Abstract is missing.
- Explainable AI for Software EngineeringChakkrit Kla Tantithamthavorn, Jirayus Jiarpakdee. 1-2 [doi]
- Tackling Flaky Tests: Understanding the Problem and Providing Practical SolutionsMartin Gruber. 1-3 [doi]
- Automating User Notice Generation for Smart Contract FunctionsXing Hu, Zhipeng Gao, Xin Xia 0001, David Lo 0001, Xiaohu Yang. 5-17 [doi]
- End-to-End Automation of Feedback on Student Assembly ProgramsZikai Liu, Tingkai Liu, Qi Li, Wenqing Luo, Steven S. Lumetta. 18-29 [doi]
- Is Historical Data an Appropriate Benchmark for Reviewer Recommendation Systems? : A Case Study of the Gerrit CommunityIan X. Gauthier, Maxime Lamothe, Gunter Mussbacher, Shane McIntosh. 30-41 [doi]
- An Empirical Study of Bugs in WebAssembly CompilersAlan Romano, Xinyue Liu, Yonghwi Kwon, Weihang Wang 0001. 42-54 [doi]
- Detecting TensorFlow Program Bugs in Real-World Industrial EnvironmentChen Liu, Jie Lu, Guangwei Li, Ting Yuan, Lian Li, Feng Tan, Jun Yang, Liang You, Jingling Xue. 55-66 [doi]
- Why Do Developers Remove Lambda Expressions in Java?Mingwei Zheng, Jun Yang, Ming Wen 0001, Hengcheng Zhu, Yepang Liu 0001, Hai Jin. 67-78 [doi]
- Context Debloating for Object-Sensitive Pointer AnalysisDongjie He, Jingbo Lu, Jingling Xue. 79-91 [doi]
- Dynamic Generation of Python Bindings for HPC KernelsSteven Zhu, Nader Al Awar, Mattan Erez, Milos Gligoric. 92-103 [doi]
- Testing Your Question Answering Software via Asking RecursivelySongqiang Chen, Shuo Jin, Xiaoyuan Xie. 104-116 [doi]
- Improving Test Case Generation for REST APIs Through Hierarchical ClusteringDimitri Michel Stallenberg, Mitchell Olsthoorn, Annibale Panichella. 117-128 [doi]
- VizSmith: Automated Visualization Synthesis by Mining Data-Science NotebooksRohan Bavishi, Shadaj Laddad, Hiroaki Yoshida, Mukul R. Prasad, Koushik Sen. 129-141 [doi]
- ISPY: Automatic Issue-Solution Pair Extraction from Community Live ChatsLin Shi, Ziyou Jiang, Ye Yang, Xiao Chen, Yumin Zhang, Fangwen Mu, Hanzhi Jiang, Qing Wang. 142-154 [doi]
- EditSum: A Retrieve-and-Edit Framework for Source Code SummarizationJia Li, Yongmin Li, Ge Li 0001, Xing Hu 0008, Xin Xia 0001, Zhi Jin. 155-166 [doi]
- Interactive Cross-language Code Retrieval with Auto-EncodersBinger Chen, Ziawasch Abedjan. 167-178 [doi]
- Data-Driven Design and Evaluation of SMT Meta-Solving Strategies: Balancing Performance, Accuracy, and CostMalte Mues, Falk Howar. 179-190 [doi]
- Reducing Bug Triaging Confusion by Learning from Mistakes with a Bug Tossing Knowledge GraphYanqi Su, Zhenchang Xing, Xin Peng, Xin Xia 0001, Chong Wang, Xiwei Xu, Liming Zhu 0001. 191-202 [doi]
- ASE: A Value Set Decision Procedure for Symbolic ExecutionAlireza S. Abyaneh, Christoph M. Kirsch. 203-214 [doi]
- CorbFuzz: Checking Browser Security Policies with FuzzingChaofan Shou, Ismet Burak Kadron, Qi Su, Tevfik Bultan. 215-226 [doi]
- SMARTIAN: Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow AnalysesJaeseung Choi 0001, Doyeon Kim, Soomin Kim 0002, Gustavo Grieco, Alex Groce, Sang Kil Cha. 227-239 [doi]
