Abstract is missing.
- A Longitudinal Analysis of Bug Handling Across Eclipse ReleasesZeinab Abou Khalil, Eleni Constantinou, Tom Mens, Laurence Duchien, Clément Quinton. 1-12 [doi]
- Impact of Switching Bug Trackers: A Case Study on a Medium-Sized Open Source ProjectThéo Zimmermann, Annalí Casanueva Artís. 13-23 [doi]
- The Impact of Rare Failures on Statistical Fault Localization: The Case of the Defects4J SuiteYigit Küçük, Tim A. D. Henderson, Andy Podgurski. 24-28 [doi]
- Do Energy-Oriented Changes Hinder Maintainability?Luis Cruz 0002, Rui Abreu, John C. Grundy, Li Li, Xin Xia. 29-40 [doi]
- Can Everyone use my app? An Empirical Study on Accessibility in Android AppsChristopher Vendome, Diana Solano, Santiago Liñán, Mario Linares Vásquez. 41-52 [doi]
- Quantifying the Performance Impact of SQL Antipatterns on Mobile ApplicationsYingjun Lyu, Ali Alotaibi, William G. J. Halfond. 53-64 [doi]
- An Empirical Study of UI Implementations in Android ApplicationsMian Wan, Negarsadat Abolhassani, Ali Alotaibi, William G. J. Halfond. 65-75 [doi]
- Same App, Different Countries: A Preliminary User Reviews Study on Most Downloaded iOS AppsKamonphop Srisopha, Chukiat Phonsom, Keng Lin, Barry W. Boehm. 76-80 [doi]
- Improving Bug Triaging with High Confidence Predictions at EricssonAindrila Sarkar, Peter C. Rigby, Béla Bartalos. 81-91 [doi]
- An Industrial Study on the Differences between Pre-Release and Post-Release BugsRenaud Rwemalika, Marinos Kintis, Mike Papadakis, Yves Le Traon, Pierre Lorrach. 92-102 [doi]
- Tracing with Less Data: Active Learning for Classification-Based Traceability Link RecoveryChris Mills, Javier Escobar-Avila, Aditya Bhattacharya, Grigoriy Kondyukov, Shayok Chakraborty, Sonia Haiduc. 103-113 [doi]
- Deep Learning Anti-Patterns from Code Metrics HistoryAntoine Barbez, Foutse Khomh, Yann-Gaël Guéhéneuc. 114-124 [doi]
- An Approach to Recommendation of Verbosity Log Levels Based on Logging IntentionHan Anu, Jie Chen, Wenchang Shi, Jianwei Hou, Bin Liang 0002, Bo Qin. 125-134 [doi]
- Automated Characterization of Software VulnerabilitiesDanielle Gonzalez, Holly Hastings, Mehdi Mirakhorli. 135-139 [doi]
- Learning to Identify Security-Related Issues Using Convolutional Neural NetworksDavid N. Palacio, Daniel McCrystal, Kevin Moran, Carlos Bernal-Cárdenas, Denys Poshyvanyk, Chris Shenefiel. 140-144 [doi]
- TECCD: A Tree Embedding Approach for Code Clone DetectionYi Gao, Zan Wang, Shuang Liu, Lin Yang, Wei Sang, Yuanfang Cai. 145-156 [doi]
- Investigating Context Adaptation Bugs in Code ClonesManishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 157-168 [doi]
- Decomposing God Classes at SiemensNicolas Anquetil, Anne Etien, Gaelle Andreo, Stéphane Ducasse. 169-180 [doi]
- Tracy: A Business-Driven Technical Debt Prioritization FrameworkRodrigo Rebouças de Almeida, Christoph Treude, Uirá Kulesza. 181-185 [doi]
- Self-Admitted Technical Debt Removal and Refactoring Actions: Co-Occurrence or More?Martina Iammarino, Fiorella Zampetti, Lerina Aversano, Massimiliano Di Penta. 186-190 [doi]
- Identifying the Within-Statement Changes to Facilitate Change UnderstandingChunhua Yang, Jim Whitehead. 191-201 [doi]
- Aiding Code Change Understanding with Semantic Change Impact AnalysisQuinn Hanam, Ali Mesbah 0001, Reid Holmes. 202-212 [doi]
- Towards Generating Transformation Rules without Examples for Android API ReplacementFerdian Thung, Hong Jin Kang, Lingxiao Jiang, David Lo 0001. 213-217 [doi]
