Abstract is missing.
- Living with feature interactions (keynote)Joanne M. Atlee. 1 [doi]
- Safety and robustness for deep learning with provable guarantees (keynote)Marta Kwiatkowska. 2 [doi]
- Insights from open source software supply chains (keynote)Audris Mockus. 3 [doi]
- Concolic testing for models of state-based systemsReza Ahmadi, Juergen Dingel. 4-15 [doi]
- Target-driven compositional concolic testing with function summary refinement for effective bug detectionYunho Kim, Shin Hong, Moonzoo Kim. 16-26 [doi]
- Generating automated and online test oracles for Simulink models with continuous and uncertain behaviorsClaudio Menghi, Shiva Nejati, Khouloud Gaaloul, Lionel C. Briand. 27-38 [doi]
- Lifting Datalog-based analyses to software product linesRamy Shahin, Marsha Chechik, Rick Salay. 39-49 [doi]
- An empirical study of real-world variability bugs detected by variability-oblivious toolsAustin Mordahl, Jeho Oh, Ugur Koc, Shiyi Wei, Paul Gazzillo. 50-61 [doi]
- Principles of feature modelingDamir Nesic, Jacob Krüger, Stefan Stanciulescu, Thorsten Berger. 62-73 [doi]
- Understanding GCC builtins to develop better toolsManuel Rigger, Stefan Marr, Bram Adams, Hanspeter Mössenböck. 74-85 [doi]
- Assessing the quality of the steps to reproduce in bug reportsOscar Chaparro, Carlos Bernal-Cárdenas, Jing Lu, Kevin Moran, Andrian Marcus, Massimiliano Di Penta, Denys Poshyvanyk, Vincent Ng. 86-96 [doi]
- A learning-based approach for automatic construction of domain glossary from source code and documentationChong Wang, Xin Peng 0001, Mingwei Liu, Zhenchang Xing, Xuefang Bai, Bing Xie, Tuo Wang. 97-108 [doi]
- On using machine learning to identify knowledge in API reference documentationDavide Fucci, Alireza Mollaalizadehbahnemiri, Walid Maalej. 109-119 [doi]
- Generating query-specific class API summariesMingwei Liu, Xin Peng 0001, Andrian Marcus, Zhenchang Xing, Wenkai Xie, Shuangshuang Xing, Yang Liu. 120-130 [doi]
- Semantic relation based expansion of abbreviationsYanjie Jiang, Hui Liu, Lu Zhang. 131-141 [doi]
- Diversity-based web test generationMatteo Biagiola, Andrea Stocco 0001, Filippo Ricca, Paolo Tonella. 142-153 [doi]
- Web test dependency detectionMatteo Biagiola, Andrea Stocco 0001, Ali Mesbah 0001, Filippo Ricca, Paolo Tonella. 154-164 [doi]
- Testing scratch programs automaticallyAndreas Stahlbauer, Marvin Kreis, Gordon Fraser. 165-175 [doi]
- A large-scale empirical study of compiler errors in continuous integrationChen Zhang, Bihuan Chen 0001, Linlin Chen, Xin Peng 0001, Wenyun Zhao. 176-187 [doi]
- A statistics-based performance testing methodology for cloud applicationsSen He, Glenna Manns, John Saunders, Wei Wang 0054, Lori L. Pollock, Mary Lou Soffa. 188-199 [doi]
- How bad can a bug get? an empirical analysis of software failures in the OpenStack cloud computing platformDomenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, Nematollah Bidokhti. 200-211 [doi]
- Towards more efficient meta-heuristic algorithms for combinatorial test generationJinkun Lin, Shaowei Cai, Chuan Luo, Qingwei Lin, Hongyu Zhang. 212-222 [doi]
- Compiler bug isolation via effective witness test program generationJunjie Chen 0003, Jiaqi Han, Peiyi Sun, Lingming Zhang, Dan Hao, Lu Zhang. 223-234 [doi]
- Concolic testing with adaptively changing search heuristicsSooyoung Cha, Hakjoo Oh. 235-245 [doi]
- Symbolic execution-driven extraction of the parallel execution plans of Spark applicationsLuciano Baresi, Giovanni Denaro, Giovanni Quattrocchi. 246-256 [doi]
