Abstract is missing.
- A behavioral notion of robustness for software systemsChangjian Zhang, David Garlan, Eunsuk Kang. 1-12 [doi]
- ARDiff: scaling program equivalence checking via iterative abstraction and refinement of common codeSahar Badihi, Faridah Akinotcho, Yi Li 0008, Julia Rubin. 13-24 [doi]
- C2S: translating natural language comments to formal program specificationsJuan Zhai, Yu Shi, Minxue Pan, Guian Zhou, Yongxiang Liu, Chunrong Fang, ShiQing Ma, Lin Tan 0001, Xiangyu Zhang 0001. 25-37 [doi]
- Detecting and understanding JavaScript global identifier conflicts on the webMingxue Zhang, Wei Meng 0001. 38-49 [doi]
- Domain-independent interprocedural program analysis using block-abstraction memoizationDirk Beyer 0001, Karlheinz Friedberger. 50-62 [doi]
- Flexeme: untangling commits using lexical flowsProfir-Petru Pârtachi, Santanu Kumar Dash, Miltiadis Allamanis, Earl T. Barr. 63-74 [doi]
- HISyn: human learning-inspired natural language programmingZifan Nan, Hui Guan, Xipeng Shen. 75-86 [doi]
- Inductive program synthesis over noisy dataShivam Handa, Martin C. Rinard. 87-98 [doi]
- Inherent vacuity for GR(1) specificationsShahar Maoz, Rafi Shalom. 99-110 [doi]
- Interval counterexamples for loop invariant learningRongchen Xu, Fei He 0001, Bow-Yaw Wang. 111-122 [doi]
- Java Ranger: statically summarizing regions for efficient symbolic execution of JavaVaibhav Sharma, Soha Hussein, Michael W. Whalen, Stephen McCamant, Willem Visser. 123-134 [doi]
- JShrink: in-depth investigation into debloating modern Java applicationsBobby R. Bruce, Tianyi Zhang 0001, Jaspreet Arora, Guoqing Harry Xu, Miryung Kim. 135-146 [doi]
- Making symbolic execution promising by learning aggressive state-pruning strategySooyoung Cha, Hakjoo Oh. 147-158 [doi]
- Mining assumptions for software components using machine learningKhouloud Gaaloul, Claudio Menghi, Shiva Nejati, Lionel C. Briand, David Wolfe. 159-171 [doi]
- Mining input grammars from dynamic control flowRahul Gopinath, Björn Mathis, Andreas Zeller. 172-183 [doi]
- Modular collaborative program analysis in OPALDominik Helm, Florian Kübler, Michael Reif, Michael Eichberg, Mira Mezini. 184-196 [doi]
- Past-sensitive pointer analysis for symbolic executionDavid Trabish, Timotej Kapus, Noam Rinetzky, Cristian Cadar. 197-208 [doi]
- TypeWriter: neural type prediction with search-based validationMichael Pradel, Georgios Gousios, Jason Liu, Satish Chandra 0001. 209-220 [doi]
- UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernelYizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu. 221-232 [doi]
- Exploring how deprecated Python library APIs are (not) handledJiawei Wang, Li Li 0029, Kui Liu 0001, Haipeng Cai. 233-244 [doi]
- Selecting third-party libraries: the practitioners' perspectiveEnrique Larios Vargas, Maurício Finavaro Aniche, Christoph Treude, Magiel Bruntink, Georgios Gousios. 245-256 [doi]
- A principled approach to GraphQL query cost analysisAlan Cha, Erik Wittern, Guillaume Baudart, James C. Davis, Louis Mandel, Jim Alain Laredo. 257-268 [doi]
- Beware the evolving 'intelligent' web service! an integration architecture tactic to guard AI-first componentsAlex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy, Mohamed Abdelrazek 0001. 269-280 [doi]
- Block public access: trust safety verification of access control policiesMalik Bouchet, Byron Cook, Bryant Cutler, Anna Druzkina, Andrew Gacek, Liana Hadarean, Ranjit Jhala, Brad Marshall, Daniel Peebles, Neha Rungta, Cole Schlesinger, Chriss Stephens, Carsten Varming, Andy Warfield. 281-291 [doi]
