Abstract is missing.
- A decade of software quality analysis in practice: Surprises, anecdotes, and lessons learned (keynote)Elmar Jürgens. 1 [doi]
- Towards a new digital business operating system: Speed, data, ecosystems, and empowerment (keynote)Jan Bosch. 2 [doi]
- Compilers are sprinters - IDEs are marathoners (keynote)Peter Gromov. 3 [doi]
- Ten years of JDeodorant: Lessons learned from the hunt for smellsNikolaos Tsantalis, Theodoros Chaikalis, Alexander Chatzigeorgiou. 4-14 [doi]
- Design patterns impact on software quality: Where are the theories?Foutse Khomh, Yann-Gaël Guéhéneuc. 15-25 [doi]
- Benchmarks for software clone detection: A ten-year retrospectiveChanchal K. Roy, James R. Cordy. 26-37 [doi]
- Context is king: The developer perspective on the usage of static analysis toolsCarmine Vassallo, Sebastiano Panichella, Fabio Palomba, Sebastian Proksch, Andy Zaidman, Harald C. Gall. 38-49 [doi]
- Micro-clones in evolving softwareManishankar Mondal, Chanchal K. Roy, Kevin A. Schneider. 50-60 [doi]
- SMARTLOG: Place error log statement by deep understanding of log intentionZhouyang Jia, Shanshan Li, Xiaodong Liu, Xiangke Liao, Yunhuai Liu. 61-71 [doi]
- Exploring the integration of user feedback in automated testing of Android applicationsGiovanni Grano, Adelina Ciurumelea, Sebastiano Panichella, Fabio Palomba, Harald C. Gall. 72-83 [doi]
- Structured random differential testing of instruction decodersNathan Jay, Barton P. Miller. 84-94 [doi]
- Clustering support for inadequate test suite reductionCarmen Coviello, Simone Romano 0001, Giuseppe Scanniello, Alessandro Marchetto, Giuliano Antoniol, Anna Corazza. 95-105 [doi]
- Automatically repairing dependency-related build breakageChristian Macho, Shane McIntosh, Martin Pinzger 0001. 106-117 [doi]
- Mining stackoverflow for program repairXuliang Liu, Hao Zhong. 118-129 [doi]
- Dissection of a bug dataset: Anatomy of 395 patches from Defects4JVictor Sobreira, Thomas Durieux, Fernanda Madeiral Delfim, Martin Monperrus, Marcelo de Almeida Maia. 130-140 [doi]
- Detecting third-party libraries in Android applications with high precision and recallYuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, Hao Chen 0003. 141-152 [doi]
- How do developers fix issues and pay back technical debt in the Apache ecosystem?Georgios Digkas, Mircea Lungu, Paris Avgeriou, Alexander Chatzigeorgiou, Apostolos Ampatzoglou. 153-163 [doi]
- How good is your puppet? An empirically defined and validated quality model for puppetEduard van der Bent, Jurriaan Hage, Joost Visser, Georgios Gousios. 164-174 [doi]
- Maintaining behaviour driven development specifications: Challenges and opportunitiesLeonard Peter Binamungu, Suzanne M. Embury, Nikolaos Konstantinou 0001. 175-184 [doi]
- Recursion aware modeling and discovery for hierarchical software event log analysisMaikel Leemans, Wil M. P. van der Aalst, Mark G. J. van den Brand. 185-196 [doi]
- Automatically exploiting implicit design knowledge when solving the class responsibility assignment problemYongrui Xu, Peng Liang 0001, Muhammad Ali Babar. 197-209 [doi]
- Cross-version defect prediction via hybrid active learning with kernel principal component analysisZhou Xu, Jin Liu, Xiapu Luo, Tao Zhang 0001. 209-220 [doi]
- Using a probabilistic model to predict bug fixesMauricio Soto, Claire Le Goues. 221-231 [doi]
- Connecting software metrics across versions to predict defectsYibin Liu, Yanhui Li, Jianbo Guo, Yuming Zhou, Baowen Xu. 232-243 [doi]
- Classifying stack overflow posts on API issuesMuhammad Ahasanuzzaman, Muhammad Asaduzzaman, Chanchal K. Roy, Kevin A. Schneider. 244-254 [doi]
- Why and how Java developers break APIsAline Brito, Laerte Xavier, André C. Hora, Marco Tulio Valente. 255-265 [doi]
- Mining accurate message formats for service APIsMd. Arafat Hossain, Steve Versteeg, Jun Han, Muhammad Ashad Kabir, Jiaojiao Jiang, Jean-Guy Schneider. 266-276 [doi]
