Abstract is missing.
- Safety and Robustness for Deep Learning with Provable GuaranteesMarta Kwiatkowska. 1-3 [doi]
- Is Software Engineering Research Addressing Software Engineering Problems? (Keynote)Gail C. Murphy. 4-5 [doi]
- Accelerating All-SAT Computation with Short Blocking ClausesYueling Zhang, Geguang Pu, Jun Sun 0001. 6-17 [doi]
- A Predictive Analysis for Detecting Deadlock in MPI ProgramsYu Huang, Benjamin Ogles, Eric Mercer. 18-28 [doi]
- Learning to Handle ExceptionsJian Zhang, Xu Wang, Hongyu Zhang 0002, Hailong Sun 0001, Yanjun Pu, Xudong Liu 0001. 29-41 [doi]
- BUILDFAST: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous IntegrationBihuan Chen 0001, Linlin Chen, Chen Zhang, Xin Peng 0001. 42-53 [doi]
- LEGION: Best-First Concolic TestingDongge Liu, Gidon Ernst, Toby Murray, Benjamin I. P. Rubinstein. 54-65 [doi]
- Plug the Database & Play With Automatic Testing: Improving System Testing by Exploiting Persistent DataDiego Clerissi, Giovanni Denaro, Marco Mobilio, Leonardo Mariani. 66-77 [doi]
- Enhanced Compiler Bug Isolation via Memoized SearchJunjie Chen 0003, Haoyang Ma, Lingming Zhang. 78-89 [doi]
- M3: Semantic API MigrationsBruce Collie, Philip Ginsbach, Jackson Woodruff, Ajitha Rajan, Michael F. P. O'Boyle. 90-102 [doi]
- The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux KernelNic Volanschi, Julia Lawall. 103-114 [doi]
- Pending Constraints in Symbolic Execution for Better Exploration and SeedingTimotej Kapus, Frank Busse, Cristian Cadar. 115-126 [doi]
- Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program AnalysisSungho Lee, Hyogun Lee, Sukyoung Ryu. 127-137 [doi]
- Assessing and Restoring Reproducibility of Jupyter NotebooksJiawei Wang, Tzu-yang Kuo, Li Li 0029, Andreas Zeller. 138-149 [doi]
- Verified from Scratch: Program Analysis for Learners' ProgramsAndreas Stahlbauer, Christoph Frädrich, Gordon Fraser 0001. 150-162 [doi]
- Interval Change-Point Detection for Runtime Probabilistic Model CheckingXingyu Zhao, Radu Calinescu, Simos Gerasimou, Valentin Robu, David Flynn. 163-174 [doi]
- UNCHARTIT: An Interactive Framework for Program Recovery from ChartsDaniel Ramos, Jorge Pereira, Inês Lynce, Vasco M. Manquinho, Ruben Martins. 175-186 [doi]
- Demystifying Diehard Android AppsHao Zhou, Haoyu Wang 0001, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue 0001, Ting Wang. 187-198 [doi]
- UI Obfuscation and Its Effects on Automated UI Analysis for Android AppsHao Zhou, Ting Chen 0002, Haoyu Wang 0001, Le Yu, Xiapu Luo, Ting Wang 0006, Wei Zhang. 199-210 [doi]
- Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper ObjectivesPouria Derakhshanfar, Xavier Devroey, Andy Zaidman, Arie van Deursen, Annibale Panichella. 211-223 [doi]
- Subdomain-Based Generality-Aware DebloatingQi Xin, MyeongSoo Kim, Qirun Zhang, Alessandro Orso. 224-236 [doi]
- Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set SizeYiqun T. Chen, Rahul Gopinath, Anita Tadakamalla, Michael D. Ernst, Reid Holmes, Gordon Fraser 0001, Paul Ammann, René Just. 237-249 [doi]
- Synthesis of Infinite-State Systems with Random BehaviorAndreas Katis, Grigory Fedyukovich, Jeffrey Chen, David A. Greve, Sanjai Rayadurgam, Michael W. Whalen. 250-261 [doi]
