


default search action
36th ICSE 2014: Hyderabad, India
- Pankaj Jalote, Lionel C. Briand, André van der Hoek:

36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014. ACM 2014, ISBN 978-1-4503-2756-5
Perspectives on Software Engineering
- Emerson R. Murphy-Hill, Thomas Zimmermann, Nachiappan Nagappan:

Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development? 1-11 - Andrew Begel, Thomas Zimmermann:

Analyze this! 145 questions for data scientists in software engineering. 12-23 - Paul Ralph

, Paul Richard Kelly
:
The dimensions of software engineering success. 24-35 - Ravi Khadka, Belfrit V. Batlajery, Amir Saeidi, Slinger Jansen

, Jurriaan Hage:
How do professionals perceive legacy systems and software modernization? 36-47
Testing 1
- Tingting Yu, Witawas Srisa-an

, Gregg Rothermel:
SimRT: an automated framework to support regression testing for data races. 48-59 - Peng Huang

, Xiao Ma, Dongcai Shen, Yuanyuan Zhou:
Performance regression testing target prioritization via performance risk analysis. 60-71 - Rahul Gopinath

, Carlos Jensen, Alex Groce:
Code coverage for suite evaluation by developers. 72-82 - Mika Mäntylä

, Kai Petersen
, Timo O. A. Lehtinen, Casper Lassenius:
Time pressure: a controlled experiment of test case development and requirements review. 83-94
Modeling
- Shahar Maoz

, Jan Oliver Ringert
, Bernhard Rumpe
:
Verifying component and connector models against crosscutting structural views. 95-105 - Hamid Bagheri, Chong Tang, Kevin J. Sullivan:

TradeMaker: automated dynamic analysis of synthesized tradespaces. 106-116 - Rick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro

, Marsha Chechik:
Lifting model transformations to product lines. 117-128 - Renzo Degiovanni

, Dalal Alrajeh, Nazareno Aguirre, Sebastián Uchitel
:
Automated goal operationalisation based on interpolation and SAT solving. 129-139
Configuration, Variability, and Clones
- Sarah Nadi, Thorsten Berger, Christian Kästner, Krzysztof Czarnecki:

Mining configuration constraints: static analyses and empirical results. 140-151 - Sai Zhang, Michael D. Ernst:

Which configuration option should I change? 152-163 - Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu

, Xin Peng, Jun Sun
, Wenyun Zhao:
Detecting differences across multiple instances of code clones. 164-174 - Kai Chen, Peng Liu, Yingjun Zhang:

Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. 175-186
Social Aspects of Software Engineering
- Klaas-Jan Stol

, Brian Fitzgerald
:
Two's company, three's a crowd: a case study of crowdsourcing software development. 187-198 - Patrick Wagstrom, Subhajit Datta

:
Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development project. 199-210 - Leif Singer, Fernando Marques Figueira Filho, Margaret-Anne D. Storey:

Software engineering at the speed of light: how developers stay current using twitter. 211-221 - Qi Xuan, Vladimir Filkov:

Building it together: synchronous development in OSS. 222-233
Repair
- Martin Monperrus

:
A critical review of "automatic patch generation learned from human-written patches": essay on the problem statement and the evaluation of automatic software repair. 234-242 - Divya Gopinath, Sarfraz Khurshid, Diptikalyan Saha, Satish Chandra:

Data-guided repair of selection statements. 243-253 - Yuhua Qi

, Xiaoguang Mao
, Yan Lei, Ziying Dai, Chengsong Wang:
The strength of random search on automated program repair. 254-265 - Shalini Kaleeswaran, Varun Tulsian, Aditya Kanade, Alessandro Orso:

MintHint: automated synthesis of repair hints. 266-276
Formal Analysis
- Carlo Ghezzi, Mauro Pezzè

, Michele Sama, Giordano Tamburrelli:
Mining behavior models from user-intensive web applications. 277-287 - Steven Arzt

, Eric Bodden
:
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes. 288-298 - Antonio Filieri

, Henry Hoffmann, Martina Maggio
:
Automated design of self-adaptive software with control-theoretical formal guarantees. 299-310 - Guoxin Su

, David S. Rosenblum:
Perturbation analysis of stochastic systems with empirical distribution parameters. 311-321
Configuration Management
- Caius Brindescu, Mihai Codoban, Sergii Shmarkatiuk, Danny Dig:

How do centralized and distributed version control systems impact software changes? 322-333 - Kivanç Muslu, Christian Bird, Nachiappan Nagappan, Jacek Czerwonka:

Transition from centralized to decentralized version control systems: a case study on reasons, barriers, and outcomes. 334-344 - Georgios Gousios

, Martin Pinzger, Arie van Deursen
:
An exploratory study of the pull-based software development model. 345-355 - Jason Tsay, Laura Dabbish

, James D. Herbsleb
:
Influence of social and technical factors for evaluating contribution in GitHub. 356-366
Software Understanding
- Saba Alimadadi, Sheldon Sequeira, Ali Mesbah

