Abstract is missing.
- Omlet: a revolution against big-brother social networks (invited talk)Monica S. Lam. 1 [doi]
- From software engineering to software systems (invited talk)Alexander L. Wolf. 2 [doi]
- Ten years with evidence-based software engineering. What is it? Has it had any impact? What's next?Magne Jørgensen. 3 [doi]
- Experiences developing tools for developers (invited talk)John Penix. 4 [doi]
- Are you getting traction? tales from the tech transfer trenches (invited talk)Satish Chandra. 5 [doi]
- Data hard with a vengeance (invited talk)Thomas Zimmermann. 6 [doi]
- Developers' code context models for change tasksThomas Fritz, David C. Shepherd, Katja Kevic, Will Snipes, Christoph Bräunlich. 7-18 [doi]
- Software developers' perceptions of productivityAndré N. Meyer, Thomas Fritz, Gail C. Murphy, Thomas Zimmermann. 19-29 [doi]
- Enablers, inhibitors, and perceptions of testing in novice software teamsRaphael Pham, Stephan Kiesling, Olga Liskin, Leif Singer, Kurt Schneider. 30-40 [doi]
- Feedback generation for performance problems in introductory programming assignmentsSumit Gulwani, Ivan Radicek, Florian Zuleger. 41-51 [doi]
- Test case purification for improving fault localizationJifeng Xuan, Martin Monperrus. 52-63 [doi]
- Automatically generated patches as debugging aids: a human studyYida Tao, Jindae Kim, Sunghun Kim, Chang Xu. 64-74 [doi]
- A foundation for refactoring C with macrosJeffrey L. Overbey, Farnaz Behrang, Munawar Hafiz. 75-85 [doi]
- Vector abstraction and concretization for scalable detection of refactoringsNarcisa Andreea Milea, Lingxiao Jiang, Siau-Cheng Khoo. 86-97 [doi]
- FlowTwist: efficient context-sensitive inside-out taint analysis for large codebasesJohannes Lerch, Ben Hermann, Eric Bodden, Mira Mezini. 98-108 [doi]
- ORBS: language-independent program slicingDavid Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo. 109-120 [doi]
- JSAI: a static analysis platform for JavaScriptVineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf. 121-132 [doi]
- A path-sensitively sliced control flow graphJoxan Jaffar, Vijayaraghavan Murali. 133-143 [doi]
- Let's talk about it: evaluating contributions through discussion in GitHubJason Tsay, Laura Dabbish, James D. Herbsleb. 144-154 [doi]
- A large scale study of programming languages and code quality in githubBaishakhi Ray, Daryl Posnett, Vladimir Filkov, Premkumar T. Devanbu. 155-165 [doi]
- Mining preconditions of APIs in large-scale code corpusHoan Anh Nguyen, Robert Dyer 0001, Tien N. Nguyen, Hridesh Rajan. 166-177 [doi]
- Automatic mining of specifications from invocation traces and method invariantsIvo Krka, Yuriy Brun, Nenad Medvidovic. 178-189 [doi]
- Counterexample guided abstraction refinement of product-line behavioural modelsMaxime Cordy, Patrick Heymans, Axel Legay, Pierre-Yves Schobbens, Bruno Dawagne, Martin Leucker. 190-201 [doi]
- Powering the static driver verifier using corralAkash Lal, Shaz Qadeer. 202-212 [doi]
- Verifying CTL-live properties of infinite state models using an SMT solverAmirhossein Vakili, Nancy A. Day. 213-223 [doi]
- Efficient runtime-enforcement techniques for policy weavingRichard Joiner, Thomas W. Reps, Somesh Jha, Mohan Dhawan, Vinod Ganapathy. 224-234 [doi]
- Techniques for improving regression testing in continuous integration development environmentsSebastian G. Elbaum, Gregg Rothermel, John Penix. 235-245 [doi]
- Balancing trade-offs in test-suite reductionAugust Shi, Alex Gyori, Milos Gligoric, Andrey Zaytsev, Darko Marinov. 246-256 [doi]
- Identifying the characteristics of vulnerable code changes: an empirical studyAmiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, Derek Janni. 257-268 [doi]
- On the localness of softwareZhaopeng Tu, Zhendong Su, Premkumar T. Devanbu. 269-280 [doi]
- Learning natural coding conventionsMiltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton. 281-293 [doi]
- How should we measure functional sameness from program source code? an exploratory study on Java methodsYoshiki Higo, Shinji Kusumoto. 294-305 [doi]
- The plastic surgery hypothesisEarl T. Barr, Yuriy Brun, Premkumar T. Devanbu, Mark Harman, Federica Sarro. 306-317 [doi]
- Grail: context-aware fixing of concurrency bugsPeng Liu 0010, Omer Tripp, Charles Zhang. 318-329 [doi]
- AI: a lightweight system for tolerating concurrency bugsMingxing Zhang, Yongwei Wu, Shan Lu, Shanxiang Qi, Jinglei Ren, Weimin Zheng. 330-340 [doi]