- Demystifying Loops in Smart ContractsBenjamin Mariano, Yanju Chen, Yu Feng, Shuvendu K. Lahiri, Isil Dillig. 262-274 [doi]
- Patching as Translation: the Data and the MetaphorYangruibo Ding, Baishakhi Ray, Premkumar T. Devanbu, Vincent J. Hellendoorn. 275-286 [doi]
- DeepTC-Enhancer: Improving the Readability of Automatically Generated TestsDevjeet Roy, Ziyi Zhang, Maggie Ma, Venera Arnaoudova, Annibale Panichella, Sebastiano Panichella, Danielle Gonzalez, Mehdi Mirakhorli. 287-298 [doi]
- Hybrid Deep Neural Networks to Infer State Models of Black-Box SystemsMohammad Jafar Mashhadi, Hadi Hemmati. 299-311 [doi]
- Representing and Reasoning about Dynamic CodeJesse Bartels, Jon Stephens, Saumya Debray. 312-323 [doi]
- ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in AndroidNavid Salehnamadi, Abdulaziz Alshayban, Iftekhar Ahmed 0001, Sam Malek. 324-335 [doi]
- A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open ForumMingyang Li, Lin Shi, Ye Yang, Qing Wang 0001. 336-348 [doi]
- Retrieve and Refine: Exemplar-based Neural Comment GenerationBolin Wei, Yongmin Li, Ge Li 0001, Xin Xia 0001, Zhi Jin. 349-360 [doi]
- Where Shall We Log? Studying and Suggesting Logging Locations in Code BlocksZhenhao Li, Tse-Hsun Chen, Weiyi Shang. 361-372 [doi]
- How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service SystemsJunjie Chen 0003, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang 0002, Dan Hao, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang. 373-384 [doi]
- Stay Professional and Efficient: Automatically Generate Titles for Your Bug ReportsSongqiang Chen, Xiaoyuan Xie, Bangguo Yin, Yuanxiang Ji, Lin Chen 0015, Baowen Xu. 385-397 [doi]
- Owl Eyes: Spotting UI Display Issues via Visual UnderstandingZhe Liu, Chunyang Chen, Junjie Wang 0001, Yuekai Huang, Jun Hu, Qing Wang 0001. 398-409 [doi]
- Multiple-Boundary Clustering and Prioritization to Promote Neural Network RetrainingWeijun Shen, Yanhui Li, Lin Chen 0015, Yuanlei Han, Yuming Zhou, Baowen Xu. 410-422 [doi]
- Marble: Model-based Robustness Analysis of Stateful Deep Learning SystemsXiaoning Du, Yi Li 0008, Xiaofei Xie, Lei Ma 0003, Yang Liu 0003, Jianjun Zhao. 423-435 [doi]
- MockSniffer: Characterizing and Recommending Mocking Decisions for Unit TestsHengcheng Zhu, Lili Wei, Ming Wen, Yepang Liu 0001, Shing-Chi Cheung, Qin Sheng, Cui Zhou. 436-447 [doi]
- Defect Prediction Guided Search-Based Software TestingAnjana Perera, Aldeida Aleti, Marcel Böhme, Burak Turhan. 448-460 [doi]
- API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge GraphXiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia 0001, Xiwei Xu, Liming Zhu, Jianling Sun. 461-472 [doi]
- Multi-task Learning based Pre-trained Language Model for Code CompletionFang Liu, Ge Li 0001, Yunfei Zhao, Zhi Jin. 473-485 [doi]
- Audee: Automated Testing for Deep Learning FrameworksQianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li 0001, Chao Shen. 486-498 [doi]
- Towards Interpreting Recurrent Neural Networks through Probabilistic AbstractionGuoliang Dong, Jingyi Wang, Jun Sun, Yang Zhang, Xinyu Wang 0001, Ting Dai, Jin Song Dong, Xingen Wang. 499-510 [doi]
