Abstract is missing.
- Message from the General Chair, Program Co-Chairs, and Local ChairXinyu Wang, D. Lo, E. Shihab, Xin Xia. [doi]
- Software engineering in a data science future (Keynote)Ahmed E. Hassan. 1 [doi]
- Does your software value what you value? (Keynote)Jon Whittle. 2 [doi]
- Forward and backward traceability: Requirements and challenges (Keynote)Zhi Jin. 3 [doi]
- Software Multiple-Level Change Detection Based on Two-Step MPAT MatchingTong Wang, Dongdong Wang, Ying Zhou, Bixin Li. 4-14 [doi]
- Pruning the AST with Hunks to Speed up Tree DifferencingChunhua Yang, E. James Whitehead Jr.. 15-25 [doi]
- Expressions of Sentiments during Code Reviews: Male vs. FemaleRajshakhar Paul, Amiangshu Bosu, Kazi Zakia Sultana. 26-37 [doi]
- A Study on the Interplay between Pull Request Review and Continuous Integration BuildsFiorella Zampetti, Gabriele Bavota, Gerardo Canfora, Massimiliano Di Penta. 38-48 [doi]
- Confusion in Code Reviews: Reasons, Impacts, and Coping StrategiesFelipe Ebert, Fernando Castor, Nicole Novielli, Alexander Serebrenik. 49-60 [doi]
- Deep Review SharingChenkai Guo, Dengrong Huang, Naipeng Dong, Quanqi Ye, Jing Xu, Yaqing Fan, Hui Yang, Yifan Xu. 61-72 [doi]
- A Comparative Study of Software Bugs in Micro-clones and Regular Code ClonesJudith F. Islam, Manishankar Mondal, Chanchal K. Roy. 73-83 [doi]
- On Precision of Code Clone Detection ToolsFarima Farmahinifarahani, Vaibhav Saini, Di Yang, Hitesh Sajnani, Cristina V. Lopes. 84-94 [doi]
- Learning-Based Recursive Aggregation of Abstract Syntax Trees for Code Clone DetectionLutz Büch, Artur Andrzejak. 95-104 [doi]
- Fuzzing Program Logic Deeply Hidden in Binary Program StagesYanhao Wang, Zheng-Leong Chua, Yuwei Liu, Purui Su, Zhenkai Liang. 105-116 [doi]
- How Stable Are Eclipse Application Framework Internal Interfaces?John Businge, Simon Kawuma, Moses Openja, Engineer Bainomugisha, Alexander Serebrenik. 117-127 [doi]
- Unveiling Exception Handling Guidelines Adopted by Java DevelopersHugo Melo, Roberta Coelho, Christoph Treude. 128-139 [doi]
- Migrating to GraphQL: A Practical AssessmentGleison Brito, Thais Mombach, Marco Tulio Valente. 140-150 [doi]
- Are Refactorings to Blame? An Empirical Study of Refactorings in Merge ConflictsMehran Mahmoudi, Sarah Nadi, Nikolaos Tsantalis. 151-162 [doi]
- Accurate Design Pattern Detection Based on Idiomatic Implementation Matching in Java Language ContextRenhao Xiong, Bixin Li. 163-174 [doi]
- Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight AnalysisBryan J. Muscedere, Robert Hackman, Davood Anbarnam, Joanne M. Atlee, Ian J. Davis, Michael W. Godfrey. 175-185 [doi]
- Mining Cross-Task Artifact Dependencies from Developer InteractionsUsman Ashraf, Christoph Mayr-Dorn, Alexander Egyed. 186-196 [doi]
- A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice ProgrammersCong Chen, Yulong Yang, Lin Yang, Kang Zhang. 197-206 [doi]
- Feature Maps: A Comprehensible Software Representation for Design Pattern DetectionHannes Thaller, Lukas Linsbauer, Alexander Egyed. 207-217 [doi]
- Reformulating Queries for Duplicate Bug Report DetectionOscar Chaparro, Juan Manuel Florez, Unnati Singh, Andrian Marcus. 218-229 [doi]
- Identifying Redundancies in Fork-based DevelopmentLuyao Ren, Shurui Zhou, Christian Kästner, Andrzej Wasowski. 230-241 [doi]
- Systematic Comprehension for Developer Reply in Mobile System ForumChenkai Guo, Weijing Wang, Yanfeng Wu, Naipeng Dong, Quanqi Ye, Jing Xu, Sen Zhang. 242-252 [doi]
- Improving Model Inference in Industry by Combining Active and Passive LearningNan Yang, Kousar Aslam, Ramon R. H. Schiffelers, Leonard Lensink, Dennis Hendriks, Loek Cleophas, Alexander Serebrenik. 253-263 [doi]
