alonso:
Automated generation of realistic test inputs for web APIs. 1666-1668 - Sophie Cohen:
Contextualizing toxicity in open source: a qualitative study. 1669-1671 - Chen Yang:
Accelerating redundancy-based program repair via code representation learning and adaptive patch filtering. 1672-1674 - Jiwon Park:
SMT solver testing with type and grammar based mutation. 1675-1676
Graduate Students
- Kirill Daniakin:
Overcoming metric diversity in meta-analysis for software engineering: proposed approach and a case study on its usage on the effects of software reuse. 1677-1679 - Linghui Luo:
A general approach to modeling Java framework behaviors. 1680-1682 - Malinda Dilhara:
Discovering repetitive code changes in ML systems. 1683-1685 - Mohna Chakraborty:
Does reusing pre-trained NLP model propagate bugs? 1686-1688 - Shazibul Islam Shamim:
Mitigating security attacks in kubernetes manifests for security best practices violation. 1689-1690
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.