Abstract is missing.
- Cobra - an interactive static code analyzerGerard J. Holzmann. 1 [doi]
- Mining structures from massive text data: will it help software engineering?Jiawei Han. 2 [doi]
- Software engineering without bordersArie van Deursen. 3 [doi]
- Systematically testing background services of mobile appsLi Lyna Zhang, Chieh-Jan Mike Liang, Yunxin Liu, Enhong Chen. 4-15 [doi]
- Crowd intelligence enhances automated mobile testingKe Mao, Mark Harman, Yue Jia. 16-26 [doi]
- EHBDroid: beyond GUI testing for Android applicationsWei Song, Xiangxing Qian, Jeff Huang. 27-37 [doi]
- Sketch-guided GUI test generation for mobile applicationsChucheng Zhang, Haoliang Cheng, Enyi Tang, Xin Chen, Lei Bu, Xuandong Li. 38-43 [doi]
- Saying źhi!ź is not enough: mining inputs for effective test generationLuca Della Toffola, Cristian-Alexandru Staicu, Michael Pradel. 44-49 [doi]
- Learn&Fuzz: machine learning for input fuzzingPatrice Godefroid, Hila Peleg, Rishabh Singh. 50-59 [doi]
- The impact of continuous integration on other software development practices: a large-scale empirical studyYangyang Zhao, Alexander Serebrenik, Yuming Zhou, Vladimir Filkov, Bogdan Vasilescu. 60-71 [doi]
- Perceived language complexity in GitHub issue discussions and their effect on issue resolutionDavid Kavaler, Sasha Sirovica, Vincent Hellendoorn, Raúl Aranovich, Vladimir Filkov. 72-83 [doi]
- Can automated pull requests encourage software developers to upgrade out-of-date dependencies?Samim Mirhosseini, Chris Parnin. 84-94 [doi]
- Are developers aware of the architectural impact of their changes?Matheus Paixão, Jens Krinke, DongGyun Han, Chaiyong Ragkhitwetsagul, Mark Harman. 95-105 [doi]
- SentiCR: a customized sentiment analysis tool for code review interactionsToufique Ahmed, Amiangshu Bosu, Anindya Iqbal, Shahram Rahimi. 106-111 [doi]
- Detecting fragile commentsInderjot Kaur Ratol, Martin P. Robillard. 112-122 [doi]
- Improving software text retrieval using conceptual knowledge in source codeZeqi Lin, Yanzhen Zou, Junfeng Zhao, Bing Xie. 123-134 [doi]
- Automatically generating commit messages from diffs using neural machine translationSiyuan Jiang, Ameer Armaly, Collin McMillan. 135-146 [doi]
- Improving missing issue-commit link recovery using positive and unlabeled dataYan Sun, Celia Chen, Qing Wang, Barry W. Boehm. 147-152 [doi]
- APIBot: question answering bot for API documentationYuan Tian, Ferdian Thung, Abhishek Sharma, David Lo. 153-158 [doi]
- Automatic summarization of API reviewsGias Uddin, Foutse Khomh. 159-170 [doi]
- iCoq: regression proof selection for large-scale verification projectsAhmet Çelik, Karl Palmskog, Milos Gligoric. 171-182 [doi]
- More effective interpolations in software model checkingCong Tian, Zhao Duan, Zhenhua Duan, C.-H. Luke Ong. 183-193 [doi]
- Proof-based coverage metrics for formal verificationElaheh Ghassabani, Andrew Gacek, Michael W. Whalen, Mats Per Erik Heimdahl, Lucas G. Wagner. 194-199 [doi]
- Model checker execution reportsRodrigo Castaño, Víctor A. Braberman, Diego Garbervetsky, Sebastián Uchitel. 200-205 [doi]
- Modular verification of interrupt-driven softwareChungha Sung, Markus Kusano, Chao Wang 0001. 206-216 [doi]