- Restoring the Executability of Jupyter Notebooks by Automatic Upgrade of Deprecated APIsChenguang Zhu, Ripon K. Saha, Mukul R. Prasad, Sarfraz Khurshid. 240-252 [doi]
- Adversarial Attacks to API Recommender Systems: Time to Wake Up and Smell the CoffeeƒPhuong T. Nguyen, Claudio Di Sipio, Juri Di Rocco, Massimiliano Di Penta, Davide Di Ruscio. 253-265 [doi]
- REPFINDER: Finding Replacements for Missing APIs in Library UpdateKaifeng Huang, Bihuan Chen 0001, Linghao Pan, Shuai Wu, Xin Peng 0001. 266-278 [doi]
- Targeting Requirements Violations of Autonomous Driving Systems by Dynamic Evolutionary SearchYixing Luo, Xiao-Yi Zhang, Paolo Arcaini, Zhi Jin, Haiyan Zhao, Fuyuki Ishikawa, Rongxin Wu, Tao Xie 0001. 279-291 [doi]
- On the Real-World Effectiveness of Static Bug Detectors at Finding Null Pointer ExceptionsDavid A. Tomassi, Cindy Rubio-González. 292-303 [doi]
- Subtle Bugs Everywhere: Generating Documentation for Data Wrangling CodeChenyang Yang, Shurui Zhou, Jin L. C. Guo, Christian Kästner. 304-316 [doi]
- Distribution Models for Falsification and Verification of DNNsFelipe Toledo, David Shriver, Sebastian G. Elbaum, Matthew B. Dwyer. 317-329 [doi]
- SATune: A Study-Driven Auto-Tuning Approach for Configurable Software Verification ToolsUgur Koc, Austin Mordahl, Shiyi Wei, Jeffrey S. Foster, Adam A. Porter. 330-342 [doi]
- Efficient SMT-Based Model Checking for Signal Temporal LogicJia Lee, Geunyeol Yu, Kyungmin Bae. 343-354 [doi]
- DeepMetis: Augmenting a Deep Learning Test Set to Increase its Mutation ScoreVincenzo Riccio, Nargiz Humbatova, Gunel Jahangirova, Paolo Tonella. 355-367 [doi]
- Efficient state synchronisation in model-based testing through reinforcement learningUraz Cengiz Türker, Robert M. Hierons, Mohammad Reza Mousavi 0001, Ivan Y. Tyukin. 368-380 [doi]
- Faster Mutation Analysis with Fewer Processes and Smaller OverheadsBo Wang, Sirui Lu, Yingfei Xiong, Feng Liu. 381-393 [doi]
- FRUGAL: Unlocking Semi-Supervised Learning for Software AnalyticsHuy Tu, Tim Menzies. 394-406 [doi]
- PyExplainer: Explaining the Predictions of Just-In-Time Defect ModelsChanathip Pornprasit, Chakkrit Tantithamthavorn, Jirayus Jiarpakdee, Michael Fu, Patanamon Thongtanunam. 407-418 [doi]
- Groot: An Event-graph-based Approach for Root Cause Analysis in Industrial SettingsHanzhang Wang, Zhengkai Wu, Huai Jiang, Yichao Huang, Jiamu Wang, Selçuk Köprü, Tao Xie. 419-429 [doi]
- Graph-based Incident Aggregation for Large-Scale Online Service SystemsZhuangbin Chen, Jinyang Liu, Yuxin Su, Hongyu Zhang, Xuemin Wen, Xiao Ling, Yongqiang Yang, Michael R. Lyu. 430-442 [doi]
- On Multi-Modal Learning of Editing Source CodeSaikat Chakraborty, Baishakhi Ray. 443-455 [doi]
- Learning Highly Recursive Input GrammarsNeil Kulkarni, Caroline Lemieux, Koushik Sen. 456-467 [doi]
- Automated Testing for Machine Translation via Constituency InvariancePin Ji, Yang Feng, Jia Liu, Zhihong Zhao, Baowen Xu. 468-479 [doi]
