default search action
ICSE 2018: Gothenburg, Sweden
- Michel Chaudron, Ivica Crnkovic, Marsha Chechik, Mark Harman:
Proceedings of the 40th International Conference on Software Engineering, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018. ACM 2018, ISBN 978-1-4503-5638-1
Software repair I
- Ming Wen, Junjie Chen, Rongxin Wu, Dan Hao, Shing-Chi Cheung:
Context-aware patch generation for better automated program repair. 1-11 - Jinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid:
Towards practical program repair with on-demand candidate generation. 12-23 - Jooyong Yi, Shin Hwei Tan, Sergey Mechtaev, Marcel Böhme, Abhik Roychoudhury:
A correlation study between automated program repair and test-suite metrics. 24 - Manish Motwani, Sandhya Sankaranarayanan, René Just, Yuriy Brun:
Do automated program repair techniques repair hard and important bugs? 25
Apps and app stores I
- Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, Dinghao Wu:
Software protection on the go: a large-scale empirical study on mobile app obfuscation. 26-36 - Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
GUILeak: tracing privacy policy claims on user input data for Android applications. 37-47 - Cuiyun Gao, Jichuan Zeng, Michael R. Lyu, Irwin King:
Online app review analysis for identifying emerging issues. 48-58 - Rodrigo Morales, Rubén Saborido, Foutse Khomh, Francisco Chicano, Giuliano Antoniol:
EARMO: an energy-aware refactoring approach for mobile apps. 59
Software evolution and maintenance I
- Sahil Bhatia, Pushmeet Kohli, Rishabh Singh:
Neuro-symbolic program corrector for introductory programming assignments. 60-70 - Zhilei Ren, He Jiang, Jifeng Xuan, Zijiang Yang:
Automated localization for unreproducible builds. 71-81 - Xiangyu Li, Shaowei Zhu, Marcelo d'Amorim, Alessandro Orso:
Enlightened debugging. 82-92 - Marco Scavuzzo, Elisabetta Di Nitto, Danilo Ardagna:
Experiences and challenges in building a data intensive system for data migration. 93
Human and social aspects of computing I
- Bin Lin, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta, Michele Lanza, Rocco Oliveto:
Sentiment analysis for software engineering: how far can we go? 94-104 - Shurui Zhou, Stefan Stanciulescu, Olaf Leßenich, Yingfei Xiong, Andrzej Wasowski, Christian Kästner:
Identifying features in forks. 105-116 - Inayat Rehman, Mehdi Mirakhorli, Meiyappan Nagappan, Azat Aralbay Uulu, Matthew Thornton:
Roles and impacts of hands-on software architects in five industrial case studies. 117-127 - Fabio Calefato, Filippo Lanubile, Federico Maiorano, Nicole Novielli:
Sentiment polarity detection for software development. 128
Software repair II
- Sergey Mechtaev, Manh-Dung Nguyen, Yannic Noller, Lars Grunske, Abhik Roychoudhury:
Semantic program repair using a reference implementation. 129-139 - Sonal Mahajan, Negarsadat Abolhassani, Phil McMinn, William G. J. Halfond:
Automated repair of mobile friendly problems in web pages. 140-150 - Rijnard van Tonder, Claire Le Goues:
Static automated program repair for heap properties. 151-162 - Xuan-Bach Dinh Le, Ferdian Thung, David Lo, Claire Le Goues:
Overfitting in semantics-based automated program repair. 163
Apps and app stores II
- Safwat Hassan, Chakkrit Tantithamthavorn, Cor-Paul Bezemer, Ahmed E. Hassan:
Studying the dialogue between users and developers of free apps in the google play store. 164 - Kevin Moran, Boyang Li, Carlos Bernal-Cárdenas, Dan Jelf, Denys Poshyvanyk:
Automated reporting of GUI design violations for mobile apps. 165-175 - Yixue Zhao, Marcelo Schmitt Laser, Yingjun Lyu, Nenad Medvidovic:
Leveraging program analysis to reduce user-perceived latency in mobile applications. 176-186 - Shin Hwei Tan, Zhen Dong, Xiang Gao, Abhik Roychoudhury:
Repairing crashes in Android apps. 187-198
Regression testing
- Lingming Zhang:
Hybrid regression test selection. 199-209 - Arash Vahabzadeh, Andrea Stocco, Ali Mesbah:
Fine-grained test minimization. 210-221 - Breno Miranda, Emilio Cruciani, Roberto Verdecchia, Antonia Bertolino:
FAST approaches to scalable similarity-based test case prioritization. 222-232 - Kaiyuan Wang, Chenguang Zhu, Ahmet Çelik, Jongwook Kim, Don S. Batory, Milos Gligoric:
Towards refactoring-aware regression test selection. 233-244
Open-source systems
- Jamie Stevenson, Murray I. Wood:
Inheritance usage patterns in open-source systems. 245-255 - Igor Steinmacher, Gustavo Pinto, Igor Scaliante Wiese, Marco Aurélio Gerosa:
Almost there: a study on quasi-contributors in open source software projects. 256-266 - Mojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer, Ahmed E. Hassan, Juergen Dingel, James R. Cordy:
Analyzing a decade of Linux system calls. 267 - Christopher Vendome, Daniel M. Germán, Massimiliano Di Penta, Gabriele Bavota, Mario Linares Vásquez, Denys Poshyvanyk:
To distribute or not to distribute?: why licensing bugs matter. 268-279
Test generation
- Leonardo Mariani, Mauro Pezzè, Daniele Zuddas:
Augusto: exploiting popular functionalities for the generation of semantic GUI tests with Oracles. 280-290 - Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin:
Towards optimal concolic testing. 291-302 - Yuchi Tian, Kexin Pei, Suman Jana, Baishakhi Ray:
DeepTest: automated testing of deep-neural-network-driven autonomous cars. 303-314 - Yunho Kim, Yunja Choi, Moonzoo Kim:
Precise concolic unit testing of C programs using extended units and symbolic alarm filtering. 315-326
Program reduction techniques
- Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue:
Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities. 327-337 - Yanxin Lu, Swarat Chaudhuri, Chris Jermaine, David Melski:
Program splicing. 338-349 - David Trabish, Andrea Mattavelli, Noam Rinetzky, Cristian Cadar:
Chopped symbolic execution. 350-360 - Chengnian Sun, Yuanbo Li, Qirun Zhang, Tianxiao Gu, Zhendong Su:
Perses: syntax-guided program reduction. 361-371
Security, privacy and trust I
- Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure coding practices in Java: challenges and vulnerabilities. 372-383 - Wei Yang, Mukul R. Prasad, Tao Xie:
EnMobile: entity-based characterization and analysis of mobile malware. 384-394 - Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira:
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations. 395 - Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, Arod Balissa:
Privacy by designers: software developers' privacy mindset. 396
Empirical software engineering
- Christoph Mayr-Dorn, Alexander Egyed:
Does the propagation of artifact changes across tasks reflect work dependencies? 397-407 - Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Large-scale analysis of framework-specific exceptions in Android apps. 408-419 - Lech Madeyski, Barbara A. Kitchenham:
Effect sizes and their variance for AB/BA crossover design studies. 420 - Mahmoud Hammad, Joshua Garcia, Sam Malek:
A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products. 421-431 - Nemitari Ajienka, Andrea Capiluppi, Steve Counsell:
An empirical study on the interplay between semantic coupling and co-change of software classes. 432
Test improvement
- Jonathan Bell, Owolabi Legunsen, Michael Hilton, Lamyaa Eloussi, Tifany Yung, Darko Marinov:
DeFlaker: automatically detecting flaky tests. 433-444 - Wontae Choi, Koushik Sen, George C. Necula, Wenyu Wang:
DetReduce: minimizing Android GUI test suites for regression testing. 445-455 - Michaël Marcozzi, Sébastien Bardin, Nikolai Kosmatov, Mike Papadakis, Virgile Prevosto, Loïc Correnson:
Time to clean your test objectives. 456-467 - Jung-Hyun Kwon, In-Young Ko, Gregg Rothermel:
Prioritizing browser environments for web application test execution. 468-479
Empirical studies of code
- Dayi Lin, Cor-Paul Bezemer, Ahmed E. Hassan:
An empirical study of early access games on the steam platform. 480 - Benjamin Danglot, Philippe Preux, Benoit Baudry, Martin Monperrus:
Correctness attraction: a study of stability of software behavior under runtime perturbation. 481 - Fabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Fausto Fasano, Rocco Oliveto, Andrea De Lucia:
On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation. 482 - Nikolaos Tsantalis, Matin Mansouri, Laleh Mousavi Eshkevari, Davood Mazinanian, Danny Dig:
Accurate and efficient refactoring detection in commit history. 483-494
Security, privacy and trust II
