:facetid:toc:\"db/conf/sigsoft/fse2014.bht\"OK:facetid:toc:db/conf/sigsoft/fse2014.bhtPeng Liu 0010Omer TrippCharles ZhangGrail: context-aware fixing of concurrency bugs.SIGSOFT FSE318-3292014Conference and Workshop Papersclosedconf/sigsoft/0010TZ1410.1145/2635868.2635881https://doi.org/10.1145/2635868.2635881https://dblp.org/rec/conf/sigsoft/0010TZ14URL#3939502Miltiadis AllamanisEarl T. BarrChristian BirdCharles SuttonLearning natural coding conventions.SIGSOFT FSE281-2932014Conference and Workshop Papersclosedconf/sigsoft/AllamanisBBS1410.1145/2635868.2635883https://doi.org/10.1145/2635868.2635883https://dblp.org/rec/conf/sigsoft/AllamanisBBS14URL#3939506Miltiadis AllamanisCharles SuttonMining idioms from source code.SIGSOFT FSE472-4832014Conference and Workshop Papersclosedconf/sigsoft/AllamanisS1410.1145/2635868.2635901https://doi.org/10.1145/2635868.2635901https://dblp.org/rec/conf/sigsoft/AllamanisS14URL#3939507Everton L. G. AlvesMyoungkyu SongMiryung KimRefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits.SIGSOFT FSE751-7542014Conference and Workshop Papersclosedconf/sigsoft/AlvesSK1410.1145/2635868.2661674https://doi.org/10.1145/2635868.2661674https://dblp.org/rec/conf/sigsoft/AlvesSK14URL#3939508Marco AutiliDavide Di RuscioAmleto Di SalleAlexander PerucciCHOReOSynt: enforcing choreography realizability in the future internet.SIGSOFT FSE723-7262014Conference and Workshop Papersclosedconf/sigsoft/AutiliRSP1410.1145/2635868.2661667https://doi.org/10.1145/2635868.2661667https://dblp.org/rec/conf/sigsoft/AutiliRSP14URL#3939509SungGyeong BaeHyunghun ChoInho LimSukyoung RyuSAFEWAPI: web API misuse detector for web applications.SIGSOFT FSE507-5172014Conference and Workshop Papersclosedconf/sigsoft/BaeCLR1410.1145/2635868.2635916https://doi.org/10.1145/2635868.2635916https://dblp.org/rec/conf/sigsoft/BaeCLR14URL#3939510Sebastian BaltesStephan Diehl 0001Sketches and diagrams in practice.SIGSOFT FSE530-5412014Conference and Workshop Papersclosedconf/sigsoft/BaltesD1410.1145/2635868.2635891https://doi.org/10.1145/2635868.2635891https://dblp.org/rec/conf/sigsoft/BaltesD14URL#3939511Sebastian BaltesPeter Schmitz 0001Stephan Diehl 0001Linking sketches and diagrams to source code artifacts.SIGSOFT FSE743-7462014Conference and Workshop Papersclosedconf/sigsoft/BaltesSD1410.1145/2635868.2661672https://doi.org/10.1145/2635868.2661672https://dblp.org/rec/conf/sigsoft/BaltesSD14URL#3939512Abhijeet BanerjeeStatic analysis driven performance and energy testing.SIGSOFT FSE791-7942014Conference and Workshop Papersclosedconf/sigsoft/Banerjee1410.1145/2635868.2666602https://doi.org/10.1145/2635868.2666602https://dblp.org/rec/conf/sigsoft/Banerjee14URL#3939513Abhijeet BanerjeeLee Kee ChongSudipta Chattopadhyay 0001Abhik RoychoudhuryDetecting energy bugs and hotspots in mobile apps.SIGSOFT FSE588-5982014Conference and Workshop Papersclosedconf/sigsoft/BanerjeeC0R1410.1145/2635868.2635871https://doi.org/10.1145/2635868.2635871https://dblp.org/rec/conf/sigsoft/BanerjeeC0R14URL#3939514Earl T. BarrYuriy BrunPremkumar T. DevanbuMark HarmanFederica SarroThe plastic surgery hypothesis.SIGSOFT FSE306-3172014Conference and Workshop Papersclosedconf/sigsoft/BarrBDHS1410.1145/2635868.2635898https://doi.org/10.1145/2635868.2635898https://dblp.org/rec/conf/sigsoft/BarrBDHS14URL#3939516Olga BaysalReid HolmesMichael W. GodfreyNo issue left behind: reducing information overload in issue tracking.SIGSOFT FSE666-6772014Conference and Workshop Papersclosedconf/sigsoft/BaysalHG1410.1145/2635868.2635887https://doi.org/10.1145/2635868.2635887https://dblp.org/rec/conf/sigsoft/BaysalHG14URL#3939517Benjamin BehringerIntegrating approaches for feature implementation.SIGSOFT FSE775-7782014Conference and Workshop Papersclosedconf/sigsoft/Behringer1410.1145/2635868.2666605https://doi.org/10.1145/2635868.2666605https://dblp.org/rec/conf/sigsoft/Behringer14URL#3939518Jonathan Bell 0001Detecting, isolating, and enforcing dependencies among and within test cases.SIGSOFT FSE799-8022014Conference and Workshop