- BProVe: a formal verification framework for business process modelsFlavio Corradini, Fabrizio Fornari, Andrea Polini, Barbara Re 0001, Francesco Tiezzi, Andrea Vandin. 217-228 [doi]
- Static detection of asymptotic resource side-channel vulnerabilities in web applicationsJia Chen, Oswaldo Olivo, Isil Dillig, Calvin Lin. 229-239 [doi]
- PAD: programming third-party web advertisement censorshipWeihang Wang, Yonghwi Kwon, Yunhui Zheng, Yousra Aafer, I. Luk Kim, Wen-Chuan Lee, Yingqi Liu, Weijie Meng, Xiangyu Zhang, Patrick Eugster. 240-251 [doi]
- All about activity injection: threats, semantics, and detectionSungho Lee, Sungjae Hwang, Sukyoung Ryu. 252-262 [doi]
- Detecting information flow by mutating input dataBjörn Mathis, Vitalii Avdiienko, Ezekiel O. Soremekun, Marcel Böhme, Andreas Zeller. 263-273 [doi]
- Automatically assessing crashes from heap overflowsLiang He, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, Dengguo Feng. 274-279 [doi]
- Learning to share: engineering adaptive decision-support for online social networksYasmin Rafiq, Luke Dickens, Alessandra Russo, Arosha K. Bandara, Mu Yang, Avelie Stuart, Mark Levine, Gul Calikli, Blaine A. Price, Bashar Nuseibeh. 280-285 [doi]
- UI driven Android application reductionJianJun Huang, Yousra Aafer, David Mitchel Perry, Xiangyu Zhang, Chen Tian. 286-296 [doi]
- SimplyDroid: efficient event sequence simplification for Android applicationBo Jiang, Yuxuan Wu, Teng Li, W. K. Chan. 297-307 [doi]
- Automated cross-platform inconsistency detection for mobile appsMattia Fazzini, Alessandro Orso. 308-318 [doi]
- In-memory fuzzing for binary code similarity analysisShuai Wang, Dinghao Wu. 319-330 [doi]
- DSIbin: identifying dynamic data structures in C/C++ binariesThomas Rupprecht, Xi Chen, David H. White 0001, Jan H. Boockmann, Gerald Lüttgen, Herbert Bos. 331-341 [doi]
- Towards robust instruction-level trace alignment of binary codeUlf Kargen, Nahid Shahmehri. 342-352 [doi]
- Testing intermediate representations for binary analysisSoomin Kim, Markus Faerevaag, Minkyu Jung, SeungIl Jung, DongYeop Oh, JongHyup Lee, Sang Kil Cha. 353-364 [doi]
- Comprehensive failure characterizationMitchell J. Gerrard, Matthew B. Dwyer. 365-376 [doi]
- TrEKer: tracing error propagation in operating system kernelsNicolas Coppik, Oliver Schwahn, Stefan Winter, Neeraj Suri. 377-387 [doi]
- RuntimeSearch: Ctrl+F for a running programMatús Sulír, Jaroslav Porubän. 388-393 [doi]
- Mining implicit design templates for actionable code reuseYun Lin, Guozhu Meng, Yinxing Xue, Zhenchang Xing, Jun Sun, Xin Peng, Yang Liu, Wenyun Zhao, Jin Song Dong. 394-404 [doi]
- Exploring regular expression comprehensionCarl Chapman, Peipei Wang, Kathryn T. Stolee. 405-416 [doi]
- Automatically assessing code understandability: how far are we?Simone Scalabrino, Gabriele Bavota, Christopher Vendome, Mario Linares Vásquez, Denys Poshyvanyk, Rocco Oliveto. 417-427 [doi]
- Improved query reformulation for concept location using CodeRank and document structuresMohammad Masudur Rahman 0001, Chanchal K. Roy. 428-439 [doi]
- Understanding feature requests by leveraging fuzzy method and linguistic analysisLin Shi, Celia Chen, Qing Wang, Shoubin Li, Barry W. Boehm. 440-450 [doi]
