


default search action
35th ASE 2020: Melbourne, Australia
- 35th IEEE/ACM International Conference on Automated Software Engineering, ASE 2020, Melbourne, Australia, September 21-25, 2020. IEEE 2020, ISBN 978-1-4503-6768-4

- Marta Kwiatkowska:

Safety and Robustness for Deep Learning with Provable Guarantees. 1-3 - Gail C. Murphy:

Is Software Engineering Research Addressing Software Engineering Problems? (Keynote). 4-5 - Yueling Zhang, Geguang Pu, Jun Sun:

Accelerating All-SAT Computation with Short Blocking Clauses. 6-17 - Yu Huang, Benjamin Ogles, Eric Mercer:

A Predictive Analysis for Detecting Deadlock in MPI Programs. 18-28 - Jian Zhang, Xu Wang, Hongyu Zhang

, Hailong Sun, Yanjun Pu, Xudong Liu:
Learning to Handle Exceptions. 29-41 - Bihuan Chen, Linlin Chen, Chen Zhang, Xin Peng:

BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration. 42-53 - Dongge Liu

, Gidon Ernst
, Toby Murray, Benjamin I. P. Rubinstein
:
LEGION: Best-First Concolic Testing. 54-65 - Diego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani:

Plug the Database & Play With Automatic Testing: Improving System Testing by Exploiting Persistent Data. 66-77 - Junjie Chen, Haoyang Ma, Lingming Zhang:

Enhanced Compiler Bug Isolation via Memoized Search. 78-89 - Bruce Collie

, Philip Ginsbach, Jackson Woodruff, Ajitha Rajan, Michael F. P. O'Boyle:
M3: Semantic API Migrations. 90-102 - Nic Volanschi, Julia Lawall:

The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel. 103-114 - Timotej Kapus

, Frank Busse
, Cristian Cadar
:
Pending Constraints in Symbolic Execution for Better Exploration and Seeding. 115-126 - Sungho Lee, Hyogun Lee, Sukyoung Ryu

:
Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis. 127-137 - Jiawei Wang, Tzu-yang Kuo, Li Li, Andreas Zeller

:
Assessing and Restoring Reproducibility of Jupyter Notebooks. 138-149 - Andreas Stahlbauer, Christoph Frädrich, Gordon Fraser:

Verified from Scratch: Program Analysis for Learners' Programs. 150-162 - Xingyu Zhao

, Radu Calinescu, Simos Gerasimou, Valentin Robu
, David Flynn
:
Interval Change-Point Detection for Runtime Probabilistic Model Checking. 163-174 - Daniel Ramos

, Jorge Pereira, Inês Lynce
, Vasco Manquinho
, Ruben Martins:
UNCHARTIT: An Interactive Framework for Program Recovery from Charts. 175-186 - Hao Zhou

, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang
, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. 187-198 - Hao Zhou

, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. 199-210 - Pouria Derakhshanfar, Xavier Devroey

, Andy Zaidman, Arie van Deursen
, Annibale Panichella:
Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives. 211-223 - Qi Xin, Myeongsoo Kim, Qirun Zhang

, Alessandro Orso:
Subdomain-Based Generality-Aware Debloating. 224-236 - Yiqun T. Chen, Rahul Gopinath, Anita Tadakamalla

, Michael D. Ernst, Reid Holmes, Gordon Fraser, Paul Ammann, René Just:
Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size. 237-249 - Andreas Katis, Grigory Fedyukovich, Jeffrey Chen, David A. Greve, Sanjai Rayadurgam, Michael W. Whalen:

Synthesis of Infinite-State Systems with Random Behavior. 250-261 - Benjamin Mariano, Yanju Chen, Yu Feng, Shuvendu K. Lahiri, Isil Dillig:

Demystifying Loops in Smart Contracts. 262-274 - Yangruibo Ding

, Baishakhi Ray, Premkumar T. Devanbu, Vincent J. Hellendoorn:
Patching as Translation: the Data and the Metaphor. 275-286 - Devjeet Roy, Ziyi Zhang, Maggie Ma, Venera Arnaoudova, Annibale Panichella, Sebastiano Panichella, Danielle Gonzalez, Mehdi Mirakhorli:

DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests. 287-298 - Mohammad Jafar Mashhadi, Hadi Hemmati:

Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems. 299-311 - Jesse Bartels, Jon Stephens

, Saumya Debray:
Representing and Reasoning about Dynamic Code. 312-323 - Navid Salehnamadi

, Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek:
ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android. 324-335 - Mingyang Li, Lin Shi

, Ye Yang, Qing Wang:
A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum. 336-348 - Bolin Wei, Yongmin Li

, Ge Li, Xin Xia, Zhi Jin:
Retrieve and Refine: Exemplar-based Neural Comment Generation. 349-360 - Zhenhao Li, Tse-Hsun Chen

, Weiyi Shang:
Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks. 361-372 - Junjie Chen, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang

, Dan Hao
, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service Systems. 373-384 - Songqiang Chen

, Xiaoyuan Xie, Bangguo Yin, Yuanxiang Ji, Lin Chen, Baowen Xu
:
Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports. 385-397 - Zhe Liu

, Chunyang Chen, Junjie Wang, Yuekai Huang, Jun Hu, Qing Wang:
Owl Eyes: Spotting UI Display Issues via Visual Understanding. 398-409 - Weijun Shen, Yanhui Li

, Lin Chen, Yuanlei Han, Yuming Zhou, Baowen Xu
:
Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining. 410-422 - Xiaoning Du, Yi Li

, Xiaofei Xie
, Lei Ma, Yang Liu
, Jianjun Zhao:
Marble: Model-based Robustness Analysis of Stateful Deep Learning Systems. 423-435 - Hengcheng Zhu

, Lili Wei, Ming Wen, Yepang Liu, Shing-Chi Cheung
, Qin Sheng, Cui Zhou:
MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests. 436-447 - Anjana Perera

, Aldeida Aleti, Marcel Böhme, Burak Turhan
:
Defect Prediction Guided Search-Based Software Testing. 448-460 - Xiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu

, Jianling Sun:
API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph. 461-472 - Fang Liu, Ge Li, Yunfei Zhao, Zhi Jin:

Multi-task Learning based Pre-trained Language Model for Code Completion. 473-485 - Qianyu Guo, Xiaofei Xie

, Yi Li
, Xiaoyu Zhang, Yang Liu
, Xiaohong Li, Chao Shen:
Audee: Automated Testing for Deep Learning Frameworks. 486-498 - Guoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang, Ting Dai, Jin Song Dong, Xingen Wang:

Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction. 499-510 - Martin Kellogg

, Martin Schäf
, Serdar Tasiran, Michael D. Ernst:
Continuous Compliance. 511-523 - Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie

, Xiaohong Li, Yang Liu
, Jing Hu:
SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementations. 524-535 - Haicheng Chen

, Wensheng Dou, Dong Wang
, Feng Qin:
CoFI: Consistency-Guided Fault Injection for Cloud Systems. 536-547 - Michael C. Gerten, James I. Lathrop, Myra B. Cohen, Titus H. Klinge:

ChemTest: An Automated Software Testing Framework for an Emerging Paradigm. 548-560 - Julian Frattini, Maximilian Junker, Michael Unterkalmsteiner, Daniel Méndez

:
Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts. 561-572 - Ke Li, Zilin Xiang, Tao Chen, Kay Chen Tan

:
BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction. 573-584 - Zhongxin Liu, Xin Xia, Meng Yan

, Shanping Li:
Automating Just-In-Time Comment Updating. 585-597 - Patrick Stöckle

, Bernd Grobauer, Alexander Pretschner:
Automated Implementation of Windows-related Security-Configuration Guides. 598-610 - Stefan Mühlbauer

, Sven Apel
, Norbert Siegmund:
Identifying Software Performance Changes Across Variants and Versions. 611-622 - Haochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Xiangke Liao:

CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs. 623-634 - Shahar Maoz, Ilia Shevrin:

Just-In-Time Reactive Synthesis. 635-646 - Jihyeok Park

, Jihee Park
, Seungmin An, Sukyoung Ryu
:
JISET: JavaScript IR-based Semantics Extraction Toolchain. 647-658 - Yeting Li

, Zhiwu Xu, Jialun Cao, Haiming Chen, Tingjian Ge, Shing-Chi Cheung
, Haoren Zhao:
FlashRegex: Deducing Anti-ReDoS Regexes from Examples. 659-671 - Chengyuan Wen, Yaxuan Zhang, Xiao He, Na Meng:

Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors. 672-683 - Johannes Dorn, Sven Apel

, Norbert Siegmund:
Mastering Uncertainty in Performance Estimations of Configurable Software Systems. 684-696 - Likang Yin, Vladimir Filkov:

Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects. 697-708 - Muhammad Usman, Wenxi Wang, Sarfraz Khurshid:

TestMC: Testing Model Counters using Differential and Metamorphic Testing. 709-721 - Qian Zhang, Jiyuan Wang

, Muhammad Ali Gulzar, Rohan Padhye
, Miryung Kim:
BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework Abstraction. 722-733 - Nick Feng, Federico Mora, Vincent Hui, Marsha Chechik:

Scaling Client-Specific Equivalence Checking via Impact Boundary Search. 734-745 - David Gros, Hariharan Sezhiyan, Prem Devanbu, Zhou Yu:

Code to Comment "Translation": Data, Metrics, Baselining & Evaluation. 746-757 - Wuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu:

Exploring the Architectural Impact of Possible Dependencies in Python Software. 758-770 - Hung Viet Pham, Shangshu Qian

, Jiannan Wang
, Thibaud Lutellier
, Jonathan Rosenthal
, Lin Tan, Yaoliang Yu, Nachiappan Nagappan:
Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of Variance. 771-783 - Brandon Paulsen, Jingbo Wang, Jiawei Wang, Chao Wang:

NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained Approximation. 784-796 - Chris Satterfield, Thomas Fritz, Gail C. Murphy:

Identifying and Describing Information Seeking Tasks. 797-808 - Zhiyuan Wan, Gail C. Murphy, Xin Xia:

Predicting Code Context Models for Software Development Tasks. 809-820 - Yueming Wu

, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang, Feng Cheng, Hong Liang, Hai Jin:
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis. 821-833 - Yang Liu

, Mingwei Liu
, Xin Peng, Christoph Treude
, Zhenchang Xing, Xiaoxin Zhang:
Generating Concept based API Element Comparison Using a Knowledge Graph. 834-845 - Yufeng Zhang, Zhenbang Chen, Ziqi Shuai

, Tianqi Zhang, Kenli Li, Ji Wang:
Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once. 846-857 - Chijin Zhou

, Mingzhe Wang, Jie Liang, Zhe Liu, Yu Jiang:
Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling. 858-870 - Xin Wang

, Jin Liu, Li Li, Xiao Chen
, Xiao Liu, Hao Wu
:
Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks. 871-882 - Qihao Zhu, Zeyu Sun, Xiran Liang, Yingfei Xiong, Lu Zhang:

OCoR: An Overlapping-Aware Code Retriever. 883-894 - Yida Tao, Jiefang Jiang, Yepang Liu, Zhiwu Xu, Shengchao Qin:

Understanding Performance Concerns in the API Documentation of Data Science Libraries. 895-906 - Samuel Benton

, Xia Li, Yiling Lou, Lingming Zhang:
On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems. 907-918 - Xian Zhan

, Lingling Fan, Tianming Liu
, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu
:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? 919-930 - Yue Zou, Bihuan Ban, Yinxing Xue, Yun Xu:

CCGraph: a PDG-based code clone detector with approximate graph matching. 931-942 - Haichi Wang, Zan Wang, Jun Sun, Shuang Liu, Ayesha Sadiq, Yuan-Fang Li:

Towards Generating Thread-Safe Classes Automatically. 943-955 - Aryaz Eghbali

, Michael Pradel:
No Strings Attached: An Empirical Study of String-related Software Bugs. 956-967 - Shangwen Wang

, Ming Wen, Bo Lin, Hongjun Wu, Yihao Qin, Deqing Zou, Xiaoguang Mao
, Hai Jin:
Automated Patch Correctness Assessment: How Far are We? 968-980 - Haoye Tian

, Kui Liu
, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein
, Tegawendé F. Bissyandé:
Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair. 981-992 - Christos Tsigkanos, Nianyu Li, Zhi Jin, Zhenjiang Hu, Carlo Ghezzi:

Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations. 993-1003 - Chaima Boufaied, Claudio Menghi

, Domenico Bianculli, Lionel C. Briand, Yago Isasi Parache:
Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach. 1004-1015 - Cedric Richter, Heike Wehrheim:

Attend and Represent: A Novel View on Algorithm Selection for Software Verification. 1016-1028 - Yinxing Xue, Mingliang Ma, Yun Lin, Yulei Sui, Jiaming Ye, Tianyong Peng:

Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts. 1029-1040 - David Berend, Xiaofei Xie

, Lei Ma, Lingjun Zhou, Yang Liu
, Chi Xu, Jianjun Zhao:
Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness. 1041-1052 - Shuai Wang, Zhendong Su

:
Metamorphic Object Insertion for Testing Object Detection Systems. 1053-1065 - Farnaz Behrang, Alessandro Orso:

Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for Android. 1066-1077 - Jun-Wei Lin, Navid Salehnamadi

, Sam Malek:
Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study. 1078-1089 - Benjamin Gafford, Tobias Dürschmid

, Gabriel A. Moreno, Eunsuk Kang:
Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems. 1090-1102 - Hoang Lam Nguyen, Nebras Nassar, Timo Kehrer, Lars Grunske

:
MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools. 1103-1115 - Hongyu Liu, Ruiqin Tian, Tongping Liu, Bin Ren:

Prober: Practically Defending Overflows with Page Protection. 1116-1128 - Alan Romano, Yunhui Zheng, Weihang Wang

:
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection. 1129-1140 - Yu Feng

, Emina Torlak, Rastislav Bodík:
Summary-Based Symbolic Evaluation for Smart Contracts. 1141-1152 - Facundo Molina

:
Applying Learning Techniques to Oracle Synthesis. 1153-1157 - Nils Wieber:

Automated Generation of Client-Specific Backends Utilizing Existing Microservices and Architectural Knowledge. 1158-1160 - César Cornejo:

SAT-Based Arithmetic Support for Alloy. 1161-1163 - Hala Abdelkader

:
Towards Robust Production Machine Learning Systems: Managing Dataset Shift. 1164-1166 - Christian Schindler:

Towards Transparency-Encouraging Partial Software Disclosure to Enable Trust in Data Usage. 1167-1169 - Anjana Perera

:
Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software Testing. 1170-1174 - Yongsik Kim

, SoAh Min, Youkyung Kim:
The New Approach to IT Testing : Real Transaction-Based Automated Validation Solution. 1175-1178 - Lei Liu, Mehdi Bahrami, Wei-Peng Chen:

Automatic Generation of IFTTT Mashup Infrastructures. 1179-1183 - Haruki Yokoyama, Satoshi Onoue, Shinji Kikuchi:

Towards Building Robust DNN Applications: An Industrial Case Study of Evolutionary Data Augmentation. 1184-1188 - Yi Liu

, Jinhui Xie, Jianbo Yang, Shiyu Guo, Yuetang Deng, Shuqing Li
, Yechang Wu, Yepang Liu:
Industry Practice of JavaScript Dynamic Analysis on WeChat Mini-Programs. 1189-1193 - Davrondzhon Gafurov, Margrete Sunde Grovan, Arne Erik Hurum:

Lightweight MBT Testing for National e-Health Portal in Norway. 1194-1198 - Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula

, Takashi Ishio
, Kenichi Matsumoto:
Code-Based Vulnerability Detection in Node.js Applications: How far are we? 1199-1203 - Mattia Fazzini

, Alessandra Gorla, Alessandro Orso:
A Framework for Automated Test Mocking of Mobile Apps. 1204-1208 - Shawn Rasheed, Jens Dietrich

:
A Hybrid Analysis to Detect Java Serialisation Vulnerabilities. 1209-1213 - Junming Cao, Shouliang Yang, Wenhui Jiang, Hushuang Zeng, Beijun Shen, Hao Zhong

:
BugPecker: Locating Faulty Methods with Deep Learning on Revision Graphs. 1214-1218 - Karine Even-Mendoza

, Cristian Cadar, Alastair F. Donaldson:
Closer to the Edge: Testing Compilers More Thoroughly by Being Less Conservative About Undefined Behaviour. 1219-1223 - Mitchell Olsthoorn

, Arie van Deursen
, Annibale Panichella:
Generating Highly-structured Input Data by Combining Search-based Testing and Grammar-based Fuzzing. 1224-1228 - Joymallya Chakraborty, Kewen Peng, Tim Menzies

:
Making Fair ML Software using Trustworthy Explanation. 1229-1233 - Michael Cao, Sahar Badihi, Khaled Ahmed, Peiyu Xiong, Julia Rubin:

On Benign Features in Malware Detection. 1234-1238 - Jianhui Chen, Fei He:

Proving Termination by k-Induction. 1239-1243 - Jinhao Dong, Yiling Lou, Dan Hao

:
SRRTA: Regression Testing Acceleration via State Reuse. 1244-1248 - Wei Wang, Ruoxi Sun

, Minhui Xue, Damith C. Ranasinghe:
An Automated Assessment of Android Clipboards. 1249-1251 - Han Gao, Yi Xu, Xiao Liu, Jia Xu, Tianxiang Chen, Bowen Zhou, Rui Li, Xuejun Li:

Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart Systems. 1252-1254 - Tianqi Zhang, Yufeng Zhang, Zhenbang Chen, Ziqi Shuai, Ji Wang:

Efficient Multiplex Symbolic Execution with Adaptive Search Strategy. 1255-1256 - Mattia Fazzini

, Alessandro Orso:
Managing App Testing Device Clouds: Issues and Opportunities. 1257-1259 - Meixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng, Zhenbang Chen, Ji Wang:

Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNN. 1260-1261 - Zehua Chen, Zhenbang Chen, Ziqi Shuai, Yufeng Zhang, Weiyu Pan:

Synthesizing Smart Solving Strategy for Symbolic Execution. 1262-1263 - Daohan Song, Hao Zhong

, Li Jia:
The Symptom, Cause and Repair of Workaround. 1264-1266 - Rohit Mehra, Vibhu Saujanya Sharma

, Vikrant Kaulgud, Sanjay Podder
, Adam P. Burden:
Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical Evaluation. 1267-1269 - Xuansong Li

, Wei Song, Xiangyu Zhang:
Towards Programming and Verification for Activity-Oriented Smart Home Systems. 1270-1272 - Nikola Lukic, Saghar Talebipour, Nenad Medvidovic:

AirMochi - A Tool for Remotely Controlling iOS Devices. 1273-1277 - Pouria Derakhshanfar, Xavier Devroey

, Annibale Panichella, Andy Zaidman, Arie van Deursen
:
Botsing, a Search-based Crash Reproduction Framework for Java. 1278-1282 - Jia Xu

, Xiao Liu, Xuejun Li, Lei Zhang, Yun Yang:
Express: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems**This research is in part supported by the National Natural Science Foundation of China Project No. 61972001. 1283-1286 - Di Shao

, Xiao Liu, Ben Cheng, Owen Wang, Thuong N. Hoang
:
Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software Engineering. 1287-1291 - Marco Mobilio, Oliviero Riganelli, Daniela Micucci, Leonardo Mariani:

FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework Upgrades. 1292-1296 - Kristian Kolthoff, Christian Bartelt, Simone Paolo Ponzetto

:
GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements. 1297-1301 - Chenqian Zhu, Weisong Sun, Qin Liu, Yangyang Yuan, Chunrong Fang

, Yong Huang:
HomoTR: Online Test Recommendation System Based on Homologous Code Matching. 1302-1306 - Hao Wang, Guoping Rong, Yangchen Xu, Yong You:

ImpAPTr: A Tool For Identifying The Clues To Online Service Anomalies. 1307-1311 - Dan Zhang, Ping Luo, Wei Tang, Min Zhou:

OSLDetector: Identifying Open-Source Libraries through Binary Analysis. 1312-1315 - Egor Bogomolov

, Yaroslav Golubev
, Artyom Lobanov, Vladimir Kovalenko, Timofey Bryksin:
Sosed: a tool for finding similar software projects. 1316-1320 - Alan Romano, Weihang Wang:

WASim: Understanding WebAssembly Applications through Classification. 1321-1325 - Runze Yu, Youzhe Zhang, Jifeng Xuan:

MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test Generation. 1326-1330 - Zhenfei Cao, Xu Wang, Shengcheng Yu, Yexiao Yun, Chunrong Fang

:
STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion Analysis. 1331-1335 - Chaiyakarn Khanan, Worawit Luewichana, Krissakorn Pruktharathikoon, Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta

:
JITBot: An Explainable Just-In-Time Defect Prediction Bot. 1336-1339 - Nataniel P. Borges, Jenny Rau, Andreas Zeller

:
Speeding up GUI Testing by On-Device Test Generation. 1340-1343 - Omar Javed, Joshua Heneage Dawes, Marta Han

, Giovanni Franzoni, Andreas Pfeiffer, Giles Reger, Walter Binder
:
PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python Projects. 1344-1348 - João F. Ferreira

, Pedro Cruz, Thomas Durieux
, Rui Abreu
:
SmartBugs: A Framework to Analyze Solidity Smart Contracts. 1349-1352 - Stratos Kourtzanidis, Alexander Chatzigeorgiou, Apostolos Ampatzoglou:

RepoSkillMiner: Identifying software expertise from GitHub repositories using Natural Language Processing. 1353-1357 - Kamil Adipovich Masalimov:

A Machine Learning based Approach to Autogenerate Diagnostic Models for CNC machines. 1358-1360 - Haining Feng:

A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven Program. 1361-1363 - Shangqing Liu:

A Unified Framework to Learn Program Semantics with Graph Neural Networks. 1364-1366 - Yi Wu:

Anti-patterns for Java Automated Program Repair Tools. 1367-1369 - Harshita Diddee, Bhrigu Kansra:

CrossPriv: User Privacy Preservation Model for Cross-Silo Federated Software. 1370-1372 - Zhe Liu

:
Discovering UI Display Issues with Visual Understanding. 1373-1375 - Nikhil Pimpalkhare:

Dynamic Algorithm Selection for SMT. 1376-1378 - Chandan Sharma

:
FLUX: From SQL to GQL query translation tool. 1379-1381 - Jiachi Chen

:
Finding Ethereum Smart Contracts Security Issues by Comparing History Versions. 1382-1384 - Pengfei Gao:

Formal Verification of Masking Countermeasures for Arithmetic Programs. 1385-1387 - Beatriz Souza:

Identifying Mutation Subsumption Relations. 1388-1390 - Yating Zhang:

Scalability and Precision Improvement of Neural Program Synthesis. 1391-1393 - Xiangzhe Xu:

The Classification and Propagation of Program Comments. 1394-1396 - Zhengzi Xu:

Source Code and Binary Level Vulnerability Detection and Hot Patching. 1397-1399 - Zhipeng Gao:

When Deep Learning Meets Smart Contracts. 1400-1402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