- Continuous ComplianceMartin Kellogg, Martin Schäf, Serdar Tasiran, Michael D. Ernst. 511-523 [doi]
- SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS ImplementationsLili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li 0001, Yang Liu 0003, Jing Hu 0007. 524-535 [doi]
- CoFI: Consistency-Guided Fault Injection for Cloud SystemsHaicheng Chen, Wensheng Dou, Dong Wang, Feng Qin. 536-547 [doi]
- ChemTest: An Automated Software Testing Framework for an Emerging ParadigmMichael C. Gerten, James I. Lathrop, Myra B. Cohen, Titus H. Klinge. 548-560 [doi]
- Automatic Extraction of Cause-Effect-Relations from Requirements ArtifactsJulian Frattini, Maximilian Junker, Michael Unterkalmsteiner, Daniel Méndez 0001. 561-572 [doi]
- BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect PredictionKe Li 0001, Zilin Xiang, Tao Chen 0001, Kay Chen Tan. 573-584 [doi]
- Automating Just-In-Time Comment UpdatingZhongxin Liu, Xin Xia 0001, Meng Yan, Shanping Li. 585-597 [doi]
- Automated Implementation of Windows-related Security-Configuration GuidesPatrick Stöckle, Bernd Grobauer, Alexander Pretschner. 598-610 [doi]
- Identifying Software Performance Changes Across Variants and VersionsStefan Mühlbauer, Sven Apel, Norbert Siegmund. 611-622 [doi]
- CP-Detector: Using Configuration-related Performance Properties to Expose Performance BugsHaochen He, Zhouyang Jia, Shanshan Li, Erci Xu, Tingting Yu, Yue Yu, Ji Wang, Xiangke Liao. 623-634 [doi]
- Just-In-Time Reactive SynthesisShahar Maoz, Ilia Shevrin. 635-646 [doi]
- JISET: JavaScript IR-based Semantics Extraction ToolchainJihyeok Park, Jihee Park, Seungmin An, Sukyoung Ryu. 647-658 [doi]
- FlashRegex: Deducing Anti-ReDoS Regexes from ExamplesYeting Li, Zhiwu Xu 0001, Jialun Cao, Haiming Chen, Tingjian Ge, Shing-Chi Cheung, Haoren Zhao. 659-671 [doi]
- Inferring and Applying Def-Use Like Configuration Couplings in Deployment DescriptorsChengyuan Wen, Yaxuan Zhang, Xiao He, Na Meng. 672-683 [doi]
- Mastering Uncertainty in Performance Estimations of Configurable Software SystemsJohannes Dorn, Sven Apel, Norbert Siegmund. 684-696 [doi]
- Team Discussions and Dynamics During DevOps Tool Adoptions in OSS ProjectsLikang Yin, Vladimir Filkov. 697-708 [doi]
- TestMC: Testing Model Counters using Differential and Metamorphic TestingMuhammad Usman 0024, Wenxi Wang, Sarfraz Khurshid. 709-721 [doi]
- BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework AbstractionQian Zhang, Jiyuan Wang, Muhammad Ali Gulzar, Rohan Padhye, Miryung Kim. 722-733 [doi]
- Scaling Client-Specific Equivalence Checking via Impact Boundary SearchNick Feng, Federico Mora, Vincent Hui, Marsha Chechik. 734-745 [doi]
- Code to Comment "Translation": Data, Metrics, Baselining & EvaluationDavid Gros, Hariharan Sezhiyan, Prem Devanbu, Zhou Yu. 746-757 [doi]
- Exploring the Architectural Impact of Possible Dependencies in Python SoftwareWuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu 0002. 758-770 [doi]
- Problems and Opportunities in Training Deep Learning Software Systems: An Analysis of VarianceHung Viet Pham, Shangshu Qian, Jiannan Wang, Thibaud Lutellier, Jonathan Rosenthal, Lin Tan 0001, Yaoliang Yu, Nachiappan Nagappan. 771-783 [doi]
