


default search action
46th ICSE 2024: Lisbon, Portugal - Companion
- Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, ICSE Companion 2024, Lisbon, Portugal, April 14-20, 2024. ACM 2024

Demonstrations
- Nuno Saavedra

, André Silva
, Martin Monperrus
:
GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions. 1-5 - Wei Minn

, Yan Naing Tun
, Lwin Khin Shar
, Lingxiao Jiang
:
DronLomaly: Runtime Log-based Anomaly Detector for DJI Drones. 6-10 - Zhiqiang Zang

, Aditya Thimmaiah
, Milos Gligoric
:
JOG: Java JIT Peephole Optimizations and Tests from Patterns. 11-15 - Georgios Alexopoulos

, Dimitris Mitropoulos
:
nvshare: Practical GPU Sharing without Memory Size Constraints. 16-20 - Sami Lazreg

, Maxime Cordy
, Simon Thrane Hansen
, Axel Legay
:
Daedalux: An Extensible Platform for Variability-Aware Model Checking. 21-25 - Rijnard van Tonder

:
Verifying and Displaying Move Smart Contract Source Code for the Sui Blockchain. 26-29 - Arkadii Sapozhnikov

, Mitchell Olsthoorn
, Annibale Panichella
, Vladimir Kovalenko
, Pouria Derakhshanfar
:
TestSpark: IntelliJ IDEA's Ultimate Test Generation Companion. 30-34 - André C. Hora

:
SpotFlow: Tracking Method Calls and States at Runtime. 35-39 - Brian Sigurdson

, Samuel W. Flint
, Robert Dyer
:
Boidae: Your Personal Mining Platform. 40-43 - Thomas Le Tourneau

, Jasmine Latendresse
, Ahmad Abdellatif
, Emad Shihab
:
Code Mapper: Mapping the Global Contributions of OSS. 44-48 - Ashwin Prasad Shivarpatna Venkatesh

, Samkutty Sabu
, Jiawei Wang
, Amir M. Mir
, Li Li
, Eric Bodden
:
TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference Tools. 49-53 - Michael Assad

, Christopher S. Meiklejohn
, Heather Miller
, Stephan Krusche
:
Can My Microservice Tolerate an Unreliable Database? Resilience Testing with Fault Injection and Visualization. 54-58 - Clinton Cao

, Simon Schneider
, Nicolás E. Díaz Ferreyra
, Sicco Verwer
, Annibale Panichella
, Riccardo Scandariato
:
CATMA: Conformance Analysis Tool For Microservice Applications. 59-63 - Kristóf Marussy

, Attila Ficsor
, Oszkár Semeráth
, Dániel Varró
:
Refinery: Graph Solver as a Service: Refinement-based Generation and Analysis of Consistent Models. 64-68 - Rafael F. Toledo

, Joanne M. Atlee
, Rui Ming Xiong
, Mingyu Liu
:
(Neo4j)^ Browser: Visualizing Variable-Aware Analysis Results. 69-73 - Mohammed Oualid Attaoui

, Fabrizio Pastore
, Lionel C. Briand
:
SAFE: Safety Analysis and Retraining of DNNs. 74-78 - Michael Ferdinando Urrico

, Diego Clerissi
, Leonardo Mariani
:
MutaBot: A Mutation Testing Approach for Chatbots. 79-83 - Eman Abdullah AlOmar

, Benjamin Knobloch
, Thomas Kain
, Christopher Kalish
, Mohamed Wiem Mkaouer
, Ali Ouni
:
AntiCopyPaster 2.0: Whitebox just-in-time code duplicates extraction. 84-88 - Liam Todd

, John Grundy
, Christoph Treude
:
GitHubInclusifier: Finding and fixing non-inclusive language in GitHub Repositories. 89-93 - Lev Sorokin

, Tiziano Munaro
, Damir Safin
, Brian Hsuan-Cheng Liao
, Adam Molin
:
OpenSBT: A Modular Framework for Search-based Testing of Automated Driving Systems. 94-98 - Tarek Mahmud