- Efficient incident identification from multi-dimensional issue reports via meta-heuristic searchJiazhen Gu, Chuan Luo, Si-qin, Bo Qiao, Qingwei Lin, Hongyu Zhang 0002, Ze Li, Yingnong Dang, Shaowei Cai, Wei Wu, Yangfan Zhou, Murali Chintalapati, Dongmei Zhang. 292-303 [doi]
- Identifying linked incidents in large-scale online service systemsYujun Chen, Xian Yang, Hang Dong, Xiaoting He, Hongyu Zhang 0002, Qingwei Lin, Junjie Chen 0003, Pu Zhao, Yu Kang, Feng Gao, Zhangwei Xu, Dongmei Zhang. 304-314 [doi]
- Real-time incident prediction for online service systemsNengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, Dan Pei. 315-326 [doi]
- Configuration smells in continuous delivery pipelines: a linter and a six-month study on GitLabCarmine Vassallo, Sebastian Proksch, Anna Jancso, Harald C. Gall, Massimiliano Di Penta. 327-337 [doi]
- Dimensions of software configuration: on the configuration context in modern software developmentNorbert Siegmund, Nicolai Ruckel, Janet Siegmund. 338-349 [doi]
- Global cost/quality management across multiple applicationsLiu Liu 0015, Sibren Isaacman, Ulrich Kremer. 350-361 [doi]
- Understanding and discovering software configuration dependencies in cloud and datacenter systemsQingrong Chen, Teng Wang, Owolabi Legunsen, Shanshan Li, Tianyin Xu. 362-374 [doi]
- Docable: evaluating the executability of software tutorialsSamim Mirhosseini, Chris Parnin. 375-385 [doi]
- RulePad: interactive authoring of checkable design rulesSahar Mehrpour, Thomas D. LaToza, Hamed Sarvari. 386-397 [doi]
- A first look at good first issues on GitHubXin Tan, Minghui Zhou, Zeyu Sun. 398-409 [doi]
- A randomized controlled trial on the effects of embedded computer language switchingPhillip Merlin Uesbeck, Cole S. Peterson, Bonita Sharif, Andreas Stefik. 410-420 [doi]
- A theory of the engagement in open source projects via summer of code programsJefferson De Oliveira Silva, Igor Wiese, Daniel M. Germán, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher. 421-431 [doi]
- An empirical analysis of the costs of clone- and platform-oriented software reuseJacob Krüger, Thorsten Berger. 432-444 [doi]
- An empirical study of bots in software development: characteristics and challenges from a practitioner's perspectiveLinda Erlenhov, Francisco Gomes de Oliveira Neto, Philipp Leitner 0001. 445-455 [doi]
- Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machinesYu Huang 0015, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander, Westley Weimer. 456-468 [doi]
- Community expectations for research artifacts and evaluation processesBen Hermann, Stefan Winter 0001, Janet Siegmund. 469-480 [doi]
- Does stress impact technical interview performance?Mahnaz Behroozi, Shivani Shirolkar, Titus Barik, Chris Parnin. 481-492 [doi]
- Exploring the evolution of software practicesYvonne Dittrich, Christian Bo Michelsen, Paolo Tell, Pernille Lous, Allan Ebdrup. 493-504 [doi]
- Heard it through the Gitvine: an empirical study of tool diffusion across the npm ecosystemHemank Lamba, Asher Trockman, Daniel Armanios, Christian Kästner, Heather Miller, Bogdan Vasilescu. 505-517 [doi]
- Interactive, effort-aware library version harmonizationKaifeng Huang, Bihuan Chen 0001, Bowen Shi, Ying Wang, Congying Xu, Xin Peng 0001. 518-529 [doi]
- On the naturalness of hardware descriptionsJaeseong Lee, Pengyu Nie, Junyi Jessy Li, Milos Gligoric. 530-542 [doi]
- On the relationship between design discussions and design quality: a case study of Apache projectsUmme Ayda Mannan, Iftekhar Ahmed 0001, Carlos Jensen, Anita Sarma. 543-555 [doi]
- On the relationship between refactoring actions and bugs: a differentiated replicationMassimiliano Di Penta, Gabriele Bavota, Fiorella Zampetti. 556-567 [doi]
