Abstract is missing.
- Semantically enhanced software traceability using deep learning techniquesJin Guo 0004, Jinghui Cheng, Jane Cleland-Huang. 3-14 [doi]
- Can latent topics in source code predict missing architectural tactics?Raghuram Gopalakrishnan, Palak Sharma, Mehdi Mirakhorli, Matthias Galster. 15-26 [doi]
- Analyzing APIs documentation and code to detect directive defectsYu Zhou, Ruihang Gu, Taolue Chen, Zhiqiu Huang, Sebastiano Panichella, Harald C. Gall. 27-37 [doi]
- An unsupervised approach for discovering relevant tutorial fragments for APIsHe Jiang, Jingxuan Zhang, Zhilei Ren, Tao Zhang. 38-48 [doi]
- Detecting user story information in developer-client conversations to generate extractive summariesPaige Rodeghero, Siyuan Jiang, Ameer Armaly, Collin McMillan. 49-59 [doi]
- Clone refactoring with lambda expressionsNikolaos Tsantalis, Davood Mazinanian, Shahriar Rostami. 60-70 [doi]
- Characterizing and detecting anti-patterns in the logging codeBoyuan Chen, Zhen Ming (Jack) Jiang. 71-81 [doi]
- Automated refactoring of legacy Java software to default methodsRaffi Khatchadourian, Hidehiko Masuhara. 82-93 [doi]
- Supporting software developers with a holistic recommender systemLuca Ponzanelli, Simone Scalabrino, Gabriele Bavota, Andrea Mocci, Rocco Oliveto, Massimiliano Di Penta, Michele Lanza. 94-105 [doi]
- Recommending and localizing change requests for mobile apps based on user reviewsFabio Palomba, Pasquale Salza, Adelina Ciurumelea, Sebastiano Panichella, Harald C. Gall, Filomena Ferrucci, Andrea De Lucia. 106-117 [doi]
- Machine learning-based detection of open source license exceptionsChristopher Vendome, Mario Linares Vásquez, Gabriele Bavota, Massimiliano Di Penta, Daniel M. Germán, Denys Poshyvanyk. 118-129 [doi]
- Software development wasteTodd Sedano, Paul Ralph, Cécile Péraire. 130-140 [doi]
- Becoming agile: a grounded theory of agile transitions in practiceRashina Hoda, James Noble. 141-151 [doi]
- From diversity by numbers to diversity as process: supporting inclusiveness in software development teams with brainstormingAnna Filippova, Erik H. Trainer, James D. Herbsleb. 152-163 [doi]
- Classifying developers into core and peripheral: an empirical study on count and network metricsMitchell Joblin, Sven Apel, Claus Hunsen, Wolfgang Mauerer. 164-174 [doi]
- Decoding the representation of code in the brain: an fMRI study of code review and expertiseBenjamin Floyd, Tyler Santander, Westley Weimer. 175-186 [doi]
- Understanding the impressions, motivations, and barriers of one time code contributors to FLOSS projects: a surveyAmanda Lee, Jeffrey C. Carver, Amiangshu Bosu. 187-197 [doi]
- Search-driven string constraint solving for vulnerability detectionJulian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand. 198-208 [doi]
- A guided genetic algorithm for automated crash reproductionMozhan Soltani, Annibale Panichella, Arie van Deursen. 209-220 [doi]
- Stochastic optimization of program obfuscationHan Liu, Chengnian Sun, Zhendong Su, Yu Jiang, Ming Gu, Jiaguang Sun. 221-231 [doi]
- ZenIDS: introspective intrusion detection for PHP applicationsByron Hawkins, Brian Demsky. 232-243 [doi]
- Statically checking web API requests in JavaScriptErik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo. 244-254 [doi]
- On cross-stack configuration errorsMohammed Sayagh, Noureddine Kerzazi, Bram Adams. 255-265 [doi]
- Efficient detection of thread safety violations via coverage-guided generation of concurrent testsAnkit Choudhary, Shan Lu, Michael Pradel. 266-277 [doi]
- RClassify: classifying race conditions in web applications via deterministic replayLu Zhang, Chao Wang. 278-288 [doi]
- Repairing event race errors by controlling nondeterminismChristoffer Quist Adamsen, Anders Møller, Rezwana Karim, Manu Sridharan, Frank Tip, Koushik Sen. 289-299 [doi]
- Making malory behave maliciously: targeted fuzzing of android execution environmentsSiegfried Rasthofer, Steven Arzt, Stefan Triller, Michael Pradel. 300-311 [doi]
- SEALANT for inter-app security holes in androidYoun Kyu Lee, Jae young Bang, Gholamreza Safi, Arman Shahbazian, Yixue Zhao, Nenad Medvidovic. 312-323 [doi]
- An efficient, robust, and scalable approach for analyzing interacting android appsYutaka Tsutano, Shakthi Bachala, Witawas Srisa-an, Gregg Rothermel, Jackson Dinh. 324-334 [doi]
- LibD: scalable and precise third-party library detection in android marketsMenghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo. 335-346 [doi]
- Analysis and testing of notifications in Android wear applicationsHailong Zhang 0006, Atanas Rountev. 347-357 [doi]
- Adaptive unpacking of Android appsLei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu. 358-369 [doi]
- Performance diagnosis for inefficient loopsLinhai Song, Shan Lu. 370-380 [doi]
- How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystemWanwangying Ma, Lin Chen, Xiangyu Zhang, Yuming Zhou, Baowen Xu. 381-392 [doi]