- Generating effective test cases for self-driving cars from police reportsAlessio Gambi, Tri Huynh, Gordon Fraser. 257-267 [doi]
- Preference-wise testing for Android applicationsYifei Lu, Minxue Pan, Juan Zhai, Tian Zhang 0001, Xuandong Li. 268-278 [doi]
- Bisecting commits and modeling commit risk during testingArmin Najafi, Peter C. Rigby, Weiyi Shang. 279-289 [doi]
- White-box testing of big data analytics with complex user-defined functionsMuhammad Ali Gulzar, Shaghayegh Mardani, Madanlal Musuvathi, Miryung Kim. 290-301 [doi]
- Empirical review of Java program repair tools: a large-scale experiment on 2, 141 bugs and 23, 551 repair attemptsThomas Durieux, Fernanda Madeiral Delfim, Matias Martinez, Rui Abreu. 302-313 [doi]
- iFixR: bug report driven program repairAnil Koyuncu, Kui Liu, Tegawendé F. Bissyandé, Dongsun Kim 0001, Martin Monperrus, Jacques Klein, Yves Le Traon. 314-325 [doi]
- Exploring and exploiting the correlations between bug-inducing and bug-fixing commitsMing Wen, Rongxin Wu, Yepang Liu, Yongqiang Tian, Xuan Xie, Shing-Chi Cheung, Zhendong Su. 326-337 [doi]
- Effects of explicit feature traceability on program comprehensionJacob Krüger, Gül Çalikli, Thorsten Berger, Thomas Leich, Gunter Saake. 338-349 [doi]
- What the fork: a study of inefficient and efficient forking practices in social codingShurui Zhou, Bogdan Vasilescu, Christian Kästner. 350-361 [doi]
- ServDroid: detecting service usage inefficiencies in Android applicationsWei Song, Jing Zhang, Jeff Huang. 362-373 [doi]
- Together strong: cooperative Android app analysisFelix Pauck, Heike Wehrheim. 374-384 [doi]
- A framework for writing trigger-action todo comments in executable formatPengyu Nie, Rishabh Rai, Junyi Jessy Li, Sarfraz Khurshid, Raymond J. Mooney, Milos Gligoric. 385-396 [doi]
- Decomposing the rationale of code commits: the software developer's perspectiveKhadijah Al Safwan, Francisco Servant. 397-408 [doi]
- Model-based testing of breaking changes in Node.js librariesAnders Møller, Martin Toldam Torp. 409-419 [doi]
- Monitoring-aware IDEsJos Winter, Maurício Finavaro Aniche, Jürgen Cito, Arie van Deursen. 420-431 [doi]
- Going big: a large-scale study on what big data developers askMehdi Bagherzadeh, Raffi Khatchadourian. 432-442 [doi]
- Why aren't regular expressions a lingua franca? an empirical study on the re-use and portability of regular expressionsJames C. Davis, Louis G. Michael IV, Christy A. Coghlan, Francisco Servant, Dongyoon Lee. 443-454 [doi]
- Nodest: feedback-driven static analysis of Node.js applicationsBenjamin Barslev Nielsen, Behnaz Hassanshahi, François Gauthier. 455-465 [doi]
- Effective error-specification inference via domain-knowledge expansionDaniel DeFreez, Haaken Martinson Baldwin, Cindy Rubio-González, Aditya V. Thakur. 466-476 [doi]
- DeepStellar: model-based quantitative analysis of stateful deep learning systemsXiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu 0003, Jianjun Zhao. 477-487 [doi]
- REINAM: reinforcement learning for input-grammar inferenceZhengkai Wu, Evan Johnson, Wei Yang, Osbert Bastani, Dawn Song, Jian Peng, Tao Xie. 488-498 [doi]
- Boosting operational DNN testing efficiency through conditioningZenan Li, Xiaoxing Ma, Chang Xu 0001, Chun Cao, Jingwei Xu, Jian Lü 0001. 499-509 [doi]
- A comprehensive study on deep learning bug characteristicsMd Johirul Islam, Giang Nguyen, Rangeet Pan, Hridesh Rajan. 510-520 [doi]
