


default search action
16th ESEC / 25th SIGSOFT FSE 2017: Paderborn, Germany
- Eric Bodden, Wilhelm Schäfer, Arie van Deursen, Andrea Zisman:

Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, September 4-8, 2017. ACM 2017, ISBN 978-1-4503-5105-8
Invited Papers
- Laurie A. Williams:

The rising tide lifts all boats: the advancement of science in cyber security (invited talk). 1 - Steve Easterbrook

:
Verifying the forecast: how climate models are developed and tested (invited talk). 2 - Wolfgang Emmerich:

Software engineering research results in industrial practice: a tale of two projects (invited talk). 3 - Roy T. Fielding, Richard N. Taylor, Justin R. Erenkrantz, Michael Martin Gorlick, Jim Whitehead, Rohit Khare, Peyman Oreizy:

Reflections on the REST architectural style and "principled design of the modern web architecture" (impact paper award). 4-14
Research Papers
- Adarsh Yoga, Santosh Nagarakatte

:
A fast causal profiler for task parallel programs. 15-26 - Minghui Zhou, Qingying Chen, Audris Mockus

, Fengguang Wu:
On the scalability of Linux kernel maintainers' work. 27-37 - Christos Tsigkanos

, Timo Kehrer, Carlo Ghezzi:
Modeling and verification of evolving cyber-physical spaces. 38-48 - Wei Fu, Tim Menzies:

Easy over hard: a case study on deep learning. 49-60 - Jeho Oh, Don S. Batory, Margaret Myers

, Norbert Siegmund:
Finding near-optimal configurations in product lines by random sampling. 61-71 - Wei Fu, Tim Menzies:

Revisiting unsupervised learning for defect prediction. 72-83 - Xiaofei Xie

, Bihuan Chen, Liang Zou, Shang-Wei Lin
, Yang Liu
, Xiaohong Li:
Loopster: static loop termination analysis. 84-94 - Stelios Sidiroglou-Douskos, Eric Lahtinen, Anthony Eden, Fan Long, Martin C. Rinard:

CodeCarbonCopy. 95-105 - Tim Nelson

, Natasha Danas, Daniel J. Dougherty, Shriram Krishnamurthi
:
The power of "why" and "why not": enriching scenario exploration with provenance. 106-116 - Marcel Böhme

, Ezekiel O. Soremekun
, Sudipta Chattopadhyay
, Emamurho Ugherughe, Andreas Zeller
:
Where is the bug and how is it fixed? an experiment with practitioners. 117-128 - Dan Gopstein, Jake Iannacone, Yu Yan

, Lois DeLong, Yanyan Zhuang, Martin K.-C. Yeh
, Justin Cappos:
Understanding misunderstandings in source code. 129-139 - Janet Siegmund, Norman Peitek, Chris Parnin, Sven Apel

, Johannes C. Hofmeister, Christian Kästner, Andrew Begel, Anja Bethmann, André Brechmann:
Measuring neural efficiency of program comprehension. 140-150 - Vijayaraghavan Murali, Swarat Chaudhuri, Chris Jermaine:

Bayesian specification learning for finding API usage errors. 151-162 - Sahil Verma

, Subhajit Roy:
Synergistic debug-repair of heap manipulations. 163-173 - Kostas Ferles, Valentin Wüstholz, Maria Christakis, Isil Dillig:

Failure-directed program trimming. 174-185 - Jailton Coelho, Marco Túlio Valente

:
Why modern open source projects fail. 186-196 - Michael Hilton

, Nicholas Nelson
, Timothy Tunnell, Darko Marinov, Danny Dig:
Trade-offs in continuous integration: assurance, security, and flexibility. 197-207 - Reyhaneh Jabbarvand, Sam Malek:

µDroid: an energy-aware mutation testing framework for Android. 208-219 - Alireza Sadeghi, Reyhaneh Jabbarvand, Sam Malek:

PATDroid: permission-aware GUI testing of Android. 220-232 - Mario Linares Vásquez

, Gabriele Bavota
, Michele Tufano, Kevin Moran, Massimiliano Di Penta, Christopher Vendome, Carlos Bernal-Cárdenas, Denys Poshyvanyk
:
Enabling mutation testing for Android apps. 233-244 - Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu

, Zhendong Su
:
Guided, stochastic model-based GUI testing of Android apps. 245-256 - Vivek Nair, Tim Menzies

, Norbert Siegmund, Sven Apel
:
Using bad learners to find good configurations. 257-267 - Norbert Siegmund, Stefan Sobernig, Sven Apel

:
Attributed variability models: outside the comfort zone. 268-278 - Paul Gazzillo

:
Kmax: finding all configurations of Kbuild makefiles statically. 279-290 - Alexander Knüppel, Thomas Thüm, Stephan Mennicke