- Race Detection for Event-Driven Node.js ApplicationsXiaoning Chang, Wensheng Dou, Jun Wei 0001, Tao Huang 0001, Jinhui Xie, Yuetang Deng, Jianbo Yang, Jiaheng Yang. 480-491 [doi]
- Log-based Anomaly Detection Without Log ParsingVan-Hoang Le, Hongyu Zhang. 492-504 [doi]
- Finding the Missing Piece: Permission Specification Analysis for Android NDKHao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang 0006. 505-516 [doi]
- Characterizing and Detecting Configuration Compatibility Issues in Android AppsHuaxun Huang, Ming Wen 0001, Lili Wei, Yepang Liu 0001, Shing-Chi Cheung. 517-528 [doi]
- Where to Start: Studying Type Annotation Practices in PythonWuxia Jin, Dinghong Zhong, Zifan Ding, Ming Fan, Ting Liu 0002. 529-541 [doi]
- APIzation: Generating Reusable APIs from StackOverflow Code SnippetsValerio Terragni, Pasquale Salza. 542-554 [doi]
- FIGCPS: Effective Failure-inducing Input Generation for Cyber-Physical Systems with Deep Reinforcement LearningShaohua Zhang, Shuang Liu, Jun Sun, Yuqi Chen, Wenzhi Huang, Jinyi Liu, Jian Liu, Jianye Hao. 555-567 [doi]
- InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox FuzzingYuwei Liu, Yanhao Wang, Purui Su, Yuanping Yu, Xiangkun Jia. 568-580 [doi]
- RULF: Rust Library Fuzzing via API Dependency Graph TraversalJianfeng Jiang, Hui Xu 0009, Yangfan Zhou. 581-592 [doi]
- PyNose: A Test Smell Detector For PythonTongjie Wang, Yaroslav Golubev, Oleg Smirnov, Jiawei Li, Timofey Bryksin, Iftekhar Ahmed 0001. 593-605 [doi]
- JSTAR: JavaScript Specification Type Analyzer using RefinementJihyeok Park, Seungmin An, Wonho Shin, Yusung Sim, Sukyoung Ryu. 606-616 [doi]
- Can Neural Clone Detection Generalize to Unseen FunctionalitiesƒChenyao Liu, Zeqi Lin, Jian-Guang Lou, Lijie Wen, Dongmei Zhang. 617-629 [doi]
- Characterizing Transaction-Reverting Statements in Ethereum Smart ContractsLu Liu, Lili Wei, Wuqi Zhang, Ming Wen 0001, Yepang Liu 0001, Shing-Chi Cheung. 630-641 [doi]
- "What makes my queries slow?": Subgroup Discovery for SQL Workload AnalysisYoucef Remil, Anes Bendimerad, Romain Mathonat, Philippe Chaleat, Mehdi Kaytoue. 642-652 [doi]
- AID: Efficient Prediction of Aggregated Intensity of Dependency in Large-scale Cloud SystemsTianyi Yang, Jiacheng Shen, Yuxin Su, Xiao Ling, Yongqiang Yang, Michael R. Lyu. 653-665 [doi]
- Performance Testing for Cloud Computing with Dependent Data BootstrappingSen He, Tianyi Liu, Palden Lama, Jaewoo Lee, In Kee Kim, Wei Wang 0054. 666-678 [doi]
- Nekara: Generalized Concurrency TestingUdit Agarwal, Pantazis Deligiannis, Cheng Huang, Kumseok Jung, Akash Lal, Immad Naseer, Matthew Parkinson, Arun Thangamani, Jyothi Vedurada, Yunpeng Xiao. 679-691 [doi]
- QDiff: Differential Testing of Quantum Software StacksJiyuan Wang, Qian Zhang, Guoqing Harry Xu, Miryung Kim. 692-704 [doi]
- Finding A Needle in a Haystack: Automated Mining of Silent Vulnerability FixesJiayuan Zhou, Michael Pacheco, Zhiyuan Wan, Xin Xia 0001, David Lo 0001, Yuan Wang, Ahmed E. Hassan. 705-716 [doi]
- DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task LearningTriet Huynh Minh Le, David Hin, Roland Croft, Muhammad Ali Babar. 717-729 [doi]
