Abstract is missing.
- PRADA: prioritizing android devices for apps by mining large-scale usage dataXuan Lu, Xuanzhe Liu, Huoran Li, Tao Xie, Qiaozhu Mei, Dan Hao, Gang Huang 0001, Feng Feng. 3-13 [doi]
- Release planning of mobile apps based on user reviewsLorenzo Villarroel, Gabriele Bavota, Barbara Russo, Rocco Oliveto, Massimiliano Di Penta. 14-24 [doi]
- Toward a framework for detecting privacy policy violations in android application codeRocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu. 25-36 [doi]
- Mining sandboxesKonrad Jamrozik, Philipp von Styp-Rekowsky, Andreas Zeller. 37-48 [doi]
- Generating performance distributions via probabilistic symbolic executionBihuan Chen, Yang Liu, Wei Le. 49-60 [doi]
- Performance issues and optimizations in JavaScript: an empirical studyMarija Selakovic, Michael Pradel. 61-72 [doi]
- Reliability of Run-Time Quality-of-Service evaluation using parametric model checkingGuoxin Su, David S. Rosenblum, Giordano Tamburrelli. 73-84 [doi]
- Optimizing selection of competing services with probabilistic hierarchical refinementTian Huat Tan, Manman Chen, Jun Sun 0001, Yang Liu, Étienne André, Yinxing Xue, Jin Song Dong. 85-95 [doi]
- The emerging role of data scientists on software development teamsMiryung Kim, Thomas Zimmermann 0001, Robert DeLine, Andrew Begel. 96-107 [doi]
- Belief & evidence in empirical software engineeringPremkumar T. Devanbu, Thomas Zimmermann 0001, Christian Bird. 108-119 [doi]
- Grounded theory in software engineering research: a critical review and guidelinesKlaas-Jan Stol, Paul Ralph, Brian Fitzgerald. 120-131 [doi]
- On the techniques we create, the tools we build, and their misalignments: a study of KLEEEric F. Rizzi, Sebastian G. Elbaum, Matthew B. Dwyer. 132-143 [doi]
- Guiding dynamic symbolic execution toward unverified program executionsMaria Christakis, Peter Müller 0001, Valentin Wüstholz. 144-155 [doi]
- Synthesizing framework models for symbolic executionJinseong Jeon, Xiaokang Qiu, Jonathan Fetter-Degges, Jeffrey S. Foster, Armando Solar-Lezama. 156-167 [doi]
- Type-aware concolic testing of JavaScript programsMonika Dhok, Murali Krishna Ramanathan, Nishant Sinha. 168-179 [doi]
- An empirical comparison of compiler testing techniquesJunjie Chen, Wenxiang Hu, Dan Hao, Yingfei Xiong, Hongyu Zhang, Lu Zhang 0023, Bing Xie. 180-190 [doi]
- Termination-checking for LLVM peephole optimizationsDavid Menendez, Santosh Nagarakatte. 191-202 [doi]
- Finding and analyzing compiler warning defectsChengnian Sun, Vu Le, Zhendong Su. 203-213 [doi]
- iDice: problem identification for emerging issuesQingwei Lin, Jian-Guang Lou, Hongyu Zhang, Dongmei Zhang. 214-224 [doi]
- Energy profiles of Java collections classesSamir Hasan, Zachary King, Munawar Hafiz, Mohammed Sayagh, Bram Adams, Abram Hindle. 225-236 [doi]
- An empirical study of practitioners' perspectives on green software engineeringIrene Manotas, Christian Bird, Rui Zhang, David C. Shepherd, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause. 237-248 [doi]
- Automated energy optimization of HTTP requests for mobile applicationsDing Li, Yingjun Lyu, Jiaping Gui, William G. J. Halfond. 249-260 [doi]
- Too long; didn't watch!: extracting relevant fragments from software development video tutorialsLuca Ponzanelli, Gabriele Bavota, Andrea Mocci, Massimiliano Di Penta, Rocco Oliveto, Mir Anamul Hasan, Barbara Russo, Sonia Haiduc, Michele Lanza. 261-272 [doi]
- Overcoming open source project entry barriers with a portal for newcomersIgor Steinmacher, Tayana Uchôa Conte, Christoph Treude, Marco Aurélio Gerosa. 273-284 [doi]
- Work practices and challenges in pull-based development: the contributor's perspectiveGeorgios Gousios, Margaret-Anne D. Storey, Alberto Bacchelli. 285-296 [doi]