- Towards Understandable Guards of Extracted State Machines from Embedded SoftwareWasim Said, Jochen Quante, Rainer Koschke. 264-274 [doi]
- Mining Specifications from Documentation using a CrowdPeng Sun, Chris Brown, Ivan Beschastnikh, Kathryn T. Stolee. 275-286 [doi]
- Studying Android App Popularity by Cross-Linking GitHub and Google Play StoreJohn Businge, Moses Openja, David Kavaler, Engineer Bainomugisha, Foutse Khomh, Vladimir Filkov. 287-297 [doi]
- An Empirical Study of Learning to Rank Techniques for Effort-Aware Defect PredictionXiao Yu, Kwabena Ebo Bennin, Jin Liu, Jacky Wai Keung, Xiaofei Yin, Zhou Xu. 298-309 [doi]
- COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web ApplicationHiroyuki Kirinuki, Haruto Tanno, Katsuyuki Natsukawa. 310-320 [doi]
- A Comparative Study of Android Repackaged Apps Detection TechniquesXian Zhan, Tao Zhang 0001, Yutian Tang. 321-331 [doi]
- Want to Earn a Few Extra Bucks? A First Look at Money-Making AppsYangyu Hu, Haoyu Wang, Li Li, Yao Guo 0001, Guoai Xu, Ren He. 332-343 [doi]
- APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android AppsBodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu. 344-354 [doi]
- Characterizing and Detecting Inefficient Image Displaying Issues in Android AppsWenjie Li, Yanyan Jiang 0001, Chang Xu 0001, Yepang Liu, Xiaoxing Ma, Jian Lu. 355-365 [doi]
- Detecting Data Races Caused by Inconsistent Lock Protection in Device DriversQiu-Liang Chen, Jia-Ju Bai, Zu-Ming Jiang, Julia Lawall, Shi-Min Hu. 366-376 [doi]
- An Empirical Study of Messaging Passing Concurrency in Go ProjectsNicolas Dilley, Julien Lange. 377-387 [doi]
- A Splitting Strategy for Testing Concurrent ProgramsXiaofang Qi, Huayang Zhou. 388-398 [doi]
- Understanding Node Change Bugs for Distributed SystemsJie Lu, Liu Chen, Lian Li 0002, Xiaobing Feng 0002. 399-410 [doi]
- A Neural Model for Method Name Generation from Functional DescriptionSa Gao, Chunyang Chen, Zhenchang Xing, Yukun Ma, Wen Song, Shang-Wei Lin. 411-421 [doi]
- Bilateral Dependency Neural Networks for Cross-Language Algorithm ClassificationBui D. Q. Nghi, Yijun Yu, Lingxiao Jiang. 422-433 [doi]
- DeepLink: A Code Knowledge Graph Based Deep Learning Approach for Issue-Commit Link RecoveryRui Xie, Long Chen, Wei Ye, Zhiyu Li, Tianxiang Hu, Dongdong Du, Shikun Zhang. 434-444 [doi]
- CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural NetworksZhuo Zhang, Yan Lei, Xiaoguang Mao, Panpan Li. 445-455 [doi]
- AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis ViolationsKui Liu, Anil Koyuncu, Dongsun Kim 0001, Tegawendé F. Bissyandé. 456-467 [doi]
- BEARS: An Extensible Java Bug Benchmark for Automatic Program Repair StudiesFernanda Madeiral Delfim, Simon Urli, Marcelo de Almeida Maia, Martin Monperrus. 468-478 [doi]
- Sorting and Transforming Program Repair Ingredients via Deep Learning Code SimilaritiesMartin White, Michele Tufano, Matias Martinez, Martin Monperrus, Denys Poshyvanyk. 479-490 [doi]
- On the Relation between Outdated Docker Containers, Severity Vulnerabilities, and BugsAhmed Zerouali, Tom Mens, Gregorio Robles, Jesús M. González-Barahona. 491-501 [doi]
- Exploring Regular Expression EvolutionPeipei Wang, Gina R. Bai, Kathryn T. Stolee. 502-513 [doi]
- Mining Scala Framework Extensions for Recommendation PatternsYunior Pacheco, Jonas De Bleser, Tim Molderez, Dario Di Nucci, Wolfgang De Meuter, Coen De Roover. 514-523 [doi]
- Reuse (or Lack Thereof) in Travis CI Specifications: An Empirical Study of CI Phases and CommandsPuneet Kaur Sidhu, Gunter Mussbacher, Shane McIntosh. 524-533 [doi]