, Meiru Che
, Jihan Rouijel
, Mujahid Khan
, Guowei Yang
:
APICIA: An API Change Impact Analyzer for Android Apps. 99-103 - Feifei Niu

, Junqian Shao
, Chaofan Xu
, Christoph Mayr-Dorn
, Wesley K. G. Assunção
, Liguo Huang
, Chuanyi Li
, Jidong Ge
, Bin Luo
, Alexander Egyed
:
RAT: A Refactoring-Aware Tool for Tracking Code History. 104-108 - Lyla Naghipour Vijouyeh

, Rodrigo Bruno
, Paulo Ferreira
:
Emulation Tool For Android Edge Devices. 109-113 - Mustafa Al-Lail

, Antonio Rosales Viesca
, Hector Cardenas
, Mohammad Zarour
, Alfredo J. Perez
:
TPV: A Tool for Validating Temporal Properties in UML Class Diagrams. 114-118 - Ningzhi Tang

, Junwen An
, Meng Chen
, Aakash Bansal
, Yu Huang
, Collin McMillan
, Toby Jia-Jun Li
:
CodeGRITS: A Research Toolkit for Developer Behavior and Eye Tracking in IDE. 119-123 - Hongyue Pan

, Yilong Yang
:
ValidGen: A Tool for Automatic Generation of Validation Scripts to Support Rapid Requirements Validation. 124-128 - Wenhan Feng

, Qiugen Pei
, Yu Gao
, Dong Wang
, Wensheng Dou
, Jun Wei
, Zheheng Liang
, Zhenyue Long
:
FaultFuzz: A Coverage Guided Fault Injection Tool for Distributed Systems. 129-133 - Sajad Khatiri

, Sebastiano Panichella
, Paolo Tonella
:
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist. 134-138
Doctoral Symposium
- Bernd Gruner

:
Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow Analysis. 139-141 - Johann Glock

:
Aiding Developer Understanding of Software Changes via Symbolic Execution-based Semantic Differencing. 142-144 - Sandro Speth

:
Architecture-Based Cross-Component Issue Management and Propagation Analysis. 145-149 - Arina Kudriavtseva

:
A Software Security Evaluation Framework. 150-152 - Konstantin Rupert Blaschke

:
Automated Model Quality Estimation and Change Impact Analysis on Model Histories. 153-155 - Ketai Qiu

:
Autonomic Testing: Testing with Scenarios from Production. 156-158 - Daniel Rodríguez-Cárdenas

:
Beyond Accuracy and Robustness Metrics for Large Language Models for Code. 159-161 - Alejandro Velasco

:
Beyond Accuracy: Evaluating Source Code Capabilities in Large Language Models for Software Engineering. 162-164 - Michael Schlichtig

:
Building a Framework to Improve the User Experience of Static Analysis Tools. 165-169 - Tor Sporsem

:
Discovering Explainability Requirements in ML-Based Software. 170-172 - Hanan Abdulwahab Siala

:
Enhancing Model-Driven Reverse Engineering Using Machine Learning. 173-175 - Soneya Binta Hossain

:
Ensuring Critical Properties of Test Oracles for Effective Bug Detection. 176-180 - Yutan Huang

:
Generating User Experience Based on Personas with AI Assistants. 181-183 - Julien Malka

:
Increasing trust in the open source supply chain with reproducible builds and functional package management. 184-186 - Stefano Lambiase

:
Investigating Cultural Dispersion: on the Role of Cultural Differences in Software Development Teams. 187-191 - Felix Wallner

:
Learning Models of Cyber-Physical Systems with Discrete and Continuous Behaviour for Digital Twin Synthesis. 192-194 - Alexander Lercher

:
Managing API Evolution in Microservice Architecture. 195-197 - Niklas Meißner

:
MEITREX - Gamified and Adaptive Intelligent Tutoring in Software Engineering Education. 198-200 - Yanfu Yan

:
On Improving Management of Duplicate Video-Based Bug Reports. 201-203 - Jonathan Katzy

