Abstract is missing.
- AI-assisted programming: applications, user experiences, and neuro-symbolic techniques (keynote)Sumit Gulwani. 1 [doi]
- On safety, assurance, and reliability: a software engineering perspective (keynote)Marsha Chechik. 2 [doi]
- Task modularity and the emergence of software value streams (impact award paper keynote)Gail C. Murphy, Mik Kersten. 3 [doi]
- Academic prototyping (invited tutorial)Andreas Zeller. 4 [doi]
- Multi-perspective representation learning for source code analytics (invited tutorial)Zhi Jin. 5 [doi]
- Adaptive fairness improvement based on causality analysisMengdi Zhang, Jun Sun 0001. 6-17 [doi]
- NatGen: generative pre-training by "naturalizing" source codeSaikat Chakraborty, Toufique Ahmed, Yangruibo Ding, Premkumar T. Devanbu, Baishakhi Ray. 18-30 [doi]
- Testing of autonomous driving systems: where are we and where should we go?Guannan Lou, Yao Deng, Xi Zheng, Mengshi Zhang, Tianyi Zhang 0001. 31-43 [doi]
- Fuzzing deep-learning libraries via automated relational API inferenceYinlin Deng, Chenyuan Yang, Anjiang Wei, Lingming Zhang. 44-56 [doi]
- SEDiff: scope-aware differential fuzzing to test internal function models in symbolic executionPenghui Li 0001, Wei Meng 0001, Kangjie Lu. 57-69 [doi]
- Perfect is the enemy of test oracleAli Reza Ibrahimzada, Yigit Varli, Dilara Tekinoglu, Reyhaneh Jabbarvand. 70-81 [doi]
- Scenario-based test reduction and prioritization for multi-module autonomous driving systemsYao Deng, Xi Zheng, Mengshi Zhang, Guannan Lou, Tianyi Zhang 0001. 82-93 [doi]
- MOSAT: finding safety violations of autonomous driving systems using multi-objective genetic algorithmHaoxiang Tian, Yan Jiang, Guoquan Wu, Jiren Yan, Jun Wei 0001, Wei Chen 0018, Shuo Li, Dan Ye. 94-106 [doi]
- Are we building on the rock? on the importance of data preprocessing for code summarizationLin Shi 0006, Fangwen Mu, Xiao Chen, Song Wang, Junjie Wang, Ye Yang, Ge Li, Xin Xia, Qing Wang 0001. 107-119 [doi]
- Correlates of programmer efficacy and their link to experience: a combined EEG and eye-tracking studyNorman Peitek, Annabelle Bergum, Maurice Rekrut, Jonas Mucke, Matthias Nadig, Chris Parnin, Janet Siegmund, Sven Apel. 120-131 [doi]
- What motivates software practitioners to contribute to inner source?Zhiyuan Wan, Xin Xia 0001, Yun Zhang, David Lo 0001, Daibing Zhou, Qiuyuan Chen, Ahmed E. Hassan. 132-144 [doi]
- A retrospective study of one decade of artifact evaluationsStefan Winter 0001, Christopher Steven Timperley, Ben Hermann 0001, Jürgen Cito, Jonathan Bell 0001, Michael Hilton, Dirk Beyer 0001. 145-156 [doi]
- Quantifying community evolution in developer social networksLiang Wang, Ying Li, Jierui Zhang, XianPing Tao. 157-169 [doi]
- Understanding skills for OSS communities on GitHubJenny T. Liang, Thomas Zimmermann 0001, Denae Ford. 170-182 [doi]
- Accurate method and variable tracking in commit historyMehran Jodavi, Nikolaos Tsantalis. 183-195 [doi]
- Classifying edits to variability in source codePaul Maximilian Bittner, Christof Tinnes, Alexander Schultheiß, Sören Viegener, Timo Kehrer, Thomas Thüm. 196-208 [doi]
- The evolution of type annotations in python: an empirical studyLuca Di Grazia, Michael Pradel. 209-220 [doi]
- UTANGO: untangling commits with context-aware, graph-based, code change clustering learning modelYi Li, Shaohua Wang 0002, Tien N. Nguyen. 221-232 [doi]
- Static executes-before analysis for event driven programsRekha R. Pai, Abhishek Uppar, Akshatha Shenoy, Pranshul Kushwaha, Deepak D'Souza. 233-244 [doi]
- Security code smells in apps: are we getting better? Steven Arzt. 245-255 [doi]