- Just fuzz it: solving floating-point constraints using coverage-guided fuzzingDaniel Liew, Cristian Cadar, Alastair F. Donaldson, J. Ryan Stinnett. 521-532 [doi]
- Cerebro: context-aware adaptive fuzzing for effective vulnerability detectionYuekang Li, Yinxing Xue, Hongxu Chen, Xiuheng Wu, Cen Zhang, Xiaofei Xie, Haijun Wang, Yang Liu. 533-544 [doi]
- iFixFlakies: a framework for automatically fixing order-dependent flaky testsAugust Shi, Wing Lam, Reed Oei, Tao Xie 0001, Darko Marinov. 545-555 [doi]
- Binary reduction of dependency graphsChristian Gram Kalhauge, Jens Palsberg. 556-566 [doi]
- AggrePlay: efficient record and replay of multi-threaded programsErnest Pobee, W. K. Chan. 567-577 [doi]
- The review linkage graph for code review analytics: a recovery approach and empirical studyToshiki Hirao, Shane McIntosh, Akinori Ihara, Kenichi Matsumoto. 578-589 [doi]
- Mitigating power side channels during compilationJingbo Wang, Chungha Sung, Chao Wang. 590-601 [doi]
- Maximal multi-layer specification synthesisYanju Chen, Ruben Martins, Yu Feng. 602-612 [doi]
- Phoenix: automated data-driven synthesis of repairs for static analysis violationsRohan Bavishi, Hiroaki Yoshida, Mukul R. Prasad. 613-624 [doi]
- Black box fairness testing of machine learning modelsAniya Aggarwal, Pranay Lohia, Seema Nagar, Kuntal Dey, Diptikalyan Saha. 625-635 [doi]
- Java reflection API: revealing the dark side of the mirrorFelipe Pontes, Rohit Gheyi, Sabrina Souto, Alessandro Garcia, Márcio Ribeiro. 636-646 [doi]
- A conceptual replication of continuous integration pain points in the context of Travis CIDavid Gray Widder, Michael Hilton, Christian Kästner, Bogdan Vasilescu. 647-658 [doi]
- Ethnographic research in software engineering: a critical review and checklistHe Zhang, Xin Huang, Xin Zhou, Huang Huang, Muhammad Ali Babar. 659-670 [doi]
- Achilles' heel of plug-and-Play software architectures: a grounded theory based approachJoanna C. S. Santos, Adriana Sejfia, Taylor Corrello, Smruthi Gadenkanahalli, Mehdi Mirakhorli. 671-682 [doi]
- Latent error prediction and fault localization for microservice applications by learning from system trace logsXiang Zhou, Xin Peng 0001, Tao Xie, Jun Sun 0001, Chao Ji, Dewei Liu, Qilin Xiang, Chuan He. 683-694 [doi]
- The importance of accounting for real-world labelling when predicting software vulnerabilitiesMatthieu Jimenez, Renaud Rwemalika, Mike Papadakis, Federica Sarro, Yves Le Traon, Mark Harman. 695-705 [doi]
- Detecting concurrency memory corruption vulnerabilitiesYan Cai 0001, Biyun Zhu, Ruijie Meng, Hao Yun, Liang He, Purui Su, Bin Liang. 706-717 [doi]
- Locating vulnerabilities in binaries via memory layout recoveringHaijun Wang, Xiaofei Xie, Shang-Wei Lin, Yun Lin 0001, Yuekang Li, Shengchao Qin, Yang Liu, Ting Liu. 718-728 [doi]
- Storm: program reduction for testing and debugging probabilistic programming systemsSaikat Dutta 0001, Wenxian Zhang, Zixin Huang, Sasa Misailovic. 729-739 [doi]
- NullAway: practical type-based null safety for JavaSubarno Banerjee, Lazaro Clapp, Manu Sridharan. 740-750 [doi]
- Automatically detecting missing cleanup for ungraceful exitsZhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang. 751-762 [doi]
- Finding and understanding bugs in software model checkersChengyu Zhang, Ting Su, Yichen Yan, Fuyuan Zhang, Geguang Pu, Zhendong Su. 763-773 [doi]
- A segmented memory model for symbolic executionTimotej Kapus, Cristian Cadar. 774-784 [doi]