Papersclosedconf/sigsoft/Bell1410.1145/2635868.2666597https://doi.org/10.1145/2635868.2666597https://dblp.org/rec/conf/sigsoft/Bell14URL#3939519David W. BinkleyNicolas GoldMark HarmanSyed S. IslamJens KrinkeShin YooORBS: language-independent program slicing.SIGSOFT FSE109-1202014Conference and Workshop Papersclosedconf/sigsoft/BinkleyGHIKY1410.1145/2635868.2635893https://doi.org/10.1145/2635868.2635893https://dblp.org/rec/conf/sigsoft/BinkleyGHIKY14URL#3939520Cecylia BocovichJoanne M. AtleeVariable-specific resolutions for feature interactions.SIGSOFT FSE553-5632014Conference and Workshop Papersclosedconf/sigsoft/BocovichA1410.1145/2635868.2635927https://doi.org/10.1145/2635868.2635927https://dblp.org/rec/conf/sigsoft/BocovichA14URL#3939521Marcel BöhmeSoumya PaulOn the efficiency of automated testing.SIGSOFT FSE632-6422014Conference and Workshop Papersclosedconf/sigsoft/BohmeP1410.1145/2635868.2635923https://doi.org/10.1145/2635868.2635923https://dblp.org/rec/conf/sigsoft/BohmeP14URL#3939522Amiangshu BosuJeffrey C. CarverMunawar HafizPatrick HilleyDerek JanniIdentifying the characteristics of vulnerable code changes: an empirical study.SIGSOFT FSE257-2682014Conference and Workshop Papersclosedconf/sigsoft/BosuCHHJ1410.1145/2635868.2635880https://doi.org/10.1145/2635868.2635880https://dblp.org/rec/conf/sigsoft/BosuCHHJ14URL#3939523Marc BrüninkAutonomous compliance monitoring of non-functional properties.SIGSOFT FSE795-7982014Conference and Workshop Papersclosedconf/sigsoft/Brunink1410.1145/2635868.2666599https://doi.org/10.1145/2635868.2666599https://dblp.org/rec/conf/sigsoft/Brunink14URL#3939524Satish Chandra 0001Are you getting traction? tales from the tech transfer trenches (invited talk).SIGSOFT FSE52014Conference and Workshop Papersclosedconf/sigsoft/Chandra1410.1145/2635868.2684430https://doi.org/10.1145/2635868.2684430https://dblp.org/rec/conf/sigsoft/Chandra14URL#3939525Jane Cleland-HuangMona RahimiPatrick MäderAchieving lightweight trustworthy traceability.SIGSOFT FSE849-8522014Conference and Workshop Papersclosedconf/sigsoft/Cleland-HuangRM1410.1145/2635868.2666612https://doi.org/10.1145/2635868.2666612https://dblp.org/rec/conf/sigsoft/Cleland-HuangRM14URL#3939526Maxime CordyPatrick HeymansAxel LegayPierre-Yves SchobbensBruno DawagneMartin LeuckerCounterexample guided abstraction refinement of product-line behavioural models.SIGSOFT FSE190-2012014Conference and Workshop Papersclosedconf/sigsoft/CordyHLSDL1410.1145/2635868.2635919https://doi.org/10.1145/2635868.2635919https://dblp.org/rec/conf/sigsoft/CordyHLSDL14URL#3939527Xavier DevroeyGilles PerrouinMaxime CordyMike PapadakisAxel LegayPierre-Yves SchobbensA variability perspective of mutation analysis.SIGSOFT FSE841-8442014Conference and Workshop Papersclosedconf/sigsoft/DevroeyPCPLS1410.1145/2635868.2666610https://doi.org/10.1145/2635868.2666610https://dblp.org/rec/conf/sigsoft/DevroeyPCPLS14URL#3939530Peter DingesGul A. AghaSolving complex path conditions through heuristic search on induced polytopes.SIGSOFT FSE425-4362014Conference and Workshop Papersclosedconf/sigsoft/DingesA1410.1145/2635868.2635889https://doi.org/10.1145/2635868.2635889https://dblp.org/rec/conf/sigsoft/DingesA14URL#3939532Stefan DziwokChristopher GerkingSteffen Becker 0001Sebastian Thiele 0002Christian HeinzemannUwe PohlmannA tool suite for the model-driven software engineering of cyber-physical systems.SIGSOFT FSE715-7182014Conference and Workshop Papersclosedconf/sigsoft/DziwokGBTHP1410.1145/2635868.2661665https://doi.org/10.1145/2635868.2661665https://dblp.org/rec/conf/sigsoft/DziwokGBTHP14URL#3939533Sebastian G. ElbaumDavid S. RosenblumKnown unknowns: testing in the presence of uncertainty.SIGSOFT FSE833-8362014Conference and Workshop Papersclosedconf/sigsoft/ElbaumR1410.1145/2635868.2666608https://doi.org/10.1145/2635868.2666608https://dblp.org/rec/conf/sigsoft/ElbaumR14URL#3939534Sebastian G. ElbaumGregg RothermelJohn PenixTechniques for improving regression testing in continuous integration development environments.SIGSOFT