Abstract is missing.
- GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub ActionsNuno Saavedra, André Silva, Martin Monperrus. 1-5 [doi]
- DronLomaly: Runtime Log-based Anomaly Detector for DJI DronesWei Minn, Yan Naing Tun, Lwin Khin Shar, Lingxiao Jiang. 6-10 [doi]
- JOG: Java JIT Peephole Optimizations and Tests from PatternsZhiqiang Zang, Aditya Thimmaiah, Milos Gligoric 0001. 11-15 [doi]
- nvshare: Practical GPU Sharing without Memory Size ConstraintsGeorgios Alexopoulos, Dimitris Mitropoulos. 16-20 [doi]
- Daedalux: An Extensible Platform for Variability-Aware Model CheckingSami Lazreg, Maxime Cordy, Simon Thrane Hansen, Axel Legay. 21-25 [doi]
- Verifying and Displaying Move Smart Contract Source Code for the Sui BlockchainRijnard van Tonder. 26-29 [doi]
- TestSpark: IntelliJ IDEA's Ultimate Test Generation CompanionArkadii Sapozhnikov, Mitchell Olsthoorn, Annibale Panichella, Vladimir Kovalenko, Pouria Derakhshanfar. 30-34 [doi]
- SpotFlow: Tracking Method Calls and States at RuntimeAndré C. Hora. 35-39 [doi]
- Boidae: Your Personal Mining PlatformBrian Sigurdson, Samuel W. Flint, Robert Dyer 0001. 40-43 [doi]
- Code Mapper: Mapping the Global Contributions of OSSThomas Le Tourneau, Jasmine Latendresse, Ahmad Abdellatif, Emad Shihab. 44-48 [doi]
- TypeEvalPy: A Micro-benchmarking Framework for Python Type Inference ToolsAshwin Prasad Shivarpatna Venkatesh, Samkutty Sabu, Jiawei Wang 0003, Amir M. Mir, Li Li 0029, Eric Bodden. 49-53 [doi]
- Can My Microservice Tolerate an Unreliable Database? Resilience Testing with Fault Injection and VisualizationMichael Assad, Christopher S. Meiklejohn, Heather Miller, Stephan Krusche. 54-58 [doi]
- CATMA: Conformance Analysis Tool For Microservice ApplicationsClinton Cao, Simon Schneider, Nicolás E. Díaz Ferreyra, Sicco Verwer, Annibale Panichella, Riccardo Scandariato. 59-63 [doi]
- Refinery: Graph Solver as a Service: Refinement-based Generation and Analysis of Consistent ModelsKristóf Marussy, Attila Ficsor, Oszkár Semeráth, Dániel Varró. 64-68 [doi]
- (Neo4j)^ Browser: Visualizing Variable-Aware Analysis ResultsRafael F. Toledo, Joanne M. Atlee, Rui Ming Xiong, Mingyu Liu. 69-73 [doi]
- SAFE: Safety Analysis and Retraining of DNNsMohammed Oualid Attaoui, Fabrizio Pastore, Lionel C. Briand. 74-78 [doi]
- MutaBot: A Mutation Testing Approach for ChatbotsMichael Ferdinando Urrico, Diego Clerissi, Leonardo Mariani. 79-83 [doi]
- AntiCopyPaster 2.0: Whitebox just-in-time code duplicates extractionEman Abdullah AlOmar, Benjamin Knobloch, Thomas Kain, Christopher Kalish, Mohamed Wiem Mkaouer, Ali Ouni 0001. 84-88 [doi]
- GitHubInclusifier: Finding and fixing non-inclusive language in GitHub RepositoriesLiam Todd, John Grundy 0001, Christoph Treude. 89-93 [doi]
- OpenSBT: A Modular Framework for Search-based Testing of Automated Driving SystemsLev Sorokin, Tiziano Munaro, Damir Safin, Brian Hsuan-Cheng Liao, Adam Molin. 94-98 [doi]
- APICIA: An API Change Impact Analyzer for Android AppsTarek Mahmud, Meiru Che, Jihan Rouijel, Mujahid Khan, Guowei Yang 0001. 99-103 [doi]
