Abstract is missing.
- Programming and execution models for next generation code intelligence systems (keynote)Mira Mezini. 1-2 [doi]
- The 4ps: product, process, people, and productivity: a data-driven approach to improve software engineering (keynote)Nachiappan Nagappan. 3 [doi]
- Interactive analysis of large code bases (invited talk)Gerard J. Holzmann. 4 [doi]
- Managers hate uncertainty: good and bad experiences with adaptive project management (invited talk)Han Schaminée. 5 [doi]
- Industrial best practices for continuous integration (CI) and continuously delivery (CD) (invited talk)John Micco. 6 [doi]
- Huawei's practices on trusted software engineering capability improvement (invited talk)Wilson Wang. 7 [doi]
- Hazard analysis for human-on-the-loop interactions in sUAS systemsMichael Vierhauser, Md Nafee Al Islam, Ankit Agrawal, Jane Cleland-Huang, James Mason. 8-19 [doi]
- An exploratory study of autopilot software bugs in unmanned aerial vehiclesDinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu 0001, Yulei Sui. 20-31 [doi]
- Code integrity attestation for PLCs using black box neural network predictionsYuqi Chen 0001, Christopher M. Poskitt, Jun Sun 0001. 32-44 [doi]
- PHYSFRAME: type checking physical frames of reference for robotic systemsSayali Kate, Michael Chinn, Hongjun Choi, Xiangyu Zhang, Sebastian G. Elbaum. 45-56 [doi]
- Automating serverless deployments for DevOps organizationsDaniel Sokolowski, Pascal Weisenburger, Guido Salvaneschi. 57-69 [doi]
- Algebraic-datatype taint tracking, with applications to understanding Android identifier leaksSydur Rahaman, Iulian Neamtiu, Xin Yin. 70-82 [doi]
- Vet: identifying and avoiding UI exploration tarpitsWenyu Wang, Wei Yang, Tianyin Xu, Tao Xie 0001. 83-94 [doi]
- Checking conformance of applications against GUI policiesZhen Zhang, Yu Feng, Michael D. Ernst, Sebastian Porst, Isil Dillig. 95-106 [doi]
- Data-driven accessibility repair revisited: on the effectiveness of generating labels for icons in Android appsForough Mehralian, Navid Salehnamadi, Sam Malek. 107-118 [doi]
- Benchmarking automated GUI testing for Android against real-world bugsTing Su 0001, Jue Wang, Zhendong Su. 119-130 [doi]
- Checking LTL[F, G, X] on compressed traces in polynomial timeMinjian Zhang, Umang Mathur 0001, Mahesh Viswanathan 0001. 131-143 [doi]
- Conditional interpolation: making concurrent program verification more effectiveJie Su, Cong Tian, Zhenhua Duan. 144-154 [doi]
- AlloyMax: bringing maximum satisfaction to relational specificationsChangjian Zhang, Ryan Wagner, Pedro Orvalho, David Garlan, Vasco M. Manquinho, Ruben Martins, Eunsuk Kang. 155-167 [doi]
- Timely and accurate detection of model deviation in self-adaptive software-intensive systemsYanxiang Tong, Yi Qin 0002, Yanyan Jiang 0001, Chang Xu 0001, Chun Cao, Xiaoxing Ma. 168-180 [doi]
- Lightweight and modular resource leak verificationMartin Kellogg, Narges Shadab, Manu Sridharan, Michael D. Ernst. 181-192 [doi]
- JSISOLATE: lightweight in-browser JavaScript isolationMingxue Zhang, Wei Meng 0001. 193-204 [doi]
- Cross-language code search using static and dynamic analysesGeorge Mathew, Kathryn T. Stolee. 205-217 [doi]
- Automating the removal of obsolete TODO commentsZhipeng Gao, Xin Xia 0001, David Lo 0001, John C. Grundy, Thomas Zimmermann 0001. 218-229 [doi]
- Estimating residual risk in greybox fuzzingMarcel Böhme, Danushka Liyanage, Valentin Wüstholz. 230-241 [doi]