FSE235-2452014Conference and Workshop Papersclosedconf/sigsoft/ElbaumRP1410.1145/2635868.2635910https://doi.org/10.1145/2635868.2635910https://dblp.org/rec/conf/sigsoft/ElbaumRP14URL#3939535Mahdi EslamimehrJens PalsbergSherlock: scalable deadlock detection for concurrent programs.SIGSOFT FSE353-3652014Conference and Workshop Papersclosedconf/sigsoft/EslamimehrP1410.1145/2635868.2635918https://doi.org/10.1145/2635868.2635918https://dblp.org/rec/conf/sigsoft/EslamimehrP14URL#3939536Yu Feng 0001Saswat AnandIsil DilligAlex AikenApposcopy: semantics-based detection of Android malware through static analysis.SIGSOFT FSE576-5872014Conference and Workshop Papersclosedconf/sigsoft/FengADA1410.1145/2635868.2635869https://doi.org/10.1145/2635868.2635869https://dblp.org/rec/conf/sigsoft/FengADA14URL#3939538Antonio FilieriCorina S. PasareanuWillem VisserJaco GeldenhuysStatistical symbolic execution with informed sampling.SIGSOFT FSE437-4482014Conference and Workshop Papersclosedconf/sigsoft/FilieriPVG1410.1145/2635868.2635899https://doi.org/10.1145/2635868.2635899https://dblp.org/rec/conf/sigsoft/FilieriPVG14URL#3939540Thomas Fritz 0001David C. ShepherdKatja KevicWill SnipesChristoph BräunlichDevelopers' code context models for change tasks.SIGSOFT FSE7-182014Conference and Workshop Papersclosedconf/sigsoft/FritzSKSB1410.1145/2635868.2635905https://doi.org/10.1145/2635868.2635905https://dblp.org/rec/conf/sigsoft/FritzSKSB14URL#3939541Zheng GaoNumerical program analysis and testing.SIGSOFT FSE779-7822014Conference and Workshop Papersclosedconf/sigsoft/Gao1410.1145/2635868.2666603https://doi.org/10.1145/2635868.2666603https://dblp.org/rec/conf/sigsoft/Gao14URL#3939542Alberto GoffiAlessandra GorlaAndrea MattavelliMauro PezzèPaolo TonellaSearch-based synthesis of equivalent method sequences.SIGSOFT FSE366-3762014Conference and Workshop Papersclosedconf/sigsoft/GoffiGMPT1410.1145/2635868.2635888https://doi.org/10.1145/2635868.2635888https://dblp.org/rec/conf/sigsoft/GoffiGMPT14URL#3939543Gillian J. GreeneBernd Fischer 0002ConceptCloud: a tagcloud browser for software archives.SIGSOFT FSE759-7622014Conference and Workshop Papersclosedconf/sigsoft/GreeneF1410.1145/2635868.2661676https://doi.org/10.1145/2635868.2661676https://dblp.org/rec/conf/sigsoft/GreeneF14URL#3939544Lin Gui 0002Jun Sun 0001Yang Liu 0003Truong Khanh NguyenJin Song DongRaPiD: a toolkit for reliability analysis of non-deterministic systems.SIGSOFT FSE727-7302014Conference and Workshop Papersclosedconf/sigsoft/Gui00ND1410.1145/2635868.2661668https://doi.org/10.1145/2635868.2661668https://dblp.org/rec/conf/sigsoft/Gui00ND14URL#3939545Sumit GulwaniIvan RadicekFlorian ZulegerFeedback generation for performance problems in introductory programming assignments.SIGSOFT FSE41-512014Conference and Workshop Papersclosedconf/sigsoft/GulwaniRZ1410.1145/2635868.2635912https://doi.org/10.1145/2635868.2635912https://dblp.org/rec/conf/sigsoft/GulwaniRZ14URL#3939546Nikolas HavrikovMatthias HöscheleJuan Pablo GaleottiAndreas ZellerXMLMate: evolutionary XML test generation.SIGSOFT FSE719-7222014Conference and Workshop Papersclosedconf/sigsoft/HavrikovHGZ1410.1145/2635868.2661666https://doi.org/10.1145/2635868.2661666https://dblp.org/rec/conf/sigsoft/HavrikovHGZ14URL#3939548Felienne HermansDanny DigBumbleBee: a refactoring environment for spreadsheet formulas.SIGSOFT FSE747-7502014Conference and Workshop Papersclosedconf/sigsoft/HermansD1410.1145/2635868.2661673https://doi.org/10.1145/2635868.2661673https://dblp.org/rec/conf/sigsoft/HermansD14URL#3939551Yoshiki HigoShinji KusumotoHow should we measure functional sameness from program source code? an exploratory study on Java methods.SIGSOFT FSE294-3052014Conference and Workshop Papersclosedconf/sigsoft/HigoK1410.1145/2635868.2635886https://doi.org/10.1145/2635868.2635886https://dblp.org/rec/conf/sigsoft/HigoK14URL#3939552Chen HuoJames ClauseImproving oracle quality by detecting brittle assertions and unused inputs in tests.SIGSOFT FSE621-6312014Conference and Workshop