Abstract is missing.
- Assessing the Generalizability of Code2vec Token EmbeddingsHong Jin Kang, Tegawendé F. Bissyandé, David Lo 0001. 1-12 [doi]
- Multi-modal Attention Network Learning for Semantic Source Code RetrievalYao Wan, Jingdong Shu, Yulei Sui, Guandong Xu, Zhou Zhao, Jian Wu 0001, Philip S. Yu. 13-25 [doi]
- Experience Paper: Search-Based Testing in Automated Driving Control ApplicationsChristoph Gladisch, Thomas Heinz 0001, Christian Heinzemann, Jens Oehlerking, Anne von Vietinghoff, Tim Pfitzer. 26-37 [doi]
- AutoFocus: Interpreting Attention-Based Neural Networks by Code PerturbationNghi D. Q. Bui, Yijun Yu, Lingxiao Jiang. 38-41 [doi]
- Test Transfer Across Mobile Apps Through Semantic MappingJun-Wei Lin, Reyhaneh Jabbarvand, Sam Malek. 42-53 [doi]
- Test Migration Between Mobile Apps with Similar FunctionalityFarnaz Behrang, Alessandro Orso. 54-65 [doi]
- DaPanda: Detecting Aggressive Push Notifications in Android AppsTianming Liu, Haoyu Wang, Li Li 0029, Guangdong Bai, Yao Guo 0001, Guoai Xu. 66-78 [doi]
- Automatic Self-Validation for Code Coverage ProfilersYibiao Yang, Yanyan Jiang, Zhiqiang Zuo 0002, Yang Wang, Hao Sun, Hongmin Lu, Yuming Zhou, Baowen Xu. 79-90 [doi]
- Efficient Test Generation Guided by Field Coverage CriteriaAriel Godio, Valeria S. Bengolea, Pablo Ponzio, Nazareno Aguirre, Marcelo Fabian Frias. 91-101 [doi]
- A Qualitative Analysis of Android Taint-Analysis ResultsLinghui Luo, Eric Bodden, Johannes Späth. 102-114 [doi]
- Goal-Driven Exploration for Android ApplicationsDuling Lai, Julia Rubin. 115-127 [doi]
- RANDR: Record and Replay for Android Applications via Targeted Runtime InstrumentationOnur Sahin, Assel Aliyeva, Hariharan Mathavan, Ayse K. Coskun, Manuel Egele. 128-138 [doi]
- MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality AnalysisYueming Wu, Xiaodi Li, Deqing Zou, Wei Yang, Xin Zhang, Hai Jin 0001. 139-150 [doi]
- Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A SitesXiaoxue Ren, Zhenchang Xing, Xin Xia 0001, Guoqiang Li 0001, Jianling Sun. 151-162 [doi]
- Automating App Review Response GenerationCuiyun Gao, Jichuan Zeng, Xin Xia, David Lo 0001, Michael R. Lyu, Irwin King. 163-175 [doi]
- Automatic Generation of Pull Request DescriptionsZhongxin Liu, Xin Xia 0001, Christoph Treude, David Lo 0001, Shanping Li. 176-188 [doi]
- Systematically Covering Input StructureNikolas Havrikov, Andreas Zeller. 189-199 [doi]
- SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String InputsDevika Sondhi, Rahul Purandare. 200-212 [doi]
- Detecting Error-Handling Bugs without Error Specification InputZhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang, Xiaodong Liu, Yunhuai Liu. 213-225 [doi]
- Grading-Based Test Suite AugmentationJonathan Osei-Owusu, Angello Astorga, Liia Butler, Tao Xie 0001, Geoffrey Challen. 226-229 [doi]
- Emotions Extracted from Text vs. True Emotions-An Empirical Evaluation in SE ContextYi Wang. 230-242 [doi]
- Learning from Examples to Find Fully Qualified Names of API Elements in Code SnippetsC. M. Khaled Saifullah, Muhammad Asaduzzaman, Chanchal K. Roy. 243-254 [doi]
- Inferring Program Transformations From Singular Examples via Big CodeJiajun Jiang, Luyao Ren, Yingfei Xiong, Lingming Zhang. 255-266 [doi]
- Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisDongjie He, Haofeng Li, Lei Wang, Haining Meng, Hengjie Zheng, Jie Liu 0020, Shuangwei Hu, Lian Li, Jingling Xue. 267-279 [doi]
- Characterizing Android App Signing IssuesHaoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, Yao Guo. 280-292 [doi]
