Abstract is missing.
- Playing Planning Poker in Crowds: Human Computation of Software Effort EstimatesMohammed Alhamed, Tim Storer. 1-12 [doi]
- JEST: N+1 -version Differential Testing of Both JavaScript Engines and SpecificationJihyeok Park, Seungmin An, Dongjun Youn, Gyeongwon Kim, Sukyoung Ryu. 13-24 [doi]
- Unrealizable Cores for Reactive Systems SpecificationsShahar Maoz, Rafi Shalom. 25-36 [doi]
- Verifying Determinism in Sequential ProgramsRashmi Mudduluru, Jason Waataja, Suzanne Millstein, Michael D. Ernst. 37-49 [doi]
- Domain-Specific Fixes for Flaky Tests with Wrong Assumptions on Underdetermined SpecificationsPeilun Zhang, Yanjie Jiang, Anjiang Wei, Victoria Stodden, Darko Marinov, August Shi. 50-61 [doi]
- Studying Test Annotation Maintenance in the WildDong Jae Kim, Nikolaos Tsantalis, Tse-Hsun Peter Chen, Jinqiu Yang 0001. 62-73 [doi]
- Semantic Patches for Adaptation of JavaScript Programs to Evolving LibrariesBenjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller. 74-85 [doi]
- DepOwl: Detecting Dependency Bugs to Prevent Compatibility FailuresZhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao. 86-98 [doi]
- HERO: On the Chaos When PATH Meets ModulesYing Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu 0001. 99-111 [doi]
- SOAR: A Synthesis Approach for Data Science API RefactoringAnsong Ni, Daniel Ramos, Aidan Z. H. Yang, Inês Lynce, Vasco M. Manquinho, Ruben Martins, Claire Le Goues. 112-124 [doi]
- Are Machine Learning Cloud APIs Used Correctly?Chengcheng Wan, Shicheng Liu, Henry Hoffmann, Michael Maire, Shan Lu 0001. 125-137 [doi]
- Siri, Write the Next MethodFengcai Wen, Emad Aghajani, Csaba Nagy 0001, Michele Lanza, Gabriele Bavota. 138-149 [doi]
- Code Prediction by Feeding Trees to TransformersSeohyun Kim, Jinman Zhao, Yuchi Tian, Satish Chandra 0001. 150-162 [doi]
- Towards Automating Code Review ActivitiesRosalia Tufano, Luca Pascarella, Michele Tufano, Denys Poshyvanyk, Gabriele Bavota. 163-174 [doi]
- Resource-Guided Configuration Space Reduction for Deep Learning ModelsYanjie Gao, Yonghao Zhu, Hongyu Zhang 0002, Haoxiang Lin, Mao Yang. 175-187 [doi]
- An Evolutionary Study of Configuration Design and Implementation in Cloud SystemsYuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong 0006, Tianyin Xu. 188-200 [doi]
- AutoCCAG: An Automated Approach to Constrained Covering Array GenerationChuan Luo, Jinkun Lin, Shaowei Cai, Xin Chen, Bing He, Bo Qiao, Pu Zhao, Qingwei Lin, Hongyu Zhang, Wei Wu, Saravanakumar Rajmohan, Dongmei Zhang. 201-212 [doi]
- What helped, and what did not? An Evaluation of the Strategies to Improve Continuous IntegrationXianhao Jin, Francisco Servant. 213-225 [doi]
- Distribution-Aware Testing of Neural Networks Using Generative ModelsSwaroopa Dola, Matthew B. Dwyer, Mary Lou Soffa. 226-237 [doi]
- An Empirical Study of Refactorings and Technical Debt in Machine Learning SystemsYiming Tang, Raffi Khatchadourian, Mehdi Bagherzadeh 0001, Rhia Singh, Ajani Stewart, Anita Raja. 238-250 [doi]
- DeepLocalize: Fault Localization for Deep Neural NetworksMohammad Wardat, Wei Le, Hridesh Rajan. 251-262 [doi]
- DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload InjectionYuanchun Li, Jiayi Hua, Haoyu Wang 0001, Chunyang Chen, Yunxin Liu. 263-274 [doi]
- Reducing DNN Properties to Enable Falsification with Adversarial AttacksDavid Shriver, Sebastian G. Elbaum, Matthew B. Dwyer. 275-287 [doi]
- Graph-based Fuzz Testing for Deep Learning Inference EnginesWeisi Luo, Dong Chai, Xiaoyue Run, Jiang Wang, Chunrong Fang, Zhenyu Chen. 288-299 [doi]