- O2O service composition with social collaborationWenyi Qian, Xin Peng, Jun Sun 0001, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao. 451-461 [doi]
- Gremlin-ATL: a scalable model transformation frameworkGwendal Daniel, Frédéric Jouault, Gerson Sunyé, Jordi Cabot. 462-472 [doi]
- Diagnosing assumption problems in safety-critical productsMona Rahimi, Wandi Xiong, Jane Cleland-Huang, Robyn R. Lutz. 473-484 [doi]
- Software performance self-adaptation through efficient model predictive controlEmilio Incerto, Mirco Tribastone, Catia Trubiani. 485-496 [doi]
- Transfer learning for performance modeling of configurable systems: an exploratory analysisPooyan Jamshidi, Norbert Siegmund, Miguel Velez, Christian Kästner, Akshay Patel, Yuvraj Agarwal. 497-508 [doi]
- A comprehensive study of real-world numerical bug characteristicsAnthony Di Franco, Hui Guo, Cindy Rubio-González. 509-519 [doi]
- A comprehensive study on real world concurrency bugs in Node.jsJie Wang, Wensheng Dou, Yu Gao, Chushu Gao, Feng Qin, Kang Yin, Jun Wei. 520-531 [doi]
- Generating simpler AST edit scripts by considering copy-and-pasteYoshiki Higo, Akio Ohtani, Shinji Kusumoto. 532-542 [doi]
- Renaming and shifted code in structured merging: looking ahead for precision and performanceOlaf Leßenich, Sven Apel, Christian Kästner, Georg Seibt, Janet Siegmund. 543-553 [doi]
- Semantics-assisted code review: an efficient toolchain and a user studyMassimiliano Menarini, Yan Yan, William G. Griswold. 554-565 [doi]
- Detecting unknown inconsistencies in web applicationsFrolin S. Ocariza Jr., Karthik Pattabiraman, Ali Mesbah 0001. 566-577 [doi]
- Why and how JavaScript developers use lintersKristín Fjóla Tómasdóttir, Mauricio Finavaro Aniche, Arie van Deursen. 578-589 [doi]
- Automatic testing of symbolic execution engines via program generation and differential testingTimotej Kapus, Cristian Cadar. 590-600 [doi]
- Floating-point symbolic execution: a case study in n-version programmingDaniel Liew, Daniel Schemmel, Cristian Cadar, Alastair F. Donaldson, Rafael Zähl, Klaus Wehrle. 601-612 [doi]
- Rethinking pointer reasoning in symbolic executionEmilio Coppa, Daniele Cono D'Elia, Camil Demetrescu. 613-618 [doi]
- Leveraging abstract interpretation for efficient dynamic symbolic executionEman Alatawi, Harald Søndergaard, Tim Miller. 619-624 [doi]
- Tortoise: interactive system configuration repairAaron Weiss, Arjun Guha, Yuriy Brun. 625-636 [doi]
- Contract-based program repair without the contractsLiushan Chen, Yu Pei 0001, Carlo A. Furia. 637-647 [doi]
- ELIXIR: effective object oriented program repairRipon K. Saha, Yingjun Lyu, Hiroaki Yoshida, Mukul R. Prasad. 648-659 [doi]
- Leveraging syntax-related code for automated program repairQi Xin, Steven P. Reiss. 660-670 [doi]
- Boosting complete-code tool for partial programHao Zhong, Xiaoyin Wang. 671-681 [doi]
- A language model for statements of software codeYixiao Yang, Yu Jiang, Ming Gu 0001, Jiaguang Sun, Jian Gao, Han Liu. 682-687 [doi]
- Context-aware integrated development environment command recommender systemsMarko Gasparic, Tural Gurbanov, Francesco Ricci 0001. 688-693 [doi]
- Predicting relevance of change recommendationsThomas Rolfsnes, Leon Moonen, David Binkley. 694-705 [doi]
