Abstract is missing.
- Context-aware patch generation for better automated program repairMing Wen, Junjie Chen, Rongxin Wu, Dan Hao, Shing-Chi Cheung. 1-11 [doi]
- Towards practical program repair with on-demand candidate generationJinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid. 12-23 [doi]
- A correlation study between automated program repair and test-suite metricsJooyong Yi, Shin Hwei Tan, Sergey Mechtaev, Marcel Böhme, Abhik Roychoudhury. 24 [doi]
- Do automated program repair techniques repair hard and important bugs?Manish Motwani, Sandhya Sankaranarayanan, René Just, Yuriy Brun. 25 [doi]
- Software protection on the go: a large-scale empirical study on mobile app obfuscationPei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, Dinghao Wu. 26-36 [doi]
- GUILeak: tracing privacy policy claims on user input data for Android applicationsXiaoyin Wang, Xue-qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu 0001. 37-47 [doi]
- Online app review analysis for identifying emerging issuesCuiyun Gao, Jichuan Zeng, Michael R. Lyu, Irwin King. 48-58 [doi]
- EARMO: an energy-aware refactoring approach for mobile appsRodrigo Morales, Rubén Saborido, Foutse Khomh, Francisco Chicano, Giuliano Antoniol. 59 [doi]
- Neuro-symbolic program corrector for introductory programming assignmentsSahil Bhatia, Pushmeet Kohli, Rishabh Singh. 60-70 [doi]
- Automated localization for unreproducible buildsZhilei Ren, He Jiang, Jifeng Xuan, Zijiang Yang. 71-81 [doi]
- Enlightened debuggingXiangyu Li, Shaowei Zhu, Marcelo d'Amorim, Alessandro Orso. 82-92 [doi]
- Experiences and challenges in building a data intensive system for data migrationMarco Scavuzzo, Elisabetta Di Nitto, Danilo Ardagna. 93 [doi]
- Sentiment analysis for software engineering: how far can we go?Bin Lin 0008, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta, Michele Lanza, Rocco Oliveto. 94-104 [doi]
- Identifying features in forksShurui Zhou, Stefan Stanciulescu, Olaf Leßenich, Yingfei Xiong, Andrzej Wasowski, Christian Kästner. 105-116 [doi]
- Roles and impacts of hands-on software architects in five industrial case studiesInayat Rehman, Mehdi Mirakhorli, Meiyappan Nagappan, Azat Aralbay Uulu, Matthew Thornton. 117-127 [doi]
- Sentiment polarity detection for software developmentFabio Calefato, Filippo Lanubile, Federico Maiorano, Nicole Novielli. 128 [doi]
- Semantic program repair using a reference implementationSergey Mechtaev, Manh-Dung Nguyen, Yannic Noller, Lars Grunske, Abhik Roychoudhury. 129-139 [doi]
- Automated repair of mobile friendly problems in web pagesSonal Mahajan, Negarsadat Abolhassani, Phil McMinn, William G. J. Halfond. 140-150 [doi]
- Static automated program repair for heap propertiesRijnard van Tonder, Claire Le Goues. 151-162 [doi]
- Overfitting in semantics-based automated program repairXuan-Bach D. Le, Ferdian Thung, David Lo, Claire Le Goues. 163 [doi]
- Studying the dialogue between users and developers of free apps in the google play storeSafwat Hassan, Chakkrit Tantithamthavorn, Cor-Paul Bezemer, Ahmed E. Hassan. 164 [doi]
- Automated reporting of GUI design violations for mobile appsKevin Moran, Boyang Li, Carlos Bernal-Cárdenas, Dan Jelf, Denys Poshyvanyk. 165-175 [doi]
- Leveraging program analysis to reduce user-perceived latency in mobile applicationsYixue Zhao, Marcelo Schmitt Laser, Yingjun Lyu, Nenad Medvidovic. 176-186 [doi]
- Repairing crashes in Android appsShin Hwei Tan, Zhen Dong, Xiang Gao, Abhik Roychoudhury. 187-198 [doi]
- Hybrid regression test selectionLingming Zhang. 199-209 [doi]
- Fine-grained test minimizationArash Vahabzadeh, Andrea Stocco, Ali Mesbah 0001. 210-221 [doi]
- FAST approaches to scalable similarity-based test case prioritizationBreno Miranda, Emilio Cruciani, Roberto Verdecchia, Antonia Bertolino. 222-232 [doi]