:
Programming Language Models in Multilingual Settings. 204-206 - Matías Brizzio

:
Resolving Goal-Conflicts and Scaling Synthesis through Mode-Based Decomposition. 207-211 - Alejandra Duque-Torres

:
Selecting and Constraining Metamorphic Relations. 212-216 - Fauzia Khan

:
Simulation-based Testing of Automated Driving Systems. 217-219 - Noura El Moussa

:
Smart Quality Monitoring for Evolving Complex Systems. 220-224 - Nathan Wintersgill

:
Studying and Improving Software License Compliance in Practice. 225-227 - Kushal Ramkumar

:
Sustainable Adaptive Security. 228-230 - Christoph König

:
Sustainable Software Engineering: Visions and Perspectives beyond Energy Efficiency. 231-233 - Jiayi Sun

:
Sustaining Scientific Open-Source Software Ecosystems: Challenges, Practices, and Opportunities. 234-236 - Junayed Mahmud

:
Toward Rapid Bug Resolution for Android Apps. 237-241 - Sarmad Bashir

:
Towards AI-centric Requirements Engineering for Industrial Systems. 242-246 - Tobias Dürschmid

:
Towards Automatic Inference of Behavioral Component Models for ROS-Based Robotics Systems. 247-251 - Eva Zimmermann

:
Towards Combining STPA and Safety-Critical Runtime Monitoring. 252-254 - Atish Kumar Dipongkor

:
Towards Interpreting the Behavior of Large Language Models on Software Engineering Tasks. 255-257 - Ali Al-Kaswan

:
Towards Safe, Secure, and Usable LLMs4Code. 258-260 - Amirhossein Deljouyi

:
Understandable Test Generation Through Capture/Replay and LLMs. 261-263
Poster Papers
- Timur Saglam

, Sebastian Hahner
, Larissa Schmid
, Erik Burger
:
Obfuscation-Resilient Software Plagiarism Detection with JPlag. 264-265 - Riccardo Coppola

, Tommaso Fulcini
, Marco Torchiano
:
Poster: Kotlin Assimilating the Android Ecosystem - An Appraisal of Diffusion and Impact on Maintainability. 266-267 - Lucas Franke

, Huayu Liang
, Aaron Brantly
, James C. Davis
, Chris Brown
:
A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software. 268-269 - Tao Huang

, Zhihong Sun
, Zhi Jin
, Ge Li
, Chen Lyu
:
KareCoder: A New Knowledge-Enriched Code Generation System. 270-271 - Long He

, Xiangfu Zhao
, Yichen Wang
:
ParSE: Efficient Detection of Smart Contract Vulnerabilities via Parallel and Simplified Symbolic Execution. 272-273 - Lorenz Graf-Vlachy

, Stefan Wagner
:
Endogeneity, Instruments, and Two-Stage Models. 274-275 - Chenyuan Zhang

, Hao Liu
, Jiutian Zeng
, Kejing Yang
, Yuhong Li
, Hui Li
:
Prompt-Enhanced Software Vulnerability Detection Using ChatGPT. 276-277 - Sophie Corallo

, Thomas Weber
, Lars König
, Kathrin Leonie Schmidt
, Frederik Reiche
, Anne Koziolek
:
What do you assume? A Theory of Security-Related Assumptions. 278-279 - Honghao Chen

, Ye Tang
, Hao Zhong
:
An Empirical Study on Cross-language Clone Bugs. 280-281 - Jonathan Lee

, Mason Li
, Kuo-Hsun Hsu
:
Applying Transformer Models for Automatic Build Errors Classification of Java-Based Open Source Projects. 282-283 - Fangqing Liu

, Han Huang
, Yi Xiang
:
Micro-scale Concolic Testing Framework for Automated Test Data Generation Based on Path Coverage. 284-285 - Amirhossein Zolfagharian

, Manel Abdellatif
, Lionel C. Briand
, Ramesh S.
:
Safety Monitoring of Deep Reinforcement Learning Agents. 286-287 - Susmita Haldar

, Luiz Fernando Capretz
:
Interpretable Software Maintenance and Support Effort Prediction Using Machine Learning. 288-289 - Luiz Alexandre Costa