- RAT: A Refactoring-Aware Tool for Tracking Code HistoryFeifei Niu, Junqian Shao, Chaofan Xu, Christoph Mayr-Dorn, Wesley K. G. Assunção, LiGuo Huang, Chuanyi Li, JiDong Ge, Bin Luo 0003, Alexander Egyed. 104-108 [doi]
- Emulation Tool For Android Edge DevicesLyla Naghipour Vijouyeh, Rodrigo Bruno, Paulo Ferreira 0001. 109-113 [doi]
- TPV: A Tool for Validating Temporal Properties in UML Class DiagramsMustafa Al-Lail, Antonio Rosales Viesca, Hector Cardenas, Mohammad Zarour, Alfredo J. Perez. 114-118 [doi]
- CodeGRITS: A Research Toolkit for Developer Behavior and Eye Tracking in IDENingzhi Tang, Junwen An, Meng Chen, Aakash Bansal, Yu Huang 0015, Collin McMillan, Toby Jia-Jun Li. 119-123 [doi]
- ValidGen: A Tool for Automatic Generation of Validation Scripts to Support Rapid Requirements ValidationHongyue Pan, Yilong Yang 0001. 124-128 [doi]
- FaultFuzz: A Coverage Guided Fault Injection Tool for Distributed SystemsWenhan Feng, Qiugen Pei, Yu Gao 0002, Dong Wang, Wensheng Dou, Jun Wei 0001, Zheheng Liang, Zhenyue Long. 129-133 [doi]
- Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSajad Khatiri, Sebastiano Panichella, Paolo Tonella. 134-138 [doi]
- Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow AnalysisBernd Gruner. 139-141 [doi]
- Aiding Developer Understanding of Software Changes via Symbolic Execution-based Semantic DifferencingJohann Glock. 142-144 [doi]
- Architecture-Based Cross-Component Issue Management and Propagation AnalysisSandro Speth. 145-149 [doi]
- A Software Security Evaluation FrameworkArina Kudriavtseva. 150-152 [doi]
- Automated Model Quality Estimation and Change Impact Analysis on Model HistoriesKonstantin Rupert Blaschke. 153-155 [doi]
- Autonomic Testing: Testing with Scenarios from ProductionKetai Qiu. 156-158 [doi]
- Beyond Accuracy and Robustness Metrics for Large Language Models for CodeDaniel Rodríguez-Cárdenas. 159-161 [doi]
- Beyond Accuracy: Evaluating Source Code Capabilities in Large Language Models for Software EngineeringAlejandro Velasco. 162-164 [doi]
- Building a Framework to Improve the User Experience of Static Analysis ToolsMichael Schlichtig. 165-169 [doi]
- Discovering Explainability Requirements in ML-Based SoftwareTor Sporsem. 170-172 [doi]
- Enhancing Model-Driven Reverse Engineering Using Machine LearningHanan Abdulwahab Siala. 173-175 [doi]
- Ensuring Critical Properties of Test Oracles for Effective Bug DetectionSoneya Binta Hossain. 176-180 [doi]
- Generating User Experience Based on Personas with AI AssistantsYutan Huang. 181-183 [doi]
- Increasing trust in the open source supply chain with reproducible builds and functional package managementJulien Malka. 184-186 [doi]
- Investigating Cultural Dispersion: on the Role of Cultural Differences in Software Development TeamsStefano Lambiase. 187-191 [doi]
- Learning Models of Cyber-Physical Systems with Discrete and Continuous Behaviour for Digital Twin SynthesisFelix Wallner. 192-194 [doi]
- Managing API Evolution in Microservice ArchitectureAlexander Lercher. 195-197 [doi]
- MEITREX - Gamified and Adaptive Intelligent Tutoring in Software Engineering EducationNiklas Meißner. 198-200 [doi]
- On Improving Management of Duplicate Video-Based Bug ReportsYanfu Yan. 201-203 [doi]