- Releasing fast and slow: an exploratory case study at INGElvan Kula, Ayushi Rastogi, Hennie Huijgens, Arie van Deursen, Georgios Gousios. 785-795 [doi]
- SAR: learning cross-language API mappings with little knowledgeNghi D. Q. Bui, Yijun Yu, Lingxiao Jiang. 796-806 [doi]
- Robust log-based anomaly detection on unstable log dataXu Zhang, Yong Xu, Qingwei Lin, Bo Qiao, Hongyu Zhang, Yingnong Dang, Chunyu Xie, Xinsheng Yang, Qian Cheng, Ze Li, Junjie Chen, Xiaoting He, Randolph Yao, Jian-Guang Lou, Murali Chintalapati, Furao Shen, Dongmei Zhang. 807-817 [doi]
- Pinpointing performance inefficiencies in JavaPengfei Su, Qingsen Wang, Milind Chabbi, Xu Liu 0001. 818-829 [doi]
- Understanding flaky tests: the developer's perspectiveMoritz Eck, Fabio Palomba, Marco Castelluccio, Alberto Bacchelli. 830-840 [doi]
- SEntiMoji: an emoji-powered learning approach for sentiment analysis in software engineeringZhenpeng Chen, Yanbin Cao, Xuan Lu, Qiaozhu Mei, Xuanzhe Liu. 841-852 [doi]
- FinExpert: domain-specific test generation for FinTech systemsTiancheng Jin, Qingshun Wang, Lihua Xu, Chunmei Pan, Liang Dou, Haifeng Qian, Liang He 0001, Tao Xie. 853-862 [doi]
- Design diagrams as ontological sourcePranay Lohia, Kalapriya Kannan, Biplav Srivastava, Sameep Mehta. 863-873 [doi]
- Predicting pull request completion time: a case study on large scale cloud servicesChandra Shekhar Maddila, Chetan Bansal, Nachiappan Nagappan. 874-882 [doi]
- TERMINATOR: better automated UI test case prioritizationZhe Yu, Fahmid M. Fahid, Tim Menzies, Gregg Rothermel, Kyle Patrick, Snehit Cherian. 883-894 [doi]
- Risks and assets: a qualitative study of a software ecosystem in the mining industryThomas Olsson 0001, Ulrik Franke. 895-904 [doi]
- Using microservices for non-intrusive customization of multi-tenant SaaSPhu H. Nguyen, Hui Song, Franck Chauvel, Roy Müller, Seref Boyar, Erik Levin. 905-915 [doi]
- Predicting breakdowns in cloud services (with SPIKE)Jianfeng Chen, Joymallya Chakraborty, Philip Clark, Kevin Haverlock, Snehit Cherian, Tim Menzies. 916-924 [doi]
- DeepDelta: learning to repair compilation errorsAli Mesbah 0001, Andrew Rice, Emily Johnston, Nick Glorioso, Edward Aftandilian. 925-936 [doi]
- WhoDo: automating reviewer suggestions at scaleSumit Asthana, Rahul Kumar, Ranjita Bhagwan, Christian Bird, Chetan Bansal, Chandra Shekhar Maddila, Sonu Mehta, B. Ashok. 937-945 [doi]
- An IR-based approach towards automated integration of geo-spatial datasets in map-based software systemsNima Miryeganeh, Mehdi Amoui, Hadi Hemmati. 946-954 [doi]
- Code coverage at GoogleMarko Ivankovic, Goran Petrovic, René Just, Gordon Fraser. 955-963 [doi]
- When deep learning met code searchJosé Cambronero, HongYu Li, Seohyun Kim, Koushik Sen, Satish Chandra 0001. 964-974 [doi]
- FUDGE: fuzz driver generation at scaleDomagoj Babic, Stefan Bucur, Yaohui Chen, Franjo Ivancic, Tim King, Markus Kusano, Caroline Lemieux, László Szekeres, Wei Wang. 975-985 [doi]
- Industry practice of coverage-guided enterprise Linux kernel fuzzingHeyuan Shi, Runzhe Wang, Ying Fu, Mingzhe Wang, Xiaohai Shi, Xun Jiao, Houbing Song, Yu Jiang, Jiaguang Sun. 986-995 [doi]
- Architectural decision forces at work: experiences in an industrial consultancy settingJulius Rueckert, Andreas Burger, Heiko Koziolek, Thanikesavan Sivanthi, Alexandru Moga, Carsten Franke. 996-1005 [doi]