, Edson Dias
, Danilo Monteiro Ribeiro
, Awdren L. Fontão
, Gustavo Pinto
, Rodrigo Pereira dos Santos
, Alexander Serebrenik
:
An Actionable Framework for Understanding and Improving Talent Retention as a Competitive Advantage in IT Organizations. 290-291 - Anamaria-Roberta Preda

, Christoph Mayr-Dorn
, Atif Mashkoor
, Wesley Klewerton Guez Assunção
, Alexander Egyed
:
Towards Leveraging Fine-Grained Dependencies to Check Requirements Traceability Correctness. 292-293 - Jingwei Xu

, Zihan Zeng
:
Programmable and Semantic Connector for DNN Component Integration: a Software Engineering Perspective. 294-295 - Debasish Chakroborti

, Chanchal Roy
, Kevin A. Schneider
:
A Study of Backporting Code in Open-Source Software for Characterizing Changesets. 296-297 - Ngoc-Thanh Nguyen

, Rogardt Heldal
, Patrizio Pelliccione
:
Engineering Industry-Ready Anomaly Detection Algorithms. 298-299 - Daniel Sokolowski

, David Spielmann
, Guido Salvaneschi
:
Unleashing the Giants: Enabling Advanced Testing for Infrastructure as Code. 300-301 - Yi Li

, Tien N. Nguyen
, Shaohua Wang
, Aashish Yadavally
:
Poirot: Deep Learning for API Misuse Detection. 302-303 - Alexander Schulz-Rosengarten

, Akash Ahmad
, Malte Clement
, Reinhard von Hanxleden
, Benjamin Asch
, Marten Lohstroh
, Edward A. Lee
, Gustavo Quiros Araya
, Ankit Shukla
:
Behavior Trees with Dataflow: Coordinating Reactive Tasks in Lingua Franca. 304-305 - Zhong Li

, Jiayang Shi
, Matthijs van Leeuwen
:
Graph Neural Networks based Log Anomaly Detection and Explanation. 306-307 - Youmei Fan

, Dong Wang
, Supatsara Wattanakriengkrai
, Hathaichanok Damrongsiri
, Christoph Treude
, Hideaki Hata
, Raula Gaikovina Kula
:
Going Viral: Case Studies on the Impact of Protestware. 308-309 - Valtteri Siitonen

, Saima Ritonummi
, Markus Salo
, Henri Pirkkalainen
, Saija Mauno
:
Understanding the Strategies Used by Employees to Cope with Technostress in the Software Industry. 310-311 - Yiwen Wu

, Yang Zhang
, Tao Wang
, Huaimin Wang
:
A Transformer-based Model for Assisting Dockerfile Revising. 312-313 - Zhiyi Xue

, Liangguo Li
, Senyue Tian
, Xiaohong Chen
, Pingping Li
, Liangyu Chen
, Tingting Jiang
, Min Zhang
:
Domain Knowledge is All You Need: A Field Deployment of LLM-Powered Test Case Generation in FinTech Domain. 314-315 - Yi Li

, Tien N. Nguyen
, Yuchen Cai
, Aashish Yadavally
, Abhishek Mishra
, Genesis Montejo
:
Neural Exception Handling Recommender. 316-317 - Chunmiao Li

, Yijun Yu
, Haitao Wu
, Luca Carlig
, Shijie Nie
, Lingxiao Jiang
:
Unleashing the Power of Clippy in Real-World Rust Projects. 318-319 - Stefania Dumbrava

, Zhao Jin
, Burcu Kulahcioglu Ozkan
, Jingxuan Qiu
:
GRAIL: Checking Transaction Isolation Violations with Graph Queries. 320-321 - Olivier Zeyen

, Maxime Cordy
, Gilles Perrouin
, Mathieu Acher
:
Exploring the Computational Complexity of SAT Counting and Uniform Sampling with Phase Transitions. 322-323 - Yepeng Ding

, Arthur Gervais
, Roger Wattenhofer
, Hiroyuki Sato
:
Hunting DeFi Vulnerabilities via Context-Sensitive Concolic Verification. 324-325 - Nico Ritschel