- HeteroFuzz: fuzz testing to detect platform dependent divergence for heterogeneous applicationsQian Zhang, Jiyuan Wang, Miryung Kim. 242-254 [doi]
- Sound and efficient concurrency bug predictionYan Cai 0001, Hao Yun, Jinqiu Wang, Lei Qiao, Jens Palsberg. 255-267 [doi]
- Detecting Node.js prototype pollution vulnerabilities via object lookup analysisSong Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao. 268-279 [doi]
- Detecting concurrency vulnerabilities based on partial orders of memory and thread eventsKunpeng Yu, Chenxu Wang, Yan Cai 0001, Xiapu Luo, Zijiang Yang. 280-291 [doi]
- Vulnerability detection with fine-grained interpretationsYi Li, Shaohua Wang 0002, Tien N. Nguyen. 292-303 [doi]
- Identifying casualty changes in software patchesAdriana Sejfia, Yixue Zhao, Nenad Medvidovic. 304-315 [doi]
- ACHyb: a hybrid analysis approach to detect kernel access control vulnerabilitiesYang Hu, Wenxi Wang, Casen Hunger, Riley Wood, Sarfraz Khurshid, Mohit Tiwari. 316-327 [doi]
- Context-aware and data-driven feedback generation for programming assignmentsDowon Song, Woosuk Lee, Hakjoo Oh. 328-340 [doi]
- A syntax-guided edit decoder for neural program repairQihao Zhu, Zeyu Sun, Yuan-an Xiao, Wenjie Zhang, Kang Yuan, Yingfei Xiong 0001, Lu Zhang. 341-353 [doi]
- VarFix: balancing edit expressiveness and search effectiveness in automated program repairChu-Pan Wong, Priscila Santiesteban, Christian Kästner, Claire Le Goues. 354-366 [doi]
- Flaky test detection in Android via event order explorationZhen Dong, Abhishek Tiwari, Xiao-Liang Yu, Abhik Roychoudhury. 367-378 [doi]
- SmartCommit: a graph-based interactive assistant for activity-oriented commitsBo Shen, Wei Zhang 0004, Christian Kästner, Haiyan Zhao, Zhao Wei, Guangtai Liang, Zhi Jin. 379-390 [doi]
- A first look at developers' live chat on GitterLin Shi, Xiao Chen, Ye Yang, Hanzhi Jiang, Ziyou Jiang, Nan Niu, Qing Wang 0001. 391-403 [doi]
- Reel life vs. real life: how software developers share their daily life through vlogsSouti Chattopadhyay, Thomas Zimmermann 0001, Denae Ford. 404-415 [doi]
- An empirical study on challenges of application development in serverless computingJinfeng Wen, Zhenpeng Chen, Yi Liu 0014, Yiling Lou, Yun Ma 0002, Gang Huang 0001, Xin Jin, Xuanzhe Liu. 416-428 [doi]
- Bias in machine learning software: why? how? what to do?Joymallya Chakraborty, Suvodeep Majumder, Tim Menzies. 429-440 [doi]
- Understanding neural code intelligence through program simplificationMd. Rafiqul Islam Rabin, Vincent J. Hellendoorn, Mohammad Amin Alipour. 441-452 [doi]
- Multi-objectivizing software configuration tuningTao Chen 0001, Miqing Li. 453-465 [doi]
- Embedding app-library graph for neural third party library recommendationBo Li, Qiang He 0001, Feifei Chen 0001, Xin Xia 0001, Li Li, John C. Grundy, Yun Yang. 466-477 [doi]
- A large-scale empirical study on Java library migrations: prevalence, trends, and rationalesHao He, Runzhi He, Haiqiao Gu, Minghui Zhou. 478-490 [doi]
- Learning-based extraction of first-order logic representations of API directivesMingwei Liu, Xin Peng 0001, Andrian Marcus, Christoph Treude, Xuefang Bai, Gang Lyu, Jiazhan Xie, Xiaoxin Zhang. 491-502 [doi]
- DIFFBASE: a differential factbase for effective software evolution managementXiuheng Wu, Chenguang Zhu, Yi Li 0008. 503-515 [doi]
- Would you like a quick peek? providing logging support to monitor data processing in big data applicationsZehao Wang, Haoxiang Zhang, Tse-Hsun (Peter) Chen, Shaowei Wang 0002. 516-526 [doi]
