Abstract is missing.
- Towards Understanding Tool-chain Bugs in the LLVM Compiler InfrastructureXiaoyuan Xie, Haolin Yang, Qiang He 0001, Lin Chen 0015. 1-11 [doi]
- Analyzing and Detecting Emerging Quality-Related Concerns across OSS Defect Report SummariesRrezarta Krasniqi, Ankit Agrawal. 12-23 [doi]
- An Empirical Study for Common Language Features Used in Python ProjectsYun Peng, Yu Zhang 0086, Mingzhe Hu. 24-35 [doi]
- Graph Neural Network Based Collaborative Filtering for API Usage RecommendationChunyang Ling, Yanzhen Zou, Bing Xie. 36-47 [doi]
- MulCode: A Multi-task Learning Approach for Source Code UnderstandingDeze Wang, Yue Yu, Shanshan Li, Wei Dong 0006, Ji Wang, Qing Liao 0001. 48-59 [doi]
- A Neural Question Answering System for Basic Questions about SubroutinesAakash Bansal, Zachary Eberhart, Lingfei Wu, Collin McMillan. 60-71 [doi]
- A Multi-Metric Ranking Approach for Library Migration RecommendationsHao He, Yulin Xu, Yixiao Ma, Yifei Xu, Guangtai Liang, Minghui Zhou. 72-83 [doi]
- HashMTI: Scalable Mutation-based Taint Inference with Hash RecordsXiangdong Kong, Yong Tang, Pengfei Wang, Shuning Wei, Tai Yue. 84-95 [doi]
- Is the Ground Truth Really Accurate? Dataset Purification for Automated Program RepairDeheng Yang, Yan Lei, Xiaoguang Mao, David Lo 0001, Huan Xie, Meng Yan. 96-107 [doi]
- OTA: An Operation-oriented Time Allocation Strategy for Greybox FuzzingXumei Li, Lei Sun, Ruobing Jiang, Haipeng Qu, Zhen Yan. 108-118 [doi]
- Leveraging Stack Overflow to Detect Relevant Tutorial Fragments of APIsDi Wu, Xiao-Yuan Jing, Hongyu Zhang, Yuming Zhou, Baowen Xu. 119-130 [doi]
- Binary level toolchain provenance identification with graph neural networksTristan Benoit, Jean-Yves Marion, Sébastien Bardin. 131-141 [doi]
- Assessing time-based and range-based strategies for commit assignment to releasesFelipe Curty do Rego Pinto, Bruno Costa, Leonardo Murta 0001. 142-153 [doi]
- XSnare: Application-specific client-side cross-site scripting protectionJosé Carlos Pazos, Jean-Sébastien Légaré, Ivan Beschastnikh. 154-165 [doi]
- Combining Query Reduction and Expansion for Text-Retrieval-Based Bug LocalizationJuan Manuel Florez, Oscar Chaparro, Christoph Treude, Andrian Marcus. 166-176 [doi]
- A Survey-Based Empirical Evaluation of Bad Smells in LabVIEW Systems ModelsXin Zhao, Jeff Gray, Taylor Riché. 177-188 [doi]
- DeepCon: Contribution Coverage Testing for Deep Learning SystemsZhiyang Zhou, Wensheng Dou, Jie Liu, Chenxin Zhang, Jun Wei 0001, Dan Ye. 189-200 [doi]
- FrameFix: Automatically Repairing Statically-Detected Directive Violations in Framework ApplicationsZack Coker, Joshua Sunshine, Claire Le Goues. 201-212 [doi]
- VIVA: Binary Level Vulnerability Identification via Partial SignatureYang Xiao, Zhengzi Xu, Weiwei Zhang, Chendong Yu, Longquan Liu, Wei Zou, Zimu Yuan, Yang Liu, Aihua Piao, Wei Huo. 213-224 [doi]
- Assessing Code Clone Harmfulness: Indicators, Factors, and Counter MeasuresBin Hu, Yijian Wu, Xin Peng 0001, Jun Sun 0001, Nanjie Zhan, Jun Wu. 225-236 [doi]
- The Usability (or Not) of Refactoring ToolsAnna Maria Eilertsen, Gail C. Murphy. 237-248 [doi]
