Abstract is missing.
- Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development?Emerson R. Murphy-Hill, Thomas Zimmermann, Nachiappan Nagappan. 1-11 [doi]
- Analyze this! 145 questions for data scientists in software engineeringAndrew Begel, Thomas Zimmermann. 12-13 [doi]
- The dimensions of software engineering successPaul Ralph, Paul Kelly. 24-35 [doi]
- How do professionals perceive legacy systems and software modernization?Ravi Khadka, Belfrit V. Batlajery, Amir Saeidi, Slinger Jansen, Jurriaan Hage. 36-47 [doi]
- SimRT: an automated framework to support regression testing for data racesTingting Yu, Witawas Srisa-an, Gregg Rothermel. 48-59 [doi]
- Performance regression testing target prioritization via performance risk analysisPeng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou. 60-71 [doi]
- Code coverage for suite evaluation by developersRahul Gopinath, Carlos Jensen, Alex Groce. 72-82 [doi]
- Time pressure: a controlled experiment of test case development and requirements reviewMika Mäntylä, Kai Petersen, Timo O. A. Lehtinen, Casper Lassenius. 83-94 [doi]
- Verifying component and connector models against crosscutting structural viewsShahar Maoz, Jan Oliver Ringert, Bernhard Rumpe. 95-105 [doi]
- TradeMaker: automated dynamic analysis of synthesized tradespacesHamid Bagheri, Chong Tang, Kevin J. Sullivan. 106-116 [doi]
- Lifting model transformations to product linesRick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro, Marsha Chechik. 117-128 [doi]
- Automated goal operationalisation based on interpolation and SAT solvingRenzo Degiovanni, Dalal Alrajeh, Nazareno Aguirre, Sebastián Uchitel. 129-139 [doi]
- Mining configuration constraints: static analyses and empirical resultsSarah Nadi, Thorsten Berger, Christian Kästner, Krzysztof Czarnecki. 140-151 [doi]
- Which configuration option should I change?Sai Zhang, Michael D. Ernst. 152-163 [doi]
- Detecting differences across multiple instances of code clonesYun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun 0001, Wenyun Zhao. 164-174 [doi]
- Achieving accuracy and scalability simultaneously in detecting application clones on Android marketsKai Chen, Peng Liu, Yingjun Zhang. 175-186 [doi]
- Two's company, three's a crowd: a case study of crowdsourcing software developmentKlaas-Jan Stol, Brian Fitzgerald. 187-198 [doi]
- Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development projectPatrick Wagstrom, Subhajit Datta. 199-210 [doi]
- Software engineering at the speed of light: how developers stay current using twitterLeif Singer, Fernando Marques Figueira Filho, Margaret-Anne D. Storey. 211-221 [doi]
- Building it together: synchronous development in OSSQi Xuan, Vladimir Filkov. 222-233 [doi]
- A critical review of "automatic patch generation learned from human-written patches": essay on the problem statement and the evaluation of automatic software repairMartin Monperrus. 234-242 [doi]
- Data-guided repair of selection statementsDivya Gopinath, Sarfraz Khurshid, Diptikalyan Saha, Satish Chandra. 243-253 [doi]
- The strength of random search on automated program repairYuhua Qi, Xiaoguang Mao, Yan Lei, Ziying Dai, Chengsong Wang. 254-265 [doi]
- MintHint: automated synthesis of repair hintsShalini Kaleeswaran, Varun Tulsian, Aditya Kanade, Alessandro Orso. 266-276 [doi]
- Mining behavior models from user-intensive web applicationsCarlo Ghezzi, Mauro Pezzè, Michele Sama, Giordano Tamburrelli. 277-287 [doi]
- Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes Steven Arzt, Eric Bodden. 288-298 [doi]
- Automated design of self-adaptive software with control-theoretical formal guaranteesAntonio Filieri, Henry Hoffmann, Martina Maggio. 299-310 [doi]
- Perturbation analysis of stochastic systems with empirical distribution parametersGuoxin Su, David S. Rosenblum. 311-321 [doi]
- How do centralized and distributed version control systems impact software changes?Caius Brindescu, Mihai Codoban, Sergii Shmarkatiuk, Danny Dig. 322-333 [doi]
- Transition from centralized to decentralized version control systems: a case study on reasons, barriers, and outcomesKivanç Muslu, Christian Bird, Nachiappan Nagappan, Jacek Czerwonka. 334-344 [doi]
- An exploratory study of the pull-based software development modelGeorgios Gousios, Martin Pinzger, Arie van Deursen. 345-355 [doi]
- Influence of social and technical factors for evaluating contribution in GitHubJason Tsay, Laura Dabbish, James D. Herbsleb. 356-366 [doi]
- Understanding JavaScript event-based interactionsSaba Alimadadi, Sheldon Sequeira, Ali Mesbah, Karthik Pattabiraman. 367-377 [doi]