- Automated Repair of Size-Based Inaccessibility Issues in Mobile ApplicationsAli S. Alotaibi, Paul T. Chiou, William G. J. Halfond. 730-742 [doi]
- Mining Cross-Domain Apps for Software Evolution: A Feature-based ApproachMd Kafil Uddin, Qiang He 0001, Jun Han 0004, Caslon Chua. 743-755 [doi]
- UI Test Migration Across Mobile PlatformsSaghar Talebipour, Yixue Zhao, Luka Dojcilovic, Chenggang Li, Nenad Medvidovic. 756-767 [doi]
- Intelligent Change Operators for Multi-Objective RefactoringChaima Abid, James Ivers, Thiago do Nascimento Ferreira, Marouane Kessentini, Fares E. Kahla, Ipek Ozkaya. 768-780 [doi]
- Refactorings and Technical Debt in Docker Projects: An Empirical StudyEmna Ksontini, Marouane Kessentini, Thiago do Nascimento Ferreira, Foyzul Hassan. 781-791 [doi]
- FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel ExecutionQiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren 0001. 792-804 [doi]
- IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT FirmwarePeiyu Liu, Shouling Ji, Xuhong Zhang 0005, Qinming Dai, Kangjie Lu, Lirong Fu, Wenzhi Chen, Peng Cheng, Wenhai Wang, Raheem Beyah. 805-816 [doi]
- Learning Patterns in ConfigurationRanjita Bhagwan, Sonu Mehta, Arjun Radhakrishna, Sahil Garg. 817-828 [doi]
- Transcode: Detecting Status Code Mapping Errors in Large-Scale SystemsWensheng Tang, Yikun Hu, Gang Fan, Peisen Yao, Rongxin Wu, Guangyuan Bai, Pengcheng Wang, Charles Zhang. 829-841 [doi]
- Evolutionary-Guided Synthesis of Verified Pareto-Optimal MDP PoliciesSimos Gerasimou, Javier Cámara, Radu Calinescu, Naif Alasmari, Faisal Alhwikem, Xinwei Fang. 842-853 [doi]
- Automating Developer Chat MiningShengyi Pan, Lingfeng Bao, Xiaoxue Ren, Xin Xia 0001, David Lo 0001, Shanping Li. 854-866 [doi]
- Thinking Like a Developer? Comparing the Attention of Humans with Neural Models of CodeMatteo Paltenghi, Michael Pradel. 867-879 [doi]
- Detecting Memory-Related Bugs by Tracking Heap Memory Management of C++ Smart PointersXutong Ma, Jiwei Yan, Wei Wang, Jun Yan, Jian Zhang, Zongyan Qiu. 880-891 [doi]
- Understanding and Detecting Performance Bugs in Markdown CompilersPenghui Li, Yinxi Liu, Wei Meng 0001. 892-904 [doi]
- Deep GUI: Black-box GUI Input Generation with Deep LearningFaraz Yazdani Banafshe Daragh, Sam Malek. 905-916 [doi]
- Towards Exploring the Limitations of Active Learning: An Empirical StudyQiang Hu, Yuejun Guo 0003, Maxime Cordy, Xiaofei Xie, Wei Ma, Mike Papadakis, Yves Le Traon. 917-929 [doi]
- Learning Domain-Specific Edit Operations from Model Repositories with Frequent Subgraph MiningChristof Tinnes, Timo Kehrer, Mitchell Joblin, Uwe Hohenstein, Andreas Biesdorf, Sven Apel. 930-942 [doi]
- Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability DescriptionsSofonias Yitagesu, Zhenchang Xing, Xiaowang Zhang, Zhiyong Feng 0002, Xiaohong Li 0001, Linyi Han. 943-954 [doi]
- A Compositional Deadlock Detector for Android JavaJames Brotherston, Paul Brunet, Nikos Gorogiannis, Max I. Kanovich. 955-966 [doi]