- Programming Language Models in Multilingual SettingsJonathan Katzy. 204-206 [doi]
- Resolving Goal-Conflicts and Scaling Synthesis through Mode-Based DecompositionMatías Brizzio. 207-211 [doi]
- Selecting and Constraining Metamorphic RelationsAlejandra Duque-Torres. 212-216 [doi]
- Simulation-based Testing of Automated Driving SystemsFauzia Khan. 217-219 [doi]
- Smart Quality Monitoring for Evolving Complex SystemsNoura El Moussa. 220-224 [doi]
- Studying and Improving Software License Compliance in PracticeNathan Wintersgill. 225-227 [doi]
- Sustainable Adaptive SecurityKushal Ramkumar. 228-230 [doi]
- Sustainable Software Engineering: Visions and Perspectives beyond Energy EfficiencyChristoph König 0002. 231-233 [doi]
- Sustaining Scientific Open-Source Software Ecosystems: Challenges, Practices, and OpportunitiesJiayi Sun. 234-236 [doi]
- Toward Rapid Bug Resolution for Android AppsJunayed Mahmud. 237-241 [doi]
- Towards AI-centric Requirements Engineering for Industrial SystemsSarmad Bashir. 242-246 [doi]
- Towards Automatic Inference of Behavioral Component Models for ROS-Based Robotics SystemsTobias Dürschmid. 247-251 [doi]
- Towards Combining STPA and Safety-Critical Runtime MonitoringEva Zimmermann. 252-254 [doi]
- Towards Interpreting the Behavior of Large Language Models on Software Engineering TasksAtish Kumar Dipongkor. 255-257 [doi]
- Towards Safe, Secure, and Usable LLMs4CodeAli Al-Kaswan. 258-260 [doi]
- Understandable Test Generation Through Capture/Replay and LLMsAmirhossein Deljouyi. 261-263 [doi]
- Obfuscation-Resilient Software Plagiarism Detection with JPlagTimur Saglam, Sebastian Hahner, Larissa Schmid, Erik Burger. 264-265 [doi]
- Poster: Kotlin Assimilating the Android Ecosystem - An Appraisal of Diffusion and Impact on MaintainabilityRiccardo Coppola, Tommaso Fulcini, Marco Torchiano. 266-267 [doi]
- A First Look at the General Data Protection Regulation (GDPR) in Open-Source SoftwareLucas Franke, Huayu Liang, Aaron Brantly, James C. Davis 0001, Chris Brown. 268-269 [doi]
- KareCoder: A New Knowledge-Enriched Code Generation SystemTao Huang, Zhihong Sun, Zhi Jin, Ge Li, Chen Lyu. 270-271 [doi]
- ParSE: Efficient Detection of Smart Contract Vulnerabilities via Parallel and Simplified Symbolic ExecutionLong He, Xiangfu Zhao, Yichen Wang. 272-273 [doi]
- Endogeneity, Instruments, and Two-Stage ModelsLorenz Graf-Vlachy, Stefan Wagner 0001. 274-275 [doi]
- Prompt-Enhanced Software Vulnerability Detection Using ChatGPTChenyuan Zhang, Hao Liu, Jiutian Zeng, Kejing Yang, Yuhong Li, Hui Li. 276-277 [doi]
- What do you assume? A Theory of Security-Related AssumptionsSophie Corallo, Thomas Weber, Lars König, Kathrin Leonie Schmidt, Frederik Reiche, Anne Koziolek. 278-279 [doi]
- An Empirical Study on Cross-language Clone BugsHonghao Chen, Ye Tang, Hao Zhong. 280-281 [doi]
- Applying Transformer Models for Automatic Build Errors Classification of Java-Based Open Source ProjectsJonathan Lee 0004, Mason Li, Kuo-Hsun Hsu. 282-283 [doi]
- Micro-scale Concolic Testing Framework for Automated Test Data Generation Based on Path CoverageFangqing Liu, Han Huang, Yi Xiang. 284-285 [doi]