- Towards refactoring-aware regression test selectionKaiyuan Wang, Chenguang Zhu, Ahmet Çelik, Jongwook Kim, Don S. Batory, Milos Gligoric. 233-244 [doi]
- Inheritance usage patterns in open-source systemsJamie Stevenson, Murray I. Wood. 245-255 [doi]
- Almost there: a study on quasi-contributors in open source software projectsIgor Steinmacher, Gustavo Pinto 0001, Igor Scaliante Wiese, Marco Aurélio Gerosa. 256-266 [doi]
- Analyzing a decade of Linux system callsMojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer, Ahmed E. Hassan, Juergen Dingel, James R. Cordy. 267 [doi]
- To distribute or not to distribute?: why licensing bugs matterChristopher Vendome, Daniel M. Germán, Massimiliano Di Penta, Gabriele Bavota, Mario Linares Vásquez, Denys Poshyvanyk. 268-279 [doi]
- Augusto: exploiting popular functionalities for the generation of semantic GUI tests with OraclesLeonardo Mariani, Mauro Pezzè, Daniele Zuddas. 280-290 [doi]
- Towards optimal concolic testingXinyu Wang, Jun Sun 0001, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin. 291-302 [doi]
- DeepTest: automated testing of deep-neural-network-driven autonomous carsYuchi Tian, Kexin Pei, Suman Jana, Baishakhi Ray. 303-314 [doi]
- Precise concolic unit testing of C programs using extended units and symbolic alarm filteringYunho Kim, Yunja Choi, Moonzoo Kim. 315-326 [doi]
- Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilitiesHua Yan, Yulei Sui, Shiping Chen, Jingling Xue. 327-337 [doi]
- Program splicingYanxin Lu, Swarat Chaudhuri, Chris Jermaine, David Melski. 338-349 [doi]
- Chopped symbolic executionDavid Trabish, Andrea Mattavelli, Noam Rinetzky, Cristian Cadar. 350-360 [doi]
- Perses: syntax-guided program reductionChengnian Sun, Yuanbo Li, Qirun Zhang, Tianxiao Gu, Zhendong Su. 361-371 [doi]
- Secure coding practices in Java: challenges and vulnerabilitiesNa Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo Arango Argoty. 372-383 [doi]
- EnMobile: entity-based characterization and analysis of mobile malwareWei Yang 0013, Mukul R. Prasad, Tao Xie 0001. 384-394 [doi]
- Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representationsKatsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira. 395 [doi]
- Privacy by designers: software developers' privacy mindsetIrit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, Arod Balissa. 396 [doi]
- Does the propagation of artifact changes across tasks reflect work dependencies?Christoph Mayr-Dorn, Alexander Egyed. 397-407 [doi]
- Large-scale analysis of framework-specific exceptions in Android appsLingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su. 408-419 [doi]
- Effect sizes and their variance for AB/BA crossover design studiesLech Madeyski, Barbara A. Kitchenham. 420 [doi]
- A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware productsMahmoud Hammad, Joshua Garcia, Sam Malek. 421-431 [doi]
- An empirical study on the interplay between semantic coupling and co-change of software classesNemitari Ajienka, Andrea Capiluppi, Steve Counsell. 432 [doi]
- DeFlaker: automatically detecting flaky testsJonathan Bell, Owolabi Legunsen, Michael Hilton, Lamyaa Eloussi, Tifany Yung, Darko Marinov. 433-444 [doi]
- DetReduce: minimizing Android GUI test suites for regression testingWontae Choi, Koushik Sen, George C. Necula, Wenyu Wang. 445-455 [doi]
- Time to clean your test objectivesMichaël Marcozzi, Sébastien Bardin, Nikolai Kosmatov, Mike Papadakis, Virgile Prevosto, Loïc Correnson. 456-467 [doi]
- Prioritizing browser environments for web application test executionJung-Hyun Kwon, In-Young Ko, Gregg Rothermel. 468-479 [doi]
- An empirical study of early access games on the steam platformDayi Lin, Cor-Paul Bezemer, Ahmed E. Hassan. 480 [doi]
