


default search action
ICSE 2018: Gothenburg, Sweden - Companion Volume
- Michel Chaudron, Ivica Crnkovic, Marsha Chechik, Mark Harman:

Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018. ACM 2018, ISBN 978-1-4503-5663-3
Mining repositories
- Santiago Dueñas, Valerio Cosentino, Gregorio Robles

, Jesús M. González-Barahona
:
Perceval: software project data at your will. 1-4 - Chase Greco, Tyler Haden, Kostadin Damevski

:
StackInTheFlow: behavior-driven recommendation system for stack overflow posts. 5-8 - Zhongxin Liu, Qiao Huang, Xin Xia

, Emad Shihab, David Lo
, Shanping Li:
SATD detector: a text-mining-based self-admitted technical debt detection tool. 9-12
Test automation and failure diagnosis
- Mojdeh Golagha, Abu Mohammed Raisuddin

, Lennart Mittag, Dominik Hellhake, Alexander Pretschner:
Aletheia: a failure diagnosis toolchain. 13-16 - Antonia Bertolino

, Antonello Calabrò
, Guglielmo De Angelis, Micael Gallego
, Boni García
, Francisco Gortázar:
When the testing gets tough, the tough get ElasTest. 17-20 - Pietro Braione

, Giovanni Denaro, Andrea Mattavelli, Mauro Pezzè
:
SUSHI: a test generator for programs with complex structured inputs. 21-24
Mutation testing
- Alex Groce, Josie Holmes, Darko Marinov, August Shi, Lingming Zhang:

An extensible, regular-expression-based tool for multi-language mutant generation. 25-28 - Kaiyuan Wang, Allison Sullivan

, Sarfraz Khurshid:
MuAlloy: a mutation testing framework for alloy. 29-32 - Kevin Moran, Michele Tufano, Carlos Bernal-Cárdenas, Mario Linares Vásquez, Gabriele Bavota

, Christopher Vendome, Massimiliano Di Penta, Denys Poshyvanyk
:
MDroid+: a mutation testing framework for android. 33-36
Performance and NFR
- Robert Heinrich, Dominik Werle, Heiko Klare

, Ralf H. Reussner
, Max E. Kramer, Steffen Becker, Jens Happe, Heiko Koziolek, Klaus Krogmann:
The palladio-bench for modeling and simulating software architectures. 37-40 - Jürgen Cito, Philipp Leitner

, Christian Bosshard, Markus Knecht, Genc Mazlami, Harald C. Gall
:
PerformanceHat: augmenting source code with runtime performance traces in the IDE. 41-44 - Séverine Sentilles, Federico Ciccozzi, Efi Papatheocharous:

PROMOpedia: a web-content management-based encyclopedia of software property models. 45-48
Evolution
- Sofija Hotomski, Martin Glinz:

GuideGen: a tool for keeping requirements and acceptance tests aligned. 49-52 - Daye Nam, Youn Kyu Lee, Nenad Medvidovic:

EVA: a tool for visualizing software architectural evolution. 53-56 - Yi Li

, Chenguang Zhu
, Julia Rubin, Marsha Chechik:
CSlicerCloud: a web-based semantic history slicing framework. 57-60
Testing vulnerabilities
- Mingzhe Wang, Jie Liang, Yuanliang Chen, Yu Jiang, Xun Jiao, Han Liu, Xibin Zhao, Jiaguang Sun:

SAFL: increasing and accelerating testing coverage with symbolic execution and guided fuzzing. 61-64 - Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:

ReGuard: finding reentrancy bugs in smart contracts. 65-68 - Cong Wang, Yu Jiang, Xibin Zhao, Xiaoyu Song, Ming Gu, Jiaguang Sun:

Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysis. 69-72
SPLs and OO repair
- Christian Kröher, Sascha El-Sharkawy

, Klaus Schmid
:
KernelHaven: an experimentation workbench for analyzing software product lines. 73-76 - Ripon K. Saha, Hiroaki Yoshida, Mukul R. Prasad, Susumu Tokumoto, Kuniharu Takayama, Isao Nanba:

Elixir: an automated repair tool for Java programs. 77-80 - Mukelabai Mukelabai, Benjamin Behringer, Moritz Fey, Jochen Palz, Jacob Krüger

, Thorsten Berger:
Multi-view editing of software product lines with PEoPL. 81-84
Static analysis
- Jesús Sánchez Cuadrado

