Abstract is missing.
- Behind every great deep learning framework is an even greater programming languages concept (keynote)Erik Meijer 0003. 1 [doi]
- Ten years of hunting for similar code for fun and profit (keynote)Stéphane Glondu, Lingxiao Jiang, Zhendong Su. 2 [doi]
- CloudRaid: hunting concurrency bugs in the cloud via log-miningJie Lu, Feng Li, Lian Li 0002, Xiaobing Feng 0002. 3-14 [doi]
- Testing multithreaded programs via thread speed controlDongjie Chen, Yanyan Jiang 0001, Chang Xu 0001, Xiaoxing Ma, Jian Lu 0001. 15-25 [doi]
- Data race detection on compressed tracesDileep Kini, Umang Mathur, Mahesh Viswanathan 0001. 26-37 [doi]
- Practical AJAX race detection for JavaScript web applicationsChristoffer Quist Adamsen, Anders Møller, Saba Alimadadi, Frank Tip. 38-48 [doi]
- Using finite-state models for log differencingHen Amar, Lingfeng Bao, Nimrod Busany, David Lo 0001, Shahar Maoz. 49-59 [doi]
- Identifying impactful service system problems via log analysisShilin He, Qingwei Lin, Jian-Guang Lou, Hongyu Zhang, Michael R. Lyu, Dongmei Zhang. 60-70 [doi]
- Learning to sample: exploiting similarities across environments to learn performance models for configurable systemsPooyan Jamshidi, Miguel Velez, Christian Kästner, Norbert Siegmund. 71-82 [doi]
- Performance comprehension at WiredTigerAlexandra Fedorova, Craig Mustard, Ivan Beschastnikh, Julia Rubin, Augustine Wong, Svetozar Miucin, Louis Ye. 83-94 [doi]
- MemFix: static analysis-based repair of memory deallocation errors for CJunhee Lee, Seongjoon Hong, Hakjoo Oh. 95-106 [doi]
- RefiNym: using names to refine typesSantanu Kumar Dash, Miltiadis Allamanis, Earl T. Barr. 107-117 [doi]
- Darwinian data structure selectionMichail Basios, Lingbo Li, Fan Wu, Leslie Kanthan, Earl T. Barr. 118-128 [doi]
- Scalability-first pointer analysis with self-tuning context-sensitivityYue Li 0006, Tian Tan 0001, Anders Møller, Yannis Smaragdakis. 129-140 [doi]
- DeepSim: deep learning code functional similarityGang Zhao, Jeff Huang 0001. 141-151 [doi]
- Deep learning type inferenceVincent J. Hellendoorn, Christian Bird, Earl T. Barr, Miltiadis Allamanis. 152-162 [doi]
- Code vectors: understanding programs through embedded abstracted symbolic tracesJordan Henkel, Shuvendu K. Lahiri, Ben Liblit, Thomas W. Reps. 163-174 [doi]
- MODE: automated neural network model debugging via state differential analysis and input selectionShiQing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama. 175-186 [doi]
- Towards a theory of software development expertiseSebastian Baltes, Stephan Diehl 0001. 187-200 [doi]
- What makes a code change easier to review: an empirical investigation on code change reviewabilityAchyudh Ram, Anand Ashok Sawant, Marco Castelluccio, Alberto Bacchelli. 201-212 [doi]
- Singularity: pattern fuzzing for worst case complexityJiayi Wei, Jia Chen, Yu Feng, Kostas Ferles, Isil Dillig. 213-223 [doi]
- Bug synthesis: challenging bug-finding tools with deep faultsSubhajit Roy, Awanish Pandey, Brendan Dolan-Gavitt, Yu Hu. 224-234 [doi]
- Modify, enhance, select: co-evolution of combinatorial models and test plansRachel Tzoref-Brill, Shahar Maoz. 235-245 [doi]
- The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scaleJames C. Davis, Christy A. Coghlan, Francisco Servant, Dongyoon Lee. 246-256 [doi]
