Abstract is missing.
- Program generation for performanceMarkus Püschel. 1 [doi]
- Changing microsoft's build: revolution or evolutionWolfram Schulte. 2 [doi]
- The power of probabilistic thinkingDavid S. Rosenblum. 3 [doi]
- An empirical investigation into the nature of test smellsMichele Tufano, Fabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrea De Lucia, Denys Poshyvanyk. 4-15 [doi]
- Evaluating non-adequate test-case reductionMohammad Amin Alipour, August Shi, Rahul Gopinath, Darko Marinov, Alex Groce. 16-26 [doi]
- Optimizing customized program coveragePeter Ohmann, David Bingham Brown, Naveen Neelakandan, Jeff Linderoth, Ben Liblit. 27-38 [doi]
- What makes killing a mutant hardWillem Visser. 39-44 [doi]
- Test case permutation to improve execution timePanagiotis Stratis, Ajitha Rajan. 45-50 [doi]
- Predicting semantically linkable knowledge in developer online forums via convolutional neural networkBowen Xu, Deheng Ye, Zhenchang Xing, Xin Xia, Guibin Chen, Shanping Li. 51-62 [doi]
- Testing advanced driver assistance systems using multi-objective search and neural networksRaja Ben Abdessalem, Shiva Nejati, Lionel C. Briand, Thomas Stifter. 63-74 [doi]
- Privacy preserving via interval covering based subclass division and manifold learning based bi-directional obfuscation for effort estimationFumin Qi, Xiao-Yuan Jing, Xiaoke Zhu, Fei Wu, Li Cheng. 75-86 [doi]
- Deep learning code fragments for code clone detectionMartin White, Michele Tufano, Christopher Vendome, Denys Poshyvanyk. 87-98 [doi]
- Automatically recommending code reviewers based on their expertise: an empirical comparisonChristoph Hannebauer, Michael Patalas, Sebastian Stünkel, Volker Gruhn. 99-110 [doi]
- Evaluating the evaluations of code recommender systems: a reality checkSebastian Proksch, Sven Amann, Sarah Nadi, Mira Mezini. 111-121 [doi]
- Too much automation? the bellwether effect and its implications for transfer learningRahul Krishna, Tim Menzies, Wei Fu. 122-131 [doi]
- Automatic microbenchmark generation to prevent dead code elimination and constant foldingMarcelino Rodriguez-Cancio, Benoît Combemale, Benoit Baudry. 132-143 [doi]
- Visualization of combinatorial models and test plansRachel Tzoref-Brill, Paul Wojciak, Shahar Maoz. 144-154 [doi]
- Finding access control bugs in web applications with CanCheckIvan Bocic, Tevfik Bultan. 155-166 [doi]
- SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilitiesMariano Ceccato, Cu D. Nguyen, Dennis Appelt, Lionel C. Briand. 167-177 [doi]
- Supporting oracle construction via static analysisJunjie Chen, Yanwei Bai, Dan Hao, Lingming Zhang, Lu Zhang 0023, Bing Xie, Hong Mei. 178-189 [doi]
- Local-based active classification of test report to assist crowdsourced testingJunjie Wang, Song Wang, Qiang Cui, Qing Wang. 190-201 [doi]
- Multi-objective test report prioritization using image understandingYang Feng, James A. Jones, Zhenyu Chen, Chunrong Fang. 202-213 [doi]
- CrowdService: serving the individuals through mobile crowdsourcing and service compositionXin Peng, Jingxiao Gu, Tian Huat Tan, Jun Sun 0001, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao. 214-219 [doi]
- QUICKAR: automatic query reformulation for concept location using crowdsourced knowledgeMohammad Masudur Rahman, Chanchal K. Roy. 220-225 [doi]
- Taming Android fragmentation: characterizing and detecting compatibility issues for Android appsLili Wei, Yepang Liu, Shing-Chi Cheung. 226-237 [doi]