- RobOT: Robustness-Oriented Testing for Deep Learning SystemsJingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng. 300-311 [doi]
- Scalable Quantitative Verification For Deep Neural NetworksTeodora Baluta, Zheng-Leong Chua, Kuldeep S. Meel, Prateek Saxena. 312-323 [doi]
- Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT ModelsJinfeng Lin, Yalin Liu, Qingkai Zeng, Meng Jiang 0001, Jane Cleland-Huang. 324-335 [doi]
- Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related TasksAntonio Mastropaolo, Simone Scalabrino, Nathan Cooper, David Nader-Palacio, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota. 336-347 [doi]
- Operation is the hardest teacher: estimating DNN accuracy looking for mispredictionsAntonio Guerriero, Roberto Pietrantuono, Stefano Russo. 348-358 [doi]
- AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair SystemXiaoyu Zhang, Juan Zhai, ShiQing Ma, Chao Shen. 359-371 [doi]
- Self-Checking Deep Neural Networks in DeploymentYan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin 0001, Jin Song Dong. 372-384 [doi]
- Measuring Discrimination to Boost Comparative Testing for Multiple Deep Learning ModelsLinghan Meng, Yanhui Li, Lin Chen 0015, Zhi Wang, Di Wu, Yuming Zhou, Baowen Xu. 385-396 [doi]
- Prioritizing Test Inputs for Deep Neural Networks via Mutation AnalysisZan Wang, Hanmo You, Junjie Chen 0003, Yingyi Zhang, Xuyuan Dong, Wenbin Zhang. 397-409 [doi]
- Testing Machine Translation via Referential TransparencyPinjia He, Clara Meister, Zhendong Su. 410-422 [doi]
- Automatic Web Testing Using Curiosity-Driven Reinforcement LearningYan Zheng, Yi Liu, Xiaofei Xie, Yepang Liu, Lei Ma, Jianye Hao, Yang Liu. 423-435 [doi]
- Evaluating SZZ Implementations Through a Developer-informed OracleGiovanni Rosa, Luca Pascarella, Simone Scalabrino, Rosalia Tufano, Gabriele Bavota, Michele Lanza, Rocco Oliveto. 436-447 [doi]
- Early Life Cycle Software Defect Prediction. Why? How?N. C. Shrikanth, Suvodeep Majumder, Tim Menzies. 448-459 [doi]
- IoT Bugs and Development ChallengesAmir Makhshari, Ali Mesbah 0001. 460-472 [doi]
- How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity ProjectsFariha Nusrat, Foyzul Hassan, Hao Zhong, Xiaoyin Wang. 473-485 [doi]
- "Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords?Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid. 486-498 [doi]
- Why Don't Developers Detect Improper Input Validation? '; DROP TABLE Papers; -Larissa Braz, Enrico Fregnan, Gül Çalikli, Alberto Bacchelli. 499-511 [doi]
- The Mind Is a Powerful Place: How Showing Code Comprehensibility Metrics Influences Code UnderstandingMarvin Wyrich, Andreas Preikschat, Daniel Graziotin, Stefan Wagner 0001. 512-523 [doi]
- Program Comprehension and Code Complexity Metrics: An fMRI StudyNorman Peitek, Sven Apel, Chris Parnin, André Brechmann, Janet Siegmund. 524-536 [doi]
- Do you really code? Designing and Evaluating Screening Questions for Online Surveys with ProgrammersAnastasia Danilova, Alena Naiakshina, Stefan Horstmann, Matthew Smith 0001. 537-548 [doi]
- How Gamification Affects Software Developers: Cautionary Evidence from a Natural Experiment on GitHubLukas Moldon, Markus Strohmaier, Johannes Wachs. 549-561 [doi]
- IdBench: Evaluating Semantic Representations of Identifier Names in Source CodeYaza Wainakh, Moiz Rauf, Michael Pradel. 562-573 [doi]