- Questions for data scientists in software engineering: a replicationHennie Huijgens, Ayushi Rastogi, Ernst Mulders, Georgios Gousios, Arie van Deursen. 568-579 [doi]
- Reducing implicit gender biases in software development: does intergroup contact theory work?Yi Wang, Min Zhang. 580-592 [doi]
- Robotics software engineering: a perspective from the service robotics domainSergio García 0002, Daniel Strüber 0001, Davide Brugali, Thorsten Berger, Patrizio Pelliccione. 593-604 [doi]
- Thinking aloud about confusing code: a qualitative investigation of program comprehension and atoms of confusionDan Gopstein, Anne-Laure Fayard, Sven Apel, Justin Cappos. 605-616 [doi]
- Understanding build issue resolution in practice: symptoms and fix patternsYiling Lou, Zhenpeng Chen, Yanbin Cao, Dan Hao, Lu Zhang. 617-628 [doi]
- Understanding type changes in JavaAmeya Ketkar, Nikolaos Tsantalis, Danny Dig. 629-641 [doi]
- Do the machine learning models on a crowd sourced platform exhibit bias? an empirical study on model fairnessSumon Biswas, Hridesh Rajan. 642-653 [doi]
- Fairway: a way to build fair ML softwareJoymallya Chakraborty, Suvodeep Majumder, Zhe Yu 0002, Tim Menzies. 654-665 [doi]
- Towards automated verification of smart contract fairnessYe Liu, Yi Li, Shang-Wei Lin 0001, Rong Zhao. 666-677 [doi]
- Boosting fuzzer efficiency: an information theoretic perspectiveMarcel Böhme, Valentin J. M. Manès, Sang Kil Cha. 678-689 [doi]
- CrFuzz: fuzzing multi-purpose programs through input validationSuhwan Song, Chengyu Song, Yeongjin Jang, Byoungyoung Lee. 690-700 [doi]
- Detecting critical bugs in SMT solvers using blackbox mutational fuzzingMuhammad Numair Mansur, Maria Christakis, Valentin Wüstholz, Fuyuan Zhang. 701-712 [doi]
- Fuzzing: on the exponential cost of vulnerability discoveryMarcel Böhme, Brandon Falk. 713-724 [doi]
- Intelligent REST API data fuzzingPatrice Godefroid, Bo-Yuan Huang, Marina Polishchuk. 725-736 [doi]
- MTFuzz: fuzzing with a multi-task neural networkDongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray. 737-749 [doi]
- A comprehensive study on challenges in deploying deep learning based softwareZhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie 0001, Xuanzhe Liu. 750-762 [doi]
- AMS: generating AutoML search spaces from weak specificationsJosé Pablo Cambronero, Jürgen Cito, Martin C. Rinard. 763-774 [doi]
- Correlations between deep neural network model coverage criteria and model qualityShenao Yan, Guanhong Tao, Xuwei Liu, Juan Zhai, ShiQing Ma, Lei Xu, Xiangyu Zhang 0001. 775-787 [doi]
- Deep learning library testing via effective model generationZan Wang, Ming Yan, Junjie Chen, Shuang Liu, Dongdi Zhang. 788-799 [doi]
- DeepSearch: a simple and effective blackbox attack for deep neural networksFuyuan Zhang, Sankalan Pal Chowdhury, Maria Christakis. 800-812 [doi]
- DENAS: automated rule generation by knowledge extraction from neural networksSimin Chen, Soroush Bateni, Sampath Grandhi, Xiaodi Li, Cong Liu, Wei Yang 0013. 813-825 [doi]
- Detecting numerical bugs in neural network architecturesYuhao Zhang, Luyao Ren, Liqian Chen, Yingfei Xiong 0001, Shing-Chi Cheung, Tao Xie 0001. 826-837 [doi]
- Dynamic slicing for deep neural networksZiqi Zhang, Yuanchun Li, Yao Guo 0001, Xiangqun Chen, Yunxin Liu. 838-850 [doi]
- Is neuron coverage a meaningful measure for testing deep neural networks?Fabrice Harel-Canada, Lingxiao Wang, Muhammad Ali Gulzar, Quanquan Gu, Miryung Kim. 851-862 [doi]
- Machine translation testing via pathological invarianceShashij Gupta, Pinjia He, Clara Meister, Zhendong Su. 863-875 [doi]
- Model-based exploration of the frontier of behaviours for deep learning system testingVincenzo Riccio, Paolo Tonella. 876-888 [doi]
