Abstract is missing.
- SLEMI: finding simulink compiler bugs through equivalence modulo input (EMI)Shafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T. Johnson, Christoph Csallner. 1-4 [doi]
- PROMISE: high-level mission specification for multiple robotsSergio García 0002, Patrizio Pelliccione, Claudio Menghi, Thorsten Berger, Tomás Bures. 5-8 [doi]
- SMRL: a metamorphic security testing tool for web systemsPhu X. Mai, Arda Goknil, Fabrizio Pastore, Lionel C. Briand. 9-12 [doi]
- WasmView: visual testing for webassembly applicationsAlan Romano, Weihang Wang. 13-16 [doi]
- AppTestMigrator: a tool for automated test migration for Android appsFarnaz Behrang, Alessandro Orso. 17-20 [doi]
- Seraph: enabling cross-platform security analysis for EVM and WASM smart contractsZhiqiang Yang, Han Liu, Yue Li, Huixuan Zheng, Lei Wang, Bangdao Chen. 21-24 [doi]
- The SmartSHARK ecosystem for software repository miningAlexander Trautsch, Fabian Trautsch, Steffen Herbold, Benjamin Ledel, Jens Grabowski. 25-28 [doi]
- DeepMutation: a neural mutation toolMichele Tufano, Jason Kimko, Shiya Wang, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Denys Poshyvanyk. 29-32 [doi]
- TimeTracer: a tool for back in time traceability replayingChristoph Mayr-Dorn, Michael Vierhauser, Felix Keplinger, Stefan Bichler, Alexander Egyed. 33-36 [doi]
- SimilarAPI: mining analogical APIs for library migrationChunyang Chen. 37-40 [doi]
- FeatureNET: diversity-driven generation of deep learning modelsSalah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon. 41-44 [doi]
- EvalDNN: a toolbox for evaluating deep neural network modelsYongqiang Tian, Zhihua Zeng, Ming Wen, Yepang Liu 0001, Tzu-yang Kuo, Shing-Chi Cheung. 45-48 [doi]
- FuRong: fusing report of automated Android testing on multi-devicesYuanhan Tian, Shengcheng Yu, Chunrong Fang, Peiyuan Li. 49-52 [doi]
- Phoenix: a tool for automated data-driven synthesis of repairs for static analysis violationsHiroaki Yoshida, Rohan Bavishi, Keisuke Hotta, Yusuke Nemoto, Mukul R. Prasad, Shinji Kikuchi. 53-56 [doi]
- VITALSE: visualizing eye tracking and biometric dataDevjeet Roy, Sarah Fakhoury, Venera Arnaoudova. 57-60 [doi]
- BigTest: a symbolic execution based systematic test generation tool for Apache sparkMuhammad Ali Gulzar, Madanlal Musuvathi, Miryung Kim. 61-64 [doi]
- PG-KLEE: trading soundness for coverageRichard Rutledge, Alessandro Orso. 65-68 [doi]
- RTj: a Java framework for detecting and refactoring rotten green test casesMatias Martinez, Anne Etien, Stéphane Ducasse, Christopher Fuhrman. 69-72 [doi]
- GeekyNote: a technical documentation tool with coverage, backtracking, traces, and couplingsYung-Pin Cheng, Wei-Nien Hsiung, Yu-Shan Wu, Li-Hsuan Chen. 73-76 [doi]
- DroidMutator: an effective mutation analysis tool for Android applicationsJian Liu, Xusheng Xiao, Lihua Xu, Liang Dou, Andy Podgurski. 77-80 [doi]
- An SLR-tool: search process in practice: a tool to conduct and manage systematic literature review (SLR)Andreas Hinderks, Francisco José Domínguez-Mayo, Jörg Thomaschewski, María José Escalona. 81-84 [doi]
- Nimbus: improving the developer experience for serverless applicationsRobert Chatley, Thomas Allerton. 85-88 [doi]
- mCoq: mutation analysis for Coq verification projectsKush Jain, Karl Palmskog, Ahmet Çelik, Emilio Jesús Gallego Arias, Milos Gligoric. 89-92 [doi]
- MPI-SV: a symbolic verifier for MPI programsZhenbang Chen, Hengbiao Yu, Xianjin Fu, Ji Wang. 93-96 [doi]
- DCO analyzer: local controllability and observability analysis and enforcement of distributed test scenariosBruno Lima, João Pascoal Faria. 97-100 [doi]
- Uncertainty-guided testing and robustness enhancement for deep learning systemsXiyue Zhang. 101-103 [doi]
- Evaluation of brain activity while pair programmingAnanga Thapaliya. 104-106 [doi]
- Machine translation testing via pathological invarianceShashij Gupta. 107-109 [doi]
- Automatic generation of simulink models to find bugs in a cyber-physical system tool chain using deep learningSohil Lal Shrestha. 110-112 [doi]
- Playing with your project data in scrum retrospectivesChristoph Matthies. 113-115 [doi]
- An empirical study of the first contributions of developers to open source projects on GitHubVikram N. Subramanian. 116-118 [doi]
- Stress testing SMT solvers via type-aware mutationChengyu Zhang. 119-121 [doi]
- The role of egocentric bias in undergraduate Agile software development teamsFrederike Ramin. 122-124 [doi]
- Studying and suggesting logging locations in code blocksZhenhao Li. 125-127 [doi]
