Abstract is missing.
- On the importance of common sense in program synthesisHila Peleg. 7 [doi]
- Buffer overflow detection for C programs is hard to learnYang Zhao, Xingzhong Du, Paddy Krishnan, Cristina Cifuentes. 8-9 [doi]
- Detecting anomalies in Kotlin codeTimofey Bryksin, Victor Petukhov, Kirill Smirenko, Nikita Povarov. 10-12 [doi]
- Can we learn some PL theory?: how to make use of a corpus of subtype checksArtem Pelenitsyn. 13 [doi]
- Subtype polymorphism à la carte via machine learning on dependent typesJerry Swan, Colin G. Johnson, Edwin C. Brady. 14-16 [doi]
- Monotonic gradual typing in a common calculusBenjamin Chung, Jan Vitek. 17-23 [doi]
- A formalism for specification of Java API interfacesDavide Ancona, Francesco Dagnino, Luca Franceschini. 24-26 [doi]
- Incremental overload resolution in object-oriented programming languagesTamás Szabó, Edlira Kuci, Matthijs Bijman, Mira Mezini, Sebastian Erdweg. 27-33 [doi]
- Static latency tracking with placement typesPascal Weisenburger, Tobias Reinhard, Guido Salvaneschi. 34-36 [doi]
- Reasoning about functional programming in Java and C++David R. Cok. 37-39 [doi]
- An exercise in verifying sequential programs with VerCorsSebastiaan J. C. Joosten, Wytse Oortwijn, Mohsen Safari, Marieke Huisman. 40-45 [doi]
- Towards automated translation between generations of GUI-based tests for mobile devicesLuca Ardito, Riccardo Coppola, Marco Torchiano, Emil Alégroth. 46-53 [doi]
- Automatic GUI testing of desktop applications: an empirical assessment of the state of the artMauro Pezzè, Paolo Rondena, Daniele Zuddas. 54-62 [doi]
- GUI scalability issues of windows desktop applications and how to find themRudolf Ramler, Thomas Wetzlmaier, Robert Hoschek. 63-67 [doi]
- Is this the lifecycle we really want?: an automated black-box testing approach for Android activitiesVincenzo Riccio, Domenico Amalfitano, Anna Rita Fasolino. 68-77 [doi]
- Redesigning Soot's data-flow analysis framework for abstract interpretationElena Sherman. 78-84 [doi]
- The secret sauce in efficient and precise static analysis: the beauty of distributive, summary-based static analyses (and how to master them)Eric Bodden. 85-93 [doi]
- AFFOGATO: runtime detection of injection attacks for Node.jsFrançois Gauthier, Behnaz Hassanshahi, Alexander Jordan. 94-99 [doi]
- NJR: a normalized Java resourceJens Palsberg, Cristina V. Lopes. 100-106 [doi]
- Systematic evaluation of the unsoundness of call graph construction algorithms for JavaMichael Reif, Florian Kübler, Michael Eichberg, Mira Mezini. 107-112 [doi]
- Lattice based modularization of static analysesMichael Eichberg, Florian Kübler, Dominik Helm, Michael Reif, Guido Salvaneschi, Mira Mezini. 113-118 [doi]
- Iceberg: dynamic analysis of Java synchronized methods for investigating runtime performance variabilityMichael D. Shah, Samuel Z. Guyer. 119-124 [doi]
- Izinto: a pattern-based IoT testing frameworkPedro Martins Pontes, Bruno Lima, João Pascoal Faria. 125-131 [doi]
- Analysing the effect of uncertainty in airport surface operationsHeron Yang, Robert Morris, Corina S. Pasareanu. 132-137 [doi]
- Electromagnetic side-channel attacks: potential for progressing hindered digital forensic analysisAsanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon. 138-143 [doi]