Papersclosedconf/sigsoft/HuoC1410.1145/2635868.2635917https://doi.org/10.1145/2635868.2635917https://dblp.org/rec/conf/sigsoft/HuoC14URL#3939554Joxan JaffarVijayaraghavan MuraliA path-sensitively sliced control flow graph.SIGSOFT FSE133-1432014Conference and Workshop Papersclosedconf/sigsoft/JaffarM1410.1145/2635868.2635884https://doi.org/10.1145/2635868.2635884https://dblp.org/rec/conf/sigsoft/JaffarM14URL#3939555Yu Jiang 0001Hehua ZhangHuafeng ZhangXinyan ZhaoHan Liu 0010Chengnian SunXiaoyu SongMing Gu 0001Jia-Guang Sun 0001Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems.SIGSOFT FSE711-7142014Conference and Workshop Papersclosedconf/sigsoft/JiangZZZLSSGS1410.1145/2635868.2661664https://doi.org/10.1145/2635868.2661664https://dblp.org/rec/conf/sigsoft/JiangZZZLSSGS14URL#3939556Richard JoinerThomas W. RepsSomesh JhaMohan DhawanVinod GanapathyEfficient runtime-enforcement techniques for policy weaving.SIGSOFT FSE224-2342014Conference and Workshop Papersclosedconf/sigsoft/JoinerRJDG1410.1145/2635868.2635907https://doi.org/10.1145/2635868.2635907https://dblp.org/rec/conf/sigsoft/JoinerRJDG14URL#3939557Magne JørgensenTen years with evidence-based software engineering. What is it? Has it had any impact? What's next?SIGSOFT FSE32014Conference and Workshop Papersclosedconf/sigsoft/Jorgensen1410.1145/2635868.2684428https://doi.org/10.1145/2635868.2684428https://dblp.org/rec/conf/sigsoft/Jorgensen14URL#3939558Harry Raymond JosephSoftware programmer management: a machine learning and human computer interaction framework for optimal task assignment.SIGSOFT FSE826-8282014Conference and Workshop Papersclosedconf/sigsoft/Joseph1410.1145/2635868.2661684https://doi.org/10.1145/2635868.2661684https://dblp.org/rec/conf/sigsoft/Joseph14URL#3939559René JustDarioush JalaliLaura InozemtsevaMichael D. ErnstReid HolmesGordon Fraser 0001Are mutants a valid substitute for real faults in software testing?SIGSOFT FSE654-6652014Conference and Workshop Papersclosedconf/sigsoft/JustJIEHF1410.1145/2635868.2635929https://doi.org/10.1145/2635868.2635929https://dblp.org/rec/conf/sigsoft/JustJIEHF14URL#3939560Shuanglong KanTraceability and model checking to support safety requirement verification.SIGSOFT FSE783-7862014Conference and Workshop Papersclosedconf/sigsoft/Kan1410.1145/2635868.2666606https://doi.org/10.1145/2635868.2666606https://dblp.org/rec/conf/sigsoft/Kan14URL#3939561Vineeth KashyapKyle DeweyEthan A. KuefnerJohn WagnerKevin GibbonsJohn SarracinoBen WiedermannBen HardekopfJSAI: a static analysis platform for JavaScript.SIGSOFT FSE121-1322014Conference and Workshop Papersclosedconf/sigsoft/KashyapDKWGSWH1410.1145/2635868.2635904https://doi.org/10.1145/2635868.2635904https://dblp.org/rec/conf/sigsoft/KashyapDKWGSWH14URL#3939562Bakhtiar Khan KasiMinimizing software conflicts through proactive detection of conflicts and task scheduling.SIGSOFT FSE807-8102014Conference and Workshop Papersclosedconf/sigsoft/Kasi1410.1145/2635868.2666600https://doi.org/10.1145/2635868.2666600https://dblp.org/rec/conf/sigsoft/Kasi14URL#3939563Hammad KhalidMeiyappan NagappanEmad ShihabAhmed E. HassanPrioritizing the devices to test your app on: a case study of Android game apps.SIGSOFT FSE610-6202014Conference and Workshop Papersclosedconf/sigsoft/KhalidNSH1410.1145/2635868.2635909https://doi.org/10.1145/2635868.2635909https://dblp.org/rec/conf/sigsoft/KhalidNSH14URL#3939566Ivo KrkaYuriy BrunNenad MedvidovicAutomatic mining of specifications from invocation traces and method invariants.SIGSOFT FSE178-1892014Conference and Workshop Papersclosedconf/sigsoft/KrkaBM1410.1145/2635868.2635890https://doi.org/10.1145/2635868.2635890https://dblp.org/rec/conf/sigsoft/KrkaBM14URL#3939568Akash LalShaz QadeerPowering the static driver verifier using corral.SIGSOFT FSE202-2122014Conference and Workshop Papersclosedconf/sigsoft/LalQ1410.1145/2635868.2635894https://doi.org/10.1145/2635868.2635894https://dblp.org/rec/conf/sigsoft/LalQ14URL#3939570Monica S. LamOmlet: a revolution against big-brother social networks (invited talk).SIGSOFT