, Esther Guerra
, Juan de Lara:
AnATLyzer: an advanced IDE for ATL model transformations. 85-88 - Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:

VISUFLOW: a debugging environment for static analyses. 89-92 - Csaba Nagy, Anthony Cleve:

SQLInspect: a static analyzer to inspect database usage in Java applications. 93-96
Model-driven development
- Mojtaba Bagherzadeh, Nicolas Hili, David Seekatz

, Juergen Dingel:
MDebugger: a model-level debugger for UML-RT. 97-100 - Mirko D'Angelo, Annalisa Napolitano, Mauro Caporuscio

:
CyPhEF: a model-driven engineering framework for self-adaptive cyber-physical systems. 101-104 - Manuel Ohrndorf, Christopher Pietsch, Udo Kelter, Timo Kehrer:

ReVision: a tool for history-based model repair recommendations. 105-108
Verification
- Benjamin Holland, Payas Awadhutkar, Suresh C. Kothari, Ahmed Tamrawi, Jon Mathews:

COMB: computing relevant program behaviors. 109-112 - Vince Molnár

, Bence Graics
, András Vörös, István Majzik, Dániel Varró
:
The Gamma statechart composition framework: : design, verification and code generation for component-based reactive systems. 113-116 - Ahmet Çelik, Karl Palmskog, Milos Gligoric:

A regression proof selection tool for coq. 117-120
Posters
- Thomas Kuhn, Pablo Oliveira Antonino, Markus Damm, Andreas Morgenstern, Dirk Schulz, Constantin Ziesche, Thorsten Müller:

Industrie 4.0 virtual automation bus. 121-122 - Julian M. Bass

, Sarah Beecham, Mohammad Abdur Razzak, Clodagh Nic Canna, John Noll:
An empirical study of the product owner role in scrum. 123-124 - Yan de Lima Justino, Carlos Eduardo da Silva

:
Reengineering legacy systems for supporting SOA: a case study on the brazilian's secretary of state for taxation. 125-126 - Yaping Luo, Egbert Touw:

Results from multi-faceted software reliability assessment studies. 127-128 - Irina Diana Coman, Alberto Sillitti, Giancarlo Succi

:
An initial characterization of bug-injecting development sessions. 129-130 - Katharina Juhnke, Matthias Tichy, Frank Houdek:

Challenges with automotive test case specifications. 131-132 - Pavneet Singh Kochhar, Stanislaw Swierc, Trevor Carnahan, Hitesh Sajnani, Meiyappan Nagappan:

Understanding the role of reporting in work item tracking systems for software development: an industrial case study. 133-134 - Bianca Bergande

, Philipp Brune:
When students meet developers: are barcamps a format for interactive software engineering education? 135-136 - Julio Cezar Costa Furtado, Sandro Ronaldo Bezerra Oliveira:

A methodology to teaching statistical process control for software engineers. 137-138 - Jakeline Marcos-Abed:

A matrix for analyzing projects in software engineering courses. 139-140 - Yao Lu, Xinjun Mao, Tao Wang, Gang Yin, Zude Li, Huaimin Wang:

Continuous inspection in the classroom: improving students' programming quality with social coding methods. 141-142 - Rafael Chanin, Afonso Sales, Leandro Bento Pompermaier, Rafael Prikladnicki:

Startup software development education: a systematic mapping study. 143-144 - Styliani Kleanthous

, Georgia M. Kapitsaki:
Analyzing the transactive memory in teaching software engineering. 145-146 - Shoaib Akbar, Edward F. Gehringer

, Zhewei Hu:
Improving formation of student teams: a clustering approach. 147-148 - Arnon Sturm

, Timothy C. Lethbridge
:
Are our students engaged in their studies?: professional engagement vs. study engagement. 149-150 - Harumi Watanabe, Mikiko Sato, Masafumi Miwa, Makoto Imamura, Shintaro Hosoai, Nobuhiko Ogura, Hiroyuki Nakamura, Kenji Hisazumi

:
Multidisciplinary skill assessment for embedded software development education via a robot contest. 151-152 - Gustavo H. S. Alexandre

, Simone C. dos Santos:
PBL planner toolkit: a canvas-based tool for planning PBL in software engineering education. 153-154 - Alan R. Santos, Afonso Sales, Paulo Fernandes

