Abstract is missing.
- Learning to spot and refactor inconsistent method namesKui Liu, Dongsun Kim 0001, Tegawendé F. Bissyandé, Tae-young Kim, Kisub Kim, Anil Koyuncu, Suntae Kim, Yves Le Traon. 1-12 [doi]
- Harnessing evolution for multi-hunk program repairSeemanta Saha, Ripon K. Saha, Mukul R. Prasad. 13-24 [doi]
- On learning meaningful code changes via neural machine translationMichele Tufano, Jevgenija Pantiuchina, Cody Watson, Gabriele Bavota, Denys Poshyvanyk. 25-36 [doi]
- Natural software revisitedMusfiqur Rahman, Dharani Palani, Peter C. Rigby. 37-48 [doi]
- Towards automating precision studies of clone detectorsVaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Di Yang, Pedro Martins 0001, Hitesh Sajnani, Pierre Baldi, Cristina V. Lopes. 49-59 [doi]
- Leopard: identifying vulnerable code for vulnerability assessment through program metricsXiaoning Du, Bihuan Chen 0001, Yuekang Li, Jianmin Guo, Yaqin Zhou, Yang Liu, Yu Jiang. 60-71 [doi]
- Smoke: scalable path-sensitive memory leak detection for millions of lines of codeGang Fan, Rongxin Wu, Qingkai Shi, Xiao Xiao 0003, Jinguo Zhou, Charles Zhang. 72-82 [doi]
- Reasonably-most-general clients for JavaScript library analysisErik Krogh Kristensen, Anders Møller. 83-93 [doi]
- Resource-aware program analysis via online abstraction coarseningKihong Heo, Hakjoo Oh, Hongseok Yang. 94-104 [doi]
- Automated reporting of anti-patterns and decay in continuous integrationCarmine Vassallo, Sebastian Proksch, Harald C. Gall, Massimiliano Di Penta. 105-115 [doi]
- A system identification based Oracle for control-CPS software fault localizationZhijian He, Yao Chen, Enyan Huang, Qixin Wang, Yu Pei, Haidong Yuan. 116-127 [doi]
- ReCDroid: automatically reproducing Android application crashes from bug reportsYu Zhao, Tingting Yu, Ting Su, Yang Liu, Wei Zheng, Jingzhi Zhang, William G. J. Halfond. 128-139 [doi]
- Mining historical test logs to predict bugs and localize faults in the test logsAnunay Amar, Peter C. Rigby. 140-151 [doi]
- Dlfinder: characterizing and detecting duplicate logging code smellsZhenhao Li, Tse-Hsun (Peter) Chen, Jinqiu Yang 0001, Weiyi Shang. 152-163 [doi]
- The seven sins: security smells in infrastructure as code scriptsAkond Rahman, Chris Parnin, Laurie Williams. 164-175 [doi]
- DifFuzz: differential fuzzing for side-channel analysisShirin Nilizadeh, Yannic Noller, Corina S. Pasareanu. 176-187 [doi]
- Automatically generating precise Oracles from structured natural language specificationsManish Motwani, Yuriy Brun. 188-199 [doi]
- The product backlogTodd Sedano, Paul Ralph, Cécile Péraire. 200-211 [doi]
- Easy modelling and verification of unpredictable and preemptive interrupt-driven systemsMinxue Pan, Shouyu Chen, Yu Pei 0001, Tian Zhang 0001, Xuandong Li. 212-222 [doi]
- Towards understanding and reasoning about Android interoperationsSora Bae, Sungho Lee, Sukyoung Ryu. 223-233 [doi]
- Zero-overhead path prediction with progressive symbolic executionRichard Rutledge, Sunjae Park, Haider A. Khan, Alessandro Orso, Milos Prvulovic, Alenka G. Zajic. 234-245 [doi]
- Mimic: UI compatibility testing system for Android appsTaeyeon Ki, Chang Min Park, Karthik Dantu, Steven Y. Ko, Lukasz Ziarek. 246-256 [doi]
- IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android appsXusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, Peng Gao. 257-268 [doi]
- Practical GUI testing of Android applications via model abstraction and refinementTianxiao Gu, Chengnian Sun, Xiaoxing Ma, Chun Cao, Chang Xu 0001, Yuan Yao, Qirun Zhang, Jian Lu, Zhendong Su. 269-280 [doi]
- AutoTap: synthesizing and repairing trigger-action programs using LTL propertiesLefan Zhang, Weijia He, Jesse Martinez, Noah Brackenbury, Shan Lu, Blase Ur. 281-291 [doi]
- Active inductive logic programming for code searchAishwarya Sivaraman, Tianyi Zhang 0001, Guy Van den Broeck, Miryung Kim. 292-303 [doi]
- NL2Type: inferring JavaScript function types from natural language informationRabee Sohail Malik, Jibesh Patra, Michael Pradel. 304-315 [doi]
- Analyzing and supporting adaptation of online code examplesTianyi Zhang 0001, Di Yang, Crista Lopes, Miryung Kim. 316-327 [doi]
- DockerizeMe: automatic inference of environment dependencies for python code snippetsEric Horton, Chris Parnin. 328-338 [doi]
- BugSwarm: mining and continuously growing a dataset of reproducible failures and fixesNaji Dmeiri, David A. Tomassi, Yichen Wang, Antara Bhowmick, Yen-Chuan Liu, Premkumar T. Devanbu, Bogdan Vasilescu, Cindy Rubio-González. 339-349 [doi]
- ActionNet: vision-based workflow action recognition from programming screencastsDehai Zhao, Zhenchang Xing, Chunyang Chen, Xin Xia 0001, Guoqiang Li 0001. 350-361 [doi]
- How C++ developers use immutability declarations: an empirical studyJonathan Eyolfson, Patrick Lam 0001. 362-372 [doi]
- Latent patterns in activities: a field study of how developers manage contextSouti Chattopadhyay, Nicholas Nelson 0002, Yenifer Ramirez Gonzalez, Annel Amelia Leon, Rahul Pandita, Anita Sarma. 373-383 [doi]
- Developer reading behavior while summarizing Java methods: size and context mattersNahla J. Abid, Bonita Sharif, Natalia Dragan, Hend Alrasheed, Jonathan I. Maletic. 384-395 [doi]
- Distilling neural representations of data structure manipulation using fMRI and fNIRSYu Huang, Xinyu Liu, Ryan Krueger, Tyler Santander, Xiaosu Hu, Kevin Leach, Westley Weimer. 396-407 [doi]
- FastLane: test minimization for rapidly deployed large-scale online servicesAdithya Abraham Philip, Ranjita Bhagwan, Rahul Kumar, Chandra Shekhar Maddila, Nachiappan Nagappan. 408-418 [doi]
- Scalable approaches for test suite reductionEmilio Cruciani, Breno Miranda, Roberto Verdecchia, Antonia Bertolino. 419-429 [doi]
- A framework for checking regression test selection toolsChenguang Zhu, Owolabi Legunsen, August Shi, Milos Gligoric. 430-441 [doi]
- Supporting analysts by dynamic extraction and classification of requirements-related knowledgeZahra Shakeri Hossein Abad, Vincenzo Gervasi, Didar Zowghi, Behrouz H. Far. 442-453 [doi]
- Analysis and detection of information types of open source software issue discussionsDeeksha Arya, Wenting Wang, Jin L. C. Guo, Jinghui Cheng. 454-464 [doi]
- Do developers discover new tools on the toilet?Emerson R. Murphy-Hill, Edward K. Smith, Caitlin Sadowski, Ciera Jaspan, Collin Winter, Matthew Jorde, Andrea Knight, Andrew Trenk, Steve Gross. 465-475 [doi]
- Tool choice matters: JavaScript quality assurance tools and usage outcomes in GitHub projectsDavid Kavaler, Asher Trockman, Bogdan Vasilescu, Vladimir Filkov. 476-487 [doi]