- Identifying bad software changes via multimodal anomaly detection for online service systemsNengwen Zhao, Junjie Chen 0003, Zhaoyang Yu, Honglin Wang, Jiesong Li, Bin Qiu, Hongyu Xu, Wenchi Zhang, Kaixin Sui, Dan Pei. 527-539 [doi]
- An automatic refactoring framework for replacing test-production inheritance by mocking mechanismXiao Wang 0030, Lu Xiao 0001, Tingting Yu, Anne Woepse, Sunny Wong. 540-552 [doi]
- ÐArcher: detecting on-chain-off-chain synchronization bugs in decentralized applicationsWuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu 0001, Shing-Chi Cheung. 553-565 [doi]
- iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocationsYibo Wang, Qi Zhang, Kai Li, Yuzhe Tang, Jiaqi Chen, Xiapu Luo, Ting Chen. 566-577 [doi]
- Which abbreviations should be expanded?Yanjie Jiang, Hui Liu, Yuxia Zhang, Nan Niu, Yuhai Zhao, Lu Zhang. 578-589 [doi]
- Validation on machine reading comprehension software without annotated labels: a property-based methodSongqiang Chen, Shuo Jin, Xiaoyuan Xie. 590-602 [doi]
- FLEX: fixing flaky tests in machine learning projects by updating assertion boundsSaikat Dutta 0001, August Shi, Sasa Misailovic. 603-614 [doi]
- Parallel shadow execution to accelerate the debugging of numerical errorsSangeeta Chowdhary, Santosh Nagarakatte. 615-626 [doi]
- Exposing numerical bugs in deep learning via gradient back-propagationMing Yan, Junjie Chen, Xiangyu Zhang, Lin Tan, Gan Wang, Zan Wang. 627-638 [doi]
- Metamorphic testing of Datalog enginesMuhammad Numair Mansur, Maria Christakis, Valentin Wüstholz. 639-650 [doi]
- Synthesis of web layouts from examplesDylan Lukes, John Sarracino, Cora Coleman, Hila Peleg, Sorin Lerner, Nadia Polikarpova. 651-663 [doi]
- Boosting coverage-based fault localization via graph-based representation learningYiling Lou, Qihao Zhu, Jinhao Dong, Xia Li, Zeyu Sun, Dan Hao, Lu Zhang, Lingming Zhang. 664-676 [doi]
- SynGuar: guaranteeing generalization in programming by exampleBo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena. 677-689 [doi]
- StateFormer: fine-grained type recovery from binaries using generative state modelingKexin Pei, Jonas Guan, Matthew Broughton, Zhongtian Chen, Songchen Yao, David Williams-King, Vikas Ummadisetty, Junfeng Yang, Baishakhi Ray, Suman Jana. 690-702 [doi]
- Empirical study of transformers for source codeNadezhda Chirkova, Sergey Troshin. 703-715 [doi]
- Explaining mispredictions of machine learning models using rule inductionJürgen Cito, Isil Dillig, Seohyun Kim 0001, Vijayaraghavan Murali, Satish Chandra 0001. 716-727 [doi]
- Generalizable and interpretable learning for configuration extrapolationYi Ding 0006, Ahsan Pervaiz, Michael Carbin, Henry Hoffmann. 728-740 [doi]
- Lightweight global and local contexts guided method name recommendation with prior knowledgeShangwen Wang, Ming Wen 0001, Bo Lin, Xiaoguang Mao. 741-753 [doi]
- To read or to rotate? comparing the effects of technical reading training and spatial skills training on novice programming abilityMadeline Endres, Madison Fansher, Priti Shah, Westley Weimer. 754-766 [doi]
- Connecting the dots: rethinking the relationship between code and prose writing with functional connectivityZachary Karas, Andrew Jahn, Westley Weimer, Yu Huang 0015. 767-779 [doi]
- LastPyMile: identifying the discrepancy between sources and packagesDuc Ly Vu, Fabio Massacci, Ivan Pashchenko, Henrik Plate, Antonino Sabetta. 780-792 [doi]
