Abstract is missing.
- The rising tide lifts all boats: the advancement of science in cyber security (invited talk)Laurie Williams. 1 [doi]
- Verifying the forecast: how climate models are developed and tested (invited talk)Steve Easterbrook. 2 [doi]
- Software engineering research results in industrial practice: a tale of two projects (invited talk)Wolfgang Emmerich. 3 [doi]
- Reflections on the REST architectural style and "principled design of the modern web architecture" (impact paper award)Roy T. Fielding, Richard N. Taylor, Justin R. Erenkrantz, Michael M. Gorlick, Jim Whitehead, Rohit Khare, Peyman Oreizy. 4-14 [doi]
- A fast causal profiler for task parallel programsAdarsh Yoga, Santosh Nagarakatte. 15-26 [doi]
- On the scalability of Linux kernel maintainers' workMinghui Zhou, Qingying Chen, Audris Mockus, Fengguang Wu. 27-37 [doi]
- Modeling and verification of evolving cyber-physical spacesChristos Tsigkanos, Timo Kehrer, Carlo Ghezzi. 38-48 [doi]
- Easy over hard: a case study on deep learningWei Fu, Tim Menzies. 49-60 [doi]
- Finding near-optimal configurations in product lines by random samplingJeho Oh, Don S. Batory, Margaret Myers, Norbert Siegmund. 61-71 [doi]
- Revisiting unsupervised learning for defect predictionWei Fu, Tim Menzies. 72-83 [doi]
- Loopster: static loop termination analysisXiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li. 84-94 [doi]
- CodeCarbonCopyStelios Sidiroglou-Douskos, Eric Lahtinen, Anthony Eden, Fan Long, Martin Rinard. 95-105 [doi]
- The power of "why" and "why not": enriching scenario exploration with provenanceTim Nelson, Natasha Danas, Daniel J. Dougherty, Shriram Krishnamurthi. 106-116 [doi]
- Where is the bug and how is it fixed? an experiment with practitionersMarcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay 0001, Emamurho Ugherughe, Andreas Zeller. 117-128 [doi]
- Understanding misunderstandings in source codeDan Gopstein, Jake Iannacone, Yu Yan, Lois DeLong, Yanyan Zhuang, Martin K.-C. Yeh, Justin Cappos. 129-139 [doi]
- Measuring neural efficiency of program comprehensionJanet Siegmund, Norman Peitek, Chris Parnin, Sven Apel, Johannes Hofmeister, Christian Kästner, Andrew Begel, Anja Bethmann, André Brechmann. 140-150 [doi]
- Bayesian specification learning for finding API usage errorsVijayaraghavan Murali, Swarat Chaudhuri, Chris Jermaine. 151-162 [doi]
- Synergistic debug-repair of heap manipulationsSahil Verma, Subhajit Roy. 163-173 [doi]
- Failure-directed program trimmingKostas Ferles, Valentin Wüstholz, Maria Christakis, Isil Dillig. 174-185 [doi]
- Why modern open source projects failJailton Coelho, Marco Tulio Valente. 186-196 [doi]
- Trade-offs in continuous integration: assurance, security, and flexibilityMichael Hilton, Nicholas Nelson 0002, Timothy Tunnell, Darko Marinov, Danny Dig. 197-207 [doi]
- µDroid: an energy-aware mutation testing framework for AndroidReyhaneh Jabbarvand, Sam Malek. 208-219 [doi]
- PATDroid: permission-aware GUI testing of AndroidAlireza Sadeghi, Reyhaneh Jabbarvand, Sam Malek. 220-232 [doi]
- Enabling mutation testing for Android appsMario Linares Vásquez, Gabriele Bavota, Michele Tufano, Kevin Moran, Massimiliano Di Penta, Christopher Vendome, Carlos Bernal-Cárdenas, Denys Poshyvanyk. 233-244 [doi]
- Guided, stochastic model-based GUI testing of Android appsTing Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, Zhendong Su. 245-256 [doi]
- Using bad learners to find good configurationsVivek Nair, Tim Menzies, Norbert Siegmund, Sven Apel. 257-267 [doi]
- Attributed variability models: outside the comfort zoneNorbert Siegmund, Stefan Sobernig, Sven Apel. 268-278 [doi]
- Kmax: finding all configurations of Kbuild makefiles staticallyPaul Gazzillo. 279-290 [doi]
- Is there a mismatch between real-world feature models and product-line research?Alexander Knüppel, Thomas Thüm, Stephan Mennicke, Jens Meinicke, Ina Schaefer. 291-302 [doi]
- Adaptively generating high quality fixes for atomicity violationsYan Cai, Lingwei Cao, Jing Zhao. 303-314 [doi]
- AtexRace: across thread and execution sampling for in-house race detectionYu Guo, Yan Cai, Zijiang Yang. 315-325 [doi]
- Symbolic execution of programmable logic controller codeShengjian Guo, Meng Wu, Chao Wang 0001. 326-336 [doi]
- Thread-modular static analysis for relaxed memory modelsMarkus Kusano, Chao Wang 0001. 337-348 [doi]
