


default search action
37th ICSE 2015: Florence, Italy - Volume 1
- Antonia Bertolino, Gerardo Canfora, Sebastian G. Elbaum:

37th IEEE/ACM International Conference on Software Engineering, ICSE 2015, Florence, Italy, May 16-24, 2015, Volume 1. IEEE Computer Society 2015, ISBN 978-1-4799-1934-5
Keynotes
- Claudio Silenzi:

Software Engineering in Ferrari F1. 3 - Susan Landau:

Mining the Metadata - and Its Consequences. 4-5
Technical Research
Reflections and Studies on Methodologies and Practices I
- Janet Siegmund, Norbert Siegmund, Sven Apel

:
Views on Internal and External Validity in Empirical Software Engineering. 9-19 - Paul Ralph

:
Developing and Evaluating Software Engineering Process Theories. 20-31 - Kyle Dewey, Lawton Nichols, Ben Hardekopf:

Automated Data Structure Generation: Refuting Common Wisdom. 32-43
Testing I
- Rahulkrishna Yandrapally, Giriprasad Sridhara, Saurabh Sinha:

Automated Modularization of GUI Test Cases. 44-54 - Zebao Gao, Yalan Liang, Myra B. Cohen, Atif M. Memon, Zhen Wang:

Making System User Interactive Tests Repeatable: When and What Should We Control? 55-65 - Fabrizio Pastore

, Leonardo Mariani:
ZoomIn: Discovering Failures by Detecting Wrong Assertions. 66-76
Mobile Applications
- Damien Octeau, Daniel Luchaup, Matthew L. Dering, Somesh Jha, Patrick D. McDaniel:

Composite Constant Propagation: Application to Android Inter-Component Communication Analysis. 77-88 - Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, Atanas Rountev:

Static Control-Flow Analysis of User-Driven Callbacks in Android Applications. 89-99 - Jiaping Gui, Stuart McIlroy, Meiyappan Nagappan, William G. J. Halfond:

Truth in Advertising: The Hidden Cost of Mobile Ads for Software Developers. 100-110
Evolution and Maintenance
- Tianyi Zhang, Myoungkyu Song, Joseph Pinedo, Miryung Kim:

Interactive Code Review for Systematic Changes. 111-122 - Mohsen Vakilian, Raluca Sauciuc, J. David Morgenthaler

, Vahab S. Mirrokni:
Automated Decomposition of Build Targets. 123-133 - Mike Barnett, Christian Bird, João Brunet, Shuvendu K. Lahiri:

Helping Developers Help Themselves: Automatic Decomposition of Code Review Changesets. 134-144
Analysis I
- Denis Gopan

, Evan Driscoll, Ducson Nguyen, Dimitri Naydich, Alexey Loginov, David Melski:
Data-Delineation in Software Binaries and its Application to Buffer-Overrun Discovery. 145-155 - Antonio Carzaniga

, Andrea Mattavelli, Mauro Pezzè
:
Measuring Software Redundancy. 156-166 - Yao Pan, Jules White, Yu Sun, Jeff Gray

:
Gray Computing: An Analysis of Computing with Background JavaScript Tasks. 167-177
Highly Configurable and Adaptive Systems
- Alexander von Rhein, Alexander Grebhahn, Sven Apel

, Norbert Siegmund, Dirk Beyer
, Thorsten Berger:
Presence-Condition Simplification in Highly Configurable Systems. 178-188 - Shoham Ben-David, Baruch Sterin, Joanne M. Atlee, Sandy Beidu:

Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods. 189-199 - Antonio Filieri

, Lars Grunske
, Alberto Leva
:
Lightweight Adaptive Filtering for Efficient Learning and Updating of Probabilistic Models. 200-211
Tools and Environments
- Yun Young Lee, Darko Marinov, Ralph E. Johnson:

Tempura: Temporal Dimension for IDEs. 212-222 - YoungSeok Yoon, Brad A. Myers:

Supporting Selective Undo in a Code Editor. 223-233 - Mohsen Vakilian, Amarin Phaosawasdi, Michael D. Ernst, Ralph E. Johnson:

Cascade: A Universal Programmer-Assisted Type Qualifier Inference Tool. 234-245
Regression Testing
- Valerio Terragni

, Shing-Chi Cheung
, Charles Zhang:
RECONTEST: Effective Regression Testing of Concurrent Programs. 246-256 - Qiuping Yi, Zijiang Yang, Jian Liu, Chen Zhao, Chao Wang:

A Synergistic Analysis Method for Explaining Failed Regression Tests. 257-267 - Ripon K. Saha, Lingming Zhang, Sarfraz Khurshid, Dewayne E. Perry:

An Information Retrieval Approach for Regression Test Prioritization Based on Program Changes. 268-279
Security and Privacy
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein

, Yves Le Traon
, Steven Arzt
, Siegfried Rasthofer, Eric Bodden
, Damien Octeau, Patrick D. McDaniel:
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps. 280-291 - Koen Yskout

, Riccardo Scandariato, Wouter Joosen:
Do Security Patterns Really Help Designers? 292-302 - Wei Yang, Xusheng Xiao