- Hunting for bugs in code coverage tools via randomized differential testingYibiao Yang, Yuming Zhou, Hao Sun, Zhendong Su, Zhiqiang Zuo 0002, Lei Xu 0003, Baowen Xu. 488-498 [doi]
- Rotten green testsJulien Delplanque, Stéphane Ducasse, Guillermo Polito, Andrew P. Black, Anne Etien. 500-511 [doi]
- VFix: value-flow-guided precise program repair for null pointer dereferencesXuezheng Xu, Yulei Sui, Hua Yan, Jingling Xue. 512-523 [doi]
- On reliability of patch correctness assessmentXuan-Bach D. Le, Lingfeng Bao, David Lo 0001, Xin Xia 0001, Shanping Li, Corina S. Pasareanu. 524-535 [doi]
- How reliable is the crowdsourced knowledge of security implementation?Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags. 536-547 [doi]
- Pattern-based mining of opinions in Q&A websitesBin Lin 0008, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta, Michele Lanza. 548-559 [doi]
- Detection and repair of architectural inconsistencies in JavaNegar Ghorbani, Joshua Garcia, Sam Malek. 560-571 [doi]
- Could I have a stack trace to examine the dependency conflict issue?Ying Wang, Ming Wen, Rongxin Wu, Zhenwei Liu, Shin Hwei Tan, Zhiliang Zhu, Hai Yu, Shing-Chi Cheung. 572-583 [doi]
- Investigating the impact of multiple dependency structures on software defectsDi Cui, Ting Liu, Yuanfang Cai, Qinghua Zheng, Qiong Feng, Wuxia Jin, Jiaqi Guo, Yu Qu. 584-595 [doi]
- StoryDroid: automated generation of storyboard for Android appsSen Chen, Lingling Fan, Chunyang Chen, Ting Su, Wenhe Li, Yang Liu, Lihua Xu. 596-607 [doi]
- Statistical algorithmic profiling for randomized approximate programsKeyur Joshi, Vimuth Fernando, Sasa Misailovic. 608-618 [doi]
- Safe automated refactoring for intelligent parallelization of Java 8 streamsRaffi Khatchadourian, Yiming Tang, Mehdi Bagherzadeh, Syed Ahmed. 619-630 [doi]
- Detecting atomicity violations for event-driven Node.js applicationsXiaoning Chang, Wensheng Dou, Yu Gao, Jie Wang, Jun Wei 0001, Tao Huang. 631-642 [doi]
- Parallel refinement for multi-threaded program verificationLiangze Yin, Wei Dong 0006, Wanwei Liu, Ji Wang 0001. 643-653 [doi]
- Mining software defects: should we consider affected releases?Suraj Yatish, Jirayus Jiarpakdee, Patanamon Thongtanunam, Chakkrit Tantithamthavorn. 654-665 [doi]
- Class imbalance evolution and verification latency in just-in-time software defect predictionGeorge G. Cabral, Leandro L. Minku, Emad Shihab, Suhaib Mujahid. 666-676 [doi]
- FLOSS participants' perceptions about gender and inclusiveness: a surveyAmanda Lee, Jeffrey C. Carver. 677-687 [doi]
- Going farther together: the impact of social capital on sustained participation in open sourceHuilian Sophie Qiu, Alexander Nolte, Anita Brown, Alexander Serebrenik, Bogdan Vasilescu. 688-699 [doi]
- Investigating the effects of gender bias on GitHubNasif Imtiaz, Justin Middleton, Joymallya Chakraborty, Neill Robson, Gina Bai, Emerson R. Murphy-Hill. 700-711 [doi]
- SLF: fuzzing without valid seed inputsWei You, Xuwei Liu, ShiQing Ma, David Mitchel Perry, Xiangyu Zhang, Bin Liang 0002. 712-723 [doi]
- Superion: grammar-aware greybox fuzzingJunjie Wang, Bihuan Chen 0001, Lei Wei, Yang Liu. 724-735 [doi]
- Grey-box concolic testing on binary codeJaeseung Choi 0002, Joonun Jang, Choongwoo Han, Sang Kil Cha. 736-747 [doi]