- Safety Monitoring of Deep Reinforcement Learning AgentsAmirhossein Zolfagharian, Manel Abdellatif, Lionel C. Briand, Ramesh S 0002. 286-287 [doi]
- Interpretable Software Maintenance and Support Effort Prediction Using Machine LearningSusmita Haldar, Luiz Fernando Capretz. 288-289 [doi]
- An Actionable Framework for Understanding and Improving Talent Retention as a Competitive Advantage in IT OrganizationsLuiz Alexandre Costa, Edson Dias, Danilo Monteiro Ribeiro, Awdren L. Fontão, Gustavo Pinto 0001, Rodrigo Pereira dos Santos, Alexander Serebrenik. 290-291 [doi]
- Towards Leveraging Fine-Grained Dependencies to Check Requirements Traceability CorrectnessAnamaria-Roberta Preda, Christoph Mayr-Dorn, Atif Mashkoor, Wesley Klewerton Guez Assunção, Alexander Egyed. 292-293 [doi]
- Programmable and Semantic Connector for DNN Component Integration: a Software Engineering PerspectiveJingwei Xu 0001, Zihan Zeng. 294-295 [doi]
- A Study of Backporting Code in Open-Source Software for Characterizing ChangesetsDebasish Chakroborti, Chanchal Roy, Kevin A. Schneider. 296-297 [doi]
- Engineering Industry-Ready Anomaly Detection AlgorithmsNgoc-Thanh Nguyen 0002, Rogardt Heldal, Patrizio Pelliccione. 298-299 [doi]
- Unleashing the Giants: Enabling Advanced Testing for Infrastructure as CodeDaniel Sokolowski, David Spielmann, Guido Salvaneschi. 300-301 [doi]
- Poirot: Deep Learning for API Misuse DetectionYi Li, Tien N. Nguyen, Shaohua Wang 0002, Aashish Yadavally. 302-303 [doi]
- Behavior Trees with Dataflow: Coordinating Reactive Tasks in Lingua FrancaAlexander Schulz-Rosengarten, Akash Ahmad, Malte Clement, Reinhard von Hanxleden, Benjamin Asch, Marten Lohstroh, Edward A. Lee, Gustavo Quiros Araya, Ankit Shukla. 304-305 [doi]
- Graph Neural Networks based Log Anomaly Detection and ExplanationZhong Li 0002, Jiayang Shi, Matthijs van Leeuwen. 306-307 [doi]
- Going Viral: Case Studies on the Impact of ProtestwareYoumei Fan, Dong Wang, Supatsara Wattanakriengkrai, Hathaichanok Damrongsiri, Christoph Treude, Hideaki Hata, Raula Gaikovina Kula. 308-309 [doi]
- Understanding the Strategies Used by Employees to Cope with Technostress in the Software IndustryValtteri Siitonen, Saima Ritonummi, Markus Salo, Henri Pirkkalainen, Saija Mauno. 310-311 [doi]
- A Transformer-based Model for Assisting Dockerfile RevisingYiwen Wu, Yang Zhang, Tao Wang, Huaimin Wang. 312-313 [doi]
- Domain Knowledge is All You Need: A Field Deployment of LLM-Powered Test Case Generation in FinTech DomainZhiyi Xue, Liangguo Li, Senyue Tian, Xiaohong Chen, Pingping Li, Liangyu Chen 0001, Tingting Jiang, Min Zhang. 314-315 [doi]
- Neural Exception Handling RecommenderYi Li, Tien N. Nguyen, Yuchen Cai, Aashish Yadavally, Abhishek Mishra, Genesis Montejo. 316-317 [doi]
- Unleashing the Power of Clippy in Real-World Rust ProjectsChunmiao Li, Yijun Yu, Haitao Wu, Luca Carlig, Shijie Nie, Lingxiao Jiang. 318-319 [doi]
- GRAIL: Checking Transaction Isolation Violations with Graph QueriesStefania Dumbrava, Zhao Jin, Burcu Kulahcioglu Ozkan, Jingxuan Qiu. 320-321 [doi]
- Exploring the Computational Complexity of SAT Counting and Uniform Sampling with Phase TransitionsOlivier Zeyen, Maxime Cordy, Gilles Perrouin, Mathieu Acher. 322-323 [doi]