- Binary Diffing as a Network Alignment Problem via Belief PropagationElie Mengin, Fabrice Rossi. 967-978 [doi]
- CiFi: Versatile Analysis of Class and Field ImmutabilityTobias Roth, Dominik Helm, Michael Reif, Mira Mezini. 979-990 [doi]
- Modeling Team Dynamics for the Characterization and Prediction of Delays in User StoriesElvan Kula, Arie van Deursen, Georgios Gousios. 991-1002 [doi]
- DeepMemory: Model-based Memorization Analysis of Deep Neural Language ModelsDerui Zhu, Jinfu Chen 0002, Weiyi Shang, Xuebing Zhou, Jens Grossklags, Ahmed E. Hassan. 1003-1015 [doi]
- Automated Verification of Go Programs via Bounded Model CheckingNicolas Dilley, Julien Lange. 1016-1027 [doi]
- A Prediction Model for Software Requirements Change ImpactKareshna Zamani. 1028-1032 [doi]
- DSInfoSearch: Supporting Experimentation Process of Data ScientistsShangeetha Sivasothy. 1033-1037 [doi]
- Towards the generation of machine learning defect reportsTuan Dung Lai. 1038-1042 [doi]
- Leveraging Code Clones and Natural Language Processing for Log Statement PredictionSina Gholamian. 1043-1047 [doi]
- An Automated Pipeline for Privacy Leak Analysis of Android ApplicationsYifan Zhou. 1048-1050 [doi]
- Training Automated Test Oracles to Identify Semantic BugsCharaka Geethal. 1051-1055 [doi]
- Binary Code Similarity DetectionZian Liu. 1056-1060 [doi]
- API Compatibility Issue Detection, Testing and Analysis for Android AppsTarek Mahmud. 1061-1063 [doi]
- Effectively Analyzing Evolving Software with Differential FactsXiuheng Wu. 1064-1068 [doi]
- Automated Approach for System-level Testing of Unmanned Aerial SystemsHassan Sartaj. 1069-1073 [doi]
- Cross-Lingual Transfer Learning Framework for Program AnalysisZhiming Li. 1074-1078 [doi]
- Fuzzing Methods Recommendation Based on Feature VectorsChi Zhang, Jinfu Chen. 1079-1081 [doi]
- Gas Estimation and Optimization for Smart Contracts on EthereumChunmiao Li. 1082-1086 [doi]
- Quality analysis of mobile applications with special focus on security aspectsKristiina Rahkema. 1087-1089 [doi]
- Semi-automated Cross-Component Issue Management and Impact AnalysisSandro Speth. 1090-1094 [doi]
- How Can Subgroup Discovery Help AIOps?Youcef Remil. 1098-1100 [doi]
- Improving Configurability of Unit-level Continuous Fuzzing: An Industrial Case Study with SAP HANAHanyoung Yoo, Jingun Hong, Lucas Bader, Dongwon Hwang, Shin Hong. 1101-1105 [doi]
- Access Control Tree for Testing and LearningDavrondzhon Gafurov, Arne Erik Hurum, Margrete Sunde Grovan. 1106-1110 [doi]
- FinFuzzer: One Step Further in Fuzzing Fintech SystemsQingshun Wang, Lihua Xu, Jun Xiao, Qi Guo, Haotian Zhang, Liang Dou, Liang He 0001, Tao Xie 0001. 1111-1115 [doi]
- Evaluating Semantic Autocompletion of Business Processes with Domain ExpertsMaayan Goldstein, Cecilia González-Alvarez. 1116-1120 [doi]
- Learning-based Assistant for Data Migration of Enterprise Information SystemsSayandeep Mitra, Debayan Mukherjee, Atreya Bandyopadhyay, Rajdip Chowdhury, Raveendra Kumar Medicherla, Indrajit Bhattacharya, Ravindra Naik. 1121-1125 [doi]
