Abstract is missing.
- An Effective Approach for Parsing Large Log FilesIssam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Mohammed A. Shehab. 1-12 [doi]
- An Empirical Study of Challenges in Converting Deep Learning ModelsMoses Openja, Amin Nikanjam, Ahmed Haj Yahmed, Foutse Khomh, Zhen Ming Jack Jiang. 13-23 [doi]
- An Empirical Study of Flaky Tests in JavaScriptNegar Hashemi, Amjed Tahir, Shawn Rasheed. 24-34 [doi]
- An Empirical Study on Performance Bugs in Deep Learning FrameworksTarek Makkouk, Dong Jae Kim, Tse-Hsun Peter Chen. 35-46 [doi]
- An Empirical Study on the Fault-Inducing Effect of Functional Constructs in PythonFiorella Zampetti, François Belias, Cyrine Zid, Giuliano Antoniol, Massimiliano Di Penta. 47-58 [doi]
- An Empirical Study on the Usage of Automated Machine Learning ToolsForough Majidi, Moses Openja, Foutse Khomh, Heng Li. 59-70 [doi]
- Automatic Pull Request Title GenerationTing Zhang, Ivana Clairine Irsan, Ferdian Thung, DongGyun Han, David Lo 0001, Lingxiao Jiang. 71-81 [doi]
- BashExplainer: Retrieval-Augmented Bash Code Comment Generation based on Fine-tuned CodeBERTChi Yu, Guang Yang 0019, Xiang Chen, Ke Liu, Yanlin Zhou. 82-93 [doi]
- Cross-Modal Contrastive Learning for Code SearchZejian Shi, Yun Xiong, Xiaolong Zhang, Yao Zhang 0009, Shanshan Li, Yangyong Zhu. 94-105 [doi]
- Dazed and Confused: Studying the Prevalence of Atoms of Confusion in Long-Lived Java LibrariesWendell Mendes, Oton Pinheiro, Emanuele Santos, Lincoln S. Rocha, Windson Viana. 106-116 [doi]
- Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial ProgramsWai-Kin Wong, Huaijin Wang, Pingchuan Ma 0004, Shuai Wang, Mingyue Jiang, Tsong Yueh Chen, Qiyi Tang 0003, Sen Nie, Shi Wu. 117-128 [doi]
- Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance IssuesMohammed Alhamed, Tim Storer. 129-138 [doi]
- Exploring the Notion of Risk in Code Reviewer RecommendationFarshad Kazemi, Maxime Lamothe, Shane McIntosh. 139-150 [doi]
- FFL: Fine-grained Fault Localization for Student Programs via Syntactic and Semantic ReasoningThanh-Dat Nguyen, Thanh Le-Cong, Duc-Minh Luong, Van-Hai Duong, Xuan-Bach D. Le, David Lo 0001, Quyet Thang Huynh. 151-162 [doi]
- Guiding Automated Test Case Generation for Transaction-Reverting Statements in Smart ContractsMitchell Olsthoorn, Arie van Deursen, Annibale Panichella. 163-174 [doi]
- Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect MatchingJiamou Sun, Zhenchang Xing, Xiwei Xu, Liming Zhu 0001, Qinghua Lu 0001. 175-186 [doi]
- INFuse: Towards Efficient Context Consistency by Incremental-Concurrent Check FusionLingyu Zhang 0005, Huiyan Wang, Chang Xu 0001, Ping Yu 0002. 187-198 [doi]
- Improving Fault Localization Using Model-domain Synthesized Failing Test GenerationZhuo Zhang 0007, Yan Lei, Xiaoguang Mao, Meng Yan, Xin Xia 0001. 199-210 [doi]
- Is Kernel Code Different From Non-Kernel Code? A Case Study of BSD Family Operating SystemsGunnar Kudrjavets, Jeff Thomas, Nachiappan Nagappan, Ayushi Rastogi. 211-222 [doi]