- Hunting DeFi Vulnerabilities via Context-Sensitive Concolic VerificationYepeng Ding, Arthur Gervais, Roger Wattenhofer, Hiroyuki Sato. 324-325 [doi]
- Blocks? Graphs? Why Not Both? Designing and Evaluating a Hybrid Programming Environment for End-usersNico Ritschel, Felipe Fronchetti, Reid Holmes, Ronald Garcia, David C. Shepherd. 326-327 [doi]
- SLIM: a Scalable Light-weight Root Cause Analysis for Imbalanced Data in MicroserviceRui Ren, Jingbang Yang, Linxiao Yang, Xinyue Gu, Liang Sun 0001. 328-330 [doi]
- Designing Digital Twins for Enhanced ReusabilityOlga Ratushniak, Beatriz Cabrero Daniel. 331-332 [doi]
- Analyzing the Impact of Context Representation and Scope in Code InfillingJinseok Heo, Eunseok Lee 0001. 333-334 [doi]
- eAIEDF: Extended AI Error Diagnosis Flowchart for Automatically Identifying Misprediction Causes in Production ModelsKeita Sakuma, Ryuta Matsuno, Yoshio Kameda. 335-336 [doi]
- The Impact of a Live Refactoring Environment on Software DevelopmentSara Fernandes, Ademar Aguiar, André Restivo. 337-338 [doi]
- Fault Localization on Verification Witnesses (Poster Paper)Dirk Beyer 0001, Matthias Kettl, Thomas Lemberger 0002. 339-340 [doi]
- Tracking assets in source code with Security AnnotationsDaniel Haak, Raphael Mayr, Jan-Philipp Steghöfer, Alexandra Teynor, Phillip Heidegger. 341-342 [doi]
- Lightweight Semantic Conflict Detection with Static AnalysisGalileu Santos de Jesus, Paulo Borba, Rodrigo Bonifácio, Matheus Barbosa de Oliveira. 343-345 [doi]
- How Does Pre-trained Language Model Perform on Deep Learning Framework Bug Prediction?Xiaoting Du, Chenglong Li, Xiangyue Ma, Zheng Zheng 0001. 346-347 [doi]
- Multi-requirement Parametric FalsificationMatteo Camilli, Raffaela Mirandola. 348-349 [doi]
- GDPR indications in commits messages in GitHub repositoriesGeorgia M. Kapitsaki, Maria Papoutsoglou 0001. 350-351 [doi]
- Towards Data Augmentation for Supervised Code TranslationBinger Chen, Jacek Golebiowski, Ziawasch Abedjan. 352-353 [doi]
- High-precision Online Log Parsing with Large Language ModelsXiaolei Chen, Jie Shi, Jia Chen, Peng Wang, Wei Wang. 354-355 [doi]
- Multi-step Automated Generation of Parameter Docstrings in Python: An Exploratory StudyVatsal Venkatkrishna, Durga Shree Nagabushanam, Emmanuel Iko-Ojo Simon, Melina C. Vidoni. 356-357 [doi]
- Energy Consumption of Automated Program RepairMatias Martinez, Silverio Martínez-Fernández, Xavier Franch. 358-359 [doi]
- Automatic Generation of Test Cases based on Bug Reports: a Feasibility Study with Large Language ModelsLaura Plein, Wendkûuni C. Ouédraogo, Jacques Klein, Tegawendé F. Bissyandé. 360-361 [doi]
- ReviewRanker: A Semi-Supervised Learning Based Approach for Code Review Quality EstimationSaifullah Mahbub, Md. Easin Arafat, Chowdhury Rafeed Rahman, Zannatul Ferdows, Masum Hasan. 362-363 [doi]
- LogPrompt: Prompt Engineering Towards Zero-Shot and Interpretable Log AnalysisYilun Liu 0001, Shimin Tao, Weibin Meng, Feiyu Yao, Xiaofeng Zhao, Hao Yang. 364-365 [doi]
- Data vs. Model Machine Learning Fairness Testing: An Empirical StudyArumoy Shome, Luís Cruz 0002, Arie van Deursen. 366-367 [doi]