- Large-scale analysis of non-termination bugs in real-world OSS projectsXiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li. 256-268 [doi]
- On-the-fly syntax highlighting using neural networksMarco Edoardo Palma, Pasquale Salza, Harald C. Gall. 269-280 [doi]
- Declarative smart contractsHaoxian Chen, Gerald Whitters, Mohammad Javad Amiri, Yuepeng Wang 0001, Boon Thau Loo. 281-293 [doi]
- Asynchronous technical interviews: reducing the effect of supervised think-aloud on communication abilityMahnaz Behroozi, Chris Parnin, Chris Brown 0001. 294-305 [doi]
- How to formulate specific how-to questions in software development?Mingwei Liu, Xin Peng 0001, Andrian Marcus, Christoph Treude, Jiazhan Xie, Huanjun Xu, Yanjun Yang. 306-318 [doi]
- Pair programming conversations with agents vs. developers: challenges and opportunities for SE communityPeter Robe, Sandeep Kaur Kuttal, Jake AuBuchon, Jacob Hart. 319-331 [doi]
- Psychologically-inspired, unsupervised inference of perceptual groups of GUI widgets from GUI imagesMulong Xie, Zhenchang Xing, Sidong Feng, Xiwei Xu, Liming Zhu 0001, Chunyang Chen. 332-343 [doi]
- Toward interactive bug reporting for (android app) end-usersYang Song, Junayed Mahmud, Ying Zhou, Oscar Chaparro, Kevin Moran, Andrian Marcus, Denys Poshyvanyk. 344-356 [doi]
- Understanding performance problems in deep learning systemsJunming Cao, Bihuan Chen 0001, Chao Sun, Longjie Hu, Shuaihong Wu, Xin Peng 0001. 357-369 [doi]
- API recommendation for machine learning libraries: how far are we?Moshi Wei, Yuchao Huang, Junjie Wang 0001, Jiho Shin, Nima Shiri Harzevili, Song Wang 0009. 370-381 [doi]
- No more fine-tuning? an experimental evaluation of prompt tuning in code intelligenceChaozheng Wang, Yuanhang Yang, Cuiyun Gao, Yun Peng, Hongyu Zhang 0002, Michael R. Lyu. 382-394 [doi]
- Cross-device record and replay for Android appsCong Li, Yanyan Jiang 0001, Chang Xu 0001. 395-407 [doi]
- Online testing of RESTful APIs: promises and challengesAlberto Martin-Lopez, Sergio Segura, Antonio Ruiz Cortés. 408-420 [doi]
- Avgust: automating usage-based test generation from videos of app executionsYixue Zhao, Saghar Talebipour, Kesina Baral, Hyojae Park, Leon Yee, Safwat Ali Khan, Yuriy Brun, Nenad Medvidovic, Kevin Moran. 421-433 [doi]
- Detecting non-crashing functional bugs in Android apps via deep-state differential analysisJue Wang, Yanyan Jiang 0001, Ting Su 0001, Shaohua Li, Chang Xu, Jian Lu 0001, Zhendong Su 0001. 434-446 [doi]
- RoboFuzz: fuzzing robotic systems over robot operating system (ROS) for finding correctness bugsSeulbae Kim, Taesoo Kim. 447-458 [doi]
- AgileCtrl: a self-adaptive framework for configuration tuningShu Wang, Henry Hoffmann, Shan Lu 0001. 459-471 [doi]
- Using nudges to accelerate code reviews at scaleQianhua Shan, David Sukhdeo, Qianying Huang, Seth Rogers, Lawrence Chen, Elise Paradis, Peter C. Rigby, Nachiappan Nagappan. 472-482 [doi]
- First come first served: the impact of file position on code reviewEnrico Fregnan, Larissa Braz, Marco D'Ambros, Gül Çalikli, Alberto Bacchelli. 483-494 [doi]
- Code, quality, and process metrics in graduated and retired ASFI projectsStefan Stanciulescu, Likang Yin, Vladimir Filkov. 495-506 [doi]
- CommentFinder: a simpler, faster, more accurate code review comments recommendationYang Hong, Chakkrit Tantithamthavorn, Patanamon Thongtanunam, Aldeida Aleti. 507-519 [doi]
- AutoPruner: transformer-based call graph pruningThanh Le-Cong, Hong Jin Kang, Truong-Giang Nguyen, Stefanus Agus Haryono, David Lo 0001, Xuan-Bach D. Le, Huynh Quyet Thang. 520-532 [doi]