, Felipe Fronchetti
, Reid Holmes
, Ronald Garcia
, David C. Shepherd
:
Blocks? Graphs? Why Not Both? Designing and Evaluating a Hybrid Programming Environment for End-users. 326-327 - Rui Ren

, Jingbang Yang
, Linxiao Yang
, Xinyue Gu
, Liang Sun
:
SLIM: a Scalable Light-weight Root Cause Analysis for Imbalanced Data in Microservice. 328-330 - Olga Ratushniak

, Beatriz Cabrero-Daniel
:
Designing Digital Twins for Enhanced Reusability. 331-332 - Jinseok Heo

, Eunseok Lee
:
Analyzing the Impact of Context Representation and Scope in Code Infilling. 333-334 - Keita Sakuma

, Ryuta Matsuno
, Yoshio Kameda
:
eAIEDF: Extended AI Error Diagnosis Flowchart for Automatically Identifying Misprediction Causes in Production Models. 335-336 - Sara Fernandes

, Ademar Aguiar
, André Restivo
:
The Impact of a Live Refactoring Environment on Software Development. 337-338 - Dirk Beyer

, Matthias Kettl
, Thomas Lemberger
:
Fault Localization on Verification Witnesses (Poster Paper). 339-340 - Daniel Haak

, Raphael Mayr
, Jan-Philipp Steghöfer
, Alexandra Teynor
, Phillip Heidegger
:
Tracking assets in source code with Security Annotations. 341-342 - Galileu Santos de Jesus

, Paulo Borba
, Rodrigo Bonifácio
, Matheus Barbosa de Oliveira
:
Lightweight Semantic Conflict Detection with Static Analysis. 343-345 - Xiaoting Du

, Chenglong Li
, Xiangyue Ma
, Zheng Zheng
:
How Does Pre-trained Language Model Perform on Deep Learning Framework Bug Prediction? 346-347 - Matteo Camilli

, Raffaela Mirandola
:
Multi-requirement Parametric Falsification. 348-349 - Georgia M. Kapitsaki

, Maria Papoutsoglou
:
GDPR indications in commits messages in GitHub repositories. 350-351 - Binger Chen

, Jacek Golebiowski
, Ziawasch Abedjan
:
Towards Data Augmentation for Supervised Code Translation. 352-353 - Xiaolei Chen

, Jie Shi
, Jia Chen
, Peng Wang
, Wei Wang
:
High-precision Online Log Parsing with Large Language Models. 354-355 - Vatsal Venkatkrishna

, Durga Shree Nagabushanam
, Emmanuel Iko-Ojo Simon
, Melina C. Vidoni
:
Multi-step Automated Generation of Parameter Docstrings in Python: An Exploratory Study. 356-357 - Matias Martinez

, Silverio Martínez-Fernández
, Xavier Franch
:
Energy Consumption of Automated Program Repair. 358-359 - Laura Plein

, Wendkûuni C. Ouédraogo
, Jacques Klein
, Tegawendé F. Bissyandé
:
Automatic Generation of Test Cases based on Bug Reports: a Feasibility Study with Large Language Models. 360-361 - Saifullah Mahbub

, Md. Easin Arafat
, Chowdhury Rafeed Rahman
, Zannatul Ferdows
, Masum Hasan
:
ReviewRanker: A Semi-Supervised Learning Based Approach for Code Review Quality Estimation. 362-363 - Yilun Liu

, Shimin Tao
, Weibin Meng
, Feiyu Yao
, Xiaofeng Zhao
, Hao Yang
:
LogPrompt: Prompt Engineering Towards Zero-Shot and Interpretable Log Analysis. 364-365 - Arumoy Shome

, Luís Cruz
, Arie van Deursen
:
Data vs. Model Machine Learning Fairness Testing: An Empirical Study. 366-367 - Aurora Papotti

, Fabio Massacci
, Katja Tuma
:
On the Effects of Program Slicing for Vulnerability Detection during Code Inspection: Extended Abstract. 368-369 - Partha Protim Paul

