Abstract is missing.
- PCR-Chain: Partial Code Reuse Assisted by Hierarchical Chaining of Prompts on Frozen CopilotQing Huang, Jiahui Zhu, Zhilong Li, Zhenchang Xing, Changjing Wang, Xiwei Xu 0001. 1-5 [doi]
- JATTACK: Java JIT Testing using Template ProgramsZhiqiang Zang, Fu-Yao Yu, Nathan Wiatrek, Milos Gligoric 0001, August Shi. 6-10 [doi]
- Actionsremaker: Reproducing GITHUB ActionsHao-Nan Zhu, Kevin Z. Guan, Robert M. Furth, Cindy Rubio-González. 11-15 [doi]
- HOME: Heard-Of based Formal Modeling and Verification Environment for Consensus ProtocolsShumao Zhai, Xiaozhou Li, Ning Ge. 16-20 [doi]
- CoVeriTeam Service: Verification as a ServiceDirk Beyer 0001, Sudeep Kanav, Henrik Wachowitz. 21-25 [doi]
- PRoofster: Automated Formal VerificationArpan Agrawal, Emily First, Zhanna Kaufman, Tom Reichel, Shizhuo Zhang, Timothy Zhou, Alex Sanchez-Stern, Talia Ringer, Yuriy Brun. 26-30 [doi]
- Siguard: Detecting Signature-Related Vulnerabilities in Smart ContractsJiashuo Zhang, Yue Li, Jianbo Gao, Zhi Guan, Zhong Chen 0001. 31-35 [doi]
- RM2DM: A Tool for Automatic Generation of OO Design Models from Requirements ModelsZhen Tian, Yilong Yang, Sheng Cheng. 36-40 [doi]
- Rexstepper: a Reference Debugger for JavaScript Regular ExpressionsLuís Almeida, Miguel Gonzaga, José Fragoso Santos, Rui Abreu. 41-45 [doi]
- iTrace-Toolkit: A Pipeline for Analyzing Eye-Tracking Data of Software Engineering StudiesJoshua Behler, Praxis Weston, Drew T. Guarnera, Bonita Sharif, Jonathan I. Maletic. 46-50 [doi]
- SoapOperaTG: A Tool for System Knowledge Graph Based Soap Opera Test GenerationYanqi Su, Zheming Han, Zhenchang Xing, Xiwei Xu 0001, Liming Zhu 0001, Qinghua Lu 0001. 51-54 [doi]
- GUI Testing to the Power of Parallel Q-LearningMarco Mobilio, Diego Clerissi, Giovanni Denaro, Leonardo Mariani. 55-59 [doi]
- A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge GraphJiamou Sun, Zhenchang Xing, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001. 60-63 [doi]
- DEEPJUDGE: A Testing Framework for Copyright Protection of Deep Learning ModelsJialuo Chen, Youcheng Sun, Jingyi Wang 0004, Peng Cheng 0001, Xingjun Ma. 64-67 [doi]
- DeepCrime: from Real Faults to Mutation Testing Tool for Deep LearningNargiz Humbatova, Gunel Jahangirova, Paolo Tonella. 68-72 [doi]
- Cerberus: a Program Repair FrameworkRidwan Shariffdeen, Martin Mirchev, Yannic Noller, Abhik Roychoudhury. 73-77 [doi]
- TSVD4J: Thread-Safety Violation Detection for JavaShanto Rahman, Chengpeng Li, August Shi. 78-82 [doi]
- Avgust: A Tool for Generating Usage-Based Tests from Videos of App ExecutionsSaghar Talebipour, Hyojae Park, Kesina Baral, Leon Yee, Safwat Ali Khan, Kevin Moran, Yuriy Brun, Nenad Medvidovic, Yixue Zhao. 83-87 [doi]
- DeepLog: Deep-Learning-Based Log RecommendationYang Zhang, Xiaosong Chang, Lining Fang, Yifan Lu. 88-92 [doi]
- ShellFusion: An Answer Generator for Shell Programming Tasks via Knowledge FusionZhongqi Chen, Neng Zhang 0001, Pengyue Si, Qinde Chen, Chao Liu 0014, Zibin Zheng. 93-97 [doi]
- AIREPAIR: A Repair Platform for Neural NetworksXidan Song, Youcheng Sun, Mustafa A. Mustafa, Lucas C. Cordeiro. 98-101 [doi]
- RIdiom: Automatically Refactoring Non-Idiomatic Python Code with Pythonic IdiomsZejun Zhang, Zhenchang Xing, Xiwei Xu 0001, Liming Zhu 0001. 102-106 [doi]