- Lighting up supervised learning in user review-based code localization: dataset and benchmarkXinwen Hu, Yu Guo, Jianjie Lu, Zheling Zhu, Chuanyi Li, JiDong Ge, LiGuo Huang, Bin Luo 0003. 533-545 [doi]
- CORMS: a GitHub and Gerrit based hybrid code reviewer recommendation approach for modern code reviewPrahar Pandya, Saurabh Tiwari 0001. 546-557 [doi]
- Hierarchical Bayesian multi-kernel learning for integrated classification and summarization of app reviewsMoayad Alshangiti, Weishi Shi, Eduardo Lima, Xumin Liu, Qi Yu 0001. 558-569 [doi]
- Semi-supervised pre-processing for learning-based traceability framework on real-world software projectsLiming Dong 0001, He Zhang, Wei Liu, Zhiluo Weng, Hongyu Kuang. 570-582 [doi]
- Input invariantsDominic Steinhöfel, Andreas Zeller. 583-594 [doi]
- Modus: a Datalog dialect for building container imagesChris Tomy, Tingmao Wang, Earl T. Barr, Sergey Mechtaev. 595-606 [doi]
- Multi-phase invariant synthesisDaniel Riley, Grigory Fedyukovich. 607-619 [doi]
- Parasol: efficient parallel synthesis of large model spacesClay Stevens, Hamid Bagheri. 620-632 [doi]
- Neural termination analysisMirco Giacobbe, Daniel Kroening, Julian Parsert. 633-645 [doi]
- PaReco: patched clones and missed patches among the divergent variants of a software familyPoedjadevie Kadjel Ramkisoen, John Businge, Brent van Bladel, Alexandre Decan, Serge Demeyer, Coen De Roover, Foutse Khomh. 646-658 [doi]
- Fault localization to detect co-change fixing locationsYi Li, Shaohua Wang 0002, Tien N. Nguyen. 659-671 [doi]
- The best of both worlds: integrating semantic features with expert features for defect prediction and localizationChao Ni, Wei Wang 0087, Kaiwen Yang, Xin Xia 0001, Kui Liu, David Lo 0001. 672-683 [doi]
- An exploratory study on the predominant programming paradigms in Python codeRobert Dyer 0001, Jigyasa Chauhan. 684-695 [doi]
- Making Python code idiomatic by automatic refactoring non-idiomatic Python code with pythonic idiomsZejun Zhang, Zhenchang Xing, Xin Xia 0001, Xiwei Xu, Liming Zhu 0001. 696-708 [doi]
- An empirical study of blockchain system vulnerabilities: modules, types, and patternsXiao Yi, Daoyuan Wu, Lingxiao Jiang, Yuzhou Fang, Kehuan Zhang, Wei Zhang. 709-721 [doi]
- How to better utilize code graphs in semantic code search?Yucen Shi, Ying Yin, Zhengkui Wang, David Lo 0001, Tao Zhang, Xin Xia 0001, Yuhai Zhao, Bowen Xu. 722-733 [doi]
- 23 shades of self-admitted technical debt: an empirical study on machine learning softwareDavid O'Brien, Sumon Biswas, Sayem Imtiaz, Rabe Abdalkareem, Emad Shihab, Hridesh Rajan. 734-746 [doi]
- NeuDep: neural binary memory dependence analysisKexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray. 747-759 [doi]
- DynaPyt: a dynamic analysis framework for PythonAryaz Eghbali, Michael Pradel. 760-771 [doi]
- Cross-language Android permission specificationChaoran Li, Xiao Chen 0002, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang 0001. 772-783 [doi]
- Peahen: fast and precise static deadlock detection via context reductionYuandao Cai, Chengfeng Ye, Qingkai Shi, Charles Zhang. 784-796 [doi]
- A case study of implicit mentoring, its prevalence, and impact in ApacheZixuan Feng, Amreeta Chatterjee, Anita Sarma, Iftekhar Ahmed 0001. 797-809 [doi]
- Software security during modern code review: the developer's perspectiveLarissa Braz, Alberto Bacchelli. 810-821 [doi]
- Program merge conflict resolution via neural transformersAlexey Svyatkovskiy, Sarah Fakhoury, Negar Ghorbani, Todd Mytkowicz, Elizabeth Dinella, Christian Bird, Jinu Jang, Neel Sundaresan, Shuvendu K. Lahiri. 822-833 [doi]
- Automated unearthing of dangerous issue reportsShengyi Pan, Jiayuan Zhou, Filipe Roseiro Côgo, Xin Xia 0001, Lingfeng Bao, Xing Hu, Shanping Li, Ahmed E. Hassan. 834-846 [doi]