- Correctness attraction: a study of stability of software behavior under runtime perturbationBenjamin Danglot, Philippe Preux, Benoit Baudry, Martin Monperrus. 481 [doi]
- On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigationFabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Fausto Fasano, Rocco Oliveto, Andrea De Lucia. 482 [doi]
- Accurate and efficient refactoring detection in commit historyNikolaos Tsantalis, Matin Mansouri, Laleh Mousavi Eshkevari, Davood Mazinanian, Danny Dig. 483-494 [doi]
- ENTRUST: engineering trustworthy self-adaptive software with dynamic assurance casesRadu Calinescu, Danny Weyns, Simos Gerasimou, M. Usman Iftikhar, Ibrahim Habli, Tim Kelly. 495 [doi]
- The good, the bad and the ugly: a study of security decisions in a cyber-physical systems gameSylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi. 496 [doi]
- Lightweight, obfuscation-resilient detection and family identification of Android malwareJoshua Garcia, Mahmoud Hammad, Sam Malek. 497 [doi]
- Are vulnerabilities discovered and resolved like other defects?Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams. 498 [doi]
- How modern news aggregators help development communities shape and share knowledgeMaurício Finavaro Aniche, Christoph Treude, Igor Steinmacher, Igor Wiese, Gustavo Pinto 0001, Margaret-Anne D. Storey, Marco Aurélio Gerosa. 499-510 [doi]
- npm ecosystemAsher Trockman, Shurui Zhou, Christian Kästner, Bogdan Vasilescu. 511-522 [doi]
- "Was my contribution fairly reviewed?": a framework to study the perception of fairness in modern code reviewsDaniel M. Germán, Gregorio Robles, Germán Poo-Caamaño, Xin Yang, Hajimu Iida, Katsuro Inoue. 523-534 [doi]
- Collaborative model-driven software engineering: a classification framework and a research mapDavide Di Ruscio, Mirco Franzago, Henry Muccini, Ivano Malavolta. 535 [doi]
- ChangeLocator: locate crash-inducing changes based on crash reportsRongxin Wu, Ming Wen, Shing-Chi Cheung, Hongyu Zhang. 536 [doi]
- Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faultsMike Papadakis, Donghwan Shin, Shin Yoo, Doo-Hwan Bae. 537-548 [doi]
- Efficient sampling of SAT solutions for testingRafael Dutra, Kevin Laeufer, Jonathan Bachrach, Koushik Sen. 549-559 [doi]
- Are fix-inducing changes a moving target?: a longitudinal case study of just-in-time defect predictionShane McIntosh, Yasutaka Kamei. 560 [doi]
- Understanding developers' needs on deprecation as a language featureAnand Ashok Sawant, Maurício Finavaro Aniche, Arie van Deursen, Alberto Bacchelli. 561-571 [doi]
- On the dichotomy of debugging behavior among programmersMoritz Beller, Niels Spruit, Diomidis Spinellis, Andy Zaidman. 572-583 [doi]
- Measuring program comprehension: a large-scale field study with professionalsXin Xia, Lingfeng Bao, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li. 584 [doi]
- Data scientists in software teams: state of the art and challengesMiryung Kim, Thomas Zimmermann 0001, Robert DeLine, Andrew Begel. 585 [doi]
- Dataflow tunneling: mining inter-request data dependencies for request-based applicationsXiao Yu, Guoliang Jin. 586-597 [doi]
- Launch-mode-aware context-sensitive activity transition analysisYifei Zhang, Yulei Sui, Jingling Xue. 598-608 [doi]
- UFO: predictive concurrency use-after-free detectionJeff Huang 0001. 609-619 [doi]
- Collective program analysisGanesha Upadhyaya, Hridesh Rajan. 620-631 [doi]
- Statistical learning of API fully qualified names in code snippets of online forumsHung Phan, Hoan Anh Nguyen, Ngoc M. Tran, Linh H. Truong, Anh Tuan Nguyen, Tien N. Nguyen. 632-642 [doi]
- When not to comment: questions and tradeoffs with API documentation for C++ projectsAndrew Head, Caitlin Sadowski, Emerson R. Murphy-Hill, Andrea Knight. 643-653 [doi]