- How Do Code Changes Evolve in Different Platforms? A Mining-Based InvestigationMarkos Viggiato, Johnatan Oliveira, Eduardo Figueiredo, Pooyan Jamshidi, Christian Kästner. 218-222 [doi]
- How the Experience of Development Teams Relates to Assertion Density of Test ClassesGemma Catolino, Fabio Palomba, Andy Zaidman, Filomena Ferrucci. 223-234 [doi]
- Automatic Discovery and Cleansing of Numerical Metamorphic RelationsBo Zhang, Hongyu Zhang 0002, Junjie Chen 0003, Dan Hao, Pablo Moscato. 235-245 [doi]
- AutoMR: Automatic Discovery and Cleansing of Numerical Metamorphic RelationsBo Zhang, Hongyu Zhang 0002, Junjie Chen 0003, Dan Hao, Pablo Moscato. 246 [doi]
- Automated Identification of Over-Privileged SmartThings AppsAtheer Abu Zaid, Manar H. Alalfi, Ali Miri. 247-251 [doi]
- EmoD: An End-to-End Approach for Investigating Emotion Dynamics in Software DevelopmentKrishna Neupane, Kabo Cheung, Yi Wang. 252-256 [doi]
- Know-How in Programming Tasks: From Textual Tutorials to Task-Oriented Knowledge GraphJiamou Sun, Zhenchang Xing, Rui Chu, Heilai Bai, Jinshui Wang, Xin Peng 0001. 257-268 [doi]
- An Empirical Study of Abbreviations and Expansions in Software ArtifactsChristian Donald Newman, Michael John Decker, Reem S. Alsuhaibani, Anthony Peruma, Dishant Kaushik, Emily Hill. 269-279 [doi]
- An Open Dataset of Abbreviations and ExpansionsChristian D. Newman, Michael John Decker, Reem S. Alsuhaibani, Anthony Peruma, Dishant Kaushik, Emily Hill. 280 [doi]
- Estimating Software Task Effort in CrowdsMohammed Alhamed, Tim Storer. 281-285 [doi]
- Do as I Do, Not as I Say: Do Contribution Guidelines Match the GitHub Contribution Process?Omar Elazhary, Margaret-Anne D. Storey, Neil A. Ernst, Andy Zaidman. 286-290 [doi]
- An Analysis of 35+ Million Jobs of Travis CIThomas Durieux, Rui Abreu, Martin Monperrus, Tegawendé F. Bissyandé, Luis Cruz 0002. 291-295 [doi]
- Linguistic Change in Open Source SoftwareMiroslav Tushev, Saket Khatiwada, Anas Mahmoud. 296-300 [doi]
- Learning How to Mutate Source Code from Bug-FixesMichele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White, Denys Poshyvanyk. 301-312 [doi]
- Personalized Code RecommendationTam Nguyen, Phong Vu, Tung Nguyen. 313-317 [doi]
- Syntax and Stack Overflow: A Methodology for Extracting a Corpus of Syntax Errors and FixesAlexander William Wong, Amir Salimi, Shaiful Alam Chowdhury, Abram Hindle. 318-322 [doi]
- BARRIERFINDER: Recognizing Ad Hoc BarriersTao Wang, Xiao Yu, Zhengyi Qiu, Guoliang Jin, Frank Mueller. 323-327 [doi]
- Impact Analysis of Syntactic and Semantic Similarities on Patch Prioritization in Automated Program RepairMoumita Asad, Kishan Kumar Ganguly, Kazi Sakib. 328-332 [doi]
- Losing Confidence in Quality: Unspoken Evolution of Computer Vision ServicesAlex Cummaudo, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek, Andrew Cain. 333-342 [doi]
- Inappropriate Usage Examples in Web API DocumentationsMasaki Hosono, Susumu Tokumoto, Supasit Monpratarnchai, Hironori Washizaki, Kiyoshi Honda, Hiromasa Nagumo, Hisanobu Sonoda, Yoshiaki Fukazawa, Kazuki Munakata, Takao Nakagawa, Yusuke Nemoto. 343-347 [doi]
- What Do Developers Discuss about Biometric APIs?Zhe Jin, Kong-Yik Chee, Xin Xia. 348-352 [doi]
- Teaching Software MaintenanceKeith Gallagher, Mark Fioravanti, Suzanne Kozaitis. 353-362 [doi]