- Javadoc Violations and Their Evolution in Open-Source SoftwareMarcel Steinbeck, Rainer Koschke. 249-259 [doi]
- Quality Assurance for Automated Commit Message GenerationBei Wang, Meng Yan, Zhongxin Liu, Ling Xu, Xin Xia 0001, Xiaohong Zhang 0002, Dan Yang 0001. 260-271 [doi]
- Understanding and Facilitating the Co-Evolution of Production and Test CodeSinan Wang, Ming Wen 0001, Yepang Liu 0001, Ying Wang 0038, Rongxin Wu. 272-283 [doi]
- Leveraging Fault Localisation to Enhance Defect PredictionJeongju Sohn, Yasutaka Kamei, Shane McIntosh, Shin Yoo. 284-294 [doi]
- On the Impact of Flaky Tests in Automated Program RepairYihao Qin, Shangwen Wang, Kui Liu 0001, Xiaoguang Mao, Tegawendé F. Bissyandé. 295-306 [doi]
- GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkersAndrea Mambretti, Pasquale Convertini, Alessandro Sorniotti, Alexandra Sandulescu, Engin Kirda, Anil Kurmus. 307-317 [doi]
- Automatic Detection of Five API Documentation Smells: Practitioners' PerspectivesJunaed Younus Khan, Md. Tawkat Islam Khondaker, Gias Uddin 0001, Anindya Iqbal. 318-329 [doi]
- Action Word Prediction for Neural Source Code SummarizationSakib Haque, Aakash Bansal, Lingfei Wu, Collin McMillan. 330-341 [doi]
- Two-Stage Attention-Based Model for Code Search with Textual and Structural FeaturesLing Xu, Huanhuan Yang, Chao Liu, Jianhang Shuai, Meng Yan, Yan Lei, Zhou Xu 0003. 342-353 [doi]
- SQLIFIX: Learning Based Approach to Fix SQL Injection Vulnerabilities in Source CodeMohammed Latif Siddiq, Md. Rezwanur Rahman Jahin, Mohammad Rafid Ul Islam, Rifat Shahriyar, Anindya Iqbal. 354-364 [doi]
- Call Frequency-Based Fault LocalizationBéla Vancsics, Ferenc Horváth, Attila Szatmári, Árpád Beszédes. 365-376 [doi]
- A Multi-Criteria Strategy for Redesigning Legacy Features as Microservices: An Industrial Case StudyWesley K. G. Assunção, Thelma Elita Colanzi, Luiz Carvalho, Juliana Alves Pereira, Alessandro F. Garcia 0001, Maria Julia de Lima, Carlos Lucena. 377-387 [doi]
- Underproduction: An Approach for Measuring Risk in Open Source SoftwareKaylea Champion, Benjamin Mako Hill. 388-399 [doi]
- A Large-Scale Empirical Study of Android App DecompilationNoah Mauthe, Ulf Kargén, Nahid Shahmehri. 400-410 [doi]
- EnHMM: On the Use of Ensemble HMMs and Stack Traces to Predict the Reassignment of Bug Report FieldsMd. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian Sabor, Mohammad Hamdaqa, Haipeng Cai. 411-421 [doi]
- On the Co-evolution of ML Pipelines and Source Code - Empirical Study of DVC ProjectsAmine Barrak, Ellis E. Eghan, Bram Adams. 422-433 [doi]
- Summarizing Relevant Parts from Technical VideosMahmood Vahedi, Mohammad Masudur Rahman 0001, Foutse Khomh, Gias Uddin 0001, Giuliano Antoniol. 434-445 [doi]
- Empirical Analysis of Security Vulnerabilities in Python PackagesMahmoud Alfadel, Diego Elias Costa, Emad Shihab. 446-457 [doi]
- Plot2API: Recommending Graphic API from Plot via Semantic Parsing Guided Neural NetworkZeyu Wang, Sheng Huang, Zhongxin Liu, Meng Yan, Xin Xia 0001, Bei Wang, Dan Yang 0001. 458-469 [doi]
- Understanding Code Reuse in Smart ContractsXiangping Chen, Peiyong Liao, Yixin Zhang, Yuan Huang 0002, Zibin Zheng. 470-479 [doi]