FSE12014Conference and Workshop Papersclosedconf/sigsoft/Lam1410.1145/2635868.2684426https://doi.org/10.1145/2635868.2684426https://dblp.org/rec/conf/sigsoft/Lam14URL#3939571Johannes LerchBen Hermann 0001Eric BoddenMira MeziniFlowTwist: efficient context-sensitive inside-out taint analysis for large codebases.SIGSOFT FSE98-1082014Conference and Workshop Papersclosedconf/sigsoft/LerchHBM1410.1145/2635868.2635878https://doi.org/10.1145/2635868.2635878https://dblp.org/rec/conf/sigsoft/LerchHBM14URL#3939572Guodong LiEsben AndreasenIndradeep GhoshSymJS: automatic symbolic testing of JavaScript web applications.SIGSOFT FSE449-4592014Conference and Workshop Papersclosedconf/sigsoft/LiAG1410.1145/2635868.2635913https://doi.org/10.1145/2635868.2635913https://dblp.org/rec/conf/sigsoft/LiAG14URL#3939573Jianwen LiYinbo YaoGeguang PuLijun Zhang 0001Jifeng He 0001Aalta: an LTL satisfiability checker over Infinite/Finite traces.SIGSOFT FSE731-7342014Conference and Workshop Papersclosedconf/sigsoft/LiYP0H1410.1145/2635868.2661669https://doi.org/10.1145/2635868.2661669https://dblp.org/rec/conf/sigsoft/LiYP0H14URL#3939576Yu LinCosmin RadoiDanny DigRetrofitting concurrency for Android applications through refactoring.SIGSOFT FSE341-3522014Conference and Workshop Papersclosedconf/sigsoft/LinRD1410.1145/2635868.2635903https://doi.org/10.1145/2635868.2635903https://dblp.org/rec/conf/sigsoft/LinRD14URL#3939577Yamilet R. Serrano LlerenaDealing with uncertainty in verification of nondeterministic systems.SIGSOFT FSE787-7902014Conference and Workshop Papersclosedconf/sigsoft/Llerena1410.1145/2635868.2666598https://doi.org/10.1145/2635868.2666598https://dblp.org/rec/conf/sigsoft/Llerena14URL#3939578Qingzhou LuoFarah HaririLamyaa EloussiDarko MarinovAn empirical analysis of flaky tests.SIGSOFT FSE643-6532014Conference and Workshop Papersclosedconf/sigsoft/LuoHEM1410.1145/2635868.2635920https://doi.org/10.1145/2635868.2635920https://dblp.org/rec/conf/sigsoft/LuoHEM14URL#3939580Lannan LuoJiang Ming 0002Dinghao WuPeng Liu 0005Sencun ZhuSemantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.SIGSOFT FSE389-4002014Conference and Workshop Papersclosedconf/sigsoft/LuoMW0Z1410.1145/2635868.2635900https://doi.org/10.1145/2635868.2635900https://dblp.org/rec/conf/sigsoft/LuoMW0Z14URL#3939581Riyadh MahmoodNariman MirzaeiSam MalekEvoDroid: segmented evolutionary testing of Android apps.SIGSOFT FSE599-6092014Conference and Workshop Papersclosedconf/sigsoft/MahmoodMM1410.1145/2635868.2635896https://doi.org/10.1145/2635868.2635896https://dblp.org/rec/conf/sigsoft/MahmoodMM14URL#3939583Senthil ManiKarthik SankaranarayananVibha Singhal SinhaPremkumar T. DevanbuPanning requirement nuggets in stream of software maintenance tickets.SIGSOFT FSE678-6882014Conference and Workshop Papersclosedconf/sigsoft/ManiSSD1410.1145/2635868.2635897https://doi.org/10.1145/2635868.2635897https://dblp.org/rec/conf/sigsoft/ManiSSD14URL#3939585Diego MarmsolerTowards a theory of architectural styles.SIGSOFT FSE823-8252014Conference and Workshop Papersclosedconf/sigsoft/Marmsoler1410.1145/2635868.2661683https://doi.org/10.1145/2635868.2661683https://dblp.org/rec/conf/sigsoft/Marmsoler14URL#3939586Davood MazinanianNikolaos TsantalisAli Mesbah 0001Discovering refactoring opportunities in cascading style sheets.SIGSOFT FSE496-5062014Conference and Workshop Papersclosedconf/sigsoft/MazinanianTM1410.1145/2635868.2635879https://doi.org/10.1145/2635868.2635879https://dblp.org/rec/conf/sigsoft/MazinanianTM14URL#3939587André N. MeyerThomas Fritz 0001Gail C. MurphyThomas Zimmermann 0001Software developers' perceptions of productivity.SIGSOFT FSE19-292014Conference and Workshop Papersclosedconf/sigsoft/MeyerFMZ1410.1145/2635868.2635892https://doi.org/10.1145/2635868.2635892https://dblp.org/rec/conf/sigsoft/MeyerFMZ14URL#3939589Narcisa Andreea MileaLingxiao JiangSiau-Cheng KhooVector abstraction and concretization for scalable detection of refactorings.SIGSOFT FSE86-972014Conference and Workshop