- A grounded theory of the role of coordination in software security patch managementNesara Dissanayake, Mansooreh Zahedi, Asangi Jayatilaka, Muhammad Ali Babar. 793-805 [doi]
- TaintStream: fine-grained taint tracking for big data platforms through dynamic code translationChengxu Yang, Yuanchun Li, Mengwei Xu, Zhenpeng Chen, Yunxin Liu, Gang Huang, Xuanzhe Liu. 806-817 [doi]
- Demystifying "bad" error messages in data science librariesYida Tao, Zhihui Chen, Yepang Liu 0001, Jifeng Xuan, Zhiwu Xu 0001, Shengchao Qin. 818-829 [doi]
- NIL: large-scale detection of large-variance clonesTasuku Nakagawa, Yoshiki Higo, Shinji Kusumoto. 830-841 [doi]
- Understanding and detecting server-side request races in web applicationsZhengyi Qiu, Shudi Shao, Qi Zhao 0003, Guoliang Jin. 842-854 [doi]
- Detecting and localizing keyboard accessibility failures in web applicationsPaul T. Chiou, Ali S. Alotaibi, William G. J. Halfond. 855-867 [doi]
- Swarmbug: debugging configuration bugs in swarm roboticsChijung Jung, Ali Ahad, Jinho Jung 0001, Sebastian Elbaum, Yonghwi Kwon 0001. 868-880 [doi]
- Probabilistic Delta debuggingGuancheng Wang, Ruobing Shen, Junjie Chen 0003, Yingfei Xiong 0001, Lu Zhang 0023. 881-892 [doi]
- Finding broken Linux configuration specifications by statically analyzing the Kconfig languageJeho Oh, Necip Fazil Yildiran, Julian Braha, Paul Gazzillo. 893-905 [doi]
- Semantic bug seeding: a learning-based approach for creating realistic bugsJibesh Patra, Michael Pradel. 906-918 [doi]
- Characterizing search activities on stack overflowJiakun Liu, Sebastian Baltes, Christoph Treude, David Lo 0001, Yun Zhang 0011, Xin Xia 0001. 919-931 [doi]
- Authorship attribution of source code: a language-agnostic approach and applicability in software engineeringEgor Bogomolov, Vladimir Kovalenko, Yurii Rebryk, Alberto Bacchelli, Timofey Bryksin. 932-944 [doi]
- Probing model signal-awareness via prediction-preserving input minimizationSahil Suneja, Yunhui Zheng, Yufan Zhuang, Jim Alain Laredo, Alessandro Morari. 945-955 [doi]
- Generating efficient solvers from constraint modelsShu Lin 0003, Na Meng 0001, Wenxin Li. 956-967 [doi]
- A comprehensive study of deep learning compiler bugsQingchao Shen, Haoyang Ma, Junjie Chen 0003, Yongqiang Tian, Shing-Chi Cheung, Xiang Chen. 968-980 [doi]
- Fair preprocessing: towards understanding compositional fairness of data transformers in machine learning pipelineSumon Biswas, Hridesh Rajan. 981-993 [doi]
- Fairea: a model behaviour mutation approach to benchmarking bias mitigation methodsMax Hort, Jie M. Zhang, Federica Sarro, Mark Harman. 994-1006 [doi]
- Feature trace recordingPaul Maximilian Bittner, Alexander Schultheiß, Thomas Thüm, Timo Kehrer, Jeffrey M. Young, Lukas Linsbauer. 1007-1020 [doi]
- A longitudinal analysis of bloated Java dependenciesCésar Soto-Valero, Thomas Durieux, Benoit Baudry. 1021-1031 [doi]
- XAI tools in the public sector: a case study on predicting combined sewer overflowsNicholas Maltbie, Nan Niu, Matthew Van Doren, Reese Johnson. 1032-1044 [doi]
- How disabled tests manifest in test maintainability challenges?Dong Jae Kim, Bo Yang, Jinqiu Yang 0001, Tse-Hsun (Peter) Chen. 1045-1055 [doi]
- Sustainability forecasting for Apache incubator projectsLikang Yin, Zhuangzhi Chen, Qi Xuan, Vladimir Filkov. 1056-1067 [doi]
- Graph-based seed object synthesis for search-based unit testingYun Lin 0001, You Sheng Ong, Jun Sun 0001, Gordon Fraser 0001, Jin Song Dong. 1068-1080 [doi]