- Seldonian Toolkit: Building Software with Safe and Fair Machine LearningAustin Hoag, James E. Kostas, Bruno Castro da Silva, Philip S. Thomas, Yuriy Brun. 107-111 [doi]
- What Would You do? An Ethical AI QuizWei Teo, Ze Teoh, Dayang Abang Arabi, Morad Aboushadi, Khairenn Lai, Zhe Ng, Aastha Pant, Rashina Hoda, Chakkrit Tantithamthavorn, Burak Turhan. 112-116 [doi]
- A Web-Based Tool for Using Storyboard of Android AppsYuxin Zhang, Sen Chen, Lingling Fan. 117-121 [doi]
- InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements ValidationShuanglong Chang, Juntao Gao, Yilong Yang. 122-126 [doi]
- FlaPy: Mining Flaky Python Tests at ScaleMartin Gruber, Gordon Fraser 0001. 127-131 [doi]
- TECHSUMBOT: A Stack Overflow Answer Summarization Tool for Technical QueryChengran Yang, Bowen Xu, Jiakun Liu, David Lo 0001. 132-135 [doi]
- Randomized Differential Testing of RDF StoresRui Yang, Yingying Zheng, Lei Tang, Wensheng Dou, Wei Wang 0049, Jun Wei 0001. 136-140 [doi]
- CryptOpt: Automatic Optimization of Straightline CodeJoel Kuepper, David Wu, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner 0007, Yuval Yarom. 141-145 [doi]
- WirelessDT: A Digital Twin Platform for Real- Time Evaluation of Wireless Software ApplicationsZhongzheng Lai, Dong Yuan, Huaming Chen, Yu Zhang, Wei Bao. 146-150 [doi]
- MROS: A framework for robot self-adaptationGustavo Rezende Silva, Nadia Hammoudeh Garcia, Darko Bozhinoski, Harshavardhan Deshpande, Mario Garzon Oviedo, Andrzej Wasowski, Mariano Ramírez Montero, Carlos Hernández Corbato. 151-155 [doi]
- Task Context: A Tool for Predicting Code Context Models for Software Development TasksYifeng Wang, Yuhang Lin, Zhiyuan Wan, Xiaohu Yang 0001. 156-160 [doi]
- pytest-inline: An Inline Testing Tool for PythonYu Liu, Zachary Thurston, Alan Han, Pengyu Nie 0001, Milos Gligoric 0001, Owolabi Legunsen. 161-164 [doi]
- DaMAT: A Data-driven Mutation Analysis ToolEnrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand. 165-169 [doi]
- Burt: A Chatbot for Interactive Bug ReportingYang Song, Junayed Mahmud, Nadeeshan De Silva, Ying Zhou, Oscar Chaparro, Kevin Moran, Andrian Marcus, Denys Poshyvanyk. 170-174 [doi]
- Patchmatch: A Tool for Locating Patches of Open Source Project VulnerabilitiesKedi Shen, Yun Zhang, Lingfeng Bao, Zhiyuan Wan, Zhuorong Li, Minghui Wu. 175-179 [doi]
- LicenseRec: Knowledge based Open Source License Recommendation for OSS ProjectsWeiwei Xu, Xin Wu, Runzhi He, Minghui Zhou 0001. 180-183 [doi]
- Detecting Scattered and Tangled Quality Concerns in Source Code to Aid Maintenance and Evolution TasksRrezarta Krasniqi. 184-188 [doi]
- Complementing Secure Code Review with Automated Program AnalysisWachiraphan Charoenwet. 189-191 [doi]
- Automating Code ReviewRosalia Tufano. 192-196 [doi]
- Static Analysis for Android GDPR Compliance AssuranceMugdha Khedkar. 197-199 [doi]
- Incident Prevention Through Reliable Changes DeploymentEileen Kapel. 200-202 [doi]
- Addressing Performance Regressions in DevOps: Can We Escape from System Performance Testing?Lizhi Liao. 203-207 [doi]
- Toward More Effective Deep Learning-based Automated Software Vulnerability Prediction, Classification, and RepairMichael Fu. 208-212 [doi]
