Abstract is missing.
- Testing mined specificationsMark Gabel, Zhendong Su. 4 [doi]
- Detecting and analyzing insecure component usageTaeho Kwon, Zhendong Su. 5 [doi]
- Retargeting Android applications to Java bytecodeDamien Octeau, Somesh Jha, Patrick McDaniel. 6 [doi]
- SelfMotion: a declarative language for adaptive service-oriented mobile appsGianpaolo Cugola, Carlo Ghezzi, Leandro Sales Pinto, Giordano Tamburrelli. 7 [doi]
- REPERTOIRE: a cross-system porting analysis tool for forked software projectsBaishakhi Ray, Christopher Wiley, Miryung Kim. 8 [doi]
- Automating adaptive maintenance changes with SrcML and LINQVinay Augustine. 9 [doi]
- Searching connected API subgraph via text phrasesWing-Kwan Chan, Hong Cheng, David Lo. 10 [doi]
- AUSUM: approach for unsupervised bug report summarizationSenthil Mani, Rose Catherine, Vibha Singhal Sinha, Avinava Dubey. 11 [doi]
- Automated extraction of security policies from natural-language software documentsXusheng Xiao, Amit M. Paradkar, Suresh Thummalapenta, Tao Xie. 12 [doi]
- Practical change impact analysis based on static program slicing for industrial software systemsMithun Acharya, Brian Robinson. 13 [doi]
- MayPar: a may-happen-in-parallel analyzer for concurrent objectsElvira Albert, Antonio Flores-Montoya, Samir Genaim. 14 [doi]
- Sando: an extensible local code search frameworkDavid Shepherd, Kostadin Damevski, Bartosz Ropski, Thomas Fritz. 15 [doi]
- Automating presentation changes in dynamic web applications via collaborative hybrid analysisXiaoyin Wang, Lu Zhang 0023, Tao Xie, Yingfei Xiong, Hong Mei. 16 [doi]
- T-Morph: revealing buggy behaviors of TinyOS applications via rule mining and visualization17 [doi]
- Mining the execution history of a software system to infer the best time for its adaptationKyle R. Canavera, Naeem Esfahani, Sam Malek. 18 [doi]
- SecuriTAS: a tool for engineering adaptive securityLiliana Pasquale, Claudio Menghi, Mazeiar Salehie, Luca Cavallaro, Inah Omoronyia, Bashar Nuseibeh. 19 [doi]
- Dione: an integrated measurement and defect prediction solutionBora Caglayan, Ayse Tosun Misirli, Gul Calikli, Ayse Bener, Turgay Aytac, Burak Turhan. 20 [doi]
- Dealing with uncertainty in early software architectureNaeem Esfahani, Kaveh Razavi, Sam Malek. 21 [doi]
- Software change contractsDawei Qi, Jooyong Yi, Abhik Roychoudhury. 22 [doi]
- Semantic fault diagnosis: automatic natural-language fault descriptionsNicholas DiGiuseppe, James A. Jones. 23 [doi]
- Toward measuring program comprehension with functional magnetic resonance imagingJanet Siegmund, André Brechmann, Sven Apel, Christian Kästner, Jörg Liebig, Thomas Leich, Gunter Saake. 24 [doi]
- Toward semantic search via SMT solverKathryn T. Stolee, Sebastian G. Elbaum. 25 [doi]
- Inference and checking of context-sensitive pluggable typesAna Milanova, Wei Huang. 26 [doi]
- Scalable malware clustering through coarse-grained behavior modelingMahinthan Chandramohan, Hee Beng Kuan Tan, Lwin Khin Shar. 27 [doi]
- Has this bug been reported?Kaiping Liu, Hee Beng Kuan Tan, Mahinthan Chandramohan. 28 [doi]
- Concept-based failure clusteringNicholas DiGiuseppe, James A. Jones. 29 [doi]
- Seeing the forest and the trees: focusing team interaction on value and effort driversMatthias Book, Simon Grapenthin, Volker Gruhn. 30 [doi]
- From pixels to bytes: evolutionary scenario based design with videoHan Xu, Oliver Creighton, Naoufel Boulila, Bernd Bruegge. 31 [doi]
- Service selection for happy users: making user-intuitive quality abstractionsDionysis Athanasopoulos, Apostolos Zarras, Panos Vassiliadis. 32 [doi]
- Understanding myths and realities of test-suite evolutionLeandro Sales Pinto, Saurabh Sinha, Alessandro Orso. 33 [doi]