- On decomposing a deep neural network into modulesRangeet Pan, Hridesh Rajan. 889-900 [doi]
- Operational calibration: debugging confidence errors for DNNs in the fieldZenan Li, Xiaoxing Ma, Chang Xu 0001, Jingwei Xu 0001, Chun Cao, Jian Lu 0001. 901-913 [doi]
- All your app links are belong to us: understanding the threats of instant apps based attacksYutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu 0003. 914-926 [doi]
- Automated construction of energy test oracles for AndroidReyhaneh Jabbarvand, Forough Mehralian, Sam Malek. 927-938 [doi]
- Borrowing your enemy's arrows: the case of code reuse in Android via direct inter-app code invocationJun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein. 939-951 [doi]
- Static asynchronous component misuse detection for Android applicationsLinjie Pan, Baoquan Cui, Hao Liu, Jiwei Yan, Siqi Wang, Jun Yan, Jian Zhang. 952-963 [doi]
- Automatically identifying performance issue reports with heuristic linguistic patternsYutong Zhao, Lu Xiao 0001, Pouria Babvey, Lei Sun, Sunny Wong, Angel A. Martinez, Xiao Wang. 964-975 [doi]
- Calm energy accounting for multithreaded Java applicationsTimur Babakol, Anthony Canino, Khaled Mahmoud, Rachit Saxena, Yu David Liu. 976-988 [doi]
- Dynamically reconfiguring software microbenchmarks: reducing execution time without sacrificing result qualityChristoph Laaber, Stefan Würsten, Harald C. Gall, Philipp Leitner 0001. 989-1001 [doi]
- Testing self-adaptive software with probabilistic guarantees on performance metricsClaudio Mandrioli, Martina Maggio. 1002-1014 [doi]
- API method recommendation via explicit matching of functionality verb phrasesWenkai Xie, Xin Peng 0001, Mingwei Liu, Christoph Treude, Zhenchang Xing, Xiaoxin Zhang, Wenyun Zhao. 1015-1026 [doi]
- Code recommendation for exception handlingTam Nguyen, Phong Vu, Tung Nguyen. 1027-1038 [doi]
- eQual: informing early design decisionsArman Shahbazian, Suhrid Karthik, Yuriy Brun, Nenad Medvidovic. 1039-1051 [doi]
- Recommending stack overflow posts for fixing runtime exceptions using failure scenario matchingSonal Mahajan, Negarsadat Abolhassani, Mukul R. Prasad. 1052-1064 [doi]
- Understanding the impact of GitHub suggested changes on recommendations between developersChris Brown, Chris Parnin. 1065-1076 [doi]
- An evaluation of methods to port legacy code to SGX enclavesKripa Shanker, Arun Joseph, Vinod Ganapathy. 1077-1088 [doi]
- Search-based adversarial testing and improvement of constrained credit scoring systemsSalah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boystov, Yves Le Traon, Anne Goujon. 1089-1100 [doi]
- SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seedPan Bian, Bin Liang, Jianjun Huang 0001, Wenchang Shi, Xidong Wang, Jian Zhang. 1101-1113 [doi]
- Baital: an adaptive weighted sampling approach for improved t-wise coverageEduard Baranov, Axel Legay, Kuldeep S. Meel. 1114-1126 [doi]
- Cost measures matter for mutation testing study validityGiovani Guizzo, Federica Sarro, Mark Harman. 1127-1139 [doi]
- Detecting optimization bugs in database engines via non-optimizing reference engine constructionManuel Rigger, Zhendong Su. 1140-1152 [doi]
- Efficient binary-level coverage analysisM. Ammar Ben Khadra, Dominik Stoffel, Wolfgang Kunz. 1153-1164 [doi]
- Efficiently finding higher-order mutantsChu-Pan Wong, Jens Meinicke, Leo Chen, João P. Diniz, Christian Kästner, Eduardo Figueiredo 0001. 1165-1177 [doi]
- Evolutionary improvement of assertion oraclesValerio Terragni, Gunel Jahangirova, Paolo Tonella, Mauro Pezzè. 1178-1189 [doi]
- FrUITeR: a framework for evaluating UI test reuseYixue Zhao, Justin Chen, Adriana Sejfia, Marcelo Schmitt Laser, Jie Zhang, Federica Sarro, Mark Harman, Nenad Medvidovic. 1190-1201 [doi]