- Automatically learning semantic features for defect predictionSong Wang, Taiyue Liu, Lin Tan. 297-308 [doi]
- Cross-project defect prediction using a connectivity-based unsupervised classifierFeng Zhang 0001, Quan Zheng, Ying Zou, Ahmed E. Hassan. 309-320 [doi]
- Automated parameter optimization of classification techniques for defect prediction modelsChakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto. 321-332 [doi]
- AntMiner: mining more bugs by reducing noise interferenceBin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai. 333-344 [doi]
- Program synthesis using natural languageAditya Desai, Sumit Gulwani, Vineet Hingorani, Nidhi Jain, Amey Karkare, Mark Marron, Sailesh R, Subhajit Roy. 345-356 [doi]
- SWIM: synthesizing what i mean: code search and idiomatic snippet synthesisMukund Raghothaman, Yi Wei, Youssef Hamadi. 357-367 [doi]
- Cross-supervised synthesis of web-crawlersAdi Omari, Sharon Shoham, Eran Yahav. 368-379 [doi]
- Automatic model generation from documentation for Java API functionsJuan Zhai, JianJun Huang, ShiQing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin. 380-391 [doi]
- Augmenting API documentation with insights from stack overflowChristoph Treude, Martin P. Robillard. 392-403 [doi]
- From word embeddings to document similarities for improved information retrieval in software engineeringXin Ye, Hui Shen, Xiao Ma, Razvan C. Bunescu, Chang Liu. 404-415 [doi]
- Learning API usages from bytecode: a statistical approachTam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen. 416-427 [doi]
- On the "naturalness" of buggy codeBaishakhi Ray, Vincent Hellendoorn, Saheel Godhane, Zhaopeng Tu, Alberto Bacchelli, Premkumar T. Devanbu. 428-439 [doi]
- Code anomalies flock together: exploring code anomaly agglomerations for locating design problemsWillian Nalepa Oizumi, Alessandro F. Garcia, Leonardo da Silva Sousa, Bruno Barbieri Pontes Cafeo, Yixue Zhao. 440-451 [doi]
- Using (bio)metrics to predict code quality onlineSebastian C. Müller, Thomas Fritz. 452-463 [doi]
- CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak featuresShing-Chi Cheung, Wanjun Chen, Yepang Liu, Chang Xu. 464-475 [doi]
- Disseminating architectural knowledge on open-source projects: a case study of the book "architecture of open-source applications"Martin P. Robillard, Nenad Medvidovic. 476-487 [doi]
- Identifying and quantifying architectural debtLu Xiao, Yuanfang Cai, Rick Kazman, Ran Mo, Qiong Feng. 488-498 [doi]
- Decoupling level: a new metric for architectural maintenance complexityRan Mo, Yuanfang Cai, Rick Kazman, Lu Xiao, Qiong Feng. 499-510 [doi]
- On the limits of mutation reduction strategiesRahul Gopinath, Mohammad Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce. 511-522 [doi]
- Comparing white-box and black-box test prioritizationChristopher Henard, Mike Papadakis, Mark Harman, Yue Jia, Yves Le Traon. 523-534 [doi]
- How does regression test prioritization perform in real-world software evolution?Yafeng Lu, Yiling Lou, Shiyang Cheng, Lingming Zhang, Dan Hao, Yangfan Zhou, Lu Zhang 0023. 535-546 [doi]
- The impact of test case summaries on bug fixing performance: an empirical investigationSebastiano Panichella, Annibale Panichella, Moritz Beller, Andy Zaidman, Harald C. Gall. 547-558 [doi]
- Reducing combinatorics in GUI testing of android applicationsNariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek. 559-570 [doi]
- MobiPlay: a remote execution based record-and-replay tool for mobile applicationsZhengrui Qin, Yutao Tang, Edmund Novak, Qun Li. 571-582 [doi]
- VDTest: an automated framework to support testing for virtual devicesTingting Yu, Xiao Qu, Myra B. Cohen. 583-594 [doi]
- Automated test suite generation for time-continuous simulink modelsReza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann. 595-606 [doi]
