Abstract is missing.
- PTM4Tag: sharpening tag recommendation of stack overflow posts with pre-trained modelsJunda He, Bowen Xu, Zhou Yang 0003, DongGyun Han, Chengran Yang, David Lo 0001. 1-11 [doi]
- GypSum: learning hybrid representations for code summarizationYu Wang, Yu Dong, Xuesong Lu, Aoying Zhou. 12-23 [doi]
- M2TS: multi-scale multi-modal approach based on transformer for source code summarizationYuexiu Gao, Chen Lyu. 24-35 [doi]
- Semantic similarity metrics for evaluating source code summarizationSakib Haque, Zachary Eberhart, Aakash Bansal, Collin McMillan. 36-47 [doi]
- LAMNER: code comment generation using character language model and named entity recognitionRishab Sharma, Fuxiang Chen, Fatemeh H. Fard. 48-59 [doi]
- Zero-shot program representation learningNan Cui, Yuze Jiang, Xiaodong Gu 0002, Beijun Shen. 60-70 [doi]
- On the cross-modal transfer from natural language to code through adapter modulesDivyam Goel, Ramansh Grover, Fatemeh H. Fard. 71-81 [doi]
- Self-supervised learning of smart contract representationsShouliang Yang, Xiaodong Gu 0002, Beijun Shen. 82-93 [doi]
- An exploratory study of analyzing JavaScript online code clonesMd Rakib Hossain Misu, Abdus Satter. 94-98 [doi]
- Accurate generation of trigger-action programs with domain-adapted sequence-to-sequence learningImam Nur Bani Yusuf, Lingxiao Jiang, David Lo 0001. 99-110 [doi]
- Estimating developers' cognitive load at a fine-grained level using eye-tracking measuresAmine Abbad Andaloussi, Thierry Sorg, Barbara Weber. 111-121 [doi]
- So many brackets!: an analysis of how SQL learners (mis)manage complexity during query formulationDaphne Miedema, George Fletcher 0001, Efthimia Aivaloglou. 122-132 [doi]
- Anchoring code understandability evaluations through task descriptionsMarvin Wyrich, Lasse Merz, Daniel Graziotin. 133-140 [doi]
- The effect of information content and length on name recollectionAsaf Etgar, Ram Friedman, Shaked Haiman, Dana Perez, Dror G. Feitelson. 141-151 [doi]
- Understanding code snippets in code reviews: a preliminary study of the OpenStack communityLiming Fu, Peng Liang 0001, Beiqi Zhang. 152-156 [doi]
- GitQ- towards using badges as visual cues for GitHub projectsAkhila Sri Manasa Venigalla, Kowndinya Boyalakuntla, Sridhar Chimalakonda. 157-161 [doi]
- Revisiting the effect of branch handling strategies on change recommendationKeisuke Isemoto, Takashi Kobayashi 0001, Shinpei Hayashi. 162-172 [doi]
- pycefr: Python competency level through code analysisGregorio Robles, Raula Gaikovina Kula, Chaiyong Ragkhitwetsagul, Tattiya Sakulniwat, Kenichi Matsumoto, Jesús M. González-Barahona. 173-177 [doi]
- Automated identification of libraries from vulnerability data: can we do better?Stefanus A. Haryono, Hong Jin Kang, Abhishek Sharma 0002, Asankhaya Sharma, Andrew E. Santosa, Ming Yi Ang, David Lo 0001. 178-189 [doi]
- Example-based vulnerability detection and repair in Java codeYing Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng 0001. 190-201 [doi]
- An approach to automatically assess method namesReem S. Alsuhaibani, Christian D. Newman, Michael John Decker, Michael L. Collard, Jonathan I. Maletic. 202-213 [doi]
- An empirical investigation on the trade-off between smart contract readability and gas consumptionAnna Vacca, Michele Fredella, Andrea Di Sorbo, Corrado Aaron Visaggio, Gerardo Canfora. 214-224 [doi]