- Object detection for graphical user interface: old fashioned or deep learning or a combination?Jieshan Chen, Mulong Xie, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li 0001. 1202-1214 [doi]
- Understanding and automatically detecting conflicting interactions between smart home IoT applicationsRahmadi Trimananda, Seyed Amir Hossein Aqajari, Jason Chuang, Brian Demsky, Guoqing Harry Xu, Shan Lu 0001. 1215-1227 [doi]
- When does my program do this? learning circumstances of software behaviorAlexander Kampmann, Nikolas Havrikov, Ezekiel O. Soremekun, Andreas Zeller. 1228-1239 [doi]
- A first look at the integration of machine learning models in complex autonomous driving systems: a case study on ApolloZi Peng, Jinqiu Yang 0001, Tse-Hsun (Peter) Chen, Lei Ma. 1240-1250 [doi]
- Adapting bug prediction models to predict reverted commits at WayfairAlexander Suh. 1251-1262 [doi]
- Can microtask programming work in industry?Shinobu Saito, Yukako Iimura, Emad Aghayi, Thomas D. LaToza. 1263-1273 [doi]
- Change impact analysis in Simulink designs of embedded systemsBennett Mackenzie, Vera Pantelic, Gordon Marks, Stephen Wynn-Williams, Gehan M. K. Selim, Mark Lawford, Alan Wassyng, Moustapha Diab, Feisel Weslati. 1274-1284 [doi]
- Clustering test steps in natural language toward automating test automationLinyi Li, Zhenwen Li, Weijie Zhang, Jun Zhou, Pengcheng Wang, Jing Wu, Guanghua He, Xia Zeng, Yuetang Deng, Tao Xie. 1285-1295 [doi]
- Efficient customer incident triage via linking with system incidentsJiazhen Gu, Jiaqi Wen, Zijian Wang, Pu Zhao, Chuan Luo, Yu Kang, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Bo Qiao, Liqun Li, Qingwei Lin, Dongmei Zhang. 1296-1307 [doi]
- Effort-aware just-in-time defect identification in practice: a case study at AlibabaMeng Yan, Xin Xia 0001, Yuanrui Fan, David Lo 0001, Ahmed E. Hassan, Xindong Zhang. 1308-1319 [doi]
- Enhancing the interoperability between deep learning frameworks by model conversionYu Liu, Cheng Chen, Ru Zhang, Tingting Qin, Xiang Ji, Haoxiang Lin, Mao Yang. 1320-1330 [doi]
- Establishing key performance indicators for measuring software-development processes at a large organizationCem Sürücü, Bianying Song, Jacob Krüger, Gunter Saake, Thomas Leich. 1331-1341 [doi]
- Estimating GPU memory consumption of deep learning modelsYanjie Gao, Yu Liu, Hongyu Zhang, Zhengxian Li, Yonghao Zhu, Haoxiang Lin, Mao Yang. 1342-1352 [doi]
- Exempla gratis (E.G.): code examples for freeCeleste Barnaby, Koushik Sen, Tianyi Zhang 0001, Elena Glassman, Satish Chandra 0001. 1353-1364 [doi]
- Fireteam: a small-team development practice in industryHe Zhang, Huang Huang, Dong Shao, Xin Huang. 1365-1375 [doi]
- FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domainJincao Feng, Weikai Miao, Hanyue Zheng, Yihao Huang, Jianwen Li, Zheng Wang 0005, Ting Su, Bin Gu, Geguang Pu, Mengfei Yang, Jifeng He. 1376-1386 [doi]
- Graph-based trace analysis for microservice architecture understanding and problem diagnosisXiaofeng Guo, Xin Peng 0001, Hanzhang Wang, Wanxue Li, Huai Jiang, Dan Ding, Tao Xie, Liangfei Su. 1387-1397 [doi]
- Harvey: a greybox fuzzer for smart contractsValentin Wüstholz, Maria Christakis. 1398-1409 [doi]
- How to mitigate the incident? an effective troubleshooting guide recommendation technique for online service systemsJiajun Jiang, Weihai Lu, Junjie Chen 0003, Qingwei Lin, Pu Zhao, Yu Kang, Hongyu Zhang 0002, Yingfei Xiong 0001, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang. 1410-1420 [doi]
- Improving cybersecurity hygiene through JIT patchingFrederico Araujo, Teryl Taylor. 1421-1432 [doi]