, Benjamin Andow, Sihan Li, Tao Xie, William Enck
:
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. 303-313
Analysis II
- Michael Pradel, Parker Schuh, Koushik Sen:

TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript. 314-324 - Frolin S. Ocariza Jr., Karthik Pattabiraman, Ali Mesbah

:
Detecting Inconsistencies in JavaScript MVC Applications. 325-335 - Mattia Fazzini

, Prateek Saxena, Alessandro Orso:
AutoCSP: Automatically Retrofitting CSP to Web Applications. 336-346
Reflections and Studies on Methodologies and Practices II
- Michael Waterman, James Noble

, George Allan:
How Much Up-Front? A Grounded theory of Agile Architecture. 347-357 - Georgios Gousios

, Andy Zaidman
, Margaret-Anne D. Storey, Arie van Deursen
:
Work Practices and Challenges in Pull-Based Development: The Integrator's Perspective. 358-368 - Edward K. Smith, Christian Bird, Thomas Zimmermann:

Build It Yourself! Homegrown Tools in a Large Software Company. 369-379
Refactoring
- Jörg Liebig, Andreas Janker, Florian Garbe, Sven Apel

, Christian Lengauer:
Morpheus: Variability-Aware Refactoring in the Wild. 380-391 - Na Meng, Lisa Hua, Miryung Kim, Kathryn S. McKinley:

Does Automated Refactoring Obviate Systematic Editing? 392-402 - Michele Tufano, Fabio Palomba

, Gabriele Bavota
, Rocco Oliveto, Massimiliano Di Penta
, Andrea De Lucia
, Denys Poshyvanyk
:
When and Why Your Code Starts to Smell Bad. 403-414
Mining
- Jieming Zhu, Pinjia He, Qiang Fu, Hongyu Zhang

, Michael R. Lyu, Dongmei Zhang:
Learning to Log: Helping Developers Make Informed Logging Decisions. 415-425 - Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller

, Steven Arzt
, Siegfried Rasthofer, Eric Bodden
:
Mining Apps for Abnormal Usage of Sensitive Data. 426-436 - Pavel Avgustinov, Arthur I. Baars, Anders Starcke Henriksen, R. Greg Lavender, Galen Menzel, Oege de Moor, Max Schäfer, Julian Tibble:

Tracking Static Analysis Violations over Time to Capture Developer Characteristics. 437-447
Patching and Fixing I
- Sergey Mechtaev

, Jooyong Yi
, Abhik Roychoudhury
:
DirectFix: Looking for Simple Program Repairs. 448-458 - Qing Gao, Yingfei Xiong

, Yaqing Mi, Lu Zhang, Weikun Yang, Zhaoping Zhou, Bing Xie, Hong Mei:
Safe Memory-Leak Fixing for C Programs. 459-470 - Shin Hwei Tan, Abhik Roychoudhury

:
relifix: Automated Repair of Software Regressions. 471-482
Testing II
- Kim Herzig, Michaela Greiler, Jacek Czerwonka, Brendan Murphy:

The Art of Testing Less without Sacrificing Quality. 483-493 - Stefan Winter, Oliver Schwahn

, Roberto Natella
, Neeraj Suri
, Domenico Cotroneo:
No PAIN, No Gain? The Utility of PArallel Fault INjections. 494-505 - Michael W. Whalen, Suzette Person, Neha Rungta, Matt Staats, Daniela Grijincu:

A Flexible and Non-intrusive Approach for Computing Complex Structural Coverage Metrics. 506-516
Search-Based
- Christopher Henard, Mike Papadakis

, Mark Harman
, Yves Le Traon
:
Combining Multi-Objective Search and Constraint Solving for Configuring Large Software Product Lines. 517-528 - Daming Zou, Ran Wang, Yingfei Xiong

, Lu Zhang, Zhendong Su
, Hong Mei:
A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies. 529-539 - Yue Jia, Myra B. Cohen, Mark Harman

, Justyna Petke
:
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search. 540-550
Collaboration and Coordination
- Thomas D. LaToza, Micky Chen, Luxi Jiang, Mengyao Zhao, André van der Hoek:

Borrowing from the Crowd: A Study of Recombination in Software Design Competitions. 551-562 - Mitchell Joblin, Wolfgang Mauerer, Sven Apel

, Janet Siegmund, Dirk Riehle:
From Developer Networks to Verified Communities: A Fine-Grained Approach. 563-573 - Eirini Kalliamvakou, Daniela E. Damian, Kelly Blincoe

, Leif Singer, Daniel M. Germán:
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub. 574-585
Analysis Infrastructure
- Cathrin Weiss, Cindy Rubio-González, Ben Liblit

:
Database-Backed Program Analysis for Scalable Error Propagation. 586-597 - Caitlin Sadowski, Jeffrey van Gogh, Ciera Jaspan, Emma Söderberg

, Collin Winter:
Tricorder: Building a Program Analysis Ecosystem. 598-608 - Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:

Alloy*: A General-Purpose Higher-Order Relational Constraint Solver. 609-619
Symbolic Execution
- Edmund Wong, Lei Zhang, Song Wang, Taiyue Liu, Lin Tan:

DASE: Document-Assisted Symbolic Execution for Improving Automated Software Testing. 620-631 - Rui Qiu, Guowei Yang

, Corina S. Pasareanu, Sarfraz Khurshid:
Compositional Symbolic Execution with Memoized Replay. 632-642 - Yufeng Zhang, Zhenbang Chen, Ji Wang, Wei Dong, Zhiming Liu:

Regular Property Guided Dynamic Symbolic Execution. 643-653 - Ting Su, Zhoulai Fu, Geguang Pu, Jifeng He, Zhendong Su

:
Combining Symbolic Execution and Model Checking for Data Flow Testing. 654-665
Organizational and Human Factors
- Iflaah Salman, Ayse Tosun Misirli

, Natalia Juristo Juzgado:
Are Students Representatives of Professionals in Software Engineering Experiments? 666-676 - Mathieu Lavallée, Pierre N. Robillard:

Why Good Developers Write Bad Code: An Observational Case Study of the Impacts of Organizational Factors on Software Quality. 677-687 - Sebastian C. Müller, Thomas Fritz:

Stuck and Frustrated or in Flow and Happy: Sensing Developers' Emotions and Progress. 688-699 - Paul Luo Li, Amy J. Ko, Jiamin Zhu:

What Makes a Great Software Engineer? 700-710
Specification and Verification
- Luciano Baresi

, Mohammad Mehdi Pourhashem Kallehbasti
, Matteo Rossi:
Efficient Scalable Verification of LTL Specifications. 711-721 - Daniel Matichuk, Toby C. Murray, June Andronick, D. Ross Jeffery, Gerwin Klein

, Mark Staples:
Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification. 722-732 - Germán Regis, Renzo Degiovanni

, Nicolás D'Ippolito
, Nazareno Aguirre:
Specifying Event-Based Systems with a Counting Fluent Temporal Logic. 733-743 - Ivan Bocic, Tevfik Bultan:

Coexecutability for Efficient Verification of Data Model Updates. 744-754
Programming
- Casey Casalnuovo, Premkumar T. Devanbu

, Abílio Oliveira, Vladimir Filkov, Baishakhi Ray:
Assert Use in GitHub Projects. 755-766 - Haitao Steve Zhu, Chaoren Lin, Yu David Liu:

A Programming Model for Sustainable Software. 767-777 - Sebastian Nanz, Carlo A. Furia:

A Comparative Study of Programming Languages in Rosetta Code. 778-788
Prediction Models
- Baljinder Ghotra, Shane McIntosh, Ahmed E. Hassan:

Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models. 789-800 - Fayola Peters, Tim Menzies

, Lucas Layman
:
LACE2: Better Privacy-Preserving Data Sharing for Cross Project Defect Prediction. 801-811 - Chakkrit Tantithamthavorn

, Shane McIntosh, Ahmed E. Hassan, Akinori Ihara, Ken-ichi Matsumoto:
The Impact of Mislabelling on the Performance and Interpretation of Defect Prediction Models. 812-823
Analysis III
- Xiang Yuan, Chenggang Wu, Zhenjiang Wang, Jianjun Li, Pen-Chung Yew

, Jeff Huang, Xiaobing Feng, Yanyan Lan, Yunji Chen
, Yong Guan:
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks. 824-834 - Markus Kusano, Arijit Chattopadhyay, Chao Wang:

Dynamic Generation of Likely Invariants for Multithreaded Programs. 835-846 - Jeff Huang, Qingzhou Luo, Grigore Rosu:

GPredict: Generic Predictive Concurrency Analysis. 847-857
Working with APIs
- Anh Tuan Nguyen, Tien N. Nguyen:

Graph-Based Statistical Language Model for Code. 858-868 - Gayane Petrosyan, Martin P. Robillard, Renato De Mori:

Discovering Information Explaining API Types Using Text Classification. 869-879 - Laura Moreno, Gabriele Bavota

, Massimiliano Di Penta
, Rocco Oliveto, Andrian Marcus
:
How Can I Use This Method? 880-890
Patching and Fixing II
- Van-Thuan Pham

, Wei Boon Ng, Konstantin Rubinov, Abhik Roychoudhury
:
Hercules: Reproducing Crashes in Real-World Application Binaries. 891-901 - Adrian Nistor, Po-Chun Chang, Cosmin Radoi, Shan Lu:

CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes. 902-912 - Hao Zhong

, Zhendong Su
:
An Empirical Study on Real Bug Fixes. 913-923
Testing III
- Zhongxing Yu

, Chenggang Bai, Kai-Yuan Cai:
Does the Failing Test Execute a Single or Multiple Faults? An Approach to Classifying Failing Tests. 924-935 - Mike Papadakis

, Yue Jia, Mark Harman
, Yves Le Traon
:
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique. 936-946 - Giovanni Denaro

, Alessandro Margara, Mauro Pezzè
, Mattia Vivanti:
Dynamic Data Flow Testing of Object Oriented Systems. 947-958

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