- NEURODIFF: Scalable Differential Verification of Neural Networks using Fine-Grained ApproximationBrandon Paulsen, Jingbo Wang, Jiawei Wang, Chao Wang. 784-796 [doi]
- Identifying and Describing Information Seeking TasksChris Satterfield, Thomas Fritz 0001, Gail C. Murphy. 797-808 [doi]
- Predicting Code Context Models for Software Development TasksZhiyuan Wan, Gail C. Murphy, Xin Xia 0001. 809-820 [doi]
- SCDetector: Software Functional Clone Detection Based on Semantic Tokens AnalysisYueming Wu, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang 0013, Feng Cheng, Hong Liang, Hai Jin 0001. 821-833 [doi]
- Generating Concept based API Element Comparison Using a Knowledge GraphYang Liu 0003, Mingwei Liu, Xin Peng 0001, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang. 834-845 [doi]
- Multiplex Symbolic Execution: Exploring Multiple Paths by Solving OnceYufeng Zhang 0001, Zhenbang Chen, Ziqi Shuai, Tianqi Zhang, Kenli Li 0001, Ji Wang. 846-857 [doi]
- Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and SchedulingChijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Yu Jiang 0001. 858-870 [doi]
- Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural NetworksXin Wang, Jin Liu, Li Li, Xiao Chen, Xiao Liu, Hao Wu. 871-882 [doi]
- OCoR: An Overlapping-Aware Code RetrieverQihao Zhu, Zeyu Sun, Xiran Liang, Yingfei Xiong 0001, Lu Zhang 0023. 883-894 [doi]
- Understanding Performance Concerns in the API Documentation of Data Science LibrariesYida Tao, Jiefang Jiang, Yepang Liu 0001, Zhiwu Xu 0001, Shengchao Qin. 895-906 [doi]
- On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair SystemsSamuel Benton, Xia Li, Yiling Lou, Lingming Zhang. 907-918 [doi]
- Automated Third-Party Library Detection for Android Applications: Are We There Yet?Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu. 919-930 [doi]
- CCGraph: a PDG-based code clone detector with approximate graph matchingYue Zou, Bihuan Ban, Yinxing Xue, Yun Xu. 931-942 [doi]
- Towards Generating Thread-Safe Classes AutomaticallyHaichi Wang, Zan Wang, Jun Sun 0001, Shuang Liu, Ayesha Sadiq, Yuan-Fang Li. 943-955 [doi]
- No Strings Attached: An Empirical Study of String-related Software BugsAryaz Eghbali, Michael Pradel. 956-967 [doi]
- Automated Patch Correctness Assessment: How Far are We?Shangwen Wang, Ming Wen, Bo Lin, Hongjun Wu, Yihao Qin, Deqing Zou, Xiaoguang Mao, Hai Jin 0001. 968-980 [doi]
- Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program RepairHaoye Tian, Kui Liu 0001, Abdoul Kader Kaboré, Anil Koyuncu, Li Li, Jacques Klein, Tegawendé F. Bissyandé. 981-992 [doi]
- Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model TransformationsChristos Tsigkanos, Nianyu Li, Zhi Jin, Zhenjiang Hu, Carlo Ghezzi. 993-1003 [doi]
- Trace-Checking Signal-based Temporal Properties: A Model-Driven ApproachChaima Boufaied, Claudio Menghi, Domenico Bianculli, Lionel C. Briand, Yago Isasi Parache. 1004-1015 [doi]
- Attend and Represent: A Novel View on Algorithm Selection for Software VerificationCedric Richter, Heike Wehrheim. 1016-1028 [doi]
- Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart ContractsYinxing Xue, Mingliang Ma, Yun Lin 0001, Yulei Sui, Jiaming Ye, Tianyong Peng. 1029-1040 [doi]
- Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution AwarenessDavid Berend, Xiaofei Xie, Lei Ma 0003, Lingjun Zhou, Yang Liu 0003, Chi Xu, Jianjun Zhao. 1041-1052 [doi]
- Metamorphic Object Insertion for Testing Object Detection SystemsShuai Wang, Zhendong Su. 1053-1065 [doi]
- Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for AndroidFarnaz Behrang, Alessandro Orso. 1066-1077 [doi]
- Test Automation in Open-Source Android Apps: A Large-Scale Empirical StudyJun-Wei Lin, Navid Salehnamadi, Sam Malek. 1078-1089 [doi]
- Synthesis-Based Resolution of Feature Interactions in Cyber-Physical SystemsBenjamin Gafford, Tobias Dürschmid, Gabriel A. Moreno, Eunsuk Kang. 1090-1102 [doi]
- MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering ToolsHoang Lam Nguyen, Nebras Nassar, Timo Kehrer, Lars Grunske. 1103-1115 [doi]
- Prober: Practically Defending Overflows with Page ProtectionHongyu Liu, Ruiqin Tian, Tongping Liu, Bin Ren. 1116-1128 [doi]
- MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking DetectionAlan Romano, Yunhui Zheng, Weihang Wang. 1129-1140 [doi]
- Summary-Based Symbolic Evaluation for Smart ContractsYu Feng, Emina Torlak, Rastislav Bodík. 1141-1152 [doi]
- Applying Learning Techniques to Oracle SynthesisFacundo Molina. 1153-1157 [doi]
- Automated Generation of Client-Specific Backends Utilizing Existing Microservices and Architectural KnowledgeNils Wieber. 1158-1160 [doi]
- SAT-Based Arithmetic Support for AlloyCésar Cornejo. 1161-1163 [doi]
- Towards Robust Production Machine Learning Systems: Managing Dataset ShiftHala Abdelkader. 1164-1166 [doi]
- Towards Transparency-Encouraging Partial Software Disclosure to Enable Trust in Data UsageChristian Schindler. 1167-1169 [doi]
- Using Defect Prediction to Improve the Bug Detection Capability of Search-Based Software TestingAnjana Perera. 1170-1174 [doi]
- The New Approach to IT Testing : Real Transaction-Based Automated Validation SolutionYongsik Kim, SoAh Min, Youkyung Kim. 1175-1178 [doi]
- Automatic Generation of IFTTT Mashup InfrastructuresLei Liu, Mehdi Bahrami, Wei-Peng Chen. 1179-1183 [doi]
- Towards Building Robust DNN Applications: An Industrial Case Study of Evolutionary Data AugmentationHaruki Yokoyama, Satoshi Onoue, Shinji Kikuchi. 1184-1188 [doi]
- Industry Practice of JavaScript Dynamic Analysis on WeChat Mini-ProgramsYi Liu, Jinhui Xie, Jianbo Yang, Shiyu Guo, Yuetang Deng, Shuqing Li, Yechang Wu, Yepang Liu 0001. 1189-1193 [doi]
- Lightweight MBT Testing for National e-Health Portal in NorwayDavrondzhon Gafurov, Margrete Sunde Grovan, Arne Erik Hurum. 1194-1198 [doi]
- Code-Based Vulnerability Detection in Node.js Applications: How far are we?Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto. 1199-1203 [doi]
- A Framework for Automated Test Mocking of Mobile AppsMattia Fazzini, Alessandra Gorla, Alessandro Orso. 1204-1208 [doi]
- A Hybrid Analysis to Detect Java Serialisation VulnerabilitiesShawn Rasheed, Jens Dietrich 0001. 1209-1213 [doi]
- BugPecker: Locating Faulty Methods with Deep Learning on Revision GraphsJunming Cao, Shouliang Yang, Wenhui Jiang, Hushuang Zeng, Beijun Shen, Hao Zhong. 1214-1218 [doi]
