Abstract is missing.
- Referee: A Pattern-Guided Approach for Auto Design in Compiler-Based AnalyzersFang Lv, Hao Li, Lei Wang, Ying Liu, Huimin Cui, Jingling Xue, Xiaobing Feng 0002. 1-12 [doi]
- Web APIs in Android through the Lens of SecurityPascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz. 13-22 [doi]
- SMARTSHIELD: Automatic Smart Contract Protection Made EasyYuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu. 23-34 [doi]
- Automatically Extracting Subroutine Summary Descriptions from Unstructured CommentsZachary Eberhart, Alexander LeClair, Collin McMillan. 35-46 [doi]
- Resource Race Attacks on AndroidYan Cai 0001, Yutian Tang, Haicheng Li, Le Yu, Hao Zhou, Xiapu Luo, Liang He, Purui Su. 47-58 [doi]
- We Are Family: Analyzing Communication in GitHub Software Repositories and Their ForksScott Brisson, Ehsan Noei, Kelly Lyons. 59-69 [doi]
- Exploring Type Inference Techniques of Dynamically Typed LanguagesC. M. Khaled Saifullah, Muhammad Asaduzzaman, Chanchal K. Roy. 70-80 [doi]
- How Do Python Framework APIs Evolve? An Exploratory StudyZhaoxu Zhang, Hengcheng Zhu, Ming Wen, Yida Tao, Yepang Liu, Yingfei Xiong. 81-92 [doi]
- Associating Code Clones with Association Rules for Change Impact AnalysisManishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 93-103 [doi]
- LibDX: A Cross-Platform and Accurate System to Detect Third-Party Libraries in Binary CodeWei Tang, Ping Luo, Jialiang Fu, Dan Zhang. 104-115 [doi]
- EthPloit: From Fuzzing to Efficient Exploit Generation against Smart ContractsQingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma. 116-126 [doi]
- Sequence Directed Hybrid FuzzingHongliang Liang, Lin Jiang, Lu Ai, Jinyi Wei. 127-137 [doi]
- LESSQL: Dealing with Database Schema Changes in Continuous DeploymentAriel Afonso, Altigran da Silva, Tayana Conte, Paulo Martins 0005, João Cavalcanti, Alessandro Garcia. 138-148 [doi]
- Cross-Dataset Design Discussion MiningAlvi Mahadi, Karan Tongay, Neil A. Ernst. 149-160 [doi]
- C-3PR: A Bot for Fixing Static Analysis Violations via Pull RequestsAntonio Carvalho, Welder Pinheiro Luz, Diego Marcilio, Rodrigo Bonifácio, Gustavo Pinto 0001, Edna Dias Canedo. 161-171 [doi]
- Automated Bug Detection and Replay for COTS Linux Kernel Modules with Concolic ExecutionBo Chen, Zhenkun Yang, Li Lei, Kai Cong, Fei Xie. 172-183 [doi]
- Ultra-Large-Scale Repository Analysis via Graph CompressionPaolo Boldi, Antoine Pietri, Sebastiano Vigna, Stefano Zacchiroli. 184-194 [doi]
- Studying Developer Reading Behavior on Stack Overflow during API Summarization TasksJonathan A. Saddler, Cole S. Peterson, Sanjana Sama, Shruthi Nagaraj, Olga Baysal, Latifa Guerrouj, Bonita Sharif. 195-205 [doi]
- On the Adoption of Kotlin on Android Development: A Triangulation StudyVictor Oliveira, Leopoldo Teixeira, Felipe Ebert. 206-216 [doi]
- Energy Refactorings for Android in the Large and in the WildMarco Couto 0001, João Saraiva, João Paulo Fernandes. 217-228 [doi]
- Essential Sentences for Navigating Stack Overflow AnswersSarah Nadi, Christoph Treude. 229-239 [doi]
- HistoRank: History-Based Ranking of Co-change CandidatesManishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider. 240-250 [doi]
- D-Goldilocks: Automatic Redistribution of Remote Functionalities for Performance and EfficiencyKijin An, Eli Tilevich. 251-260 [doi]
- Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax TreeWenhan Wang, Ge Li, Bo Ma, Xin Xia 0001, Zhi Jin. 261-271 [doi]
- SAGA: Efficient and Large-Scale Detection of Near-Miss Clones with GPU AccelerationGuanhua Li, Yijian Wu, Chanchal K. Roy, Jun Sun, Xin Peng, Nanjie Zhan, Bin Hu, Jingyi Ma. 272-283 [doi]
