Abstract is missing.
- Threats to validity in experimenting mutation-based fault localizationJuyoung Jeon, Shin Hong. 1-4 [doi]
- Hey, my data are mine!: active data to empower the userGian Luca Scoccia, Marco Autili, Patrizio Pelliccione, Paola Inverardi, Matteo Maria Fiore, Alejandro Russo. 5-8 [doi]
- Threat modeling: from infancy to maturityKoen Yskout, Thomas Heyman, Dimitri Van Landuyt, Laurens Sion, Kim Wuyts, Wouter Joosen. 9-12 [doi]
- Code duplication on stack overflowSebastian Baltes, Christoph Treude. 13-16 [doi]
- Automatically predicting bug severity early in the development processJude Arokiam, Jeremy S. Bradbury. 17-20 [doi]
- Where should I comment my code?: a dataset and model for predicting locations that need commentsAnnie Louis, Santanu Kumar Dash, Earl T. Barr, Michael D. Ernst, Charles A. Sutton. 21-24 [doi]
- A theory of dual channel constraintsCasey Casalnuovo, Earl T. Barr, Santanu Kumar Dash, Prem Devanbu, Emily Morgan. 25-28 [doi]
- Is your quantum program bug-free?Andriy V. Miranskyy, Lei Zhang 0078, Javad Doliskani. 29-32 [doi]
- Blending kinematic and software models for tighter reachability analysisCarl Hildebrandt, Sebastian G. Elbaum, Nicola Bezzo. 33-36 [doi]
- Towards understanding emotional response to requirements changes in agile teamsKashumi Madampe, Rashina Hoda, Paramvir Singh. 37-40 [doi]
- CHASE: checklist to assess user experience in IoT environmentsRodrigo L. A. Almeida, Rossana M. C. Andrade, Ticianne G. R. Darin, Joseane de O. V. Paiva. 41-44 [doi]
- Why will my question be closed?: NLP-based pre-submission predictions of question closing reasons on stack overflowLászló Tóth 0002, Balázs Nagy, Tibor Gyimóthy, László Vidács. 45-48 [doi]
- Eye of the mind: image processing for social codingMaleknaz Nayebi. 49-52 [doi]
- Better code, better sharing: on the need of analyzing jupyter notebooksJiawei Wang, Li Li, Andreas Zeller. 53-56 [doi]
- Stress and burnout in open source: toward finding, understanding, and mitigating unhealthy interactionsNaveen Raman, Minxuan Cao, Yulia Tsvetkov, Christian Kästner, Bogdan Vasilescu. 57-60 [doi]
- Synthesis of assurance cases for software certificationHamid Bagheri, Eunsuk Kang, Niloofar Mansoor. 61-64 [doi]
- Program debloating via stochastic optimizationQi Xin, MyeongSoo Kim, Qirun Zhang, Alessandro Orso. 65-68 [doi]
- A container-based infrastructure for fuzzy-driven root causing of flaky testsValerio Terragni, Pasquale Salza, Filomena Ferrucci. 69-72 [doi]
- Cooperative API misuse detection using correction rulesSebastian Nielebock 0001, Robert Heumüller, Jacob Krüger, Frank Ortmeier. 73-76 [doi]
- Boosting automated program repair with bug-inducing commitsMing Wen, Yepang Liu 0001, Shing-Chi Cheung. 77-80 [doi]
- Using hypersafety verification for proving correctness of programming assignmentsJude K. Anil, Sumanth Prabhu, Kumar Madhukar, R. Venkatesh. 81-84 [doi]
- On the power of abstraction: a model-driven co-evolution approach of software codeDjamel Eddine Khelladi, Benoît Combemale, Mathieu Acher, Olivier Barais. 85-88 [doi]
- Understanding FLOSS through community publications: strategies for grey literature reviewMelissa Wen, Leonardo A. F. Leite, Fabio Kon, Paulo Meirelles. 89-92 [doi]
- With registered reports towards large scale data curationSteffen Herbold. 93-96 [doi]
- Manifold for machine learning assuranceTaejoon Byun, Sanjai Rayadurgam. 97-100 [doi]
- Visual sketching: from image sketches to codeMarcelo d'Amorim, Rui Abreu, Carlos Mello. 101-104 [doi]
- Towards engineering future gameful applicationsAntonio Bucchiarone, Antonio Cicchetti, Annapaola Marconi. 105-108 [doi]
- Predictive constraint solving and analysisAlyas Almaawi, Nima Dini, Cagdas Yelen, Milos Gligoric, Sasa Misailovic, Sarfraz Khurshid. 109-112 [doi]