- Automated model-based Android GUI testing using multi-level GUI comparison criteriaYoung Min Baek, Doo-Hwan Bae. 238-249 [doi]
- HybriDroid: static analysis framework for Android hybrid applicationsSungho Lee, Julian Dolby, Sukyoung Ryu. 250-261 [doi]
- Locus: locating bugs from software changesMing Wen, Rongxin Wu, Shing-Chi Cheung. 262-273 [doi]
- Fine-tuning spectrum based fault localisation with frequent method item setsGulsher Laghari, Alessandro Murgia, Serge Demeyer. 274-285 [doi]
- Recommending relevant classes for bug reports using multi-objective searchRafi Almhana, Wiem Mkaouer, Marouane Kessentini, Ali Ouni 0001. 286-295 [doi]
- An empirical study on dependence clusters for effort-aware fault-proneness predictionYibiao Yang, Mark Harman, Jens Krinke, Syed S. Islam, David Binkley, Yuming Zhou, Baowen Xu. 296-307 [doi]
- StraightTaint: decoupled offline symbolic taint analysisJiang Ming, Dinghao Wu, Jun Wang, Gaoyao Xiao, Peng Liu. 308-319 [doi]
- IncA: a DSL for the definition of incremental program analysesTamás Szabó, Sebastian Erdweg, Markus Völter. 320-331 [doi]
- What developers want and need from program analysis: an empirical studyMaria Christakis, Christian Bird. 332-343 [doi]
- DistIA: a cost-effective dynamic impact analysis for distributed programsHaipeng Cai, Douglas Thain. 344-355 [doi]
- Radius aware probabilistic testing of deadlocks with guaranteesYan Cai, Zijiang Yang. 356-367 [doi]
- LockPeeker: detecting latent locks in Java APIsZiyi Lin, Hao Zhong, Yuting Chen, Jianjun Zhao. 368-378 [doi]
- Sound static deadlock analysis for C/PthreadsDaniel Kroening, Daniel Poetzl, Peter Schrammel, Björn Wachter. 379-390 [doi]
- Static race detection for device drivers: the Goblint approachVesal Vojdani, Kalmer Apinis, Vootele Rõtov, Helmut Seidl, Varmo Vene, Ralf Vogler. 391-402 [doi]
- An empirical evaluation of two user interfaces of an interactive program verifierMartin Hentschel 0002, Reiner Hähnle, Richard Bubel. 403-413 [doi]
- Traceability maintenance: factors and guidelinesSalome Maro, Anthony Anjorin, Rebekka Wohlrab, Jan-Philipp Steghöfer. 414-425 [doi]
- Usage, costs, and benefits of continuous integration in open-source projectsMichael Hilton, Timothy Tunnell, Kai Huang, Darko Marinov, Danny Dig. 426-437 [doi]
- DSL-maps: from requirements to design of domain-specific languagesAna Pescador, Juan de Lara. 438-443 [doi]
- The IDE as a scriptable information systemDimitar Asenov, Peter Müller 0001, Lukas Vogel. 444-449 [doi]
- Inferring annotations for device drivers from verification historiesZvonimir Pavlinovic, Akash Lal, Rahul Sharma. 450-460 [doi]
- Array length inference for C library bindingsAlisa J. Maas, Henrique Nazaré, Ben Liblit. 461-471 [doi]
- APEx: automated inference of error specifications for C APIsYuan Kang, Baishakhi Ray, Suman Jana. 472-482 [doi]
- On essential configuration complexity: measuring interactions in highly-configurable systemsJens Meinicke, Chu-Pan Wong, Christian Kästner, Thomas Thüm, Gunter Saake. 483-494 [doi]
- Precise semantic history slicing through dynamic delta refinementYi Li, Chenguang Zhu, Julia Rubin, Marsha Chechik. 495-506 [doi]
- Goal-conflict detection based on temporal satisfiability checkingRenzo Degiovanni, Nicolás Ricci, Dalal Alrajeh, Pablo F. Castro, Nazareno Aguirre. 507-518 [doi]