- OAUTHLINT: An Empirical Study on OAuth Bugs in Android ApplicationsTamjid Al Rahat, Yu Feng, Yuan Tian. 293-304 [doi]
- History-Guided Configuration Diversification for Compiler Test-Program GenerationJunjie Chen 0003, Guancheng Wang, Dan Hao, Yingfei Xiong, Hongyu Zhang 0002, Lu Zhang 0023. 305-316 [doi]
- ReduKtor: How We Stopped Worrying About Bugs in Kotlin CompilerDaniil Stepanov, Marat Akhin, Mikhail A. Belyaev. 317-326 [doi]
- Targeted Example Generation for Compilation ErrorsUmair Z. Ahmed, Renuka Sindhgatta, Nisheeth Srivastava, Amey Karkare. 327-338 [doi]
- Understanding Exception-Related Bugs in Large-Scale Cloud SystemsHaicheng Chen, Wensheng Dou, Yanyan Jiang 0001, Feng Qin. 339-351 [doi]
- iFeedback: Exploiting User Feedback for Real-Time Issue Detection in Large-Scale Online Service SystemsWujie Zheng, Haochuan Lu, Yangfan Zhou, Jianming Liang, Haibing Zheng, Yuetang Deng. 352-363 [doi]
- Continuous Incident Triage for Large-Scale Online Service SystemsJunjie Chen 0003, Xiaoting He, Qingwei Lin, Hongyu Zhang 0002, Dan Hao, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang. 364-375 [doi]
- Apricot: A Weight-Adaptation Approach to Fixing Deep Learning ModelsHao Zhang, W. K. Chan. 376-387 [doi]
- Re-Factoring Based Program Repair Applied to Programming AssignmentsYang Hu, Umair Z. Ahmed, Sergey Mechtaev, Ben Leong, Abhik Roychoudhury. 388-398 [doi]
- InFix: Automatically Repairing Novice Program InputsMadeline Endres, Georgios Sakkas, Benjamin Cosman, Ranjit Jhala, Westley Weimer. 399-410 [doi]
- Understanding Automatically-Generated Patches Through Symbolic Invariant DifferencesPadraic Cashin, Carianne Martinez, Westley Weimer, Stephanie Forrest. 411-414 [doi]
- Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular ExpressionsLouis G. Michael IV, James Donohue, James C. Davis, Dongyoon Lee, Francisco Servant. 415-426 [doi]
- Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement StudyJames C. Davis, Daniel Moyer, Ayaan M. Kazerouni, Dongyoon Lee. 427-439 [doi]
- Accurate String Constraints Solution Counting with Weighted AutomataElena Sherman, Andrew Harris. 440-452 [doi]
- Subformula Caching for Model Counting and Quantitative Program AnalysisWilliam Eiers, Seemanta Saha, Tegan Brennan, Tevfik Bultan. 453-464 [doi]
- ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial NetworksLiang Bao, Xin Liu, Fangzheng Wang, Baoyin Fang. 465-476 [doi]
- V2: Fast Detection of Configuration Drift in PythonEric Horton, Chris Parnin. 477-488 [doi]
- Feature-Interaction Aware Configuration Prioritization for Configurable CodeSon Nguyen, Hoan Nguyen, Ngoc M. Tran, Hieu Tran, Tien N. Nguyen. 489-501 [doi]
- Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical StudyJiajun Jiang, Ran Wang, Yingfei Xiong, Xiangping Chen, Lu Zhang. 502-514 [doi]
- SCMiner: Localizing System-Level Concurrency Faults from Large System Call TracesTarannum Shaila Zaman, Xue Han, Tingting Yu. 515-526 [doi]
- Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call TracingZhilei Ren, Changlin Liu, Xusheng Xiao, He Jiang, Tao Xie. 527-538 [doi]
- Mutation Analysis for CoqAhmet Çelik, Karl Palmskog, Marinela Parovic, Emilio Jesús Gallego Arias, Milos Gligoric. 539-551 [doi]
- Verifying Arithmetic in Cryptographic C ProgramsJiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang. 552-564 [doi]
- Model Checking Embedded Control Software using OS-in-the-Loop CEGARDongwoo Kim, Yunja Choi. 565-576 [doi]
