Abstract is missing.
- Learning-to-rank vs ranking-to-learn: strategies for regression testing in continuous integrationAntonia Bertolino, Antonio Guerriero, Breno Miranda, Roberto Pietrantuono, Stefano Russo. 1-12 [doi]
- A cost-efficient approach to building in continuous integrationXianhao Jin, Francisco Servant. 13-25 [doi]
- Practical fault detection in puppet programsThodoris Sotiropoulos, Dimitris Mitropoulos, Diomidis Spinellis. 26-37 [doi]
- Learning from, understanding, and supporting DevOps artifacts for dockerJordan Henkel, Christian Bird, Shuvendu K. Lahiri, Thomas W. Reps. 38-49 [doi]
- Adapting requirements models to varying environmentsDalal Alrajeh, Antoine Cailliau, Axel van Lamsweerde. 50-61 [doi]
- Comparing formal tools for system design: a judgment studyAlessio Ferrari 0001, Franco Mazzanti, Davide Basile, Maurice H. ter Beek, Alessandro Fantechi. 62-74 [doi]
- Debugging inputsLukas Kirschner, Ezekiel O. Soremekun, Andreas Zeller. 75-86 [doi]
- Causal testing: understanding defects' root causesBrittany Johnson, Yuriy Brun, Alexandra Meliou. 87-99 [doi]
- Impact analysis of cross-project bugs on software ecosystemsWanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu. 100-111 [doi]
- Taming behavioral backward incompatibilities via cross-project testing and analysisLingchao Chen, Foyzul Hassan, Xiaoyin Wang, Lingming Zhang. 112-124 [doi]
- Watchman: monitoring dependency conflicts for Python library ecosystemYing Wang, Ming Wen, Yepang Liu 0001, Yibo Wang, Zhenming Li, Chao Wang, Hai Yu, Shing-Chi Cheung, Chang Xu, Zhiliang Zhu 0001. 125-135 [doi]
- One size does not fit all: a grounded theory and online survey study of developer preferences for security warning typesAnastasia Danilova, Alena Naiakshina, Matthew Smith 0001. 136-148 [doi]
- Schrödinger's security: opening the box on app developers' security rationaleDirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John Towse, Awais Rashid. 149-160 [doi]
- How software practitioners use informal local meetups to share software engineering knowledgeClaire Ingram, Anders Drachen. 161-173 [doi]
- Predicting developers' negative feelings about code reviewCarolyn D. Egelman, Emerson R. Murphy-Hill, Elizabeth Kammer, Margaret Morrow Hodges, Collin Green, Ciera Jaspan, James Lin. 174-185 [doi]
- Near-duplicate detection in web app model inferenceRahulkrishna Yandrapally, Andrea Stocco 0001, Ali Mesbah 0001. 186-197 [doi]
- Extracting taint specifications for JavaScript librariesCristian-Alexandru Staicu, Martin Toldam Torp, Max Schäfer, Anders Møller, Michael Pradel. 198-209 [doi]
- SLACC: simion-based language agnostic code clonesGeorge Mathew, Chris Parnin, Kathryn T. Stolee. 210-221 [doi]
- Finding client-side business flow tampering vulnerabilitiesI Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang 0001. 222-233 [doi]
- Securing unsafe rust programs with XRustPeiming Liu, Gang Zhao, Jeff Huang 0001. 234-245 [doi]
- Is rust used safely by software developers?Ana Nora Evans, Bradford Campbell, Mary Lou Soffa. 246-257 [doi]
- Burn after reading: a shadow stack with microsecond-level runtime rerandomization for protecting return addressesChangwei Zou, Jingling Xue. 258-270 [doi]
- SAVER: scalable, precise, and safe memory-error repairSeongjoon Hong, Junhee Lee, Jeongsoo Lee, Hakjoo Oh. 271-283 [doi]
- Revealing injection vulnerabilities by leveraging existing testsKatherine Hough, Gebrehiwet B. Welearegai, Christian Hammer 0001, Jonathan Bell. 284-296 [doi]
- RoScript: a visual script driven truly non-intrusive robotic testing system for touch screen applicationsJu Qian, Zhengyu Shang, Shuoyan Yan, Yan Wang, Lin Chen. 297-308 [doi]
- Translating video recordings of mobile app usages into replayable scenariosCarlos Bernal-Cárdenas, Nathan Cooper, Kevin Moran, Oscar Chaparro, Andrian Marcus, Denys Poshyvanyk. 309-321 [doi]