- Android Compatibility Issue Detection Using API DifferencesTarek Mahmud, Meiru Che, Guowei Yang. 480-490 [doi]
- Evaluating Bug Prediction under Realistic SettingsSho Ogino, Yoshiki Higo, Shinji Kusumoto. 491-495 [doi]
- Multi-threshold token-based code clone detectionYaroslav Golubev, Viktor Poletansky, Nikita Povarov, Timofey Bryksin. 496-500 [doi]
- Onboarding to Open Source Projects with Good First Issues: A Preliminary AnalysisHyuga Horiguchi, Itsuki Omori, Masao Ohira. 501-505 [doi]
- Human-Centric Issues in eHealth App Development and Usage: A Preliminary AssessmentMd. Shamsujjoha, John Grundy 0001, Li Li, Hourieh Khalajzadeh, Qinghua Lu 0001. 506-510 [doi]
- Enhancing Just-in-Time Defect Prediction Using Change Request-based MetricsHailemelekot Demtse Tessema, Surafel Lemma Abebe. 511-515 [doi]
- Linking Developer Experience to Coding Style in Open-Source RepositoriesHeidi Hokka, Felix Dobslaw, Jonathan Bengtsson. 516-520 [doi]
- Adaptive Immunity for Software: Towards Autonomous Self-healing SystemsMoeen Ali Naqvi, Merve Astekin, Sehrish Malik, Leon Moonen. 521-525 [doi]
- How Do Users Answer MATLAB Questions on Q&A Sites? A Case Study on Stack Overflow and MathWorksMahshid Naghashzadeh, Amir Haghshenas, Ashkan Sami, David Lo 0001. 526-530 [doi]
- Anti-patterns in Modern Code Review: Symptoms and PrevalenceMoataz Chouchen, Ali Ouni 0001, Raula Gaikovina Kula, Dong Wang, Patanamon Thongtanunam, Mohamed Wiem Mkaouer, Kenichi Matsumoto. 531-535 [doi]
- MSR4ML: Reconstructing Artifact Traceability in Machine Learning RepositoriesAquilas Tchanjou Njomou, Alexandra Johanne Bifona Africa, Bram Adams, Marios Fokaefs. 536-540 [doi]
- Automatically Customizing Static Analysis Tools to Coding Rules Really Followed by DevelopersYuki Ueda, Takashi Ishio, Kenichi Matsumoto. 541-545 [doi]
- Using Structural and Semantic Information to Identify Software ComponentsCezar Sas, Andrea Capiluppi. 546-550 [doi]
- G-Repo: a Tool to Support MSR Studies on GitHubSimone Romano 0001, Maria Caulo, Matteo Buompastore, Leonardo Guerra, Anas Mounsif, Michele Telesca, Maria Teresa Baldassarre, Giuseppe Scanniello. 551-555 [doi]
- GasserCarmen Coviello, Simone Romano 0001, Giuseppe Scanniello, Giuliano Antoniol. 556-560 [doi]
- Recording, Visualising and Understanding Developer Programming BehaviourMartin Schröer, Rainer Koschke. 561-566 [doi]
- ClarchMap: API-oriented reconstruction of architecture for cloud-based systemsDaniel Althviz, Kelly Garcés, Jaime Chavarriaga. 567-571 [doi]
- TinySpline: A Small, yet Powerful Library for Interpolating, Transforming, and Querying NURBS, B-Splines, and Bézier CurvesMarcel Steinbeck, Rainer Koschke. 572-576 [doi]
- Makar: A Framework for Multi-source Studies based on Unstructured DataMathias Birrer, Pooja Rani, Sebastiano Panichella, Oscar Nierstrasz. 577-581 [doi]
- Practitioners' Testimonials about Software TestingPradeep Waychal, Luiz Fernando Capretz, Jingdong Jia, Daniel Varona, Yadira Lizama. 582-589 [doi]
- Technical Debt in Large-Scale Distributed Projects: An Industrial Case StudyArmando Sousa, Lincoln Rocha, Ricardo Britto 0001, Zhixiong Gong, Feng Lyu 0004. 590-594 [doi]