- Test input generation using dynamic programmingRazieh Nokhbeh Zaeem, Sarfraz Khurshid. 34 [doi]
- CarFast: achieving higher statement coverage fasterSangmin Park, B. M. Mainul Hossain, Ishtiaque Hussain, Christoph Csallner, Mark Grechanik, Kunal Taneja, Chen Fu, Qing Xie. 35 [doi]
- Scalable test data generation from multidimensional modelsEmina Torlak. 36 [doi]
- UMLtoCSP (UOST): a tool for efficient verification of UML/OCL class diagrams through model slicingAsadullah Shaikh, Uffe Kock Wiil. 37 [doi]
- ReImInfer: method purity inference for JavaWei Huang, Ana Milanova. 38 [doi]
- TouchDevelop: app development on mobile devicesNikolai Tillmann, Michal Moskal, Jonathan de Halleux, Manuel Fähndrich, Sebastian Burckhardt. 39 [doi]
- FaultTracer: a change impact and regression fault analysis tool for evolving Java programsLingming Zhang, Miryung Kim, Sarfraz Khurshid. 40 [doi]
- Efficiently scripting change-resilient testsSuresh Thummalapenta, Nimit Singhania, Pranavadatta Devaki, Saurabh Sinha, Satish Chandra, Achin K. Das, Srinivas Mangipudi. 41 [doi]
- Improving software developers' fluency by recommending development environment commandsEmerson R. Murphy-Hill, Rahul Jiresal, Gail C. Murphy. 42 [doi]
- History slicing: assisting code-evolution tasksFrancisco Servant, James A. Jones. 43 [doi]
- Who is going to mentor newcomers in open source projects?Gerardo Canfora, Massimiliano Di Penta, Rocco Oliveto, Sebastiano Panichella. 44 [doi]
- Assessing the value of branches with what-if analysisChristian Bird, Thomas Zimmermann. 45 [doi]
- DTAM: dynamic taint analysis of multi-threaded programs for relevancyMalay K. Ganai, Dongyoon Lee, Aarti Gupta. 46 [doi]
- Predicting null-pointer dereferences in concurrent programsAzadeh Farzan, P. Madhusudan, Niloofar Razavi, Francesco Sorrentino 0002. 47 [doi]
- Asynchronous programs with prioritized task-buffersMichael Emmi, Akash Lal, Shaz Qadeer. 48 [doi]
- Do crosscutting concerns cause modularity problems?Robert J. Walker, Shreya Rawal, Jonathan Sillito. 49 [doi]
- A field study of refactoring challenges and benefitsMiryung Kim, Thomas Zimmermann, Nachiappan Nagappan. 50 [doi]
- How do software engineers understand code changes?: an exploratory study in industryYida Tao, Yingnong Dang, Tao Xie, Dongmei Zhang, Sunghun Kim. 51 [doi]
- Variability points and design pattern usage in architectural tacticsMehdi Mirakhorli, Patrick Mäder, Jane Cleland-Huang. 52 [doi]
- A case study of cross-system porting in forked projectsBaishakhi Ray, Miryung Kim. 53 [doi]
- How do developers use parallel libraries?Semih Okur, Danny Dig. 54 [doi]
- Seeking the ground truth: a retroactive study on the evolution and migration of software librariesBradley Cossette, Robert J. Walker. 55 [doi]
- How do developers react to API deprecation?: the case of a smalltalk ecosystemRomain Robbes, Mircea Lungu, David Röthlisberger. 56 [doi]
- Conditional model checking: a technique to pass information between verifiersDirk Beyer, Thomas A. Henzinger, M. Erkan Keremoglu, Philipp Wendler. 57 [doi]
- Green: reducing, reusing and recycling constraints in program analysisWillem Visser, Jaco Geldenhuys, Matthew B. Dwyer. 58 [doi]
- Automated concolic testing of smartphone appsSaswat Anand, Mayur Naik, Mary Jean Harrold, Hongseok Yang. 59 [doi]
- Rubicon: bounded verification of web applicationsJoseph P. Near, Daniel Jackson. 60 [doi]
- Recalling the "imprecision" of cross-project defect predictionFoyzur Rahman, Daryl Posnett, Premkumar T. Devanbu. 61 [doi]
- An industrial study on the risk of software changesEmad Shihab, Ahmed E. Hassan, Bram Adams, Zhen Ming Jiang. 62 [doi]
- Multi-layered approach for recovering links between bug reports and fixesAnh Tuan Nguyen, Tung Thanh Nguyen, Hoan Anh Nguyen, Tien N. Nguyen. 63 [doi]