- Continuous Collateral Privacy Risk Auditing of Evolving Autonomous Driving SoftwareChang Liu, Krerkkiat Chusap, Zhongen Li, Zhaojie Chen, Dylan Rogers, Fanghao Song. 363 [doi]
- Challenges in re-Platforming Mixed Language PL/I and COBOL IS to an Open Systems PlatformThomas Wagner, Christian Brem, Stefan Strobl, Thomas Grechenig. 364 [doi]
- Application of Philosophical Principles in Linux Kernel CustomizationHang Li, Lin Yan, XiLiang Zhao. 365 [doi]
- Lessons Learned from Large-Scale RefactoringHyrum Wright. 366 [doi]
- Interactive Traceability Links Visualization using Hierarchical Trace MapThazin Win Win Aung, Huan Huo, Yulei Sui. 367-369 [doi]
- Supporting Software Architecture Maintenance by Providing Task-Specific RecommendationsMatthias Galster, Christoph Treude, Kelly Blincoe. 370-372 [doi]
- A Validation Method of Self-Adaptive Strategy Based on POMDPTong Wu, Qingshan Li, Lu Wang. 373-375 [doi]
- Modeling the Relationship Between Identifier Name and BehaviorChristian D. Newman, Anthony Peruma, Reem S. Alsuhaibani. 376-378 [doi]
- Lib Metamorphosis: A Performance Analysis Framework for Exchanging Data Structures in Performance Sensitive ApplicationsMichael D. Shah. 379-381 [doi]
- Processing Large Datasets of Fined Grained Source Code ChangesStanislav Levin, Amiram Yehudai. 382-385 [doi]
- CodeSonar (R) Extension for Copy-Paste-(Mis) Adapt Error DetectionPetru Florin Mihancea, Roger Scott. 386-389 [doi]
- Recommending Exception Handling CodeTam Nguyen, Phong Vu, Tung Nguyen. 390-393 [doi]
- SmartEmbed: A Tool for Clone and Bug Detection in Smart Contracts through Structural Code EmbeddingZhipeng Gao, Vinoj Jayasundara, Lingxiao Jiang, Xin Xia 0001, David Lo 0001, John C. Grundy. 394-397 [doi]
- Near-Omniscient Debugging for Java Using Size-Limited Execution TraceKazumasa Shimari, Takashi Ishio, Tetsuya Kanda 0001, Katsuro Inoue. 398-401 [doi]
- Sciit: Aligning Source Control Management and Issue Tracking ArchitecturesNystrom Edwards, Dhitiwat Jongsuebchoke, Tim Storer. 402-405 [doi]
- Ticket Tagger: Machine Learning Driven Issue ClassificationRafael Kallis, Andrea Di Sorbo, Gerardo Canfora, Sebastiano Panichella. 406-409 [doi]
- Kraken-Mobile: Cross-Device Interaction-Based Testing of Android AppsWilliam Ravelo-Méndez, Camilo Escobar-Vélasquez, Mario Linares Vásquez. 410-413 [doi]
- MigrationMiner: An Automated Detection Tool of Third-Party Java Library Migration at the Method LevelHussein Alrubaye, Mohamed Wiem Mkaouer, Ali Ouni 0001. 414-417 [doi]
- OPIA: A Tool for On-Device Testing of Vulnerabilities in Android ApplicationsLaura Bello-Jiménez, Alejandro Mazuera-Rozo, Mario Linares Vásquez, Gabriele Bavota. 418-421 [doi]
- OSAIFU: A Source Code Factorizer on Android StudioMasahiro Hata, Masashi Nishimoto, Keiji Nishiyama, Hideyuki Kawabata, Tetsuo Hironaka. 422-425 [doi]
- An Empirical Study of the Relationship between Continuous Integration and Test Code EvolutionGustavo Sizílio Nery, Daniel Alencar da Costa, Uirá Kulesza. 426-436 [doi]
- What Factors Make SQL Test Cases Understandable for Testers? A Human Study of Automated Test Data Generation TechniquesAbdullah Alsharif, Gregory M. Kapfhammer, Phil McMinn. 437-448 [doi]
- Systematically Testing and Diagnosing Responsiveness for Android AppsWenhua Zhao, Zhenkai Ding, Mingyuan Xia, Zhengwei Qi. 449-453 [doi]
- DeepEvolution: A Search-Based Testing Approach for Deep Neural NetworksHoussem Ben Braiek, Foutse Khomh. 454-458 [doi]