Papersclosedconf/sigsoft/MileaJK1410.1145/2635868.2635926https://doi.org/10.1145/2635868.2635926https://dblp.org/rec/conf/sigsoft/MileaJK14URL#3939590Mehdi MirakhorliAhmed FakhryArtem GrechkoMateusz WielochJane Cleland-HuangArchie: a tool for detecting, monitoring, and preserving architecturally significant code.SIGSOFT FSE739-7422014Conference and Workshop Papersclosedconf/sigsoft/MirakhorliFGWC1410.1145/2635868.2661671https://doi.org/10.1145/2635868.2661671https://dblp.org/rec/conf/sigsoft/MirakhorliFGWC14URL#3939591Laura MorenoGabriele BavotaMassimiliano Di PentaRocco OlivetoAndrian MarcusGerardo CanforaAutomatic generation of release notes.SIGSOFT FSE484-4952014Conference and Workshop Papersclosedconf/sigsoft/MorenoBPOMC1410.1145/2635868.2635870https://doi.org/10.1145/2635868.2635870https://dblp.org/rec/conf/sigsoft/MorenoBPOMC14URL#3939592Hoan Anh NguyenRobert Dyer 0001Tien N. NguyenHridesh RajanMining preconditions of APIs in large-scale code corpus.SIGSOFT FSE166-1772014Conference and Workshop Papersclosedconf/sigsoft/Nguyen0NR1410.1145/2635868.2635924https://doi.org/10.1145/2635868.2635924https://dblp.org/rec/conf/sigsoft/Nguyen0NR14URL#3939594Hung Viet NguyenChristian KästnerTien N. NguyenBuilding call graphs for embedded client-side code in dynamic web applications.SIGSOFT FSE518-5292014Conference and Workshop Papersclosedconf/sigsoft/NguyenKN1410.1145/2635868.2635928https://doi.org/10.1145/2635868.2635928https://dblp.org/rec/conf/sigsoft/NguyenKN14URL#3939595Jeffrey L. OverbeyFarnaz BehrangMunawar HafizA foundation for refactoring C with macros.SIGSOFT FSE75-852014Conference and Workshop Papersclosedconf/sigsoft/OverbeyBH1410.1145/2635868.2635908https://doi.org/10.1145/2635868.2635908https://dblp.org/rec/conf/sigsoft/OverbeyBH14URL#3939598Marc PalyartGail C. MurphyEmerson R. Murphy-HillXavier Blanc 0001Speculative reprogramming.SIGSOFT FSE837-8402014Conference and Workshop Papersclosedconf/sigsoft/PalyartMMB1410.1145/2635868.2666609https://doi.org/10.1145/2635868.2666609https://dblp.org/rec/conf/sigsoft/PalyartMMB14URL#3939599John PenixExperiences developing tools for developers (invited talk).SIGSOFT FSE42014Conference and Workshop Papersclosedconf/sigsoft/Penix1410.1145/2635868.2684429https://doi.org/10.1145/2635868.2684429https://dblp.org/rec/conf/sigsoft/Penix14URL#3939601Marian PetreDaniela E. DamianMethodology and culture: drivers of mediocrity in software engineering?SIGSOFT FSE829-8322014Conference and Workshop Papersclosedconf/sigsoft/PetreD1410.1145/2635868.2666607https://doi.org/10.1145/2635868.2666607https://dblp.org/rec/conf/sigsoft/PetreD14URL#3939602Raphael PhamImproving the software testing skills of novices during onboarding through social transparency.SIGSOFT FSE803-8062014Conference and Workshop Papersclosedconf/sigsoft/Pham1410.1145/2635868.2666604https://doi.org/10.1145/2635868.2666604https://dblp.org/rec/conf/sigsoft/Pham14URL#3939603Raphael PhamStephan KieslingOlga LiskinLeif SingerKurt SchneiderEnablers, inhibitors, and perceptions of testing in novice software teams.SIGSOFT FSE30-402014Conference and Workshop Papersclosedconf/sigsoft/PhamKLSS1410.1145/2635868.2635925https://doi.org/10.1145/2635868.2635925https://dblp.org/rec/conf/sigsoft/PhamKLSS14URL#3939604Baishakhi RayDaryl PosnettVladimir FilkovPremkumar T. DevanbuA large scale study of programming languages and code quality in github.SIGSOFT FSE155-1652014Conference and Workshop Papersclosedconf/sigsoft/RayPFD1410.1145/2635868.2635922https://doi.org/10.1145/2635868.2635922https://dblp.org/rec/conf/sigsoft/RayPFD14URL#3939606Guido SalvaneschiSven AmannSebastian ProkschMira MeziniAn empirical study on program comprehension with reactive programming.SIGSOFT FSE564-5752014Conference and Workshop Papersclosedconf/sigsoft/SalvaneschiAPM1410.1145/2635868.2635895https://doi.org/10.1145/2635868.2635895https://dblp.org/rec/conf/sigsoft/SalvaneschiAPM14URL#3939608Malavika SamakMurali Krishna RamanathanOmen+: a precise dynamic deadlock detector for multithreaded Java libraries.SIGSOFT FSE735-7382014Conference and Workshop