- Symbolic execution of stored procedures in database management systemsMuhammad Suleman Mahmood, Maryam Abdul Ghafoor, Junaid Haroon Siddiqui. 519-530 [doi]
- Conc-iSE: incremental symbolic execution of concurrent softwareShengjian Guo, Markus Kusano, Chao Wang. 531-542 [doi]
- Model-based whitebox fuzzing for program binariesVan-Thuan Pham, Marcel Böhme, Abhik Roychoudhury. 543-553 [doi]
- Symbolic execution of complex program driven by machine learning based constraint solvingXin Li, Yongjuan Liang, Hong Qian, Yi-Qi Hu, Lei Bu, Yang Yu, Xin Chen, Xuandong Li. 554-559 [doi]
- Towards bounded model checking using nonlinear programming solverMasataka Nishi. 560-565 [doi]
- Identifying domain elements from textual specificationsJitendra Singh Thakur, Atul Gupta. 566-577 [doi]
- Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matchingSven Peldszus, Géza Kulcsár, Malte Lochau, Sandro Schulze. 578-589 [doi]
- Efficient detection of inconsistencies in a multi-developer engineering environment Andreas Demuth, Markus Riedl-Ehrenleitner, Alexander Egyed. 590-601 [doi]
- How good are the specs? a study of the bug-finding effectiveness of existing Java API specificationsOwolabi Legunsen, Wajih Ul Hassan, Xinyue Xu, Grigore Rosu, Darko Marinov. 602-613 [doi]
- Greedy combinatorial test case generation using unsatisfiable coresAkihisa Yamada 0002, Armin Biere, Cyrille Artho, Takashi Kitamura, Eun-Hye Choi. 614-624 [doi]
- Towards automatically generating descriptive names for unit testsBenwen Zhang, Emily Hill, James Clause. 625-636 [doi]
- Applying combinatorial test data generation to big data applicationsNan Li, Yu Lei, Haider Riaz Khan, Jingshu Liu, Yun Guo. 637-647 [doi]
- Generating test cases to expose concurrency bugs in Android applicationsHongyin Tang, Guoquan Wu, Jun Wei, Hua Zhong. 648-653 [doi]
- Automatic test image generation using procedural noiseMatthew Patrick, Matthew D. Castle, Richard O. J. H. Stutt, Christopher A. Gilligan. 654-659 [doi]
- Move-optimized source code tree differencingGeorg Dotzler, Michael Philippsen. 660-671 [doi]
- Migrating cascading style sheets to preprocessors by introducing mixinsDavood Mazinanian, Nikolaos Tsantalis. 672-683 [doi]
- Automatic runtime recovery via error handler synthesisTianxiao Gu, Chengnian Sun, Xiaoxing Ma, Jian Lü, Zhendong Su. 684-695 [doi]
- Mining revision histories to detect cross-language clones without intermediatesXiao Cheng, Zhiming Peng, Lingxiao Jiang, Hao Zhong, Haibo Yu, Jianjun Zhao. 696-701 [doi]
- Battery-aware transformations in mobile applicationsJürgen Cito, Julia Rubin, Phillip Stanley-Marbell, Martin Rinard. 702-707 [doi]
- Bugram: bug detection with n-gram language modelsSong Wang, Devin Chollak, Dana Movshovitz-Attias, Lin Tan. 708-719 [doi]
- Mining input grammars from dynamic taintsMatthias Höschele, Andreas Zeller. 720-725 [doi]
- Phrase-based extraction of user opinions in mobile app reviewsPhong Minh Vu, Hung Viet Pham, Tam The Nguyen, Tung Thanh Nguyen. 726-731 [doi]
- Practical guidelines for change recommendation using association rule miningLeon Moonen, Stefano Di Alesio, David Binkley, Thomas Rolfsnes. 732-743 [doi]
- Learning a dual-language vector space for domain-specific cross-lingual question retrievalGuibin Chen, Chunyang Chen, Zhenchang Xing, Bowen Xu. 744-755 [doi]
- Reflection-aware static analysis of Android appsLi Li 0029, Tegawendé F. Bissyandé, Damien Octeau, Jacques Klein. 756-761 [doi]