- CORE: Automating Review Recommendation for Code ChangesJing Kai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu 0003. 284-295 [doi]
- Distinguishing Similar Design Pattern Instances through Temporal Behavior AnalysisRenhao Xiong, David Lo 0001, Bixin Li. 296-307 [doi]
- Relationship between the Effectiveness of Spectrum-Based Fault Localization and Bug-Fix Types in JavaScript ProgramsBéla Vancsics, Attila Szatmári, Árpád Beszédes. 308-319 [doi]
- Incremental Map-Reduce on Repository HistoryJohannes Härtel, Ralf Lämmel. 320-331 [doi]
- How EvoStreets Are Observed in Three-Dimensional and Virtual Reality EnvironmentsMarcel Steinbeck, Rainer Koschke, Marc O. Rüdel. 332-343 [doi]
- Are the Code Snippets What We Are Searching for? A Benchmark and an Empirical Study on Code Search with Natural-Language QueriesShuhan Yan, Hang Yu, Yuting Chen, Beijun Shen, Lingxiao Jiang. 344-354 [doi]
- Automatically Learning Patterns for Self-Admitted Technical Debt RemovalFiorella Zampetti, Alexander Serebrenik, Massimiliano Di Penta. 355-366 [doi]
- Refactoring Graphs: Assessing Refactoring over TimeAline Brito, André C. Hora, Marco Tulio Valente. 367-377 [doi]
- On Relating Technical, Social Factors, and the Introduction of BugsFilipe Falcão, Caio Barbosa, Baldoino Fonseca, Alessandro Garcia, Márcio Ribeiro, Rohit Gheyi. 378-388 [doi]
- Characterizing Architectural Drifts of Adaptive SystemsDaniel San Martín, Bento R. Siqueira, Valter Vieira de Camargo, Fabiano Cutigi Ferrari. 389-399 [doi]
- Using Productive Collaboration Bursts to Analyze Open Source Collaboration EffectivenessSamridhi Choudhary, Christopher Bogart, Carolyn Penstein Rosé, Jim Herbsleb. 400-410 [doi]
- Slice-Based Cognitive Complexity Metrics for Defect PredictionBasma S. Alqadi, Jonathan I. Maletic. 411-422 [doi]
- The Silent Helper: The Impact of Continuous Integration on Code ReviewsNathan Cassee, Bogdan Vasilescu, Alexander Serebrenik. 423-434 [doi]
- Heap Memory Snapshot Assisted Program Analysis for Android Permission SpecificationLannan Luo. 435-446 [doi]
- A Code-Description Representation Learning Model Based on AttentionQing Huang, An Qiu, Maosheng Zhong, Yuan Wang. 447-455 [doi]
- Suggesting Comment Completions for Python using Neural Language ModelsAdelina Ciurumelea, Sebastian Proksch, Harald C. Gall. 456-467 [doi]
- Leveraging Contextual Information from Function Call Chains to Improve Fault LocalizationÁrpád Beszédes, Ferenc Horváth, Massimiliano Di Penta, Tibor Gyimóthy. 468-479 [doi]
- Deep Learning Based Identification of Suspicious Return StatementsGuangjie Li, Hui Liu, Jiahao Jin, Qasim Umer. 480-491 [doi]
- Clone Detection in Test Code: An Empirical EvaluationBrent van Bladel, Serge Demeyer. 492-500 [doi]
- Are SonarQube Rules Inducing Bugs?Valentina Lenarduzzi, Francesco Lomio, Heikki Huttunen, Davide Taibi. 501-511 [doi]
- Enhancing Source Code Refactoring Detection with Explanations from Commit MessagesRrezarta Krasniqi, Jane Cleland-Huang. 512-516 [doi]
- Unleashing the Potentials of Immersive Augmented Reality for Software EngineeringLeonel Merino, Mircea Lungu, Christoph Seidl 0001. 517-521 [doi]
- Reflection on Building Hybrid Access Control by Configuring RBAC and MAC FeaturesDae-Kyoo Kim, Hua Ming, Lunjin Lu. 522-526 [doi]
- Is Developer Sentiment Related to Software Bugs: An Exploratory Study on GitHub CommitsSyed Fatiul Huq, Ali Zafar Sadiq, Kazi Sakib. 527-531 [doi]
- The Python/C API: Evolution, Usage Statistics, and Bug PatternsMingzhe Hu, Yu Zhang. 532-536 [doi]
- Revisiting the Challenges and Opportunities in Software Plagiarism DetectionXi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan 0002, Qinghua Zheng, Ting Liu. 537-541 [doi]