- LS-sampling: an effective local search based sampling approach for achieving high t-wise coverageChuan Luo, Binqi Sun, Bo Qiao, Junjie Chen, Hongyu Zhang 0002, Jinkun Lin, Qingwei Lin, Dongmei Zhang. 1081-1092 [doi]
- GLIB: towards automated test oracle for graphically-rich applicationsKe Chen, Yufei Li, Yingfeng Chen, Changjie Fan, Zhipeng Hu, Wei Yang. 1093-1104 [doi]
- Reassessing automatic evaluation metrics for code summarization tasksDevjeet Roy, Sarah Fakhoury, Venera Arnaoudova. 1105-1116 [doi]
- Toward efficient interactions between Python and native librariesJialiang Tan, Yu Chen 0036, Zhenming Liu, Bin Ren, Shuaiwen Leon Song, Xipeng Shen, Xu Liu 0001. 1117-1128 [doi]
- Accelerating JavaScript static analysis via dynamic shortcutsJoonyoung Park, Jihyeok Park, Dongjun Youn, Sukyoung Ryu. 1129-1140 [doi]
- Skeletal approximation enumeration for SMT solver testingPeisen Yao, Heqing Huang, Wensheng Tang, Qingkai Shi, Rongxin Wu, Charles Zhang. 1141-1153 [doi]
- Boosting static analysis accuracy with instrumented test executionsTianyi Chen, Kihong Heo, Mukund Raghothaman. 1154-1165 [doi]
- Symbolic parallel adaptive importance sampling for probabilistic program analysisYicheng Luo, Antonio Filieri, Yuan Zhou. 1166-1177 [doi]
- IDE support for cloud-based static analysesLinghui Luo, Martin Schäf, Daniel Sanchez, Eric Bodden. 1178-1189 [doi]
- A bounded symbolic-size model for symbolic executionDavid Trabish, Shachar Itzhaky, Noam Rinetzky. 1190-1201 [doi]
- Efficient module-level dynamic analysis for dynamic languages with module recontextualizationNikos Vasilakis, Grigoris Ntousakis, Veit Heller, Martin C. Rinard. 1202-1213 [doi]
- Mono2Micro: a practical and effective tool for decomposing monolithic Java applications to microservicesAnup K. Kalia, Jin Xiao, Rahul Krishna, Saurabh Sinha, Maja Vukovic, Debasish Banerjee. 1214-1224 [doi]
- Data-driven test selection at scaleSonu Mehta, Farima Farmahinifarahani, Ranjita Bhagwan, Suraj Guptha, Sina Jafari, Rahul Kumar 0002, Vaibhav Saini, Anirudh Santhiar. 1225-1235 [doi]
- Effective low capacity status prediction for cloud systemsHang Dong, Si-qin, Yong Xu, Bo Qiao, Shandan Zhou, Xian Yang, Chuan Luo, Pu Zhao, Qingwei Lin, Hongyu Zhang, Abulikemu Abuduweili, Sanjay Ramanujan, Karthikeyan Subramanian, Andrew Zhou, Saravanakumar Rajmohan, Dongmei Zhang, Thomas Moscibroda. 1236-1241 [doi]
- Automated code transformation for context propagation in GoAdam Welc. 1242-1252 [doi]
- Onion: identifying incident-indicating logs for cloud systemsXu Zhang, Yong Xu, Si-qin, Shilin He, Bo Qiao, Ze Li, Hongyu Zhang, Xukun Li, Yingnong Dang, Qingwei Lin, Murali Chintalapati, Saravanakumar Rajmohan, Dongmei Zhang. 1253-1263 [doi]
- Generating metamorphic relations for cyber-physical systems with genetic programming: an industrial case studyJon Ayerdi, Valerio Terragni, Aitor Arrieta, Paolo Tonella, Goiuria Sagardui, Maite Arratibel. 1264-1274 [doi]
- Domain adaptation for an automated classification of deontic modalities in software engineering contractsVivek Joshi, Preethu Rose Anish, Smita Ghaisas. 1275-1280 [doi]
- How can manual testing processes be optimized? developer survey, optimization guidelines, and case studiesRoman Haas, Daniel Elsner, Elmar Jürgens, Alexander Pretschner, Sven Apel. 1281-1291 [doi]
- Turnover-induced knowledge loss in practiceMartin P. Robillard. 1292-1302 [doi]
- One thousand and one stories: a large-scale survey of software refactoringYaroslav Golubev, Zarina Kurbatova, Eman Abdullah AlOmar, Timofey Bryksin, Mohamed Wiem Mkaouer. 1303-1313 [doi]