- Unblind your apps: predicting natural-language labels for mobile GUI components by deep learningJieshan Chen, Chunyang Chen, Zhenchang Xing, Xiwei Xu, Liming Zhu, Guoqiang Li 0001, Jinshui Wang. 322-334 [doi]
- SLEMI: equivalence modulo input (EMI) based mutation of CPS models for finding compiler bugs in SimulinkShafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T. Johnson, Christoph Csallner. 335-346 [doi]
- DeepBillboard: systematic physical-world testing of autonomous driving systemsHusheng Zhou, Wei Li, Zelun Kong, Junfeng Guo, Yuqun Zhang, Bei Yu 0001, Lingming Zhang, Cong Liu 0005. 347-358 [doi]
- Misbehaviour prediction for autonomous driving systemsAndrea Stocco 0001, Michael Weiss, Marco Calzana, Paolo Tonella. 359-371 [doi]
- Approximation-refinement testing of compute-intensive cyber-physical models: an approach based on system identificationClaudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache. 372-384 [doi]
- A comprehensive study of autonomous vehicle bugsJoshua Garcia, Yang Feng, Junjie Shen 0001, Sumaya Almanee, Yuan Xia, Qi Alfred Chen. 385-396 [doi]
- Studying the use of Java logging utilities in the wildBoyuan Chen, Zhen Ming (Jack) Jiang. 397-408 [doi]
- A study on the prevalence of human values in software engineering publications, 2015 - 2018Harsha Perera, Waqar Hussain, Jon Whittle, Arif Nurwidyantoro, Davoud Mougouei, Rifat Ara Shams, Gillian Oliver. 409-420 [doi]
- Explaining pair programming session dynamics from knowledge gapsFranz Zieris, Lutz Prechelt. 421-432 [doi]
- Engineering gender-inclusivity into software: ten teams' tales from the trenchesClaudia Hilderbrand, Christopher Perdriau, Lara Letaw, Jillian Emard, Zoe Steine-Hanson, Margaret Burnett, Anita Sarma. 433-444 [doi]
- How has forking changed in the last 20 years?: a study of hard forks on GitHubShurui Zhou, Bogdan Vasilescu, Christian Kästner. 445-456 [doi]
- Multiple-entry testing of Android applications by constructing activity launching contextsJiwei Yan, Hao Liu, Linjie Pan, Jun Yan 0009, Jian Zhang 0001, Bin Liang. 457-468 [doi]
- ComboDroid: generating high-quality test inputs for Android apps via use case combinationsJue Wang, Yanyan Jiang 0001, Chang Xu, Chun Cao, Xiaoxing Ma, Jian Lu. 469-480 [doi]
- Time-travel testing of Android appsZhen Dong, Marcel Böhme, Lucia Cojocaru, Abhik Roychoudhury. 481-492 [doi]
- HeteroRefactor: refactoring for heterogeneous computing with FPGAJason Lau, Aishwarya Sivaraman, Qian Zhang, Muhammad Ali Gulzar, Jason Cong, Miryung Kim. 493-505 [doi]
- HARP: holistic analysis for refactoring Python-based analytics programsWeijie Zhou, Yue Zhao 0011, Guoqiang Zhang, Xipeng Shen. 506-517 [doi]
- CC2Vec: distributed representations of code changesThong Hoang, Hong Jin Kang, David Lo 0001, Julia Lawall. 518-529 [doi]
- Empirical review of automated analysis tools on 47, 587 Ethereum smart contractsThomas Durieux, João F. Ferreira, Rui Abreu, Pedro Cruz. 530-541 [doi]
- Gap between theory and practice: an empirical study of security patches in soliditySungjae Hwang, Sukyoung Ryu. 542-553 [doi]
- An investigation of cross-project learning in online just-in-time software defect predictionSadia Tabassum, Leandro L. Minku, Danyi Feng, George G. Cabral, Liyan Song. 554-565 [doi]
- Understanding the automated parameter optimization on transfer learning for cross-project defect prediction: an empirical studyKe Li, Zilin Xiang, Tao Chen 0001, Shuo Wang, Kay Chen Tan. 566-577 [doi]
- Software visualization and deep transfer learning for effective software defect predictionJinyin Chen, Keke Hu, Yue Yu 0001, Zhuangzhi Chen, Qi Xuan, Yi Liu 0024, Vladimir Filkov. 578-589 [doi]
- Software documentation: the practitioners' perspectiveEmad Aghajani, Csaba Nagy 0001, Mario Linares Vásquez, Laura Moreno, Gabriele Bavota, Michele Lanza, David C. Shepherd. 590-601 [doi]
- DLFix: context-based code transformation learning for automated program repairYi Li, Shaohua Wang 0002, Tien N. Nguyen. 602-614 [doi]