- On the vulnerability proneness of multilingual codeWen Li, Li Li 0029, Haipeng Cai. 847-859 [doi]
- Tracking patches for open source software vulnerabilitiesCongying Xu, Bihuan Chen 0001, Chenhao Lu, Kaifeng Huang, Xin Peng 0001, Yang Liu 0003. 860-871 [doi]
- DeJITLeak: eliminating JIT-induced timing side-channel leaksQi Qin, JulianAndres JiYang, Fu Song, Taolue Chen, Xinyu Xing. 872-884 [doi]
- Quantitative relational modelling with QAlloyPedro Silva, José N. Oliveira, Nuno Macedo, Alcino Cunha. 885-896 [doi]
- Demystifying the underground ecosystem of account registration botsYuhao Gao, Guoai Xu, Li Li 0029, Xiapu Luo, Chenyu Wang, Yulei Sui. 897-909 [doi]
- Using graph neural networks for program terminationYoav Alon, Cristina David. 910-921 [doi]
- PyTER: effective program repair for Python type errorsWonseok Oh, Hakjoo Oh. 922-934 [doi]
- VulRepair: a T5-based automated software vulnerability repairMichael Fu, Chakkrit Tantithamthavorn, Trung Le, Van Nguyen, Dinh Q. Phung. 935-947 [doi]
- DeepDev-PERF: a deep learning-based approach for improving software performanceSpandan Garg, Roshanak Zilouchian Moghaddam, Colin B. Clement, Neel Sundaresan, Chen Wu. 948-958 [doi]
- Less training, more repairing please: revisiting automated program repair via zero-shot learningChunqiu Steven Xia, Lingming Zhang. 959-971 [doi]
- NL2Viz: natural language to visualization via constrained syntax-guided synthesisZhengkai Wu, Vu Le 0002, Ashish Tiwari 0001, Sumit Gulwani, Arjun Radhakrishna, Ivan Radicek, Gustavo Soares, Xinyu Wang 0006, Zhenwen Li, Tao Xie 0001. 972-983 [doi]
- AccessiText: automated detection of text accessibility issues in Android appsAbdulaziz Alshayban, Sam Malek. 984-995 [doi]
- Actionable and interpretable fault localization for recurring failures in online service systemsZeyan Li, Nengwen Zhao, Mingjie Li 0005, Xianglin Lu, Lixin Wang, Dongdong Chang, Xiaohui Nie, Li Cao, Wenchi Zhang, Kaixin Sui, Yanhua Wang, Xu Du, Guoqiang Duan, Dan Pei. 996-1008 [doi]
- AUGER: automatically generating review comments with pre-training modelsLingwei Li, Li Yang, Huaxi Jiang, Jun Yan, Tiejian Luo, Zihan Hua, Geng Liang, Chun Zuo. 1009-1021 [doi]
- Automatically deriving JavaScript static analyzers from specifications using Meta-level static analysisJihyeok Park, Seungmin An, Sukyoung Ryu. 1022-1034 [doi]
- Automating code review activities by large-scale pre-trainingZhiyu Li, Shuai Lu, Daya Guo, Nan Duan, Shailesh Jannu, Grant Jenks, Deep Majumder, Jared Green, Alexey Svyatkovskiy, Shengyu Fu, Neel Sundaresan. 1035-1047 [doi]
- Corporate dominance in open source ecosystems: a case study of OpenStackYuxia Zhang, Klaas-Jan Stol, Hui Liu, Minghui Zhou. 1048-1060 [doi]
- Detecting Simulink compiler bugs via controllable zombie blocks mutationShikai Guo, He Jiang 0001, Zhihao Xu, Xiaochen Li, Zhilei Ren, Zhide Zhou, Rong Chen 0003. 1061-1072 [doi]
- Diet code is healthy: simplifying programs for pre-trained models of codeZhaowei Zhang, Hongyu Zhang 0002, Beijun Shen, Xiaodong Gu 0002. 1073-1084 [doi]
- Do bugs lead to unnaturalness of source code?Yanjie Jiang, Hui Liu, Yuxia Zhang, Weixing Ji, Hao Zhong 0001, Lu Zhang 0023. 1085-1096 [doi]
- Generating realistic vulnerabilities via neural code editing: an empirical studyYu Nong, Yuzhe Ou, Michael Pradel, Feng Chen 0001, Haipeng Cai. 1097-1109 [doi]
- Generic sensitivity: customizing context-sensitive pointer analysis for genericsHaofeng Li, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li 0002, Lin Gao 0002. 1110-1121 [doi]