- FraudDroid: automated ad fraud detection for Android appsFeng Dong, Haoyu Wang, Li Li, Yao Guo 0001, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein. 257-268 [doi]
- AppFlow: using machine learning to synthesize robust, reusable UI testsGang Hu, Linjie Zhu, Junfeng Yang. 269-282 [doi]
- Winning the app production rallyEhsan Noei, Daniel Alencar da Costa, Ying Zou. 283-294 [doi]
- One size does not fit all: an empirical study of containerized continuous deployment workflowsYang Zhang, Bogdan Vasilescu, Huaimin Wang, Vladimir Filkov. 295-306 [doi]
- Be careful of when: an empirical study on time-related misuse of issue tracking dataFeifei Tu, Jiaxin Zhu, Qimu Zheng, Minghui Zhou. 307-318 [doi]
- Do the dependency conflicts in my project matter?Ying Wang, Ming Wen, Zhenwei Liu, Rongxin Wu, Rui Wang, Bo Yang, Hai Yu, Zhiliang Zhu, Shing-Chi Cheung. 319-330 [doi]
- Do Android taint analysis tools keep their promises?Felix Pauck, Eric Bodden, Heike Wehrheim. 331-341 [doi]
- Neural-augmented static analysis of Android communicationJinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau. 342-353 [doi]
- Oreo: detection of clones in the twilight zoneVaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Pierre Baldi, Cristina V. Lopes. 354-365 [doi]
- Concurrency verification with maximal path causalityQiuping Yi, Jeff Huang 0001. 366-376 [doi]
- Adversarial symbolic execution for detecting concurrency-related cache timing leaksShengjian Guo, Meng Wu, Chao Wang 0001. 377-388 [doi]
- Symbolic execution with existential second-order constraintsSergey Mechtaev, Alberto Griggio, Alessandro Cimatti, Abhik Roychoudhury. 389-399 [doi]
- Parameterized model counting for string and numeric constraintsAbdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu. 400-410 [doi]
- NAR-miner: discovering negative association rules from code for bug detectionPan Bian, Bin Liang, Wenchang Shi, JianJun Huang, Yan Cai 0001. 411-422 [doi]
- Path-based function embedding and its application to error-handling specification miningDaniel DeFreez, Aditya V. Thakur, Cindy Rubio-González. 423-433 [doi]
- Putback-based bidirectional model transformationsXiao He, Zhenjiang Hu. 434-444 [doi]
- Model transformation languages under a magnifying glass: a controlled experiment with Xtend, ATL, and QVTRegina Hebig, Christoph Seidl, Thorsten Berger, John Kook Pedersen, Andrzej Wasowski. 445-455 [doi]
- Applications of psychological science for actionable analyticsDi Chen, Wei Fu 0002, Rahul Krishna, Tim Menzies. 456-467 [doi]
- A novel automated approach for software effort estimation based on data augmentationLiyan Song, Leandro L. Minku, Xin Yao 0001. 468-479 [doi]
- Predicting Node failure in cloud service systemsQingwei Lin, Ken Hsieh, Yingnong Dang, Hongyu Zhang, Kaixin Sui, Yong Xu, Jian-Guang Lou, Chenggang Li, Youjiang Wu, Randolph Yao, Murali Chintalapati, Dongmei Zhang. 480-490 [doi]
- Detecting speech act types in developer question/answer conversations during bug repairAndrew Wood, Paige Rodeghero, Ameer Armaly, Collin McMillan. 491-502 [doi]
- Visual web test repairAndrea Stocco 0001, Rahulkrishna Yandrapally, Ali Mesbah 0001. 503-514 [doi]
- Syntax-guided synthesis of Datalog programsXujie Si, Woosuk Lee, Richard Zhang, Aws Albarghouthi, Paraschos Koutris, Mayur Naik. 515-527 [doi]
- Large-scale study of substitutability in the presence of effectsJackson Maddox, Yuheng Long , Hridesh Rajan. 528-538 [doi]