- Deuce: a lightweight user interface for structured editingBrian Hempel, Justin Lubin, Grace Lu, Ravi Chugh. 654-664 [doi]
- From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementationChunyang Chen, Ting Su, Guozhu Meng, Zhenchang Xing, Yang Liu. 665-676 [doi]
- When testing meets code review: why and how developers review testsDavide Spadini, Maurício Finavaro Aniche, Margaret-Anne D. Storey, Magiel Bruntink, Alberto Bacchelli. 677-687 [doi]
- Redefining prioritization: continuous prioritization for continuous integrationJingjing Liang, Sebastian G. Elbaum, Gregg Rothermel. 688-698 [doi]
- MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect predictionKwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah. 699 [doi]
- On the use of hidden Markov model to predict the time to fix bugsMayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener. 700 [doi]
- What makes a great manager of software engineers?Eirini Kalliamvakou, Christian Bird, Thomas Zimmermann 0001, Andrew Begel, Robert DeLine, Daniel M. Germán. 701 [doi]
- Older adults and hackathons: a qualitative studyWieslaw Kopec, Bartlomiej Balcerzak, Radoslaw Nielek, Grzegorz Kowalik, Adam Wierzbicki, Fabio Casati. 702-703 [doi]
- Does syntax highlighting help programming novices?Christoph Hannebauer, Marc Hesenius, Volker Gruhn. 704 [doi]
- Do programmers work at night or during the weekend?Maëlick Claes, Mika V. Mäntylä, Miikka Kuutila, Bram Adams. 705-715 [doi]
- Multi-granular conflict and dependency analysis in software engineering based on graph transformationLeen Lambers, Daniel Strüber 0001, Gabriele Taentzer, Kristopher Born, Jevgenij Huebert. 716-727 [doi]
- Self-hiding behavior in Android apps: detection and characterizationZhiyong Shan, Iulian Neamtiu, Raina Samuel. 728-739 [doi]
- The scent of a smell: an extensive comparison between textual and structural smellsFabio Palomba, Annibale Panichella, Andy Zaidman, Rocco Oliveto, Andrea De Lucia. 740 [doi]
- ConflictJS: finding and understanding conflicts between JavaScript librariesJibesh Patra, Pooja N. Dixit, Michael Pradel. 741-751 [doi]
- Debugging data flows in reactive programsHerman Banken, Erik Meijer 0003, Georgios Gousios. 752-763 [doi]
- Do you remember this source code?Jacob Krüger, Jens Wiemann, Wolfram Fenske, Gunter Saake, Thomas Leich. 764-775 [doi]
- Inferring hierarchical motifs from execution tracesSaba Alimadadi, Ali Mesbah 0001, Karthik Pattabiraman. 776-787 [doi]
- A comparison of program comprehension strategies by blind and sighted programmersAmeer Armaly, Paige Rodeghero, Collin McMillan. 788 [doi]
- Identifying patch correctness in test-based program repairYingfei Xiong, Xinyuan Liu, Muhan Zeng, Lu Zhang 0023, Gang Huang 0001. 789-799 [doi]
- not to structure your database-backed web applications: a study of performance bugs in the wildJunwen Yang, Pranav Subramaniam, Shan Lu, Cong Yan, Alvin Cheung. 800-810 [doi]
- Speedoo: prioritizing performance optimization opportunitiesZhifei Chen, Bihuan Chen, Lu Xiao, Xiao Wang, Lin Chen, Yang Liu, Baowen Xu. 811-821 [doi]
- Empirical study on the discrepancy between performance testing results from virtual and physical environmentsMuhammad Moiz Arif, Weiyi Shang, Emad Shihab. 822 [doi]
- The evolution of requirements practices in software startupsCatarina Gralha, Daniela Damian, Anthony I. Wasserman, Miguel Goulão, João Araújo 0001. 823-833 [doi]
- Traceability in the wild: automatically augmenting incomplete trace linksMichael Rath 0002, Jacob Rendall, Jin L. C. Guo, Jane Cleland-Huang, Patrick Mäder. 834-845 [doi]
- A temporal permission analysis and enforcement framework for AndroidAlireza Sadeghi, Reyhaneh Jabbarvand, Negar Ghorbani, Hamid Bagheri, Sam Malek. 846-857 [doi]