- ARTINALI: dynamic invariant detection for cyber-physical system securityMaryam Raiyat Aliabadi, Amita Ajith Kamath, Julien Gascon-Samson, Karthik Pattabiraman. 349-361 [doi]
- A symbolic justice violations transition system for unrealizable GR(1) specificationsAviv Kuvent, Shahar Maoz, Jan Oliver Ringert. 362-372 [doi]
- Automated control of multiple software goals using multiple actuatorsMartina Maggio, Alessandro Vittorio Papadopoulos, Antonio Filieri, Henry Hoffmann. 373-384 [doi]
- Why do developers use trivial packages? an empirical case study on npmRabe Abdalkareem, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid, Emad Shihab. 385-395 [doi]
- Detecting missing information in bug descriptionsOscar Chaparro, Jing Lu, Fiorella Zampetti, Laura Moreno, Massimiliano Di Penta, Andrian Marcus, Gabriele Bavota, Vincent Ng. 396-407 [doi]
- Continuous variable-specific resolutions of feature interactionsMohammad Hadi Zibaeenejad, Chi Zhang, Joanne M. Atlee. 408-418 [doi]
- Model-level, platform-independent debugging in the context of the model-driven development of real-time systemsMojtaba Bagherzadeh, Nicolas Hili, Juergen Dingel. 419-430 [doi]
- Cooperative kernels: GPU multitasking for blocking algorithmsTyler Sorensen, Hugues Evrard, Alastair F. Donaldson. 431-441 [doi]
- Toward full elasticity in distributed static analysis: the case of callgraph analysisDiego Garbervetsky, Edgardo Zoppi, Benjamin Livshits. 442-453 [doi]
- Probabilistic model checking of perturbed MDPs with applications to cloud computingYamilet R. Serrano Llerena, Guoxin Su, David S. Rosenblum. 454-464 [doi]
- Understanding the impact of refactoring on smells: a longitudinal study of 23 software projectsDiego Cedrim, Alessandro Garcia, Melina Mongiovi, Rohit Gheyi, Leonardo da Silva Sousa, Rafael de Mello, Baldoino Fonseca, Márcio Ribeiro, Alexander Chávez. 465-475 [doi]
- Cimplifier: automatically debloating containersVaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel. 476-486 [doi]
- Craig vs. Newton in software model checkingDaniel Dietsch, Matthias Heizmann, Betim Musa, Alexander Nutz, Andreas Podelski. 487-497 [doi]
- Fairness testing: testing software for discriminationSainyam Galhotra, Yuriy Brun, Alexandra Meliou. 498-510 [doi]
- The care and feeding of wild-caught mutantsDavid Bingham Brown, Michael Vaughn, Ben Liblit, Thomas W. Reps. 511-522 [doi]
- QTEP: quality-aware test case prioritizationSong Wang, Jaechang Nam, Lin Tan. 523-534 [doi]
- Constraint normalization and parameterized caching for quantitative program analysisTegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan. 535-546 [doi]
- Generalized observational slicing for tree-represented modelling languagesNicolas E. Gold, David Binkley, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo. 547-558 [doi]
- On evidence preservation requirements for forensic-ready systemsDalal Alrajeh, Liliana Pasquale, Bashar Nuseibeh. 559-569 [doi]
- BDCI: behavioral driven conflict identificationFabrizio Pastore, Leonardo Mariani, Daniela Micucci. 570-581 [doi]
- NoFAQ: synthesizing command repairs from examplesLoris D'Antoni, Rishabh Singh, Michael Vaughn. 582-592 [doi]
- S3: syntax- and semantic-guided repair synthesis via programming by examplesXuan-Bach D. Le, Duc-Hiep Chu, David Lo, Claire Le Goues, Willem Visser. 593-604 [doi]
- Counterexample-guided approach to finding numerical invariantsThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks. 605-615 [doi]
- Discovering relational specificationsCalvin Smith, Gabriel Ferns, Aws Albarghouthi. 616-626 [doi]
- Steelix: program-state based binary fuzzingYuekang Li, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin, Yang Liu, Alwen Tiu. 627-637 [doi]
- CodeMatch: obfuscation won't conceal your repackaged appLeonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann, Johannes Lerch, Mira Mezini. 638-648 [doi]
- A compiler and verifier for page access oblivious computationRohit Sinha 0001, Sriram K. Rajamani, Sanjit A. Seshia. 649-660 [doi]
- Automatic generation of inter-component communication exploits for Android applicationsJoshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek. 661-671 [doi]
- OASIS: prioritizing static analysis warnings for Android apps based on app user reviewsLili Wei, Yepang Liu, Shing-Chi Cheung. 672-682 [doi]
