


default search action
30th ICPC 2022: Virtual Event
- Ayushi Rastogi, Rosalia Tufano, Gabriele Bavota, Venera Arnaoudova, Sonia Haiduc:

Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, ICPC 2022, Virtual Event, May 16-17, 2022. ACM 2022, ISBN 978-1-4503-9298-3
Summarization
- Junda He, Bowen Xu, Zhou Yang, DongGyun Han

, Chengran Yang, David Lo
:
PTM4Tag: sharpening tag recommendation of stack overflow posts with pre-trained models. 1-11 - Yu Wang, Yu Dong, Xuesong Lu, Aoying Zhou:

GypSum: learning hybrid representations for code summarization. 12-23 - Yuexiu Gao, Chen Lyu:

M2TS: multi-scale multi-modal approach based on transformer for source code summarization. 24-35 - Sakib Haque, Zachary Eberhart, Aakash Bansal, Collin McMillan:

Semantic similarity metrics for evaluating source code summarization. 36-47 - Rishab Sharma, Fuxiang Chen, Fatemeh H. Fard

:
LAMNER: code comment generation using character language model and named entity recognition. 48-59
Program representation 1
- Nan Cui, Yuze Jiang, Xiaodong Gu, Beijun Shen:

Zero-shot program representation learning. 60-70 - Divyam Goel

, Ramansh Grover, Fatemeh H. Fard
:
On the cross-modal transfer from natural language to code through adapter modules. 71-81 - Shouliang Yang, Xiaodong Gu, Beijun Shen:

Self-supervised learning of smart contract representations. 82-93 - Md Rakib Hossain Misu

, Abdus Satter:
An exploratory study of analyzing JavaScript online code clones. 94-98 - Imam Nur Bani Yusuf, Lingxiao Jiang

, David Lo
:
Accurate generation of trigger-action programs with domain-adapted sequence-to-sequence learning. 99-110
Complexity from a cognitive perspective
- Amine Abbad Andaloussi

, Thierry Sorg, Barbara Weber:
Estimating developers' cognitive load at a fine-grained level using eye-tracking measures. 111-121 - Daphne Miedema

, George Fletcher
, Efthimia Aivaloglou:
So many brackets!: an analysis of how SQL learners (mis)manage complexity during query formulation. 122-132 - Marvin Wyrich, Lasse Merz, Daniel Graziotin:

Anchoring code understandability evaluations through task descriptions. 133-140 - Asaf Etgar, Ram Friedman, Shaked Haiman, Dana Perez, Dror G. Feitelson:

The effect of information content and length on name recollection. 141-151
Understanding development practices and challenges 1
- Liming Fu, Peng Liang

, Beiqi Zhang:
Understanding code snippets in code reviews: a preliminary study of the OpenStack community. 152-156 - Akhila Sri Manasa Venigalla, Kowndinya Boyalakuntla, Sridhar Chimalakonda:

GitQ- towards using badges as visual cues for GitHub projects. 157-161 - Keisuke Isemoto, Takashi Kobayashi, Shinpei Hayashi:

Revisiting the effect of branch handling strategies on change recommendation. 162-172 - Gregorio Robles

, Raula Gaikovina Kula
, Chaiyong Ragkhitwetsagul, Tattiya Sakulniwat, Kenichi Matsumoto, Jesús M. González-Barahona
:
pycefr: Python competency level through code analysis. 173-177
Security
- Stefanus A. Haryono, Hong Jin Kang

, Abhishek Sharma, Asankhaya Sharma, Andrew E. Santosa, Ming Yi Ang, David Lo:
Automated identification of libraries from vulnerability data: can we do better? 178-189 - Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng:

Example-based vulnerability detection and repair in Java code. 190-201
Measuring and improving quality
- Reem S. Alsuhaibani, Christian D. Newman, Michael John Decker, Michael L. Collard, Jonathan I. Maletic:

An approach to automatically assess method names. 202-213 - Anna Vacca

, Michele Fredella, Andrea Di Sorbo, Corrado Aaron Visaggio, Gerardo Canfora:
An empirical investigation on the trade-off between smart contract readability and gas consumption. 214-224 - Marc Etter