- Reducing Time-To-Fix For Fuzzer BugsRui Abreu, Franjo Ivancic, Filip Niksic, Hadi Ravanbakhsh, Ramesh Viswanathan. 1126-1130 [doi]
- Automatically Deciding on the Integration of Commits Based on Their DescriptionsSamuel C. Fonseca, Mateus C. Lucena, Tiago M. Reis, Pedro F. Cabral, Walmir A. Silva, Flavia de S. Santos, Felipe T. Giuntini, Juliano Sales. 1131-1135 [doi]
- BeeSwarm: Enabling Parallel Scaling Performance Measurement in Continuous Integration for HPC ApplicationsJake Tronge, Jieyang Chen, Patricia Grubel, Tim Randles, Rusty Davis, Quincy Wofford, Steven Anaya, Qiang Guan. 1136-1140 [doi]
- Lessons learned from hyper-parameter tuning for microservice candidate identificationRahul Yedida, Rahul Krishna, Anup K. Kalia, Tim Menzies, Jin Xiao, Maja Vukovic. 1141-1145 [doi]
- Learning GraphQL Query CostGeorgios Mavroudeas, Guillaume Baudart, Alan Cha, Martin Hirzel, Jim Alain Laredo, Malik Magdon-Ismail, Louis Mandel, Erik Wittern. 1146-1150 [doi]
- Automatic HMI Structure Exploration Via Curiosity-Based Reinforcement LearningYushi Cao, Yan Zheng, Shang-Wei Lin 0001, Yang Liu 0003, Yon Shin Teo, Yuxuan Toh, Vinay Vishnumurthy Adiga. 1151-1155 [doi]
- Towards a Serverless Java RuntimeYifei Zhang, Tianxiao Gu, Xiaolin Zheng, Lei Yu, Wei Kuai, Sanhong Li. 1156-1160 [doi]
- BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile DevicesCen Zhang, Yuekang Li, Hongxu Chen, Xiaoxing Luo, Miaohua Li, Anh-Quynh Nguyen, Yang Liu. 1161-1165 [doi]
- Infrastructure in Code: Towards Developer-Friendly Cloud ApplicationsVladislav Tankov, Dmitriy Valchuk, Yaroslav Golubev, Timofey Bryksin. 1166-1170 [doi]
- Metamorphic Testing on Multi-module UAV SystemsRui Li, Huai Liu, Guannan Lou, James Xi Zheng, Xiao Liu 0004, Tsong Yueh Chen. 1171-1173 [doi]
- Decoupling Server and Client Code Through Cloud-Native Domain-Specific FunctionsJosé Miguel Pérez-Álvarez, Adrian Mos, Benjamin V. Hanrahan, Iyadunni J. Adenuga. 1174-1176 [doi]
- Automatically Annotating Sentences for Task-specific Bug Report SummarizationAkalanka Galappaththi, John Anvik, Rafat Bin Islam. 1177-1179 [doi]
- Genetic Optimisation of C++ ApplicationsRafail Giavrimis, Alexis Butler, Constantin Cezar Petrescu, Michail Basios, Santanu Kumar Dash 0001. 1180-1182 [doi]
- Revisiting Textual Feature of Bug-Triage ApproachZexuan Li, Hao Zhong. 1183-1185 [doi]
- A First Look at the Effect of Deep Learning in Coverage-guided FuzzingSiqi Li, Yun Lin, Xiaofei Xie, Yuekang Li, Xiaohong Li, Weimin Ge, Yang Liu, Jin Song Dong. 1186-1189 [doi]
- Counterexample Guided Inductive Repair of Reactive ContractsSoha Hussein, Vaibhav Sharma, Stephen McCamant, Sanjai Rayadurgam, Mats Per Erik Heimdahl. 1190-1192 [doi]
- AST-Transformer: Encoding Abstract Syntax Trees Efficiently for Code SummarizationZe Tang, Chuanyi Li, JiDong Ge, Xiaoyu Shen, Zheling Zhu, Bin Luo 0003. 1193-1195 [doi]
- Detecting Adversarial Samples with Graph-Guided TestingZuohui Chen, Renxuan Wang, Jingyang Xiang, Yue Yu 0001, Xin Xia, Shouling Ji, Qi Xuan, Xiaoniu Yang. 1196-1198 [doi]