- A Context-based Automated Approach for Method Name Consistency Checking and SuggestionYi Li, Shaohua Wang 0002, Tien N. Nguyen. 574-586 [doi]
- On the Naming of Methods: A Survey of Professional DevelopersReem S. Alsuhaibani, Christian D. Newman, Michael John Decker, Michael L. Collard, Jonathan I. Maletic. 587-599 [doi]
- Relating Reading, Visualization, and Coding for New Programmers: A Neuroimaging StudyMadeline Endres, Zachary Karas, Xiaosu Hu, Ioulia Kovelman, Westley Weimer. 600-612 [doi]
- A Case Study of Onboarding in Software Teams: Tasks and StrategiesAn Ju, Hitesh Sajnani, Scot Kelly, Kim Herzig. 613-623 [doi]
- "How Was Your Weekend?" Software Development Teams Working From Home During COVID-19Courtney Miller, Paige Rodeghero, Margaret-Anne D. Storey, Denae Ford, Thomas Zimmermann 0001. 624-636 [doi]
- FLACK: Counterexample-Guided Fault Localization for Alloy ModelsGuolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri. 637-648 [doi]
- Improving Fault Localization by Integrating Value and Predicate Based Causal Inference TechniquesYigit Küçük, Tim A. D. Henderson, Andy Podgurski. 649-660 [doi]
- Fault Localization with Code Coverage Representation LearningYi Li, Shaohua Wang 0002, Tien N. Nguyen. 661-673 [doi]
- An Empirical Study on Deployment Faults of Deep Learning Based Mobile ApplicationsZhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu. 674-685 [doi]
- Extracting Concise Bug-Fixing Patches from Human-Written Patches in Version Control SystemsYanjie Jiang, Hui Liu, Nan Niu, Lu Zhang, Yamin Hu. 686-698 [doi]
- Input AlgebrasRahul Gopinath, Hamed Nemati, Andreas Zeller. 699-710 [doi]
- Fuzzing Symbolic ExpressionsLuca Borzacchiello, Emilio Coppa, Camil Demetrescu. 711-722 [doi]
- Growing A Test Corpus with Bonsai FuzzingVasudev Vikram, Rohan Padhye, Koushik Sen. 723-735 [doi]
- We'll Fix It in Post: What Do Bug Fixes in Video Game Update Notes Tell Us?Andrew Truelove, Eduardo Santana de Almeida, Iftekhar Ahmed 0001. 736-747 [doi]
- GUIGAN: Learning to Generate GUI Designs Using Generative Adversarial NetworksTianming Zhao, Chunyang Chen, Yuanning Liu, Xiaodong Zhu 0001. 748-760 [doi]
- Don't Do That! Hunting Down Visual Design Smells in Complex UIs against Design GuidelinesBo Yang, Zhenchang Xing, Xin Xia 0001, Chunyang Chen, Deheng Ye, Shanping Li. 761-772 [doi]
- Same File, Different Changes: The Potential of Meta-Maintenance on GitHubHideaki Hata, Raula Gaikovina Kula, Takashi Ishio, Christoph Treude. 773-784 [doi]
- Can Program Synthesis be Used to Learn Merge Conflict Resolutions? An Empirical AnalysisRangeet Pan, Vu Le, Nachiappan Nagappan, Sumit Gulwani, Shuvendu K. Lahiri, Mike Kaufman. 785-796 [doi]
- Abacus: Precise Side-Channel AnalysisQinkun Bao, Zihao Wang, Xiaoting Li, James R. Larus, Dinghao Wu. 797-809 [doi]
- Data-Driven Synthesis of Provably Sound Side Channel AnalysesJingbo Wang, Chungha Sung, Mukund Raghothaman, Chao Wang. 810-822 [doi]
- IMGDroid: Detecting Image Loading Defects in Android ApplicationsWei Song, Mengqi Han, Jeff Huang 0001. 823-834 [doi]
- Fast Parametric Model Checking through Model FragmentationXinwei Fang, Radu Calinescu, Simos Gerasimou, Faisal Alhwikem. 835-846 [doi]
- Trace-Checking CPS Properties: Bridging the Cyber-Physical GapClaudio Menghi, Enrico Viganò, Domenico Bianculli, Lionel C. Briand. 847-859 [doi]
- Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software ReuseSeunghoon Woo, Sunghan Park, Seulbae Kim, Heejo Lee, Hakjoo Oh. 860-872 [doi]
- Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark ModelXi Xu, Qinghua Zheng, Zheng Yan 0002, Ming Fan, Ang Jia, Ting Liu. 873-884 [doi]