- MAAT: a novel ensemble approach to addressing fairness and performance bugs for machine learning softwareZhenpeng Chen, Jie M. Zhang, Federica Sarro, Mark Harman. 1122-1134 [doi]
- Minerva: browser API fuzzing with dynamic mod-ref analysisChijin Zhou, Quan Zhang, Mingzhe Wang, Lihua Guo, Jie Liang, Zhe Liu, Mathias Payer, Yu Jiang 0001. 1135-1147 [doi]
- NMTSloth: understanding and testing efficiency degradation of neural machine translation systemsSimin Chen, Cong Liu, Mirazul Haque, Zihe Song, Wei Yang 0013. 1148-1160 [doi]
- Putting them under microscope: a fine-grained approach for detecting redundant test cases in natural languageZhiyuan Chang, Mingyang Li, Junjie Wang, Qing Wang, Shoubin Li. 1161-1172 [doi]
- RULER: discriminative and iterative adversarial training for deep neural network fairnessGuanhong Tao, Weisong Sun, Tingxu Han, Chunrong Fang, Xiangyu Zhang 0001. 1173-1184 [doi]
- SamplingCA: effective and efficient sampling-based pairwise testing for highly configurable software systemsChuan Luo, Qiyuan Zhao, Shaowei Cai, Hongyu Zhang 0002, Chunming Hu. 1185-1197 [doi]
- SPINE: a scalable log parser with feedback guidanceXuheng Wang, Xu Zhang, Liqun Li, Shilin He, Hongyu Zhang, Yudong Liu, Lingling Zheng, Yu Kang, Qingwei Lin, Yingnong Dang, Saravanakumar Rajmohan, Dongmei Zhang 0001. 1198-1208 [doi]
- SymMC: approximate model enumeration and counting using symmetry information for Alloy specificationsWenxi Wang, Yang Hu, Kenneth L. McMillan, Sarfraz Khurshid. 1209-1220 [doi]
- TraceCRL: contrastive representation learning for microservice trace analysisChenxi Zhang, Xin Peng 0001, Tong Zhou, Chaofeng Sha, Zhenghui Yan, Yiru Chen, Hong Yang. 1221-1232 [doi]
- You see what I want you to see: poisoning vulnerabilities in neural code searchYao Wan, Shijie Zhang, Hongyu Zhang 0002, Yulei Sui, Guandong Xu, Dezhong Yao 0002, Hai Jin 0001, Lichao Sun. 1233-1245 [doi]
- Nalanda: a socio-technical graph platform for building software analytics tools at enterprise scaleChandra Shekhar Maddila, Suhas Shanbhogue, Apoorva Agrawal, Thomas Zimmermann 0001, Chetan Bansal, Nicole Forsgren, Divyanshu Agrawal, Kim Herzig, Arie van Deursen. 1246-1256 [doi]
- Uncertainty-aware transfer learning to evolve digital twins for industrial elevatorsQingHua Xu, Shaukat Ali 0001, Tao Yue 0002, Maite Arratibel. 1257-1268 [doi]
- All you need is logs: improving code completion by learning from anonymous IDE usage logsVitaliy Bibaev, Alexey Kalina, Vadim Lomshakov, Yaroslav Golubev, Alexander Bezzubov, Nikita Povarov, Timofey Bryksin. 1269-1279 [doi]
- Testing of machine learning models with limited samples: an industrial vacuum pumping applicationAyan Chatterjee, Bestoun S. Ahmed, Erik Hallin, Anton Engman. 1280-1290 [doi]
- Improving ML-based information retrieval software with user-driven functional testing and defect class analysisJunJie Zhu, Teng Long, Wei Wang, Atif M. Memon. 1291-1301 [doi]
- What improves developer productivity at google? code qualityLan Cheng, Emerson R. Murphy-Hill, Mark Canning, Ciera Jaspan, Collin Green, Andrea Knight, Nan Zhang, Elizabeth Kammer 0001. 1302-1313 [doi]
- Understanding why we cannot model how long a code review will take: an industrial case studyLawrence Chen, Peter C. Rigby, Nachiappan Nagappan. 1314-1319 [doi]
- Leveraging test plan quality to improve code review efficacyLawrence Chen, Rui Abreu 0001, Tobi Akomolede, Peter C. Rigby, Satish Chandra 0001, Nachiappan Nagappan. 1320-1330 [doi]
- Are elevator software robust against uncertainties? results and experiences from an industrial case studyLiping Han, Tao Yue 0002, Shaukat Ali 0001, Aitor Arrieta, Maite Arratibel. 1331-1342 [doi]