- Feedback-based debuggingYun Lin, Jun Sun, Yinxing Xue, Yang Liu, Jin Song Dong. 393-403 [doi]
- Learning syntactic program transformations from examplesReudismam Rolim, Gustavo Soares, Loris D'Antoni, Oleksandr Polozov, Sumit Gulwani, Rohit Gheyi, Ryo Suzuki, Björn Hartmann. 404-415 [doi]
- Precise condition synthesis for program repairYingfei Xiong, Jie Wang, Runfa Yan, Jiachen Zhang, Shi Han, Gang Huang 0001, Lu Zhang 0023. 416-426 [doi]
- Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutionsAndrea Aquino, Giovanni Denaro, Mauro Pezzè. 427-437 [doi]
- Exploring API embedding for API usages and applicationsTrong Duc Nguyen, Anh Tuan Nguyen, Hung Dang Phan, Tien N. Nguyen. 438-449 [doi]
- Unsupervised software-specific morphological forms inference from informal discussionsChunyang Chen, Zhenchang Xing, Ximing Wang. 450-461 [doi]
- SPAIN: security patch analysis for binaries towards understanding the pain and pillsZhengzi Xu, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Fu Song. 462-472 [doi]
- Travioli: a dynamic analysis for detecting data-structure traversalsRohan Padhye, Koushik Sen. 473-483 [doi]
- ProEva: runtime proactive performance evaluation based on continuous-time markov chainsGuoxin Su, Taolue Chen, Yuan Feng, David S. Rosenblum. 484-495 [doi]
- Glacier: transitive class immutability for JavaMichael J. Coblenz, Whitney Nelson, Jonathan Aldrich, Brad A. Myers, Joshua Sunshine. 496-506 [doi]
- Challenges for static analysis of Java reflection: literature review and empirical studyDavy Landman, Alexander Serebrenik, Jurgen J. Vinju. 507-518 [doi]
- Machine-learning-guided selectively unsound static analysisKihong Heo, Hakjoo Oh, Kwangkeun Yi. 519-529 [doi]
- How good is a security policy against real breaches?: a HIPAA case studyÖzgür Kafali, Jasmine Jones, Megan Petruso, Laurie Williams, Munindar P. Singh. 530-540 [doi]
- Adaptive coverage and operational profile-based testing for reliability improvementAntonia Bertolino, Breno Miranda, Roberto Pietrantuono, Stefano Russo. 541-551 [doi]
- RADAR: a lightweight tool for requirements and architecture decision analysisSaheed A. Busari, Emmanuel Letier. 552-562 [doi]
- PEoPL: projectional editing of product linesBenjamin Behringer, Jochen Palz, Thorsten Berger. 563-574 [doi]
- Do developers read compiler error messages?Titus Barik, Justin Smith, Kevin Lubick, Elisabeth Holmes, Jing Feng, Emerson R. Murphy-Hill, Chris Parnin. 575-585 [doi]
- A general framework for dynamic stub injectionMaria Christakis, Patrick Emmisberger, Patrice Godefroid, Peter Müller 0001. 586-596 [doi]
- An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumptionThierry Titcheu Chekam, Mike Papadakis, Yves Le Traon, Mark Harman. 597-608 [doi]
- Evaluating and improving fault localizationSpencer Pearson, José Campos, René Just, Gordon Fraser, Rui Abreu, Michael D. Ernst, Deric Pang, Benjamin Keller. 609-620 [doi]
- Syntactic and semantic differencing for combinatorial models of test designsRachel Tzoref-Brill, Shahar Maoz. 621-631 [doi]
- Balancing soundness and efficiency for practical testing of configurable systemsSabrina Souto, Marcelo d'Amorim, Rohit Gheyi. 632-642 [doi]
- Automatic text input generation for mobile testingPeng Liu 0010, Xiangyu Zhang, Marco Pistoia, Yunhui Zheng, Manoel Marques, Lingfei Zeng. 643-653 [doi]
- A test-suite diagnosability metric for spectrum-based fault localization approachesAlexandre Perez, Rui Abreu, Arie van Deursen. 654-664 [doi]
- Automated transplantation and differential testing for clonesTianyi Zhang, Miryung Kim. 665-676 [doi]
- Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing gameJosé Miguel Rojas, Thomas D. White, Benjamin S. Clegg, Gordon Fraser. 677-688 [doi]
- Optimizing test placement for module-level regression testingAugust Shi, Suresh Thummalapenta, Shuvendu K. Lahiri, Nikolaj Bjorner, Jacek Czerwonka. 689-699 [doi]
- Learning to prioritize test programs for compiler testingJunjie Chen, Yanwei Bai, Dan Hao, Yingfei Xiong, Hongyu Zhang, Bing Xie. 700-711 [doi]
- What causes my test alarm?: automatic cause analysis for test alarms in system and integration testingHe Jiang, Xiaochen Li, Zijiang Yang, Jifeng Xuan. 712-723 [doi]
- Symbolic model extraction for web application verificationIvan Bocic, Tevfik Bultan. 724-734 [doi]
- UML diagram refinement (focusing on class- and use case diagrams)David Faitelson, Shmuel S. Tyszberowicz. 735-745 [doi]
- Fuzzy fine-grained code-history analysisFrancisco Servant, James A. Jones. 746-757 [doi]
- To type or not to type: quantifying detectable bugs in JavaScriptZheng Gao, Christian Bird, Earl T. Barr. 758-769 [doi]
- The evolution of continuous experimentation in software product development: from data to a data-driven organization at scaleAleksander Fabijan, Pavel Dmitriev, Helena Holmström Olsson, Jan Bosch. 770-780 [doi]