- IntelliCode compose: code generation using transformerAlexey Svyatkovskiy, Shao Kun Deng, Shengyu Fu, Neel Sundaresan. 1433-1443 [doi]
- Learning to extract transaction function from requirements: an industrial case on financial softwareLin Shi, Mingyang Li, Mingzhe Xing, Yawen Wang, Qing Wang, Xinhua Peng, Weimin Liao, Guizhen Pi, Haiqing Wang. 1444-1454 [doi]
- Online sports betting through the prism of software engineeringGvozden Marinkovic, Nikola Lukic, Nenad Medvidovic. 1455-1465 [doi]
- Reducing DNN labelling cost using surprise adequacy: an industrial case study for autonomous drivingJinhan Kim, Jeongil Ju, Robert Feldt, Shin Yoo. 1466-1476 [doi]
- Scaling static taint analysis to industrial SOA applications: a case study at AlibabaJie Wang, Yunguang Wu, Gang Zhou, Yiming Yu, Zhenyu Guo, Yingfei Xiong 0001. 1477-1486 [doi]
- Towards intelligent incident management: why we need it and how we make itZhuangbin Chen, Yu Kang, Liqun Li, Xu Zhang, Hongyu Zhang, Hui Xu 0009, Yangfan Zhou, Li Yang, Jeffrey Sun, Zhangwei Xu, Yingnong Dang, Feng Gao, Pu Zhao, Bo Qiao, Qingwei Lin, Dongmei Zhang, Michael R. Lyu. 1487-1497 [doi]
- WebRR: self-replay enhanced robust record/replay for web application testingZhenyue Long, Guoquan Wu, XiaoJiang Chen, Wei Chen 0018, Jun Wei 0001. 1498-1508 [doi]
- Beyond accuracy: assessing software documentation qualityChristoph Treude, Justin Middleton, Thushari Atapattu. 1509-1512 [doi]
- Continuous experimentation on artificial intelligence software: a research agendaAnh Nguyen Duc, Pekka Abrahamsson. 1513-1516 [doi]
- Inferring and securing software configurations using automated reasoningPaul Gazzillo. 1517-1520 [doi]
- Next generation automated software evolution refactoring at scaleJames Ivers, Ipek Ozkaya, Robert L. Nord, Chris Seifried. 1521-1524 [doi]
- Revealing the complexity of automotive softwareVard Antinyan. 1525-1528 [doi]
- Software documentation and augmented reality: love or arranged marriage?Sridhar Chimalakonda, Akhila Sri Manasa Venigalla. 1529-1532 [doi]
- Testing machine learning code using polyhedral regionMd Sohel Ahmed, Fuyuki Ishikawa, Mahito Sugiyama. 1533-1536 [doi]
- Towards learning visual semanticsHaipeng Cai, Shiv Raj Pant, Wen Li. 1537-1540 [doi]
- AlloyMC: Alloy meets model countingJiayi Yang, Wenxi Wang, Darko Marinov, Sarfraz Khurshid. 1541-1545 [doi]
- ARCADE: an extensible workbench for architecture recovery, change, and decay evaluationMarcelo Schmitt Laser, Nenad Medvidovic, Duc Minh Le, Joshua Garcia. 1546-1550 [doi]
- BEE: a tool for structuring and analyzing bug reportsYang Song, Oscar Chaparro. 1551-1555 [doi]
- BugsInPy: a database of existing bugs in Python programs to enable controlled testing and debugging studiesRatnadira Widyasari, Sheng Qin Sim, Camellia Lok, Haodi Qi, Jack Phan, Qijin Tay, Constance Tan, Fiona Wee, Jodie Ethelda Tan, Yuheng Yieh, Brian Goh, Ferdian Thung, Hong Jin Kang, Thong Hoang, David Lo 0001, Eng Lieh Ouh. 1556-1560 [doi]
- CRSG: a serious game for teaching code reviewKaan Ünlü, Baris Ardiç, Eray Tüzün. 1561-1565 [doi]
- Dads: dynamic slicing continuously-running distributed programs with budget constraintsXiaoqin Fu, Haipeng Cai, Li Li 0029. 1566-1570 [doi]
- DeepCommenter: a deep code comment generation tool with hybrid lexical and syntactical informationBoao Li, Meng Yan, Xin Xia 0001, Xing Hu, Ge Li 0001, David Lo 0001. 1571-1575 [doi]
- DiffTech: a tool for differencing similar technologies from question-and-answer discussionsHan Wang, Chunyang Chen, Zhenchang Xing, John C. Grundy. 1576-1580 [doi]
- Enhancing developer interactions with programming screencasts through accurate code extractionLingfeng Bao, Shengyi Pan, Zhenchang Xing, Xin Xia 0001, David Lo 0001, Xiaohu Yang. 1581-1585 [doi]