- A comprehensive study on learning-based PE malware family classification methodsYixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li. 1314-1325 [doi]
- Infiltrating security into development: exploring the world's largest software security studyCharles Weir, Sammy Migues, Mike Ware, Laurie A. Williams. 1326-1336 [doi]
- Data-driven extract method recommendations: a study at INGDavid van der Leij, Jasper Binda, Robbert van Dalen, Pieter Vallen, Yaping Luo, Maurício Aniche. 1337-1347 [doi]
- Duplicated code pattern mining in visual programming languagesMiguel Terra-Neves, João Nadkarni, Miguel Ventura, Pedro Resende, Hugo Veiga, António Alegria. 1348-1359 [doi]
- Making smart contract development more secure and easierMeng Ren, Fuchen Ma, Zijing Yin, Ying Fu, Huizhong Li, Wanli Chang 0001, Yu Jiang. 1360-1370 [doi]
- Quantifying no-fault-found test failures to prioritize inspection of flaky tests at EricssonMaaz Hafeez Ur Rehman, Peter C. Rigby. 1371-1380 [doi]
- When life gives you oranges: detecting and diagnosing intermittent job failures at MozillaJohannes Lampel, Sascha Just, Sven Apel, Andreas Zeller. 1381-1392 [doi]
- FuzzBench: an open fuzzer benchmarking platform and serviceJonathan Metzman, László Szekeres, Laurent Simon, Read Sprabery, Abhishek Arya. 1393-1403 [doi]
- An empirical investigation of practical log anomaly detection for online service systemsNengwen Zhao, Honglin Wang, Zeyan Li, Xiao Peng, Gang Wang, Zhu Pan, Yong Wu, Zhen Feng, Xidao Wen, Wenchi Zhang, Kaixin Sui, Dan Pei. 1404-1415 [doi]
- RAPID: checking API usage for the cloud in the cloudMichael Emmi, Liana Hadarean, Ranjit Jhala, Lee Pike, Nicolás Rosner, Martin Schäf, Aritra Sengupta, Willem Visser. 1416-1426 [doi]
- An empirical study of GUI widget detection for industrial mobile gamesJiaming Ye, Ke Chen, Xiaofei Xie, Lei Ma 0003, Ruochen Huang, Yingfeng Chen, Yinxing Xue, Jianjun Zhao. 1427-1437 [doi]
- Intelligent container reallocation at Microsoft 365Bo Qiao, Fangkai Yang, Chuan Luo, Yanan Wang, Johnny Li, Qingwei Lin, Hongyu Zhang, Mohit Datta, Andrew Zhou, Thomas Moscibroda, Saravanakumar Rajmohan, Dongmei Zhang. 1438-1443 [doi]
- Organizational implications of agile adoption: a case study from the public sectorParastoo Mohagheghi, Casper Lassenius. 1444-1454 [doi]
- Towards immersive software archaeology: regaining legacy systems' design knowledge via interactive exploration in virtual realityAdrian Hoff, Michael Nieke, Christoph Seidl 0001. 1455-1458 [doi]
- Reducing the search space of bug inducing commits using failure coverageGabin An, Shin Yoo. 1459-1462 [doi]
- The gas triangle and its challenges to the development of blockchain-powered applicationsGustavo A. Oliva, Ahmed E. Hassan. 1463-1466 [doi]
- Selecting test inputs for DNNs using differential testing with subspecialized model instancesYu-Seung Ma, Shin Yoo, Taeho Kim. 1467-1470 [doi]
- Term interrelations and trends in software engineeringJanusan Baskararajah, Lei Zhang, Andriy Miranskyy. 1471-1474 [doi]
- Software robustness: a survey, a theory, and prospectsJustyna Petke, David Clark, William B. Langdon. 1475-1478 [doi]
- Towards automating code review at scaleVincent J. Hellendoorn, Jason Tsay, Manisha Mukherjee, Martin Hirzel. 1479-1482 [doi]
- Learning type annotation: is big data enough?Kevin Jesse, Premkumar T. Devanbu, Toufique Ahmed. 1483-1486 [doi]
- New visions on metamorphic testing after a quarter of a century of inceptionTsong Yueh Chen, T. H. Tse. 1487-1490 [doi]