- Radu Calinescu, Danny Weyns, Simos Gerasimou, M. Usman Iftikhar, Ibrahim Habli, Tim Kelly:
ENTRUST: engineering trustworthy self-adaptive software with dynamic assurance cases. 495 - Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi:
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game. 496 - Joshua Garcia, Mahmoud Hammad, Sam Malek:
Lightweight, obfuscation-resilient detection and family identification of Android malware. 497 - Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? 498
Communities and ecosystems
- Maurício Finavaro Aniche, Christoph Treude, Igor Steinmacher, Igor Wiese, Gustavo Pinto, Margaret-Anne D. Storey, Marco Aurélio Gerosa:
How modern news aggregators help development communities shape and share knowledge. 499-510 - Asher Trockman, Shurui Zhou, Christian Kästner, Bogdan Vasilescu:
Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem. 511-522 - Daniel M. Germán, Gregorio Robles, Germán Poo-Caamaño, Xin Yang, Hajimu Iida, Katsuro Inoue:
"Was my contribution fairly reviewed?": a framework to study the perception of fairness in modern code reviews. 523-534 - Davide Di Ruscio, Mirco Franzago, Henry Muccini, Ivano Malavolta:
Collaborative model-driven software engineering: a classification framework and a research map. 535
Testing I
- Rongxin Wu, Ming Wen, Shing-Chi Cheung, Hongyu Zhang:
ChangeLocator: locate crash-inducing changes based on crash reports. 536 - Mike Papadakis, Donghwan Shin, Shin Yoo, Doo-Hwan Bae:
Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faults. 537-548 - Rafael Dutra, Kevin Laeufer, Jonathan Bachrach, Koushik Sen:
Efficient sampling of SAT solutions for testing. 549-559 - Shane McIntosh, Yasutaka Kamei:
Are fix-inducing changes a moving target?: a longitudinal case study of just-in-time defect prediction. 560
Studying software engineers I
- Anand Ashok Sawant, Maurício Finavaro Aniche, Arie van Deursen, Alberto Bacchelli:
Understanding developers' needs on deprecation as a language feature. 561-571 - Moritz Beller, Niels Spruit, Diomidis Spinellis, Andy Zaidman:
On the dichotomy of debugging behavior among programmers. 572-583 - Xin Xia, Lingfeng Bao, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li:
Measuring program comprehension: a large-scale field study with professionals. 584 - Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel:
Data scientists in software teams: state of the art and challenges. 585
Program analysis I
- Xiao Yu, Guoliang Jin:
Dataflow tunneling: mining inter-request data dependencies for request-based applications. 586-597 - Yifei Zhang, Yulei Sui, Jingling Xue:
Launch-mode-aware context-sensitive activity transition analysis. 598-608 - Jeff Huang:
UFO: predictive concurrency use-after-free detection. 609-619 - Ganesha Upadhyaya, Hridesh Rajan:
Collective program analysis. 620-631
Human and social aspects of computing II
- Hung Phan, Hoan Anh Nguyen, Ngoc M. Tran, Linh H. Truong, Anh Tuan Nguyen, Tien N. Nguyen:
Statistical learning of API fully qualified names in code snippets of online forums. 632-642 - Andrew Head, Caitlin Sadowski, Emerson R. Murphy-Hill, Andrea Knight:
When not to comment: questions and tradeoffs with API documentation for C++ projects. 643-653 - Brian Hempel, Justin Lubin, Grace Lu, Ravi Chugh:
Deuce: a lightweight user interface for structured editing. 654-664 - Chunyang Chen, Ting Su, Guozhu Meng, Zhenchang Xing, Yang Liu:
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation. 665-676
Testing II
- Davide Spadini, Maurício Finavaro Aniche, Margaret-Anne D. Storey, Magiel Bruntink, Alberto Bacchelli:
When testing meets code review: why and how developers review tests. 677-687 - Jingjing Liang, Sebastian G. Elbaum, Gregg Rothermel:
Redefining prioritization: continuous prioritization for continuous integration. 688-698 - Kwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah:
MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction. 699 - Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener:
On the use of hidden Markov model to predict the time to fix bugs. 700
Studying software engineers II
- Eirini Kalliamvakou, Christian Bird, Thomas Zimmermann, Andrew Begel, Robert DeLine, Daniel M. Germán:
What makes a great manager of software engineers? 701 - Wieslaw Kopec, Bartlomiej Balcerzak, Radoslaw Nielek, Grzegorz Kowalik, Adam Wierzbicki, Fabio Casati:
Older adults and hackathons: a qualitative study. 702-703 - Christoph Hannebauer, Marc Hesenius, Volker Gruhn:
Does syntax highlighting help programming novices? 704 - Maëlick Claes, Mika V. Mäntylä, Miikka Kuutila, Bram Adams:
Do programmers work at night or during the weekend? 705-715
Program analysis II
- Leen Lambers, Daniel Strüber, Gabriele Taentzer, Kristopher Born, Jevgenij Huebert:
Multi-granular conflict and dependency analysis in software engineering based on graph transformation. 716-727 - Zhiyong Shan, Iulian Neamtiu, Raina Samuel:
Self-hiding behavior in Android apps: detection and characterization. 728-739 - Fabio Palomba, Annibale Panichella, Andy Zaidman, Rocco Oliveto, Andrea De Lucia:
The scent of a smell: an extensive comparison between textual and structural smells. 740 - Jibesh Patra, Pooja N. Dixit, Michael Pradel:
ConflictJS: finding and understanding conflicts between JavaScript libraries. 741-751
Software comprehension
- Herman Banken, Erik Meijer, Georgios Gousios:
Debugging data flows in reactive programs. 752-763 - Jacob Krüger, Jens Wiemann, Wolfram Fenske, Gunter Saake, Thomas Leich:
Do you remember this source code? 764-775 - Saba Alimadadi, Ali Mesbah, Karthik Pattabiraman:
Inferring hierarchical motifs from execution traces. 776-787 - Ameer Armaly, Paige Rodeghero, Collin McMillan:
A comparison of program comprehension strategies by blind and sighted programmers. 788
Performance and maintenance
- Yingfei Xiong, Xinyuan Liu, Muhan Zeng, Lu Zhang, Gang Huang:
Identifying patch correctness in test-based program repair. 789-799 - Junwen Yang, Pranav Subramaniam, Shan Lu, Cong Yan, Alvin Cheung:
How not to structure your database-backed web applications: a study of performance bugs in the wild. 800-810 - Zhifei Chen, Bihuan Chen, Lu Xiao, Xiao Wang, Lin Chen, Yang Liu, Baowen Xu:
Speedoo: prioritizing performance optimization opportunities. 811-821 - Muhammad Moiz Arif, Weiyi Shang, Emad Shihab:
Empirical study on the discrepancy between performance testing results from virtual and physical environments. 822
Requirements and recommender systems
- Catarina Gralha, Daniela E. Damian, Anthony I. Wasserman, Miguel Goulão, João Araújo:
The evolution of requirements practices in software startups. 823-833 - Michael Rath, Jacob Rendall, Jin L. C. Guo, Jane Cleland-Huang, Patrick Mäder:
Traceability in the wild: automatically augmenting incomplete trace links. 834-845 - Alireza Sadeghi, Reyhaneh Jabbarvand, Negar Ghorbani, Hamid Bagheri, Sam Malek:
A temporal permission analysis and enforcement framework for Android. 846-857 - Eiji Adachi Barbosa, Alessandro Garcia:
Global-aware recommendations for repairing violations in exception handling. 858
Testing III
- Chu Chen, Cong Tian, Zhenhua Duan, Liang Zhao:
RFC-directed differential testing of certificate validation in SSL/TLS implementations. 859-870 - Hengbiao Yu, Zhenbang Chen, Ji Wang, Zhendong Su, Wei Dong:
Symbolic verification of regular properties. 871-881 - Sergio Segura, José Antonio Parejo, Javier Troya, Antonio Ruiz Cortés:
Metamorphic testing of RESTful web APIs. 882 - Narayan Ramasubbu, Chris F. Kemerer:
Integrating technical debt management and software quality management processes: a framework and field tests. 883
Mining software repositories
- Shaowei Wang, Tse-Hsun Chen, Ahmed E. Hassan:
Understanding the factors for fast answers in technical Q&A websites: an empirical study of four stack exchange websites. 884 - Hao Zhong, Na Meng:
Towards reusing hints from past fixes: an exploratory study on thousands of real samples. 885 - Tianyi Zhang, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim:
Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow. 886-896 - Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Ahmed E. Hassan:
Inference of development activities from interaction with uninstrumented applications. 897
Models and modeling I
- Sebastian Krieter, Thomas Thüm, Sandro Schulze, Reimar Schröter, Gunter Saake:
Propagating configuration decisions with modal implication graphs. 898-909