Abstract is missing.
- Using a context-aware approach to recommend code reviewers: findings from an industrial case studyAnton Strand, Markus Gunnarson, Ricardo Britto, Muhmmad Usman. 1-10 [doi]
- Code-level model checking in the software development workflowNathan Chong, Byron Cook, Konstantinos Kallas, Kareem Khazem, Felipe R. Monteiro, Daniel Schwartz-Narbonne, Serdar Tasiran, Michael Tautschnig, Mark R. Tuttle. 11-20 [doi]
- The forgotten case of the dependency bugs: on the example of the robot operating systemAnders Fischer-Nielsen, Zhoulai Fu, Ting Su, Andrzej Wasowski. 21-30 [doi]
- How do you architect your robots?: state of the practice and guidelines for ROS-based systemsIvano Malavolta, Grace A. Lewis, Bradley R. Schmerl, Patricia Lago, David Garlan. 31-40 [doi]
- Precfix: large-scale patch recommendation by mining defect-patch pairsXindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu. 41-50 [doi]
- Automated bug reproduction from user reviews for Android applicationsShuyue Li, Jiaqi Guo, Ming Fan, Jian-Guang Lou, Qinghua Zheng, Ting Liu. 51-60 [doi]
- continuous contrast set miningRebecca Qian, Yang Yu, Wonhee Park, Vijayaraghavan Murali, Stephen Fink, Satish Chandra 0001. 61-70 [doi]
- Automatic abnormal log detection by analyzing log history for providing debugging insightJinhan Kim, Valeriy Savchenko, Kihyuck Shin, Konstantin Sorokin, Hyunseok Jeon, Georgiy Pankratenko, Sergey Markov, Chul-Joo Kim. 71-80 [doi]
- Lack of adoption of units of measurement libraries: survey and anecdotesOmar-Alfred Salah, Steve McKeever. 81-89 [doi]
- Automated identification of libraries from vulnerability dataYang Chen, Andrew E. Santosa, Asankhaya Sharma, David Lo 0001. 90-99 [doi]
- Building and maintaining a third-party library supply chain for productive and secure SGX enclave developmentPei Wang, Yu Ding, Mingshen Sun, Huibo Wang, Tongxin Li, Rundong Zhou, Zhaofeng Chen, Yiming Jing. 100-109 [doi]
- Modeling and ranking flaky tests at AppleEmily Kowalczyk, Karan Nair, Zebao Gao, Leo Silberstein, Teng Long, Atif M. Memon. 110-119 [doi]
- Property-based testing for LG home appliances using accelerated software-in-the-loop simulationMingyu Park, Hoon Jang, Taejoon Byun, Yunja Choi. 120-129 [doi]
- Sharing at scale: an open-source-software-based license compliance ecosystemAran Azhakesan, Frances Paulisch. 130-131 [doi]
- How to reduce risk effectively in fixed price software developmentVolker Gruhn, Niklas Spitczok von Brisinski. 132-141 [doi]
- Escape from escape analysis of GolangCong Wang, Mingrui Zhang, Yu Jiang 0001, Huafeng Zhang, Zhenchang Xing, Ming Gu 0001. 142-151 [doi]
- Rule-based code generation in industrial automation: four large-scale case studies applying the CAYENNE methodHeiko Koziolek, Andreas Burger, Marie Platenius-Mohr, Julius Rückert, Hadil Abukwaik, Raoul Jetley, Abdulla P. P. 152-161 [doi]
- Understanding and handling alert storm for online service systemsNengwen Zhao, Junjie Chen 0003, Xiao Peng, Honglin Wang, Xinya Wu, Yuanzong Zhang, Zikai Chen, Xiangzhong Zheng, Xiaohui Nie, Gang Wang, Yong Wu, Fang Zhou, Wenchi Zhang, Kaixin Sui, Dan Pei. 162-171 [doi]
- Towards understanding and fixing upstream merge induced conflicts in divergent forks: an industrial case studyChungha Sung, Shuvendu K. Lahiri, Mike Kaufman, Pallavi Choudhury, Chao Wang. 172-181 [doi]
- Assessing practitioner beliefs about software defect predictionN. C. Shrikanth, Tim Menzies. 182-190 [doi]
- Engineering for a science-centric experimentation platformNikos Diamantopoulos, Jeffrey Wong, David Issa Mattos, Ilias Gerostathopoulos, Matthew Wardrop, Tobias Mao, Colin McFarland. 191-200 [doi]
- DeCaf: diagnosing and triaging performance issues in large-scale cloud servicesChetan Bansal, Sundararajan Renganathan, Ashima Asudani, Olivier Midy, Mathru Janakiraman. 201-210 [doi]
- JSidentify: a hybrid framework for detecting plagiarism among JavaScript code in online mini gamesQun Xia, Zhongzhu Zhou, Zhihao Li, Bin Xu, Wei Zou, Zishun Chen, Huafeng Ma, Gangqiang Liang, Haochuan Lu, Shiyu Guo, Ting Xiong, Yuetang Deng, Tao Xie. 211-220 [doi]
- Piranha: reducing feature flag debt at uberMurali Krishna Ramanathan, Lazaro Clapp, Rajkishore Barik, Manu Sridharan. 221-230 [doi]
- Software development data for architecture analysis: expectations, reality, and future directionsYuanfang Cai, Rick Kazman. 231-232 [doi]
- Exploring differences and commonalities between feature flags and configuration optionsJens Meinicke, Chu-Pan Wong, Bogdan Vasilescu, Christian Kästner. 233-242 [doi]