- Health of smart ecosystemsNoura El Moussa, Davide Molinelli, Mauro Pezzè, Martin Tappler. 1491-1494 [doi]
- LLSC: a parallel symbolic execution compiler for LLVM IRGuannan Wei 0001, Shangyin Tan, Oliver Bracevac, Tiark Rompf. 1495-1499 [doi]
- OwlEyes-online: a fully automated platform for detecting and localizing UI display issuesYuhui Su, Zhe Liu, Chunyang Chen, Junjie Wang 0001, Qing Wang. 1500-1504 [doi]
- Exploit those code reviews! bigger data for deeper learningRobert Heumüller, Sebastian Nielebock 0001, Frank Ortmeier. 1505-1509 [doi]
- BRAID: an API recommender supporting implicit user feedbackYu Zhou, Haonan Jin, Xinying Yang, Taolue Chen, Krishna Narasimhan, Harald C. Gall. 1510-1514 [doi]
- KGAMD: an API-misuse detector driven by fine-grained API-constraint knowledge graphXiaoxue Ren, Xinyuan Ye, Zhenchang Xing, Xin Xia 0001, Xiwei Xu, Liming Zhu, Jianling Sun. 1515-1519 [doi]
- Sangrahaka: a tool for annotating and querying knowledge graphsHrishikesh Terdalkar, Arnab Bhattacharya. 1520-1524 [doi]
- Code2Que: a tool for improving question titles from mined code snippets in stack overflowZhipeng Gao, Xin Xia 0001, David Lo 0001, John C. Grundy, Yuan-Fang Li. 1525-1529 [doi]
- BF-detector: an automated tool for CI build failure detectionIslem Saidani, Ali Ouni 0001, Moataz Chouchen, Mohamed Wiem Mkaouer. 1530-1534 [doi]
- AlloyFL: a fault localization framework for AlloyTanvir Ahmed Khan, Allison Sullivan, Kaiyuan Wang. 1535-1539 [doi]
- BiasRV: uncovering biased sentiment predictions at runtimeZhou Yang, Muhammad Hilmi Asyrofi, David Lo 0001. 1540-1544 [doi]
- ICME: an informed consent management engine for conformance in smart building environmentsChehara Pathmabandu, John C. Grundy, Mohan Baruwal Chhetri, Zubair Baig. 1545-1549 [doi]
- StackEmo: towards enhancing user experience by augmenting stack overflow with emojisAkhila Sri Manasa Venigalla, Sridhar Chimalakonda. 1550-1554 [doi]
- AC²: towards understanding architectural changes in Python projectsA. Eashaan Rao, Dheeraj Vagavolu, Sridhar Chimalakonda. 1555-1559 [doi]
- csDetector: an open source tool for community smells detectionNuri Almarimi, Ali Ouni 0001, Moataz Chouchen, Mohamed Wiem Mkaouer. 1560-1564 [doi]
- CrossVul: a cross-language vulnerability dataset with commit dataGeorgios Nikitopoulos, Konstantina Dritsa, Panos Louridas, Dimitris Mitropoulos. 1565-1569 [doi]
- Slicer4J: a dynamic slicer for JavaKhaled Ahmed 0004, Mieszko Lis, Julia Rubin. 1570-1574 [doi]
- CrossASR++: a modular differential testing framework for automatic speech recognitionMuhammad Hilmi Asyrofi, Zhou Yang, David Lo 0001. 1575-1579 [doi]
- Frontmatter: mining Android user interfaces at scaleKonstantin Kuznetsov 0001, Chen Fu, Song Gao, David N. Jansen, Lijun Zhang 0001, Andreas Zeller. 1580-1584 [doi]
- GenSys: a scalable fixed-point engine for maximal controller synthesis over infinite state spacesStanly Samuel, Deepak D'Souza, Raghavan Komondoor. 1585-1589 [doi]
- Analysis of specifications of multiparty sessions with dcj-lintErik Horlings, Sung-Shik Jongmans. 1590-1594 [doi]
- Documenting evidence of a reuse of 'a systematic study of the class imbalance problem in convolutional neural networks'Rahul Yedida, Tim Menzies. 1595 [doi]
- Documenting evidence of a reuse of 'on the number of linear regions of deep neural networks'Rahul Yedida, Tim Menzies. 1596 [doi]