- Missing data imputation based on low-rank recovery and semi-supervised regression for software effort estimationXiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu. 607-618 [doi]
- Multi-objective software effort estimationFederica Sarro, Alessio Petrozziello, Mark Harman. 619-630 [doi]
- A practical guide to select quality indicators for assessing pareto-based search algorithms in search-based software engineeringShuai Wang, Shaukat Ali, Tao Yue, Yan Li, Marius Liaaen. 631-642 [doi]
- A comparison of 10 sampling algorithms for configurable systemsFlávio Medeiros, Christian Kästner, Márcio Ribeiro, Rohit Gheyi, Sven Apel. 643-654 [doi]
- Featured model-based mutation analysisXavier Devroey, Gilles Perrouin, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens, Patrick Heymans. 655-666 [doi]
- Feature-model interfaces: the highway to compositional analyses of highly-configurable systemsReimar Schröter, Sebastian Krieter, Thomas Thüm, Fabian Benduhn, Gunter Saake. 667-678 [doi]
- How does the degree of variability affect bug finding?Jean Melo, Claus Brabrand, Andrzej Wasowski. 679-690 [doi]
- Angelix: scalable multiline program patch synthesis via symbolic analysisSergey Mechtaev, Jooyong Yi, Abhik Roychoudhury. 691-701 [doi]
- An analysis of the search spaces for generate and validate patch generation systemsFan Long, Martin C. Rinard. 702-713 [doi]
- PAC learning-based verification and model synthesisYu-Fang Chen, Chiao Hsieh, Ondrej Lengál, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang. 714-724 [doi]
- StubDroid: automatic inference of precise data-flow summaries for the android framework Steven Arzt, Eric Bodden. 725-735 [doi]
- Exploring language support for immutabilityMichael J. Coblenz, Joshua Sunshine, Jonathan Aldrich, Brad A. Myers, Sam Weber, Forrest Shull. 736-747 [doi]
- The evolution of C programming practices: a study of the Unix operating system 1973-2015Diomidis Spinellis, Panos Louridas, Maria Kechagia. 748-759 [doi]
- An empirical study on the impact of C++ lambdas and programmer experiencePhillip Merlin Uesbeck, Andreas Stefik, Stefan Hanenberg, Jan Pedersen, Patrick Daleiden. 760-771 [doi]
- Understanding and fixing multiple language interoperability issues: the C/Fortran caseNawrin Sultana, Justin Middleton, Jeffrey Overbey, Munawar Hafiz. 772-783 [doi]
- BigDebug: debugging primitives for interactive big data processing in sparkMuhammad Ali Gulzar, Matteo Interlandi, Seunghyun Yoo, Sai Deep Tetali, Tyson Condie, Todd D. Millstein, Miryung Kim. 784-795 [doi]
- Debugging for reactive programmingGuido Salvaneschi, Mira Mezini. 796-807 [doi]
- Revisit of automatic debugging via human focus-tracking analysisXiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan, Baowen Xu. 808-819 [doi]
- RETracer: triaging crashes by reverse execution from partial memory dumpsWeidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis. 820-831 [doi]
- Are "non-functional" requirements really non-functional?: an investigation of non-functional requirements in practiceJonas Eckhardt, Andreas Vogelsang, Daniel Méndez Fernández. 832-842 [doi]
- Probing for requirements knowledge to stimulate architectural thinkingPreethu Rose Anish, Balaji Balasubramaniam, Abhishek Sainani, Jane Cleland-Huang, Maya Daneva, Roel J. Wieringa, Smita Ghaisas. 843-854 [doi]
- Risk-driven revision of requirements modelsDalal Alrajeh, Axel van Lamsweerde, Jeff Kramer, Alessandra Russo, Sebastián Uchitel. 855-865 [doi]
- Discovering "unknown known" security requirementsAwais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew John Edwards, Ruzanna Chitchyan, M. Ali Babar. 866-876 [doi]
- Behavioral log analysis with statistical guaranteesNimrod Busany, Shahar Maoz. 877-887 [doi]