- On the Effects of Program Slicing for Vulnerability Detection during Code Inspection: Extended AbstractAurora Papotti, Fabio Massacci, Katja Tuma. 368-369 [doi]
- xNose: A Test Smell Detector for C#Partha Protim Paul, Md Tonoy Akanda, Mohammed Raihan Ullah, Dipto Mondal, Nazia Sultana Chowdhury, Fazle Mohammed Tawsif. 370-371 [doi]
- On the Need for Empirically Investigating Fast-Growing Programming LanguagesJahnavi Kumar, Sridhar Chimalakonda. 372-373 [doi]
- Improving the Condensing of Reverse Engineered Class Diagrams using Weighted Network MetricsWeifeng Pan 0001, Wei Wu, Ming Hua 0003, Dae-Kyoo Kim, Jinkai Yang, Ruochen Liu. 374-375 [doi]
- Recovering Traceability Links between Release Notes and Related Software ArtifactsSristy Sumana Nath, Banani Roy. 376-377 [doi]
- Bringing Structure to Naturalness: On the Naturalness of ASTsProfir-Petru Pârtachi, Mahito Sugiyama. 378-379 [doi]
- Assessing AI-Based Code Assistants in Method Generation TasksVincenzo Corso, Leonardo Mariani, Daniela Micucci, Oliviero Riganelli. 380-381 [doi]
- Exploring the Impact of Inheritance on Test Code MaintainabilityDong Jae Kim, Tse-Hsun Chen. 382-383 [doi]
- Improving Program Debloating with 1-DU Chain MinimalityMyeongSoo Kim, Santosh Pande, Alessandro Orso. 384-385 [doi]
- Exploring Data Cleanness in Defects4J and Its Influence on Fault Localization EfficiencyMd Nakhla Rafi, An Ran Chen, Tse-Hsun (Peter) Chen, Shaohua Wang. 386-387 [doi]
- Towards Precise Observations of Neural Model Robustness in ClassificationWenchuan Mu, Kwan Hui Lim 0001. 388-389 [doi]
- Exploring the Effectiveness of LLM based Test-driven Interactive Code Generation: User Study and Empirical EvaluationSarah Fakhoury, Aaditya Naik, Georgios Sakkas, Saikat Chakraborty, Madan Musuvathi, Shuvendu K. Lahiri. 390-391 [doi]
- Decoding Log Parsing Challenges: A Comprehensive Taxonomy for Actionable SolutionsIssam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Naser Ezzati Jivan, Mohammed A. Shehab. 392-393 [doi]
- GoSpeechLess: Interoperable Serverless ML-based Cloud ServicesSashko Ristov, Philipp Gritsch, David Meyer, Michael Felderer. 394-395 [doi]
- Learning to Represent PatchesXunzhu Tang, Haoye Tian, Zhenghan Chen, Weiguo Pian, Saad Ezzini, Abdoul Kader Kaboré, Andrew Habib, Jacques Klein, Tegawendé F. Bissyandé. 396-397 [doi]
- Automated Code Editing with Search-Generate-ModifyChangshu Liu, Pelin Çetin, Yogesh Patodia, Baishakhi Ray, Saikat Chakraborty, Yangruibo Ding. 398-399 [doi]
- How are Contracts Used in Android Mobile Applications?David R. Ferreira, Alexandra Mendes, João F. Ferreira 0001. 400-401 [doi]
- Causal Graph Fuzzing for Fair ML Sofware DevelopmentVerya Monjezi, Ashish Kumar, Gang Tan, Ashutosh Trivedi 0001, Saeid Tizpaz Niari. 402-403 [doi]
- Path Complexity Analysis for Interprocedural CodeMira Bhagirathi Kaniyur, Ana Cavalcante-Studart, Yihan Yang, Sangeon Park, David Chen, Duy Lam, Lucas Bang. 404-405 [doi]
- Extracting Relevant Test Inputs from Bug Reports for Automatic Test Case GenerationWendkûuni C. Ouédraogo, Laura Plein, Abdoul Kader Kaboré, Andrew Habib, Jacques Klein, David Lo 0001, Tegawendé F. Bissyandé. 406-407 [doi]
