


default search action
39th ICSE 2017: Buenos Aires, Argentina
- Sebastián Uchitel, Alessandro Orso, Martin P. Robillard:

Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017. IEEE / ACM 2017, ISBN 978-1-5386-3868-2
Research track: Traceability
- Jin Guo, Jinghui Cheng, Jane Cleland-Huang:

Semantically enhanced software traceability using deep learning techniques. 3-14 - Raghuram Gopalakrishnan, Palak Sharma, Mehdi Mirakhorli, Matthias Galster:

Can latent topics in source code predict missing architectural tactics? 15-26
Research track: Documentation
- Yu Zhou, Ruihang Gu, Taolue Chen

, Zhiqiu Huang, Sebastiano Panichella
, Harald C. Gall
:
Analyzing APIs documentation and code to detect directive defects. 27-37 - He Jiang, Jingxuan Zhang, Zhilei Ren, Tao Zhang

:
An unsupervised approach for discovering relevant tutorial fragments for APIs. 38-48 - Paige Rodeghero, Siyuan Jiang

, Ameer Armaly, Collin McMillan:
Detecting user story information in developer-client conversations to generate extractive summaries. 49-59
Research track: Refactoring
- Nikolaos Tsantalis

, Davood Mazinanian, Shahriar Rostami:
Clone refactoring with lambda expressions. 60-70 - Boyuan Chen

, Zhen Ming (Jack) Jiang:
Characterizing and detecting anti-patterns in the logging code. 71-81 - Raffi Khatchadourian

, Hidehiko Masuhara:
Automated refactoring of legacy Java software to default methods. 82-93
Research track: Recommendation systems
- Luca Ponzanelli, Simone Scalabrino

, Gabriele Bavota
, Andrea Mocci
, Rocco Oliveto, Massimiliano Di Penta, Michele Lanza
:
Supporting software developers with a holistic recommender system. 94-105 - Fabio Palomba

, Pasquale Salza
, Adelina Ciurumelea, Sebastiano Panichella
, Harald C. Gall
, Filomena Ferrucci, Andrea De Lucia
:
Recommending and localizing change requests for mobile apps based on user reviews. 106-117 - Christopher Vendome, Mario Linares Vásquez

, Gabriele Bavota
, Massimiliano Di Penta, Daniel M. Germán, Denys Poshyvanyk:
Machine learning-based detection of open source license exceptions. 118-129
Research track: Software process
- Todd Sedano, Paul Ralph

, Cécile Péraire:
Software development waste. 130-140 - Rashina Hoda

, James Noble
:
Becoming agile: a grounded theory of agile transitions in practice. 141-151 - Anna Filippova, Erik H. Trainer, James D. Herbsleb:

From diversity by numbers to diversity as process: supporting inclusiveness in software development teams with brainstorming. 152-163
Research track: Studies of software developers
- Mitchell Joblin, Sven Apel

, Claus Hunsen, Wolfgang Mauerer:
Classifying developers into core and peripheral: an empirical study on count and network metrics. 164-174 - Benjamin Floyd, Tyler Santander

, Westley Weimer:
Decoding the representation of code in the brain: an fMRI study of code review and expertise. 175-186 - Amanda Lee, Jeffrey C. Carver, Amiangshu Bosu

:
Understanding the impressions, motivations, and barriers of one time code contributors to FLOSS projects: a survey. 187-197
Research track: Search-based software engineering
- Julian Thomé, Lwin Khin Shar

, Domenico Bianculli
, Lionel C. Briand:
Search-driven string constraint solving for vulnerability detection. 198-208 - Mozhan Soltani, Annibale Panichella, Arie van Deursen

:
A guided genetic algorithm for automated crash reproduction. 209-220 - Han Liu, Chengnian Sun, Zhendong Su

, Yu Jiang, Ming Gu, Jiaguang Sun:
Stochastic optimization of program obfuscation. 221-231
Research track: Web applications
- Byron Hawkins, Brian Demsky:

ZenIDS: introspective intrusion detection for PHP applications. 232-243 - Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo:

Statically checking web API requests in JavaScript. 244-254 - Mohammed Sayagh, Noureddine Kerzazi, Bram Adams

:
On cross-stack configuration errors. 255-265
Research track: Concurrency
- Ankit Choudhary, Shan Lu, Michael Pradel:

Efficient detection of thread safety violations via coverage-guided generation of concurrent tests. 266-277 - Lu Zhang, Chao Wang:

RClassify: classifying race conditions in web applications via deterministic replay. 278-288 - Christoffer Quist Adamsen, Anders Møller

, Rezwana Karim, Manu Sridharan
, Frank Tip, Koushik Sen:
Repairing event race errors by controlling nondeterminism. 289-299
Research track: Mobile application security
- Siegfried Rasthofer, Steven Arzt

, Stefan Triller, Michael Pradel:
Making malory behave maliciously: targeted fuzzing of android execution environments. 300-311 - Youn Kyu Lee, Jae Young Bang, Gholamreza Safi, Arman Shahbazian, Yixue Zhao

, Nenad Medvidovic:
A SEALANT for inter-app security holes in android. 312-323 - Yutaka Tsutano, Shakthi Bachala, Witawas Srisa-an

, Gregg Rothermel, Jackson Dinh:
An efficient, robust, and scalable approach for analyzing interacting android apps. 324-334
Research track: Mobile application development
- Menghao Li, Wei Wang, Pei Wang, Shuai Wang

, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo:
LibD: scalable and precise third-party library detection in android markets. 335-346 - Hailong Zhang, Atanas Rountev:

Analysis and testing of notifications in Android wear applications. 347-357 - Lei Xue

, Xiapu Luo
, Le Yu, Shuai Wang, Dinghao Wu:
Adaptive unpacking of Android apps. 358-369
Research track: Debugging
- Linhai Song, Shan Lu:

Performance diagnosis for inefficient loops. 370-380 - Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yuming Zhou, Baowen Xu

:
How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem. 381-392 - Yun Lin, Jun Sun

, Yinxing Xue, Yang Liu
, Jinsong Dong:
Feedback-based debugging. 393-403
Research track: Program synthesis and repair
- Reudismam Rolim

, Gustavo Soares, Loris D'Antoni, Oleksandr Polozov, Sumit Gulwani, Rohit Gheyi
, Ryo Suzuki, Björn Hartmann:
Learning syntactic program transformations from examples. 404-415 - Yingfei Xiong, Jie Wang, Runfa Yan, Jiachen Zhang, Shi Han, Gang Huang, Lu Zhang:

Precise condition synthesis for program repair. 416-426 - Andrea Aquino, Giovanni Denaro, Mauro Pezzè

:
Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutions. 427-437
Research track: Mining software repositories
- Trong Duc Nguyen, Anh Tuan Nguyen, Hung Dang Phan, Tien N. Nguyen:

Exploring API embedding for API usages and applications. 438-449 - Chunyang Chen

, Zhenchang Xing, Ximing Wang:
Unsupervised software-specific morphological forms inference from informal discussions. 450-461
Research track: Program analysis I
- Zhengzi Xu, Bihuan Chen, Mahinthan Chandramohan, Yang Liu

, Fu Song:
SPAIN: security patch analysis for binaries towards understanding the pain and pills. 462-472 - Rohan Padhye

, Koushik Sen:
Travioli: a dynamic analysis for detecting data-structure traversals. 473-483 - Guoxin Su

, Taolue Chen
, Yuan Feng
, David S. Rosenblum:
ProEva: runtime proactive performance evaluation based on continuous-time markov chains. 484-495
Research track: Program analysis II
- Michael J. Coblenz

, Whitney Nelson, Jonathan Aldrich
, Brad A. Myers, Joshua Sunshine
:
Glacier: transitive class immutability for Java. 496-506 - Davy Landman, Alexander Serebrenik