- Retrofitting concurrency for Android applications through refactoringYu Lin, Cosmin Radoi, Danny Dig. 341-352 [doi]
- Sherlock: scalable deadlock detection for concurrent programsMahdi Eslamimehr, Jens Palsberg. 353-365 [doi]
- Search-based synthesis of equivalent method sequencesAlberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè, Paolo Tonella. 366-376 [doi]
- Beyond the rainbow: self-adaptive failure avoidance in configurable systemsJacob Swanson, Myra B. Cohen, Matthew B. Dwyer, Brady J. Garvin, Justin Firestone. 377-388 [doi]
- Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detectionLannan Luo, Jiang Ming, Dinghao Wu, Peng Liu 0005, Sencun Zhu. 389-400 [doi]
- Focus-shifting patterns of OSS developers and their congruence with call graphsQi Xuan, Aaron Okano, Premkumar T. Devanbu, Vladimir Filkov. 401-412 [doi]
- How we get there: a context-guided search strategy in concolic testingHyunmin Seo, Sunghun Kim. 413-424 [doi]
- Solving complex path conditions through heuristic search on induced polytopesPeter Dinges, Gul A. Agha. 425-436 [doi]
- Statistical symbolic execution with informed samplingAntonio Filieri, Corina S. Pasareanu, Willem Visser, Jaco Geldenhuys. 437-448 [doi]
- SymJS: automatic symbolic testing of JavaScript web applicationsGuodong Li, Esben Andreasen, Indradeep Ghosh. 449-459 [doi]
- Selection and presentation practices for code example summarizationAnnie T. T. Ying, Martin P. Robillard. 460-471 [doi]
- Mining idioms from source codeMiltiadis Allamanis, Charles A. Sutton. 472-483 [doi]
- Automatic generation of release notesLaura Moreno, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrian Marcus, Gerardo Canfora. 484-495 [doi]
- Discovering refactoring opportunities in cascading style sheetsDavood Mazinanian, Nikolaos Tsantalis, Ali Mesbah. 496-506 [doi]
- SAFEWAPI: web API misuse detector for web applicationsSungGyeong Bae, Hyunghun Cho, Inho Lim, Sukyoung Ryu. 507-517 [doi]
- Building call graphs for embedded client-side code in dynamic web applicationsHung Viet Nguyen, Christian Kästner, Tien N. Nguyen. 518-529 [doi]
- Sketches and diagrams in practiceSebastian Baltes, Stephan Diehl. 530-541 [doi]
- Architecture challenges for internal software ecosystems: a large-scale industry case studyKlaus-Benedikt Schultis, Christoph Elsner, Daniel Lohmann. 542-552 [doi]
- Variable-specific resolutions for feature interactionsCecylia Bocovich, Joanne M. Atlee. 553-563 [doi]
- An empirical study on program comprehension with reactive programmingGuido Salvaneschi, Sven Amann, Sebastian Proksch, Mira Mezini. 564-575 [doi]
- Apposcopy: semantics-based detection of Android malware through static analysisYu Feng, Saswat Anand, Isil Dillig, Alex Aiken. 576-587 [doi]
- Detecting energy bugs and hotspots in mobile appsAbhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay 0001, Abhik Roychoudhury. 588-598 [doi]
- EvoDroid: segmented evolutionary testing of Android appsRiyadh Mahmood, Nariman Mirzaei, Sam Malek. 599-609 [doi]
- Prioritizing the devices to test your app on: a case study of Android game appsHammad Khalid, Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan. 610-620 [doi]
- Improving oracle quality by detecting brittle assertions and unused inputs in testsChen Huo, James Clause. 621-631 [doi]
- On the efficiency of automated testingMarcel Böhme, Soumya Paul. 632-642 [doi]
- An empirical analysis of flaky testsQingzhou Luo, Farah Hariri, Lamyaa Eloussi, Darko Marinov. 643-653 [doi]
- Are mutants a valid substitute for real faults in software testing?René Just, Darioush Jalali, Laura Inozemtseva, Michael D. Ernst, Reid Holmes, Gordon Fraser. 654-665 [doi]
- No issue left behind: reducing information overload in issue trackingOlga Baysal, Reid Holmes, Michael W. Godfrey. 666-677 [doi]
- Panning requirement nuggets in stream of software maintenance ticketsSenthil Mani, Karthik Sankaranarayanan, Vibha Singhal Sinha, Premkumar T. Devanbu. 678-688 [doi]
- Learning to rank relevant files for bug reports using domain knowledgeXin Ye, Razvan Bunescu, Chang Liu. 689-699 [doi]
- Querying sequential software engineering dataChengnian Sun, Haidong Zhang, Jian-Guang Lou, Hongyu Zhang, Qiang Wang, Dongmei Zhang, Siau-Cheng Khoo. 700-710 [doi]
- Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systemsYu Jiang, Hehua Zhang, Huafeng Zhang, Xinyan Zhao, Han Liu, Chengnian Sun, Xiaoyu Song, Ming Gu, Jia-Guang Sun. 711-714 [doi]