- On the efficiency of test suite based program repair: A Systematic Assessment of 16 Automated Repair Systems for Java ProgramsKui Liu 0001, Shangwen Wang, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim 0001, Peng Wu, Jacques Klein, Xiaoguang Mao, Yves Le Traon. 615-627 [doi]
- Caspar: extracting and synthesizing user stories of problems from app reviewsHui Guo 0002, Munindar P. Singh. 628-640 [doi]
- Detection of hidden feature requests from massive chat messages via deep siamese networkLin Shi, Mingzhe Xing, Mingyang Li, Yawen Wang, Shoubin Li, Qing Wang 0001. 641-653 [doi]
- A tale from the trenches: cognitive biases and software developmentSouti Chattopadhyay, Nicholas Nelson 0002, Audrey Au, Natalia Morales, Christopher Sanchez, Rahul Pandita, Anita Sarma. 654-665 [doi]
- Recognizing developers' emotions while programmingDaniela Girardi, Nicole Novielli, Davide Fucci, Filippo Lanubile. 666-677 [doi]
- Neurological divide: an fMRI study of prose and code writingRyan Krueger, Yu Huang 0015, Xinyu Liu, Tyler Santander, Westley Weimer, Kevin Leach. 678-690 [doi]
- Here we go again: why is it difficult for developers to learn another programming language?Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin. 691-701 [doi]
- Importance-driven deep learning system testingSimos Gerasimou, Hasan Ferit Eniser, Alper Sen 0001, Alper Cakan. 702-713 [doi]
- ReluDiff: differential verification of deep neural networksBrandon Paulsen, Jingbo Wang, Chao Wang. 714-726 [doi]
- Dissector: input validation for deep learning applications by crossing-layer dissectionHuiyan Wang, Jingwei Xu 0001, Chang Xu 0001, Xiaoxing Ma, Jian Lu 0001. 727-738 [doi]
- Towards characterizing adversarial defects of deep learning software from the lens of uncertaintyXiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu 0003, Jianjun Zhao, Meng Sun 0002. 739-751 [doi]
- Gang of eight: a defect taxonomy for infrastructure as code scriptsAkond Rahman, Effat Farhana, Chris Parnin, Laurie A. Williams. 752-764 [doi]
- MemLock: memory usage guided fuzzingCheng Wen, Haijun Wang, Yuekang Li, Shengchao Qin, Yang Liu, Zhiwu Xu, Hongxu Chen, Xiaofei Xie, Geguang Pu, Ting Liu. 765-777 [doi]
- sFuzz: an efficient adaptive fuzzer for solidity smart contractsTai D. Nguyen, Long H. Pham, Jun Sun 0001, Yun Lin, Quang Tran Minh 0001. 778-788 [doi]
- Targeted greybox fuzzing with static lookahead analysisValentin Wüstholz, Maria Christakis. 789-800 [doi]
- Planning for untangling: predicting the difficulty of merge conflictsCaius Brindescu, Iftekhar Ahmed 0001, Rafael Leano, Anita Sarma. 801-811 [doi]
- Conquering the extensional scalability problem for value-flow analysis frameworksQingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang. 812-823 [doi]
- Tailoring programs for static analysis via program transformationRijnard van Tonder, Claire Le Goues. 824-834 [doi]
- Pipelining bottom-up data flow analysisQingkai Shi, Charles Zhang. 835-847 [doi]
- A novel approach to tracing safety requirements and state-based design modelsMounifah Alenazi, Nan Niu, Juha Savolainen. 848-860 [doi]
- Establishing multilevel test-to-code traceability linksRobert White, Jens Krinke, Raymond Tan. 861-872 [doi]
- Improving the effectiveness of traceability link recovery using hierarchical bayesian networksKevin Moran, David N. Palacio, Carlos Bernal-Cárdenas, Daniel McCrystal, Denys Poshyvanyk, Chris Shenefiel, Jeff Johnson. 873-885 [doi]
- How Android developers handle evolution-induced API compatibility issues: a large-scale studyHao Xia, Yuan Zhang 0009, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang 0001, Zhemin Yang. 886-898 [doi]
- An empirical study on API parameter rulesHao Zhong, Na Meng, Zexuan Li, Li Jia. 899-911 [doi]
- When APIs are intentionally bypassed: an exploratory study of API workaroundsMaxime Lamothe, Weiyi Shang. 912-924 [doi]
- Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patchesXiaoxue Ren, Jiamou Sun, Zhenchang Xing, Xin Xia 0001, Jianling Sun. 925-936 [doi]