- The role of limitations and SLAs in the API industryAntonio Gamez-Diaz, Pablo Fernandez 0001, Antonio Ruiz Cortés, Pedro J. Molina, Nikhil Kolekar, Prithpal Bhogill, Madhurranjan Mohaan, Francisco Méndez. 1006-1014 [doi]
- Evaluating model testing and model checking for finding requirements violations in Simulink modelsShiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe. 1015-1025 [doi]
- Model checking a C++ software framework: a case studyJohn Lång, I. S. W. B. Prasetya. 1026-1036 [doi]
- Evolving with patterns: a 31-month startup experience reportMiguel Ehécatl Morales-Trujillo, Gabriel Alberto García-Mireles. 1037-1047 [doi]
- Bridging the gap between ML solutions and their business requirements using feature interactionsGuy Barash, Eitan Farchi, Ilan Jayaraman, Orna Raz, Rachel Tzoref-Brill, Marcel Zalmanovici. 1048-1058 [doi]
- Design thinking in practice: understanding manifestations of design thinking in software engineeringFranziska Dobrigkeit, Danielly de Paula. 1059-1069 [doi]
- MOTSD: a multi-objective test selection tool using test suite diagnosabilityDaniel Correia, Rui Abreu, Pedro Santos, João Nadkarni. 1070-1074 [doi]
- BIKER: a tool for Bi-information source based API method recommendationLiang Cai, Haoye Wang, Qiao Huang, Xin Xia 0001, Zhenchang Xing, David Lo 0001. 1075-1079 [doi]
- Mart: a mutant generation tool for LLVMThierry Titcheu Chekam, Mike Papadakis, Yves Le Traon. 1080-1084 [doi]
- VARYS: an agnostic model-driven monitoring-as-a-service framework for the cloudAlessandro Tundo, Marco Mobilio, Matteo Orrù, Oliviero Riganelli, Michell Guzmán, Leonardo Mariani. 1085-1089 [doi]
- JCOMIX: a search-based tool to detect XML injection vulnerabilities in web applicationsDimitri Michel Stallenberg, Annibale Panichella. 1090-1094 [doi]
- Event trace reduction for effective bug replay of Android apps via differential GUI state analysisYulei Sui, Yifei Zhang 0001, Wei Zheng, Manqing Zhang, Jingling Xue. 1095-1099 [doi]
- PyGGI 2.0: language independent genetic improvement frameworkGabin An, Aymeric Blot, Justyna Petke, Shin Yoo. 1100-1104 [doi]
- CloneCognition: machine learning based code clone validation toolGolam Mostaeen, Jeffrey Svajlenko, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 1105-1109 [doi]
- EVMFuzzer: detect EVM vulnerabilities via fuzz testingYing Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, Xiang Shi. 1110-1114 [doi]
- A dynamic taint analyzer for distributed systemsXiaoqin Fu, Haipeng Cai. 1115-1119 [doi]
- Governify for APIs: SLA-driven ecosystem for API governanceAntonio Gamez-Diaz, Pablo Fernandez 0001, Antonio Ruiz Cortés. 1120-1123 [doi]
- Developing secure bitcoin contracts with BitMLNicola Atzei, Massimo Bartoletti, Stefano Lande, Nobuko Yoshida, Roberto Zunino. 1124-1128 [doi]
- DISCOVER: detecting algorithmic complexity vulnerabilitiesPayas Awadhutkar, Ganesh Ram Santhanam, Benjamin Holland, Suresh Kothari. 1129-1133 [doi]
- AnswerBot: an answer summary generation tool based on stack overflowLiang Cai, Haoye Wang, Bowen Xu, Qiao Huang, Xin Xia 0001, David Lo 0001, Zhenchang Xing. 1134-1138 [doi]
- Eagle: a team practices audit framework for agile software developmentAlejandro Guerrero, Rafael Fresno, An Ju, Armando Fox, Pablo Fernandez 0001, Carlos Müller, Antonio Ruiz Cortés. 1139-1143 [doi]
- A taxonomy of metrics for software fault predictionMaria Caulo. 1144-1147 [doi]
- Distributed execution of test cases and continuous integrationCarmen Coviello. 1148-1151 [doi]