- AnswerBot: automated generation of answer summary to developersź technical questionsBowen Xu, Zhenchang Xing, Xin Xia, David Lo. 706-716 [doi]
- Recommending crowdsourced software developers in consideration of skill improvementZizhe Wang, Hailong Sun, Yang Fu, Luting Ye. 717-722 [doi]
- The rise of the (modelling) bots: towards assisted modelling via social networksSara Pérez-Soler, Esther Guerra, Juan de Lara, Francisco Jurado. 723-728 [doi]
- UNDEAD: detecting and preventing deadlocks in production softwareJinpeng Zhou, Sam Silvestro, Hongyu Liu, Yan Cai, Tongping Liu. 729-740 [doi]
- Promoting secondary orders of event pairs in randomized scheduling using a randomized strideMahmoud Abdelrasoul. 741-752 [doi]
- Parallel bug-finding in concurrent programs via reduced interleaving instancesTruc L. Nguyen, Peter Schrammel, Bernd Fischer 0002, Salvatore La Torre, Gennaro Parlato. 753-764 [doi]
- Understanding and overcoming parallelism bottlenecks in ForkJoin applicationsGustavo Pinto, Anthony Canino, Fernando Castor, Guoqing (Harry) Xu, Yu David Liu. 765-775 [doi]
- Quick verification of concurrent programs by iteratively relaxed schedulingPatrick Metzler, Habib Saissi, Péter Bokor, Neeraj Suri. 776-781 [doi]
- Automatic loop-invariant generation and refinement through selective samplingJiaying Li, Jun Sun, Li Li, Quang Loc Le, Shang-Wei Lin. 782-792 [doi]
- FiB: squeezing loop invariants by interpolation between Forward/Backward predicate transformersShang-Wei Lin, Jun Sun, Hao Xiao, Yang Liu, David Sanán, Henri Hansen. 793-803 [doi]
- SymInfer: inferring program invariants using symbolic statesThanhVu Nguyen, Matthew B. Dwyer, Willem Visser. 804-814 [doi]
- Parsimony: an IDE for example-guided synthesis of lexers and parsersAlan Leung, Sorin Lerner. 815-825 [doi]
- Mining constraints for event-based monitoring in systems of systemsThomas Krismayer, Rick Rabiser, Paul Grünbacher. 826-831 [doi]
- Programming bots by synthesizing natural language expressions into API invocationsShayan Zamanirad, Boualem Benatallah, Moshe Chai Barukh, Fabio Casati, Carlos Rodríguez 0001. 832-837 [doi]
- Test suite parallelization in open-source projects: a study on its usage and impactJeanderson Candido, Luis Melo, Marcelo d'Amorim. 838-848 [doi]
- Systematic reduction of GUI test sequencesLin Cheng, Zijiang Yang, Chao Wang 0001. 849-860 [doi]
- Automatically reducing tree-structured test inputsSatia Herfert, Jibesh Patra, Michael Pradel. 861-871 [doi]
- Synthetic data generation for statistical testingGhanem Soltana, Mehrdad Sabetzadeh, Lionel C. Briand. 872-882 [doi]
- SEALANT: a detection and visualization tool for inter-app security vulnerabilities in AndroidYoun Kyu Lee, Peera Yoodee, Arman Shahbazian, Daye Nam, Nenad Medvidovic. 883-888 [doi]
- Visualization support for requirements monitoring in systems of systemsLisa Maria Kritzinger, Thomas Krismayer, Michael Vierhauser, Rick Rabiser, Paul Grünbacher. 889-894 [doi]
- A demonstration of simultaneous execution and editing in a development environmentSteven P. Reiss, Qi Xin. 895-900 [doi]
- TREM: a tool for mining timed regular specifications from system tracesLukas Schmidt, Apurva Narayan, Sebastian Fischmeister. 901-906 [doi]