- Achievement unlocked: a case study on gamifying DevOps practices in industryPatrick Ayoup, Diego Elias Costa, Emad Shihab. 1343-1354 [doi]
- Sometimes you have to treat the symptoms: tackling model drift in an industrial clone-and-own software product lineChristof Tinnes, Wolfgang Rössler, Uwe Hohenstein, Torsten Kühn, Andreas Biesdorf, Sven Apel. 1355-1366 [doi]
- Input splitting for cloud-based static application security testing platformsMaria Christakis, Thomas Cottenier, Antonio Filieri, Linghui Luo, Muhammad Numair Mansur, Lee Pike, Nicolás Rosner, Martin Schäf, Aritra Sengupta, Willem Visser. 1367-1378 [doi]
- Metadata-based retrieval for resolution recommendation in AIOpsHarshit Kumar, Ruchi Mahindru, Debanjana Kar. 1379-1389 [doi]
- Workgraph: personal focus vs. interruption for engineers at MetaYifen Chen, Peter C. Rigby, Yulin Chen, Kun Jiang, Nader Dehghani, Qianying Huang, Peter Cottle, Clayton Andrews, Noah Lee, Nachiappan Nagappan. 1390-1397 [doi]
- Understanding automated code review process and developer experience in industryHyungjin Kim, Yonghwi Kwon 0003, Sangwoo Joh, Hyukin Kwon, Yeonhee Ryou, Taeksu Kim. 1398-1407 [doi]
- Unite: an adapter for transforming analysis tools to web services via OSLCOndrej Vasícek, Jan Fiedor, Tomas Kratochvila, Bohuslav Krena, Ales Smrcka, Tomás Vojnar. 1408-1418 [doi]
- Discovering feature flag interdependencies in Microsoft officeMichael Schröder, Katja Kevic, Dan Gopstein, Brendan Murphy, Jennifer Beckmann. 1419-1429 [doi]
- What did you pack in my app? a systematic analysis of commercial Android packersZikan Dong, Hongxuan Liu, Liu Wang 0002, Xiapu Luo, Yao Guo 0001, Guoai Xu, Xusheng Xiao, Haoyu Wang 0001. 1430-1440 [doi]
- An empirical study of deep transfer learning-based program repair for Kotlin projectsMisoo Kim, YoungKyoung Kim, Hohyeon Jeong, Jinseok Heo, Sungoh Kim, HyunHee Chung, Eunseok Lee. 1441-1452 [doi]
- An empirical investigation of missing data handling in cloud node failure predictionMinghua Ma, Yudong Liu, Yuang Tong, Haozhe Li, Pu Zhao, Yong Xu, Hongyu Zhang, Shilin He, Lu Wang, Yingnong Dang, Saravanakumar Rajmohan, Qingwei Lin. 1453-1464 [doi]
- An empirical study of log analysis at MicrosoftShilin He, Xu Zhang, Pinjia He, Yong Xu, Liqun Li, Yu Kang, Minghua Ma, Yining Wei, Yingnong Dang, Saravanakumar Rajmohan, Qingwei Lin. 1465-1476 [doi]
- AutoTSG: learning and synthesis for incident troubleshootingManish Shetty, Chetan Bansal, Sai Pramod Upadhyayula, Arjun Radhakrishna, Anurag Gupta. 1477-1488 [doi]
- Demystifying "removed reviews" in iOS app storeLiu Wang, Haoyu Wang, Xiapu Luo, Tao Zhang, Shangguang Wang, Xuanzhe Liu. 1489-1499 [doi]
- Exploring and evaluating personalized models for code generationAndrei Zlotchevski, Dawn Drain, Alexey Svyatkovskiy, Colin B. Clement, Neel Sundaresan, Michele Tufano. 1500-1508 [doi]
- FlakeRepro: automated and efficient reproduction of concurrency-related flaky testsTanakorn Leesatapornwongsa, Xiang Ren, Suman Nath. 1509-1520 [doi]
- Group-based corpus scheduling for parallel fuzzingTaotao Gu, Xiang Li, Shuaibing Lu, Jianwen Tian, Yuanping Nie, Xiaohui Kuang, Zhechao Lin, Chenyifan Liu, Jie Liang, Yu Jiang. 1521-1532 [doi]
- Incorporating domain knowledge through task augmentation for front-end JavaScript code generationSijie Shen, Xiang Zhu, Yihong Dong, Qizhi Guo, Yankun Zhen, Ge Li. 1533-1543 [doi]
- Industry experiences with large-scale refactoringJames Ivers, Robert L. Nord, Ipek Ozkaya, Chris Seifried, Christopher Steven Timperley, Marouane Kessentini. 1544-1554 [doi]