- Fast Outage Analysis of Large-scale Production Clouds with Service Correlation MiningYaohui Wang, Guozheng Li 0001, Zijian Wang, Yu Kang, Yangfan Zhou, Hongyu Zhang, Feng Gao, Jeffrey Sun, Li Yang, Pochian Lee, Zhangwei Xu, Pu Zhao, Bo Qiao, Liqun Li, Xu Zhang, Qingwei Lin. 885-896 [doi]
- MuDelta: Delta-Oriented Mutation Testing at Commit TimeWei Ma, Thierry Titcheu Chekam, Mike Papadakis, Mark Harman. 897-909 [doi]
- Does mutation testing improve testing practices?Goran Petrovic, Marko Ivankovic, Gordon Fraser, René Just. 910-921 [doi]
- Identifying Key Features from App User ReviewsHuayao Wu, Wenjun Deng, Xintao Niu, Changhai Nie. 922-932 [doi]
- CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market PoliciesYangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo 0001. 933-945 [doi]
- Prioritize Crowdsourced Test Reports via Deep Screenshot UnderstandingShengcheng Yu, Chunrong Fang, Zhenfei Cao, Xu Wang, Tongyu Li, Zhenyu Chen. 946-956 [doi]
- It Takes Two to TANGO: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug ReportsNathan Cooper, Carlos Bernal-Cárdenas, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk. 957-969 [doi]
- Automatically Matching Bug Reports With Related App ReviewsMarlo Haering, Christoph Stanik, Walid Maalej. 970-981 [doi]
- What Makes a Great Maintainer of Open Source Projects?Edson Dias, Paulo Meirelles, Fernando Castor, Igor Steinmacher, Igor Wiese, Gustavo Pinto 0001. 982-994 [doi]
- Representation of Developer Expertise in Open Source SoftwareTapajit Dey, Andrey Karnauch, Audris Mockus. 995-1007 [doi]
- Extracting Rationale for Open Source Software Development Decisions - A Study of Python Email ArchivesPankajeshwara Nand Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger. 1008-1019 [doi]
- Leaving My Fingerprints: Motivations and Challenges of Contributing to OSS for Social GoodYu Huang, Denae Ford, Thomas Zimmermann 0001. 1020-1032 [doi]
- Onboarding vs. Diversity, Productivity, and Quality - Empirical Study of the OpenStack EcosystemArmstrong Foundjem, Ellis E. Eghan, Bram Adams. 1033-1045 [doi]
- The Shifting Sands of Motivation: Revisiting What Drives Contributors in Open SourceMarco Aurélio Gerosa, Igor Wiese, Bianca Trinkenreich, Georg Link, Gregorio Robles, Christoph Treude, Igor Steinmacher, Anita Sarma. 1046-1058 [doi]
- White-Box Performance-Influence Models: A Profiling and Learning ApproachMax Weber, Sven Apel, Norbert Siegmund. 1059-1071 [doi]
- White-Box Analysis over Machine Learning: Modeling Performance of Configurable SystemsMiguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner. 1072-1084 [doi]
- An Empirical Assessment of Global COVID-19 Contact Tracing ApplicationsRuoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe. 1085-1097 [doi]
- Sustainable Solving: Reducing The Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection Steven Arzt. 1098-1110 [doi]
- Synthesizing Object State Transformers for Dynamic Software UpdatesZelin Zhao, Yanyan Jiang 0001, Chang Xu 0001, Tianxiao Gu, Xiaoxing Ma. 1111-1122 [doi]
- Fast and Precise On-the-fly Patch Validation for AllLingchao Chen, Yicheng Ouyang, Lingming Zhang. 1123-1134 [doi]
- Bounded Exhaustive Search of Alloy Specification RepairsSimón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias. 1135-1147 [doi]
- Shipwright: A Human-in-the-Loop System for Dockerfile RepairJordan Henkel, Denini Silva, Leopoldo Teixeira, Marcelo d'Amorim, Thomas W. Reps. 1148-1160 [doi]
