Abstract is missing.
- The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (keynote paper)Mark Harman, William B. Langdon, Yue Jia, David Robert White, Andrea Arcuri, John A. Clark. 1-14 [doi]
- Re-founding software engineering - SEMAT at the age of three (keynote abstract)Ivar Jacobson, Ian Spence, Pontus Johnson, Mira Kajko-Mattsson. 15-19 [doi]
- Practical isolation of failure-inducing changes for debugging regression faultsKai Yu, Mengxiang Lin, Jin Chen, Xiangyu Zhang. 20-29 [doi]
- Diversity maximization speedup for fault localizationLiang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang. 30-39 [doi]
- Improving the effectiveness of spectra-based fault localization using specificationsDivya Gopinath, Razieh Nokhbeh Zaeem, Sarfraz Khurshid. 40-49 [doi]
- To what extent could we detect field defects? an empirical study of false negatives in static bug finding toolsFerdian Thung, Lucia, David Lo, Lingxiao Jiang, Foyzur Rahman, Premkumar T. Devanbu. 50-59 [doi]
- Diagnosys: automatic generation of a debugging interface to the Linux kernelTegawendé F. Bissyandé, Laurent Réveillère, Julia L. Lawall, Gilles Muller. 60-69 [doi]
- Duplicate bug report detection with a combination of information retrieval and topic modelingAnh Tuan Nguyen, Tung Thanh Nguyen, Tien N. Nguyen, David Lo, Chengnian Sun. 70-79 [doi]
- User-aware privacy control via extended static-information-flow analysisXusheng Xiao, Nikolai Tillmann, Manuel Fähndrich, Jonathan de Halleux, Michal Moskal. 80-89 [doi]
- Automatic query performance assessment during the retrieval of software artifactsSonia Haiduc, Gabriele Bavota, Rocco Oliveto, Andrea De Lucia, Andrian Marcus. 90-99 [doi]
- Supporting automated vulnerability analysis using formalized vulnerability signaturesMohamed Almorsy, John Grundy, Amani S. Ibrahim. 100-109 [doi]
- A qualitative study on user guidance capabilities in product configuration toolsRick Rabiser, Paul Grünbacher, Martin Lehofer. 110-119 [doi]
- Structured merge with auto-tuning: balancing precision and performanceSven Apel, Olaf Leßenich, Christian Lengauer. 120-129 [doi]
- An automated approach to forecasting QoS attributes based on linear and non-linear time series modelingAyman Amin, Lars Grunske, Alan Colman. 130-139 [doi]
- Puzzle-based automatic testing: bringing humans into the loop by solving puzzlesNing Chen, Sunghun Kim. 140-149 [doi]
- Using unfoldings in automated testing of multithreaded programsKari Kähkönen, Olli Saarikivi, Keijo Heljanko. 150-159 [doi]
- Runtime monitoring of software energy hotspotsAdel Noureddine, Aurelien Bourdon, Romain Rouvoy, Lionel Seinturier. 160-169 [doi]
- Can I clone this piece of code here?Xiaoyin Wang, Yingnong Dang, Lu Zhang 0023, Dongmei Zhang, Erica Lan, Hong Mei. 170-179 [doi]
- Predicting recurring crash stacksHyunmin Seo, Sunghun Kim. 180-189 [doi]
- Automated inference of goal-oriented performance prediction functionsDennis Westermann, Jens Happe, Rouven Krebs, Roozbeh Farahbod. 190-199 [doi]
- Code patterns for automatically validating requirements-to-code traces Achraf Ghabi, Alexander Egyed. 200-209 [doi]
- Unbounded data model verification using SMT solversJaideep Nijjar, Tevfik Bultan. 210-219 [doi]
- Computing repair trees for resolving inconsistencies in design modelsAlexander Reder, Alexander Egyed. 220-229 [doi]
- Supporting automated software re-engineering using re-aspectsMohamed Almorsy, John Grundy, Amani S. Ibrahim. 230-233 [doi]
- Supporting operating system kernel data disambiguation using points-to analysisAmani S. Ibrahim, John Grundy, James H. Hamlyn-Harris, Mohamed Almorsy. 234-237 [doi]
- Automatic recovery of statecharts from procedural codeMoria Abadi, Yishai A. Feldman. 238-241 [doi]
- Locating distinguishing features using diff setsJulia Rubin, Marsha Chechik. 242-245 [doi]
- Slicing and replaying code change historyKatsuhisa Maruyama, Eijiro Kitsu, Takayuki Omori, Shinpei Hayashi. 246-249 [doi]
- Generating model transformation rules from examples using an evolutionary algorithmMartin Faunes, Houari A. Sahraoui, Mounir Boukadoum. 250-253 [doi]
- Augmented dynamic symbolic executionKonrad Jamrozik, Gordon Fraser, Nikolai Tillmann, Jonathan de Halleux. 254-257 [doi]
- Using GUI ripping for automated testing of Android applicationsDomenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana, Salvatore De Carmine, Atif M. Memon. 258-261 [doi]
- kbe-anonymity: test data anonymization for evolving programsLucia, David Lo, Lingxiao Jiang, Aditya Budi. 262-265 [doi]
- Selection of regression system tests for security policy evolutionJeeHyun Hwang, Tao Xie, Donia El Kateb, Tejeddine Mouelhi, Yves Le Traon. 266-269 [doi]
- Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experienceLei Shang, Yi Lu 0003, Jingling Xue. 270-273 [doi]
- Automatically securing permission-based software by reducing the attack surface: an application to AndroidAlexandre Bartel, Jacques Klein, Yves Le Traon, Martin Monperrus. 274-277 [doi]
- Support vector machines for anti-pattern detectionAbdou Maiga, Nasir Ali, Neelesh Bhattacharya, Aminata Sabane, Yann-Gaël Guéhéneuc, Giuliano Antoniol, Esma Aïmeur. 278-281 [doi]
- Detection of embedded code smells in dynamic web applicationsHung Viet Nguyen, Hoan Anh Nguyen, Tung Thanh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen. 282-285 [doi]
- Boreas: an accurate and scalable token-based approach to code clone detectionYang Yuan, Yao Guo. 286-289 [doi]
- Refactorings without namesFriedrich Steimann, Jens von Pilgrim. 290-293 [doi]
- Automated API migration in a user-extensible refactoring tool for Erlang programsHuiqing Li, Simon J. Thompson. 294-297 [doi]
- Using mobile devices for collaborative requirements engineeringRainer Lutz, Sascha Schäfer 0001, Stephan Diehl. 298-301 [doi]
- Automatically generating and adapting model constraints to support co-evolution of design models Andreas Demuth, Roberto E. Lopez-Herrejon, Alexander Egyed. 302-305 [doi]
- Adaptability of model comparison toolsTimo Kehrer, Udo Kelter, Pit Pietsch, Maik Schmidt. 306-309 [doi]
- Predicting common web application vulnerabilities from input validation and sanitization code patternsLwin Khin Shar, Hee Beng Kuan Tan. 310-313 [doi]
- Software defect prediction using semi-supervised learning with dimension reductionHuihua Lu, Bojan Cukic, Mark Culp. 314-317 [doi]
- Healing online service systems via mining historical issue repositoriesRui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Jiajun Shen, Tao Xie. 318-321 [doi]
- Automated evaluation of syntax error recoveryMaartje de Jonge, Eelco Visser. 322-325 [doi]
- MaramaAI: tool support for capturing and managing consistency of multi-lingual requirementsMassila Kamalrudin, John Grundy, John G. Hosking. 326-329 [doi]
- GUITest: a Java library for fully automated GUI robustness testingSebastian Bauersfeld, Tanja E. J. Vos. 330-333 [doi]
- Observatory of trends in software related microblogsPalakorn Achananuparp, Ibrahim Nelman Lubis, Yuan Tian, David Lo, Ee-Peng Lim. 334-337 [doi]
- Arcade.PLC: a verification platform for programmable logic controllersSebastian Biallas, Jörg Brauer, Stefan Kowalewski. 338-341 [doi]
- Test suite selection based on traceability annotationsYves Ledru, Germán Vega, Taha Triki, Lydie du Bousquet. 342-345 [doi]
- PuMoC: a CTL model-checker for sequential programsFu Song, Tayssir Touili. 346-349 [doi]
- Weave droid: aspect-oriented programming on Android devices: fully embedded or in the cloudYliès Falcone, Sebastian Currea. 350-353 [doi]
- Caprice: a tool for engineering adaptive privacyInah Omoronyia, Liliana Pasquale, Mazeiar Salehie, Luca Cavallaro, Gavin Doherty, Bashar Nuseibeh. 354-357 [doi]
- JStereoCode: automatically identifying method and class stereotypes in Java codeLaura Moreno, Andrian Marcus. 358-361 [doi]
- CHESS: a model-driven engineering tool environment for aiding the development of complex industrial systemsAntonio Cicchetti, Federico Ciccozzi, Silvia Mazzini, Stefano Puri, Marco Panunzio, Alessandro Zovi, Tullio Vardanega. 362-365 [doi]
- SYMake: a build code analysis and refactoring tool for makefilesAhmed Tamrawi, Hoan Anh Nguyen, Hung Viet Nguyen, Tien N. Nguyen. 366-369 [doi]
- Quokka: visualising interactions of enterprise software environment emulatorsCameron M. Hine, Jean-Guy Schneider, Jun Han, Steven Versteeg. 370-373 [doi]
- Communicating continuous integration servers for increasing effectiveness of automated testingStefan Dösinger, Richard Mordinyi, Stefan Biffl. 374-377 [doi]
- GZoltar: an eclipse plug-in for testing and debuggingJosé Campos, André Riboira, Alexandre Perez, Rui Abreu. 378-381 [doi]
- Semantic patch inferenceJesper Andersen, Anh Cuong Nguyen, David Lo, Julia L. Lawall, Siau-Cheng Khoo. 382-385 [doi]
- REInDetector: a framework for knowledge-based requirements engineeringTuong Huan Nguyen, Bao Quoc Vo, Markus Lumpe, John Grundy. 386-389 [doi]
- Formal verification techniques for model transformations specified by-demonstrationSebastian Gabmeyer. 390-393 [doi]
- A model-driven parser generator with reference resolution supportLuis Quesada 0002. 394-397 [doi]
- Property-preserving program refinementYosuke Yamamoto. 398-401 [doi]
- Predicting software complexity by means of evolutionary testingAna Filipa Nogueira. 402-405 [doi]
- Identifying refactoring sequences for improving software maintainabilityPanita Meananeatra. 406-409 [doi]