- Recovering clear, natural identifiers from obfuscated JS namesBogdan Vasilescu, Casey Casalnuovo, Premkumar T. Devanbu. 683-693 [doi]
- DESCRY: reproducing system-level concurrency failuresTingting Yu, Tarannum S. Zaman, Chao Wang 0001. 694-704 [doi]
- Reproducing concurrency failures from crash stacksFrancesco A. Bianchi, Mauro Pezzè, Valerio Terragni. 705-716 [doi]
- Automatically analyzing groups of crashes for finding correlationsMarco Castelluccio, Carlo Sansone, Luisa Verdoliva, Giovanni Poggi. 717-726 [doi]
- Automatic inference of code transforms for patch generationFan Long, Peter Amidon, Martin Rinard. 727-739 [doi]
- A feasibility study of using automated program repair for introductory programming assignmentsJooyong Yi, Umair Z. Ahmed, Amey Karkare, Shin Hwei Tan, Abhik Roychoudhury. 740-751 [doi]
- Automatically diagnosing and repairing error handling bugs in CYuchi Tian, Baishakhi Ray. 752-762 [doi]
- Are deep neural networks the best choice for modeling source code?Vincent J. Hellendoorn, Premkumar T. Devanbu. 763-773 [doi]
- Understanding the impact of support for iteration on code searchLee Martie, André van der Hoek, Thomas Kwak. 774-785 [doi]
- LAMP: data provenance for graph based machine learning algorithms through derivative computationShiQing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang. 786-797 [doi]
- More accurate recommendations for method-level changesGeorg Dotzler, Marius Kamp, Patrick Kreutzer, Michael Philippsen. 798-808 [doi]
- Regression test selection across JVM boundariesAhmet Çelik, Marko Vasic, Aleksandar Milicevic, Milos Gligoric. 809-820 [doi]
- Measuring the cost of regression testing in practice: a study of Java projects using continuous integrationAdriaan Labuschagne, Laura Inozemtseva, Reid Holmes. 821-830 [doi]
- Better test cases for better automated program repairJinqiu Yang, Alexey Zhikhartsev, Yuefei Liu, Lin Tan. 831-841 [doi]
- When program analysis meets mobile security: an industrial study of misusing Android internet socketsWenqi Bu, Minhui Xue, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie. 842-847 [doi]
- File-level vs. module-level regression test selection for .NETMarko Vasic, Zuhair Parvez, Aleksandar Milicevic, Milos Gligoric. 848-853 [doi]
- Record and replay for Android: are we there yet in industrial cases?Wing Lam, Zhengkai Wu, Dengfeng Li, Wenyu Wang, Haibing Zheng, Hui Luo, Peng Yan, Yuetang Deng, Tao Xie. 854-859 [doi]
- Model-driven software engineering in practice: privacy-enhanced filtering of network trafficRoel van Dijk, Christophe Creeten, Jeroen van der Ham, Jeroen van den Bos. 860-865 [doi]
- Strong agile metrics: mining log data to determine predictive power of software metrics for continuous delivery teamsHennie Huijgens, Robert Lamping, Dick Stevens, Hartger Rothengatter, Georgios Gousios, Daniele Romano. 866-871 [doi]
- Screening heuristics for project gating systemsZahy Volf, Edi Shmueli. 872-877 [doi]
- Natural language querying in SAP-ERP platformDiptikalyan Saha, Neelamadhav Gantayat, Senthil Mani, Barry Mitchell. 878-883 [doi]
- Serverless computing: economic and architectural impactGojko Adzic, Robert Chatley. 884-889 [doi]
- What do software engineers care about? gaps between research and practiceVladimir Ivanov, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin. 890-895 [doi]
- Reference architectures and Scrum: friends or foes?Matthias Galster, Samuil Angelov, Silverio Martínez-Fernández, Dan Tofan. 896-901 [doi]
- Guidelines for adopting frontend architectures and patterns in microservices-based systemsHolger Harms, Collin Rogowski, Luigi Lo Iacono. 902-907 [doi]
- Improving understanding of dynamically typed software developed by agile practitionersJair García, Kelly Garcés. 908-913 [doi]
- Automated identification of security issues from commit messages and bug reportsYaqin Zhou, Asankhaya Sharma. 914-919 [doi]
- LaChouTi: kernel vulnerability responding framework for the fragmented Android devicesJingZheng Wu, Mutian Yang. 920-925 [doi]
- Applying deep learning based automatic bug triager to industrial projectsSunro Lee, Min-Jae Heo, Chan-Gun Lee, Milhan Kim, Gaeul Jeong. 926-931 [doi]
- Static analysis for optimizing big data queriesDiego Garbervetsky, Zvonimir Pavlinovic, Michael Barnett 0001, Madanlal Musuvathi, Todd Mytkowicz, Edgardo Zoppi. 932-937 [doi]
