Abstract is missing.
- Pruning Boolean Expressions to Shorten Dynamic SlicesThomas Hirsch, Birgit Hofer. 1-11 [doi]
- Benchmark Fuzzing for Android Taint AnalysesStefan Schott, Felix Pauck. 12-23 [doi]
- Plug and Analyze: Usable Dynamic Taint Tracker for Android AppsHiroki Inayoshi, Shohei Kakei, Shoichi Saito. 24-34 [doi]
- A preliminary evaluation on the relationship among architectural and test smellsManuel De Stefano, Fabiano Pecorelli, Dario Di Nucci, Andrea De Lucia. 66-70 [doi]
- An Empirical Study of Code Smells in Transformer-based Code Generation TechniquesMohammed Latif Siddiq, Shafayat H. Majumder, Maisha R. Mim, Sourov Jajodia, Joanna C. S. Santos. 71-82 [doi]
- Removing dependencies from large software projects: are you really sure?Ching-Chi Chuang, Luís Cruz 0002, Robbert van Dalen, Vladimir Mikovski, Arie van Deursen. 105-115 [doi]
- Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERTAnushka Bhave, Roopak Sinha. 116-120 [doi]
- Mining for Framework Instantiation Pattern InterplaysYunior Pacheco, Ahmed Zerouali, Coen De Roover. 121-131 [doi]
- Multi-Modal Code Summarization with Retrieved SummaryLile Lin, Zhiqiu Huang, Yaoshen Yu, Yapeng Liu. 132-142 [doi]
- CodeCV: Mining Expertise of GitHub Users from Coding ActivitiesDaniel Atzberger, Nico Scordialo, Tim Cech, Willy Scheibel, Matthias Trapp 0001, Jürgen Döllner. 143-147 [doi]
- Towards the Detection of Hidden Familial Type Correlations in Java CodeAlin-Petru Rosu, Petru Florin Mihancea. 148-152 [doi]
- The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on AndroidBoladji Vinny Adjibi, Fatou Ndiaye Mbodji, Tegawendé F. Bissyandé, Kevin Allix, Jacques Klein. 153-163 [doi]
- Deriving Modernity Signatures for PHP Systems with Static AnalysisWouter Van den Brink, Marcus Gerhold, Vadim Zaytsev. 181-185 [doi]
- Summary-Based Compositional Analysis for Soft Contract VerificationBram Vandenbogaerde, Quentin Stiévenart, Coen De Roover. 186-196 [doi]
- An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsNiloofar Mansoor, Tukaram Muske, Alexander Serebrenik, Bonita Sharif. 219-229 [doi]
- To what extent can we analyze Kotlin programs using existing Java taint analysis tools?Ranjith Krishnamurthy, Goran Piskachev, Eric Bodden. 230-235 [doi]
- JFeature: Know Your CorpusIdriss Riouak, Görel Hedin, Christoph Reichenbach, Niklas Fors. 236-241 [doi]
- An End-to-End Framework for Repairing Potentially Vulnerable Source CodeJudit Jász, Péter Hegedüs, Ákos Milánkovich, Rudolf Ferenc. 242-247 [doi]
- First Steps towards a Methodology for Unified Graph's Discrepancy AnalysisGergõ Balogh, István Baráth. 248-252 [doi]
- Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network DependenciesJens Dietrich 0001, Shawn Rasheed, Amjed Tahir. 264-275 [doi]
- Experimental Evaluation of A New Ranking Formula for Spectrum based Fault LocalizationQusay Idrees Sarhan, Árpád Beszédes. 276-280 [doi]