- CodePanorama: a language agnostic tool for visual code inspectionMarc Etter, Farhad Mehta. 225-228 [doi]
- Simple or complex?: together for a more accurate just-in-time defect predictorXin Zhou, DongGyun Han, David Lo 0001. 229-240 [doi]
- Causette: user-controlled rearrangement of causal constructs in a code editorAlice Martin, Mathieu Magnaudet, Stéphane Conversy. 241-252 [doi]
- Error identification strategies for Python Jupyter notebooksderek robinson, Neil A. Ernst, Enrique Larios Vargas, Margaret-Anne D. Storey. 253-263 [doi]
- Performance anomaly detection through sequence alignment of system-level tracesMadeline Janecek, Naser Ezzati Jivan, Abdelwahab Hamou-Lhadj. 264-274 [doi]
- QuLog: data-driven approach for log instruction quality assessmentJasmin Bogatinovski, Sasho Nedelkoski, Alexander Acker, Jorge Cardoso 0001, Odej Kao. 275-286 [doi]
- Fixing continuous integration tests from within the IDE with contextual informationCasper Boone, Carolin E. Brandt, Andy Zaidman. 287-297 [doi]
- Shape-analysis driven memory graph visualizationJan H. Boockmann, Gerald Lüttgen. 298-308 [doi]
- On the effectiveness of pretrained models for API learningMohammad Abdul Hadi, Imam Nur Bani Yusuf, Ferdian Thung, Kien Gia Luong, Lingxiao Jiang, Fatemeh H. Fard, David Lo 0001. 309-320 [doi]
- Deep API learning revisitedJames Martin, Jin L. C. Guo. 321-330 [doi]
- ARSeek: identifying API resource using code and discussion on stack overflowKien Luong, Mohammad Hadi, Ferdian Thung, Fatemeh H. Fard, David Lo 0001. 331-342 [doi]
- Benchmarking library recognition in tweetsTing Zhang, Divya Prabha Chandrasekaran, Ferdian Thung, David Lo 0001. 343-353 [doi]
- HELoC: hierarchical contrastive learning of source code representationXiao Wang, Qiong Wu, Hongyu Zhang 0002, Chen Lyu, Xue Jiang, Zhuoran Zheng, Lei Lyu, Songlin Hu. 354-365 [doi]
- Exploring GNN based program embedding technologies for binary related tasksYixin Guo, Pengcheng Li, Yingwei Luo, Xiaolin Wang 0001, Zhenlin Wang. 366-377 [doi]
- Learning to represent programs with heterogeneous graphsKechi Zhang, Wenhan Wang, Huangzhao Zhang, Ge Li 0001, Zhi Jin. 378-389 [doi]
- Unified abstract syntax tree representation learning for cross-language program classificationKesu Wang, Meng Yan, He Zhang, Haibo Hu. 390-400 [doi]
- On the transferability of pre-trained language models for low-resource programming languagesFuxiang Chen, Fatemeh H. Fard, David Lo 0001, Timofey Bryksin. 401-412 [doi]
- C4: contrastive cross-language code clone detectionChenning Tao, Qi Zhan, Xing Hu, Xin Xia. 413-424 [doi]
- Predicting change propagation between code clone instances by graph-based deep learningBin Hu, Yijian Wu, Xin Peng 0001, Chaofeng Sha, Xiaochen Wang, Baiqiang Fu, Wenyun Zhao. 425-436 [doi]
- An exploratory study on code attention in BERTRishab Sharma, Fuxiang Chen, Fatemeh H. Fard, David Lo 0001. 437-448 [doi]
- Exploring and understanding cross-service code clones in microservice projectsYang Zhao, Ran Mo, Yao Zhang, Siyuan Zhang, Pu Xiong. 449-459 [doi]
- MSCCD: grammar pluggable clone detection based on ANTLR parser generationWenqing Zhu, Norihiro Yoshida, Toshihiro Kamiya, Eunjong Choi, Hiroaki Takada. 460-470 [doi]
- Algorithm identification in programming assignmentsPranshu Chourasia, Ganesh Ramakrishnan, Varsha Apte, Suraj Kumar. 471-481 [doi]