- Automated testing of hybrid Simulink/Stateflow controllers: industrial case studiesReza Matinnejad, Shiva Nejati, Lionel C. Briand. 938-943 [doi]
- QEMU-based framework for non-intrusive virtual machine instrumentation and introspectionPavel Dovgalyuk, Natalia Fursova, Ivan Vasiliev, Vladimir Makarov. 944-948 [doi]
- RunDroid: recovering execution call graphs for Android applicationsYujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podgurski, Huibiao Zhu. 949-953 [doi]
- RGSE: a regular property guided symbolic executor for JavaHengbiao Yu, Zhenbang Chen, Yufeng Zhang, Ji Wang, Wei Dong. 954-958 [doi]
- A tool for automated reasoning about traces based on configurable formal semanticsFerhat Erata, Arda Goknil, Bedir Tekinerdogan, Geylani Kardas. 959-963 [doi]
- VART: a tool for the automatic detection of regression faultsFabrizio Pastore, Leonardo Mariani. 964-968 [doi]
- DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviourGermán Regis, César Cornejo, Simón Gutiérrez Brida, Mariano Politano, Fernando Raverta, Pablo Ponzio, Nazareno Aguirre, Juan Pablo Galeotti, Marcelo F. Frias. 969-973 [doi]
- From scenario modeling to scenario programming for reactive systems with dynamic topologyJoel Greenyer, Daniel Gritzner, Florian König, Jannik Dahlke, Jianwei Shi, Eric Wete. 974-978 [doi]
- CLTSA: labelled transition system analyser with counting fluent supportGermán Regis, Renzo Degiovanni, Nicolás D'Ippolito, Nazareno Aguirre. 979-983 [doi]
- The MONDO collaboration framework: secure collaborative modeling over existing version control systemsCsaba Debreceni, Gábor Bergmann, Márton Búr, István Ráth, Dániel Varró. 984-988 [doi]
- Model-based privacy and security analysis with CARiSMAAmir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens. 989-993 [doi]
- Cherry-picking of code commits in long-running, multi-release softwarePanuchart Bunyakiati, Chadarat Phipathananunth. 994-998 [doi]
- ARCC: assistant for repetitive code comprehensionWilberto Z. Nunez, Victor J. Marin, Carlos R. Rivero. 999-1003 [doi]
- JoanAudit: a tool for auditing common injection vulnerabilitiesJulian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand. 1004-1008 [doi]
- XSearch: a domain-specific cross-language relevant question retrieval toolBowen Xu, Zhenchang Xing, Xin Xia, David Lo, Xuan-Bach D. Le. 1009-1013 [doi]
- Using search-based software engineering to handle the changes with uncertainties for self-adaptive systemsLu Wang. 1014-1017 [doi]
- DRACO: discovering refactorings that improve architecture using fine-grained co-change dependenciesMarcos César de Oliveira. 1018-1021 [doi]
- User- and analysis-driven context aware software development in mobile computingMai Abusair. 1022-1025 [doi]
- Recommender system for model driven software developmentStefan Kögel. 1026-1029 [doi]
- On the similarity of software development documentationMathias Ellmann. 1030-1033 [doi]
- Application of search-based software engineering methodologies for test suite optimization and evolution in mission critical mobile application developmentAndreas Schuler. 1034-1037 [doi]
- Summarizing software engineering communication artifacts from different sourcesVerena Käfer. 1038-1041 [doi]
- Model-based dynamic software project schedulingNatasha Nigar. 1042-1045 [doi]
- System performance optimization via design and configuration space explorationChong Tang. 1046-1049 [doi]
- Suggesting meaningful variable names for decompiled code: a machine translation approachAlan Jaffe. 1050-1052 [doi]
- Practical symbolic verification of regular propertiesHengbiao Yu. 1053-1055 [doi]
- FOSS version differentiation as a benchmark for static analysis security testing toolsIvan Pashchenko. 1056-1058 [doi]
- DecisionDroid: a supervised learning-based system to identify cloned Android applicationsAyush Kohli. 1059-1061 [doi]
- Reasons and drawbacks of using trivial npm packages: the developers' perspectiveRabe Abdalkareem. 1062-1064 [doi]
- Detecting wearable app permission mismatches: a case study on Android wearSuhaib Mujahid. 1065-1067 [doi]
- Automating traceability link recovery through classificationChris Mills. 1068-1070 [doi]
- Improving performance of automatic program repair using learned heuristicsLiam Schramm. 1071-1073 [doi]