- Using Static Analysis to Address Microservice Architecture ReconstructionVincent Bushong, Dipta Das, Abdullah Al Maruf, Tomás Cerný. 1199-1201 [doi]
- Business Process Extraction Using Static AnalysisMd Rofiqul Islam, Tomás Cerný. 1202-1204 [doi]
- Improving Mutation-Based Fault Localization with Plausible-code Generating Mutation OperatorsJuyoung Jeon, Shin Hong. 1205-1207 [doi]
- Using Version Control and Issue Tickets to detect Code Debt and Economical CostAbdullah Al Maruf, Noah Lambaria, Amr S. Abdelfattah, Tomas Cerny. 1208-1209 [doi]
- Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and MitigationTien N. Nguyen, Raymond Choo. 1210-1212 [doi]
- BeAFix: An Automated Repair Tool for Faulty Alloy ModelsSimón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias. 1213-1217 [doi]
- FLACK: Localizing Faults in Alloy ModelsGuolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri. 1218-1222 [doi]
- IncBL: Incremental Bug LocalizationZhou Yang, Jieke Shi, Shaowei Wang 0002, David Lo 0001. 1223-1226 [doi]
- Q&A MAESTRO: Q&A Post Recommendation for Fixing Java Runtime ExceptionsYusuke Kimura, Takumi Akazaki, Shinji Kikuchi, Sonal Mahajan, Mukul R. Prasad. 1227-1231 [doi]
- GenTree: Inferring Configuration Interactions using Decision TreesKimHao Nguyen, ThanhVu Nguyen. 1232-1236 [doi]
- Quito: a Coverage-Guided Test Generator for Quantum ProgramsXinyi Wang, Paolo Arcaini, Tao Yue 0002, Shaukat Ali 0001. 1237-1241 [doi]
- Revizor: A Data-Driven Approach to Automate Frequent Code Changes Based on Graph MatchingOleg Smirnov, Artyom Lobanov, Yaroslav Golubev, Elena Tikhomirova, Timofey Bryksin. 1242-1246 [doi]
- Scalable Fuzzing of Program Binaries with E9AFLXiang Gao 0012, Gregory J. Duck, Abhik Roychoudhury. 1247-1251 [doi]
- EvoMe: A Software Evolution Management Engine Based on Differential FactbaseXiuheng Wu, Mengyang Li, Yi Li 0008. 1252-1256 [doi]
- FixMe: A GitHub Bot for Detecting and Monitoring On-Hold Self-Admitted Technical DebtSaranphon Phaithoon, Supakarn Wongnil, Patiphol Pussawong, Morakot Choetkiertikul, Chaiyong Ragkhitwetsagul, Thanwadee Sunetnanta, Rungroj Maipradit, Hideaki Hata, Kenichi Matsumoto. 1257-1261 [doi]
- Automated Code Refactoring upon Database-Schema Changes in Web ApplicationsSophie Xie, Junwen Yang, Shan Lu 0001. 1262-1265 [doi]
- Muskit: A Mutation Analysis Tool for Quantum Software TestingEñaut Mendiluze, Shaukat Ali 0001, Paolo Arcaini, Tao Yue 0002. 1266-1270 [doi]
- JTDog: a Gradle Plugin for Dynamic Test Smell DetectionMasayuki Taniguchi, Shinsuke Matsumoto, Shinji Kusumoto. 1271-1275 [doi]
- RefactorInsight: Enhancing IDE Representation of Changes in Git with Refactorings InformationZarina Kurbatova, Vladimir Kovalenko, Ioana Savu, Bob Brockbernd, Dan Andreescu, Matei Anton, Roman Venediktov, Elena Tikhomirova, Timofey Bryksin. 1276-1280 [doi]
- Shaker: a Tool for Detecting More Flaky Tests FasterMarcello Cordeiro, Denini Silva, Leopoldo Teixeira, Breno Miranda, Marcelo d'Amorim. 1281-1285 [doi]