- An empirical study on crash recovery bugs in large-scale distributed systemsYu Gao, Wensheng Dou, Feng Qin, Chushu Gao, Dong Wang, Jun Wei 0001, Ruirui Huang, Li Zhou, Yongming Wu. 539-550 [doi]
- Complementing global and local contexts in representing API descriptions to improve API retrieval tasksThanh Van Nguyen, Ngoc M. Tran, Hung Phan, Trong Duc Nguyen, Linh H. Truong, Anh Tuan Nguyen 0001, Hoan Anh Nguyen, Tien N. Nguyen. 551-562 [doi]
- Phys: probabilistic physical unit assignment and inconsistency detectionSayali Kate, John-Paul Ore, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu. 563-573 [doi]
- Testing probabilistic programming systemsSaikat Dutta 0001, Owolabi Legunsen, Zixin Huang, Sasa Misailovic. 574-586 [doi]
- Verifying the long-run behavior of probabilistic system models in the presence of uncertaintyYamilet R. Serrano Llerena, Marcel Böhme, Marc Brünink, Guoxin Su, David S. Rosenblum. 587-597 [doi]
- Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changesMasatomo Hashimoto, Akira Mori, Tomonori Izumida. 598-609 [doi]
- Feedback-directed differential testing of interactive debuggersDaniel Lehmann, Michael Pradel. 610-620 [doi]
- Improving IR-based bug localization with context-aware query reformulationMohammad Masudur Rahman 0001, Chanchal K. Roy. 621-632 [doi]
- How should compilers explain problems to developers?Titus Barik, Denae Ford, Emerson R. Murphy-Hill, Chris Parnin. 633-643 [doi]
- Ecosystem-level determinants of sustained activity in open-source projects: a case study of the PyPI ecosystemMarat Valiev, Bogdan Vasilescu, James D. Herbsleb. 644-655 [doi]
- Optimizing test prioritization via test distribution analysisJunjie Chen 0003, Yiling Lou, Lingming Zhang, Jianyi Zhou, Xiaoleng Wang, Dan Hao, Lu Zhang 0023. 656-667 [doi]
- How well are regular expressions tested in the wild?Peipei Wang, Kathryn T. Stolee. 668-678 [doi]
- Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAFMijung Kim, Shing-Chi Cheung, Sunghun Kim 0001. 679-690 [doi]
- Detection of energy inefficiencies in Android wear watch facesHailong Zhang 0006, Haowei Wu, Atanas Rountev. 691-702 [doi]
- Stochastic energy optimization for mobile GPS applicationsAnthony Canino, Yu David Liu, Hidehiko Masuhara. 703-713 [doi]
- Gamifying static analysisLisa Nguyen Quang Do, Eric Bodden. 714-718 [doi]
- The case for experiment-oriented computingPaulo Salem. 719-723 [doi]
- On the naturalness of proofsVincent J. Hellendoorn, Premkumar T. Devanbu, Mohammad Amin Alipour. 724-728 [doi]
- Does ACM's code of ethics change ethical decision making in software development?Andrew McNamara, Justin Smith, Emerson R. Murphy-Hill. 729-733 [doi]
- How are spreadsheet templates used in practice: a case study on EnronLiang Xu, Wensheng Dou, Jiaxin Zhu, Chushu Gao, Jun Wei 0001, Tao Huang 0001. 734-738 [doi]
- DLFuzz: differential fuzzing testing of deep learning systemsJianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, Jiaguang Sun. 739-743 [doi]
- Towards data-driven vulnerability prediction for requirementsSayem Mohammad Imtiaz, Tanmay Bhowmik. 744-748 [doi]
- Beyond testing configurable systems: applying variational execution to automatic program repair and higher order mutation testingChu-Pan Wong, Jens Meinicke, Christian Kästner. 749-753 [doi]