, Jens Meinicke, Ina Schaefer:
Is there a mismatch between real-world feature models and product-line research? 291-302 - Yan Cai

, Lingwei Cao, Jing Zhao:
Adaptively generating high quality fixes for atomicity violations. 303-314 - Yu Guo, Yan Cai

, Zijiang Yang:
AtexRace: across thread and execution sampling for in-house race detection. 315-325 - Shengjian Guo, Meng Wu, Chao Wang:

Symbolic execution of programmable logic controller code. 326-336 - Markus Kusano, Chao Wang:

Thread-modular static analysis for relaxed memory models. 337-348 - Maryam Raiyat Aliabadi, Amita Ajith Kamath, Julien Gascon-Samson, Karthik Pattabiraman:

ARTINALI: dynamic invariant detection for cyber-physical system security. 349-361 - Aviv Kuvent, Shahar Maoz

, Jan Oliver Ringert
:
A symbolic justice violations transition system for unrealizable GR(1) specifications. 362-372 - Martina Maggio, Alessandro Vittorio Papadopoulos

, Antonio Filieri, Henry Hoffmann:
Automated control of multiple software goals using multiple actuators. 373-384 - Rabe Abdalkareem

, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid
, Emad Shihab:
Why do developers use trivial packages? an empirical case study on npm. 385-395 - Oscar Chaparro

, Jing Lu, Fiorella Zampetti
, Laura Moreno, Massimiliano Di Penta, Andrian Marcus
, Gabriele Bavota
, Vincent Ng:
Detecting missing information in bug descriptions. 396-407 - Mohammad Hadi Zibaeenejad, Chi Zhang, Joanne M. Atlee:

Continuous variable-specific resolutions of feature interactions. 408-418 - Mojtaba Bagherzadeh, Nicolas Hili, Juergen Dingel:

Model-level, platform-independent debugging in the context of the model-driven development of real-time systems. 419-430 - Tyler Sorensen

, Hugues Evrard, Alastair F. Donaldson:
Cooperative kernels: GPU multitasking for blocking algorithms. 431-441 - Diego Garbervetsky

, Edgardo Zoppi, Benjamin Livshits:
Toward full elasticity in distributed static analysis: the case of callgraph analysis. 442-453 - Yamilet R. Serrano Llerena

, Guoxin Su
, David S. Rosenblum:
Probabilistic model checking of perturbed MDPs with applications to cloud computing. 454-464 - Diego Cedrim, Alessandro Garcia, Melina Mongiovi

, Rohit Gheyi
, Leonardo da Silva Sousa, Rafael Maiani de Mello
, Baldoino Fonseca, Márcio Ribeiro
, Alexander Chávez:
Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects. 465-475 - Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli

, Somesh Jha, Patrick D. McDaniel:
Cimplifier: automatically debloating containers. 476-486 - Daniel Dietsch, Matthias Heizmann

, Betim Musa, Alexander Nutz, Andreas Podelski:
Craig vs. Newton in software model checking. 487-497 - Sainyam Galhotra, Yuriy Brun

, Alexandra Meliou
:
Fairness testing: testing software for discrimination. 498-510 - David Bingham Brown, Michael Vaughn, Ben Liblit, Thomas W. Reps:

The care and feeding of wild-caught mutants. 511-522 - Song Wang, Jaechang Nam, Lin Tan:

QTEP: quality-aware test case prioritization. 523-534 - Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan:

Constraint normalization and parameterized caching for quantitative program analysis. 535-546 - Nicolas E. Gold, David W. Binkley, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo:

Generalized observational slicing for tree-represented modelling languages. 547-558 - Dalal Alrajeh, Liliana Pasquale, Bashar Nuseibeh

:
On evidence preservation requirements for forensic-ready systems. 559-569 - Fabrizio Pastore

, Leonardo Mariani, Daniela Micucci:
BDCI: behavioral driven conflict identification. 570-581 - Loris D'Antoni, Rishabh Singh, Michael Vaughn:

NoFAQ: synthesizing command repairs from examples. 582-592 - Xuan-Bach Dinh Le, Duc-Hiep Chu, David Lo

, Claire Le Goues
, Willem Visser:
S3: syntax- and semantic-guided repair synthesis via programming by examples. 593-604 - ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks:

Counterexample-guided approach to finding numerical invariants. 605-615 - Calvin Smith, Gabriel Ferns, Aws Albarghouthi:

Discovering relational specifications. 616-626 - Yuekang Li

, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin
, Yang Liu
, Alwen Tiu:
Steelix: program-state based binary fuzzing. 627-637 - Leonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann

, Johannes Lerch, Mira Mezini:
CodeMatch: obfuscation won't conceal your repackaged app. 638-648 - Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia:

A compiler and verifier for page access oblivious computation. 649-660 - Joshua Garcia, Mahmoud Hammad