- Simulee: detecting CUDA synchronization bugs via memory-access modelingMingyuan Wu, Yicheng Ouyang, Husheng Zhou, Lingming Zhang, Cong Liu 0005, Yuqun Zhang. 937-948 [doi]
- White-box fairness testing through adversarial samplingPeixin Zhang, Jingyi Wang, Jun Sun 0001, Guoliang Dong, Xinyu Wang 0001, Xingen Wang, Jin Song Dong, Ting Dai. 949-960 [doi]
- Structure-invariant testing for machine translationPinjia He, Clara Meister, Zhendong Su. 961-973 [doi]
- Automatic testing and improvement of machine translationZeyu Sun, Jie M. Zhang, Mark Harman, Mike Papadakis, Lu Zhang. 974-985 [doi]
- TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networksGuanhong Tao, ShiQing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang. 986-998 [doi]
- Typestate-guided fuzzer for discovering use-after-free vulnerabilitiesHaijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, Yulei Sui. 999-1010 [doi]
- JVM fuzzing for JIT-induced side-channel detectionTegan Brennan, Seemanta Saha, Tevfik Bultan. 1011-1023 [doi]
- Ankou: guiding grey-box fuzzing towards combinatorial differenceValentin J. M. Manès, Soomin Kim 0002, Sang Kil Cha. 1024-1036 [doi]
- BCFA: bespoke control flow analysis for CFA at scaleRamanathan Ramu, Ganesha B. Upadhyaya, Hoan Anh Nguyen, Hridesh Rajan. 1037-1048 [doi]
- On the recall of static call graph construction in practiceLi Sui, Jens Dietrich 0001, Amjed Tahir, George Fourtounis. 1049-1060 [doi]
- Heaps'n leaks: how heap snapshots improve Android taint analysisManuel Benz, Erik Krogh Kristensen, Linghui Luo, Nataniel P. Borges, Eric Bodden, Andreas Zeller. 1061-1072 [doi]
- Big code != big vocabulary: open-vocabulary models for source codeRafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, Andrea Janes. 1073-1085 [doi]
- Improving data scientist efficiency with provenanceJingmei Hu, Jiwon Joung, Maia Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer. 1086-1097 [doi]
- Managing data constraints in database-backed web applicationsJunwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung, Shan Lu 0001. 1098-1109 [doi]
- Taxonomy of real faults in deep learning systemsNargiz Humbatova, Gunel Jahangirova, Gabriele Bavota, Vincenzo Riccio, Andrea Stocco 0001, Paolo Tonella. 1110-1121 [doi]
- Testing DNN image classifiers for confusion & bias errorsYuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail E. Kaiser, Baishakhi Ray. 1122-1134 [doi]
- Repairing deep neural networks: fix patterns and challengesMd Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan. 1135-1146 [doi]
- Fuzz testing based data augmentation to improve robustness of deep neural networksXiang Gao, Ripon K. Saha, Mukul R. Prasad, Abhik Roychoudhury. 1147-1158 [doi]
- An empirical study on program failures of deep learning jobsRu Zhang, Wencong Xiao, Hongyu Zhang, Yu Liu, Haoxiang Lin, Mao Yang. 1159-1170 [doi]
- Primers or reminders?: the effects of existing review comments on code reviewDavide Spadini, Gül Çalikli, Alberto Bacchelli. 1171-1182 [doi]
- Mitigating turnover with code review recommendation: balancing expertise, workload, and knowledge distributionEhsan Mirsaeedi, Peter C. Rigby. 1183-1195 [doi]
- How do companies collaborate in open source ecosystems?: an empirical study of OpenStackYuxia Zhang, Minghui Zhou, Klaas-Jan Stol, Jianyu Wu, Zhi Jin. 1196-1208 [doi]
- How to not get rich: an empirical study of donations in open sourceCassandra Overney, Jens Meinicke, Christian Kästner, Bogdan Vasilescu. 1209-1221 [doi]
- Scaling open source communities: an empirical study of the Linux kernelXin Tan, Minghui Zhou, Brian Fitzgerald 0001. 1222-1234 [doi]
- SpecuSym: speculative symbolic execution for cache timing leak detectionShengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo 0001. 1235-1247 [doi]
- Symbolic verification of message passing interface programsHengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong. 1248-1260 [doi]
- Efficient generation of error-inducing floating-point inputs via symbolic executionHui Guo 0007, Cindy Rubio-González. 1261-1272 [doi]