- Understanding understanding source code with functional magnetic resonance imagingJanet Siegmund, Christian Kästner, Sven Apel, Chris Parnin, Anja Bethmann, Thomas Leich, Gunter Saake, André Brechmann. 378-389 [doi]
- Improving automated source code summarization via an eye-tracking study of programmersPaige Rodeghero, Collin McMillan, Paul W. McBurney, Nigel Bosch, Sidney K. D'Mello. 390-401 [doi]
- Using psycho-physiological measures to assess task difficulty in software developmentThomas Fritz, Andrew Begel, Sebastian C. Müller, Serap Yigit-Elliott, Manuela Züger. 402-413 [doi]
- Dictionary learning based software defect predictionXiao-Yuan Jing, Shi Ying, Zhi-Wu Zhang, Shan-Shan Wu, Jin Liu. 414-423 [doi]
- Comparing static bug finders and statistical predictionFoyzur Rahman, Sameer Khatri, Earl T. Barr, Premkumar T. Devanbu. 424-434 [doi]
- Coverage is not strongly correlated with test suite effectivenessLaura Inozemtseva, Reid Holmes. 435-445 [doi]
- How to make best use of cross-company data in software effort estimation?Leandro L. Minku, Xin Yao. 446-456 [doi]
- CARE: cache guided deterministic replay for concurrent Java programsYanyan Jiang, Tianxiao Gu, Chang Xu, Xiaoxing Ma, Jian Lu. 457-467 [doi]
- Inferring models of concurrent systems from logs of their behavior with CSightIvan Beschastnikh, Yuriy Brun, Michael D. Ernst, Arvind Krishnamurthy. 468-479 [doi]
- Unleashing concurrency for irregular data structuresPeng Liu 0010, Charles Zhang. 480-490 [doi]
- ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programsYan Cai, Shangru Wu, W. K. Chan. 491-502 [doi]
- SEEDS: a software engineer's energy-optimization decision support frameworkIrene Lizeth Manotas Gutiérrez, Lori L. Pollock, James Clause. 503-514 [doi]
- APE: an annotation language and middleware for energy-efficient mobile application developmentNima Nikzad, Octav Chipara, William G. Griswold. 515-526 [doi]
- Making web applications more energy efficient for OLED smartphonesDing Li, Angelica Huyen Tran, William G. J. Halfond. 527-538 [doi]
- Micro executionPatrice Godefroid. 539-549 [doi]
- Unit test virtualization with VMVMJonathan Bell, Gail E. Kaiser. 550-561 [doi]
- Interpolated n-grams for model based testingPaolo Tonella, Roberto Tiella, Duy Cu Nguyen. 562-572 [doi]
- An analysis of the relationship between conditional entropy and failed error propagation in software testingKelly Androutsopoulos, David Clark, Haitao Dan, Robert M. Hierons, Mark Harman. 573-583 [doi]
- Trading robustness for maintainability: an empirical study of evolving c# programsNélio Cacho, Thiago César, Thomas Filipe, Eliezio Soares, Arthur Cassio, Rafael Souza, Israel García, Eiji Adachi Barbosa, Alessandro Garcia. 584-595 [doi]
- Case studies and tools for contract specificationsTodd W. Schiller, Kellen Donohue, Forrest Coward, Michael D. Ernst. 596-607 [doi]
- Using dynamic analysis to generate disjunctive invariantsThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest. 608-619 [doi]
- Inductive verification of data model invariants for web applicationsIvan Bocic, Tevfik Bultan. 620-631 [doi]
- How do API documentation and static typing affect API usability?Stefan Endrikat, Stefan Hanenberg, Romain Robbes, Andreas Stefik. 632-642 [doi]
- Live API documentationSiddharth Subramanian, Laura Inozemtseva, Reid Holmes. 643-652 [doi]
- CodeHint: dynamic and interactive synthesis of code snippetsJoel Galenson, Philip Reames, Rastislav Bodík, Björn Hartmann, Koushik Sen. 653-663 [doi]
- Spotting working code examplesIman Keivanloo, Juergen Rilling, Ying Zou. 664-675 [doi]
- Self-adaptation through incremental generative model transformations at runtimeBihuan Chen, Xin Peng, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao. 676-687 [doi]
- Hope for the best, prepare for the worst: multi-tier control for adaptive systemsNicolás D'Ippolito, Víctor A. Braberman, Jeff Kramer, Jeff Magee, Daniel Sykes, Sebastián Uchitel. 688-699 [doi]
- Brownout: building more robust cloud applicationsCristian Klein, Martina Maggio, Karl-Erik Årzén, Francisco Hernández-Rodriguez. 700-711 [doi]
- Integrating adaptive user interface capabilities in enterprise applicationsPierre A. Akiki, Arosha K. Bandara, Yijun Yu. 712-723 [doi]
- Programmers' build errors: a case study (at google)Hyunmin Seo, Caitlin Sadowski, Sebastian G. Elbaum, Edward Aftandilian, Robert W. Bowdidge. 724-734 [doi]
- Understanding and improving software build teamsShaun Phillips, Thomas Zimmermann, Christian Bird. 735-744 [doi]