- Exploring the relationship between dockerfile quality and project characteristicsYiwen Wu. 128-130 [doi]
- Hanging by the thread: an empirical study of donations in open sourceCassandra Overney. 131-133 [doi]
- An automated framework for gaming platform to test multiple gamesZihe Song. 134-136 [doi]
- Improving bug detection and fixing via code representation learningYi Li. 137-139 [doi]
- Automated analysis of inter-parameter dependencies in web APIsAlberto Martin-Lopez. 140-142 [doi]
- Detection and mitigation of JIT-induced side channelsTegan Brennan. 143-145 [doi]
- Does fixing bug increase robustness in deep learning?Rangeet Pan. 146-148 [doi]
- An empirical study on the evolution of test smellDong Jae Kim. 149-151 [doi]
- Efficient test execution in end to end testing: resource optimization in end to end testing through a smart resource characterization and orchestrationCristian Augusto. 152-154 [doi]
- Towards automated migration for blockchain-based decentralized applicationXiuFeng Xu. 155-157 [doi]
- Skill-based engineering in industrial automation domain: skills modeling and orchestrationKirill Dorofeev. 158-161 [doi]
- Scalable and approximate program dependence analysisSeongmin Lee 0001. 162-165 [doi]
- The effects of required security on software development effortElaine Venson. 166-169 [doi]
- Towards greener Android application developmentHina Anwar. 170-173 [doi]
- Towards DO-178C certification of adaptive learning UAV agents designed with a cognitive architectureJohn Pyrgies. 174-177 [doi]
- Bridging the divide between API users and API developers by mining public code repositoriesMaxime Lamothe. 178-181 [doi]
- Refactoring operations Grounded in manual code changesAnna Maria Eilertsen. 182-185 [doi]
- A composed technical debt identification methodology to predict software vulnerabilitiesRusen Halepmollasi. 186-189 [doi]
- Variability aware requirements reuse analysisMuhammad Abbas. 190-193 [doi]
- KNOCAP: capturing and delivering important design bits in whiteboard design meetingsAdriana Meza Soria. 194-197 [doi]
- Towards providing automated supports to developers on writing logging statementsZhenhao Li. 198-201 [doi]
- AI-driven web API testingAlberto Martin-Lopez. 202-205 [doi]
- Performance regression detection in DevOpsJinfu Chen. 206-209 [doi]
- Formalization and analysis of quantitative attributes of distributed systemsAgustín E. Martinez Suñé. 210-213 [doi]
- Bridging fault localisation and defect predictionJeongju Sohn. 214-217 [doi]
- Improving students' testing practicesGina R. Bai. 218-221 [doi]
- The sustainability of quality in free and open source softwareAdam Alami. 222-225 [doi]
- Understanding software changes: extracting, classifying, and presenting fine-grained source code changesVeit Frick. 226-229 [doi]
- Search-based test generation for Android appsIván Arcuschin Moreno. 230-233 [doi]
- Extracting archival-quality information from software-related chatsPreetha Chatterjee. 234-237 [doi]
- Software startups in growth phase SE practices adopted to SEEOrges Cico. 238-241 [doi]
- Towards better technical debt detection with NLP and machine learning methodsLeevi Rantala. 242-245 [doi]
- Towards data integrity in Cassandra database applications using conceptual modelsPablo Suárez-Otero. 246-249 [doi]
- Experiential learning in computing accessibility educationWeishi Shi, Saad Khan, Yasmine N. El-Glaly, Samuel A. Malachowsky, Qi Yu 0001, Daniel E. Krutz. 250-251 [doi]
- Large-scale patch recommendation at AlibabaXindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu. 252-253 [doi]
- Do preparatory programming lab sessions contribute to even work distribution in student teams?Markus Borg. 254-255 [doi]
- A practical, collaborative approach for modeling big data analytics application requirementsHourieh Khalajzadeh, Andrew J. Simmons, Mohamed Abdelrazek 0001, John C. Grundy, John G. Hosking, Qiang He 0001, Prasanna Ratnakanthan, Adil Zia, Meng Law. 256-257 [doi]
- A mixed methods research agenda to identify undergraduate misconceptions in software engineering, lecturers' handling, and didactical implicationsCarolin Gold-Veerkamp, Ira Diethelm, Jörg Abke. 258-259 [doi]
- Understanding DevOps education with Grounded theoryCandy Pang, Abram Hindle, Denilson Barbosa. 260-261 [doi]
- Understanding and handling alert storm for online service systemsNengwen Zhao, Junjie Chen 0003, Xiao Peng, Honglin Wang, Xinya Wu, Yuanzong Zhang, Zikai Chen, Xiangzhong Zheng, Xiaohui Nie, Gang Wang, Yong Wu, Fang Zhou, Wenchi Zhang, Kaixin Sui, Dan Pei. 262-263 [doi]