- RESTler: stateful REST API fuzzingVaggelis Atlidakis, Patrice Godefroid, Marina Polishchuk. 748-758 [doi]
- Training binary classifiers as data structure invariantsFacundo Molina, Renzo Degiovanni, Pablo Ponzio, Germán Regis, Nazareno Aguirre, Marcelo F. Frias. 759-770 [doi]
- Graph embedding based familial analysis of Android malware using unsupervised learningMing Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu 0002. 771-782 [doi]
- A novel neural source code representation based on abstract syntax treeJian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun 0001, Kaixuan Wang, Xudong Liu. 783-794 [doi]
- A neural model for generating natural language summaries of program subroutinesAlexander LeClair, Siyuan Jiang, Collin McMillan. 795-806 [doi]
- The list is the process: reliable pre-integration tracking of commits on mailing listsRalf Ramsauer, Daniel Lohmann, Wolfgang Mauerer. 807-818 [doi]
- Graph-based mining of in-the-wild, fine-grained, semantic code change patternsHoan Anh Nguyen, Tien N. Nguyen, Danny Dig, Son Nguyen, Hieu Tran, Michael Hilton. 819-830 [doi]
- Intention-based integration of software variantsMax Lillack, Stefan Stanciulescu, Wilhelm Hedman, Thorsten Berger, Andrzej Wasowski. 831-842 [doi]
- Supporting the statistical analysis of variability modelsRuben Heradio, David Fernández-Amorós, Christoph Mayr-Dorn, Alexander Egyed. 843-853 [doi]
- Multifaceted automated analyses for variability-intensive embedded systemsSami Lazreg, Maxime Cordy, Philippe Collet, Patrick Heymans, Sébastien Mosser 0001. 854-865 [doi]
- Exposing library API misuses via mutation analysisMing Wen, Yepang Liu, Rongxin Wu, Xuan Xie, Shing-Chi Cheung, Zhendong Su. 866-877 [doi]
- Pivot: learning API-device correlations to facilitate Android compatibility issue detectionLili Wei, Yepang Liu, Shing-Chi Cheung. 878-888 [doi]
- SafeCheck: safety enhancement of Java unsafe APIShiyou Huang, Jianmei Guo, Sanhong Li, Xiang Li, Yumin Qi, Kingsum Chow, Jeff Huang 0001. 889-899 [doi]
- CTRAS: crowdsourced test report aggregation and summarizationRui Hao, Yang Feng, James A. Jones, Yuying Li, Zhenyu Chen 0001. 900-910 [doi]
- iSENSE: completion-aware crowdtesting managementJunjie Wang, Ye Yang, Rahul Krishna, Tim Menzies, Qing Wang. 912-923 [doi]
- How practitioners perceive coding proficiencyXin Xia 0001, Zhiyuan Wan, Pavneet Singh Kochhar, David Lo 0001. 924-935 [doi]
- Socio-technical work-rate increase associates with changes in work patterns in online projectsFarhana Sarker, Bogdan Vasilescu, Kelly Blincoe, Vladimir Filkov. 936-947 [doi]
- Why do episodic volunteers stay in FLOSS communities?Ann Barcomb, Klaas-Jan Stol, Dirk Riehle, Brian Fitzgerald 0001. 948-954 [doi]
- When code completion fails: a case study on real-world completionsVincent J. Hellendoorn, Sebastian Proksch, Harald C. Gall, Alberto Bacchelli. 960-970 [doi]
- Interactive production performance feedback in the IDEJürgen Cito, Philipp Leitner, Martin Rinard, Harald C. Gall. 971-981 [doi]
- Redundant loads: a software inefficiency indicatorPengfei Su, Shasha Wen, Hailong Yang, Milind Chabbi, Xu Liu 0001. 982-993 [doi]
- View-centric performance optimization for database-backed web applicationsJunwen Yang, Cong Yan, Chengcheng Wan, Shan Lu, Alvin Cheung. 994-1004 [doi]