, Md Tonoy Akanda
, Mohammed Raihan Ullah
, Dipto Mondal
, Nazia Sultana Chowdhury
, Fazle Mohammed Tawsif
:
xNose: A Test Smell Detector for C#. 370-371 - Jahnavi Kumar

, Sridhar Chimalakonda
:
On the Need for Empirically Investigating Fast-Growing Programming Languages. 372-373 - Weifeng Pan

, Wei Wu
, Ming Hua, Dae-Kyoo Kim
, Jinkai Yang
, Ruochen Liu
:
Improving the Condensing of Reverse Engineered Class Diagrams using Weighted Network Metrics. 374-375 - Sristy Sumana Nath

, Banani Roy
:
Recovering Traceability Links between Release Notes and Related Software Artifacts. 376-377 - Profir-Petru Pârtachi

, Mahito Sugiyama
:
Bringing Structure to Naturalness: On the Naturalness of ASTs. 378-379 - Vincenzo Corso

, Leonardo Mariani
, Daniela Micucci
, Oliviero Riganelli
:
Assessing AI-Based Code Assistants in Method Generation Tasks. 380-381 - Dong Jae Kim

, Tse-Hsun Chen
:
Exploring the Impact of Inheritance on Test Code Maintainability. 382-383 - Myeongsoo Kim

, Santosh Pande
, Alessandro Orso
:
Improving Program Debloating with 1-DU Chain Minimality. 384-385 - Md Nakhla Rafi

, An Ran Chen
, Tse-Hsun (Peter) Chen
, Shaohua Wang
:
Exploring Data Cleanness in Defects4J and Its Influence on Fault Localization Efficiency. 386-387 - Wenchuan Mu

, Kwan Hui Lim
:
Towards Precise Observations of Neural Model Robustness in Classification. 388-389 - Sarah Fakhoury

, Aaditya Naik
, Georgios Sakkas
, Saikat Chakraborty
, Madan Musuvathi
, Shuvendu K. Lahiri
:
Exploring the Effectiveness of LLM based Test-driven Interactive Code Generation: User Study and Empirical Evaluation. 390-391 - Issam Sedki

, Abdelwahab Hamou-Lhadj
, Otmane Aït Mohamed
, Naser Ezzati-Jivan
, Mohammed A. Shehab
:
Decoding Log Parsing Challenges: A Comprehensive Taxonomy for Actionable Solutions. 392-393 - Sashko Ristov

, Philipp Gritsch
, David Meyer
, Michael Felderer
:
GoSpeechLess: Interoperable Serverless ML-based Cloud Services. 394-395 - Xunzhu Tang

, Haoye Tian
, Zhenghan Chen
, Weiguo Pian
, Saad Ezzini
, Abdoul Kader Kaboré
, Andrew Habib
, Jacques Klein
, Tegawendé F. Bissyandé
:
Learning to Represent Patches. 396-397 - Changshu Liu

, Pelin Çetin
, Yogesh Patodia
, Baishakhi Ray
, Saikat Chakraborty
, Yangruibo Ding
:
Automated Code Editing with Search-Generate-Modify. 398-399 - David R. Ferreira

, Alexandra Mendes
, João F. Ferreira
:
How are Contracts Used in Android Mobile Applications? 400-401 - Verya Monjezi

, Ashish Kumar
, Gang Tan
, Ashutosh Trivedi
, Saeid Tizpaz-Niari
:
Causal Graph Fuzzing for Fair ML Sofware Development. 402-403 - Mira Bhagirathi Kaniyur

, Ana Cavalcante-Studart
, Yihan Yang
, Sangeon Park
, David Chen
, Duy Lam
, Lucas Bang
:
Path Complexity Analysis for Interprocedural Code. 404-405 - Wendkûuni C. Ouédraogo

, Laura Plein
, Abdoul Kader Kaboré
, Andrew Habib
, Jacques Klein
, David Lo
, Tegawendé F. Bissyandé
:
Extracting Relevant Test Inputs from Bug Reports for Automatic Test Case Generation. 406-407 - Abhishek Kumar