- On the Security of Python Virtual Machines: An Empirical StudyXinrong Lin, Baojian Hua, Qiliang Fan. 223-234 [doi]
- On the Use of GitHub Actions in Software Development RepositoriesAlexandre Decan, Tom Mens, Pooya Rostami Mazrae, Mehdi Golzadeh. 235-245 [doi]
- OpenCBS: An Open-Source COBOL Defects Benchmark SuiteDylan Lee, Austin Z. Henley, Bill Hinshaw, Rahul Pandita. 246-256 [doi]
- Peeler: Learning to Effectively Predict Flakiness without Running TestsYihao Qin, Shangwen Wang, Kui Liu, Bo Lin, Hongjun Wu, Li Li 0029, Xiaoguang Mao, Tegawendé F. Bissyandé. 257-268 [doi]
- Quantifying the Potential to Automate the Synchronization of Variants in Clone-and-OwnAlexander Schultheiß, Paul Maximilian Bittner, Thomas Thüm, Timo Kehrer. 269-280 [doi]
- RMove: Recommending Move Method Refactoring Opportunities using Structural and Semantic Representations of CodeDi Cui, Siqi Wang, Yong Luo, Xingyu Li, Jie Dai, Lu Wang, Qingshan Li. 281-292 [doi]
- Smart Money Wasting: Analyzing Gas Cost Drivers of Ethereum Smart ContractsBenedikt Severin, Marc Hesenius, Florian Blum, Michael Hettmer, Volker Gruhn. 293-304 [doi]
- Stronger Together: On Combining Relationships in Architectural Recovery ApproachesEvelien Boerstra, John Ahn, Julia Rubin. 305-316 [doi]
- The Energy Cost of the Visitor PatternDéaglán Connolly Bree, Mel Ó Cinnéide. 317-328 [doi]
- VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage AnalysisQing Sun, Lili Xu, Yang Xiao, Feng Li, He Su, Yiming Liu, Hongyun Huang, Wei Huo. 329-339 [doi]
- What Is Thrown? Lightweight Precise Automatic Extraction of Exception Preconditions in Java MethodsDiego Marcilio, Carlo A. Furia. 340-351 [doi]
- What Made This Test Flake? Pinpointing Classes Responsible for Test FlakinessSarra Habchi, Guillaume Haben, Jeongju Sohn, Adriano Franci, Mike Papadakis, Maxime Cordy, Yves Le Traon. 352-363 [doi]
- A Conceptual Antifragile Microservice Framework for Reshaping Critical InfrastructuresHind Bangui, Bruno Rossi 0001, Barbora Buhnova. 364-368 [doi]
- A First Look at Information Highlighting in Stack Overflow AnswersShahla Shaan Ahmed, Shaowei Wang 0002, Haoxiang Zhang, Tse-Hsun Chen, Yuan Tian 0008. 369-373 [doi]
- Adding Context to Source Code Representations for Deep LearningFuwei Tian, Christoph Treude. 374-378 [doi]
- An Exploratory Study of Documentation Strategies for Product Features in Popular GitHub ProjectsTim Puhlfürß, Lloyd Montgomery, Walid Maalej. 379-383 [doi]
- Apples, Oranges & Fruits - Understanding Similarity of Software Repositories Through The Lens of Dissimilar ArtifactsA. Eashaan Rao, Sridhar Chimalakonda. 384-388 [doi]
- Developers Struggle with Authentication in Blazor WebAssemblyPascal Marc André, Quentin Stiévenart, Mohammad Ghafari. 389-393 [doi]
- Don't Reinvent the Wheel: Towards Automatic Replacement of Custom Implementations with APIsRosalia Tufano, Emad Aghajani, Gabriele Bavota. 394-398 [doi]