- HyDiff: hybrid differential software analysisYannic Noller, Corina S. Pasareanu, Marcel Böhme, Youcheng Sun, Hoang Lam Nguyen, Lars Grunske. 1273-1285 [doi]
- Seenomaly: vision-based linting of GUI animation effects against design-don't guidelinesDehai Zhao, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li 0001, Jinshui Wang. 1286-1297 [doi]
- Low-overhead deadlock predictionYan Cai 0001, Ruijie Meng, Jens Palsberg. 1298-1309 [doi]
- An empirical assessment of security risks of global Android banking appsSen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu. 1310-1322 [doi]
- Accessibility issues in Android apps: state of affairs, sentiments, and ways forwardAbdulaziz Alshayban, Iftekhar Ahmed 0001, Sam Malek. 1323-1334 [doi]
- Collaborative bug finding for Android appsShin Hwei Tan, Ziqiang Li. 1335-1347 [doi]
- POSIT: simultaneously tagging natural and programming languagesProfir-Petru Pârtachi, Santanu Kumar Dash, Christoph Treude, Earl T. Barr. 1348-1358 [doi]
- CPC: automatically classifying and propagating natural language comments via program analysisJuan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, ShiQing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang. 1359-1371 [doi]
- Suggesting natural method names to check name consistenciesSon Nguyen, Hung Phan, Trinh Le, Tien N. Nguyen. 1372-1384 [doi]
- Retrieval-based neural source code summarizationJian Zhang, Xu Wang, Hongyu Zhang 0002, Hailong Sun 0001, Xudong Liu 0001. 1385-1397 [doi]
- On learning meaningful assert statements for unit test casesCody Watson, Michele Tufano, Kevin Moran, Gabriele Bavota, Denys Poshyvanyk. 1398-1409 [doi]
- Quickly generating diverse valid test inputs with reinforcement learningSameer Reddy, Caroline Lemieux, Rohan Padhye, Koushik Sen. 1410-1421 [doi]
- An evidence-based inquiry into the use of grey literature in software engineeringHe Zhang 0001, Xin Zhou, Xin Huang, Huang Huang, Muhammad Ali Babar. 1422-1434 [doi]
- Towards the use of the readily available tests from the release pipeline as performance tests: are we there yet?Zishuo Ding, Jinfu Chen, Weiyi Shang. 1435-1446 [doi]
- Verifying object constructionMartin Kellogg, Manli Ran, Manu Sridharan, Martin Schäf, Michael D. Ernst. 1447-1458 [doi]
- Automatically testing string solversAlexandra Bugariu, Peter Müller 0001. 1459-1470 [doi]
- A study on the lifecycle of flaky testsWing Lam, Kivanç Muslu, Hitesh Sajnani, Suresh Thummalapenta. 1471-1482 [doi]
- Testing file system implementations on layered modelsDongjie Chen, Yanyan Jiang 0001, Chang Xu 0001, Xiaoxing Ma, Jian Lu 0001. 1483-1495 [doi]
- Co-evolving code with evolving metamodelsDjamel Eddine Khelladi, Benoît Combemale, Mathieu Acher, Olivier Barais, Jean-Marc Jézéquel. 1496-1508 [doi]
- Lazy product discovery in huge configuration spacesMichael Lienhardt, Ferruccio Damiani, Einar Broch Johnsen, Jacopo Mauro. 1509-1521 [doi]
- Reducing run-time adaptation space via analysis of possible utility boundsClay Stevens, Hamid Bagheri. 1522-1534 [doi]
- Context-aware in-process crowdworker recommendationJunjie Wang, Ye Yang, Song Wang 0009, Yuanzhe Hu, Dandan Wang, Qing Wang. 1535-1546 [doi]
- A large-scale empirical study on vulnerability distribution within projects and the lessons learnedBingchang Liu, Guozhu Meng, Wei Zou, Qi Gong, Feng Li, Min Lin, Dandan Sun, Wei Huo, Chao Zhang 0008. 1547-1559 [doi]
- Unsuccessful story about few shot malware family classification and siamese network to the rescueYude Bai, Zhenchang Xing, Xiaohong Li 0001, Zhiyong Feng 0002, Duoyuan Ma. 1560-1571 [doi]
- How does misconfiguration of analytic services compromise mobile privacy?Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu. 1572-1583 [doi]
- Interpreting cloud computer vision pain-points: a mining study of stack overflowAlex Cummaudo, Rajesh Vasa, Scott Barnett, John C. Grundy, Mohamed Abdelrazek. 1584-1596 [doi]