- Enhancing Deep Reinforcement Learning with Executable SpecificationsRaz Yerushalmi. 213-217 [doi]
- Boosting Symbolic Execution for Heap-based Vulnerability Detection and Exploit GenerationHaoxin Tu. 218-220 [doi]
- Automating Code Generation for MDE using Machine LearningQiaomu Xue. 221-223 [doi]
- Towards Automated Embedded Systems ProgrammingImam Nur Bani Yusuf. 224-226 [doi]
- Assessing Cognitive Load in Software Development with Wearable SensorsFabian Stolp. 227-229 [doi]
- Towards strengthening software library interfaces with granular and interactive type migrationsRichárd Szalay. 230-234 [doi]
- Designing Adaptive Developer-Chatbot Interactions: Context Integration, Experimental Studies, and Levels of AutomationGlaucia Melo. 235-239 [doi]
- Towards machine learning guided by best practicesAnamaria Mojica-Hanke. 240-244 [doi]
- Learning Program Models from Generated InputsTural Mammadov. 245-247 [doi]
- Learning Test Input Constraints from Branch ConditionsLeon Bettscheider. 248-250 [doi]
- Software Supply Chain Risk Assessment FrameworkNusrat Zahan. 251-255 [doi]
- A Framework to Communicate Software Engineering Data Effectively with DashboardsAlessandra Maciel Paz Milani. 256-258 [doi]
- Some Investigations of Machine Learning Models for Software DefectsUmamaheswara Sharma Bhutamapuram. 259-263 [doi]
- Evolutionary Computation and Reinforcement Learning for Cyber-physical System DesignChengjie Lu. 264-266 [doi]
- Grammar-Based String Refinement TypesFengmin Zhu. 267-269 [doi]
- Evaluation of Stakeholder Mapping and Personas for Sustainable Software DevelopmentBimpe Ayoola. 270-272 [doi]
- Improving Automatic C-to-Rust Translation with Static AnalysisJaemin Hong. 273-277 [doi]
- Towards an AI-centric Requirements Engineering Framework for Trustworthy AIKrishna Ronanki. 278-280 [doi]
- Cost-effective Strategies for Building Energy Efficient Mobile ApplicationsAbdul Ali Bangash. 281-285 [doi]
- Towards Utilizing Natural Language Processing Techniques to Assist in Software Engineering TasksZishuo Ding. 286-290 [doi]
- Graph Solver as a ServiceFozail Ahmad. 291-293 [doi]
- Toward Automated Tools to Support Ethical GUI DesignS M Hasan Mansur 0001, Kevin Moran. 294-298 [doi]
- Domain Specific Languages for Optimisation ModellingSameela Suharshani Wijesundara. 299-301 [doi]
- From Input to Failure: Explaining Program Behavior via Cause-Effect ChainsMarius Smytzek. 302-304 [doi]
- The Distribution and Disengagement of Women Contributors in Open-Source: 2008-2021Zihe H. Zhao. 305-307 [doi]
- Path Complexity of Recursive FunctionsEli Pregerson. 308-310 [doi]
- Skill Recommendation for New Contributors in Open-Source SoftwareFabio Santos. 311-313 [doi]
- AIGROW: A Feedback-Driven Test Generation Framework for Hardware Model CheckersWenjing Deng. 314-316 [doi]
- Test Scenario Generation for Autonomous Driving Systems with Reinforcement LearningChengjie Lu. 317-319 [doi]
- GLAD: Neural Predicate Synthesis to Repair Omission FaultsSungmin Kang, Shin Yoo. 320-321 [doi]
- Poster: Distribution-aware Fairness Test GenerationSai Sathiesh Rajan, Ezekiel O. Soremekun, Sudipta Chattopadhyay 0001, Yves Le Traon. 322-323 [doi]
- Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion SystemsZhensu Sun, Xiaoning Du 0001, Fu Song, Shangwen Wang, Mingze Ni, Li Li 0029. 324-325 [doi]
- Closing the Loop for Software Remodularisation - REARRANGE: An Effort Estimation Approach for Software Clustering-based RemodularisationAlvin Jian Jia Tan, Chun Yong Chong, Aldeida Aleti. 326-327 [doi]
- Revisiting Information Retrieval and Deep Learning Approaches for Code SummarizationTingwei Zhu, Zhong Li, Minxue Pan, Chaoxuan Shi, Tian Zhang 0001, Yu Pei 0001, Xuandong Li. 328-329 [doi]
- A Control-Theoretic Approach to Auto-Tuning Dynamic Analysis for Distributed ServicesChandan Dhal, Xiaoqin Fu, Haipeng Cai. 330-331 [doi]
- Quantum Software Testing: A Brief IntroductionShaukat Ali 0001, Tao Yue 0002. 332-333 [doi]
- DevCertOps: Strategies to Realize Continuous Delivery of Safe Software in Regulated DomainMarc Zeller. 334-335 [doi]
- SAIN: A Community-Wide Software Architecture INfrastructureJoshua Garcia, Mehdi Mirakhorli, Lu Xiao 0001, Sam Malek, Rick Kazman, Yuanfang Cai, Nenad Medvidovic. 336-337 [doi]
- Methodology and Guidelines for Evaluating Multi-Objective Search-Based Software EngineeringMiqing Li, Tao Chen 0001. 338-339 [doi]
- Conducting Eye Tracking Studies in Software Engineering - Methodology and PipelineBonita Sharif, Andrew Begel, Jonathan I. Maletic. 340-341 [doi]
- The Landscape of Source Code Representation Learning in AI-Driven Software Engineering TasksSridhar Chimalakonda, Debeshee Das, Alex Mathai, Srikanth Tamilselvam, Atul Kumar 0002. 342-343 [doi]
- Technical Briefing on Socio-Technical Grounded Theory for Qualitative Data AnalysisRashina Hoda. 344-345 [doi]
- Personalized action suggestions in low-code automation platformsSaksham Gupta, Gust Verbruggen, Mukul Singh, Sumit Gulwani, Vu Le 0002. 346-350 [doi]
- Automated Feature Document Review via Interpretable Deep LearningMing Ye, Yuanfan Chen, Xin Zhang, Jinning He, Jicheng Cao, Dong Liu, Jing Gao, Hailiang Dai, Shengyu Cheng. 351-354 [doi]
- Challenges of Testing an Evolving Cancer Registration Support System in PracticeChristoph Laaber, Tao Yue 0002, Shaukat Ali 0001, Thomas Schwitalla, Jan F. Nygård. 355-359 [doi]
- Towards Formal Repair and Verification of Industry-scale Deep Neural NetworksSatoshi Munakata, Susumu Tokumoto, Koji Yamamoto 0002, Kazuki Munakata. 360-364 [doi]
- Can we Knapsack Software Defect Prediction? Nokia 5G CaseSzymon Stradowski, Lech Madeyski. 365-369 [doi]
- Enhancing Maritime Data Standardization and Integrity using Docker and BlockchainShuai Wang, Nikita Karandikar, Knut Erik Knutsen, Xiao Gang Tony Tong, Tom Edseth, Zealo Xu Zile. 370-374 [doi]
- Prioritizing Industrial Security Findings in Agile Software Development ProjectsMarkus Voggenreiter, Ulrich Schöpp. 375-379 [doi]
- UnitTestBot: Automated Unit Test Generation for C Code in Integrated Development EnvironmentsDmitry Ivanov, Alexey Babushkin, Saveliy Grigoryev, Pavel Iatchenii, Vladislav Kalugin, Egor Kichin, Egor Kulikov, Aleksandr Misonizhnik, Dmitry Mordvinov, Sergey Morozov, Olga Naumenko, Alexey Pleshakov, Pavel Ponomarev, Svetlana Shmidt, Alexey Utkin, Vadim Volodin, Arseniy Volynets. 380-384 [doi]
- Challenges of Evolving Legacy Software in a Small TeamBowie Owens, Geoffrey Lee, Zili Zhu, Thomas Lo. 385-387 [doi]