- A tool suite for the model-driven software engineering of cyber-physical systemsStefan Dziwok, Christopher Gerking, Steffen Becker, Sebastian Thiele, Christian Heinzemann, Uwe Pohlmann. 715-718 [doi]
- XMLMate: evolutionary XML test generationNikolas Havrikov, Matthias Höschele, Juan Pablo Galeotti, Andreas Zeller. 719-722 [doi]
- CHOReOSynt: enforcing choreography realizability in the future internetMarco Autili, Davide Di Ruscio, Amleto Di Salle, Alexander Perucci. 723-726 [doi]
- RaPiD: a toolkit for reliability analysis of non-deterministic systemsLin Gui 0002, Jun Sun 0001, Yang Liu 0003, Truong Khanh Nguyen, Jin Song Dong. 727-730 [doi]
- Aalta: an LTL satisfiability checker over Infinite/Finite tracesJianwen Li, Yinbo Yao, Geguang Pu, Lijun Zhang 0001, Jifeng He. 731-734 [doi]
- Omen+: a precise dynamic deadlock detector for multithreaded Java librariesMalavika Samak, Murali Krishna Ramanathan. 735-738 [doi]
- Archie: a tool for detecting, monitoring, and preserving architecturally significant codeMehdi Mirakhorli, Ahmed Fakhry, Artem Grechko, Mateusz Wieloch, Jane Cleland-Huang. 739-742 [doi]
- Linking sketches and diagrams to source code artifactsSebastian Baltes, Peter Schmitz, Stephan Diehl. 743-746 [doi]
- BumbleBee: a refactoring environment for spreadsheet formulasFelienne Hermans, Danny Dig. 747-750 [doi]
- RefDistiller: a refactoring aware code review tool for inspecting manual refactoring editsEverton L. G. Alves, Myoungkyu Song, Miryung Kim. 751-754 [doi]
- Critics: an interactive code review tool for searching and inspecting systematic changesTianyi Zhang, Myoungkyu Song, Miryung Kim. 755-758 [doi]
- ConceptCloud: a tagcloud browser for software archivesGillian J. Greene, Bernd Fischer. 759-762 [doi]
- Titan: a toolset that connects software architecture with quality analysisLu Xiao, Yuanfang Cai, Rick Kazman. 763-766 [doi]
- BugLocalizer: integrated tool support for bug localizationFerdian Thung, Tien-Duy B. Le, Pavneet Singh Kochhar, David Lo. 767-770 [doi]
- Diagnose crashing faults on production softwareRongxin Wu. 771-774 [doi]
- Integrating approaches for feature implementationBenjamin Behringer. 775-778 [doi]
- Numerical program analysis and testingZheng Gao. 779-782 [doi]
- Traceability and model checking to support safety requirement verificationShuanglong Kan. 783-786 [doi]
- Dealing with uncertainty in verification of nondeterministic systemsYamilet R. Serrano Llerena. 787-790 [doi]
- Static analysis driven performance and energy testingAbhijeet Banerjee. 791-794 [doi]
- Autonomous compliance monitoring of non-functional propertiesMarc Brünink. 795-798 [doi]
- Detecting, isolating, and enforcing dependencies among and within test casesJonathan Bell. 799-802 [doi]
- Improving the software testing skills of novices during onboarding through social transparencyRaphael Pham. 803-806 [doi]
- Minimizing software conflicts through proactive detection of conflicts and task schedulingBakhtiar Khan Kasi. 807-810 [doi]
- Detecting and preventing the architectural roots of bugsLu Xiao. 811-813 [doi]
- Estimating the effectiveness of spectrum-based fault localizationShuo Song. 814-816 [doi]
- Managing lots of models: the FaMine approachDavid Wille. 817-819 [doi]
- Social network analysis in open source software peer reviewXin Yang. 820-822 [doi]
- Towards a theory of architectural stylesDiego Marmsoler. 823-825 [doi]
- Software programmer management: a machine learning and human computer interaction framework for optimal task assignmentHarry Raymond Joseph. 826-828 [doi]
- Methodology and culture: drivers of mediocrity in software engineering?Marian Petre, Daniela Damian. 829-832 [doi]
- Known unknowns: testing in the presence of uncertaintySebastian G. Elbaum, David S. Rosenblum. 833-836 [doi]
- Speculative reprogrammingMarc Palyart, Gail C. Murphy, Emerson R. Murphy-Hill, Xavier Blanc. 837-840 [doi]
- A variability perspective of mutation analysisXavier Devroey, Gilles Perrouin, Maxime Cordy, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens. 841-844 [doi]
- Mining micro-practices from operational dataMinghui Zhou, Audris Mockus. 845-848 [doi]
- Achieving lightweight trustworthy traceabilityJane Cleland-Huang, Mona Rahimi, Patrick Mäder. 849-852 [doi]
- Software maintenance like maintenance in other engineering disciplinesGustavo Villavicencio. 853-856 [doi]