- DEVIATE: A Deep Learning Variance Testing FrameworkHung Viet Pham, Mijung Kim, Lin Tan 0001, Yaoliang Yu, Nachiappan Nagappan. 1286-1290 [doi]
- SoManyConflicts: Resolve Many Merge Conflicts Interactively and SystematicallyBo Shen, Wei Zhang, Ailun Yu, Yifan Shi, Haiyan Zhao, Zhi Jin. 1291-1295 [doi]
- A Mocktail of Source Code RepresentationsDheeraj Vagavolu, Karthik Chandra Swarna, Sridhar Chimalakonda. 1296-1300 [doi]
- Empowering Web Applications with WebAssembly: Are We There Yet?Weihang Wang 0001. 1301-1305 [doi]
- Property-based Test for Part-of-Speech Tagging ToolShuo Jin, Songqiang Chen, Xiaoyuan Xie. 1306-1311 [doi]
- Understanding Code Fragments with Issue ReportsZexuan Li, Hao Zhong. 1312-1316 [doi]
- An Empirical Study on Obsolete Issue ReportsZexuan Li, Hao Zhong. 1317-1321 [doi]
- Did You Do Your Homework? Raising Awareness on Software Fairness and DiscriminationMax Hort, Federica Sarro. 1322-1326 [doi]
- Shake Those System Parameters! On the Need for Parameter Coverage for Decision SystemsThomas Laurent 0003, Paolo Arcaini, Fuyuki Ishikawa, Anthony Ventresque. 1327-1331 [doi]
- What do pre-trained code models know about code?Anjan Karmakar, Romain Robbes. 1332-1336 [doi]
- Towards Systematic and Dynamic Task Allocation for Collaborative Parallel FuzzingVan-Thuan Pham, Manh-Dung Nguyen, Quang-Trung Ta, Toby Murray, Benjamin I. P. Rubinstein. 1337-1341 [doi]
- Systematic Testing of Autonomous Driving Systems Using Map Topology-Based Scenario ClassificationYun Tang, Yuan Zhou, Tianwei Zhang 0004, Fenghua Wu, Yang Liu, Gang Wang. 1342-1346 [doi]
- 2: Adapting Specification Learners in Assured Adaptive SystemsDalal Alrajeh, Patrick Benjamin, Sebastián Uchitel. 1347-1352 [doi]
- Log Anomaly to Resolution: AI Based Proactive Incident RemediationRuchi Mahindru, Harshit Kumar, Sahil Bansal. 1353-1357 [doi]
- HyperGI: Automated Detection and Repair of Information Flow LeakageIbrahim Mesecan, Daniel Blackwell, David Clark, Myra B. Cohen, Justyna Petke. 1358-1362 [doi]
- Privacy as first-class requirements in software development: A socio-technical approachYizhaq Benbenisty, Irit Hadar, Gil Luria, Paola Spoletini. 1363-1367 [doi]
- Towards Fluid Software Architectures: Bidirectional Human-AI InteractionAmmar Yasser, Mervat Abu-Elkhier. 1368-1372 [doi]
- Bugs4Q: A Benchmark of Real Bugs for Quantum ProgramsPengzhan Zhao, Jianjun Zhao, Zhongtao Miao, Shuhan Lan. 1373-1376 [doi]
- Assessing Robustness of ML-Based Program Analysis Tools using Metamorphic Program TransformationsLeonhard Applis, Annibale Panichella, Arie van Deursen. 1377-1381 [doi]
- Defeating Program Analysis Techniques via Ambiguous TranslationChijung Jung, Doowon Kim, Weihang Wang 0001, Yunhui Zheng, Kyu Hyung Lee, Yonghwi Kwon 0001. 1382-1387 [doi]
- A Program Synthesis Approach for Adding Architectural Tactics to An Existing Code BaseAli Shokri. 1388-1390 [doi]
- Program Synthesis with Algorithm Pseudocode GuidanceZihui Wang. 1391-1393 [doi]
- py2src: Towards the Automatic (and Reliable) Identification of Sources for PyPI PackageDuc Ly Vu. 1394-1396 [doi]