- Closer to the Edge: Testing Compilers More Thoroughly by Being Less Conservative About Undefined BehaviourKarine Even Mendoza, Cristian Cadar, Alastair F. Donaldson. 1219-1223 [doi]
- Generating Highly-structured Input Data by Combining Search-based Testing and Grammar-based FuzzingMitchell Olsthoorn, Arie van Deursen, Annibale Panichella. 1224-1228 [doi]
- Making Fair ML Software using Trustworthy ExplanationJoymallya Chakraborty, Kewen Peng, Tim Menzies. 1229-1233 [doi]
- On Benign Features in Malware DetectionMichael Cao, Sahar Badihi, Khaled Ahmed 0004, Peiyu Xiong, Julia Rubin. 1234-1238 [doi]
- Proving Termination by k-InductionJianhui Chen, Fei He. 1239-1243 [doi]
- SRRTA: Regression Testing Acceleration via State ReuseJinhao Dong, Yiling Lou, Dan Hao. 1244-1248 [doi]
- An Automated Assessment of Android ClipboardsWei Wang, Ruoxi Sun, Minhui Xue, Damith C. Ranasinghe. 1249-1251 [doi]
- Edge4Sys: A Device-Edge Collaborative Framework for MEC based Smart SystemsHan Gao, Yi Xu, Xiao Liu 0004, Jia Xu, Tianxiang Chen, Bowen Zhou, Rui Li, Xuejun Li. 1252-1254 [doi]
- Efficient Multiplex Symbolic Execution with Adaptive Search StrategyTianqi Zhang, Yufeng Zhang 0001, Zhenbang Chen, Ziqi Shuai, Ji Wang. 1255-1256 [doi]
- Managing App Testing Device Clouds: Issues and OpportunitiesMattia Fazzini, Alessandro Orso. 1257-1259 [doi]
- Styx: A Data-Oriented Mutation Framework to Improve the Robustness of DNNMeixi Liu, Weijiang Hong, Weiyu Pan, Chendong Feng, Zhenbang Chen, Ji Wang. 1260-1261 [doi]
- Synthesizing Smart Solving Strategy for Symbolic ExecutionZehua Chen, Zhenbang Chen, Ziqi Shuai, Yufeng Zhang 0001, Weiyu Pan. 1262-1263 [doi]
- The Symptom, Cause and Repair of WorkaroundDaohan Song, Hao Zhong, Li Jia. 1264-1266 [doi]
- Towards Immersive Comprehension of Software Systems Using Augmented Reality - An Empirical EvaluationRohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden. 1267-1269 [doi]
- Towards Programming and Verification for Activity-Oriented Smart Home SystemsXuansong Li, Wei Song, Xiangyu Zhang. 1270-1272 [doi]
- AirMochi - A Tool for Remotely Controlling iOS DevicesNikola Lukic, Saghar Talebipour, Nenad Medvidovic. 1273-1277 [doi]
- Botsing, a Search-based Crash Reproduction Framework for JavaPouria Derakhshanfar, Xavier Devroey, Annibale Panichella, Andy Zaidman, Arie van Deursen. 1278-1282 [doi]
- Express: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems**This research is in part supported by the National Natural Science Foundation of China Project No. 61972001Jia Xu, Xiao Liu, Xuejun Li, Lei Zhang, Yun Yang. 1283-1286 [doi]
- Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software EngineeringDi Shao, Xiao Liu, Ben Cheng, Owen Wang, Thuong Hoang. 1287-1291 [doi]
- FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework UpgradesMarco Mobilio, Oliviero Riganelli, Daniela Micucci, Leonardo Mariani. 1292-1296 [doi]
- GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language RequirementsKristian Kolthoff, Christian Bartelt, Simone Paolo Ponzetto. 1297-1301 [doi]
- HomoTR: Online Test Recommendation System Based on Homologous Code MatchingChenqian Zhu, Weisong Sun, Qin Liu, Yangyang Yuan, Chunrong Fang, Yong Huang. 1302-1306 [doi]