- Software fairnessYuriy Brun, Alexandra Meliou. 754-759 [doi]
- Software engineering collaboratories (SEClabs) and collaboratories as a service (CaaS)Elena Sherman, Robert Dyer 0004. 760-764 [doi]
- Towards counterexample-guided k-induction for fast bug detectionMikhail Y. R. Gadelha, Felipe R. Monteiro, Lucas C. Cordeiro, Denis A. Nicole. 765-769 [doi]
- Salient-class location: help developers understand code change in code reviewYuan Huang 0002, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng. 770-774 [doi]
- Towards quantifying the development value of code contributionsJinglei Ren, Hezheng Yin, Qingda Hu, Armando Fox, Wojciech Koszek. 775-779 [doi]
- Operationalizing human values in software: a research roadmapDavoud Mougouei, Harsha Perera, Waqar Hussain, Rifat Ara Shams, Jon Whittle. 780-784 [doi]
- Modeling and testing a family of surgical robots: an experience reportNiloofar Mansoor, Jonathan A. Saddler, Bruno Silva, Hamid Bagheri, Myra B. Cohen, Shane Farritor. 785-790 [doi]
- Efficient static checking of library updatesDarius Foo, Hendy Chua, Jason Yeo, Ming Yi Ang, Asankhaya Sharma. 791-796 [doi]
- Are mobile banking apps secure? what can be improved?Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, Lihua Xu. 797-802 [doi]
- VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulationJian Gao, Xin Yang, Ying Fu, Yu Jiang, Heyuan Shi, Jiaguang Sun. 803-808 [doi]
- PAFL: extend fuzzing optimizations of single mode to industrial parallel modeJie Liang, Yu Jiang, Yuanliang Chen, Mingzhe Wang, Chijin Zhou, Jiaguang Sun. 809-814 [doi]
- Software development challenges with air-gap isolationSunny Wong, Anne Woepse. 815-820 [doi]
- Design and validation of precooked developer dashboardsVladimir Ivanov 0001, Vladislav Pischulin, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin. 821-826 [doi]
- Testing and validating end user programmed calculated fieldsVíctor A. Braberman, Diego Garbervetsky, Javier Godoy, Sebastián Uchitel, Guido de Caso, Ignacio Perez, Santiago Perez. 827-832 [doi]
- Automated refactoring of nested-IF formulae in spreadsheetsJie Zhang, Shi Han, Dan Hao, Lu Zhang, Dongmei Zhang. 833-838 [doi]
- FACTS: automated black-box testing of FinTech systemsQingshun Wang, Lintao Gu, Minhui Xue, Lihua Xu, Wenyu Niu, Liang Dou, Liang He, Tao Xie. 839-844 [doi]
- Regression test selection for TizenRTAhmet Çelik, Young-Chul Lee, Milos Gligoric. 845-850 [doi]
- Building lean continuous integration and delivery pipelines by applying DevOps principles: a case study at VarideskVidroha Debroy, Senecca Miller, Lance Brimble. 851-856 [doi]
- The impact of failing, flaky, and high failure tests on the number of crash reports associated with Firefox buildsMd Tajmilur Rahman, Peter C. Rigby. 857-862 [doi]
- BigSift: automated debugging of big data analytics in data-intensive scalable computingMuhammad Ali Gulzar, Siman Wang, Miryung Kim. 863-866 [doi]
- FOT: a versatile, configurable, extensible fuzzing frameworkHongxu Chen, Yuekang Li, Bihuan Chen, Yinxing Xue, Yang Liu. 867-870 [doi]
- Themis: automatically testing software for discriminationRico Angell, Brittany Johnson, Yuriy Brun, Alexandra Meliou. 871-875 [doi]
- Vista: web test repair using computer visionAndrea Stocco 0001, Rahulkrishna Yandrapally, Ali Mesbah 0001. 876-879 [doi]
