Abstract is missing.
- Proactive self-adaptation under uncertainty: a probabilistic model checking approachGabriel A. Moreno, Javier Cámara, David Garlan, Bradley R. Schmerl. 1-12 [doi]
- Automated multi-objective control for self-adaptive software designAntonio Filieri, Henry Hoffmann, Martina Maggio. 13-24 [doi]
- Detecting event anomalies in event-based systemsGholamreza Safi, Arman Shahbazian, William G. J. Halfond, Nenad Medvidovic. 25-37 [doi]
- Suggesting accurate method and class namesMiltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton. 38-49 [doi]
- Measure it? Manage it? Ignore it? software practitioners and technical debtNeil A. Ernst, Stephany Bellomo, Ipek Ozkaya, Robert L. Nord, Ian Gorton. 50-60 [doi]
- Automatically computing path complexity of programsLucas Bang, Abdulbaki Aydin, Tevfik Bultan. 61-72 [doi]
- Systematic testing of asynchronous reactive systemsAnkush Desai, Shaz Qadeer, Sanjit A. Seshia. 73-83 [doi]
- Effective test suites for mixed discrete-continuous stateflow controllersReza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann. 84-95 [doi]
- GR(1) synthesis for LTL specification patternsShahar Maoz, Jan Oliver Ringert. 96-106 [doi]
- Modeling readability to improve unit testsErmira Daka, José Campos, Gordon Fraser, Jonathan Dorn, Westley Weimer. 107-118 [doi]
- Improving model-based test generation by model decompositionPaolo Arcaini, Angelo Gargantini, Elvinia Riccobene. 119-130 [doi]
- Synthesizing tests for detecting atomicity violationsMalavika Samak, Murali Krishna Ramanathan. 131-142 [doi]
- Optimizing energy consumption of GUIs in Android apps: a multi-objective approachMario Linares Vásquez, Gabriele Bavota, Carlos Eduardo Bernal-Cárdenas, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk. 143-154 [doi]
- Generating TCP/UDP network data for automated unit test generationAndrea Arcuri, Gordon Fraser, Juan Pablo Galeotti. 155-165 [doi]
- Staged program repair with condition synthesisFan Long, Martin Rinard. 166-178 [doi]
- When, how, and why developers (do not) test in their IDEsMoritz Beller, Georgios Gousios, Annibale Panichella, Andy Zaidman. 179-190 [doi]
- How developers search for code: a case studyCaitlin Sadowski, Kathryn T. Stolee, Sebastian G. Elbaum. 191-201 [doi]
- Tracing software developers' eyes and interactions for change tasksKatja Kevic, Braden M. Walters, Timothy R. Shaffer, Bonita Sharif, David C. Shepherd, Thomas Fritz. 202-213 [doi]
- Assertions are strongly correlated with test suite effectivenessYucheng Zhang, Ali Mesbah. 214-224 [doi]
- Test report prioritization to assist crowdsourced testingYang Feng, Zhenyu Chen, James A. Jones, Chunrong Fang, Baowen Xu. 225-236 [doi]
- Comparing and combining test-suite reduction and regression test selectionAugust Shi, Tifany Yung, Alex Gyori, Darko Marinov. 237-247 [doi]
- Questions developers ask while diagnosing potential security vulnerabilities with static analysisJustin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford. 248-259 [doi]
- Quantifying developers' adoption of security toolsJim Witschey, Olga Zielinska, Allaire K. Welk, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Thomas Zimmermann. 260-271 [doi]
- Auto-patching DOM-based XSS at scaleInian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena. 272-283 [doi]
- Performance-influence models for highly configurable systemsNorbert Siegmund, Alexander Grebhahn, Sven Apel, Christian Kästner. 284-294 [doi]
- Users beware: preference inconsistencies aheadFarnaz Behrang, Myra B. Cohen, Alessandro Orso. 295-306 [doi]
- Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system softwareTianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker. 307-319 [doi]
- Crowd debuggingFuxiang Chen, Sunghun Kim. 320-332 [doi]
- On the use of delta debugging to reduce recordings and facilitate debugging of web applicationsMouna Hammoudi, Brian Burg, Gigon Bae, Gregg Rothermel. 333-344 [doi]
- MemInsight: platform-independent memory debugging for JavaScriptSimon Holm Jensen, Manu Sridharan, Koushik Sen, Satish Chandra. 345-356 [doi]