- ImpAPTr: A Tool For Identifying The Clues To Online Service AnomaliesHao Wang, Guoping Rong, Yangchen Xu, Yong You. 1307-1311 [doi]
- OSLDetector: Identifying Open-Source Libraries through Binary AnalysisDan Zhang, Ping Luo, Wei Tang, Min Zhou. 1312-1315 [doi]
- Sosed: a tool for finding similar software projectsEgor Bogomolov, Yaroslav Golubev, Artyom Lobanov, Vladimir Kovalenko, Timofey Bryksin. 1316-1320 [doi]
- WASim: Understanding WebAssembly Applications through ClassificationAlan Romano, Weihang Wang. 1321-1325 [doi]
- MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test GenerationRunze Yu, Youzhe Zhang, Jifeng Xuan. 1326-1330 [doi]
- STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion AnalysisZhenfei Cao, Xu Wang, Shengcheng Yu, Yexiao Yun, Chunrong Fang. 1331-1335 [doi]
- JITBot: An Explainable Just-In-Time Defect Prediction BotChaiyakarn Khanan, Worawit Luewichana, Krissakorn Pruktharathikoon, Jirayus Jiarpakdee, Chakkrit Tantithamthavorn, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta. 1336-1339 [doi]
- Speeding up GUI Testing by On-Device Test GenerationNataniel P. Borges, Jenny Rau, Andreas Zeller. 1340-1343 [doi]
- PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python ProjectsOmar Javed, Joshua Heneage Dawes, Marta Han, Giovanni Franzoni, Andreas Pfeiffer, Giles Reger, Walter Binder. 1344-1348 [doi]
- SmartBugs: A Framework to Analyze Solidity Smart ContractsJoão F. Ferreira, Pedro Cruz, Thomas Durieux, Rui Abreu. 1349-1352 [doi]
- RepoSkillMiner: Identifying software expertise from GitHub repositories using Natural Language ProcessingStratos Kourtzanidis, Alexander Chatzigeorgiou, Apostolos Ampatzoglou. 1353-1357 [doi]
- A Machine Learning based Approach to Autogenerate Diagnostic Models for CNC machinesKamil Adipovich Masalimov. 1358-1360 [doi]
- A Program Verification based Approach to Find Data Race Vulnerabilities in Interrupt-driven ProgramHaining Feng. 1361-1363 [doi]
- A Unified Framework to Learn Program Semantics with Graph Neural NetworksShangqing Liu. 1364-1366 [doi]
- Anti-patterns for Java Automated Program Repair ToolsYi Wu. 1367-1369 [doi]
- CrossPriv: User Privacy Preservation Model for Cross-Silo Federated SoftwareHarshita Diddee, Bhrigu Kansra. 1370-1372 [doi]
- Discovering UI Display Issues with Visual UnderstandingZhe Liu. 1373-1375 [doi]
- Dynamic Algorithm Selection for SMTNikhil Pimpalkhare. 1376-1378 [doi]
- FLUX: From SQL to GQL query translation toolChandan Sharma. 1379-1381 [doi]
- Finding Ethereum Smart Contracts Security Issues by Comparing History VersionsJiachi Chen. 1382-1384 [doi]
- Formal Verification of Masking Countermeasures for Arithmetic ProgramsPengfei Gao. 1385-1387 [doi]
- Identifying Mutation Subsumption RelationsBeatriz Souza. 1388-1390 [doi]
- Scalability and Precision Improvement of Neural Program SynthesisYating Zhang. 1391-1393 [doi]
- The Classification and Propagation of Program CommentsXiangzhe Xu. 1394-1396 [doi]
- Source Code and Binary Level Vulnerability Detection and Hot PatchingZhengzi Xu. 1397-1399 [doi]
- When Deep Learning Meets Smart ContractsZhipeng Gao. 1400-1402 [doi]