- ModelWriter: text and model-synchronized document engineering platformFerhat Erata, Claire Gardent, Bikash Gyawali, Anastasia Shimorina, Yvan Lussaud, Bedir Tekinerdogan, Geylani Kardas, Anne Monceaux. 907-912 [doi]
- Incrementally slicing editable submodelsChristopher Pietsch, Manuel Ohrndorf, Udo Kelter, Timo Kehrer. 913-918 [doi]
- DSSynth: an automated digital controller synthesis tool for physical plantsAlessandro Abate, Iury Bessa, Dario Cattaruzza, Lennon Chaves, Lucas C. Cordeiro, Cristina David, Pascal Kesseli, Daniel Kroening, Elizabeth Polgreen. 919-924 [doi]
- A static analysis tool with optimizations for reachability determinationYuexing Wang, Min Zhou, Yu Jiang, Xiaoyu Song, Ming Gu 0001, Jiaguang Sun. 925-930 [doi]
- CogniCrypt: supporting developers in using cryptographyStefan Krüger, Sarah Nadi, Michael Reif, Karim Ali, Mira Mezini, Eric Bodden, Florian Göpfert, Felix Günther, Christian Weinert, Daniel Demmler, Ram Kamath. 931-936 [doi]
- BProVe: tool support for business process verificationFlavio Corradini, Fabrizio Fornari, Andrea Polini, Barbara Re 0001, Francesco Tiezzi, Andrea Vandin. 937-942 [doi]
- taco: a tool to generate tensor algebra kernelsFredrik Kjolstad, Stephen Chou, David Lugato, Shoaib Kamil, Saman P. Amarasinghe. 943-948 [doi]
- STARTS: STAtic regression test selectionOwolabi Legunsen, August Shi, Darko Marinov. 949-954 [doi]
- EventFlowSlicer: a tool for generating realistic goal-driven GUI testsJonathan A. Saddler, Myra B. Cohen. 955-960 [doi]
- ANDROFLEET: testing WiFi peer-to-peer mobile apps in the largeLakhdar Meftah, María Gómez, Romain Rouvoy, Isabelle Chrisment. 961-966 [doi]
- FEMIR: a tool for recommending framework extension examplesMuhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider, Daqing Hou. 967-972 [doi]
- TiQi: a natural language interface for querying software project dataJinfeng Lin, Yalin Liu, Jin Guo 0004, Jane Cleland-Huang, William Goss, Wenchuang Liu, Sugandha Lohar, Natawut Monaikul, Alexander Rasin. 973-977 [doi]
- Opiner: an opinion search and summarization engine for APIsGias Uddin, Foutse Khomh. 978-983 [doi]
- Defaultification refactoring: a tool for automatically converting Java methods to defaultRaffi Khatchadourian, Hidehiko Masuhara. 984-989 [doi]
- Kobold: web usability as a serviceJulián Grigera, Alejandra Garrido, Gustavo Rossi. 990-995 [doi]
- IntPTI: automatic integer error repair with proper-type inferenceXi Cheng, Min Zhou, Xiaoyu Song, Ming Gu 0001, Jiaguang Sun. 996-1001 [doi]
- Learning effective changes for software projectsRahul Krishna. 1002-1005 [doi]
- Characterizing and taming non-deterministic bugs in JavaScript applicationsJie Wang. 1006-1009 [doi]
- Towards API-specific automatic program repairSebastian Nielebock. 1010-1013 [doi]
- Managing software evolution through semantic history slicingYi Li. 1014-1017 [doi]
- Towards the automatic classification of traceability linksChris Mills. 1018-1021 [doi]
- Towards a software vulnerability prediction model using traceable code patterns and software metricsKazi Zakia Sultana. 1022-1025 [doi]
- Towards search-based modelling and analysis of requirements and architecture decisionsSaheed A. Busari. 1026-1029 [doi]
- Privacy-aware data-intensive applicationsMichele Guerriero. 1030-1033 [doi]