, Jurgen J. Vinju:
Challenges for static analysis of Java reflection: literature review and empirical study. 507-518 - Kihong Heo, Hakjoo Oh, Kwangkeun Yi:

Machine-learning-guided selectively unsound static analysis. 519-529
Research track: Security, safety, and privacy
- Özgür Kafali, Jasmine Jones, Megan Petruso, Laurie A. Williams, Munindar P. Singh

:
How good is a security policy against real breaches?: a HIPAA case study. 530-540 - Antonia Bertolino

, Breno Miranda
, Roberto Pietrantuono
, Stefano Russo
:
Adaptive coverage and operational profile-based testing for reliability improvement. 541-551
Research track: Development tools and frameworks
- Saheed A. Busari, Emmanuel Letier:

RADAR: a lightweight tool for requirements and architecture decision analysis. 552-562 - Benjamin Behringer, Jochen Palz, Thorsten Berger:

PEoPL: projectional editing of product lines. 563-574 - Titus Barik

, Justin Smith
, Kevin Lubick, Elisabeth Holmes, Jing Feng, Emerson R. Murphy-Hill, Chris Parnin:
Do developers read compiler error messages? 575-585 - Maria Christakis, Patrick Emmisberger, Patrice Godefroid, Peter Müller:

A general framework for dynamic stub injection. 586-596
Research track: Testing and debugging
- Thierry Titcheu Chekam, Mike Papadakis

, Yves Le Traon
, Mark Harman:
An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption. 597-608 - Spencer Pearson, José Campos

, René Just, Gordon Fraser, Rui Abreu
, Michael D. Ernst, Deric Pang, Benjamin Keller:
Evaluating and improving fault localization. 609-620
Research track: Testing I
- Rachel Tzoref-Brill, Shahar Maoz

:
Syntactic and semantic differencing for combinatorial models of test designs. 621-631 - Sabrina Souto, Marcelo d'Amorim

, Rohit Gheyi:
Balancing soundness and efficiency for practical testing of configurable systems. 632-642 - Peng Liu, Xiangyu Zhang, Marco Pistoia, Yunhui Zheng, Manoel Marques, Lingfei Zeng:

Automatic text input generation for mobile testing. 643-653 - Alexandre Perez, Rui Abreu

, Arie van Deursen
:
A test-suite diagnosability metric for spectrum-based fault localization approaches. 654-664
Research track: Testing II
- Tianyi Zhang, Miryung Kim:

Automated transplantation and differential testing for clones. 665-676 - José Miguel Rojas

, Thomas D. White, Benjamin S. Clegg, Gordon Fraser:
Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing game. 677-688 - August Shi, Suresh Thummalapenta, Shuvendu K. Lahiri, Nikolaj S. Bjørner, Jacek Czerwonka:

Optimizing test placement for module-level regression testing. 689-699 - Junjie Chen, Yanwei Bai, Dan Hao

, Yingfei Xiong, Hongyu Zhang
, Bing Xie:
Learning to prioritize test programs for compiler testing. 700-711
Research track: Defect prediction
- He Jiang, Xiaochen Li, Zijiang Yang, Jifeng Xuan

:
What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing. 712-723
Research track: Formal methods
- Ivan Bocic, Tevfik Bultan:

Symbolic model extraction for web application verification. 724-734 - David Faitelson, Shmuel S. Tyszberowicz:

UML diagram refinement (focusing on class- and use case diagrams). 735-745
Research track: Software evolution
- Francisco Servant

, James A. Jones:
Fuzzy fine-grained code-history analysis. 746-757 - Zheng Gao, Christian Bird, Earl T. Barr

:
To type or not to type: quantifying detectable bugs in JavaScript. 758-769 - Aleksander Fabijan

, Pavel A. Dmitriev, Helena Holmström Olsson, Jan Bosch:
The evolution of continuous experimentation in software product development: from data to a data-driven organization at scale. 770-780

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