Papersclosedconf/sigsoft/SamakR1410.1145/2635868.2661670https://doi.org/10.1145/2635868.2661670https://dblp.org/rec/conf/sigsoft/SamakR14URL#3939609Klaus-Benedikt SchultisChristoph ElsnerDaniel LohmannArchitecture challenges for internal software ecosystems: a large-scale industry case study.SIGSOFT FSE542-5522014Conference and Workshop Papersclosedconf/sigsoft/SchultisEL1410.1145/2635868.2635876https://doi.org/10.1145/2635868.2635876https://dblp.org/rec/conf/sigsoft/SchultisEL14URL#3939611Hyunmin SeoSunghun Kim 0001How we get there: a context-guided search strategy in concolic testing.SIGSOFT FSE413-4242014Conference and Workshop Papersclosedconf/sigsoft/SeoK1410.1145/2635868.2635872https://doi.org/10.1145/2635868.2635872https://dblp.org/rec/conf/sigsoft/SeoK14URL#3939612August ShiAlex GyoriMilos Gligoric 0001Andrey ZaytsevDarko MarinovBalancing trade-offs in test-suite reduction.SIGSOFT FSE246-2562014Conference and Workshop Papersclosedconf/sigsoft/ShiGGZM1410.1145/2635868.2635921https://doi.org/10.1145/2635868.2635921https://dblp.org/rec/conf/sigsoft/ShiGGZM14URL#3939614Shuo SongEstimating the effectiveness of spectrum-based fault localization.SIGSOFT FSE814-8162014Conference and Workshop Papersclosedconf/sigsoft/Song1410.1145/2635868.2661680https://doi.org/10.1145/2635868.2661680https://dblp.org/rec/conf/sigsoft/Song14URL#3939617Chengnian SunHaidong ZhangJian-Guang LouHongyu Zhang 0002Qiang WangDongmei Zhang 0001Siau-Cheng KhooQuerying sequential software engineering data.SIGSOFT FSE700-7102014Conference and Workshop Papersclosedconf/sigsoft/SunZLZWZK1410.1145/2635868.2635902https://doi.org/10.1145/2635868.2635902https://dblp.org/rec/conf/sigsoft/SunZLZWZK14URL#3939618Jacob SwansonMyra B. CohenMatthew B. DwyerBrady J. GarvinJustin W. FirestoneBeyond the rainbow: self-adaptive failure avoidance in configurable systems.SIGSOFT FSE377-3882014Conference and Workshop Papersclosedconf/sigsoft/SwansonCDGF1410.1145/2635868.2635915https://doi.org/10.1145/2635868.2635915https://dblp.org/rec/conf/sigsoft/SwansonCDGF14URL#3939619Yida TaoJindae KimSunghun Kim 0001Chang Xu 0001Automatically generated patches as debugging aids: a human study.SIGSOFT FSE64-742014Conference and Workshop Papersclosedconf/sigsoft/TaoKKX1410.1145/2635868.2635873https://doi.org/10.1145/2635868.2635873https://dblp.org/rec/conf/sigsoft/TaoKKX14URL#3939620Ferdian ThungTien-Duy B. LePavneet Singh KochharDavid Lo 0001BugLocalizer: integrated tool support for bug localization.SIGSOFT FSE767-7702014Conference and Workshop Papersclosedconf/sigsoft/ThungLKL1410.1145/2635868.2661678https://doi.org/10.1145/2635868.2661678https://dblp.org/rec/conf/sigsoft/ThungLKL14URL#3939621Jason TsayLaura DabbishJames D. HerbslebLet's talk about it: evaluating contributions through discussion in GitHub.SIGSOFT FSE144-1542014Conference and Workshop Papersclosedconf/sigsoft/TsayDH1410.1145/2635868.2635882https://doi.org/10.1145/2635868.2635882https://dblp.org/rec/conf/sigsoft/TsayDH14URL#3939622Zhaopeng TuZhendong Su 0001Premkumar T. DevanbuOn the localness of software.SIGSOFT FSE269-2802014Conference and Workshop Papersclosedconf/sigsoft/TuSD1410.1145/2635868.2635875https://doi.org/10.1145/2635868.2635875https://dblp.org/rec/conf/sigsoft/TuSD14URL#3939624Amirhossein VakiliNancy A. DayVerifying CTL-live properties of infinite state models using an SMT solver.SIGSOFT FSE213-2232014Conference and Workshop Papersclosedconf/sigsoft/VakiliD1410.1145/2635868.2635911https://doi.org/10.1145/2635868.2635911https://dblp.org/rec/conf/sigsoft/VakiliD14URL#3939626Gustavo VillavicencioSoftware maintenance like maintenance in other engineering disciplines.SIGSOFT FSE853-8562014Conference and Workshop Papersclosedconf/sigsoft/Villavicencio1410.1145/2635868.2666613https://doi.org/10.1145/2635868.2666613https://dblp.org/rec/conf/sigsoft/Villavicencio14URL#3939627David WilleManaging lots of models: the FaMine approach.SIGSOFT FSE817-8192014Conference and Workshop Papersclosedconf/sigsoft/Wille1410.1145/2635868.2661681https://doi.org/10.1145/2635868.2661681https://dblp.org/rec/conf/sigsoft/Wille14URL#3939628Alexander