- Relda2: an effective static analysis tool for resource leak detection in Android appsTianyong Wu, Jierui Liu, Xi Deng, Jun Yan, Jian Zhang. 762-767 [doi]
- An end-user oriented tool suite for development of mobile applicationsZhongyi Zhai, Bo Cheng, Meng Niu, Zhaoning Wang, Yimeng Feng, Junliang Chen. 768-773 [doi]
- Model driven design of heterogeneous synchronous embedded systemsHuafeng Zhang, Yu Jiang, Han Liu, Hehua Zhang, Ming Gu, Jia-Guang Sun. 774-779 [doi]
- MACKE: compositional analysis of low-level vulnerabilities with symbolic executionSaahil Ognawala, Martín Ochoa, Alexander Pretschner, Tobias Limmer. 780-785 [doi]
- BovInspector: automatic inspection and repair of buffer overflow vulnerabilitiesFengjuan Gao, Linzhang Wang, Xuandong Li. 786-791 [doi]
- CORRECT: code reviewer recommendation at GitHub for Vendasta technologiesMohammad Masudur Rahman 0001, Chanchal Kumar Roy, Jesse Redl, Jason A. Collins. 792-797 [doi]
- ProcessPAIR: a tool for automated performance analysis and improvement recommendation in software developmentMushtaq Raza, João Pascoal Faria. 798-803 [doi]
- CVExplorer: identifying candidate developers by mining and exploring their open source contributionsGillian J. Greene, Bernd Fischer 0002. 804-809 [doi]
- Lightweight collection and storage of software repository data with DataRoverThomas Kowark, Christoph Matthies, Matthias Uflacker, Hasso Plattner. 810-815 [doi]
- Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysisAbdullah M. Alshanqiti, Reiko Heckel, Timo Kehrer. 816-821 [doi]
- SuperMod: tool support for collaborative filtered model-driven software product line engineeringFelix Schwägerl, Bernhard Westfechtel. 822-827 [doi]
- AnModeler: a tool for generating domain models from textual specificationsJitendra Singh Thakur, Atul Gupta. 828-833 [doi]
- SimilarTech: automatically recommend analogical libraries across different programming languagesChunyang Chen, Zhenchang Xing. 834-839 [doi]
- TeeVML: tool support for semi-automatic integration testing environment emulationJian Liu, John C. Grundy, Iman Avazpour, Mohamed Almorsy Abdelrazek. 840-845 [doi]
- The interactive verification debugger: effective understanding of interactive proof attemptsMartin Hentschel 0002, Reiner Hähnle, Richard Bubel. 846-851 [doi]
- Verifying simulink stateflow model: timed automata approachYixiao Yang, Yu Jiang, Ming Gu, Jia-Guang Sun. 852-857 [doi]
- GUICat: GUI testing as a serviceLin Cheng, Jialiang Chang, Zijiang Yang, Chao Wang. 858-863 [doi]
- An automated collaborative requirements engineering tool for better validation of requirementsNor Aiza Moketar, Massila Kamalrudin, Safiah Sidek, Mark Robinson, John C. Grundy. 864-869 [doi]
- An extensible framework for variable-precision data-flow analyses in MPSTamás Szabó, Simon Alperovich, Markus Völter, Sebastian Erdweg. 870-875 [doi]
- Towards efficient and effective automatic program repairXuan-Bach D. Le. 876-879 [doi]
- Automated testing and notification of mobile app privacy leak-cause behavioursJoseph Chan Joo Keng. 880-883 [doi]
- Factoring requirement dependencies in software requirement selection using graphs and integer programmingDavoud Mougouei. 884-887 [doi]
- Statistical analysis of large sets of modelsÖnder Babur. 888-891 [doi]
- Developer targeted analytics: supporting software development decisions with runtime informationJürgen Cito. 892-895 [doi]
- API recommendation system for software developmentFerdian Thung. 896-899 [doi]