- Global-aware recommendations for repairing violations in exception handlingEiji Adachi Barbosa, Alessandro Garcia. 858 [doi]
- RFC-directed differential testing of certificate validation in SSL/TLS implementationsChu Chen, Cong Tian, Zhenhua Duan, Liang Zhao. 859-870 [doi]
- Symbolic verification of regular propertiesHengbiao Yu, Zhenbang Chen, Ji Wang, Zhendong Su, Wei Dong 0006. 871-881 [doi]
- Metamorphic testing of RESTful web APIsSergio Segura, José Antonio Parejo, Javier Troya, Antonio Ruiz Cortés. 882 [doi]
- Integrating technical debt management and software quality management processes: a framework and field testsNarayan Ramasubbu, Chris F. Kemerer. 883 [doi]
- Understanding the factors for fast answers in technical Q&A websites: an empirical study of four stack exchange websitesShaowei Wang, Tse-Hsun Chen, Ahmed E. Hassan. 884 [doi]
- Towards reusing hints from past fixes: an exploratory study on thousands of real samplesHao Zhong, Na Meng. 885 [doi]
- Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflowTianyi Zhang 0001, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim. 886-896 [doi]
- Inference of development activities from interaction with uninstrumented applicationsLingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Ahmed E. Hassan. 897 [doi]
- Propagating configuration decisions with modal implication graphsSebastian Krieter, Thomas Thüm, Sandro Schulze, Reimar Schröter, Gunter Saake. 898-909 [doi]
- A combinatorial approach for exposing off-nominal behaviorsKaushik Madala, Hyunsook Do, Daniel Aceituna. 910-920 [doi]
- Identifying design problems in the source code: a grounded theoryLeonardo da Silva Sousa, Anderson Oliveira, Willian Nalepa Oizumi, Simone D. J. Barbosa, Alessandro Garcia, Jaejoon Lee, Marcos Kalinowski, Rafael Maiani de Mello, Baldoino Fonseca, Roberto Felicio Oliveira, Carlos Lucena, Rodrigo B. de Paes. 921-931 [doi]
- Predicting future developer behavior in the IDE using topic modelsKostadin Damevski, Hui Chen, David C. Shepherd, Nicholas A. Kraft, Lori L. Pollock. 932 [doi]
- Deep code searchXiaodong Gu, Hongyu Zhang, Sunghun Kim 0001. 933-944 [doi]
- Augmenting and structuring user queries to support efficient free-form code searchRaphael Sirres, Tegawendé F. Bissyandé, Dongsun Kim, David Lo, Jacques Klein, Kisub Kim, Yves Le Traon. 945 [doi]
- FaCoY: a code-to-code search engineKisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li 0029, Jacques Klein, Yves Le Traon. 946-957 [doi]
- Generalized data structure synthesisCalvin Loncaric, Michael D. Ernst, Emina Torlak. 958-968 [doi]
- A graph solver for the automated generation of consistent domain-specific modelsOszkár Semeráth, András Szabolcs Nagy, Dániel Varró. 969-980 [doi]
- Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforgeShafiul Azam Chowdhury, Soumik Mohian, Sidharth Mehra, Siddhant Gawsane, Taylor T. Johnson, Christoph Csallner. 981-992 [doi]
- Context-aware conversational developer assistantsNick C. Bradley, Thomas Fritz, Reid Holmes. 993-1003 [doi]
- Open source barriers to entry, revisited: a sociotechnical perspectiveChristopher J. Mendez, Hema Susmita Padala, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Nupoor Patil, Anita Sarma, Margaret M. Burnett. 1004-1015 [doi]
- Testing vision-based control systems using learnable evolutionary algorithmsRaja Ben Abdessalem, Shiva Nejati, Lionel C. Briand, Thomas Stifter. 1016-1026 [doi]
- To preserve or not to preserve invalid solutions in search-based software engineering: a case study in software product linesJianmei Guo, Kai Shi. 1027-1038 [doi]
- Nemo: multi-criteria test-suite minimization with integer nonlinear programmingJun-Wei Lin, Reyhaneh Jabbarvand, Joshua Garcia, Sam Malek. 1039-1049 [doi]
