Abstract is missing.
- Proactive self-adaptation under uncertainty: a probabilistic model checking approachGabriel A. Moreno, Javier Cámara, David Garlan, Bradley R. Schmerl. 1-12  [doi]
- Automated multi-objective control for self-adaptive software designAntonio Filieri, Henry Hoffmann, Martina Maggio. 13-24  [doi]
- Detecting event anomalies in event-based systemsGholamreza Safi, Arman Shahbazian, William G. J. Halfond, Nenad Medvidovic. 25-37  [doi]
- Suggesting accurate method and class namesMiltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton. 38-49  [doi]
- Measure it? Manage it? Ignore it? software practitioners and technical debtNeil A. Ernst, Stephany Bellomo, Ipek Ozkaya, Robert L. Nord, Ian Gorton. 50-60  [doi]
- Automatically computing path complexity of programsLucas Bang, Abdulbaki Aydin, Tevfik Bultan. 61-72  [doi]
- Systematic testing of asynchronous reactive systemsAnkush Desai, Shaz Qadeer, Sanjit A. Seshia. 73-83  [doi]
- Effective test suites for mixed discrete-continuous stateflow controllersReza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann. 84-95  [doi]
- GR(1) synthesis for LTL specification patternsShahar Maoz, Jan Oliver Ringert. 96-106  [doi]
- Modeling readability to improve unit testsErmira Daka, José Campos, Gordon Fraser, Jonathan Dorn, Westley Weimer. 107-118  [doi]
- Improving model-based test generation by model decompositionPaolo Arcaini, Angelo Gargantini, Elvinia Riccobene. 119-130  [doi]
- Synthesizing tests for detecting atomicity violationsMalavika Samak, Murali Krishna Ramanathan. 131-142  [doi]
- Optimizing energy consumption of GUIs in Android apps: a multi-objective approachMario Linares Vásquez, Gabriele Bavota, Carlos Eduardo Bernal-Cárdenas, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk. 143-154  [doi]
- Generating TCP/UDP network data for automated unit test generationAndrea Arcuri, Gordon Fraser, Juan Pablo Galeotti. 155-165  [doi]
- Staged program repair with condition synthesisFan Long, Martin Rinard. 166-178  [doi]
- When, how, and why developers (do not) test in their IDEsMoritz Beller, Georgios Gousios, Annibale Panichella, Andy Zaidman. 179-190  [doi]
- How developers search for code: a case studyCaitlin Sadowski, Kathryn T. Stolee, Sebastian G. Elbaum. 191-201  [doi]
- Tracing software developers' eyes and interactions for change tasksKatja Kevic, Braden M. Walters, Timothy R. Shaffer, Bonita Sharif, David C. Shepherd, Thomas Fritz. 202-213  [doi]
- Assertions are strongly correlated with test suite effectivenessYucheng Zhang, Ali Mesbah. 214-224  [doi]
- Test report prioritization to assist crowdsourced testingYang Feng, Zhenyu Chen, James A. Jones, Chunrong Fang, Baowen Xu. 225-236  [doi]
- Comparing and combining test-suite reduction and regression test selectionAugust Shi, Tifany Yung, Alex Gyori, Darko Marinov. 237-247  [doi]
- Questions developers ask while diagnosing potential security vulnerabilities with static analysisJustin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford. 248-259  [doi]
- Quantifying developers' adoption of security toolsJim Witschey, Olga Zielinska, Allaire K. Welk, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Thomas Zimmermann. 260-271  [doi]
- Auto-patching DOM-based XSS at scaleInian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena. 272-283  [doi]
- Performance-influence models for highly configurable systemsNorbert Siegmund, Alexander Grebhahn, Sven Apel, Christian Kästner. 284-294  [doi]
- Users beware: preference inconsistencies aheadFarnaz Behrang, Myra B. Cohen, Alessandro Orso. 295-306  [doi]
- Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system softwareTianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker. 307-319  [doi]
- Crowd debuggingFuxiang Chen, Sunghun Kim. 320-332  [doi]
- On the use of delta debugging to reduce recordings and facilitate debugging of web applicationsMouna Hammoudi, Brian Burg, Gigon Bae, Gregg Rothermel. 333-344  [doi]
- MemInsight: platform-independent memory debugging for JavaScriptSimon Holm Jensen, Manu Sridharan, Koushik Sen, Satish Chandra. 345-356  [doi]