, Josiane Kroll:
Challenge-based learning: a brazilian case study. 155-156 - Daniel Russo

, Marcello Missiroli, Paolo Ciancarini
:
A conceptual model for cooperative thinking. 157-158 - Wilhelm Koop, Tobias Brückmann, Marian Benner-Wickner

, Markus Kleinschmidt, Volker Gruhn:
Situation-based e-learning in software engineering: using software engineering-related metadata to improve self-empowered learning. 159-160 - Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara

, Naoki Kawashima, Hajimu Iida:
A multi-year analysis of students' build errors in agile software development educational projects. 161-162 - Zhe Chen, Yifan Wu, Ou Wei, Bin Sheng:

Deciding weak monitorability for runtime verification. 163-164 - Amar Budhiraja, Raghu Reddy

, Manish Shrivastava
:
LWE: LDA refined word embeddings for duplicate bug report detection. 165-166 - Thanh Van Nguyen, Tien N. Nguyen:

Inferring API elements relevant to an english query. 167-168 - Grigoreta Sofia Cojocar, Adriana Mihaela Guran:

A study of monitoring crosscutting concerns implementation. 169-170 - Dmitry V. Luciv, Dmitrij V. Koznov, George A. Chernishev, Hamid Abdul Basit

, Konstantin Yu. Romanovsky, Andrey N. Terekhov:
Duplicate finder toolkit. 171-172 - David Shriver

:
Toward the development of richer properties for recommender systems. 173-174 - Kunal Banerjee, Ramanuj Chouksey, Chandan Karfa

, Pankaj Kumar Kalita:
Automatic detection of inverse operations while avoiding loop unrolling. 175-176 - Muhammad Sohaib Ayub

, Junaid Haroon Siddiqui
:
Efficiently finding minimal failing input in MapReduce programs. 177-178 - Luyao Ren, Shurui Zhou, Christian Kästner:

Forks insight: providing an overview of GitHub forks. 179-180 - Mihaela Todorova Tomova, Michael Rath, Patrick Mäder:

Use of trace link types in issue tracking systems. 181-182 - Abigail Atchison, Haley Anderson, Christina Berardi, Natalie Best, Cristiano Firmani, Rene German, Erik Linstead:

A topic analysis of the R programming language. 183-184 - Jungho Kim, Sungwon Kang, Hwi Ahn, ChangSup Keum, Chan-Gun Lee:

Architecture reconstruction and evaluation of blockchain open source platform. 185-186 - Serin Jeong, Heetae Cho, Seonah Lee:

Agile requirement traceability matrix. 187-188 - Zhe Chen, Chuanqi Tao, Zhiyi Zhang, Zhibin Yang:

Beyond spatial and temporal memory safety. 189-190 - Shin-Young Ahn, Joongheon Kim

, Sungwon Kang:
A novel shared memory framework for distributed deep learning in high-performance computing architecture. 191-192 - Amar Budhiraja, Kartik Dutta, Raghu Reddy

, Manish Shrivastava
:
DWEN: deep word embedding network for duplicate bug report detection in software repositories. 193-194 - Mohamad Barbar, Yulei Sui

, Hongyu Zhang
, Shiping Chen
, Jingling Xue
:
Live path control flow integrity. 195-196 - Tobias Olsson, Morgan Ericsson, Anna Wingkvist

:
Using repository data for driving software architecture. 197-198 - Eugenio Parra, Jose Luis de la Vara

, Luis Alonso:
Analysis of requirements quality evolution. 199-200 - Jingyi Su, Mohd Arafat, Robert Dyer

:
Using consensus to automatically infer post-conditions. 202-203 - Md. Rezaur Rahman, Mojdeh Golagha, Alexander Pretschner:

Pairika: a failure diagnosis benchmark for C++ programs. 204-205 - Yiming Tang, Raffi Khatchadourian

, Mehdi Bagherzadeh, Syed Ahmed:
Towards safe refactoring for intelligent parallelization of Java 8 streams. 206-207 - Nagendra Prasad Kasaghatta Ramachandra, Christoph Csallner

:
Testing web-based applications with the voice controlled accessibility and testing tool (VCAT). 208-209 - Emily Su, Sameer Joshi:

Leveraging product relationships to generate candidate bugs for duplicate bug prediction. 210-211 - Eric Ruiz, Richard Avelar, Xiaoyin Wang:

Protecting remote controlling apps of smart-home-oriented IOT devices. 212-213 - Yijun Liu, Zhenbang Chen, Wei Dong, Chendong Feng:

MC/DC coverage-oriented compiler optimization for symbolic execution. 214-215 - Maria Ulan, Welf Löwe, Morgan Ericsson, Anna Wingkvist

:
Introducing quality models based on joint probabilities. 216-217 - Bat-Chen Rothenberg, Orna Grumberg:

Program repair that learns from mistakes. 218-219 - Sebastian Hönel

, Morgan Ericsson, Welf Löwe, Anna Wingkvist
:
A changeset-based approach to assess source code density and developer efficacy. 220-221 - Nelly Condori-Fernández

, Alejandro Catalá Bolos
, Patricia Lago
:
Discovering requirements of behaviour change software systems from negative user experience. 222-223 - Shahab Bayati:

Understanding newcomers success in open source community. 224-225 - Janet Wyngaard

, Samuel S. C. Rund, Gregory R. Madey, Michael Vierhauser
, Jane Cleland-Huang:
Swarming remote piloted aircraft systems for mosquito-borne disease research and control. 226-227 - Fatma Basak Aydemir

, Fabiano Dalpiaz:
Ethics-aware software engineering. 228-229 - Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng, Jinyun Xue, Shaoying Liu:

An efficient approach for verifying automobile distributed application systems on timing property. 230-231 - Lucrecia Llerena

, Nancy Rodríguez, Pablo Gómez-Abajo
, John W. Castro, Silvia Teresita Acuña:
"Adoption of the visual brainstorming technique in the open source software development process". 232-233 - Cong Liu

, Boudewijn F. van Dongen
, Nour Assy, Wil M. P. van der Aalst
:
A general framework to detect behavioral design patterns. 234-235 - Huan Lin, Yawen Wang, Yunzhan Gong:

Subsuming mutation operators. 236-237 - Lingyun Situ, Liang Zou, Linzhang Wang, Yang Liu

, Bing Mao, Xuandong Li:
Detecting missing checks for identifying insufficient attack protections. 238-239 - Fabio Palomba

, Damian A. Tamburri
, Alexander Serebrenik
, Andy Zaidman, Francesca Arcelli Fontana, Rocco Oliveto:
How do community smells influence code smells? 240-241 - Verena Käfer, Daniel Graziotin

, Ivan Bogicevic, Stefan Wagner
, Jasmin Ramadani:
Communication in open-source projects-end of the e-mail era? 242-243 - Morakot Choetkiertikul, Hoa Khanh Dam, Truyen Tran, Trang Pham, Aditya Ghose:

Predicting components for issue reports using deep learning with information retrieval. 244-245 - Rubing Huang

, Yunan Zhou, Dave Towey
, Tsong Yueh Chen
, Jinfu Chen:
An experimental analysis of fault detection capabilities of covering array constructors. 246-247 - Misoo Kim

, Eunseok Lee
:
Are information retrieval-based bug localization techniques trustworthy? 248-249 - Cong Tian, Zhao Duan, Zhenhua Duan:

Accelerating counterexample detection in software model checking. 250-251 - Jeongho Kim, Jindae Kim

, Eunseok Lee
:
A novel variable-centric fault localization technique. 252-253 - Cong Tian, Congli Xia, Zhenhua Duan:

Android inter-component communication analysis with intent revision. 254-255 - Felipe Osses, Gastón Márquez, Hernán Astudillo

:
Exploration of academic and industrial evidence about architectural tactics and patterns in microservices. 256-257 - Shaohan Hu, Peng Liu, Chun-Fu (Richard) Chen, Marco Pistoia:

Automatically solving NP-complete problems on a quantum computer. 258-259 - Yuan Huang, Nan Jia, Qiang Zhou, Xiangping Chen, Yingfei Xiong, Xiaonan Luo:

Guiding developers to make informative commenting decisions in source code. 260-261 - Arman Shahbazian, Youn Kyu Lee, Yuriy Brun, Nenad Medvidovic:

Making well-informed software design decisions. 262-263 - Zhe Chen, Junqi Yan, Wenming Li, Ju Qian, Zhiqiu Huang:

Runtime verification of memory safety via source transformation. 264-265 - Jiarong Wu, Yanyan Jiang, Chang Xu, Shing-Chi Cheung