- Towards efficient optimization in package management systemsAlexey Ignatiev, Mikolás Janota, Joao Marques-Silva. 745-755 [doi]
- Easing software component repository evolutionJérôme Vouillon, Mehdi Dogguy, Roberto Di Cosmo. 756-766 [doi]
- AR-miner: mining informative reviews for developers from mobile app marketplaceNing Chen, Jialiu Lin, Steven C. H. Hoi, Xiaokui Xiao, Boshen Zhang. 767-778 [doi]
- Mining billions of AST nodes to study actual and potential usage of Java language featuresRobert Dyer 0001, Hridesh Rajan, Hoan Anh Nguyen, Tien N. Nguyen. 779-790 [doi]
- Mining interprocedural, data-oriented usage patterns in JavaScript web applicationsHung Viet Nguyen, Hoan Anh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen. 791-802 [doi]
- Mining fine-grained code changes to detect unknown change patternsStas Negara, Mihai Codoban, Danny Dig, Ralph E. Johnson. 803-813 [doi]
- Detecting memory leaks through introspective dynamic behavior modelling using machine learningSangho Lee, Changhee Jung, Santosh Pande. 814-824 [doi]
- Automated memory leak detection for production useChanghee Jung, Sangho Lee, Easwaran Raman, Santosh Pande. 825-836 [doi]
- Vejovis: suggesting fixes for JavaScript faultsFrolin S. Ocariza Jr., Karthik Pattabiraman, Ali Mesbah. 837-847 [doi]
- Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computationWenshen Dou, Shing-Chi Cheung, Jun Wei. 848-858 [doi]
- Us and them: a study of privacy requirements across north america, asia, and europeSwapneel Sheth, Gail E. Kaiser, Walid Maalej. 859-870 [doi]
- Distilling privacy requirements for mobile applicationsKeerthi Thomas, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh. 871-882 [doi]
- Uncertainty, risk, and information value in software requirements and architectureEmmanuel Letier, David Stefan, Earl T. Barr. 883-894 [doi]
- Requirements fixationRahul Mohanani, Paul Ralph, Ben Shreeve. 895-906 [doi]
- Exploring variability-aware execution for testing plugin-based web applicationsHung Viet Nguyen, Christian Kästner, Tien N. Nguyen. 907-918 [doi]
- A study of equivalent and stubborn mutation operators using human analysis of equivalenceXiangjuan Yao, Mark Harman, Yue Jia. 919-930 [doi]
- Cross-checking oracles from intrinsic software redundancyAntonio Carzaniga, Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè. 931-942 [doi]
- Mind the gap: assessing the conformance of software traceability to relevant guidelinesPatrick Rempel, Patrick Mäder, Tobias Kuschke, Jane Cleland-Huang. 943-954 [doi]
- Effects of using examples on structural model comprehension: a controlled experimentDina Zayan, Michal Antkiewicz, Krzysztof Czarnecki. 955-966 [doi]
- Design rule spaces: a new form of architecture insightLu Xiao, Yuanfang Cai, Rick Kazman. 967-977 [doi]
- Controlled modeling environment using flexibly-formatted spreadsheetsHisashi Miyashita, Hideki Tai, Shunichi Amano. 978-988 [doi]
- Feature maintenance with emergent interfacesMárcio Ribeiro, Paulo Borba, Christian Kästner. 989-1000 [doi]
- Detecting performance anti-patterns for applications developed using object-relational mappingTse-Hsun Chen, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora. 1001-1012 [doi]
- Characterizing and detecting performance bugs for smartphone applicationsYepang Liu, Chang Xu, Shing-Chi Cheung. 1013-1024 [doi]
- Checking app behavior against app descriptionsAlessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller. 1025-1035 [doi]
- AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradictionJianJun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang. 1036-1046 [doi]
- Patch verification via multiversion interprocedural control flow graphsWei Le, Shannon D. Pattison. 1047-1058 [doi]
- Property differencing for incremental checkingGuowei Yang, Sarfraz Khurshid, Suzette Person, Neha Rungta. 1059-1070 [doi]
- Symbolic assume-guarantee reasoning through BDD learningFei He, Bow-Yaw Wang, Liangze Yin, Lei Zhu. 1071-1082 [doi]
- Enhancing symbolic execution with veritestingThanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley. 1083-1094 [doi]
- Manual refactoring changes with automated refactoring validationXi Ge, Emerson R. Murphy-Hill. 1095-1105 [doi]
- Alternate refactoring paths reveal usability problemsMohsen Vakilian, Ralph E. Johnson. 1106-1116 [doi]
- A study and toolkit for asynchronous programming in c#Semih Okur, David L. Hartveld, Danny Dig, Arie van Deursen. 1117-1127 [doi]
- Reuse-oriented reverse engineering of functional components from x86 binariesDohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal. 1128-1139 [doi]