- Augmenting stack overflow with API usage patterns mined from GitHubAnastasia Reinhardt, Tianyi Zhang 0001, Mihir Mathur, Miryung Kim. 880-883 [doi]
- PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDEJunwen Yang, Cong Yan, Pranav Subramaniam, Shan Lu, Alvin Cheung. 884-887 [doi]
- SketchFix: a tool for automated program repair approach using lazy candidate generationJinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid. 888-891 [doi]
- WarningsGuru: integrating statistical bug models with static analysis to provide timely and specific bug warningsLouis-Philippe Querel, Peter C. Rigby. 892-895 [doi]
- DSM: a specification mining tool using recurrent neural network based language modelTien-Duy B. Le, Lingfeng Bao, David Lo 0001. 896-899 [doi]
- EClone: detect semantic clones in Ethereum via symbolic transaction sketchHan Liu, Zhiqiang Yang, Chao Liu, Yu Jiang, Wenqi Zhao, Jiaguang Sun. 900-903 [doi]
- INFAR: insight extraction from app reviewsCuiyun Gao, Jichuan Zeng, David Lo 0001, Chin-Yew Lin, Michael R. Lyu, Irwin King. 904-907 [doi]
- PyDriller: Python framework for mining software repositoriesDavide Spadini, Maurício Finavaro Aniche, Alberto Bacchelli. 908-911 [doi]
- A formal verification tool for Ethereum VM bytecodeDaejun Park 0001, Yi Zhang, Manasvi Saxena, Philip Daian, Grigore Rosu. 912-915 [doi]
- ASketch: a sketching framework for AlloyKaiyuan Wang, Allison Sullivan, Darko Marinov, Sarfraz Khurshid. 916-919 [doi]
- AlloyInEcore: embedding of first-order relational logic into meta-object facility for automated model reasoningFerhat Erata, Arda Goknil, Ivan Kurtev, Bedir Tekinerdogan. 920-923 [doi]
- VT-revolution: interactive programming tutorials made possibleLingfeng Bao, Zhenchang Xing, Xin Xia 0001, David Lo 0001, Shanping Li. 924-927 [doi]
- Practices and tools for better software testingDavide Spadini. 928-931 [doi]
- Automated support for mobile application testing and maintenanceMattia Fazzini. 932-935 [doi]
- Moving towards objective measures of program comprehensionSarah Fakhoury. 936-939 [doi]
- Semantic inference from natural language privacy policies and Android codeMitra Bokaei Hosseini. 940-943 [doi]
- Intelligent bug fixing with software bug knowledge graphCheng Zhou. 944-947 [doi]
- Quality assurance automation in autonomous systemsAfsoon Afzal. 948-951 [doi]
- How do developers resolve merge conflicts? an investigation into the processes, tools, and improvementsCaius Brindescu. 952-955 [doi]
- Automated scenario-based integration testing of distributed systemsBruno Lima. 956-958 [doi]
- Towards learning-augmented languagesXinyuan Sun. 959-961 [doi]
- On the adoption of neural networks in modeling software reliabilityKamill Gusmanov. 962-964 [doi]
- Type migration in large-scale code basesAmeya Ketkar. 965-967 [doi]
- Reshaping distributed agile and adaptive development environmentFrancesco Nocera. 968-970 [doi]
- How Dance(Sport) can help to produce better softwareIrina Erofeeva. 971-973 [doi]
- Feature-interaction aware configuration prioritizationSon Nguyen. 974-976 [doi]
- Dara: hybrid model checking of distributed systemsVaastav Anand. 977-979 [doi]
- Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugsDavid A. Tomassi. 980-982 [doi]
- Mining error-handling specifications for systems softwareDaniel DeFreez. 983-985 [doi]
- Diversity and decorum in open source communitiesNeill Robson. 986-987 [doi]