- JITO: a tool for just-in-time defect identification and localizationFangcheng Qiu, Meng Yan, Xin Xia 0001, Xinyu Wang, Yuanrui Fan, Ahmed E. Hassan, David Lo 0001. 1586-1590 [doi]
- LibComp: an IntelliJ plugin for comparing Java librariesRehab El Hajj, Sarah Nadi. 1591-1595 [doi]
- MCBAT: a practical tool for model counting constraints on bounded integer arraysAbtin Molavi, Mara Downing, Tommy Schneider, Lucas Bang. 1596-1600 [doi]
- ModCon: a model-based testing platform for smart contractsYe Liu, Yi Li, Shang-Wei Lin, Qiang Yan. 1601-1605 [doi]
- Mono2Micro: an AI-based toolchain for evolving monolithic enterprise applications to a microservice architectureAnup K. Kalia, Jin Xiao, Chen Lin, Saurabh Sinha, John J. Rofrano, Maja Vukovic, Debasish Banerjee. 1606-1610 [doi]
- MutAPK 2.0: a tool for reducing mutation testing effort of Android appsCamilo Escobar-Velásquez, Diego Riveros, Mario Linares Vásquez. 1611-1615 [doi]
- PAClab: a program analysis collaboratoryRebecca Brunner, Robert Dyer 0001, Maria Paquin, Elena Sherman. 1616-1620 [doi]
- PCA: memory leak detection using partial call-path analysisWen Li, Haipeng Cai, Yulei Sui, David Manz. 1621-1625 [doi]
- PRF: a framework for building automatic program repair prototypes for JVM-based languagesAli-Ghanbari, Andrian Marcus. 1626-1629 [doi]
- PRODeep: a platform for robustness verification of deep neural networksRenjue Li, Jianlin Li, Cheng-Chao Huang, Pengfei Yang, Xiaowei Huang 0001, Lijun Zhang, Bai Xue, Holger Hermanns. 1630-1634 [doi]
- SVMRanker: a general termination analysis framework of loop programs via SVMXie Li, Yi Li, Yong Li, Xuechao Sun, Andrea Turrini, Lijun Zhang. 1635-1639 [doi]
- SWAN: a static analysis framework for swiftDaniil Tiganov, Jeff Cho, Karim Ali 0001, Julian Dolby. 1640-1644 [doi]
- Threshy: supporting safe usage of intelligent web servicesAlex Cummaudo, Scott Barnett, Rajesh Vasa, John C. Grundy. 1645-1649 [doi]
- tsDetect: an open source test smells detection toolAnthony Peruma, Khalid Almalki, Christian D. Newman, Mohamed Wiem Mkaouer, Ali Ouni 0001, Fabio Palomba. 1650-1654 [doi]
- UIED: a hybrid tool for GUI element detectionMulong Xie, Sidong Feng, Zhenchang Xing, Jieshan Chen, Chunyang Chen. 1655-1659 [doi]
- UIScreens: extracting user interface screens from mobile programming video tutorialsMohammad Alahmadi, Ahmad Tayeb, Abdulkarim Khormi, Esteban Parra, Sonia Haiduc. 1660-1664 [doi]
- WebJShrink: a web service for debloating Java bytecodeKonner Macias, Mihir Mathur, Bobby R. Bruce, Tianyi Zhang 0001, Miryung Kim. 1665-1669 [doi]
- Assisting the elite-driven open source development through activity dataZhendong Wang. 1670-1673 [doi]
- Enhancing developers' support on pull requests activities with software botsMairieli Wessel. 1674-1677 [doi]
- Machine learning based test data generation for safety-critical softwareJán Cegin. 1678-1681 [doi]
- Reusing software engineering knowledge from developer communicationCamila Mariane Costa Silva. 1682-1685 [doi]
- Towards transferring lean software startup practices in software engineering educationOrges Cico. 1686-1689 [doi]
- Attention tracking for developersRozaliya Amirova. 1690-1692 [doi]
- Impact of programming languages on energy consumption for mobile devicesZamira Kholmatova. 1693-1695 [doi]
- Recommender systems: metric suggestion mechanisms applied to adaptable software dashboardsDragos Strugar. 1696-1698 [doi]
- Repairing confusion and bias errors for DNN-based image classifiersYuchi Tian. 1699-1700 [doi]
- Synthesizing correct code for machine learning programsJoshua Gisi. 1701-1703 [doi]