- CURE: Code-Aware Neural Machine Translation for Automatic Program RepairNan Jiang, Thibaud Lutellier, Lin Tan 0001. 1161-1173 [doi]
- A Differential Testing Approach for Evaluating Abstract Syntax Tree Mapping AlgorithmsYuanrui Fan, Xin Xia 0001, David Lo 0001, Ahmed E. Hassan, Yuan Wang, Shanping Li. 1174-1185 [doi]
- InferCode: Self-Supervised Learning of Code Representations by Predicting SubtreesNghi D. Q. Bui, Yijun Yu, Lingxiao Jiang. 1186-1197 [doi]
- Efficient Compiler Autotuning via Bayesian OptimizationJunjie Chen 0003, Ningxin Xu, Peiqi Chen, Hongyu Zhang 0002. 1198-1209 [doi]
- TRANSREGEX: Multi-modal Regular Expression Synthesis by Generate-and-RepairYeting Li, Shuaimin Li, Zhiwu Xu, Jialun Cao, Zixuan Chen, Yun Hu, Haiming Chen, Shing-Chi Cheung. 1210-1222 [doi]
- EvoSpex: An Evolutionary Algorithm for Learning PostconditionsFacundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias. 1223-1235 [doi]
- Interface Compliance of Inline Assembly: Automatically Check, Patch and RefineFrédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet. 1236-1247 [doi]
- Enabling Software Resilience in GPGPU Applications via Partial Thread ProtectionLishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni. 1248-1259 [doi]
- Automatic Extraction of Opinion-based Q&A from Online Developer ChatsPreetha Chatterjee, Kostadin Damevski, Lori L. Pollock. 1260-1272 [doi]
- Automated Query Reformulation for Efficient Search based on Query Logs From Stack OverflowKaibo Cao, Chunyang Chen, Sebastian Baltes, Christoph Treude, Xiang Chen. 1273-1285 [doi]
- Automatic Solution Summarization for Crash BugsHaoye Wang, Xin Xia 0001, David Lo 0001, John C. Grundy, Xinyu Wang. 1286-1297 [doi]
- Supporting Quality Assurance with Automated Process-Centric Quality Constraints CheckingChristoph Mayr-Dorn, Michael Vierhauser, Stefan Bichler, Felix Keplinger, Jane Cleland-Huang, Alexander Egyed, Thomas Mehofer. 1298-1310 [doi]
- Understanding Bounding Functions in Safety-Critical UAV SoftwareXiaozhou Liang, John Henry Burns, Joseph Sanchez, Karthik Dantu, Lukasz Ziarek, Yu David Liu. 1311-1322 [doi]
- Enhancing Genetic Improvement of Software with Regression Test SelectionGiovani Guizzo, Justyna Petke, Federica Sarro, Mark Harman. 1323-1333 [doi]
- Containing Malicious Package Updates in npm with a Lightweight Permission SystemGabriel Ferreira, Limin Jia 0001, Joshua Sunshine, Christian Kästner. 1334-1346 [doi]
- Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native CodeSumaya Almanee, Arda Ünal, Mathias Payer, Joshua Garcia. 1347-1359 [doi]
- If It's Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API HardeningPei Wang, Julian Bangert, Christoph Kern. 1360-1372 [doi]
- Why Security Defects Go Unnoticed during Code Reviews? A Case-Control Study of the Chromium OS ProjectRajshakhar Paul, Asif Kamal Turzo, Amiangshu Bosu. 1373-1385 [doi]
- Technical Leverage in a Software Ecosystem: Development Opportunities and Security RisksFabio Massacci, Ivan Pashchenko. 1386-1397 [doi]
- RAICC: Revealing Atypical Inter-Component Communication in Android AppsJordan Samhi, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein. 1398-1409 [doi]
- Smart Contract Security: a Practitioners' PerspectiveZhiyuan Wan, Xin Xia 0001, David Lo 0001, Jiachi Chen, Xiapu Luo, Xiaohu Yang. 1410-1422 [doi]
- AID: An automated detector for gender-inclusivity bugs in OSS project pagesAmreeta Chatterjee, Mariam Guizani, Catherine Stevens, Jillian Emard, Mary Evelyn May, Margaret Burnett, Iftekhar Ahmed 0001, Anita Sarma. 1423-1435 [doi]
