Abstract is missing.
- Applying the Universal Version History Concept to Help De-Risk Copy-Based Code ReuseDavid Reid, Audris Mockus. 1-12 [doi]
- Automating Test-Specific Refactoring Mining: A Mixed-Method InvestigationLuana Almeida Martins, Heitor A. X. Costa, Márcio Ribeiro 0001, Fabio Palomba, Ivan Machado. 13-24 [doi]
- Behind Developer Contributions on Conflicting Merge ScenariosGustavo Vale, Eduardo Fernandes, Eduardo Figueiredo 0001, Sven Apel. 25-36 [doi]
- Calibrating Deep Learning-based Code Smell Detection using Human FeedbackHimesh Nandani, Mootez Saad, Tushar Sharma 0001. 37-48 [doi]
- Change Pattern Detection for Optimising Incremental Static AnalysisCindy Wauters, Jens Van der Plas, Quentin Stiévenart, Coen De Roover. 49-60 [doi]
- CIGAR: Contrastive Learning for GitHub Action RecommendationJiangnan Huang 0001, Bin Lin. 61-71 [doi]
- Do Code Quality and Style Issues Differ Across (Non-)Machine Learning Notebooks? Yes!Md. Saeed Siddik, Cor-Paul Bezemer. 72-83 [doi]
- Evolutionary Feature Dependencies: Analyzing Feature Co-Changes in C SystemsSandro Schulze, Phillipp Engelke, Jacob Krüger. 84-95 [doi]
- Explaining Transformer-based Code Models: What Do They Learn? When They Do Not Work?Ahmad Haji Mohammadkhani, Chakkrit Tantithamthavorn, Hadi Hemmati. 96-106 [doi]
- Generating Understandable Unit Tests through End-to-End Test Scenario CarvingAmirhossein Deljouyi, Andy Zaidman. 107-118 [doi]
- How They Relate and Leave: Understanding Atoms of Confusion in Open-Source Java ProjectsOton Pinheiro, Lincoln S. Rocha, Windson Viana. 119-130 [doi]
- How Well Can Masked Language Models Spot Identifiers That Violate Naming Guidelines?Johannes Villmow, Viola Campos, Jean Petry, Amine Abbad Andaloussi, Adrian Ulges, Barbara Weber. 131-142 [doi]
- Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability DetectionHongyu Kuang, Feng Yang, Long Zhang 0004, Gaigai Tang, Lin Yang. 143-150 [doi]
- PASD: A Performance Analysis Approach Through the Statistical Debugging of Kernel EventsMohammed Adib Khan, Morteza Noferesti, Naser Ezzati Jivan. 151-161 [doi]
- PTLVD:Program Slicing and Transformer-based Line-level Vulnerability Detection SystemTao Peng 0006, Shixu Chen, Fei Zhu, Junwei Tang, Junping Liu, Xinrong Hu. 162-173 [doi]
- Quality Assurance Awareness in Open Source Software Projects on GitHubAli Khatami, Andy Zaidman. 174-185 [doi]
- Symbolic Execution to Detect Semantic Merge ConflictsWard Muylaert, Johannes Härtel, Coen De Roover. 186-197 [doi]
- The Docker Hub Image Inheritance Network: Construction and Empirical InsightsRuben Opdebeeck, Jonas Lesy, Ahmed Zerouali, Coen De Roover. 198-208 [doi]
- Unboxing Default Argument Breaking Changes in Scikit LearnJoão Eduardo Montandon, Luciana Lourdes Silva, Cristiano Politowski, Ghizlane El-Boussaidi, Marco Túlio Valente. 209-219 [doi]
- Using the TypeScript compiler to fix erroneous Node.js snippetsBrittany Reid, Christoph Treude, Markus Wagner 0007. 220-230 [doi]
- When to Let the Developer Guide: Trade-offs Between Open and Guided Test AmplificationCarolin E. Brandt, Danyao Wang, Andy Zaidman. 231-241 [doi]
- Enabling Go Program Analysis in RascalLuke Swearngan, Mark Hills 0001. 242-247 [doi]
- On Developing and Improving Tools for Architecture-Smell Tracking in Java SystemsPhilipp Gnoyke, Sandro Schulze, Jacob Krüger. 248-253 [doi]
- ACER: An AST-based Call Graph Generator FrameworkAndrew Chen, Yanfu Yan, Denys Poshyvanyk. 254-259 [doi]
- Reproducing and Improving the BugsInPy DatasetFaustino Aguilar, Samuel Grayson, Darko Marinov. 260-264 [doi]
- Can We Trust the Default Vulnerabilities Severity?Matteo Esposito, Sergio Moreschini, Valentina Lenarduzzi, David Hästbacka, Davide Falessi. 265-270 [doi]
- On the Impact of Language Selection for Training and Evaluating Programming Language ModelsJonathan Katzy, Maliheh Izadi, Arie van Deursen. 271-276 [doi]
- Uncovering the Hidden Risks: The Importance of Predicting Bugginess in Untouched MethodsMatteo Esposito, Davide Falessi. 277-282 [doi]