L. WolfFrom software engineering to software systems (invited talk).SIGSOFT FSE22014Conference and Workshop Papersclosedconf/sigsoft/Wolf1410.1145/2635868.2684427https://doi.org/10.1145/2635868.2684427https://dblp.org/rec/conf/sigsoft/Wolf14URL#3939629Rongxin WuDiagnose crashing faults on production software.SIGSOFT FSE771-7742014Conference and Workshop Papersclosedconf/sigsoft/Wu1410.1145/2635868.2666601https://doi.org/10.1145/2635868.2666601https://dblp.org/rec/conf/sigsoft/Wu14URL#3939630Lu Xiao 0001Detecting and preventing the architectural roots of bugs.SIGSOFT FSE811-8132014Conference and Workshop Papersclosedconf/sigsoft/Xiao1410.1145/2635868.2661679https://doi.org/10.1145/2635868.2661679https://dblp.org/rec/conf/sigsoft/Xiao14URL#3939631Lu Xiao 0001Yuanfang CaiRick KazmanTitan: a toolset that connects software architecture with quality analysis.SIGSOFT FSE763-7662014Conference and Workshop Papersclosedconf/sigsoft/XiaoCK1410.1145/2635868.2661677https://doi.org/10.1145/2635868.2661677https://dblp.org/rec/conf/sigsoft/XiaoCK14URL#3939632Jifeng XuanMartin MonperrusTest case purification for improving fault localization.SIGSOFT FSE52-632014Conference and Workshop Papersclosedconf/sigsoft/XuanM1410.1145/2635868.2635906https://doi.org/10.1145/2635868.2635906https://dblp.org/rec/conf/sigsoft/XuanM14URL#3939633Qi XuanAaron OkanoPremkumar T. DevanbuVladimir FilkovFocus-shifting patterns of OSS developers and their congruence with call graphs.SIGSOFT FSE401-4122014Conference and Workshop Papersclosedconf/sigsoft/XuanODF1410.1145/2635868.2635914https://doi.org/10.1145/2635868.2635914https://dblp.org/rec/conf/sigsoft/XuanODF14URL#3939634Xin Yang 0018Social network analysis in open source software peer review.SIGSOFT FSE820-8222014Conference and Workshop Papersclosedconf/sigsoft/Yang1410.1145/2635868.2661682https://doi.org/10.1145/2635868.2661682https://dblp.org/rec/conf/sigsoft/Yang14URL#3939636Xin Ye 0003Razvan C. BunescuChang Liu 0028Learning to rank relevant files for bug reports using domain knowledge.SIGSOFT FSE689-6992014Conference and Workshop Papersclosedconf/sigsoft/YeBL1410.1145/2635868.2635874https://doi.org/10.1145/2635868.2635874https://dblp.org/rec/conf/sigsoft/YeBL14URL#3939639Annie T. T. YingMartin P. RobillardSelection and presentation practices for code example summarization.SIGSOFT FSE460-4712014Conference and Workshop Papersclosedconf/sigsoft/YingR1410.1145/2635868.2635877https://doi.org/10.1145/2635868.2635877https://dblp.org/rec/conf/sigsoft/YingR14URL#3939640Tianyi Zhang 0001Myoungkyu SongMiryung KimCritics: an interactive code review tool for searching and inspecting systematic changes.SIGSOFT FSE755-7582014Conference and Workshop Papersclosedconf/sigsoft/ZhangSK1410.1145/2635868.2661675https://doi.org/10.1145/2635868.2661675https://dblp.org/rec/conf/sigsoft/ZhangSK14URL#3939642Mingxing ZhangYongwei WuShan Lu 0001Shanxiang QiJinglei RenWeimin ZhengAI: a lightweight system for tolerating concurrency bugs.SIGSOFT FSE330-3402014Conference and Workshop Papersclosedconf/sigsoft/ZhangWLQRZ1410.1145/2635868.2635885https://doi.org/10.1145/2635868.2635885https://dblp.org/rec/conf/sigsoft/ZhangWLQRZ14URL#3939643Minghui Zhou 0001Audris MockusMining micro-practices from operational data.SIGSOFT FSE845-8482014Conference and Workshop Papersclosedconf/sigsoft/ZhouM1410.1145/2635868.2666611https://doi.org/10.1145/2635868.2666611https://dblp.org/rec/conf/sigsoft/ZhouM14URL#3939646Thomas Zimmermann 0001Data hard with a vengeance (invited talk).SIGSOFT FSE62014Conference and Workshop Papersclosedconf/sigsoft/Zimmermann1410.1145/2635868.2684431https://doi.org/10.1145/2635868.2684431https://dblp.org/rec/conf/sigsoft/Zimmermann14URL#3939647Shing-Chi CheungAlessandro OrsoMargaret-Anne D. StoreyProceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014SIGSOFT FSEACM2014Editorshipconf/sigsoft/201410.1145/2635868https://doi.org/10.1145/2635868https://dblp.org/rec/conf/sigsoft/2014URL#3963424