- Elevating Jupyter Notebook Maintenance Tooling by Identifying and Extracting Notebook StructuresYuan Jiang, Christian Kästner, Shurui Zhou. 399-403 [doi]
- Evaluating Atoms of Confusion in the Context of Code ReviewsVictoria Bogachenkova, Linh Nguyen, Felipe Ebert, Alexander Serebrenik, Fernando Castor. 404-408 [doi]
- FuzzNT : Checking for Program Non-terminationHrishikesh Karmarkar, Raveendra Kumar Medicherla, Ravindra Metta, Prasanth Yeduru. 409-413 [doi]
- How to Configure Masked Event Anomaly Detection on Software Logs?Jesse Nyyssölä, Mika Mäntylä, Martín Varela. 414-418 [doi]
- Impact of Defect Instances for Successful Deep Learning-based Automatic Program RepairMisoo Kim, YoungKyoung Kim, Jinseok Heo, Hohyeon Jeong, Sungoh Kim, Eunseok Lee. 419-423 [doi]
- Inferring Fine-grained Traceability Links between Javadoc Comment and JUnit Test CodeJeewoong Kim, Shin Hong. 424-428 [doi]
- Integrating Software Issue Tracking and Traceability ModelsNaveen Ganesh Muralidharan, Vera Pantelic, Victor Bandur, Richard F. Paige. 429-433 [doi]
- Together or Apart? Investigating a mediator bot to aggregate bot's comments on pull requestsEric Ribeiro, Ronan Nascimento, Igor Steinmacher, Laerte Xavier, Marco Aurélio Gerosa, Hugo de Paula, Mairieli Wessel. 434-438 [doi]
- "When the Code becomes a Crime Scene" Towards Dark Web Threat Intelligence with Software Quality MetricsGiuseppe Cascavilla, Gemma Catolino, F. Ebert, Damien A. Tamburri, W. J. van den Heuvel. 439-443 [doi]
- Why Don't XAI Techniques Agree? Characterizing the Disagreements Between Post-hoc Explanations of Defect PredictionsSaumendu Roy, Gabriel Laberge, Banani Roy, Foutse Khomh, Amin Nikanjam, Saikat Mondal. 444-448 [doi]
- AIP: Scalable and Reproducible Execution Traces in Energy Studies on Mobile DevicesOlivier Nourry, Yutaro Kashiwa, Bin Lin 0008, Gabriele Bavota, Michele Lanza, Yasutaka Kamei. 449-453 [doi]
- AutoPRTitle: A Tool for Automatic Pull Request Title GenerationIvana Clairine Irsan, Ting Zhang, Ferdian Thung, David Lo 0001, Lingxiao Jiang. 454-458 [doi]
- CATTO: Just-in-time Test Case Selection and ExecutionDario Amoroso d'Aragona, Fabiano Pecorelli, Simone Romano 0001, Giuseppe Scanniello, Maria Teresa Baldassarre, Andrea Janes, Valentina Lenarduzzi. 459-463 [doi]
- COBREX: A Tool for Extracting Business Rules from COBOLMir Sameed Ali, Nikhil Manjunath, Sridhar Chimalakonda. 464-468 [doi]
- Community Smell Detection and Refactoring in SLACK: The CADOCS ProjectGianmario Voria, Viviana Pentangelo, Antonio Della Porta, Stefano Lambiase, Gemma Catolino, Fabio Palomba, Filomena Ferrucci. 469-473 [doi]
- DiscOrDance: Visualizing Software Developers Communities on DiscordMarco Raglianti, Csaba Nagy 0001, Roberto Minelli, Michele Lanza. 474-478 [doi]
- Defuse: A Data Annotator and Model Builder for Software Defect PredictionStefano Dalla Palma, Dario Di Nucci, Damian A. Tamburri. 479-483 [doi]
- eTagger - An Energy Pattern Tagging Tool for GitHub Issues in Android ProjectsShriram Shanbhag, Sridhar Chimalakonda, Vibhu Saujanya Sharma, Vikrant Kaulgud. 484-488 [doi]