- Industry practice of configuration auto-tuning for cloud applications and servicesRunzhe Wang, Qinglong Wang, Yuxi Hu, Heyuan Shi, Yuheng Shen, Yu Zhan, Ying Fu, Zheng Liu, Xiaohai Shi, Yu Jiang. 1555-1565 [doi]
- Investigating and improving log parsing in practiceYing Fu, Meng Yan, Jian Xu, Jianguo Li, Zhongxin Liu, Xiaohong Zhang, Dan Yang. 1566-1577 [doi]
- Towards developer-centered automatic program repair: findings from BloombergEmily Rowan Winter, Vesna Nowack, David Bowes, Steve Counsell, Tracy Hall, Sæmundur Haraldsson, John R. Woodward, Serkan Kirbas, Etienne Windels, Olayori McBello, Abdurahman Atakishiyev, Kevin Kells, Matthew W. Pagano. 1578-1588 [doi]
- Trace analysis based microservice architecture measurementXin Peng 0001, Chenxi Zhang, Zhongyuan Zhao, Akasaka Isami, Xiaofeng Guo, Yunna Cui. 1589-1599 [doi]
- In war and peace: the impact of world politics on software ecosystemsRaula Gaikovina Kula, Christoph Treude. 1600-1604 [doi]
- Discrepancies among pre-trained deep neural networks: a new threat to model zoo reliabilityDiego Montes, Pongpatapee Peerapatanapokin, Jeff Schultz, Chengjun Guo, Wenxin Jiang, James C. Davis. 1605-1609 [doi]
- Exploring the under-explored terrain of non-open source data for software engineering through the lens of federated learningShriram Shanbhag, Sridhar Chimalakonda. 1610-1614 [doi]
- Reflections on software failure analysisPaschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis. 1615-1620 [doi]
- Language-agnostic dynamic analysis of multilingual code: promises, pitfalls, and prospectsHaoran Yang, Wen Li, Haipeng Cai. 1621-1626 [doi]
- A study on identifying code author from real developmentSiyi Gong, Hao Zhong. 1627-1631 [doi]
- Paving the way for mature secondary research: the seven types of literature reviewPaul Ralph, Sebastian Baltes. 1632-1636 [doi]
- iTiger: an automatic issue title generation toolTing Zhang, Ivana Clairine Irsan, Ferdian Thung, DongGyun Han, David Lo 0001, Lingxiao Jiang. 1637-1641 [doi]
- CodeMatcher: a tool for large-scale code search based on query semantics matchingChao Liu, Xuanlin Bao, Xin Xia 0001, Meng Yan, David Lo 0001, Ting Zhang. 1642-1646 [doi]
- Context-aware code recommendation in Intellij IDEAShamsa Abid, Hamid Abdul Basit, Shafay Shamail. 1647-1651 [doi]
- Python-by-contract datasetJiyang Zhang, Marko Ristin, Phillip Schanely, Hans Wernher van de Venn, Milos Gligoric. 1652-1656 [doi]
- MultIPAs: applying program transformations to introductory programming assignments for data augmentationPedro Orvalho, Mikolás Janota, Vasco M. Manquinho. 1657-1661 [doi]
- PolyFax: a toolkit for characterizing multi-language softwareWen Li, Li Li 0029, Haipeng Cai. 1662-1666 [doi]
- CLIFuzzer: mining grammars for command-line invocationsAbhilash Gupta, Rahul Gopinath, Andreas Zeller. 1667-1671 [doi]
- RecipeGen++: an automated trigger action programs generatorImam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang, David Lo 0001. 1672-1676 [doi]
- TAPHSIR: towards AnaPHoric ambiguity detection and ReSolution in requirementsSaad Ezzini, Sallam Abualhaija, Chetan Arora 0002, Mehrdad Sabetzadeh. 1677-1681 [doi]
- COREQQA: a COmpliance REQuirements understanding using question answering toolSallam Abualhaija, Chetan Arora 0002, Lionel C. Briand. 1682-1686 [doi]
- SolSEE: a source-level symbolic execution engine for solidityShang-Wei Lin 0001, Palina Tolmach, Ye Liu, Yi Li 0008. 1687-1691 [doi]
- MpBP: verifying robustness of neural networks with multi-path bound propagationYe Zheng, Jiaxiang Liu 0001, Xiaomu Shi. 1692-1696 [doi]
- eGEN: an energy-saving modeling language and code generator for location-sensing of mobile appsKowndinya Boyalakuntla, Marimuthu Chinnakali, Sridhar Chimalakonda, K. Chandrasekaran 0001. 1697-1700 [doi]