, Karthik Pattabiraman:
Understanding JavaScript event-based interactions. 367-377 - Janet Siegmund, Christian Kästner, Sven Apel

, Chris Parnin, Anja Bethmann, Thomas Leich, Gunter Saake, André Brechmann
:
Understanding understanding source code with functional magnetic resonance imaging. 378-389 - Paige Rodeghero, Collin McMillan, Paul W. McBurney, Nigel Bosch

, Sidney K. D'Mello:
Improving automated source code summarization via an eye-tracking study of programmers. 390-401 - Thomas Fritz

, Andrew Begel, Sebastian C. Müller, Serap Yigit-Elliott, Manuela Züger:
Using psycho-physiological measures to assess task difficulty in software development. 402-413
Prediction
- Xiao-Yuan Jing, Shi Ying, Zhi-Wu Zhang

, Shanshan Wu, Jin Liu:
Dictionary learning based software defect prediction. 414-423 - Foyzur Rahman, Sameer Khatri, Earl T. Barr

, Premkumar T. Devanbu:
Comparing static bug finders and statistical prediction. 424-434 - Laura Inozemtseva, Reid Holmes:

Coverage is not strongly correlated with test suite effectiveness. 435-445 - Leandro L. Minku

, Xin Yao
:
How to make best use of cross-company data in software effort estimation? 446-456
Concurrency
- Yanyan Jiang, Tianxiao Gu, Chang Xu, Xiaoxing Ma

, Jian Lu:
CARE: cache guided deterministic replay for concurrent Java programs. 457-467 - Ivan Beschastnikh, Yuriy Brun

, Michael D. Ernst, Arvind Krishnamurthy:
Inferring models of concurrent systems from logs of their behavior with CSight. 468-479 - Peng Liu, Charles Zhang:

Unleashing concurrency for irregular data structures. 480-490 - Yan Cai

, Shangru Wu, W. K. Chan
:
ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programs. 491-502
Apps and Energy
- Irene Lizeth Manotas Gutiérrez, Lori L. Pollock, James Clause:

SEEDS: a software engineer's energy-optimization decision support framework. 503-514 - Nima Nikzad, Octav Chipara

, William G. Griswold
:
APE: an annotation language and middleware for energy-efficient mobile application development. 515-526 - Ding Li, Angelica Huyen Tran, William G. J. Halfond:

Making web applications more energy efficient for OLED smartphones. 527-538
Testing 2
- Patrice Godefroid:

Micro execution. 539-549 - Jonathan Bell, Gail E. Kaiser

:
Unit test virtualization with VMVM. 550-561 - Paolo Tonella

, Roberto Tiella, Duy Cu Nguyen:
Interpolated n-grams for model based testing. 562-572 - Kelly Androutsopoulos

, David Clark
, Haitao Dan, Robert M. Hierons
, Mark Harman:
An analysis of the relationship between conditional entropy and failed error propagation in software testing. 573-583
Code Contracts, Invariants, and Robustness
- Nélio Cacho, Thiago César, Thomas Filipe, Eliezio Soares

, Arthur Cassio, Rafael Souza, Israel García, Eiji Adachi Barbosa, Alessandro Garcia:
Trading robustness for maintainability: an empirical study of evolving c# programs. 584-595 - Todd W. Schiller, Kellen Donohue, Forrest Coward, Michael D. Ernst:

Case studies and tools for contract specifications. 596-607 - ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest

:
Using dynamic analysis to generate disjunctive invariants. 608-619 - Ivan Bocic, Tevfik Bultan:

Inductive verification of data model invariants for web applications. 620-631
Search and APIs
- Stefan Endrikat, Stefan Hanenberg, Romain Robbes, Andreas Stefik:

How do API documentation and static typing affect API usability? 632-642 - Siddharth Subramanian, Laura Inozemtseva, Reid Holmes:

Live API documentation. 643-652 - Joel Galenson, Philip Reames, Rastislav Bodík, Björn Hartmann, Koushik Sen:

CodeHint: dynamic and interactive synthesis of code snippets. 653-663 - Iman Keivanloo, Juergen Rilling, Ying Zou:

Spotting working code examples. 664-675
Adaptive Systems
- Bihuan Chen, Xin Peng, Yijun Yu

, Bashar Nuseibeh
, Wenyun Zhao:
Self-adaptation through incremental generative model transformations at runtime. 676-687 - Nicolás D'Ippolito

, Víctor A. Braberman, Jeff Kramer, Jeff Magee, Daniel Sykes, Sebastián Uchitel
:
Hope for the best, prepare for the worst: multi-tier control for adaptive systems. 688-699 - Cristian Klein, Martina Maggio

, Karl-Erik Årzén, Francisco Hernández-Rodriguez:
Brownout: building more robust cloud applications. 700-711 - Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:

Integrating adaptive user interface capabilities in enterprise applications. 712-723
Build and Package Management
- Hyunmin Seo, Caitlin Sadowski, Sebastian G. Elbaum, Edward Aftandilian, Robert W. Bowdidge:

Programmers' build errors: a case study (at google). 724-734 - Shaun Phillips, Thomas Zimmermann, Christian Bird:

Understanding and improving software build teams. 735-744 - Alexey Ignatiev

, Mikolás Janota
, João Marques-Silva:
Towards efficient optimization in package management systems. 745-755 - Jérôme Vouillon, Mehdi Dogguy, Roberto Di Cosmo:

Easing software component repository evolution. 756-766
Mining
- Ning Chen, Jialiu Lin, Steven C. H. Hoi

, Xiaokui Xiao
, Boshen Zhang:
AR-miner: mining informative reviews for developers from mobile app marketplace. 767-778 - Robert Dyer

, Hridesh Rajan
, Hoan Anh Nguyen, Tien N. Nguyen:
Mining billions of AST nodes to study actual and potential usage of Java language features. 779-790 - Hung Viet Nguyen, Hoan Anh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen:

Mining interprocedural, data-oriented usage patterns in JavaScript web applications. 791-802 - Stas Negara, Mihai Codoban, Danny Dig, Ralph E. Johnson:

Mining fine-grained code changes to detect unknown change patterns. 803-813
Automated Bug Detection and Repair
- Sangho Lee, Changhee Jung, Santosh Pande

:
Detecting memory leaks through introspective dynamic behavior modelling using machine learning. 814-824 - Changhee Jung, Sangho Lee, Easwaran Raman, Santosh Pande

:
Automated memory leak detection for production use. 825-836 - Frolin S. Ocariza Jr., Karthik Pattabiraman, Ali Mesbah

:
Vejovis: suggesting fixes for JavaScript faults. 837-847 - Wensheng Dou, Shing-Chi Cheung

, Jun Wei:
Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation. 848-858
Requirements
- Swapneel Sheth, Gail E. Kaiser

, Walid Maalej:
Us and them: a study of privacy requirements across north america, asia, and europe. 859-870 - Keerthi Thomas, Arosha K. Bandara, Blaine A. Price

, Bashar Nuseibeh:
Distilling privacy requirements for mobile applications. 871-882 - Emmanuel Letier, David Stefan, Earl T. Barr

:
Uncertainty, risk, and information value in software requirements and architecture. 883-894 - Rahul Mohanani, Paul Ralph

, Ben Shreeve
:
Requirements fixation. 895-906
Testing and Conformance Verification
- Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen:

Exploring variability-aware execution for testing plugin-based web applications. 907-918 - Xiangjuan Yao, Mark Harman, Yue Jia:

A study of equivalent and stubborn mutation operators using human analysis of equivalence. 919-930 - Antonio Carzaniga

, Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè
:
Cross-checking oracles from intrinsic software redundancy. 931-942 - Patrick Rempel, Patrick Mäder, Tobias Kuschke, Jane Cleland-Huang:

Mind the gap: assessing the conformance of software traceability to relevant guidelines. 943-954
Modeling and Interfaces
- Dina Zayan, Michal Antkiewicz, Krzysztof Czarnecki:

Effects of using examples on structural model comprehension: a controlled experiment. 955-966 - Lu Xiao, Yuanfang Cai, Rick Kazman:

Design rule spaces: a new form of architecture insight. 967-977 - Hisashi Miyashita, Hideki Tai, Shunichi Amano:

Controlled modeling environment using flexibly-formatted spreadsheets. 978-988 - Márcio Ribeiro

, Paulo Borba, Christian Kästner:
Feature maintenance with emergent interfaces. 989-1000
Apps and Verification
- Tse-Hsun Chen

, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
Detecting performance anti-patterns for applications developed using object-relational mapping. 1001-1012 - Yepang Liu

, Chang Xu, Shing-Chi Cheung
:
Characterizing and detecting performance bugs for smartphone applications. 1013-1024 - Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller

:
Checking app behavior against app descriptions. 1025-1035 - Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang:

AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. 1036-1046
Symbolic Execution
- Wei Le, Shannon D. Pattison:

Patch verification via multiversion interprocedural control flow graphs. 1047-1058 - Guowei Yang

, Sarfraz Khurshid, Suzette Person, Neha Rungta:
Property differencing for incremental checking. 1059-1070 - Fei He, Bow-Yaw Wang, Liangze Yin, Lei Zhu:

Symbolic assume-guarantee reasoning through BDD learning. 1071-1082 - Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley

:
Enhancing symbolic execution with veritesting. 1083-1094
Refactoring and Reverse Engineering
- Xi Ge, Emerson R. Murphy-Hill:

Manual refactoring changes with automated refactoring validation. 1095-1105 - Mohsen Vakilian, Ralph E. Johnson:

Alternate refactoring paths reveal usability problems. 1106-1116 - Semih Okur, David L. Hartveld, Danny Dig, Arie van Deursen

:
A study and toolkit for asynchronous programming in c#. 1117-1127 - Dohyeong Kim, William N. Sumner

, Xiangyu Zhang, Dongyan Xu, Hira Agrawal:
Reuse-oriented reverse engineering of functional components from x86 binaries. 1128-1139

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