- Mining framework usage graphs from app corporaSergio Mover, Sriram Sankaranarayanan, Rhys Braginton Pettee Olsen, Bor-Yuh Evan Chang. 277-289 [doi]
- A generalized model for visualizing library popularity, adoption, and diffusion within a software ecosystemRaula Gaikovina Kula, Coen De Roover, Daniel M. Germán, Takashi Ishio, Katsuro Inoue. 288-299 [doi]
- Supporting exploratory code search with differencing and visualizationWenjian Liu, Xin Peng, Zhenchang Xing, Junyi Li, Bing Xie, Wenyun Zhao. 300-310 [doi]
- Syntax and sensibility: Using language models to detect and correct syntax errorsEddie Antonio Santos, Joshua Charles Campbell, Dhvani Patel, Abram Hindle, José Nelson Amaral. 311-322 [doi]
- A deep neural network language model with contexts for source codeAnh Tuan Nguyen, Trong Duc Nguyen, Hung Dang Phan, Tien N. Nguyen. 323-334 [doi]
- Efficient features for function matching between binary executablesChariton Karamitas, Athanasios Kehagias. 335-345 [doi]
- Using recurrent neural networks for decompilationDeborah S. Katz, Jason Ruchti, Eric Schulte. 346-356 [doi]
- How do developers discuss rationale?Rana Alkadhi, Manuel Nonnenmacher, Emitza Guzman, Bernd Bruegge. 357-369 [doi]
- Automated quality assessment for crowdsourced test reports of mobile applicationsXin Chen, He Jiang, Xiaochen Li, Tieke He, Zhenyu Chen 0001. 368-379 [doi]
- The impact of refactoring changes on the SZZ algorithm: An empirical studyEdmilson Campos Neto, Daniel Alencar da Costa, Uirá Kulesza. 380-390 [doi]
- An extensible approach for taming the challenges of JavaScript dead code eliminationNiels Groot Obbink, Ivano Malavolta, Gian Luca Scoccia, Patricia Lago. 391-401 [doi]
- Automated refactoring of client-side JavaScript code to ES6 modulesAikaterini Paltoglou, Vassilis E. Zafeiris, Emmanouel A. Giakoumakis, N. A. Diamantidis. 402-412 [doi]
- Improving developers awareness of the exception handling policyTaiza Montenegro, Hugo Melo, Roberta Coelho, Eiji Barbosa. 413-422 [doi]
- Detecting faulty empty cells in spreadsheetsLiang Xu, Shuo Wang, Wensheng Dou, Bo Yang, Chushu Gao, Jun Wei 0001, Tao Huang 0001. 423-433 [doi]
- Detection of protection-impacting changes during software evolutionMarc-André Laverdière, Ettore Merlo. 434-444 [doi]
- Mining sandboxes: Are we there yet?Lingfeng Bao, Tien-Duy B. Le, David Lo. 445-455 [doi]
- DeepWeak: Reasoning common software weaknesses via knowledge graph embeddingZhuobing Han, Xiaohong Li, Hongtao Liu, Zhenchang Xing, Zhiyong Feng. 456-466 [doi]
- Towards just-in-time suggestions for log changes (journal-first abstract)Heng Li, Weiyi Shang, Ying Zou, Ahmed E. Hassan. 467 [doi]
- Which log level should developers choose for a new logging statement? (journal-first abstract)Heng Li, Weiyi Shang, Ahmed E. Hassan. 468 [doi]
- A study of the relation of mobile device attributes with the user-perceived quality of Android apps (journal-first abstract)Ehsan Noei, Mark D. Syer, Ying Zou, Ahmed E. Hassan, Iman Keivanloo. 469 [doi]
- How developers micro-optimize Android apps (journal-first abstract)Mario Linares Vásquez, Christopher Vendome, Michele Tufano, Denys Poshyvanyk. 470 [doi]
- The relationship between evolutionary coupling and defects in large industrial software (journal-first abstract)Serkan Kirbas, Bora Caglayan, Tracy Hall, Steve Counsell, David Bowes, Alper Sen 0001, Ayse Bener. 471 [doi]
- A comparison framework for runtime monitoring approaches (journal-first abstract)Rick Rabiser, Sam Guinea, Michael Vierhauser, Luciano Baresi, Paul Grünbacher. 472 [doi]
- Modularity and architecture of PLC-based software for automated production systems: An analysis in industrial companies (journal-first abstract)Birgit Vogel-Heuser, Juliane Fischer, Stefan Feldmann, Sebastian Ulewicz, Susanne Rösch. 473 [doi]
- A mapping study on design-time quality attributes and metrics (journal-first abstract)Elvira-Maria Arvanitou, Apostolos Ampatzoglou, Alexander Chatzigeorgiou, Matthias Galster, Paris Avgeriou. 474 [doi]