- JITProf: pinpointing JIT-unfriendly JavaScript codeLiang Gong, Michael Pradel, Koushik Sen. 357-368  [doi]
- Cross-language program slicing for dynamic web applicationsHung Viet Nguyen, Christian Kästner, Tien N. Nguyen. 369-380  [doi]
- Detecting JavaScript races that matterErdal Mutlu, Serdar Tasiran, Benjamin Livshits. 381-392  [doi]
- The making of cloud applications: an empirical study on software development for the cloudJürgen Cito, Philipp Leitner, Thomas Fritz, Harald C. Gall. 393-403  [doi]
- An empirical study of goto in C code from GitHub repositoriesMeiyappan Nagappan, Romain Robbes, Yasutaka Kamei, Éric Tanter, Shane McIntosh, Audris Mockus, Ahmed E. Hassan. 404-414  [doi]
- How practitioners perceive the relevance of software engineering researchDavid Lo, Nachiappan Nagappan, Thomas Zimmermann. 415-425  [doi]
- What change history tells us about thread synchronizationRui Gu, Guoliang Jin, Linhai Song, Linjie Zhu, Shan Lu. 426-438  [doi]
- Finding schedule-sensitive branchesJeff Huang, Lawrence Rauchwerger. 439-449  [doi]
- Effective and precise dynamic detection of hidden races for Java programsYan Cai, Lingwei Cao. 450-461  [doi]
- A user-guided approach to program analysisRavi Mangal, Xin Zhang, Aditya V. Nori, Mayur Naik. 462-473  [doi]
- Hidden truths in dead software pathsMichael Eichberg, Ben Hermann, Mira Mezini, Leonid Glanz. 474-484  [doi]
- P3: partitioned path profilingMohammed Afraz, Diptikalyan Saha, Aditya Kanade. 485-495  [doi]
- Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learningXiao-Yuan Jing, Fei Wu, Xiwei Dong, Fumin Qi, Baowen Xu. 496-507  [doi]
- Heterogeneous defect predictionJaechang Nam, Sunghun Kim. 508-519  [doi]
- Clone-based and interactive recommendation for modifying pasted codeYun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao. 520-531  [doi]
- Is the cure worse than the disease? overfitting in automated program repairEdward K. Smith, Earl T. Barr, Claire Le Goues, Yuriy Brun. 532-543  [doi]
- Responsive designs in a snapNishant Sinha, Rezwana Karim. 544-554  [doi]
- CLOTHO: saving programs from malformed strings and incorrect string-handlingAritra Dhar, Rahul Purandare, Mohan Dhawan, Suresh Rangaswamy. 555-566  [doi]
- Query-based configuration of text retrieval solutions for software engineering tasksLaura Moreno, Gabriele Bavota, Sonia Haiduc, Massimiliano Di Penta, Rocco Oliveto, Barbara Russo, Andrian Marcus. 567-578  [doi]
- Information retrieval and spectrum based bug localization: better togetherTien-Duy B. Le, Richard Jayadi Oentaryo, David Lo. 579-590  [doi]
- Rule-based extraction of goal-use case models from textTuong Huan Nguyen, John C. Grundy, Mohamed Almorsy. 591-601  [doi]
- Symbolic execution of programs with heap inputsPietro Braione, Giovanni Denaro, Mauro Pezzè. 602-613  [doi]
- Automatically deriving pointer reference expressions from binary code for memory dump analysisYangchun Fu, Zhiqiang Lin, David Brumley. 614-624  [doi]
- Summarizing and measuring development activityChristoph Treude, Fernando Marques Figueira Filho, Uirá Kulesza. 625-636  [doi]
- A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundanciesQimu Zheng, Audris Mockus, Minghui Zhou. 637-648  [doi]
- Gamification for enforcing coding conventionsChristian R. Prause, Matthias Jarke. 649-660  [doi]
- String analysis for Java and Android applicationsDing Li, Yingjun Lyu, Mian Wan, William G. J. Halfond. 661-672  [doi]
- Auto-completing bug reports for Android applicationsKevin Moran, Mario Linares Vásquez, Carlos Bernal-Cárdenas, Denys Poshyvanyk. 673-686  [doi]
- CLAPP: characterizing loops in Android applicationsYanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. 687-697  [doi]
- TLV: abstraction through testing, learning, and validationJun Sun 0001, Hao Xiao, Yang Liu, Shang-Wei Lin, Shengchao Qin. 698-709  [doi]
- Mimic: computing models for opaque codeStefan Heule, Manu Sridharan, Satish Chandra. 710-720  [doi]
- Witness validation and stepwise testification across software verifiersDirk Beyer 0001, Matthias Dangl, Daniel Dietsch, Matthias Heizmann, Andreas Stahlbauer. 721-733  [doi]