- JITProf: pinpointing JIT-unfriendly JavaScript codeLiang Gong, Michael Pradel, Koushik Sen. 357-368 [doi]
- Cross-language program slicing for dynamic web applicationsHung Viet Nguyen, Christian Kästner, Tien N. Nguyen. 369-380 [doi]
- Detecting JavaScript races that matterErdal Mutlu, Serdar Tasiran, Benjamin Livshits. 381-392 [doi]
- The making of cloud applications: an empirical study on software development for the cloudJürgen Cito, Philipp Leitner, Thomas Fritz, Harald C. Gall. 393-403 [doi]
- An empirical study of goto in C code from GitHub repositoriesMeiyappan Nagappan, Romain Robbes, Yasutaka Kamei, Éric Tanter, Shane McIntosh, Audris Mockus, Ahmed E. Hassan. 404-414 [doi]
- How practitioners perceive the relevance of software engineering researchDavid Lo, Nachiappan Nagappan, Thomas Zimmermann. 415-425 [doi]
- What change history tells us about thread synchronizationRui Gu, Guoliang Jin, Linhai Song, Linjie Zhu, Shan Lu. 426-438 [doi]
- Finding schedule-sensitive branchesJeff Huang, Lawrence Rauchwerger. 439-449 [doi]
- Effective and precise dynamic detection of hidden races for Java programsYan Cai, Lingwei Cao. 450-461 [doi]
- A user-guided approach to program analysisRavi Mangal, Xin Zhang, Aditya V. Nori, Mayur Naik. 462-473 [doi]
- Hidden truths in dead software pathsMichael Eichberg, Ben Hermann, Mira Mezini, Leonid Glanz. 474-484 [doi]
- P3: partitioned path profilingMohammed Afraz, Diptikalyan Saha, Aditya Kanade. 485-495 [doi]
- Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learningXiao-Yuan Jing, Fei Wu, Xiwei Dong, Fumin Qi, Baowen Xu. 496-507 [doi]
- Heterogeneous defect predictionJaechang Nam, Sunghun Kim. 508-519 [doi]
- Clone-based and interactive recommendation for modifying pasted codeYun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao. 520-531 [doi]
- Is the cure worse than the disease? overfitting in automated program repairEdward K. Smith, Earl T. Barr, Claire Le Goues, Yuriy Brun. 532-543 [doi]
- Responsive designs in a snapNishant Sinha, Rezwana Karim. 544-554 [doi]
- CLOTHO: saving programs from malformed strings and incorrect string-handlingAritra Dhar, Rahul Purandare, Mohan Dhawan, Suresh Rangaswamy. 555-566 [doi]
- Query-based configuration of text retrieval solutions for software engineering tasksLaura Moreno, Gabriele Bavota, Sonia Haiduc, Massimiliano Di Penta, Rocco Oliveto, Barbara Russo, Andrian Marcus. 567-578 [doi]
- Information retrieval and spectrum based bug localization: better togetherTien-Duy B. Le, Richard Jayadi Oentaryo, David Lo. 579-590 [doi]
- Rule-based extraction of goal-use case models from textTuong Huan Nguyen, John C. Grundy, Mohamed Almorsy. 591-601 [doi]
- Symbolic execution of programs with heap inputsPietro Braione, Giovanni Denaro, Mauro Pezzè. 602-613 [doi]
- Automatically deriving pointer reference expressions from binary code for memory dump analysisYangchun Fu, Zhiqiang Lin, David Brumley. 614-624 [doi]
- Summarizing and measuring development activityChristoph Treude, Fernando Marques Figueira Filho, Uirá Kulesza. 625-636 [doi]
- A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundanciesQimu Zheng, Audris Mockus, Minghui Zhou. 637-648 [doi]
- Gamification for enforcing coding conventionsChristian R. Prause, Matthias Jarke. 649-660 [doi]
- String analysis for Java and Android applicationsDing Li, Yingjun Lyu, Mian Wan, William G. J. Halfond. 661-672 [doi]
- Auto-completing bug reports for Android applicationsKevin Moran, Mario Linares Vásquez, Carlos Bernal-Cárdenas, Denys Poshyvanyk. 673-686 [doi]
- CLAPP: characterizing loops in Android applicationsYanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. 687-697 [doi]
- TLV: abstraction through testing, learning, and validationJun Sun 0001, Hao Xiao, Yang Liu, Shang-Wei Lin, Shengchao Qin. 698-709 [doi]
- Mimic: computing models for opaque codeStefan Heule, Manu Sridharan, Satish Chandra. 710-720 [doi]
- Witness validation and stepwise testification across software verifiersDirk Beyer 0001, Matthias Dangl, Daniel Dietsch, Matthias Heizmann, Andreas Stahlbauer. 721-733 [doi]