- Is Self-Admitted Technical Debt a Good Indicator of Architectural Divergences?Giancarlo Sierra, Ahmad Tahmid, Emad Shihab, Nikolaos Tsantalis. 534-543 [doi]
- Identifying Feature Clones: An Industrial Case StudyMuslim Chochlov, Michael English, Jim Buckley, Daniel Ilie, Maria Scanlon. 544-548 [doi]
- Towards Generating Cost-Effective Test-Suite for Ethereum Smart ContractXingya Wang, Haoran Wu, Weisong Sun, Yuan Zhao. 549-553 [doi]
- *: From Offline Detection to Online Reinforcement for Ethereum Virtual MachineFuchen Ma, Ying Fu, Meng Ren, Mingzhe Wang, Yu Jiang, Kaixiang Zhang, Huizhong Li, Xiang Shi. 554-558 [doi]
- Testing the Message Flow of Android Auto AppsYu Zhang, Xi Deng, Jun Yan, Hang Su, Hongyu Gao. 559-563 [doi]
- Open-Source License Violations of Binary Software at Large ScaleMuyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo. 564-568 [doi]
- Qualify First! A Large Scale Modernisation ReportLeszek Wlodarski, Boris Pereira, Ivan Povazan, Johan Fabry, Vadim Zaytsev. 569-573 [doi]
- Challenges of SonarQube Plug-In MaintenanceBence Barta, Gunter Manz, István Siket, Rudolf Ferenc. 574-578 [doi]
- GUI Migration using MDE from GWT to Angular 6: An Industrial CaseBenoît Verhaeghe, Anne Etien, Nicolas Anquetil, Abderrahmane Seriai, Laurent Deruelle, Stéphane Ducasse, Mustapha Derras. 579-583 [doi]
- Program State Coverage: A Test Coverage Metric Based on Executed Program StatesKhashayar Etemadi Someoliayi, Sajad Jalali, Mostafa Mahdieh, Seyed-Hassan Mirian-Hosseinabadi. 584-588 [doi]
- On the Diversity of Software Package Popularity Metrics: An Empirical Study of npmAhmed Zerouali, Tom Mens, Gregorio Robles, Jesús M. González-Barahona. 589-593 [doi]
- On the Impact of Refactoring Operations on Code NaturalnessBin Lin 0008, Csaba Nagy, Gabriele Bavota, Michele Lanza. 594-598 [doi]
- Knowledge Graphing Git Repositories: A Preliminary StudyYanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy 0001. 599-603 [doi]
- Should You Consider Adware as Malware in Your Study?Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein. 604-608 [doi]
- Please Help! A Preliminary Study on the Effect of Social Proof and Legitimization of Paltry Contributions in Donations to OSSUgo Yukizawa, Masateru Tsunoda, Amjed Tahir. 609-613 [doi]
- DeepCT: Tomographic Combinatorial Testing for Deep Learning SystemsLei Ma, Felix Juefei-Xu, Minhui Xue, Bo Li, Li Li, Yang Liu, Jianjun Zhao. 614-618 [doi]
- On the Impact of Outdated and Vulnerable Javascript Packages in Docker ImagesAhmed Zerouali, Valerio Cosentino, Tom Mens, Gregorio Robles, Jesús M. González-Barahona. 619-623 [doi]
- GUARDIAML: Machine Learning-Assisted Dynamic Information Flow ControlAngel Luis Scull Pupo, Jens Nicolay, Kyriakos Efthymiadis, Ann Nowé, Coen De Roover, Elisa Gonzalez Boix. 624-628 [doi]
- OBLIVE: Seamless Code Obfuscation for Java Programs and Android AppsDavide Pizzolotto, Roberto Fellin, Mariano Ceccato. 629-633 [doi]
- Madoop: Improving Browser-Based Volunteer Computing Based on Modern Web TechnologiesHiroyuki Matsuo, Shinsuke Matsumoto, Yoshiki Higo, Shinji Kusumoto. 634-638 [doi]
- Automating Performance Antipattern Detection and Software Refactoring in UML ModelsDavide Arcelli, Vittorio Cortellessa, Daniele Di Pompeo. 639-643 [doi]
- ICSD: Interactive Visual Support for Understanding Code Control StructureAhmad Jbara, Mousa Agbaria, Alon Adoni, Malek Jabareen, Ameen Yasin. 644-648 [doi]
- GoCity: Code City for GoRodrigo Brito, Aline Brito, Gleison Brito, Marco Tulio Valente. 649-653 [doi]