- A longitudinal field study on creation and use of domain-specific languages in industryJasper Denkers. 1152-1155 [doi]
- Failure-driven program repairDavide Ginelli. 1156-1159 [doi]
- On extending single-variant model transformations for reuse in software product line engineeringSandra Greiner. 1160-1163 [doi]
- Exploratory test agents for stateful software systemsStefan Karlsson. 1164-1167 [doi]
- Helping developers search and locate task-relevant information in natural language documentsArthur Marques. 1168-1171 [doi]
- Improving requirements engineering practices to support experimentation in software startupsJorge Melegati. 1172-1175 [doi]
- Managing the open cathedralMatthias Müller. 1176-1179 [doi]
- Machine-learning supported vulnerability detection in source codeTim Sonnekalb. 1180-1183 [doi]
- Software clusterings with vector semantics and the call graphMarios Papachristou. 1184-1186 [doi]
- Machine learning-assisted performance testingMahshid Helali Moghadam. 1187-1189 [doi]
- File tracing by intercepting disk requestsVladislav Stepanov. 1190-1192 [doi]
- Recommending related functions from API usage-based function clone structuresShamsa Abid. 1193-1195 [doi]
- Identifying the most valuable developers using artifact traceability graphsH. Alperen Cetin. 1196-1198 [doi]
- Automated patch porting across forked projectsLuyao Ren. 1199-1201 [doi]
- Employing different program analysis methods to study bug evolutionCharalambos Mitropoulos. 1202-1204 [doi]
- Reducing the workload of the Linux kernel maintainers: multiple-committer modelXin Tan. 1205-1207 [doi]
- Efficient computing in a safe environmentMichail Loukeris. 1208-1210 [doi]
- The lessons software engineers can extract from painters to improve the software development processMilana Nurgalieva. 1211-1213 [doi]
- An industrial application of test selection using test suite diagnosabilityDaniel Correia. 1214-1216 [doi]
- Understanding source code comments at large-scaleHao He. 1217-1219 [doi]
- A graph-based framework for analysing the design of smart contractsBram Vandenbogaerde. 1220-1222 [doi]
- Finding the shortest path to reproduce a failure found by TESTAROlivia Rodriguez Valdes. 1223-1225 [doi]
- Analysing socio-technical congruence in the package dependency network of CargoMehdi Golzadeh. 1226-1228 [doi]
- Tuning backfired? not (always) your fault: understanding and detecting configuration-related performance bugsHaochen He. 1229-1231 [doi]
- On the use of lambda expressions in 760 open source Python projectsShubham Sangle, Sandeep Muvva. 1232-1234 [doi]
- Test-related factors and post-release defects: an empirical studyFabiano Pecorelli. 1235-1237 [doi]
- Static deep neural network analysis for robustnessRangeet Pan. 1238-1240 [doi]
- Are existing code smells relevant in web games? an empirical studyVaishali Khanve. 1241-1243 [doi]
- Tackling knowledge needs during software evolutionJacob Krüger. 1244-1246 [doi]
- On the scalable dynamic taint analysis for distributed systemsXiaoqin Fu. 1247-1249 [doi]
- Suggesting reviewers of software artifacts using traceability graphsEmre Sülün. 1250-1252 [doi]
- Using software testing to repair modelsMarco Radavelli. 1253-1255 [doi]
- Rethinking Regex engines to address ReDoSJames C. Davis. 1256-1258 [doi]
- Context-aware test case adaptationPeiyi Sun. 1259-1261 [doi]
- Empirical study of customer communication problem in agile requirements engineeringIlyuza Gizzatullina. 1262-1264 [doi]