- Get Rid of Inline Assembly through Verification-Oriented LiftingFrédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet. 577-589 [doi]
- CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage ExamplesXiaodong Gu, Hongyu Zhang 0002, Sunghun Kim 0001. 590-601 [doi]
- Machine Learning Based Recommendation of Method Names: How Far are WeLin Jiang, Hui Liu, He Jiang. 602-614 [doi]
- MARBLE: Mining for Boilerplate Code to Identify API Usability ProblemsDaye Nam, Amber Horvath, Andrew Macvean, Brad A. Myers, Bogdan Vasilescu. 615-627 [doi]
- DIRE: A Neural Approach to Decompiled Identifier NamingJeremy Lacomis, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, Bogdan Vasilescu. 628-639 [doi]
- Accurate Modeling of Performance Histories for Evolving Software SystemsStefan Mühlbauer, Sven Apel, Norbert Siegmund. 640-652 [doi]
- An Industrial Experience Report on Performance-Aware Refactoring on a Database-Centric Web ApplicationBoyuan Chen, Zhen Ming Jiang, Paul Matos, Michael Lacaria. 653-664 [doi]
- How Do API Selections Affect the Runtime Performance of Data Analytics Tasks?Yida Tao, Shan Tang, Yepang Liu, Zhiwu Xu, Shengchao Qin. 665-668 [doi]
- An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User BehaviourJinfu Chen, Weiyi Shang, Ahmed E. Hassan, Yong Wang, Jiangbin Lin. 669-681 [doi]
- Demystifying Application Performance Management Libraries for AndroidYutian Tang, Xian Zhan, Hao Zhou, Xiapu Luo, Zhou Xu, Yajin Zhou, Qiben Yan. 682-685 [doi]
- Predicting Licenses for Changed Source CodeXiaoyu Liu, LiGuo Huang, JiDong Ge, Vincent Ng. 686-697 [doi]
- Empirical Evaluation of the Impact of Class Overlap on Software Defect PredictionLina Gong, Shujuan Jiang, Rongcun Wang, Li Jiang. 698-709 [doi]
- Combining Program Analysis and Statistical Language Model for Code Statement CompletionSon Nguyen, Tien N. Nguyen, Yi Li, Shaohua Wang. 710-721 [doi]
- MAP-Coverage: A Novel Coverage Criterion for Testing Thread-Safe ClassesZan Wang, Yingquan Zhao, Shuang Liu, Jun Sun 0001, Xiang Chen 0005, Huarui Lin. 722-734 [doi]
- Automating Non-Blocking Synchronization In Concurrent Data AbstractionsJiange Zhang, Qing Yi, Damian Dechev. 735-747 [doi]
- Automating CUDA Synchronization via Program TransformationMingyuan Wu, Lingming Zhang, Cong Liu 0005, Shin Hwei Tan, Yuqun Zhang. 748-759 [doi]
- Efficient Transaction-Based Deterministic Replay for Multi-threaded ProgramsErnest Bota Pobee, Xiupei Mei, Wing Kwong Chan. 760-771 [doi]
- Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningYan Zheng, Changjie Fan, Xiaofei Xie, Ting Su, Lei Ma 0003, Jianye Hao, Zhaopeng Meng, Yang Liu 0003, Ruimin Shen, Yingfeng Chen. 772-784 [doi]
- A Study of Oracle Approximations in Testing Deep Learning LibrariesMahdi Nejadgholi, Jinqiu Yang. 785-796 [doi]
- Property Inference for Deep Neural NetworksDivya Gopinath, Hayes Converse, Corina S. Pasareanu, Ankur Taly. 797-809 [doi]
- An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and PlatformsQianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma 0003, Qiang Hu, Hongtao Liu, Yang Liu 0003, Jianjun Zhao, Xiaohong Li. 810-822 [doi]
- RefBot: Intelligent Software Refactoring BotVahid Alizadeh, Mohamed Amine Ouali, Marouane Kessentini, Meriem Chater. 823-834 [doi]
- Automated Refactoring to Reactive ProgrammingMirko Köhler, Guido Salvaneschi. 835-846 [doi]
- Empirical Study of Programming to an InterfaceBenoît Verhaeghe, Christopher Fuhrman, Latifa Guerrouj, Nicolas Anquetil, Stéphane Ducasse. 847-850 [doi]
- Statistical Log DifferencingLingfeng Bao, Nimrod Busany, David Lo 0001, Shahar Maoz. 851-862 [doi]