, Xiaoxing Ma, Jian Lu:
Synthesizing relation-aware entity transformation by examples. 266-267 - Long H. Pham, Quang Loc Le, Quoc-Sang Phan

, Jun Sun, Shengchao Qin
:
Testing heap-based programs with Java StarFinder. 268-269 - Di Wu

, Xiao-Yuan Jing, Haowen Chen, Xiaoke Zhu, Hongyu Zhang
, Mei Zuo, Lu Zi, Chen Zhu:
Automatically answering API-related questions. 270-271 - Naoyasu Ubayashi

, Hokuto Muraoka, Daiki Muramoto, Yasutaka Kamei, Ryosuke Sato
:
Exploring uncertainty in GitHub OSS projects: when and how do developers face uncertainty? 272-273 - Christoph Luckeneder, Hermann Kaindl:

Systematic top-down design of cyber-physical models with integrated validation and formal verification. 274-275 - Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein

:
On vulnerability evolution in Android apps. 276-277 - Kan Qi, Barry W. Boehm:

UMLx: a UML diagram analytic tool for software management decisions. 278-279 - Gulsher Laghari, Serge Demeyer:

Unit tests and component tests do make a difference on fault localisation effectiveness. 280-281 - Tam The Nguyen, Phong Minh Vu, Hung Viet Pham, Tung Thanh Nguyen

:
Recommending exception handling patterns with ExAssist. 282-283 - Phong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen

, Hung Viet Pham:
ALPACA-advanced linguistic pattern and concept analysis framework for software engineering corpora. 284-285 - Yang Wang, Stefan Wagner

:
Combining STPA and BDD for safety analysis and verification in agile development. 286-287 - Umberto Azadi, Francesca Arcelli Fontana, Marco Zanoni:

Machine learning based code smell detection through WekaNose. 288-289 - Laurens Sion

, Koen Yskout
, Dimitri Van Landuyt
, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. 290-291 - Simon Schwichtenberg, Ivan Jovanovikj, Christian Gerth, Gregor Engels:

CrossEcore: an extendible framework to use ecore and OCL across platforms. 292-293 - Jian Zhang, Hailong Sun, Yanfei Tian, Xudong Liu:

Semantically enhanced tag recommendation for software CQAs via deep learning. 294-295 - Puwei Wang, Xiaohe Liu, Jinchuan Chen, Ying Zhan, Zhi Jin:

QoS-aware service composition using blockchain-based smart contracts. 296-297 - Roland Kretschmer, Djamel Eddine Khelladi, Alexander Egyed:

An automated and instant discovery of concrete repairs for model inconsistencies. 298-299 - Ivonne von Nostitz-Wallwitz, Jacob Krüger

, Janet Siegmund, Thomas Leich:
Knowledge transfer from research to industry: a survey on program comprehension. 300-301 - Seongmin Lee

, David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
MOBS: multi-operator observation-based slicing using lexical approximation of program dependence. 302-303 - Jessie Carbonnel, Marianne Huchard

, Clémentine Nebut:
On extracting relevant and complex variability information from software descriptions with pattern structures. 304-305 - Carmen Coviello, Simone Romano

, Giuseppe Scanniello
:
CUTER: ClUstering-based test suite reduction. 306-307 - Simone Romano

, Giuseppe Scanniello
, Davide Fucci, Natalia Juristo, Burak Turhan
:
The effect of noise on requirements comprehension. 308-309 - Eric Braude, Jason Van Schooneveld:

Incremental UML for agile development with PREXEL. 310-312 - John L. Singleton, Gary T. Leavens, Hridesh Rajan

, David R. Cok:
An algorithm and tool to infer practical postconditions. 313-314 - Jaechang Nam, Song Wang, Yuan Xi, Lin Tan:

Designing bug detection rules for fewer false alarms. 315-316 - Adelina Ciurumelea, Sebastiano Panichella

, Harald C. Gall
:
Automated user reviews analyser. 317-318 - Chao Liu, Dan Yang, Xiaohong Zhang, Haibo Hu, Jed Barson, Baishakhi Ray:

A recommender system for developer onboarding. 319-320 - Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree:

Obfuscating program control flow with Intel SGX. 321-322 - Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chenjie Xu, Chao Ji, Wenyun Zhao:

Benchmarking microservice systems for software engineering research. 323-324 - Yuchen Guo, Martin J. Shepperd, Ning Li:

Bridging effort-aware prediction and strong classification: a just-in-time software defect prediction study. 325-326 - Zonghui Li, Hai Wan, Yangdong Deng, Qinghan Yu, Tianchi Li, Kang Wei, Ming Gu:

Model-based adaptation to extreme physical environments: a case study on mixed-criticality industrial ethernet. 327-328 - Fangge Yan, Zhengwei Qi, Mingyuan Xia, Xue Liu:

Efficient and deterministic replay for web-enabled Android apps. 329-330 - Dhananjai Madhava Rao:

A parallel framework for ab initio transcript-clustering. 331-332 - Robert Biddle, Andreas Meier, Martin Kropp, Craig Anslow:

Sources of satisfaction in agile software development. 333-334 - Md. Masudur Rahman, Saikat Chakraborty

, Baishakhi Ray:
Which similarity metric to use for software documents?: a study on information retrieval based software engineering tasks. 335-336 - Michael John Decker, Christian D. Newman

, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic, Nicholas A. Kraft:
A taxonomy of how method stereotypes change. 337-338 - Andrew Hill, Corina S. Pasareanu, Kathryn T. Stolee:

Automated program repair with canonical constraints. 339-341 - Henning Schnoor, Wilhelm Hasselbring

:
Toward measuring software coupling via weighted dynamic metrics. 342-343 - Bilal Amir, Paul Ralph

:
There is no random sampling in software engineering research. 344-345 - Affan Rauf

, Muhammad Nawaz, Junaid Haroon Siddiqui
:
Efficient iterative deepening for bounded exhaustive generation of complex structures. 346-347 - Mohammad Masudur Rahman

, Chanchal K. Roy:
Improving bug localization with report quality dynamics and query reformulation. 348-349 - Haipeng Cai

, John Jenkins:
Towards sustainable Android malware detection. 350-351 - Jeffrey Svajlenko, Chanchal K. Roy:

Fast, scalable and user-guided clone detection. 352-353 - Chong Tang, Kevin J. Sullivan, Baishakhi Ray:

Searching for high-performing software configurations with metaheuristic algorithms. 354-355 - Edwin Dauber

, Aylin Caliskan, Richard E. Harang, Rachel Greenstadt:
Git blame who?: stylistic authorship attribution of small, incomplete source code fragments. 356-357 - Xiao Wang, Lu Xiao, Ye Yang, Xinyi Xu, Yu Jiang:

Identifying TraIn: a neglected form of socio-technical incongruence. 358-359 - Weili Chen, Zibin Zheng

, Mingjie Ma, Pinjia He, Peilin Zheng, Yuren Zhou:
Efficient blockchain-based software systems via hierarchical bucket tree. 360-361 - Fenfang Xie, Liang Chen, Dongding Lin, Chuan Chen, Zibin Zheng

, Xiaola Lin:
Group preference based API recommendation via heterogeneous information network. 362-363 - Weizhao Yuan, Hoang H. Nguyen

, Lingxiao Jiang
, Yuting Chen:
LibraryGuru: API recommendation for Android developers. 364-365 - Ansong Ni, Ming Li:

ACONA: active online model adaptation for predicting continuous integration build failures. 366-367 - Manzoor Ahmad, Christophe Gnaho, Jean-Michel Bruel, Régine Laleau:

How to handle environmental uncertainty in goal-based requirements engineering. 368-369 - Andreas Rau, Jenny Hotzkow, Andreas Zeller

:
Efficient GUI test generation by learning from tests of other apps. 370-371 - Alexandre Perez, Rui Abreu

:
A qualitative reasoning approach to spectrum-based fault localization. 372-373 - Melanie Langermeier, Bernhard Bauer:

Evaluating project compliance during EA planning: a model-based semi automatic method for enterprise architecture planning. 374-375 - Ayesha Afzal, Ahmad Akhtar

, Nabila Ishfaq, Basit Shafiq, Shafay Shamail, Abeer Elahraf, Jaideep Vaidya, Nabil R. Adam:
ASSEMBLE: a collaborative business process development tool. 376-377 - Jing Zhao, Gao-Rong Ning, Hualin Lu, Yanbin Wang, Yan Cai