- Context-based cluster fault localizationJunji Yu, Yan Lei, Huan Xie, Lingfeng Fu, Chunyan Liu. 482-493 [doi]
- A study of single statement bugs involving dynamic language featuresLi Sui, Shawn Rasheed, Amjed Tahir, Jens Dietrich 0001. 494-498 [doi]
- XAI4FL: enhancing spectrum-based fault localization with explainable artificial intelligenceRatnadira Widyasari, Gede Artha Azriadi Prana, Stefanus A. Haryono, Yuan Tian 0008, Hafil Noer Zachiary, David Lo 0001. 499-510 [doi]
- Do visual issue reports help developers fix bugs?: a preliminary study of using videos and images to report issues on GitHubHiroki Kuramoto, Masanari Kondo, Yutaro Kashiwa, Yuta Ishimoto, Kaze Shindo, Yasutaka Kamei, Naoyasu Ubayashi. 511-515 [doi]
- Find bugs in static bug findersJunjie Wang 0001, Yuchao Huang, Song Wang, Qing Wang. 516-527 [doi]
- didiffff: a viewer for comparing changes in both code and execution tracesTetsuya Kanda 0001, Kazumasa Shimari, Katsuro Inoue. 528-532 [doi]
- CSRS: code search with relevance matching and semantic matchingYi Cheng, Li Kuang. 533-542 [doi]
- Clone-based code method usage pattern miningZhipeng Xue, Yuanliang Zhang, Rulin Xu. 543-547 [doi]
- Towards exploring the code reuse from stack overflow during software developmentYuan Huang 0002, Furen Xu, Hao-Jie Zhou, Xiangping Chen, Xiaocong Zhou, Tong Wang. 548-559 [doi]
- The ineffectiveness of domain-specific word embedding models for GUI test reuseFarideh Khalili, Ali Mohebbi, Valerio Terragni, Mauro Pezzè, Leonardo Mariani, Abbas Heydarnoori. 560-564 [doi]
- Impact of change granularity in refactoring detectionLei Chen, Shinpei Hayashi. 565-569 [doi]
- On the developers' attitude towards CRAN checksPranjay Kumar, Davin Ie, Melina Vidoni. 570-574 [doi]
- Does coding in Pythonic zen peak performance?: preliminary experiments of nine Pythonic idioms at scalePattara Leelaprute, Bodin Chinthanet, Supatsara Wattanakriengkrai, Raula Gaikovina Kula, Pongchai Jaisri, Takashi Ishio. 575-579 [doi]
- Code smells in Elixir: early results from a grey literature reviewLucas Francisco da Matta Vegi, Marco Túlio Valente. 580-584 [doi]
- Fine-grained code-comment semantic interaction analysisMingyang Geng, Shangwen Wang, Dezun Dong, Shanzhi Gu, Fang Peng, Weijian Ruan, Xiangke Liao. 585-596 [doi]
- Using discord conversations as program comprehension aidMarco Raglianti, Csaba Nagy 0001, Roberto Minelli, Michele Lanza. 597-601 [doi]
- Demystifying software release note issues on GitHubJianyu Wu, Hao He, Wenxin Xiao, Kai Gao, Minghui Zhou. 602-613 [doi]
- A first look at duplicate and near-duplicate self-admitted technical debt commentsJerin Yasmin, Mohammad Sadegh Sheikhaei, Yuan Tian 0008. 614-618 [doi]
- HatCUP: hybrid analysis and attention based just-in-time comment updatingHongquan Zhu, Xincheng He, Lei Xu 0003. 619-630 [doi]
- Casdoc: unobtrusive explanations in code examplesMathieu Nassif, Zara Horlacher, Martin P. Robillard. 631-635 [doi]
- Backports: change types, challenges and strategiesDebasish Chakroborti, Kevin A. Schneider, Chanchal K. Roy. 636-647 [doi]
- How do i model my system?: a qualitative study on the challenges that modelers experienceChristopher Vendome, Eric J. Rapos, Nick DiGennaro. 648-659 [doi]
- Two approaches to survival analysis of open source Python projectsderek robinson, Keanelek Enns, Neha Koulecar, Manish Sihag. 660-669 [doi]