- Documenting evidence of a reuse of 'a systematic literature review of techniques and metrics to reduce the cost of mutation testing'Andre Lustosa, Tim Menzies. 1597 [doi]
- Documenting evidence of a reuse of 'RefactoringMiner 2.0'Andre Lustosa, Tim Menzies. 1598 [doi]
- Documenting evidence of a reuse of 'what is a feature? a qualitative study of features in industrial software product lines'Kewen Peng, Tim Menzies. 1599 [doi]
- Documenting evidence of a reuse of '"why should I trust you?": explaining the predictions of any classifier'Kewen Peng, Tim Menzies. 1600 [doi]
- Documenting evidence of a replication of 'populating a release history database from version control and bug tracking systems'Xueqi Yang, Tim Menzies. 1601 [doi]
- Documenting evidence of a replication of 'analyze this! 145 questions for data scientists in software engineering'Xueqi Yang, Tim Menzies. 1602 [doi]
- Documenting evidence of a reproduction of 'is there a "golden" feature set for static warning identification? - an experimental evaluation'Xueqi Yang, Tim Menzies. 1603 [doi]
- A replication of 'DeepBugs: a learning approach to name-based bug detection'Jordan Winkler, Abhimanyu Agarwal, Caleb Tung, Dario Rios Ugalde, Young Jin Jung, James C. Davis. 1604 [doi]
- Investigating documented information for accurate effort estimation in agile software developmentJirat Pasuksmit. 1605-1609 [doi]
- Security guarantees for automated software testingDanushka Liyanage. 1610-1614 [doi]
- Unveiling multiple facets of design degradation in modern code reviewAnderson G. Uchôa. 1615-1619 [doi]
- Freeing hybrid distributed AI training configurationHaoran Wang. 1620-1624 [doi]
- Towards an approach for resource-driven adaptationPaul A. Akiki. 1625-1629 [doi]
- Deployment coordination for cross-functional DevOps teamsDaniel Sokolowski. 1630-1634 [doi]
- Lightweight verification via specialized typecheckersMartin Kellogg. 1635-1639 [doi]
- Multi-location cryptographic code repair with neural-network-based methodologiesYa Xiao. 1640-1644 [doi]
- Improving the effectiveness of peer code review in identifying security defectsRajshakhar Paul. 1645-1649 [doi]
- Reducing cost in continuous integration with a collection of build selection approachesXianhao Jin. 1650-1654 [doi]
- A live environment for inspection and refactoring of software systemsSara Fernandes. 1655-1659 [doi]
- PorkFuzz: testing stateful software-defined network applications with property graphsChaofan Shou. 1660-1662 [doi]
- A qualitative study of cleaning in Jupyter notebooksHelen Dong. 1663-1665 [doi]
- Automated generation of realistic test inputs for web APIsJuan C. Alonso. 1666-1668 [doi]
- Contextualizing toxicity in open source: a qualitative studySophie Cohen. 1669-1671 [doi]
- Accelerating redundancy-based program repair via code representation learning and adaptive patch filteringChen Yang. 1672-1674 [doi]
- SMT solver testing with type and grammar based mutationJiwon Park. 1675-1676 [doi]
- Overcoming metric diversity in meta-analysis for software engineering: proposed approach and a case study on its usage on the effects of software reuseKirill Daniakin. 1677-1679 [doi]
- A general approach to modeling Java framework behaviorsLinghui Luo. 1680-1682 [doi]
- Discovering repetitive code changes in ML systemsMalinda Dilhara. 1683-1685 [doi]
- Does reusing pre-trained NLP model propagate bugs?Mohna Chakraborty. 1686-1688 [doi]
- Mitigating security attacks in kubernetes manifests for security best practices violationShazibul Islam Shamim. 1689-1690 [doi]