- Logzip: Extracting Hidden Structures via Iterative Clustering for Log CompressionJinyang Liu, Jieming Zhu, Shilin He, Pinjia He, Zibin Zheng, Michael R. Lyu. 863-873 [doi]
- Code-First Model-Driven Engineering: On the Agile Adoption of MDE ToolingArtur Boronat. 874-886 [doi]
- Size and Accuracy in Model InferenceNimrod Busany, Shahar Maoz, Yehonatan Yulazari. 887-898 [doi]
- Debreach: Mitigating Compression Side Channels via Static Analysis and TransformationBrandon Paulsen, Chungha Sung, Peter A. H. Peterson, Chao Wang. 899-911 [doi]
- Fine-Grain Memory Object Representation in Symbolic ExecutionMartin Nowack. 912-923 [doi]
- RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias AnalysisDongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song. 924-935 [doi]
- Batch Alias AnalysisJyothi Vedurada, V. Krishna Nandivada. 936-948 [doi]
- Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic VolatilityJeffrey Palmerino, Qi Yu, Travis Desell, Daniel E. Krutz. 949-961 [doi]
- Learning-Guided Network Fuzzing for Testing Cyber-Physical System DefencesYuqi Chen 0001, Christopher M. Poskitt, Jun Sun 0001, Sridhar Adepu, Fan Zhang 0010. 962-973 [doi]
- Cautious Adaptation of Defiant ComponentsPaulo Henrique M. Maia, Lucas Vieira, Matheus Chagas, Yijun Yu, Andrea Zisman, Bashar Nuseibeh. 974-985 [doi]
- Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and DegradationQiong Feng, Yuanfang Cai, Rick Kazman, Di Cui, Ting Liu 0002, Hongzhou Fang. 986-997 [doi]
- Automated Trainability Evaluation for Smart Software FunctionsIlias Gerostathopoulos, Stefan Kugele, Christoph Segler, Tomás Bures, Alois Knoll. 998-1001 [doi]
- The Impact of Structure on Software Merging: Semistructured Versus Structured MergeGuilherme Cavalcanti, Paulo Borba, Georg Seibt, Sven Apel. 1002-1013 [doi]
- Semistructured Merge in JavaScript SystemsAlberto Trindade Tavares, Paulo Borba, Guilherme Cavalcanti, Sérgio Soares. 1014-1025 [doi]
- CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API DocumentationKawser Wazed Nafi, Tonny Shekha Kar, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 1026-1037 [doi]
- B2SFinder: Detecting Open-Source Software Reuse in COTS SoftwareMuyue Feng, Zimu Yuan, Feng Li, Gu Ban, Shiyang Wang, Qian Tang, He Su, Chendong Yu, Jiahuan Xu, Aihua Piao, Jingling Xue, Wei Huo. 1038-1049 [doi]
- CoRA: Decomposing and Describing Tangled Code Changes for ReviewerMin Wang, Zeqi Lin, Yanzhen Zou, Bing Xie. 1050-1061 [doi]
- A Quantitative Analysis Framework for Recurrent Neural NetworkXiaoning Du, Xiaofei Xie, Yi Li 0008, Lei Ma 0003, Yang Liu 0003, Jianjun Zhao. 1062-1065 [doi]
- LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-PlatformShengcheng Yu, Chunrong Fang, Yang Feng 0003, Wenyuan Zhao, Zhenyu Chen 0001. 1066-1069 [doi]
- Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App TestingYuanchun Li, Ziyue Yang, Yao Guo 0001, Xiangqun Chen. 1070-1073 [doi]
- TestCov: Robust Test-Suite Execution and Coverage MeasurementDirk Beyer, Thomas Lemberger. 1074-1077 [doi]
- VisFuzz: Understanding and Intervening Fuzzing with Interactive VisualizationChijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Chengnian Sun, Yu Jiang 0001. 1078-1081 [doi]
- Developer Reputation Estimator (DRE)Sadika Amreen, Andrey Karnauch, Audris Mockus. 1082-1085 [doi]
- CocoQa: Question Answering for Coding Conventions Over Knowledge GraphsTianjiao Du, Junming Cao, Qinyue Wu, Wei Li, Beijun Shen, Yuting Chen. 1086-1089 [doi]