- Review participation in modern code review: An empirical study of the Android, Qt, and OpenStack projects (journal-first abstract)Patanamon Thongtanunam, Shane McIntosh, Ahmed E. Hassan, Hajimu Iida. 475 [doi]
- Spreadsheet guardian: An approach to protecting semantic correctness throughout the evolution of spreadsheets (journal-first abstract)Daniel Kulesz, Verena Käfer, Stefan Wagner 0001. 476 [doi]
- Extracting features from requirements: Achieving accuracy and automation with neural networksYang Li, Sandro Schulze, Gunter Saake. 477-481 [doi]
- OctoBubbles: A Multi-view interactive environment for concurrent visualization and synchronization of UML models and codeRodi Jolak, Khanh-Duy Le, Kaan Burak Sener, Michel R. V. Chaudron. 482-486 [doi]
- A comparison of software engineering domain specific sentiment analysis toolsMd Rakibul Islam, Minhaz F. Zibran. 487-491 [doi]
- Generating descriptions for screenshots to assist crowdsourced testingDi Liu, Xiaofang Zhang, Yang Feng, James A. Jones. 492-496 [doi]
- Reconciling the past and the present: An empirical study on the application of source code transformations to automatically rejuvenate Java programsReno Dantas, Antonio Carvalho, Diego Marcilio, Luisa Fantin, Uriel Silva, Walter Lucas, Rodrigo Bonifácio. 497-501 [doi]
- The Statechart Workbench: Enabling scalable software event log analysis using process miningMaikel Leemans, Wil M. P. van der Aalst, Mark G. J. van den Brand. 502-506 [doi]
- APIDiff: Detecting API breaking changesAline Brito, Laerte Xavier, André C. Hora, Marco Tulio Valente. 507-511 [doi]
- LICCA: A tool for cross-language clone detectionTijana Vislavski, Gordana Rakic, Nicolás Cardozo, Zoran Budimac. 512-516 [doi]
- GoldRusher: A miner for rapid identification of hidden codeAleieldin Salem. 517-521 [doi]
- BECLoMA: Augmenting stack traces with user review informationLucas Pelloni, Giovanni Grano, Adelina Ciurumelea, Sebastiano Panichella, Fabio Palomba, Harald C. Gall. 522-526 [doi]
- Bring your own coding styleNaoto Ogura, Shinsuke Matsumoto, Hideaki Hata, Shinji Kusumoto. 527-531 [doi]
- 2: Feature identification, localization, and tracing toolAndreas Burger, Sten Grüner. 532-537 [doi]
- ChangeMacroRecorder: Recording fine-grained textual changes of source codeKatsuhisa Maruyama, Shinpei Hayashi, Takayuki Omori. 537-541 [doi]
- RETICULA: Real-time code quality assessmentLuigi Franzio, Bin Lin 0008, Michele Lanza, Gabriele Bavota. 542-546 [doi]
- Reengineering an industrial HMI: Approach, objectives, and challengesBernhard Dorninger, Michael Moser, Albin Kern. 547-551 [doi]
- Model-based software restructuring: Lessons from cleaning up COM interfaces in industrial legacy codeDennis Dams, Arjan J. Mooij, Pepijn Kramer, Andrei Radulescu, Jaromir Vanhara. 552-556 [doi]
- Grammatical inference from data exchange files: An experiment on engineering softwareMarkus Exler, Michael Moser, Josef Pichler, Günter Fleck, Bernhard Dorninger. 557-561 [doi]
- Fuzz testing in practice: Obstacles and solutionsJie Liang, Mingzhe Wang, Yuanliang Chen, Yu Jiang, Renwei Zhang. 562-566 [doi]
- Diggit: Automated code review via software repository miningRobert Chatley, Lawrence Jones. 567-571 [doi]
- Duplicate question detection in stack overflow: A reproducibility studyRodrigo F. G. da Silva, Klérisson Vinícius Ribeiro Paixão, Marcelo de Almeida Maia. 572-581 [doi]
- How do scientists develop scientific software? An external replicationGustavo Pinto 0001, Igor Wiese, Luiz Felipe Dias. 582-591 [doi]
- Re-evaluating method-level bug predictionLuca Pascarella, Fabio Palomba, Alberto Bacchelli. 592-601 [doi]
- Keep it simple: Is deep learning good for linguistic smell detection?Sarah Fakhoury, Venera Arnaoudova, Cedric Noiseux, Foutse Khomh, Giuliano Antoniol. 602-611 [doi]
- Detecting code smells using machine learning techniques: Are we there yet?Dario Di Nucci, Fabio Palomba, Damian A. Tamburri, Alexander Serebrenik, Andrea De Lucia. 612-621 [doi]