- Mining for Graph-Based Library Usage Patterns in COBOL SystemsRuben Opdebeeck, Johan Fabry, Tim Molderez, Jonas De Bleser, Coen De Roover. 595-599 [doi]
- A Testing Approach While Re-engineering Legacy Systems: An Industrial Case StudyHamid Khodabandehloo, Banani Roy, Manishankar Mondal, Chanchal K. Roy, Kevin Schneider. 600-604 [doi]
- How do Technical Debt Payment Practices Relate to the Effects of the Presence of Debt Items in Software Projects?Sávio Freire, Nicolli Rios, Boris Pérez, Darío Torres, Manoel G. Mendonça, Clemente Izurieta, Carolyn B. Seaman, Rodrigo O. Spínola. 605-609 [doi]
- How Explicit Feature Traces Did Not Impact Developers' MemoryJacob Krüger, Gül Çalikli, Thorsten Berger, Thomas Leich. 610-613 [doi]
- Will Data Influence the Experiment Results?: A Replication Study of Automatic Identification of DecisionsLiming Fu, Peng Liang 0001, Xueying Li, Chen Yang 0007. 614-617 [doi]
- Regression Test Selection Tool for Python in Continuous Integration ProcessEero Kauhanen, Jukka K. Nurminen, Tommi Mikkonen, Matvei Pashkovskiy. 618-621 [doi]
- An Analysis of Testing Scenarios for Automated Driving SystemsSiyuan Liu, Luiz Fernando Capretz. 622-629 [doi]
- A Case Study on the Evolution of Configuration Options of a Highly-Configurable Software SystemStefan Fischer. 630-635 [doi]
- AI-Based Enhancement of Test Models in an Industrial Model-Based Testing ToolStefan Mohacsi, Michael Felderer. 636-638 [doi]
- Research Progress of Flaky TestsWei Zheng, Guoliang Liu, Manqing Zhang, Xiang Chen, Wenqiao Zhao. 639-646 [doi]
- Representation vs. Model: What Matters Most for Source Code Vulnerability DetectionWei Zheng, Abubakar Omari Abdallah Semasaba, Xiaoxue Wu, Samuel Akwasi Agyemang, Tao Liu, Yuan Ge. 647-653 [doi]
- Bug Question Answering with Pretrained EncodersLili Bo, Jinting Lu. 654-660 [doi]
- Characterizing Duplicate Bugs: An Empirical AnalysisBerfin Kucuk, Eray Tuzun. 661-668 [doi]
- Blockchain in Agri-Food Traceability Systems: a Model Proposal for a Typical Italian Food ProductLuisanna Cocco, Katiuscia Mannaro. 669-678 [doi]
- Drone-based Risk Management of Autonomous Systems Using Contracts and BlockchainFaiz Ul Muram, Muhammad Atif Javed. 679-688 [doi]
- Lightweight extension of an execution environment for safer function calls in Solidity/Ethereum Virtual Machine smart contractsSooyeon Lee, Eun-Sun Cho. 689-695 [doi]
- Raising Sustainability Awareness in Agile Blockchain-Oriented Software EngineeringAndrea Pinna 0002, Gavina Baralla, Michele Marchesi, Roberto Tonelli. 696-700 [doi]
- Analysis of Source Code Duplication in Ethreum Smart ContractsGiuseppe Antonio Pierro, Roberto Tonelli. 701-707 [doi]
- Smart-Graph: Graphical Representations for Smart Contract on the Ethereum BlockchainGiuseppe Antonio Pierro. 708-714 [doi]
- Investigation of Blockchain Cryptocurrencies' Price Movements Through Deep Learning: A Comparative AnalysisNicola Uras, Marco Ortu. 715-722 [doi]
- Blockchain and Contact Tracing Applications for COVID-19: The Opportunity and The ChallengesMohamad Kassab, Giuseppe Destefanis. 723-730 [doi]