- Adjust: runtime mitigation of resource abusing third-party online adsWeihang Wang, I Luk Kim, Yunhui Zheng. 1005-1015 [doi]
- Symbolic repairs for GR(1) specificationsShahar Maoz, Jan Oliver Ringert, Rafi Shalom. 1016-1026 [doi]
- CRADLE: cross-backend validation to detect and localize bugs in deep learning librariesHung Viet Pham, Thibaud Lutellier, Weizhen Qi, Lin Tan. 1027-1038 [doi]
- Guiding deep learning system testing using surprise adequacyJinhan Kim, Robert Feldt, Shin Yoo. 1039-1049 [doi]
- FOCUS: a recommender system for mining API function calls and usage patternsPhuong T. Nguyen, Juri Di Rocco, Davide Di Ruscio, Lina Ochoa, Thomas Degueule, Massimiliano Di Penta. 1050-1060 [doi]
- Test-driven code review: an empirical studyDavide Spadini, Fabio Palomba, Tobias Baum, Stefan Hanenberg, Magiel Bruntink, Alberto Bacchelli. 1061-1072 [doi]
- Why does code review work for open source software communities?Adam Alami, Marisa Leavitt Cohn, Andrzej Wasowski. 1073-1083 [doi]
- Distance-based sampling of software configuration spacesChristian Kaltenecker, Alexander Grebhahn, Norbert Siegmund, Jianmei Guo, Sven Apel. 1084-1094 [doi]
- DeepPerf: performance prediction for configurable software with deep sparse neural networkHuong Ha, Hongyu Zhang. 1095-1106 [doi]
- GreenBundle: an empirical study on the energy impact of bundled processingShaiful Alam Chowdhury, Abram Hindle, Rick Kazman, Takumi Shuto, Ken Matsui, Yasutaka Kamei. 1107-1118 [doi]
- Search-based energy testing of AndroidReyhaneh Jabbarvand, Jun-Wei Lin, Sam Malek. 1119-1130 [doi]
- Global optimization of numerical programs via prioritized stochastic algebraic transformationsXie Wang, Huaijin Wang, Zhendong Su, Enyi Tang, Xin Chen, Weijun Shen, Zhenyu Chen 0001, Linzhang Wang, Xianpei Zhang, Xuandong Li. 1131-1141 [doi]
- Type migration in ultra-large-scale codebasesAmeya Ketkar, Ali Mesbah 0001, Davood Mazinanian, Danny Dig, Edward Aftandilian. 1142-1153 [doi]
- Dynamic slicing for AndroidTanzirul Azim, Arash Alavi, Iulian Neamtiu, Rajiv Gupta 0001. 1154-1164 [doi]
- Recovering variable names for minified code with usage contextsHieu Tran, Ngoc M. Tran, Son Nguyen, Hoan Nguyen, Tien N. Nguyen. 1165-1175 [doi]
- Gigahorse: thorough, declarative decompilation of smart contractsNeville Grech, Lexi Brent, Bernhard Scholz, Yannis Smaragdakis. 1176-1186 [doi]
- Probabilistic disassemblyKenneth A. Miller, Yonghwi Kwon, Yi Sun, Zhuo Zhang, Xiangyu Zhang, Zhiqiang Lin. 1187-1198 [doi]
- Software documentation issues unveiledEmad Aghajani, Csaba Nagy, Olga Lucero Vega-Márquez, Mario Linares Vásquez, Laura Moreno, Gabriele Bavota, Michele Lanza. 1199-1210 [doi]
- 9.6 million links in source code comments: purpose, evolution, and decayHideaki Hata, Christoph Treude, Raula Gaikovina Kula, Takashi Ishio. 1211-1221 [doi]
- Leveraging artifact trees to evolve and reuse safety casesAnkit Agrawal, Seyedehzahra Khoshmanesh, Michael Vierhauser, Mona Rahimi, Jane Cleland-Huang, Robyn R. Lutz. 1222-1233 [doi]
- Detecting incorrect build rulesNándor Licker, Andrew Rice. 1234-1244 [doi]
- Adversarial sample detection for deep neural network through model mutation testingJingyi Wang, Guoliang Dong, Jun Sun 0001, Xinyu Wang 0001, Peixin Zhang. 1245-1256 [doi]
- Deep differential testing of JVM implementationsYuting Chen, Ting Su, Zhendong Su. 1257-1268 [doi]