- Req2Lib: A Semantic Neural Model for Software Library RecommendationZhensu Sun, Yan Liu, Ziming Cheng, Chen Yang, Pengyu Che. 542-546 [doi]
- Dependency Solving Is Still Hard, but We Are Getting Better at ItPietro Abate, Roberto Di Cosmo, Georgios Gousios, Stefano Zacchiroli. 547-551 [doi]
- A Reflection on "An Exploratory Study on Exception Handling Bugs in Java Programs"Felipe Ebert, Fernando Castor, Alexander Serebrenik. 552-556 [doi]
- A Preliminary Study on Open-Source Memory Vulnerability DetectorsYu Nong, Haipeng Cai. 557-561 [doi]
- A Reflection on the Predictive Accuracy of Dynamic Impact AnalysisHaipeng Cai. 562-566 [doi]
- JavaScript API Deprecation in the Wild: A First AssessmentRomulo Nascimento, Aline Brito, André C. Hora, Eduardo Figueiredo. 567-571 [doi]
- A Semantic-Based Framework for Analyzing App Users' FeedbackAman Yadav, Rishab Sharma, Fatemeh Hendijani Fard. 572-576 [doi]
- MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging PracticesRui Zhou, Mohammad Hamdaqa, Haipeng Cai, Abdelwahab Hamou-Lhadj. 577-581 [doi]
- Identifying Vulnerable IoT Applications using Deep LearningHajra Naeem, Manar H. Alalfi. 582-586 [doi]
- A Mutation Framework for Evaluating Security Analysis Tools in IoT ApplicationsSajeda Parveen, Manar H. Alalfi. 587-591 [doi]
- Pull Requests or Commits? Which Method Should We Use to Study Contributors' Behavior?Marcus Vinicius Bertoncello, Gustavo Pinto 0001, Igor Scaliante Wiese, Igor Steinmacher. 592-601 [doi]
- Automated Deprecated-API Usage Update for Android Apps: How Far are We?Ferdian Thung, Stefanus A. Haryono, Lucas Serrano, Gilles Muller, Julia Lawall, David Lo 0001, Lingxiao Jiang. 602-611 [doi]
- Experience Report: How Effective is Automated Program Repair for Industrial Software?Kunihiro Noda, Yusuke Nemoto, Keisuke Hotta, Hideo Tanida, Shinji Kikuchi. 612-616 [doi]
- Reducing Code Complexity through Code Refactoring and Model-Based RejuvenationArjan J. Mooij, Jeroen Ketema, Steven Klusener, Mathijs Schuts. 617-621 [doi]
- Leveraging Machine Learning for Software RedocumentationVerena Geist, Michael Moser, Josef Pichler, Stefanie Beyer, Martin Pinzger 0001. 622-626 [doi]
- Automated Code Transformations: Dealing with the AftermathStefan Strobl, Christina Zoffi, Christoph Haselmann, Mario Bernhart, Thomas Grechenig. 627-631 [doi]
- CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIsMohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz. 632-636 [doi]
- AUSearch: Accurate API Usage Search in GitHub Repositories with Type ResolutionMuhammad Hilmi Asyrofi, Ferdian Thung, David Lo 0001, Lingxiao Jiang. 637-641 [doi]
- Clone Notifier: Developing and Improving the System to Notify Changes of Code ClonesShogo Tokui, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue. 642-646 [doi]
- Mining Version Control Systems and Issue Trackers with LibVCS4jMarcel Steinbeck. 647-651 [doi]
- SpojitR: Intelligently Link Development ArtifactsMichael Rath 0002, Mihaela Todorova Tomova, Patrick Mäder. 652-656 [doi]
- ChangeBeadsThreader: An Interactive Environment for Tailoring Automatically Untangled ChangesSatoshi Yamashita, Shinpei Hayashi, Motoshi Saeki. 657-661 [doi]
- Reinforcement Learning Guided Symbolic ExecutionJie Wu, Chengyu Zhang, Geguang Pu. 662-663 [doi]
- Live Replay of Screen Videos: Automatically Executing Real Applications as Shown in RecordingsRudolf Ramler, Marko Gattringer, Josef Pichler. 664-665 [doi]
- Documentation of Machine Learning SoftwareYalda Hashemi, Maleknaz Nayebi, Giuliano Antoniol. 666-667 [doi]
- Building an Inclusive Distributed Ledger SystemCynthia Dookie. 668-669 [doi]