- Efficient and reasonable object-oriented concurrencyScott West, Sebastian Nanz, Bertrand Meyer. 734-744 [doi]
- FlexJava: language support for safe and modular approximate programmingJongse Park, Hadi Esmaeilzadeh, Xin Zhang, Mayur Naik, William Harris. 745-757 [doi]
- Getting to know you: towards a capability model for JavaBen Hermann, Michael Reif, Michael Eichberg, Mira Mezini. 758-769 [doi]
- Efficient dependency detection for safe Java test accelerationJonathan Bell, Gail E. Kaiser, Eric Melski, Mohan Dattatreya. 770-781 [doi]
- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicingUlf Kargen, Nahid Shahmehri. 782-792 [doi]
- Guided differential testing of certificate validation in SSL/TLS implementationsYuting Chen, Zhendong Su. 793-804 [doi]
- Quality and productivity outcomes relating to continuous integration in GitHubBogdan Vasilescu, Yue Yu, Huaimin Wang, Premkumar T. Devanbu, Vladimir Filkov. 805-816 [doi]
- Developer onboarding in GitHub: the role of prior social links and language experienceCasey Casalnuovo, Bogdan Vasilescu, Premkumar T. Devanbu, Vladimir Filkov. 817-828 [doi]
- Impact of developer turnover on quality in open-source softwareMatthieu Foucault, Marc Palyart, Xavier Blanc, Gail C. Murphy, Jean-Rémy Falleri. 829-841 [doi]
- MultiSE: multi-path symbolic execution using value summariesKoushik Sen, George C. Necula, Liang Gong, Wontae Choi. 842-853 [doi]
- Assertion guided symbolic execution of multithreaded programsShengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, Aarti Gupta. 854-865 [doi]
- Iterative distribution-aware sampling for probabilistic symbolic executionMateus Borges, Antonio Filieri, Marcelo d'Amorim, Corina S. Pasareanu. 866-877 [doi]
- Bespoke tools: adapted to the concepts developers knowBrittany Johnson, Rahul Pandita, Emerson R. Murphy-Hill, Sarah Heckman. 878-881 [doi]
- I heart hacker news: expanding qualitative research findings by analyzing social news websitesTitus Barik, Brittany Johnson, Emerson R. Murphy-Hill. 882-885 [doi]
- GitSonifier: using sound to portray developer conflict historyKevin J. North, Shane Bolan, Anita Sarma, Myra B. Cohen. 886-889 [doi]
- Automatically recommending test code examples to inexperienced developersRaphael Pham, Yauheni Stoliar, Kurt Schneider. 890-893 [doi]
- Using software theater for the demonstration of innovative ubiquitous applicationsHan Xu, Stephan Krusche, Bernd Bruegge. 894-897 [doi]
- Behavioral log analysis with statistical guaranteesNimrod Busany, Shahar Maoz. 898-901 [doi]
- Inner oracles: input-specific assertions on internal statesYingfei Xiong, Dan Hao, Lu Zhang 0023, Tao Zhu, Muyao Zhu, Tian Lan. 902-905 [doi]
- Targeted program transformations for symbolic executionCristian Cadar. 906-909 [doi]
- Crash reproduction via test case mutation: let existing test cases helpJifeng Xuan, Xiaoyuan Xie, Martin Monperrus. 910-913 [doi]
- RDIT: race detection from incomplete tracesArun K. Rajagopalan, Jeff Huang. 914-917 [doi]
- TACO: test suite augmentation for concurrent programsTingting Yu. 918-921 [doi]
- Navigating through the archipelago of refactoringsApostolos V. Zarras, Theofanis Vartziotis, Panos Vassiliadis. 922-925 [doi]
- Detecting semantic merge conflicts with variability-aware executionHung Viet Nguyen, My Huu Nguyen, Son Cuu Dang, Christian Kästner, Tien N. Nguyen. 926-929 [doi]
- Product lines can jeopardize their trade secretsMathieu Acher, Guillaume Bécan, Benoît Combemale, Benoit Baudry, Jean-Marc Jézéquel. 930-933 [doi]
- JSketch: sketching for JavaJinseong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama. 934-937 [doi]
- Don't panic: reverse debugging of kernel driversPavel Dovgalyuk, Denis Dmitriev, Vladimir Makarov. 938-941 [doi]
- UMTG: a toolset to automatically generate system test cases from use case specificationsChunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal. 942-945 [doi]
- DexterJS: robust testing platform for DOM-based XSS vulnerabilitiesInian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena. 946-949 [doi]
- T3i: a tool for generating and querying test suites for JavaI. S. Wishnu B. Prasetya. 950-953 [doi]