- An Exploratory Study of Logging Configuration Practice in JavaChen Zhi, Jianwei Yin, ShuiGuang Deng, Maoxin Ye, Min Fu, Tao Xie. 459-469 [doi]
- Performance-Influence Model for Highly Configurable Software with Fourier Learning and Lasso RegressionHuong Ha, Hongyu Zhang 0002. 470-480 [doi]
- Microservices Migration in Industry: Intentions, Strategies, and ChallengesJonas Fritzsch, Justus Bogner, Stefan Wagner 0001, Alfred Zimmermann. 481-490 [doi]
- Comparing Constraints Mined From Execution Logs to Understand Software EvolutionThomas Krismayer, Michael Vierhauser, Rick Rabiser, Paul Grünbacher. 491-495 [doi]
- Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific SoftwareEffat Farhana, Nasif Imtiaz, Akond Rahman. 496-500 [doi]
- Comprehending Test Code: An Empirical StudyChak Shun Yu, Christoph Treude, Maurício Finavaro Aniche. 501-512 [doi]
- An Empirical Study Assessing Source Code Readability in ComprehensionJohn Johnson, Sergio Lubo, Nishitha Yedla, Jairo Aponte, Bonita Sharif. 513-523 [doi]
- Handling Duplicates in Dockerfiles Families: Learning from ExpertsMohamed A. Oumaziz, Jean-Rémy Falleri, Xavier Blanc 0001, Tegawendé F. Bissyandé, Jacques Klein. 524-535 [doi]
- Share, But be Aware: Security Smells in Python GistsMd. Rayhanur Rahman, Akond Rahman, Laurie Williams. 536-540 [doi]
- Can Automated Impact Analysis Techniques Help Predict Decaying Modules?Natthawute Sae-Lim, Shinpei Hayashi, Motoshi Saeki. 541-545 [doi]
- Assuring the Evolvability of Microservices: Insights into Industry Practices and ChallengesJustus Bogner, Jonas Fritzsch, Stefan Wagner 0001, Alfred Zimmermann. 546-556 [doi]
- Investigating Instability Architectural Smells Evolution: An Exploratory Case StudyDarius Sas, Paris Avgeriou, Francesca Arcelli Fontana. 557-567 [doi]
- A Qualitative Study on Framework DebuggingZack Coker, David Gray Widder, Claire Le Goues, Christopher Bogart, Joshua Sunshine. 568-579 [doi]
- Adoption, Support, and Challenges of Infrastructure-as-Code: Insights from IndustryMichele Guerriero, Martin Garriga, Damian A. Tamburri, Fabio Palomba. 580-589 [doi]
- Studying the Impact of Policy Changes on Bug Handling PerformanceZeinab Abou Khalil. 590-594 [doi]
- Automatic Examining of Software Architectures on Mobile Applications CodebasesDragos Dobrean. 595-599 [doi]
- The Relationship Between Cognitive Complexity and the Probability of DefectsBasma S. Alqadi. 600-604 [doi]
- Business-Driven Technical Debt PrioritizationRodrigo Rebouças de Almeida. 605-609 [doi]
- Applying Markov Models to Identify Grammatical Patterns of Function IdentifiersReem S. Alsuhaibani. 610-614 [doi]
- Enhancing Eye Tracking of Source Code: A Specialized Fixation Filter for Source CodeDrew T. Guarnera. 615-618 [doi]
- Improving the Robustness and Efficiency of Continuous Integration and DeploymentKeheliya Gallaba. 619-623 [doi]
- Towards Better Understanding Developer Perception of RefactoringEman Abdullah AlOmar. 624-628 [doi]
- RAPTOR: Release-Aware and Prioritized Bug-Fixing Task Assignment OptimizationYutaro Kashiwa. 629-633 [doi]
- Characterizing Performance Regression Introducing Code ChangesDeema Alshoaibi. 634-638 [doi]
- Towards a Model to Appraise and Suggest Identifier NamesAnthony Peruma. 639-643 [doi]
- Design Smell Detection and Analysis for Open Source Java SoftwareAsif Imran. 644-648 [doi]