, Jian Zhang:
A weight-based approach to combinatorial test generation. 378-379 - Farnaz Behrang, Alessandro Orso:

Automated test migration for mobile apps. 384-385 - Hongliang Liang, Wenying Hu, Yini Zhang, Lin Jiang, Wuwei Shen:

USE: unified and split execution for exposing divergences between versions. 386-387 - Pengcheng Yin, Bowen Deng, Edgar Chen, Bogdan Vasilescu

, Graham Neubig:
Learning to mine parallel natural language/source code corpora from stack overflow. 388-389 - Rainer Niedermayr, Tobias Röhm, Stefan Wagner

:
Identification of methods with low fault risk. 390-391 - Fabienne Boyer, Noël De Palma, Xinxiu Tao

, Xavier Etchevers:
A declarative approach for updating distributed microservices. 392-393 - Chun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan:

Static detection of API call vulnerabilities in iOS executables. 394-395 - Harald Störrle, Nick Baltsen, Henrik Christoffersen, Anja M. Maier

:
How do modelers read UML diagrams?: preliminary results from an eye-tracking study. 396-397 - Amir Zghidi, Imed Hammouda, Brahim Hnich

:
Towards a formal API assessment. 398-399 - Luis Cruz

, Rui Abreu
:
Measuring the energy footprint of mobile testing frameworks. 400-401 - Vladimir Ivanov, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin:

Precooked developer dashboards: what to show and how to use. 402-403 - Lykes Claytor, Francisco Servant

:
Understanding and leveraging developer inexpertise. 404-405 - Isabella Ferreira, Eduardo Fernandes

, Diego Cedrim, Anderson G. Uchôa
, Ana Carla Bibiano, Alessandro Garcia, João Lucas Correia, Filipe Santos, Gabriel Nunes, Caio Barbosa, Baldoino Fonseca, Rafael Maiani de Mello
:
The buggy side of code refactoring: understanding the relationship between refactorings and bugs. 406-407 - Thierry Titcheu Chekam, Mike Papadakis

, Tegawendé F. Bissyandé, Yves Le Traon
:
Predicting the fault revelation utility of mutants. 408-409 - Ramanathan Ramu, Ganesha Upadhyaya

, Hoan Anh Nguyen, Hridesh Rajan
:
Hybrid traversal: efficient source code analysis at scale. 412-413 - Akond Rahman

, Jonathan Stallings
, Laurie A. Williams:
Defect prediction metrics for infrastructure as code scripts in DevOps. 414-415 - Michael Vierhauser

, Sean Bayley, Jane Wyngaard
, Jinghui Cheng, Wandi Xiong, Robyn R. Lutz
, Joshua Huseman, Jane Cleland-Huang:
Interlocking safety cases for unmanned autonomous systems in urban environments. 416-417 - Ernani César dos Santos, Patricia Vilain, Douglas Hiura Longo:

A systematic literature review to support the selection of user acceptance testing techniques. 418-419 - Spencer Smith, Mojdeh Sayari Nejad, Alan Wassyng:

Assurance cases for scientific computing software. 420-421 - Tianyi Zhang, Miryung Kim:

Grafter: transplantation and differential testing for clones. 422-423 - Tegan Brennan, Seemanta Saha, Tevfik Bultan:

Symbolic path cost analysis for side-channel detection. 424-425 - Patrick Morrison, Tosin Daniel Oyetoyan, Laurie A. Williams:

Identifying security issues in software development: are keywords enough? 426-427 - Gábor Horváth, Péter Szécsi, Zoltán Gera, Dániel Krupp, Norbert Pataki

:
Implementation and evaluation of cross translation unit symbolic execution for C family languages. 428 - Daniel DeFreez, Aditya V. Thakur, Cindy Rubio-González:

Path-based function embeddings. 430-431 - Paul Temple, Mathieu Acher

, Jean-Marc Jézéquel
:
Multimorphic testing. 432-433 - Claudio Menghi

, Christos Tsigkanos
, Thorsten Berger, Patrizio Pelliccione
, Carlo Ghezzi:
Property specification patterns for robotic missions. 434-435 - Thomas Karcher, Mathias Landhäußer:

Autotuning PostgreSQL: a blueprint for successful autotuning of real-world applications. 436-437 - Claudio Menghi

, Sergio García, Patrizio Pelliccione
, Jana Tumova:
Towards multi-robot applications planning under uncertainty. 438-439 - Yuxia Zhang, Xin Tan, Minghui Zhou, Zhi Jin:

Companies' domination in FLOSS development: an empirical study of OpenStack. 440-441 - Panagiotis Stratis, Ajitha Rajan:

Reordering tests for faster test suite execution. 442-443 - Arushi Gupta, Wentao Wang, Nan Niu, Juha Savolainen:

Answering the requirements traceability questions. 444-445 - Christopher Steven Timperley, Susan Stepney, Claire Le Goues

:
BugZoo: a platform for studying software bugs. 446-447
Doctoral symposium
- Fahed Alkhabbas

:
An approach to engineer and realize emergent configurations in the internet of things. 448-449 - Gemma Catolino

:
Effort-oriented methods and tools for software development and maintenance for mobile apps. 450-451 - Shafiul Azam Chowdhury:

Understanding and improving cyber-physical system models and development tools. 452-453 - Sergio García:

Effective engineering of multi-robot software applications. 454-455 - Lea Kristin Gerling:

Automated migration support for software product line co-evolution. 456-457 - Yuxing Ma:

Constructing supply chains in open source software. 458-459 - Fabiana Freitas Mendes:

The relationship between personality and value-based decision-making. 460-461 - Mahyar Tourchi Moghaddam:

IoT-based urban security models. 462-463 - Nuthan Munaiah:

Assisted discovery of software vulnerabilities. 464-467 - Giovanni Liva:

Automatic verification of time behavior of programs. 468-471 - Junjie Chen:

Learning to accelerate compiler testing. 472-475 - Akond Rahman

:
Characteristics of defective infrastructure as code scripts in DevOps. 476-479 - André N. Meyer:

Fostering software developers' productivity at work through self-monitoring and goal-setting. 480-483 - Wasim Said

:
Interactive model mining from embedded legacy software. 484-487 - Beyza Eken

:
Assessing personalized software defect predictors. 488-491 - Bin Lin

:
Crowdsourced software development and maintenance. 492-495 - Norman Peitek:

A neuro-cognitive perspective of program comprehension. 496-499
ACM student research competition
- Larissa Rocha Soares

:
VarXplorer: reasoning about feature interactions. 500-502 - Moritz Beller

:
Toward an empirical theory of feedback-driven development. 503-505 - Shafiul Azam Chowdhury:

Automatically finding bugs in commercial cyber-physical system development tool chains. 506-508 - Muhammad Ali Gulzar:

Interactive and automated debugging for big data analytics. 509-511 - Eman Aldakheel

:
Deadlock detector and solver (DDS). 512-514 - Nafiseh Kahani:

AutoModel: a domain-specific language for automatic modeling of real-time embedded systems. 515-517 - Jacob Krüger

:
When to extract features: towards a recommender system. 518-520 - Vanya Yaneva:

Compiler-assisted test acceleration using GPUs. 521-523 - Asher Trockman:

Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem. 524-526 - Hengbiao Yu:

Combining symbolic execution and model checking to verify MPI programs. 527-530
Technical briefings: session I
- Laura Moreno, Andrian Marcus

:
Automatic software summarization: the state of the art. 530-531 - Peter Zimmerer:

Strategy for continuous testing in iDevOps. 532-533 - Sira Vegas

:
Analyzing software engineering experiments: everything you always wanted to know but were afraid to ask. 534-535
Technical briefings: session II
- Alessio Ferrari

:
Natural language requirements processing: from research to practice. 536-537 - Sergio Segura, Zhi Quan Zhou

:
Metamorphic testing 20 years later: a hands-on introduction. 538-539 - Diomidis Spinellis

, Georgios Gousios:
How to analyze git repositories with command line tools: we're not in kansas anymore. 540-541
Technical briefings: session III
- Georgios Gousios:

Big data software analytics with Apache Spark. 542-543 - Suraj C. Kothari:

Demystifying cyber-physical malware. 544-545 - Tushar Sharma

:
Detecting and managing code smells: research and practice. 546-547
Technical briefings: session IV
- Karl Meinke, Amel Bennaceur

:
Machine learning for software engineering: models, methods, and applications. 548-549 - Eric Bodden:

State of the systems security. 550-551 - Thomas Ball, Judith Bishop, Joe Finney:

Multi-platform computing for physical devices via MakeCode and CODAL. 552-553

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