- Efficient and reasonable object-oriented concurrencyScott West, Sebastian Nanz, Bertrand Meyer. 734-744  [doi]
- FlexJava: language support for safe and modular approximate programmingJongse Park, Hadi Esmaeilzadeh, Xin Zhang, Mayur Naik, William Harris. 745-757  [doi]
- Getting to know you: towards a capability model for JavaBen Hermann, Michael Reif, Michael Eichberg, Mira Mezini. 758-769  [doi]
- Efficient dependency detection for safe Java test accelerationJonathan Bell, Gail E. Kaiser, Eric Melski, Mohan Dattatreya. 770-781  [doi]
- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicingUlf Kargen, Nahid Shahmehri. 782-792  [doi]
- Guided differential testing of certificate validation in SSL/TLS implementationsYuting Chen, Zhendong Su. 793-804  [doi]
- Quality and productivity outcomes relating to continuous integration in GitHubBogdan Vasilescu, Yue Yu, Huaimin Wang, Premkumar T. Devanbu, Vladimir Filkov. 805-816  [doi]
- Developer onboarding in GitHub: the role of prior social links and language experienceCasey Casalnuovo, Bogdan Vasilescu, Premkumar T. Devanbu, Vladimir Filkov. 817-828  [doi]
- Impact of developer turnover on quality in open-source softwareMatthieu Foucault, Marc Palyart, Xavier Blanc, Gail C. Murphy, Jean-Rémy Falleri. 829-841  [doi]
- MultiSE: multi-path symbolic execution using value summariesKoushik Sen, George C. Necula, Liang Gong, Wontae Choi. 842-853  [doi]
- Assertion guided symbolic execution of multithreaded programsShengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, Aarti Gupta. 854-865  [doi]
- Iterative distribution-aware sampling for probabilistic symbolic executionMateus Borges, Antonio Filieri, Marcelo d'Amorim, Corina S. Pasareanu. 866-877  [doi]
- Bespoke tools: adapted to the concepts developers knowBrittany Johnson, Rahul Pandita, Emerson R. Murphy-Hill, Sarah Heckman. 878-881  [doi]
- I heart hacker news: expanding qualitative research findings by analyzing social news websitesTitus Barik, Brittany Johnson, Emerson R. Murphy-Hill. 882-885  [doi]
- GitSonifier: using sound to portray developer conflict historyKevin J. North, Shane Bolan, Anita Sarma, Myra B. Cohen. 886-889  [doi]
- Automatically recommending test code examples to inexperienced developersRaphael Pham, Yauheni Stoliar, Kurt Schneider. 890-893  [doi]
- Using software theater for the demonstration of innovative ubiquitous applicationsHan Xu, Stephan Krusche, Bernd Bruegge. 894-897  [doi]
- Behavioral log analysis with statistical guaranteesNimrod Busany, Shahar Maoz. 898-901  [doi]
- Inner oracles: input-specific assertions on internal statesYingfei Xiong, Dan Hao, Lu Zhang 0023, Tao Zhu, Muyao Zhu, Tian Lan. 902-905  [doi]
- Targeted program transformations for symbolic executionCristian Cadar. 906-909  [doi]
- Crash reproduction via test case mutation: let existing test cases helpJifeng Xuan, Xiaoyuan Xie, Martin Monperrus. 910-913  [doi]
- RDIT: race detection from incomplete tracesArun K. Rajagopalan, Jeff Huang. 914-917  [doi]
- TACO: test suite augmentation for concurrent programsTingting Yu. 918-921  [doi]
- Navigating through the archipelago of refactoringsApostolos V. Zarras, Theofanis Vartziotis, Panos Vassiliadis. 922-925  [doi]
- Detecting semantic merge conflicts with variability-aware executionHung Viet Nguyen, My Huu Nguyen, Son Cuu Dang, Christian Kästner, Tien N. Nguyen. 926-929  [doi]
- Product lines can jeopardize their trade secretsMathieu Acher, Guillaume Bécan, Benoît Combemale, Benoit Baudry, Jean-Marc Jézéquel. 930-933  [doi]
- JSketch: sketching for JavaJinseong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama. 934-937  [doi]
- Don't panic: reverse debugging of kernel driversPavel Dovgalyuk, Denis Dmitriev, Vladimir Makarov. 938-941  [doi]
- UMTG: a toolset to automatically generate system test cases from use case specificationsChunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal. 942-945  [doi]
- DexterJS: robust testing platform for DOM-based XSS vulnerabilitiesInian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena. 946-949  [doi]
- T3i: a tool for generating and querying test suites for JavaI. S. Wishnu B. Prasetya. 950-953  [doi]