- LiFUSO: A Tool for Library Feature Unveiling based on Stack Overflow PostsCamilo Velázquez-Rodríguez, Eleni Constantinou, Coen De Roover. 489-493 [doi]
- The Visual Debugger ToolTim Kräuter, Harald König, Adrian Rutle, Yngve Lamo. 494-498 [doi]
- Perun: Performance Version SystemTomás Fiedor, Jirí Pavela, Adam Rogalewicz, Tomás Vojnar. 499-503 [doi]
- RestTestGen: An Extensible Framework for Automated Black-box Testing of RESTful APIsDavide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato. 504-508 [doi]
- RepoQuester: A Tool Towards Evaluating GitHub ProjectsKowndinya Boyalakuntla, Meiyappan Nagappan, Sridhar Chimalakonda, Nuthan Munaiah. 509-513 [doi]
- VSCode Migrate: Semi-Automatic Migrations for Low Coverage ProjectsTim Vahlbrock, Martin Guddat, Tom Vierjahn. 514-518 [doi]
- Automated Server Testing: an Industrial Experience ReportChao Peng, Yujun Gao, Ping Yang. 519-522 [doi]
- Generating Customised Control Flow Graphs for Legacy Languages with Semi-ParsingCéline Deknop, Johan Fabry, Kim Mens, Vadim Zaytsev. 523-532 [doi]
- Learning-based Identification of Coding Best Practices from Software DocumentationNeela Sawant, Srinivasan H. Sengamedu. 533-542 [doi]
- MUBot: Learning to Test Large-Scale Commercial Android Apps like a HumanChao Peng, Zhao Zhang, Zhengwei Lv, Ping Yang. 543-552 [doi]
- Mining Annotation Usage Rules: A Case Study with MicroProfileBatyr Nuryyev, Ajay Kumar Jha, Sarah Nadi, Yee-Kang Chang, Emily Jiang, Vijay Sundaresan. 553-562 [doi]
- On Quantifying the Benefits of Dead Code RemovalGunnar Kudrjavets, Ayushi Rastogi, Jeff Thomas, Nachiappan Nagappan. 563 [doi]
- Selecting Test Cases based on Similarity of Runtime Information: A Case Study of an Industrial SimulatorKazumasa Shimari, Masahiro Tanaka, Takashi Ishio, Makoto Matsushita, Katsuro Inoue, Satoru Takanezawa. 564-567 [doi]
- The Engineering Implications of Code Maintenance in PracticeNoah Lee, Rui Abreu 0001, Mehmet Yatbaz, Hang Qu, Nachiappan Nagappan. 568-577 [doi]
- There Ain't No Such Thing as a Free Custom Memory AllocatorGunnar Kudrjavets, Jeff Thomas, Aditya Kumar, Nachiappan Nagappan, Ayushi Rastogi. 578-581 [doi]
- Using a Nearest-Neighbour, BERT-Based Approach for Scalable Clone DetectionMuslim Chochlov, Gul Aftab Ahmed, James Vincent Patten, Guoxian Lu, Wei Hou, David Gregg, Jim Buckley. 582-591 [doi]
- Assessing and Improving the Quality of Docker ArtifactsGiovanni Rosa, Simone Scalabrino, Rocco Oliveto. 592-596 [doi]
- On the Evolution of Code ReadabilityValentina Piantadosi. 597-601 [doi]
- Quality Analysis of iOS Applications with Focus on Maintainability and SecurityKristiina Rahkema, Dietmar Pfahl. 602-606 [doi]
- Synthesising Linear API Usage Examples for API DocumentationSeham Alharbi, Dimitris S. Kolovos, Nicholas Matragkas. 607-611 [doi]
- The Phantom Menace: Unmasking Security Issues in Evolving SoftwareEmanuele Iannone, Fabio Palomba. 612-616 [doi]