, Partha Pratim Das
, Partha Pratim Chakrabarti
:
ICLNet: Stepping Beyond Dates for Robust Issue-Commit Link Recovery. 408-409 - Sarah Fakhoury

, Saikat Chakraborty
, Madanlal Musuvathi
, Shuvendu K. Lahiri
:
NL2Fix: Generating Functionally Correct Code Edits from Bug Descriptions. 410-411 - Francesco Minna

, Agathe Blaise
, Fabio Massacci
, Katja Tuma
:
Automated Security Repair for Helm Charts. 412-413 - Zhengxin Li

, Junfeng Zhao
, Jia Kang
:
Multi-source Anomaly Detection For Microservice Systems. 414-415 - Zeju Cai

, Jianguo Chen
, Wenqing Chen
, Weicheng Wang
, Xiangyuan Zhu
, Aijia Ouyang
:
F-CodeLLM: A Federated Learning Framework for Adapting Large Language Models to Practical Software Development. 416-417 - Amirmohammad Nazari

, Souti Chattopadhyay
, Swabha Swayamdipta
, Mukund Raghothaman
:
NomNom: Explanatory Function Names for Program Synthesizers. 418-419 - Zhipeng Yin

, Zichong Wang
, Wenbin Zhang
:
Improving Fairness in Machine Learning Software via Counterfactual Fairness Thinking. 420-421 - Xiaoli Lian

, Shuaisong Wang
, Jieping Ma
, Xin Tan
, Fang Liu
, Lin Shi
, Cuiyun Gao
, Li Zhang
:
Imperfect Code Generation: Uncovering Weaknesses in Automatic Code Generation by Large Language Models. 422-423
Technical Briefings
- Adel Noureddine

:
Analyzing Software Energy Consumption. 424-425 - Shaukat Ali

:
Quantum Software Testing 101. 426-427 - Paolo Arcaini

, Fuyuki Ishikawa
, Lei Ma
, Yuta Maezawa
, Nobukazu Yoshioka
, Fuyuan Zhang
:
Technical Briefing on Deep Neural Network Repair. 428-430 - Dayi Lin

, Filipe Roseiro Côgo
, Gopi Krishnan Rajbahadur
, Ahmed E. Hassan
:
Technical Brief on Software Engineering for FMware. 431-433 - Fatemeh H. Fard

:
Technical Briefing on Parameter Efficient Fine-Tuning of (Large) Language Models for Code-Intelligence. 434-435 - Rashina Hoda

:
Technical Briefing on Socio-Technical Grounded Theory for Qualitative Data Analysis. 436-437
SRC - ACM Student Research Competition
- Atish Kumar Dipongkor

:
An Ensemble Method for Bug Triaging using Large Language Models. 438-440 - Yang Chen

:
Flakiness Repair in the Era of Large Language Models. 441-443 - Lyuye Zhang

:
Vulnerability Root Cause Function Locating For Java Vulnerabilities. 444-446 - Xiang Chen

:
IntTracer: Sanitization-aware IO2BO Vulnerability Detection across Codebases. 447-449 - Zhou Yang

:
Classifying Source Code: How Far Can Compressor-based Classifiers Go? 450-452 - Ali Reza Ibrahimzada

:
Program Decomposition and Translation with Static Analysis. 453-455 - Aren A. Babikian

:
Refining Abstract Specifications into Dangerous Traffic Scenarios. 456-458
Industry Challenge
- Yuxiao Chen

, Jingzheng Wu
, Xiang Ling
, Changjiang Li
, Zhiqing Rui
, Tianyue Luo
, Yanjun Wu
:
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? 459-471 - Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao:

ReposVul: A Repository-Level High-Quality Vulnerability Dataset. 472-483 - Ying Fu

, Teng Wang
, Shanshan Li
, Jinyan Ding
, Shulin Zhou
, Zhouyang Jia
, Wang Li
, Yu Jiang
, Xiangke Liao
:
MissConf: LLM-Enhanced Reproduction of Configuration-Triggered Bugs. 484-495

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