- iTrace: enabling eye tracking on software artifacts within the IDE to support software engineering tasksTimothy R. Shaffer, Jenna L. Wise, Braden M. Walters, Sebastian C. Müller, Michael Falcone, Bonita Sharif. 954-957  [doi]
- Nyx: a display energy optimizer for mobile web appsDing Li, Angelica Huyen Tran, William G. J. Halfond. 958-961  [doi]
- NARCIA: an automated tool for change impact analysis in natural language requirementsChetan Arora 0002, Mehrdad Sabetzadeh, Arda Goknil, Lionel C. Briand, Frank Zimmer. 962-965  [doi]
- Commit guru: analytics and risk prediction of software commitsChristoffer Rosen, Ben Grawi, Emad Shihab. 966-969  [doi]
- OSSMETER: a software measurement platform for automatically analysing open source software projectsDavide Di Ruscio, Dimitris S. Kolovos, Ioannis Korkontzelos, Nicholas Drivalos Matragkas, Jurgen J.  Vinju. 970-973  [doi]
- Comprehensive service matching with MatchBoxPaul Börding, Melanie Bruns, Marie Christin Platenius. 974-977  [doi]
- UEDashboard: awareness of unusual events in commit historiesLarissa Leite, Christoph Treude, Fernando Marques Figueira Filho. 978-981  [doi]
- MatrixMiner: a red pill to architect informal product descriptions in the matrixSana Ben Nasr, Guillaume Bécan, Mathieu Acher, João Bosco Ferreira Filho, Benoit Baudry, Nicolas Sannier, Jean-Marc Davril. 982-985  [doi]
- Predicting field reliabilityPete Rotella, Sunita Chulani, Devesh Goyal. 986-989  [doi]
- REMI: defect prediction for efficient API testingMijung Kim, Jaechang Nam, Jaehyuk Yeon, Soonhwang Choi, Sunghun Kim. 990-993  [doi]
- OnSpot system: test impact visibility during code edits in real softwareMuhammad Umar Janjua. 994-997  [doi]
- Products, developers, and milestones: how should I build my N-Gram language modelJuliana Saraiva, Christian Bird, Thomas Zimmermann. 998-1001  [doi]
- Evaluating a formal scenario-based method for the requirements analysis in automotive software engineeringJoel Greenyer, Max Haase, Jörg Marhenke, Rene Bellmer. 1002-1005  [doi]
- Barriers and enablers for shortening software development lead-time in mechatronics organizations: a case studyMahshad M. Mahally, Miroslaw Staron, Jan Bosch. 1006-1009  [doi]
- Semantic degrees for Industrie 4.0 engineering: deciding on the degree of semantic formalization to select appropriate technologiesChih-Hong Cheng, Tuncay Guelfirat, Christian Messinger, Johannes O. Schmitt, Matthias Schnelte, Peter Weber. 1010-1013  [doi]
- Towards automating the security compliance value chainSmita Ghaisas, Manish Motwani, Balaji Balasubramaniam, Anjali Gajendragadkar, Rahul Kelkar, Harrick M. Vin. 1014-1017  [doi]
- Requirements, architecture, and quality in a mission critical system: 12 lessons learnedAapo Koski, Tommi Mikkonen. 1018-1021  [doi]
- Decentralized self-adaptation in large-scale distributed systemsLuca Florio. 1022-1025  [doi]
- Vehicle level continuous integration in the automotive industrySebastian Vöst. 1026-1029  [doi]
- Quantifying architectural debtsLu Xiao. 1030-1033  [doi]
- User-centric security: optimization of the security-usability trade-offDenis Feth. 1034-1037  [doi]
- Automated unit test generation for evolving softwareSina Shamshiri. 1038-1041  [doi]
- Increasing the efficiency of search-based unit test generation using parameter controlThomas White. 1042-1044  [doi]
- Enhancing Android application bug reportingKevin Moran. 1045-1047  [doi]
- Improving energy consumption in Android appsCarlos Bernal-Cárdenas. 1048-1050  [doi]
- Automated generation of programming language quizzesShuktika Jain. 1051-1053  [doi]
- Spotting familiar code snippet structures for program comprehensionVenkatesh Vinayakarao. 1054-1056  [doi]
- Combining eye tracking with navigation paths for identification of cross-language code dependenciesMartin Konopka. 1057-1059  [doi]
- A textual domain specific language for requirement modellingOyindamola Olajubu. 1060-1062  [doi]
- Automated attack surface approximationChristopher Theisen. 1063-1065  [doi]
- Pockets: a tool to support exploratory programming for novices and educatorsErina Makihara. 1066-1068  [doi]