default search action
29th SANER 2022: Honolulu, HI, USA
- IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, Honolulu, HI, USA, March 15-18, 2022. IEEE 2022, ISBN 978-1-6654-3786-8
- Peter Bludau, Alexander Pretschner:
PR-SZZ: How pull requests can support the tracing of defects in software repositories. 1-12 - Zi Gong, Cuiyun Gao, Yasheng Wang, Wenchao Gu, Yun Peng, Zenglin Xu:
Source Code Summarization with Structural Relative Position Guided Transformer. 13-24 - Biruk Asmare Muse, Foutse Khomh, Giuliano Antoniol:
Do Developers Refactor Data Access Code? An Empirical Study. 25-35 - Nyyti Saarimäki, Sergio Moreschini, Francesco Lomio, Rafael Peñaloza, Valentina Lenarduzzi:
Towards a Robust Approach to Analyze Time-Dependent Data in Software Engineering. 36-40 - Nitish Patkar, Andrei Chis, Nataliia Stulova, Oscar Nierstrasz:
First-class artifacts as building blocks for live in-IDE documentation. 41-45 - Francesco Lomio, Zadia Codabux, Dale Birtch, Dale Hopkins, Davide Taibi:
On the Benefits of the Accelerate Metrics: An Industrial Survey at Vendasta. 46-50 - Giang Nguyen-Truong, Hong Jin Kang, David Lo, Abhishek Sharma, Andrew E. Santosa, Asankhaya Sharma, Ming Yi Ang:
HERMES: Using Commit-Issue Linking to Detect Vulnerability-Fixing Commits. 51-62 - Akond Rahman, Tushar Sharma:
Lessons from Research to Practice on Writing Better Quality Puppet Scripts. 63-67 - Shrishti Pradhan, Raveendra Kumar Medicherla, Shivani Kondewar, Ravindra Naik:
Program Transformations for Precise Analysis of Enterprise Information Systems. 68-72 - Chengran Yang, Ferdian Thung, David Lo:
Efficient Search of Live-Coding Screencasts from Online Videos. 73-77 - Tao Chen:
Lifelong Dynamic Optimization for Self-Adaptive Systems: Fact or Fiction? 78-89 - Sara Forootani, Andrea Di Sorbo, Corrado Aaron Visaggio:
An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects. 90-100 - Xinyue Liang, Jun Ma:
A Study on Screen Logging Risks of Secure Keyboards of Android Financial Apps. 101-111 - Ligeng Chen, Zhongling He, Hao Wu, Fengyuan Xu, Yi Qian, Bing Mao:
DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy. 112-122 - Pablo Valenzuela-Toledo, Alexandre Bergel:
Evolution of GitHub Action Workflows. 123-127 - Ratnadira Widyasari, Stefanus Agus Haryono, Ferdian Thung, Jieke Shi, Constance Tan, Fiona Wee, Jack Phan, David Lo:
On the Influence of Biases in Bug Localization: Evaluation and Benchmark. 128-139 - Zachary Eberhart, Collin McMillan:
Generating Clarifying Questions for Query Refinement in Source Code Search. 140-151 - Alex Serban, Joost Visser:
Adapting Software Architectures to Machine Learning Challenges. 152-163 - Christian Birchler, Nicolas Ganz, Sajad Khatiri, Alessio Gambi, Sebastiano Panichella:
Cost-effective Simulation-based Test Selection in Self-driving Cars Software with SDC-Scissor. 164-168 - Romulo Nascimento, André C. Hora, Eduardo Figueiredo:
Exploring API Deprecation Evolution in JavaScript. 169-173 - Ítalo Santos, Igor Wiese, Igor Steinmacher, Anita Sarma, Marco Aurélio Gerosa:
Hits and Misses: Newcomers' ability to identify Skills needed for OSS tasks. 174-183 - Denis Sushentsev, Aleksandr Khvorov, Roman Vasiliev, Yaroslav Golubev, Timofey Bryksin:
DAPSTEP: Deep Assignee Prediction for Stack Trace Error rePresentation. 184-195 - Enrique A. da Roza, Jackson A. Prado Lima, Rogério C. Silva, Silvia Regina Vergilio:
Machine Learning Regression Techniques for Test Case Prioritization in Continuous Integration Environment. 196-206 - Camilo Velázquez-Rodríguez, Eleni Constantinou, Coen De Roover:
Uncovering Library Features from API Usage on Stack Overflow. 207-217 - Chaiyong Ragkhitwetsagul, Jens Krinke, Morakot Choetkiertikul, Thanwadee Sunetnanta, Federica Sarro:
Identifying Software Engineering Challenges in Software SMEs: A Case Study in Thailand. 218-222 - Nicholas Chan, John A. Chandy:
Extracting Vulnerabilities from GitHub Commits. 235-239 - Arthur Marques, Gail C. Murphy:
Evaluating the Use of Semantics for Identifying Task-relevant Textual Information. 240-251 - Harshavardhan Kadiyala, Alberto Misail, Julia Rubin:
Kuber: Cost-Efficient Microservice Deployment Planner. 252-262 - Hung Nguyen, Francesco Lomio, Fabiano Pecorelli, Valentina Lenarduzzi:
PANDORA: Continuous Mining Software Repository and Dataset Generation. 263-267 - Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari:
FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers. 268-272 - Camila Sarmento, Tiago Massoni, Alexander Serebrenik, Gemma Catolino, Damian A. Tamburri, Fabio Palomba:
Gender Diversity and Community Smells: A Double-Replication Study on Brazilian Software Teams. 273-283 - Aitor Arrieta, Maialen Otaegi, Liping Han, Goiuria Sagardui, Shaukat Ali, Maite Arratibel:
Automating Test Oracle Generation in DevOps for Industrial Elevators. 284-288 - Yan Lei, Chunyan Liu, Huan Xie, Sheng Huang, Meng Yan, Zhou Xu:
BCL-FL: A Data Augmentation Approach with Between-Class Learning for Fault Localization. 289-300 - Giovanni Viviani, Gail C. Murphy:
What really is software design? 301-308 - Yan Zhao, Enyi Tang, Haipeng Cai, Xi Guo, Xiaoyin Wang, Na Meng:
A Lightweight Approach of Human-Like Playtest for Android Apps. 309-320 - Jack Johnson, Junayed Mahmud, Tyler Wendland, Kevin Moran, Julia Rubin, Mattia Fazzini:
An Empirical Investigation into the Reproduction of Bug Reports for Android Apps. 321-322 - Mohammed A. Shehab, Abdelwahab Hamou-Lhadj, Luay Alawneh:
ClusterCommit: A Just-in-Time Defect Prediction Approach Using Clusters of Projects. 333-337 - Roland Croft, Muhammad Ali Babar, Li Li:
An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources. 338-348 - Zishuo Ding, Heng Li, Weiyi Shang:
LoGenText: Automatically Generating Logging Texts Using Neural Machine Translation. 349-360 - Guang Yang, Xiang Chen, Yanlin Zhou, Chi Yu:
DualSC: Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning. 361-372 - Rongfan Li, Bihuan Chen, Fengyi Zhang, Chao Sun, Xin Peng:
Detecting Runtime Exceptions by Deep Code Representation Learning with Attention-Based Graph Neural Networks. 373-384 - Chengran Yang, Bowen Xu, Junaed Younus Khan, Gias Uddin, DongGyun Han, Zhou Yang, David Lo:
Aspect-Based API Review Classification: How Far Can Pre-Trained Transformer Model Go? 385-395 - Zhongyang Deng, Ling Xu, Chao Liu, Meng Yan, Zhou Xu, Yan Lei:
Fine-grained Co-Attentive Representation Learning for Semantic Code Search. 396-407 - Zhou Yang, Jieke Shi, Muhammad Hilmi Asyrofi, David Lo:
Revisiting Neuron Coverage Metrics and Quality of Deep Neural Networks. 408-419 - Mubin Ul Haque, M. Mehdi Kholoosi, Muhammad Ali Babar:
KGSecConfig: A Knowledge Graph Based Approach for Secured Container Orchestrator Configuration. 420-431 - Menghan Wu, Yang Zhang, Jiakun Liu, Shangwen Wang, Zhang Zhang, Xin Xia, Xinjun Mao:
On the Way to Microservices: Exploring Problems and Solutions from Online Q&A Community. 432-443 - Yunosuke Higashi, Katsunori Fukui, Yutaro Kashiwa, Masao Ohira:
A Preliminary Analysis of GPL-Related License Violations in Docker Images. 444-448 - Yinyuan Zhang, Yang Zhang, Xinjun Mao, Yiwen Wu, Bo Lin, Shangwen Wang:
Recommending Base Image for Docker Containers based on Deep Configuration Comprehension. 449-453 - Sergio Naranjo-Puentes, Camilo Escobar-Velásquez, Christopher Vendome, Mario Linares-Vásquez:
A Preliminary Study on Accessibility of Augmented Reality Features in Mobile Apps. 454-458 - Christoph Reile, Mohak Chadha, Valentin Hauner, Anshul Jindal, Benjamin Hofmann, Michael Gerndt:
Bunk8s: Enabling Easy Integration Testing of Microservices in Kubernetes. 459-463 - Ulf Kargén, Ivar Härnqvist, Johannes Wilson, Gustav Eriksson, Evelina Holmgren, Nahid Shahmehri:
desync-cc: An Automatic Disassembly-Desynchronization Obfuscator. 464-468 - Anamaria Mojica-Hanke, Laura Bello-Jiménez, Camilo Escobar-Velásquez, Mario Linares-Vásquez:
Crème de la crème. Investigating Metadata and Survivability of Top Android Apps. 469-480 - Jing Yang, Yibiao Yang, Maolin Sun, Ming Wen, Yuming Zhou, Hai Jin:
Isolating Compiler Optimization Faults via Differentiating Finer-grained Options. 481-491 - Sergey Titov, Yaroslav Golubev, Timofey Bryksin:
ReSplit: Improving the Structure of Jupyter Notebooks by Re-Splitting Their Cells. 492-496 - Sakutaro Sugiyama, Takashi Kobayashi, Kazumasa Shimari, Takashi Ishio:
JISDLab: A web-based interactive literate debugging environment. 497-501 - Thanh V. Nguyen, Aashish Yadavally, Tien N. Nguyen:
Phrase2Set: Phrase-to-Set Machine Translation and Its Software Engineering Applications. 502-513 - Kevin Moran, Ali Yachnes, George Purnell, Junayed Mahmud, Michele Tufano, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Zach H'Doubler:
An Empirical Investigation into the Use of Image Captioning for Automated Software Documentation. 514-525 - Jordan Henkel, Goutham Ramakrishnan, Zi Wang, Aws Albarghouthi, Somesh Jha, Thomas W. Reps:
Semantic Robustness of Models of Source Code. 526-537 - Lívia Barbosa, André C. Hora:
How and Why Developers Migrate Python Tests. 538-548 - Pablo Valle, Aitor Arrieta:
Towards the Isolation of Failure-Inducing Inputs in Cyber-Physical Systems: is Delta Debugging Enough? 549-553 - Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu:
Learning Program Semantics with Code Representations: An Empirical Study. 554-565 - Ning Ge, Ze Wang, Li Zhang, Jiuang Zhao, Yufei Zhou, Zewei Liu:
ArchTacRV: Detecting and Runtime Verifying Architectural Tactics in Code. 566-576 - Ke Liu, Guang Yang, Xiang Chen, Chi Yu:
SOTitle: A Transformer-based Post Title Generation Approach for Stack Overflow. 577-588 - Shichao Wang, Yun Zhang, Liagfeng Bao, Xin Xia, Minghui Wu:
VCMatch: A Ranking-based Approach for Automatic Security Patches Localization for OSS Vulnerabilities. 589-600 - Yi Gui, Yao Wan, Hongyu Zhang, Huifang Huang, Yulei Sui, Guandong Xu, Zhiyuan Shao, Hai Jin:
Cross-Language Binary-Source Code Matching with Intermediate Representations. 601-612 - Chong Wang, Jingwen Jiang, Maya Daneva, Marten van Sinderen:
CoolTeD: A Web-based Collaborative Labeling Tool for the Textual Dataset. 613-617 - Behnaz Hassanshahi, Hyunjun Lee, Paddy Krishnan:
Gelato: Feedback-driven and Guided Security Analysis of Client-side Web Applications. 618-629 - Dezhen Kong, Qiuyuan Chen, Lingfeng Bao, Chenxing Sun, Xin Xia, Shanping Li:
Recommending Code Reviewers for Proprietary Software Projects: A Large Scale Study. 630-640 - Jingting Chen, Feng Li, Mingjie Xu, Jianhua Zhou, Wei Huo:
RIBDetector: an RFC-guided Inconsistency Bug Detecting Approach for Protocol Implementations. 641-651 - Maxime Gobert, Loup Meurice, Anthony Cleve:
HyDRa: A Framework for Modeling, Manipulating and Evolving Hybrid Polystores. 652-656 - Bharti Chimdyalwar, Anushri Jana, Shrawan Kumar, Ankita Khadsare, Vaidehi Ghime:
Identifying Relevant Changes for Incremental Verification of Evolving Software Systems. 657-661 - Mehdi Golzadeh, Alexandre Decan, Tom Mens:
On the rise and fall of CI services in GitHub. 662-672 - Michael Schlichtig, Steffen Sassalla, Krishna Narasimhan, Eric Bodden:
FUM - A Framework for API Usage constraint and Misuse Classification. 673-684 - Yi Liu, Yadong Yan, Chaofeng Sha, Xin Peng, Bihuan Chen, Chong Wang:
DeepAnna: Deep Learning based Java Annotation Recommendation and Misuse Detection. 685-696 - Alejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, Mario Linares-Vásquez, Gabriele Bavota:
Detecting Connectivity Issues in Android Apps. 697-708 - Alejandra Duque-Torres, Dietmar Pfahl, Rudolf Ramler, Claus Klammer:
A Replication Study on Predicting Metamorphic Relations at Unit Testing Level. 709-719 - Dongge Liu, Van-Thuan Pham, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein:
State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing. 720-730 - Giulia Sellitto, Emanuele Iannone, Zadia Codabux, Valentina Lenarduzzi, Andrea De Lucia, Fabio Palomba, Filomena Ferrucci:
Toward Understanding the Impact of Refactoring on Program Comprehension. 731-742 - Gowri Pandian Sundarapandi, Raiyan Hossain, Chandana Jasrai, Kazi Zakia Sultana, Zadia Codabux:
Common Programming Mistakes Leading to Information Disclosure: A Preliminary Study. 743-747 - Thierry Sorg, Amine Abbad Andaloussi, Barbara Weber:
Towards a Fine-grained Analysis of Cognitive Load During Program Comprehension. 748-752 - Daniel Coutinho, Anderson G. Uchôa, Caio Barbosa, Vinícius Soares, Alessandro F. Garcia, Marcelo Schots, Juliana Alves Pereira, Wesley K. G. Assunção:
On the Influential Interactive Factors on Degrees of Design Decay: A Multi-Project Study. 753-764 - Junaed Younus Khan, Gias Uddin:
Automatic Detection and Analysis of Technical Debts in Peer-Review Documentation of R Packages. 765-776 - Ming Ye, Jicheng Cao, Shengyu Cheng:
Rebot: An Automatic Multi-modal Requirements Review Bot. 777-781 - Aidan Connor, Aaron Harris, Nathan Cooper, Denys Poshyvanyk:
Can We Automatically Fix Bugs by Learning Edit Operations? 782-792 - Li Jia, Hao Zhong, Xiaoyin Wang, Linpeng Huang, Zexuan Li:
How Do Injected Bugs Affect Deep Learning? 793-804 - Martin Odermatt, Diego Marcilio, Carlo A. Furia:
Static Analysis Warnings and Automatic Fixing: A Replication for C# Projects. 805-816 - Riccardo Rubei, Claudio Di Sipio, Juri Di Rocco, Davide Di Ruscio, Phuong T. Nguyen:
Endowing third-party libraries recommender systems with explicit user feedback mechanisms. 817-821 - Michael Moser, Josef Pichler, Andreas Pointner:
Towards Attribute Grammar Mining by Symbolic Execution. 822-826 - Vali Tawosi, Afnan A. Al-Subaihin, Federica Sarro:
Investigating the Effectiveness of Clustering for Story Point Estimation. 827-838 - William Ravelo-Méndez, Camilo Escobar-Velásquez, Mario Linares-Vásquez:
Kraken 2.0: A platform-agnostic and cross-device interaction testing tool. 839-843 - Qiang Xu, James C. Davis, Y. Charlie Hu, Abhilash Jindal:
An Empirical Study on the Impact of Deep Parameters on Mobile App Energy Usage. 844-855 - Xin Zhang, Rongjie Yan, Jiwei Yan, Baoquan Cui, Jun Yan, Jian Zhang:
ExcePy: A Python Benchmark for Bugs with Python Built-in Types. 856-866 - John Businge, Ahmed Zerouali, Alexandre Decan, Tom Mens, Serge Demeyer, Coen De Roover:
Variant Forks - Motivations and Impediments. 867-877 - Richárd Szalay, Zoltán Porkoláb:
Flexible semi-automatic support for type migration of primitives for C/C++ programs. 878-889 - Safwat Hassan, Heng Li, Ahmed E. Hassan:
On the Importance of Performing App Analysis Within Peer Groups. 890-901 - Déaglán Connolly Bree, Mel Ó Cinnéide:
Removing Decorator to Improve Energy Efficiency. 902-912 - Kawser Wazed Nafi, Muhammad Asaduzzaman, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:
Mining Software Information Sites to Recommend Cross-Language Analogical Libraries. 913-924 - Wilson Baker, Michael O'Connor, Seyed Reza Shahamiri, Valerio Terragni:
Detect, Fix, and Verify TensorFlow API Misuses. 925-929 - Boris Cherry, Pol Benats, Maxime Gobert, Loup Meurice, Csaba Nagy, Anthony Cleve:
Static Analysis of Database Accesses in MongoDB Applications. 930-934 - Jian Gu, Pasquale Salza, Harald C. Gall:
Assemble Foundation Models for Automatic Code Summarization. 935-946 - Giammaria Giordano, Antonio Fasulo, Gemma Catolino, Fabio Palomba, Filomena Ferrucci, Carmine Gravino:
On the Evolution of Inheritance and Delegation Mechanisms and Their Impact on Code Quality. 947-958 - Yangruibo Ding, Sahil Suneja, Yunhui Zheng, Jim Laredo, Alessandro Morari, Gail E. Kaiser, Baishakhi Ray:
VELVET: a noVel Ensemble Learning approach to automatically locate VulnErable sTatements. 959-970 - Yu Hu, Zekun Shen, Brendan Dolan-Gavitt:
Characterizing and Improving Bug-Finders with Synthetic Bugs. 971-982 - Ettore Merlo, Mathieu Margier, Guy-Vincent Jourdan, Iosif-Viorel Onut:
Phishing Kits Source Code Similarity Distribution: A Case Study. 983-994 - Rui Xi, Karthik Pattabiraman:
When They Go Low: Automated Replacement of Low-level Functions in Ethereum Smart Contracts. 995-1005 - Mark Santolucito, Jialu Zhang, Ennan Zhai, Jürgen Cito, Ruzica Piskac:
Learning CI Configuration Correctness for Early Build Feedback. 1006-1017 - Rolf-Helge Pfeiffer:
Searching for Technical Debt - An Empirical, Exploratory, and Descriptive Case Study. 1018-1022 - Qige Song, Yongzheng Zhang, Linshu Ouyang, Yige Chen:
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model. 1023-1033 - Yang Hong, Chakkrit Kla Tantithamthavorn, Patanamon Thongtanunam:
Where Should I Look at? Recommending Lines that Reviewers Should Pay Attention To. 1034-1045 - Chaochen Shi, Yong Xiang, Jiangshan Yu, Longxiang Gao, Keshav Sood, Robin Ram Mohan Doss:
A Bytecode-based Approach for Smart Contract Classification. 1046-1054 - Hiroyuki Kirinuki, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto:
Web Element Identification by Combining NLP and Heuristic Search for Web Testing. 1055-1065 - Mubin Ul Haque, Muhammad Ali Babar:
Well Begun is Half Done: An Empirical Study of Exploitability & Impact of Base-Image Vulnerabilities. 1066-1077 - Dun Jin, Peiyu Liu, Zhenfang Zhu:
Automatically Generating Code Comment Using Heterogeneous Graph Neural Networks. 1078-1088 - Xiaoning Zhu, Chaofeng Sha, Junyu Niu:
A Simple Retrieval-based Method for Code Comment Generation. 1089-1100 - Zhiheng Qu, Yi Hu, Jianhui Zeng, Bo Cai, Shun Yang:
Method Name Generation Based on Code Structure Guidance. 1101-1110 - Shogo Tokui, Susumu Tokumoto, <