- SFLKit: a workbench for statistical fault localizationMarius Smytzek, Andreas Zeller. 1701-1705 [doi]
- WikiDoMiner: wikipedia domain-specific minerSaad Ezzini, Sallam Abualhaija, Mehrdad Sabetzadeh. 1706-1710 [doi]
- RegMiner: mining replicable regression dataset from code repositoriesXuezhi Song, Yun Lin 0001, Yijian Wu, Yifan Zhang, Siang Hwee Ng, Xin Peng 0001, Jin Song Dong, Hong Mei. 1711-1715 [doi]
- FIM: fault injection and mutation for SimulinkEzio Bartocci, Leonardo Mariani, Dejan Nickovic, Drishti Yadav. 1716-1720 [doi]
- JSIMutate: understanding performance results through mutationsThomas Laurent 0003, Paolo Arcaini, Catia Trubiani, Anthony Ventresque. 1721-1725 [doi]
- VulCurator: a vulnerability-fixing commit detectorTruong-Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo 0001. 1726-1730 [doi]
- KVS: a tool for knowledge-driven vulnerability searchingXingqi Cheng, Xiaobing Sun 0001, Lili Bo, Ying Wei. 1731-1735 [doi]
- MANDO-GURU: vulnerability detection for smart contract source code by heterogeneous graph embeddingsHoang H. Nguyen, Nhat-Minh Nguyen, Hong-Phuc Doan, Zahra Ahmadi, Thanh-Nam Doan, Lingxiao Jiang. 1736-1740 [doi]
- FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointersHaoxin Tu, Lingxiao Jiang, Xuhua Ding, He Jiang. 1741-1745 [doi]
- Clang __usercall: towards native support for user defined calling conventionsJared Q. Widberg, Sashank Narain, Yimin Chen 0004. 1746-1750 [doi]
- GFI-bot: automated good first issue recommendation on GitHubHao He, Haonan Su, Wenxin Xiao, Runzhi He, Minghui Zhou. 1751-1755 [doi]
- SemCluster: a semi-supervised clustering tool for crowdsourced test reports with deep image understandingMingzhe Du, Shengcheng Yu, Chunrong Fang, Tongyu Li, Heyuan Zhang, Zhenyu Chen 0001. 1756-1759 [doi]
- TSA: a tool to detect and quantify network side-channelsIsmet Burak Kadron, Tevfik Bultan. 1760-1764 [doi]
- Blackbox adversarial attacks and explanations for automatic speech recognitionXiaoliang Wu. 1765-1769 [doi]
- This is your cue! assisting search behaviour with resource style propertiesDeeksha M. Arya. 1770-1774 [doi]
- Infrastructure as code for dynamic deploymentsDaniel Sokolowski. 1775-1779 [doi]
- Automated capacity analysis of limitation-aware microservices architecturesRafael Fresno-Aranda. 1780-1784 [doi]
- Change-aware mutation testing for evolving systemsMilos Ojdanic. 1785-1789 [doi]
- Effective and scalable fault injection using bug reports and generative language modelsAhmed Khanfir. 1790-1794 [doi]
- Explaining and debugging pathological program behaviorMartin Eberlein. 1795-1799 [doi]
- Sentiment in software engineering: detection and applicationNathan Cassee. 1800-1804 [doi]
- A practical call graph construction method for PythonJiacheng Zhong. 1805-1807 [doi]
- Automated generation of test oracles for RESTful APIsJuan C. Alonso. 1808-1810 [doi]
- CheapET-3: cost-efficient use of remote DNN modelsMichael Weiss. 1811-1813 [doi]
- Improving IDE code inspections with tree automataYunjeong Lee. 1814-1815 [doi]
- RESTInfer: automated inferring parameter constraints from natural language RESTful API descriptionsYi Liu. 1816-1818 [doi]
- Program analysis using WALA (tutorial)Joanna C. S. Santos, Julian Dolby. 1819 [doi]
- Dynamic data race prediction: fundamentals, theory, and practice (tutorial)Umang Mathur 0001, Andreas Pavlogiannis. 1820 [doi]
- Machine learning and natural language processing for automating software testing (tutorial)Mauro Pezzè. 1821 [doi]
- Performing large-scale mining studies: from start to finish (tutorial)Robert Dyer 0001, Samuel W. Flint. 1822 [doi]