, Farhad Mehta
:
CodePanorama: a language agnostic tool for visual code inspection. 225-228 - Xin Zhou, DongGyun Han

, David Lo
:
Simple or complex?: together for a more accurate just-in-time defect predictor. 229-240
Debugging 1
- Alice Martin

, Mathieu Magnaudet, Stéphane Conversy:
Causette: user-controlled rearrangement of causal constructs in a code editor. 241-252 - Derek Robinson

, Neil A. Ernst, Enrique Larios Vargas, Margaret-Anne D. Storey:
Error identification strategies for Python Jupyter notebooks. 253-263 - Madeline Janecek

, Naser Ezzati-Jivan, Abdelwahab Hamou-Lhadj
:
Performance anomaly detection through sequence alignment of system-level traces. 264-274 - Jasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Jorge Cardoso, Odej Kao:

QuLog: data-driven approach for log instruction quality assessment. 275-286 - Casper Boone, Carolin E. Brandt

, Andy Zaidman:
Fixing continuous integration tests from within the IDE with contextual information. 287-297 - Jan H. Boockmann, Gerald Lüttgen:

Shape-analysis driven memory graph visualization. 298-308
Search and reuse: Libraries & APIs
- Mohammad Abdul Hadi, Imam Nur Bani Yusuf, Ferdian Thung, Kien Gia Luong, Lingxiao Jiang

, Fatemeh H. Fard
, David Lo
:
On the effectiveness of pretrained models for API learning. 309-320 - James Martin, Jin L. C. Guo:

Deep API learning revisited. 321-330 - Kien Luong, Mohammad Abdul Hadi, Ferdian Thung, Fatemeh H. Fard

, David Lo
:
ARSeek: identifying API resource using code and discussion on stack overflow. 331-342 - Ting Zhang

, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo
:
Benchmarking library recognition in tweets. 343-353
Program representation 2research
- Xiao Wang, Qiong Wu, Hongyu Zhang, Chen Lyu, Xue Jiang, Zhuoran Zheng, Lei Lyu, Songlin Hu

:
HELoC: hierarchical contrastive learning of source code representation. 354-365 - Yixin Guo, Pengcheng Li, Yingwei Luo, Xiaolin Wang, Zhenlin Wang:

Exploring GNN based program embedding technologies for binary related tasks. 366-377 - Kechi Zhang

, Wenhan Wang, Huangzhao Zhang, Ge Li, Zhi Jin:
Learning to represent programs with heterogeneous graphs. 378-389 - Kesu Wang, Meng Yan

, He Zhang, Haibo Hu:
Unified abstract syntax tree representation learning for cross-language program classification. 390-400 - Fuxiang Chen, Fatemeh H. Fard

, David Lo
, Timofey Bryksin:
On the transferability of pre-trained language models for low-resource programming languages. 401-412
Code clones
- Chenning Tao

, Qi Zhan, Xing Hu, Xin Xia:
C4: contrastive cross-language code clone detection. 413-424 - Bin Hu, Yijian Wu, Xin Peng, Chaofeng Sha, Xiaochen Wang, Baiqiang Fu, Wenyun Zhao:

Predicting change propagation between code clone instances by graph-based deep learning. 425-436 - Rishab Sharma, Fuxiang Chen, Fatemeh H. Fard

, David Lo
:
An exploratory study on code attention in BERT. 437-448 - Yang Zhao, Ran Mo, Yao Zhang, Siyuan Zhang, Pu Xiong:

Exploring and understanding cross-service code clones in microservice projects. 449-459 - Wenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi

, Hiroaki Takada:
MSCCD: grammar pluggable clone detection based on ANTLR parser generation. 460-470 - Pranshu Chourasia, Ganesh Ramakrishnan, Varsha Apte, Suraj Kumar:

Algorithm identification in programming assignments. 471-481
Debugging 2
- Junji Yu, Yan Lei, Huan Xie, Lingfeng Fu, Chunyan Liu:

Context-based cluster fault localization. 482-493 - Li Sui, Shawn Rasheed, Amjed Tahir, Jens Dietrich

:
A study of single statement bugs involving dynamic language features. 494-498 - Ratnadira Widyasari, Gede Artha Azriadi Prana, Stefanus A. Haryono, Yuan Tian, Hafil Noer Zachiary, David Lo

:
XAI4FL: enhancing spectrum-based fault localization with explainable artificial intelligence. 499-510 - Hiroki Kuramoto, Masanari Kondo, Yutaro Kashiwa, Yuta Ishimoto

, Kaze Shindo, Yasutaka Kamei, Naoyasu Ubayashi:
Do visual issue reports help developers fix bugs?: a preliminary study of using videos and images to report issues on GitHub. 511-515 - Junjie Wang, Yuchao Huang, Song Wang, Qing Wang:

Find bugs in static bug finders. 516-527 - Tetsuya Kanda, Kazumasa Shimari, Katsuro Inoue:

didiffff: a viewer for comparing changes in both code and execution traces. 528-532
Search and reuse: Code
- Yi Cheng, Li Kuang:

CSRS: code search with relevance matching and semantic matching. 533-542 - Zhipeng Xue

, Yuanliang Zhang, Rulin Xu:
Clone-based code method usage pattern mining. 543-547 - Yuan Huang, Furen Xu, Haojie Zhou, Xiangping Chen, Xiaocong Zhou, Tong Wang:

Towards exploring the code reuse from stack overflow during software development. 548-559 - Farideh Khalili, Ali Mohebbi

, Valerio Terragni, Mauro Pezzè, Leonardo Mariani, Abbas Heydarnoori
:
The ineffectiveness of domain-specific word embedding models for GUI test reuse. 560-564
Smells, patterns, and refactoring
- Lei Chen

, Shinpei Hayashi:
Impact of change granularity in refactoring detection. 565-569 - Pranjay Kumar, Davin Ie, Melina C. Vidoni:

On the developers' attitude towards CRAN checks. 570-574 - Pattara Leelaprute, Bodin Chinthanet, Supatsara Wattanakriengkrai, Raula Gaikovina Kula

, Pongchai Jaisri, Takashi Ishio
:
Does coding in Pythonic zen peak performance?: preliminary experiments of nine Pythonic idioms at scale. 575-579 - Lucas Francisco da Matta Vegi, Marco Túlio Valente

:
Code smells in Elixir: early results from a grey literature review. 580-584
Documentation
- Mingyang Geng, Shangwen Wang

, Dezun Dong, Shanzhi Gu, Fang Peng, Weijian Ruan, Xiangke Liao:
Fine-grained code-comment semantic interaction analysis. 585-596 - Marco Raglianti

, Csaba Nagy, Roberto Minelli, Michele Lanza
:
Using discord conversations as program comprehension aid. 597-601 - Jianyu Wu, Hao He, Wenxin Xiao, Kai Gao, Minghui Zhou:

Demystifying software release note issues on GitHub. 602-613 - Jerin Yasmin, Mohammad Sadegh Sheikhaei, Yuan Tian:

A first look at duplicate and near-duplicate self-admitted technical debt comments. 614-618 - Hongquan Zhu, Xincheng He, Lei Xu:

HatCUP: hybrid analysis and attention based just-in-time comment updating. 619-630 - Mathieu Nassif, Zara Horlacher, Martin P. Robillard:

Casdoc: unobtrusive explanations in code examples. 631-635
Understanding development practices and challenges 2
- Debasish Chakroborti, Kevin A. Schneider, Chanchal K. Roy:

Backports: change types, challenges and strategies. 636-647 - Christopher Vendome, Eric J. Rapos, Nick DiGennaro:

How do i model my system?: a qualitative study on the challenges that modelers experience. 648-659 - Derek Robinson

, Keanelek Enns, Neha Koulecar, Manish Sihag:
Two approaches to survival analysis of open source Python projects. 660-669

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