- Is "better data" better than "better data miners"?: on the benefits of tuning SMOTE for defect predictionAmritanshu Agrawal, Tim Menzies. 1050-1061 [doi]
- Analyzing the effects of test driven development in GitHubNeil C. Borle, Meysam Feghhi, Eleni Stroulia, Russell Greiner, Abram Hindle. 1062 [doi]
- A comparative study to benchmark cross-project defect prediction approachesSteffen Herbold, Alexander Trautsch, Jens Grabowski. 1063 [doi]
- MSeer: an advanced technique for locating multiple bugs in parallelRuizhi Gao, W. Eric Wong. 1064 [doi]
- Journal first presentation of an experience report on applying software testing academic results in industry: we need usable automated test generationAndre Arcuri. 1065 [doi]
- CCAligner: a token based large-gap clone detectorPengcheng Wang, Jeffrey Svajlenko, Yanzhao Wu, Yun Xu, Chanchal K. Roy. 1066-1077 [doi]
- HireBuild: an automatic approach to history-driven repair of build scriptsFoyzul Hassan, Xiaoyin Wang. 1078-1089 [doi]
- The road to live programming: insights from the practiceJuraj Kubelka, Romain Robbes, Alexandre Bergel. 1090-1101 [doi]
- Assessing the threat of untracked changes in software evolutionAndré C. Hora, Danilo Silva, Marco Tulio Valente, Romain Robbes. 1102-1113 [doi]
- Programming not only by exampleHila Peleg, Sharon Shoham, Eran Yahav. 1114-1124 [doi]
- Goal-conflict likelihood assessment based on model countingRenzo Degiovanni, Pablo F. Castro, Marcelo Arroyo, Marcelo Ruiz, Nazareno Aguirre, Marcelo F. Frias. 1125-1135 [doi]
- A posteriori typing for model-driven engineering: concepts, analysis, and applicationsJuan de Lara, Esther Guerra. 1136 [doi]
- A static verification framework for message passing in Go using behavioural typesJulien Lange, Nicholas Ng, Bernardo Toninho, Nobuko Yoshida. 1137-1148 [doi]
- Inferring and asserting distributed system invariantsStewart Grant, Hendrik Cech, Ivan Beschastnikh. 1149-1159 [doi]
- DroidStar: callback typestates for Android classesArjun Radhakrishna, Nicholas V. Lewchenko, Shawn Meier, Sergio Mover, Krishna Chaitanya Sripada, Damien Zufferey, Bor-Yuh Evan Chang, Pavol Cerný. 1160-1170 [doi]
- Debugging with intelligence via probabilistic inferenceZhaogui Xu, ShiQing Ma, Xiangyu Zhang 0001, Shuofei Zhu, Baowen Xu. 1171-1181 [doi]
- Reducer-based construction of conditional verifiersDirk Beyer 0001, Marie-Christine Jakobs, Thomas Lemberger 0002, Heike Wehrheim. 1182-1193 [doi]
- Challenges and pitfalls on surveying evidence in the software engineering technical literature: an exploratory study with novicesTalita Vieira Ribeiro, Jobson L. Massollar, Guilherme Horta Travassos. 1194 [doi]
- Statistical errors in software engineering experiments: a preliminary literature reviewRolando P. Reyes, Oscar Dieste, Efraín R. Fonseca C., Natalia Juristo. 1195-1206 [doi]
- Synthesizing qualitative research in software engineering: a critical reviewXin Huang, He Zhang, Xin Zhou, Muhammad Ali Babar, Song Yang. 1207-1218 [doi]
- Automatic software repair: a surveyLuca Gazzola, Daniela Micucci, Leonardo Mariani. 1219 [doi]
- Search-based test data generation for SQL queriesJeroen Castelein, Maurício Finavaro Aniche, Mozhan Soltani, Annibale Panichella, Arie van Deursen. 1230 [doi]
- Multi-objective integer programming approaches for solving optimal feature selection problem: a new perspective on multi-objective optimization problems in SBSEYinxing Xue, Yan-fu Li. 1231-1242 [doi]
- Automated refactoring of OCL constraints with searchHong Lu, Shuai Wang 0001, Tao Yue 0002, Shaukat Ali 0001, Jan F. Nygård. 1243 [doi]
- Automatically generating search heuristics for concolic testingSooyoung Cha, Seongjoon Hong, Junhee Lee, Hakjoo Oh. 1244-1254 [doi]