- Factors influencing software engineering career choice of Andean indigenousMary Sánchez-Gordón, Ricardo Colomo Palacios. 264-265 [doi]
- ProvBuild: improving data scientist efficiency with provenanceJingmei Hu, Jiwon Joung, Maia Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer. 266-267 [doi]
- How has forking changed in the last 20 years?: a study of hard forks on GitHubShurui Zhou, Bogdan Vasilescu, Christian Kästner. 268-269 [doi]
- Scaling application-level dynamic taint analysis to enterprise-scale distributed systemsXiaoqin Fu, Haipeng Cai. 270-271 [doi]
- Evolutionary hot-spots in software systemsRobert Benkoczi, Daya Gaur, Shahadat Hossain, Muhammad Khan, Ajay Raj Tedlapu. 272-273 [doi]
- Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contractsJiaming Ye, Mingliang Ma, Yun Lin 0001, Yulei Sui, Yinxing Xue. 274-275 [doi]
- Towards automatic assessment of object-oriented programsPasquale Ardimento, Mario Luca Bernardi, Marta Cimitile. 276-277 [doi]
- Bugine: a bug report recommendation system for Android appsZiqiang Li, Shin Hwei Tan. 278-279 [doi]
- Identifying compatibility-related APIs by exploring biased distribution in Android appsChen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Cheng Su, Guangshuai Mo. 280-281 [doi]
- Lean kanban in an industrial context: a success storyRoberto Hens Pato, David Granada, Juan M. Vara, Esperanza Marcos. 282-283 [doi]
- Preliminary findings on FOSS dependencies and security: a qualitative study on developers' attitudes and experienceIvan Pashchenko, Duc Ly Vu, Fabio Massacci. 284-285 [doi]
- What disconnects practitioner belief and empirical evidence?N. C. Shrikanth, Tim Menzies. 286-287 [doi]
- Restoring reproducibility of Jupyter notebooksJiawei Wang, Tzu-yang Kuo, Li Li 0029, Andreas Zeller. 288-289 [doi]
- Identification of cultural influences on requirements engineering activitiesTawfeeq Alsanoosy, Maria Spichkova, James Harland. 290-291 [doi]
- An exploratory study on improving automated issue triage with attached screenshotsEthem Utku Aktas, Cemal Yilmaz. 292-293 [doi]
- Open-vocabulary models for source codeRafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, Andrea Janes. 294-295 [doi]
- Building a theory of software teams organization in a continuous delivery contextLeonardo A. F. Leite, Fabio Kon, Gustavo Pinto 0001, Paulo Meirelles. 296-297 [doi]
- An intelligent tool for combatting contract cheating behaviour by facilitating scalable student-tutor discussionsJake Renzella, Andrew Cain, Jean-Guy Schneider. 298-299 [doi]
- Debugging inputsLukas Kirschner, Ezekiel O. Soremekun, Andreas Zeller. 300-301 [doi]
- Managing data constraints in database-backed web applicationsJunwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung, Shan Lu 0001. 302-303 [doi]
- Testing DNN image classifiers for confusion & bias errorsYuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail E. Kaiser, Baishakhi Ray. 304-305 [doi]
- Fluid intelligence doesn't matter!: effects of code examples on the usability of crypto APIsKai Mindermann, Stefan Wagner 0001. 306-307 [doi]
- Semantic analysis of issues on Google play and TwitterAman Yadav, Fatemeh Hendijani Fard. 308-309 [doi]
- Summary-guided incremental symbolic executionQiuping Yi, Junye Wen, Guowei Yang. 310-311 [doi]
- Elite developers' activities at open source ecosystem levelZhendong Wang, Yang Feng, Yi Wang, James A. Jones, David F. Redmiles. 312-313 [doi]
- GUI-focused overviews of mobile development videosMohammad Alahmadi, Abdulkarim Khormi, Sonia Haiduc. 314-315 [doi]
- Improving automated program repair using two-layer tree-based neural networksYi Li, Shaohua Wang 0002, Tien N. Nguyen. 316-317 [doi]
- An empirical study on the characteristics of question-answering process on developer forumsYi Li, Shaohua Wang 0002, Tien N. Nguyen. 318-319 [doi]
- Towards understanding and fixing upstream merge induced conflicts in divergent forks: an industrial case studyChungha Sung, Shuvendu K. Lahiri, Mike Kaufman, Pallavi Choudhury, Jessica Wolk, Chao Wang. 320-321 [doi]
- Importance-driven deep learning system testingSimos Gerasimou, Hasan Ferit Eniser, Alper Sen 0001, Alper Cakan. 322-323 [doi]
- Refactor4Green: a game for novice programmers to learn code smellsVartika Agrahari, Sridhar Chimalakonda. 324-325 [doi]
- Industry Agile practices in large-scale capstone projectsJean-Guy Schneider, Peter W. Eklund, Kevin Lee, Feifei Chen, Andrew Cain, Mohamed Abdelrazek 0001. 326-327 [doi]
- Real-world ethics for self-driving carsTobias Holstein, Gordana Dodig-Crnkovic, Patrizio Pelliccione. 328-329 [doi]