- ICLNet: Stepping Beyond Dates for Robust Issue-Commit Link RecoveryAbhishek Kumar, Partha Pratim Das, Partha Pratim Chakrabarti. 408-409 [doi]
- NL2Fix: Generating Functionally Correct Code Edits from Bug DescriptionsSarah Fakhoury, Saikat Chakraborty, Madanlal Musuvathi, Shuvendu K. Lahiri. 410-411 [doi]
- Automated Security Repair for Helm ChartsFrancesco Minna, Agathe Blaise, Fabio Massacci, Katja Tuma. 412-413 [doi]
- Multi-source Anomaly Detection For Microservice SystemsZhengxin Li, Junfeng Zhao, Jia Kang. 414-415 [doi]
- F-CodeLLM: A Federated Learning Framework for Adapting Large Language Models to Practical Software DevelopmentZeju Cai, Jianguo Chen, Wenqing Chen, Weicheng Wang, Xiangyuan Zhu, Aijia Ouyang. 416-417 [doi]
- NomNom: Explanatory Function Names for Program SynthesizersAmirmohammad Nazari, Souti Chattopadhyay, Swabha Swayamdipta, Mukund Raghothaman. 418-419 [doi]
- Improving Fairness in Machine Learning Software via Counterfactual Fairness ThinkingZhipeng Yin, Zichong Wang, Wenbin Zhang 0002. 420-421 [doi]
- Imperfect Code Generation: Uncovering Weaknesses in Automatic Code Generation by Large Language ModelsXiaoli Lian, Shuaisong Wang, Jieping Ma, Xin Tan, Fang Liu, Lin Shi, Cuiyun Gao, Li Zhang. 422-423 [doi]
- Analyzing Software Energy ConsumptionAdel Noureddine. 424-425 [doi]
- Quantum Software Testing 101Shaukat Ali 0001. 426-427 [doi]
- Technical Briefing on Deep Neural Network RepairPaolo Arcaini, Fuyuki Ishikawa, Lei Ma 0003, Yuta Maezawa, Nobukazu Yoshioka, Fuyuan Zhang. 428-430 [doi]
- Technical Brief on Software Engineering for FMwareDayi Lin, Filipe Roseiro Côgo, Gopi Krishnan Rajbahadur, Ahmed E. Hassan. 431-433 [doi]
- Technical Briefing on Parameter Efficient Fine-Tuning of (Large) Language Models for Code-IntelligenceFatemeh H. Fard. 434-435 [doi]
- Technical Briefing on Socio-Technical Grounded Theory for Qualitative Data AnalysisRashina Hoda. 436-437 [doi]
- An Ensemble Method for Bug Triaging using Large Language ModelsAtish Kumar Dipongkor. 438-440 [doi]
- Flakiness Repair in the Era of Large Language ModelsYang Chen. 441-443 [doi]
- Vulnerability Root Cause Function Locating For Java VulnerabilitiesLyuye Zhang. 444-446 [doi]
- IntTracer: Sanitization-aware IO2BO Vulnerability Detection across CodebasesXiang Chen. 447-449 [doi]
- Classifying Source Code: How Far Can Compressor-based Classifiers Go?Zhou Yang. 450-452 [doi]
- Program Decomposition and Translation with Static AnalysisAli Reza Ibrahimzada. 453-455 [doi]
- Refining Abstract Specifications into Dangerous Traffic ScenariosAren A. Babikian. 456-458 [doi]
- When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?Yuxiao Chen 0009, JingZheng Wu, Xiang Ling 0001, Changjiang Li, Zhiqing Rui, Tianyue Luo, Yanjun Wu. 459-471 [doi]
- ReposVul: A Repository-Level High-Quality Vulnerability DatasetXinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao 0001. 472-483 [doi]
- MissConf: LLM-Enhanced Reproduction of Configuration-Triggered BugsYing Fu, Teng Wang 0004, Shanshan Li 0001, Jinyan Ding, ShuLin Zhou, Zhouyang Jia, Wang Li 0003, Yu Jiang, Xiangke Liao. 484-495 [doi]