- Efficient large-scale trace checking using mapreduceMarcello M. Bersani, Domenico Bianculli, Carlo Ghezzi, Srdan Krstic, Pierluigi San Pietro. 888-898 [doi]
- Feedback-directed instrumentation for deployed JavaScript applicationsMagnus Madsen, Frank Tip, Esben Andreasen, Koushik Sen, Anders Møller. 899-910 [doi]
- DoubleTake: fast and precise error detection via evidence-based dynamic analysisTongping Liu, Charlie Curtsinger, Emery D. Berger. 911-922 [doi]
- Automated partitioning of android applications for trusted execution environmentsKonstantin Rubinov, Lucia Rosculete, Tulika Mitra, Abhik Roychoudhury. 923-934 [doi]
- Jumping through hoops: why do Java developers struggle with cryptography APIs?Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden. 935-946 [doi]
- Finding security bugs in web applications using a catalog of access control patternsJoseph P. Near, Daniel Jackson. 947-958 [doi]
- Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devicesWei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang. 959-970 [doi]
- Building a theory of job rotation in software engineering from an instrumental case studyRonnie E. S. Santos, Fabio Q. B. da Silva, Cleyton V. C. de Magalhães, Cleviton V. F. Monteiro. 971-981 [doi]
- The challenges of staying together while moving fast: an exploratory studyJulia Rubin, Martin Rinard. 982-993 [doi]
- The sky is not the limit: multitasking across GitHub projectsBogdan Vasilescu, Kelly Blincoe, Qi Xuan, Casey Casalnuovo, Daniela E. Damian, Premkumar T. Devanbu, Vladimir Filkov. 994-1005 [doi]
- Quantifying and mitigating turnover-induced knowledge loss: case studies of chrome and a project at avayaPeter C. Rigby, Yue Cai Zhu, Samuel M. Donadelli, Audris Mockus. 1006-1016 [doi]
- Quality experience: a grounded theory of successful agile projects without dedicated testersLutz Prechelt, Holger Schmeisky, Franz Zieris. 1017-1027 [doi]
- Code review quality: how developers see itOleksii Kononenko, Olga Baysal, Michael W. Godfrey. 1028-1038 [doi]
- Revisiting code ownership and its relationship with software quality in the scope of modern code reviewPatanamon Thongtanunam, Shane McIntosh, Ahmed E. Hassan, Hajimu Iida. 1039-1050 [doi]
- IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisionsHao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng. 1051-1062 [doi]
- Nomen est omen: exploring and exploiting similarities between argument and parameter namesHui Liu, Qiurong Liu, Cristian-Alexandru Staicu, Michael Pradel, Yue Luo. 1063-1073 [doi]
- Floating-point precision tuning using blame analysisCindy Rubio-González, Cuong Nguyen 0001, Benjamin Mehne, Koushik Sen, James Demmel, William Kahan, Costin Iancu, Wim Lavrijsen, David H. Bailey, David Hough. 1074-1085 [doi]
- Crowdsourcing program preconditions via a classification gameDaniel Fava, Dan Shapiro, Joseph Osborn, Martin Schäf, E. James Whitehead Jr.. 1086-1096 [doi]
- Scalable thread sharing analysisJeff Huang 0001. 1097-1108 [doi]
- Fixing deadlocks via lock pre-acquisitionsYan Cai, Lingwei Cao. 1109-1120 [doi]
- Coverage-driven test code generation for concurrent classesValerio Terragni, Shing-Chi Cheung. 1121-1132 [doi]
- Locking discipline inference and checkingMichael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto, Javier Thaine. 1133-1144 [doi]
- Improving refactoring speed by 10XJongwook Kim, Don S. Batory, Danny Dig, Maider Azanza. 1145-1156 [doi]
- SourcererCC: scaling code clone detection to big-codeHitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes. 1157-1168 [doi]
- Understanding asynchronous interactions in full-stack JavaScriptSaba Alimadadi, Ali Mesbah 0001, Karthik Pattabiraman. 1169-1180 [doi]
- Shadow of a doubt: testing for divergences between software versionsHristina Palikareva, Tomasz Kuchta, Cristian Cadar. 1181-1192 [doi]