- iTrace: enabling eye tracking on software artifacts within the IDE to support software engineering tasksTimothy R. Shaffer, Jenna L. Wise, Braden M. Walters, Sebastian C. Müller, Michael Falcone, Bonita Sharif. 954-957 [doi]
- Nyx: a display energy optimizer for mobile web appsDing Li, Angelica Huyen Tran, William G. J. Halfond. 958-961 [doi]
- NARCIA: an automated tool for change impact analysis in natural language requirementsChetan Arora 0002, Mehrdad Sabetzadeh, Arda Goknil, Lionel C. Briand, Frank Zimmer. 962-965 [doi]
- Commit guru: analytics and risk prediction of software commitsChristoffer Rosen, Ben Grawi, Emad Shihab. 966-969 [doi]
- OSSMETER: a software measurement platform for automatically analysing open source software projectsDavide Di Ruscio, Dimitris S. Kolovos, Ioannis Korkontzelos, Nicholas Drivalos Matragkas, Jurgen J. Vinju. 970-973 [doi]
- Comprehensive service matching with MatchBoxPaul Börding, Melanie Bruns, Marie Christin Platenius. 974-977 [doi]
- UEDashboard: awareness of unusual events in commit historiesLarissa Leite, Christoph Treude, Fernando Marques Figueira Filho. 978-981 [doi]
- MatrixMiner: a red pill to architect informal product descriptions in the matrixSana Ben Nasr, Guillaume Bécan, Mathieu Acher, João Bosco Ferreira Filho, Benoit Baudry, Nicolas Sannier, Jean-Marc Davril. 982-985 [doi]
- Predicting field reliabilityPete Rotella, Sunita Chulani, Devesh Goyal. 986-989 [doi]
- REMI: defect prediction for efficient API testingMijung Kim, Jaechang Nam, Jaehyuk Yeon, Soonhwang Choi, Sunghun Kim. 990-993 [doi]
- OnSpot system: test impact visibility during code edits in real softwareMuhammad Umar Janjua. 994-997 [doi]
- Products, developers, and milestones: how should I build my N-Gram language modelJuliana Saraiva, Christian Bird, Thomas Zimmermann. 998-1001 [doi]
- Evaluating a formal scenario-based method for the requirements analysis in automotive software engineeringJoel Greenyer, Max Haase, Jörg Marhenke, Rene Bellmer. 1002-1005 [doi]
- Barriers and enablers for shortening software development lead-time in mechatronics organizations: a case studyMahshad M. Mahally, Miroslaw Staron, Jan Bosch. 1006-1009 [doi]
- Semantic degrees for Industrie 4.0 engineering: deciding on the degree of semantic formalization to select appropriate technologiesChih-Hong Cheng, Tuncay Guelfirat, Christian Messinger, Johannes O. Schmitt, Matthias Schnelte, Peter Weber. 1010-1013 [doi]
- Towards automating the security compliance value chainSmita Ghaisas, Manish Motwani, Balaji Balasubramaniam, Anjali Gajendragadkar, Rahul Kelkar, Harrick M. Vin. 1014-1017 [doi]
- Requirements, architecture, and quality in a mission critical system: 12 lessons learnedAapo Koski, Tommi Mikkonen. 1018-1021 [doi]
- Decentralized self-adaptation in large-scale distributed systemsLuca Florio. 1022-1025 [doi]
- Vehicle level continuous integration in the automotive industrySebastian Vöst. 1026-1029 [doi]
- Quantifying architectural debtsLu Xiao. 1030-1033 [doi]
- User-centric security: optimization of the security-usability trade-offDenis Feth. 1034-1037 [doi]
- Automated unit test generation for evolving softwareSina Shamshiri. 1038-1041 [doi]
- Increasing the efficiency of search-based unit test generation using parameter controlThomas White. 1042-1044 [doi]
- Enhancing Android application bug reportingKevin Moran. 1045-1047 [doi]
- Improving energy consumption in Android appsCarlos Bernal-Cárdenas. 1048-1050 [doi]
- Automated generation of programming language quizzesShuktika Jain. 1051-1053 [doi]
- Spotting familiar code snippet structures for program comprehensionVenkatesh Vinayakarao. 1054-1056 [doi]
- Combining eye tracking with navigation paths for identification of cross-language code dependenciesMartin Konopka. 1057-1059 [doi]
- A textual domain specific language for requirement modellingOyindamola Olajubu. 1060-1062 [doi]
- Automated attack surface approximationChristopher Theisen. 1063-1065 [doi]
- Pockets: a tool to support exploratory programming for novices and educatorsErina Makihara. 1066-1068 [doi]