- "Ignorance and Prejudice" in Software FairnessJie M. Zhang, Mark Harman. 1436-1447 [doi]
- Semi-supervised Log-based Anomaly Detection via Probabilistic Label EstimationLin Yang, Junjie Chen, Zan Wang, Weijing Wang, Jiajun Jiang, Xuyuan Dong, Wenbin Zhang. 1448-1460 [doi]
- DeepLV: Suggesting Log Levels Using Ordinal Based Neural NetworksZhenhao Li, Heng Li 0007, Tse-Hsun Peter Chen, Weiyi Shang. 1461-1472 [doi]
- How to Identify Boundary Conditions with Contrasty Metric?Weilin Luo, Hai Wan, Xiaotong Song, Binhao Yang, Hongzhen Zhong, Yin Chen. 1473-1484 [doi]
- Using Domain-specific Corpora for Improved Handling of Ambiguity in RequirementsSaad Ezzini, Sallam Abualhaija, Chetan Arora 0002, Mehrdad Sabetzadeh, Lionel C. Briand. 1485-1497 [doi]
- On Indirectly Dependent Documentation in the Context of Code Evolution: A StudyDevika Sondhi, Avyakt Gupta, Salil Purandare, Ankit Rana, Deepanshu Kaushal, Rahul Purandare. 1498-1509 [doi]
- CodeShovel: Constructing Method-Level Source Code HistoriesFelix Grund, Shaiful Chowdhury, Nick C. Bradley, Braxton Hall, Reid Holmes. 1510-1522 [doi]
- Evaluating Unit Testing Practices in R PackagesMelina C. Vidoni. 1523-1534 [doi]
- Data-Oriented Differential Testing of Object-Relational Mapping SystemsThodoris Sotiropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Dimitris Mitropoulos, Diomidis Spinellis. 1535-1547 [doi]
- Automatic Unit Test Generation for Machine Learning Libraries: How Far Are We?Song Wang, Nishtha Shrestha, Abarna Kucheri Subburaman, Junjie Wang, Moshi Wei, Nachiappan Nagappan. 1548-1560 [doi]
- Layout and Image Recognition Driving Cross-Platform Automated Mobile TestingShengcheng Yu, Chunrong Fang, Yexiao Yun, Yang Feng 0003. 1561-1571 [doi]
- FlakeFlagger: Predicting Flakiness Without Rerunning TestsAbdulrahman Alshammari, Christopher Morris, Michael Hilton, Jonathan Bell 0001. 1572-1584 [doi]
- An Empirical Analysis of UI-based Flaky TestsAlan Romano, Zihe Song, Sampath Grandhi, Wei Yang, Weihang Wang. 1585-1597 [doi]
- GenTree: Using Decision Trees to Learn Interactions for Configurable SoftwareKimHao Nguyen, ThanhVu Nguyen. 1598-1609 [doi]
- Semantic Web Accessibility Testing via Hierarchical Visual AnalysisMohammad Bajammal, Ali Mesbah 0001. 1610-1621 [doi]
- Restoring Execution Environments of Jupyter NotebooksJiawei Wang, Li Li, Andreas Zeller. 1622-1633 [doi]
- PyART: Python API Recommendation in Real-TimeXincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu. 1634-1645 [doi]
- PyCG: Practical Call Graph Generation in PythonVitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, Dimitris Mitropoulos. 1646-1657 [doi]
- Seamless Variability Management With the Virtual PlatformWardah Mahmood, Daniel Strüber 0001, Thorsten Berger, Ralf Lämmel, Mukelabai Mukelabai. 1658-1670 [doi]
- Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android AppsSiqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun 0001. 1671-1682 [doi]
- App's Auto-Login Function Security Testing via Android OS-Level VirtualizationWenna Song, Jiang Ming 0002, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng. 1683-1694 [doi]
- ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android ApplicationsXian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu. 1695-1707 [doi]
- JUSTGen: Effective Test Generation for Unspecified JNI Behaviors on JVMsSungjae Hwang, Sungho Lee, Jihoon Kim, Sukyoung Ryu. 1708-1718 [doi]