, Negar Ghorbani, Sam Malek:
Automatic generation of inter-component communication exploits for Android applications. 661-671 - Lili Wei, Yepang Liu, Shing-Chi Cheung

:
OASIS: prioritizing static analysis warnings for Android apps based on app user reviews. 672-682 - Bogdan Vasilescu

, Casey Casalnuovo, Premkumar T. Devanbu:
Recovering clear, natural identifiers from obfuscated JS names. 683-693 - Tingting Yu, Tarannum S. Zaman, Chao Wang:

DESCRY: reproducing system-level concurrency failures. 694-704 - Francesco A. Bianchi, Mauro Pezzè

, Valerio Terragni
:
Reproducing concurrency failures from crash stacks. 705-716 - Marco Castelluccio

, Carlo Sansone
, Luisa Verdoliva, Giovanni Poggi:
Automatically analyzing groups of crashes for finding correlations. 717-726 - Fan Long, Peter Amidon, Martin C. Rinard:

Automatic inference of code transforms for patch generation. 727-739 - Jooyong Yi

, Umair Z. Ahmed, Amey Karkare
, Shin Hwei Tan, Abhik Roychoudhury
:
A feasibility study of using automated program repair for introductory programming assignments. 740-751 - Yuchi Tian, Baishakhi Ray:

Automatically diagnosing and repairing error handling bugs in C. 752-762 - Vincent J. Hellendoorn, Premkumar T. Devanbu:

Are deep neural networks the best choice for modeling source code? 763-773 - Lee Martie, André van der Hoek, Thomas Kwak:

Understanding the impact of support for iteration on code search. 774-785 - Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai

, Yingqi Liu, Xiangyu Zhang:
LAMP: data provenance for graph based machine learning algorithms through derivative computation. 786-797 - Georg Dotzler, Marius Kamp, Patrick Kreutzer, Michael Philippsen

:
More accurate recommendations for method-level changes. 798-808 - Ahmet Çelik, Marko Vasic, Aleksandar Milicevic, Milos Gligoric:

Regression test selection across JVM boundaries. 809-820 - Adriaan Labuschagne, Laura Inozemtseva, Reid Holmes:

Measuring the cost of regression testing in practice: a study of Java projects using continuous integration. 821-830 - Jinqiu Yang, Alexey Zhikhartsev, Yuefei Liu, Lin Tan:

Better test cases for better automated program repair. 831-841
Testing and Security in the Real World
- Wenqi Bu, Minhui Xue

, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie:
When program analysis meets mobile security: an industrial study of misusing Android internet sockets. 842-847 - Marko Vasic, Zuhair Parvez, Aleksandar Milicevic, Milos Gligoric:

File-level vs. module-level regression test selection for .NET. 848-853 - Wing Lam, Zhengkai Wu, Dengfeng Li, Wenyu Wang

, Haibing Zheng, Hui Luo, Peng Yan, Yuetang Deng, Tao Xie:
Record and replay for Android: are we there yet in industrial cases? 854-859 - Roel van Dijk, Christophe Creeten, Jeroen van der Ham, Jeroen van den Bos:

Model-driven software engineering in practice: privacy-enhanced filtering of network traffic. 860-865
The State of the Practice
- Hennie Huijgens, Robert Lamping, Dick Stevens, Hartger Rothengatter, Georgios Gousios, Daniele Romano:

Strong agile metrics: mining log data to determine predictive power of software metrics for continuous delivery teams. 866-871 - Zahy Volf, Edi Shmueli:

Screening heuristics for project gating systems. 872-877 - Diptikalyan Saha, Neelamadhav Gantayat, Senthil Mani, Barry Mitchell:

Natural language querying in SAP-ERP platform. 878-883 - Gojko Adzic, Robert Chatley

:
Serverless computing: economic and architectural impact. 884-889
Understanding Software Developers
- Vladimir Ivanov

, Alan Rogers, Giancarlo Succi
, Jooyong Yi
, Vasilii Zorin:
What do software engineers care about? gaps between research and practice. 890-895 - Matthias Galster, Samuil Angelov, Silverio Martínez-Fernández

, Dan Tofan:
Reference architectures and Scrum: friends or foes? 896-901 - Holger Harms, Collin Rogowski, Luigi Lo Iacono

:
Guidelines for adopting frontend architectures and patterns in microservices-based systems. 902-907 - Jair García, Kelly Garcés:

Improving understanding of dynamically typed software developed by agile practitioners. 908-913
Data-Driven Improvement
- Yaqin Zhou, Asankhaya Sharma:

Automated identification of security issues from commit messages and bug reports. 914-919 - JingZheng Wu, Mutian Yang:

LaChouTi: kernel vulnerability responding framework for the fragmented Android devices. 920-925 - Sun-Ro Lee, Min-Jae Heo, Chan-Gun Lee, Milhan Kim, Gaeul Jeong:

Applying deep learning based automatic bug triager to industrial projects. 926-931 - Diego Garbervetsky

, Zvonimir Pavlinovic, Michael Barnett, Madanlal Musuvathi, Todd Mytkowicz, Edgardo Zoppi:
Static analysis for optimizing big data queries. 932-937 - Reza Matinnejad, Shiva Nejati

, Lionel C. Briand:
Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies. 938-943
Dynamic Analysis
- Pavel Dovgalyuk, Natalia Fursova, Ivan Vasiliev, Vladimir Makarov:

QEMU-based framework for non-intrusive virtual machine instrumentation and introspection. 944-948 - Yujie Yuan, Lihua Xu, Xusheng Xiao

, Andy Podgurski, Huibiao Zhu:
RunDroid: recovering execution call graphs for Android applications. 949-953 - Hengbiao Yu, Zhenbang Chen, Yufeng Zhang, Ji Wang, Wei Dong:

RGSE: a regular property guided symbolic executor for Java. 954-958 - Ferhat Erata

, Arda Goknil, Bedir Tekinerdogan
, Geylani Kardas
:
A tool for automated reasoning about traces based on configurable formal semantics. 959-963 - Fabrizio Pastore, Leonardo Mariani:

VART: a tool for the automatic detection of regression faults. 964-968
Models
- Germán Regis, César Cornejo, Simón Gutiérrez Brida

, Mariano Politano, Fernando D. Raverta
, Pablo Ponzio, Nazareno Aguirre, Juan Pablo Galeotti, Marcelo F. Frias
:
DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour. 969-973 - Joel Greenyer, Daniel Gritzner

, Florian König, Jannik Dahlke, Jianwei Shi, Eric Wete
:
From scenario modeling to scenario programming for reactive systems with dynamic topology. 974-978 - Germán Regis, Renzo Degiovanni

, Nicolás D'Ippolito
, Nazareno Aguirre:
CLTSA: labelled transition system analyser with counting fluent support. 979-983 - Csaba Debreceni, Gábor Bergmann, Márton Búr, István Ráth, Dániel Varró

:
The MONDO collaboration framework: secure collaborative modeling over existing version control systems. 984-988 - Amir Shayan Ahmadian

, Sven Peldszus
, Qusai Ramadan
, Jan Jürjens:
Model-based privacy and security analysis with CARiSMA. 989-993
Misc
- Panuchart Bunyakiati, Chadarat Phipathananunth:

Cherry-picking of code commits in long-running, multi-release software. 994-998 - Wilberto Z. Nunez, Victor J. Marin, Carlos R. Rivero

:
ARCC: assistant for repetitive code comprehension. 999-1003 - Julian Thomé, Lwin Khin Shar

, Domenico Bianculli
, Lionel C. Briand:
JoanAudit: a tool for auditing common injection vulnerabilities. 1004-1008 - Bowen Xu, Zhenchang Xing, Xin Xia

, David Lo
, Xuan-Bach Dinh Le:
XSearch: a domain-specific cross-language relevant question retrieval tool. 1009-1013
Doctoral Symposium
- Lu Wang:

Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems. 1014-1017 - Marcos César de Oliveira:

DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies. 1018-1021 - Mai Abusair:

User- and analysis-driven context aware software development in mobile computing. 1022-1025 - Stefan Kögel:

Recommender system for model driven software development. 1026-1029 - Mathias Ellmann:

On the similarity of software development documentation. 1030-1033 - Andreas Schuler

:
Application of search-based software engineering methodologies for test suite optimization and evolution in mission critical mobile application development. 1034-1037 - Verena Käfer

:
Summarizing software engineering communication artifacts from different sources. 1038-1041 - Natasha Nigar:

Model-based dynamic software project scheduling. 1042-1045 - Chong Tang:

System performance optimization via design and configuration space exploration. 1046-1049
Student Research Competition
- Alan Jaffe:

Suggesting meaningful variable names for decompiled code: a machine translation approach. 1050-1052 - Hengbiao Yu:

Practical symbolic verification of regular properties. 1053-1055 - Ivan Pashchenko

:
FOSS version differentiation as a benchmark for static analysis security testing tools. 1056-1058 - Ayush Kohli:

DecisionDroid: a supervised learning-based system to identify cloned Android applications. 1059-1061 - Rabe Abdalkareem

:
Reasons and drawbacks of using trivial npm packages: the developers' perspective. 1062-1064 - Suhaib Mujahid

:
Detecting wearable app permission mismatches: a case study on Android wear. 1065-1067 - Chris Mills:

Automating traceability link recovery through classification. 1068-1070 - Liam Schramm:

Improving performance of automatic program repair using learned heuristics. 1071-1073

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