- MutAPK: Source-Codeless Mutant Generation for Android AppsCamilo Escobar-Velasquez, Michael Osorio-Riaño, Mario Linares Vásquez. 1090-1093 [doi]
- SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant MethodsGoran Piskachev, Lisa Nguyen Quang Do, Oshando Johnson, Eric Bodden. 1094-1097 [doi]
- Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java ProgramsAyesha Sadiq, Li Li, Yuan-Fang Li, Ijaz Ahmed, Sea Ling. 1098-1101 [doi]
- Visual Analytics for Concurrent Java ExecutionsCyrille Artho, Monali Pande, Qiyi Tang. 1102-1105 [doi]
- NeuralVis: Visualizing and Interpreting Deep Learning ModelsXufan Zhang, Ziyue Yin, Yang Feng, Qingkai Shi, Jia Liu, Zhenyu Chen 0001. 1106-1109 [doi]
- Kotless: A Serverless Framework for KotlinVladislav Tankov, Yaroslav Golubev, Timofey Bryksin. 1110-1113 [doi]
- FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog ComputingXiao Liu, Lingmin Fan, Jia Xu, Xuejun Li, Lina Gong, John C. Grundy, Yun Yang. 1114-1117 [doi]
- PraPR: Practical Program Repair via Bytecode MutationAli-Ghanbari, Lingming Zhang. 1118-1121 [doi]
- SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ ProgramsXutong Ma, Jiwei Yan, Yaqi Li, Jun Yan, Jian Zhang. 1122-1125 [doi]
- FPChecker: Detecting Floating-Point Exceptions in GPU ApplicationsIgnacio Laguna. 1126-1129 [doi]
- Pangolin: An SFL-Based Toolset for Feature LocalizationBruno Castro, Alexandre Perez, Rui Abreu. 1130-1133 [doi]
- SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-Based Analysis of Variant-Rich SoftwareDennis Reuling, Udo Kelter, Sebastian Ruland, Malte Lochau. 1134-1137 [doi]
- VeriAbs : Verification by Abstraction and Test GenerationMohammad Afzal, A. Asia, Avriti Chauhan, Bharti Chimdyalwar, Priyanka Darke, Advaita Datar, Shrawan Kumar, R. Venkatesh. 1138-1141 [doi]
- SGUARD: A Feature-Based Clustering Tool for Effective Spreadsheet Defect DetectionDa Li, Huiyan Wang, Chang Xu 0001, Ruiqing Zhang, Shing-Chi Cheung, Xiaoxing Ma. 1142-1145 [doi]
- PeASS: A Tool for Identifying Performance Changes at Code LevelDavid Georg Reichelt, Stefan Kühne, Wilhelm Hasselbring. 1146-1149 [doi]
- VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-threaded Programs with Lazy-CSeqBernd Fischer 0002, Salvatore La Torre, Gennaro Parlato. 1150-1153 [doi]
- CONVUL: An Effective Tool for Detecting Concurrency VulnerabilitiesRuijie Meng, Biyun Zhu, Hao Yun, Haicheng Li, Yan Cai 0001, Zijiang Yang. 1154-1157 [doi]
- DeepMutation++: A Mutation Testing Framework for Deep Learning SystemsQiang Hu, Lei Ma 0003, Xiaofei Xie, Bing Yu, Yang Liu 0003, Jianjun Zhao. 1158-1161 [doi]
- Coverage-Guided Fuzzing for Feedforward Neural NetworksXiaofei Xie, Hongxu Chen, Yi Li 0008, Lei Ma 0003, Yang Liu 0003, Jianjun Zhao. 1162-1165 [doi]
- Prema: A Tool for Precise Requirements Editing, Modeling and AnalysisYihao Huang, Jincao Feng, Hanyue Zheng, Jiayi Zhu, Shang Wang, Siyuan Jiang, Weikai Miao, Geguang Pu. 1166-1169 [doi]
- TsmartGP: A Tool for Finding Memory Defects with Pointer AnalysisYuexing Wang, Guang Chen, Min Zhou 0001, Ming Gu 0001, Jiaguang Sun. 1170-1173 [doi]
- Ares: Inferring Error Specifications through Static AnalysisChi Li, Min Zhou 0001, Zuxing Gu, Ming Gu 0001, Hongyu Zhang 0002. 1174-1177 [doi]
- PMExec: An Execution Engine of Partial UML-RT ModelsMojtaba Bagherzadeh, Karim Jahed, Nafiseh Kahani, Juergen Dingel. 1178-1181 [doi]
- mCUTE: A Model-Level Concolic Unit Testing Engine for UML State MachinesReza Ahmadi, Karim Jahed, Juergen Dingel. 1182-1185 [doi]
- Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart ContractsMark Mossberg, Felipe Manzano, Eric Hennenfent, Alex Groce, Gustavo Grieco, Josselin Feist, Trent Brunson, Artem Dinaburg. 1186-1189 [doi]
- BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business RulesPavan Kumar Chittimalli, Kritika Anand, Shrishti Pradhan, Sayandeep Mitra, Chandan Prakash, Rohit Shere, Ravindra Naik. 1190-1193 [doi]
- XRaSE: Towards Virtually Tangible Software using Augmented RealityRohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder. 1194-1197 [doi]
- MuSC: A Tool for Mutation Testing of Ethereum Smart ContractZixin Li, Haoran Wu, Jiehui Xu, Xingya Wang, Lingming Zhang, Zhenyu Chen 0001. 1198-1201 [doi]
- Lancer: Your Code Tell Me What You NeedShufan Zhou, Beijun Shen, Hao Zhong. 1202-1205 [doi]
- PHANTA: Diversified Test Code Quality Measurement for Modern Software DevelopmentSusumu Tokumoto, Kuniharu Takayama. 1206-1207 [doi]
- Test Automation and Its Limitations: A Case StudyAhyoung Sung, Sangjun Kim, Yangsu Kim, Younggun Jang, Jongin Kim. 1208-1209 [doi]
- PTracer: A Linux Kernel Patch Trace BotYang Wen, Jicheng Cao, Shengyu Cheng. 1210-1211 [doi]
- Trusted Software Supply ChainKapil Singi, R. P. Jagadeesh Chandra Bose, Sanjay Podder, Adam P. Burden. 1212-1213 [doi]
- A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software DeliveryVibhu Saujanya Sharma, Rohit Mehra, Sanjay Podder, Adam P. Burden. 1214-1215 [doi]
- Better Development of Safety Critical Systems: Chinese High Speed Railway System Development Experience ReportZhiwei Wu, Jing Liu 0012, Xiang Chen. 1216-1217 [doi]
- Improving Collaboration Efficiency in Fork-Based DevelopmentShurui Zhou. 1218-1221 [doi]
- Inference of Properties from Requirements and Automation of Their Formal VerificationMarina Reich. 1222-1225 [doi]
- Generating Tests to Analyse Dynamically-Typed ProgramsStephan Lukasczyk. 1226-1229 [doi]
- Improving Patch Quality by Enhancing Key Components of Automatic Program RepairMauricio Soto. 1230-1233 [doi]
- Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language RequirementsKristian Kolthoff. 1234-1237 [doi]
- Automatically Repairing Binary Programs Using Adapter SynthesisVaibhav Sharma. 1238-1241 [doi]
- Tackling Build Failures in Continuous IntegrationFoyzul Hassan. 1242-1245 [doi]
- Enabling Continuous Improvement of a Continuous Integration ProcessCarmine Vassallo. 1246-1249 [doi]
- Retrieve and Refine: Exemplar-Based Neural Comment GenerationBolin Wei. 1250-1252 [doi]
- API Design Implications of Boilerplate Client CodeDaye Nam. 1253-1255 [doi]
- Compile-Time Detection of Machine Image SnipingMartin Kellogg. 1256-1258 [doi]
- An Image-Inspired and CNN-Based Android Malware Detection ApproachXusheng Xiao. 1259-1261 [doi]
- Toward Practical Automatic Program RepairAli-Ghanbari. 1262-1264 [doi]
- User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless CommunicationsKrishna Murthy Kattiyan Ramamoorthy. 1265-1267 [doi]
- An Approach for Investigating Emotion Dynamics in Software DevelopmentKrishna Neupane. 1268-1270 [doi]
- Verifying Determinism in Sequential ProgramsRashmi Mudduluru. 1271-1273 [doi]
- Empirical Study of Python Call GraphLi Yu. 1274-1276 [doi]
- Crowdsourced Report Generation via Bug Screenshot UnderstandingShengcheng Yu. 1277-1279 [doi]
- Boosting Neural Commit Message Generation with Code Semantic AnalysisShuyao Jiang. 1280-1282 [doi]
- Towards Comprehensible Representation of Controllers using Machine LearningGargi Balasubramaniam. 1283-1285 [doi]
- A Machine Learning Based Approach to Identify SQL Injection VulnerabilitiesKevin Zhang. 1286-1288 [doi]