default search action
ICSE 2018: Gothenburg, Sweden - Companion Volume
- Michel Chaudron, Ivica Crnkovic, Marsha Chechik, Mark Harman:
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, ICSE 2018, Gothenburg, Sweden, May 27 - June 03, 2018. ACM 2018, ISBN 978-1-4503-5663-3
Mining repositories
- Santiago Dueñas, Valerio Cosentino, Gregorio Robles, Jesús M. González-Barahona:
Perceval: software project data at your will. 1-4 - Chase Greco, Tyler Haden, Kostadin Damevski:
StackInTheFlow: behavior-driven recommendation system for stack overflow posts. 5-8 - Zhongxin Liu, Qiao Huang, Xin Xia, Emad Shihab, David Lo, Shanping Li:
SATD detector: a text-mining-based self-admitted technical debt detection tool. 9-12
Test automation and failure diagnosis
- Mojdeh Golagha, Abu Mohammed Raisuddin, Lennart Mittag, Dominik Hellhake, Alexander Pretschner:
Aletheia: a failure diagnosis toolchain. 13-16 - Antonia Bertolino, Antonello Calabrò, Guglielmo De Angelis, Micael Gallego, Boni García, Francisco Gortázar:
When the testing gets tough, the tough get ElasTest. 17-20 - Pietro Braione, Giovanni Denaro, Andrea Mattavelli, Mauro Pezzè:
SUSHI: a test generator for programs with complex structured inputs. 21-24
Mutation testing
- Alex Groce, Josie Holmes, Darko Marinov, August Shi, Lingming Zhang:
An extensible, regular-expression-based tool for multi-language mutant generation. 25-28 - Kaiyuan Wang, Allison Sullivan, Sarfraz Khurshid:
MuAlloy: a mutation testing framework for alloy. 29-32 - Kevin Moran, Michele Tufano, Carlos Bernal-Cárdenas, Mario Linares Vásquez, Gabriele Bavota, Christopher Vendome, Massimiliano Di Penta, Denys Poshyvanyk:
MDroid+: a mutation testing framework for android. 33-36
Performance and NFR
- Robert Heinrich, Dominik Werle, Heiko Klare, Ralf H. Reussner, Max E. Kramer, Steffen Becker, Jens Happe, Heiko Koziolek, Klaus Krogmann:
The palladio-bench for modeling and simulating software architectures. 37-40 - Jürgen Cito, Philipp Leitner, Christian Bosshard, Markus Knecht, Genc Mazlami, Harald C. Gall:
PerformanceHat: augmenting source code with runtime performance traces in the IDE. 41-44 - Séverine Sentilles, Federico Ciccozzi, Efi Papatheocharous:
PROMOpedia: a web-content management-based encyclopedia of software property models. 45-48
Evolution
- Sofija Hotomski, Martin Glinz:
GuideGen: a tool for keeping requirements and acceptance tests aligned. 49-52 - Daye Nam, Youn Kyu Lee, Nenad Medvidovic:
EVA: a tool for visualizing software architectural evolution. 53-56 - Yi Li, Chenguang Zhu, Julia Rubin, Marsha Chechik:
CSlicerCloud: a web-based semantic history slicing framework. 57-60
Testing vulnerabilities
- Mingzhe Wang, Jie Liang, Yuanliang Chen, Yu Jiang, Xun Jiao, Han Liu, Xibin Zhao, Jiaguang Sun:
SAFL: increasing and accelerating testing coverage with symbolic execution and guided fuzzing. 61-64 - Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, Bill Roscoe:
ReGuard: finding reentrancy bugs in smart contracts. 65-68 - Cong Wang, Yu Jiang, Xibin Zhao, Xiaoyu Song, Ming Gu, Jiaguang Sun:
Weak-assert: a weakness-oriented assertion recommendation toolkit for program analysis. 69-72
SPLs and OO repair
- Christian Kröher, Sascha El-Sharkawy, Klaus Schmid:
KernelHaven: an experimentation workbench for analyzing software product lines. 73-76 - Ripon K. Saha, Hiroaki Yoshida, Mukul R. Prasad, Susumu Tokumoto, Kuniharu Takayama, Isao Nanba:
Elixir: an automated repair tool for Java programs. 77-80 - Mukelabai Mukelabai, Benjamin Behringer, Moritz Fey, Jochen Palz, Jacob Krüger, Thorsten Berger:
Multi-view editing of software product lines with PEoPL. 81-84
Static analysis
- Jesús Sánchez Cuadrado, Esther Guerra, Juan de Lara:
AnATLyzer: an advanced IDE for ATL model transformations. 85-88 - Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden:
VISUFLOW: a debugging environment for static analyses. 89-92 - Csaba Nagy, Anthony Cleve:
SQLInspect: a static analyzer to inspect database usage in Java applications. 93-96
Model-driven development
- Mojtaba Bagherzadeh, Nicolas Hili, David Seekatz, Juergen Dingel:
MDebugger: a model-level debugger for UML-RT. 97-100 - Mirko D'Angelo, Annalisa Napolitano, Mauro Caporuscio:
CyPhEF: a model-driven engineering framework for self-adaptive cyber-physical systems. 101-104 - Manuel Ohrndorf, Christopher Pietsch, Udo Kelter, Timo Kehrer:
ReVision: a tool for history-based model repair recommendations. 105-108
Verification
- Benjamin Holland, Payas Awadhutkar, Suresh C. Kothari, Ahmed Tamrawi, Jon Mathews:
COMB: computing relevant program behaviors. 109-112 - Vince Molnár, Bence Graics, András Vörös, István Majzik, Dániel Varró:
The Gamma statechart composition framework: : design, verification and code generation for component-based reactive systems. 113-116 - Ahmet Çelik, Karl Palmskog, Milos Gligoric:
A regression proof selection tool for coq. 117-120
Posters
- Thomas Kuhn, Pablo Oliveira Antonino, Markus Damm, Andreas Morgenstern, Dirk Schulz, Constantin Ziesche, Thorsten Müller:
Industrie 4.0 virtual automation bus. 121-122 - Julian M. Bass, Sarah Beecham, Mohammad Abdur Razzak, Clodagh Nic Canna, John Noll:
An empirical study of the product owner role in scrum. 123-124 - Yan de Lima Justino, Carlos Eduardo da Silva:
Reengineering legacy systems for supporting SOA: a case study on the brazilian's secretary of state for taxation. 125-126 - Yaping Luo, Egbert Touw:
Results from multi-faceted software reliability assessment studies. 127-128 - Irina Diana Coman, Alberto Sillitti, Giancarlo Succi:
An initial characterization of bug-injecting development sessions. 129-130 - Katharina Juhnke, Matthias Tichy, Frank Houdek:
Challenges with automotive test case specifications. 131-132 - Pavneet Singh Kochhar, Stanislaw Swierc, Trevor Carnahan, Hitesh Sajnani, Meiyappan Nagappan:
Understanding the role of reporting in work item tracking systems for software development: an industrial case study. 133-134 - Bianca Bergande, Philipp Brune:
When students meet developers: are barcamps a format for interactive software engineering education? 135-136 - Julio Cezar Costa Furtado, Sandro Ronaldo Bezerra Oliveira:
A methodology to teaching statistical process control for software engineers. 137-138 - Jakeline Marcos-Abed:
A matrix for analyzing projects in software engineering courses. 139-140 - Yao Lu, Xinjun Mao, Tao Wang, Gang Yin, Zude Li, Huaimin Wang:
Continuous inspection in the classroom: improving students' programming quality with social coding methods. 141-142 - Rafael Chanin, Afonso Sales, Leandro Bento Pompermaier, Rafael Prikladnicki:
Startup software development education: a systematic mapping study. 143-144 - Styliani Kleanthous, Georgia M. Kapitsaki:
Analyzing the transactive memory in teaching software engineering. 145-146 - Shoaib Akbar, Edward F. Gehringer, Zhewei Hu:
Improving formation of student teams: a clustering approach. 147-148 - Arnon Sturm, Timothy C. Lethbridge:
Are our students engaged in their studies?: professional engagement vs. study engagement. 149-150 - Harumi Watanabe, Mikiko Sato, Masafumi Miwa, Makoto Imamura, Shintaro Hosoai, Nobuhiko Ogura, Hiroyuki Nakamura, Kenji Hisazumi:
Multidisciplinary skill assessment for embedded software development education via a robot contest. 151-152 - Gustavo H. S. Alexandre, Simone C. dos Santos:
PBL planner toolkit: a canvas-based tool for planning PBL in software engineering education. 153-154 - Alan R. Santos, Afonso Sales, Paulo Fernandes, Josiane Kroll:
Challenge-based learning: a brazilian case study. 155-156 - Daniel Russo, Marcello Missiroli, Paolo Ciancarini:
A conceptual model for cooperative thinking. 157-158 - Wilhelm Koop, Tobias Brückmann, Marian Benner-Wickner, Markus Kleinschmidt, Volker Gruhn:
Situation-based e-learning in software engineering: using software engineering-related metadata to improve self-empowered learning. 159-160 - Erina Makihara, Hiroshi Igaki, Norihiro Yoshida, Kenji Fujiwara, Naoki Kawashima, Hajimu Iida:
A multi-year analysis of students' build errors in agile software development educational projects. 161-162 - Zhe Chen, Yifan Wu, Ou Wei, Bin Sheng:
Deciding weak monitorability for runtime verification. 163-164 - Amar Budhiraja, Raghu Reddy, Manish Shrivastava:
LWE: LDA refined word embeddings for duplicate bug report detection. 165-166 - Thanh Van Nguyen, Tien N. Nguyen:
Inferring API elements relevant to an english query. 167-168 - Grigoreta Sofia Cojocar, Adriana Mihaela Guran:
A study of monitoring crosscutting concerns implementation. 169-170 - Dmitry V. Luciv, Dmitrij V. Koznov, George A. Chernishev, Hamid Abdul Basit, Konstantin Yu. Romanovsky, Andrey N. Terekhov:
Duplicate finder toolkit. 171-172 - David Shriver:
Toward the development of richer properties for recommender systems. 173-174 - Kunal Banerjee, Ramanuj Chouksey, Chandan Karfa, Pankaj Kumar Kalita:
Automatic detection of inverse operations while avoiding loop unrolling. 175-176 - Muhammad Sohaib Ayub, Junaid Haroon Siddiqui:
Efficiently finding minimal failing input in MapReduce programs. 177-178 - Luyao Ren, Shurui Zhou, Christian Kästner:
Forks insight: providing an overview of GitHub forks. 179-180 - Mihaela Todorova Tomova, Michael Rath, Patrick Mäder:
Use of trace link types in issue tracking systems. 181-182 - Abigail Atchison, Haley Anderson, Christina Berardi, Natalie Best, Cristiano Firmani, Rene German, Erik Linstead:
A topic analysis of the R programming language. 183-184 - Jungho Kim, Sungwon Kang, Hwi Ahn, ChangSup Keum, Chan-Gun Lee:
Architecture reconstruction and evaluation of blockchain open source platform. 185-186 - Serin Jeong, Heetae Cho, Seonah Lee:
Agile requirement traceability matrix. 187-188 - Zhe Chen, Chuanqi Tao, Zhiyi Zhang, Zhibin Yang:
Beyond spatial and temporal memory safety. 189-190 - Shin-Young Ahn, Joongheon Kim, Sungwon Kang:
A novel shared memory framework for distributed deep learning in high-performance computing architecture. 191-192 - Amar Budhiraja, Kartik Dutta, Raghu Reddy, Manish Shrivastava:
DWEN: deep word embedding network for duplicate bug report detection in software repositories. 193-194 - Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue:
Live path control flow integrity. 195-196 - Tobias Olsson, Morgan Ericsson, Anna Wingkvist:
Using repository data for driving software architecture. 197-198 - Eugenio Parra, Jose Luis de la Vara, Luis Alonso:
Analysis of requirements quality evolution. 199-200 - Jingyi Su, Mohd Arafat, Robert Dyer:
Using consensus to automatically infer post-conditions. 202-203 - Md. Rezaur Rahman, Mojdeh Golagha, Alexander Pretschner:
Pairika: a failure diagnosis benchmark for C++ programs. 204-205 - Yiming Tang, Raffi Khatchadourian, Mehdi Bagherzadeh, Syed Ahmed:
Towards safe refactoring for intelligent parallelization of Java 8 streams. 206-207 - Nagendra Prasad Kasaghatta Ramachandra, Christoph Csallner:
Testing web-based applications with the voice controlled accessibility and testing tool (VCAT). 208-209 - Emily Su, Sameer Joshi:
Leveraging product relationships to generate candidate bugs for duplicate bug prediction. 210-211 - Eric Ruiz, Richard Avelar, Xiaoyin Wang:
Protecting remote controlling apps of smart-home-oriented IOT devices. 212-213 - Yijun Liu, Zhenbang Chen, Wei Dong, Chendong Feng:
MC/DC coverage-oriented compiler optimization for symbolic execution. 214-215 - Maria Ulan, Welf Löwe, Morgan Ericsson, Anna Wingkvist:
Introducing quality models based on joint probabilities. 216-217 - Bat-Chen Rothenberg, Orna Grumberg:
Program repair that learns from mistakes. 218-219 - Sebastian Hönel, Morgan Ericsson, Welf Löwe, Anna Wingkvist:
A changeset-based approach to assess source code density and developer efficacy. 220-221 - Nelly Condori-Fernández, Alejandro Catalá Bolos, Patricia Lago:
Discovering requirements of behaviour change software systems from negative user experience. 222-223 - Shahab Bayati:
Understanding newcomers success in open source community. 224-225 - Janet Wyngaard, Samuel S. C. Rund, Gregory R. Madey, Michael Vierhauser, Jane Cleland-Huang:
Swarming remote piloted aircraft systems for mosquito-borne disease research and control. 226-227 - Fatma Basak Aydemir, Fabiano Dalpiaz:
Ethics-aware software engineering. 228-229 - Haitao Zhang, Guoqiang Li, Xiaohong Li, Zhuo Cheng, Jinyun Xue, Shaoying Liu:
An efficient approach for verifying automobile distributed application systems on timing property. 230-231 - Lucrecia Llerena, Nancy Rodríguez, Pablo Gómez-Abajo, John W. Castro, Silvia Teresita Acuña:
"Adoption of the visual brainstorming technique in the open source software development process". 232-233 - Cong Liu, Boudewijn F. van Dongen, Nour Assy, Wil M. P. van der Aalst:
A general framework to detect behavioral design patterns. 234-235 - Huan Lin, Yawen Wang, Yunzhan Gong:
Subsuming mutation operators. 236-237 - Lingyun Situ, Liang Zou, Linzhang Wang, Yang Liu, Bing Mao, Xuandong Li:
Detecting missing checks for identifying insufficient attack protections. 238-239 - Fabio Palomba, Damian A. Tamburri, Alexander Serebrenik, Andy Zaidman, Francesca Arcelli Fontana, Rocco Oliveto:
How do community smells influence code smells? 240-241 - Verena Käfer, Daniel Graziotin, Ivan Bogicevic, Stefan Wagner, Jasmin Ramadani:
Communication in open-source projects-end of the e-mail era? 242-243 - Morakot Choetkiertikul, Hoa Khanh Dam, Truyen Tran, Trang Pham, Aditya Ghose:
Predicting components for issue reports using deep learning with information retrieval. 244-245 - Rubing Huang, Yunan Zhou, Dave Towey, Tsong Yueh Chen, Jinfu Chen:
An experimental analysis of fault detection capabilities of covering array constructors. 246-247 - Misoo Kim, Eunseok Lee:
Are information retrieval-based bug localization techniques trustworthy? 248-249 - Cong Tian, Zhao Duan, Zhenhua Duan:
Accelerating counterexample detection in software model checking. 250-251 - Jeongho Kim, Jindae Kim, Eunseok Lee:
A novel variable-centric fault localization technique. 252-253 - Cong Tian, Congli Xia, Zhenhua Duan:
Android inter-component communication analysis with intent revision. 254-255 - Felipe Osses, Gastón Márquez, Hernán Astudillo:
Exploration of academic and industrial evidence about architectural tactics and patterns in microservices. 256-257 - Shaohan Hu, Peng Liu, Chun-Fu (Richard) Chen, Marco Pistoia:
Automatically solving NP-complete problems on a quantum computer. 258-259 - Yuan Huang, Nan Jia, Qiang Zhou, Xiangping Chen, Yingfei Xiong, Xiaonan Luo:
Guiding developers to make informative commenting decisions in source code. 260-261 - Arman Shahbazian, Youn Kyu Lee, Yuriy Brun, Nenad Medvidovic:
Making well-informed software design decisions. 262-263 - Zhe Chen, Junqi Yan, Wenming Li, Ju Qian, Zhiqiu Huang:
Runtime verification of memory safety via source transformation. 264-265 - Jiarong Wu, Yanyan Jiang, Chang Xu, Shing-Chi Cheung, Xiaoxing Ma, Jian Lu:
Synthesizing relation-aware entity transformation by examples. 266-267 - Long H. Pham, Quang Loc Le, Quoc-Sang Phan, Jun Sun, Shengchao Qin:
Testing heap-based programs with Java StarFinder. 268-269 - Di Wu, Xiao-Yuan Jing, Haowen Chen, Xiaoke Zhu, Hongyu Zhang, Mei Zuo, Lu Zi, Chen Zhu:
Automatically answering API-related questions. 270-271 - Naoyasu Ubayashi, Hokuto Muraoka, Daiki Muramoto, Yasutaka Kamei, Ryosuke Sato:
Exploring uncertainty in GitHub OSS projects: when and how do developers face uncertainty? 272-273 - Christoph Luckeneder, Hermann Kaindl:
Systematic top-down design of cyber-physical models with integrated validation and formal verification. 274-275 - Jun Gao, Li Li, Pingfan Kong, Tegawendé F. Bissyandé, Jacques Klein:
On vulnerability evolution in Android apps. 276-277 - Kan Qi, Barry W. Boehm:
UMLx: a UML diagram analytic tool for software management decisions. 278-279 - Gulsher Laghari, Serge Demeyer:
Unit tests and component tests do make a difference on fault localisation effectiveness. 280-281 - Tam The Nguyen, Phong Minh Vu, Hung Viet Pham, Tung Thanh Nguyen:
Recommending exception handling patterns with ExAssist. 282-283 - Phong Minh Vu, Tam The Nguyen, Tung Thanh Nguyen, Hung Viet Pham:
ALPACA-advanced linguistic pattern and concept analysis framework for software engineering corpora. 284-285 - Yang Wang, Stefan Wagner:
Combining STPA and BDD for safety analysis and verification in agile development. 286-287 - Umberto Azadi, Francesca Arcelli Fontana, Marco Zanoni:
Machine learning based code smell detection through WekaNose. 288-289 - Laurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen:
Knowledge-enriched security and privacy threat modeling. 290-291 - Simon Schwichtenberg, Ivan Jovanovikj, Christian Gerth, Gregor Engels:
CrossEcore: an extendible framework to use ecore and OCL across platforms. 292-293 - Jian Zhang, Hailong Sun, Yanfei Tian, Xudong Liu:
Semantically enhanced tag recommendation for software CQAs via deep learning. 294-295 - Puwei Wang, Xiaohe Liu, Jinchuan Chen, Ying Zhan, Zhi Jin:
QoS-aware service composition using blockchain-based smart contracts. 296-297 - Roland Kretschmer, Djamel Eddine Khelladi, Alexander Egyed:
An automated and instant discovery of concrete repairs for model inconsistencies. 298-299 - Ivonne von Nostitz-Wallwitz, Jacob Krüger, Janet Siegmund, Thomas Leich:
Knowledge transfer from research to industry: a survey on program comprehension. 300-301 - Seongmin Lee, David W. Binkley, Nicolas Gold, Syed S. Islam, Jens Krinke, Shin Yoo:
MOBS: multi-operator observation-based slicing using lexical approximation of program dependence. 302-303 - Jessie Carbonnel, Marianne Huchard, Clémentine Nebut:
On extracting relevant and complex variability information from software descriptions with pattern structures. 304-305 - Carmen Coviello, Simone Romano, Giuseppe Scanniello:
CUTER: ClUstering-based test suite reduction. 306-307 - Simone Romano, Giuseppe Scanniello, Davide Fucci, Natalia Juristo, Burak Turhan:
The effect of noise on requirements comprehension. 308-309 - Eric Braude, Jason Van Schooneveld:
Incremental UML for agile development with PREXEL. 310-312 - John L. Singleton, Gary T. Leavens, Hridesh Rajan, David R. Cok:
An algorithm and tool to infer practical postconditions. 313-314 - Jaechang Nam, Song Wang, Yuan Xi, Lin Tan:
Designing bug detection rules for fewer false alarms. 315-316 - Adelina Ciurumelea, Sebastiano Panichella, Harald C. Gall:
Automated user reviews analyser. 317-318 - Chao Liu, Dan Yang, Xiaohong Zhang, Haibo Hu, Jed Barson, Baishakhi Ray:
A recommender system for developer onboarding. 319-320 - Yongzhi Wang, Yulong Shen, Ke Cheng, Yibo Yang, Cuicui Su, Anter Faree:
Obfuscating program control flow with Intel SGX. 321-322 - Xiang Zhou, Xin Peng, Tao Xie, Jun Sun, Chenjie Xu, Chao Ji, Wenyun Zhao:
Benchmarking microservice systems for software engineering research. 323-324 - Yuchen Guo, Martin J. Shepperd, Ning Li:
Bridging effort-aware prediction and strong classification: a just-in-time software defect prediction study. 325-326 - Zonghui Li, Hai Wan, Yangdong Deng, Qinghan Yu, Tianchi Li, Kang Wei, Ming Gu:
Model-based adaptation to extreme physical environments: a case study on mixed-criticality industrial ethernet. 327-328 - Fangge Yan, Zhengwei Qi, Mingyuan Xia, Xue Liu:
Efficient and deterministic replay for web-enabled Android apps. 329-330 - Dhananjai Madhava Rao:
A parallel framework for ab initio transcript-clustering. 331-332 - Robert Biddle, Andreas Meier, Martin Kropp, Craig Anslow:
Sources of satisfaction in agile software development. 333-334 - Md. Masudur Rahman, Saikat Chakraborty, Baishakhi Ray:
Which similarity metric to use for software documents?: a study on information retrieval based software engineering tasks. 335-336 - Michael John Decker, Christian D. Newman, Natalia Dragan, Michael L. Collard, Jonathan I. Maletic, Nicholas A. Kraft:
A taxonomy of how method stereotypes change. 337-338 - Andrew Hill, Corina S. Pasareanu, Kathryn T. Stolee:
Automated program repair with canonical constraints. 339-341 - Henning Schnoor, Wilhelm Hasselbring:
Toward measuring software coupling via weighted dynamic metrics. 342-343 - Bilal Amir, Paul Ralph:
There is no random sampling in software engineering research. 344-345 - Affan Rauf, Muhammad Nawaz, Junaid Haroon Siddiqui:
Efficient iterative deepening for bounded exhaustive generation of complex structures. 346-347 - Mohammad Masudur Rahman, Chanchal K. Roy:
Improving bug localization with report quality dynamics and query reformulation. 348-349 - Haipeng Cai, John Jenkins:
Towards sustainable Android malware detection. 350-351 - Jeffrey Svajlenko, Chanchal K. Roy:
Fast, scalable and user-guided clone detection. 352-353 - Chong Tang, Kevin J. Sullivan, Baishakhi Ray:
Searching for high-performing software configurations with metaheuristic algorithms. 354-355 - Edwin Dauber, Aylin Caliskan, Richard E. Harang, Rachel Greenstadt:
Git blame who?: stylistic authorship attribution of small, incomplete source code fragments. 356-357 - Xiao Wang, Lu Xiao, Ye Yang, Xinyi Xu, Yu Jiang:
Identifying TraIn: a neglected form of socio-technical incongruence. 358-359 - Weili Chen, Zibin Zheng, Mingjie Ma, Pinjia He, Peilin Zheng, Yuren Zhou:
Efficient blockchain-based software systems via hierarchical bucket tree. 360-361 - Fenfang Xie, Liang Chen, Dongding Lin, Chuan Chen, Zibin Zheng, Xiaola Lin:
Group preference based API recommendation via heterogeneous information network. 362-363 - Weizhao Yuan, Hoang H. Nguyen, Lingxiao Jiang, Yuting Chen:
LibraryGuru: API recommendation for Android developers. 364-365 - Ansong Ni, Ming Li:
ACONA: active online model adaptation for predicting continuous integration build failures. 366-367 - Manzoor Ahmad, Christophe Gnaho, Jean-Michel Bruel, Régine Laleau:
How to handle environmental uncertainty in goal-based requirements engineering. 368-369 - Andreas Rau, Jenny Hotzkow, Andreas Zeller:
Efficient GUI test generation by learning from tests of other apps. 370-371 - Alexandre Perez, Rui Abreu:
A qualitative reasoning approach to spectrum-based fault localization. 372-373 - Melanie Langermeier, Bernhard Bauer:
Evaluating project compliance during EA planning: a model-based semi automatic method for enterprise architecture planning. 374-375 - Ayesha Afzal, Ahmad Akhtar, Nabila Ishfaq, Basit Shafiq, Shafay Shamail, Abeer Elahraf, Jaideep Vaidya, Nabil R. Adam:
ASSEMBLE: a collaborative business process development tool. 376-377 - Jing Zhao, Gao-Rong Ning, Hualin Lu, Yanbin Wang, Yan Cai, Jian Zhang:
A weight-based approach to combinatorial test generation. 378-379 - Farnaz Behrang, Alessandro Orso:
Automated test migration for mobile apps. 384-385 - Hongliang Liang, Wenying Hu, Yini Zhang, Lin Jiang, Wuwei Shen:
USE: unified and split execution for exposing divergences between versions. 386-387 - Pengcheng Yin, Bowen Deng, Edgar Chen, Bogdan Vasilescu, Graham Neubig:
Learning to mine parallel natural language/source code corpora from stack overflow. 388-389 - Rainer Niedermayr, Tobias Röhm, Stefan Wagner:
Identification of methods with low fault risk. 390-391 - Fabienne Boyer, Noël De Palma, Xinxiu Tao, Xavier Etchevers:
A declarative approach for updating distributed microservices. 392-393 - Chun-Han Lin, Fang Yu, Jie-Hong Roland Jiang, Tevfik Bultan:
Static detection of API call vulnerabilities in iOS executables. 394-395 - Harald Störrle, Nick Baltsen, Henrik Christoffersen, Anja M. Maier:
How do modelers read UML diagrams?: preliminary results from an eye-tracking study. 396-397 - Amir Zghidi, Imed Hammouda, Brahim Hnich:
Towards a formal API assessment. 398-399 - Luis Cruz, Rui Abreu:
Measuring the energy footprint of mobile testing frameworks. 400-401 - Vladimir Ivanov, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin:
Precooked developer dashboards: what to show and how to use. 402-403 - Lykes Claytor, Francisco Servant:
Understanding and leveraging developer inexpertise. 404-405 - Isabella Ferreira, Eduardo Fernandes, Diego Cedrim, Anderson G. Uchôa, Ana Carla Bibiano, Alessandro Garcia, João Lucas Correia, Filipe Santos, Gabriel Nunes, Caio Barbosa, Baldoino Fonseca, Rafael Maiani de Mello:
The buggy side of code refactoring: understanding the relationship between refactorings and bugs. 406-407 - Thierry Titcheu Chekam, Mike Papadakis, Tegawendé F. Bissyandé, Yves Le Traon:
Predicting the fault revelation utility of mutants. 408-409 - Ramanathan Ramu, Ganesha Upadhyaya, Hoan Anh Nguyen, Hridesh Rajan:
Hybrid traversal: efficient source code analysis at scale. 412-413 - Akond Rahman, Jonathan Stallings, Laurie A. Williams:
Defect prediction metrics for infrastructure as code scripts in DevOps. 414-415 - Michael Vierhauser, Sean Bayley, Jane Wyngaard, Jinghui Cheng, Wandi Xiong, Robyn R. Lutz, Joshua Huseman, Jane Cleland-Huang:
Interlocking safety cases for unmanned autonomous systems in urban environments. 416-417 - Ernani César dos Santos, Patricia Vilain, Douglas Hiura Longo:
A systematic literature review to support the selection of user acceptance testing techniques. 418-419 - Spencer Smith, Mojdeh Sayari Nejad, Alan Wassyng:
Assurance cases for scientific computing software. 420-421 - Tianyi Zhang, Miryung Kim:
Grafter: transplantation and differential testing for clones. 422-423 - Tegan Brennan, Seemanta Saha, Tevfik Bultan:
Symbolic path cost analysis for side-channel detection. 424-425 - Patrick Morrison, Tosin Daniel Oyetoyan, Laurie A. Williams:
Identifying security issues in software development: are keywords enough? 426-427 - Gábor Horváth, Péter Szécsi, Zoltán Gera, Dániel Krupp, Norbert Pataki:
Implementation and evaluation of cross translation unit symbolic execution for C family languages. 428 - Daniel DeFreez, Aditya V. Thakur, Cindy Rubio-González:
Path-based function embeddings. 430-431 - Paul Temple, Mathieu Acher, Jean-Marc Jézéquel:
Multimorphic testing. 432-433 - Claudio Menghi, Christos Tsigkanos, Thorsten Berger, Patrizio Pelliccione, Carlo Ghezzi:
Property specification patterns for robotic missions. 434-435 - Thomas Karcher, Mathias Landhäußer:
Autotuning PostgreSQL: a blueprint for successful autotuning of real-world applications. 436-437 - Claudio Menghi, Sergio García, Patrizio Pelliccione, Jana Tumova:
Towards multi-robot applications planning under uncertainty. 438-439 - Yuxia Zhang, Xin Tan, Minghui Zhou, Zhi Jin:
Companies' domination in FLOSS development: an empirical study of OpenStack. 440-441 - Panagiotis Stratis, Ajitha Rajan:
Reordering tests for faster test suite execution. 442-443 - Arushi Gupta, Wentao Wang, Nan Niu, Juha Savolainen:
Answering the requirements traceability questions. 444-445 - Christopher Steven Timperley, Susan Stepney, Claire Le Goues:
BugZoo: a platform for studying software bugs. 446-447
Doctoral symposium
- Fahed Alkhabbas:
An approach to engineer and realize emergent configurations in the internet of things. 448-449 - Gemma Catolino:
Effort-oriented methods and tools for software development and maintenance for mobile apps. 450-451 - Shafiul Azam Chowdhury:
Understanding and improving cyber-physical system models and development tools. 452-453 - Sergio García:
Effective engineering of multi-robot software applications. 454-455 - Lea Kristin Gerling:
Automated migration support for software product line co-evolution. 456-457 - Yuxing Ma:
Constructing supply chains in open source software. 458-459 - Fabiana Freitas Mendes:
The relationship between personality and value-based decision-making. 460-461 - Mahyar Tourchi Moghaddam:
IoT-based urban security models. 462-463 - Nuthan Munaiah:
Assisted discovery of software vulnerabilities. 464-467 - Giovanni Liva:
Automatic verification of time behavior of programs. 468-471 - Junjie Chen:
Learning to accelerate compiler testing. 472-475 - Akond Rahman:
Characteristics of defective infrastructure as code scripts in DevOps. 476-479 - André N. Meyer:
Fostering software developers' productivity at work through self-monitoring and goal-setting. 480-483 - Wasim Said:
Interactive model mining from embedded legacy software. 484-487 - Beyza Eken:
Assessing personalized software defect predictors. 488-491 - Bin Lin:
Crowdsourced software development and maintenance. 492-495 - Norman Peitek:
A neuro-cognitive perspective of program comprehension. 496-499
ACM student research competition
- Larissa Rocha Soares:
VarXplorer: reasoning about feature interactions. 500-502 - Moritz Beller:
Toward an empirical theory of feedback-driven development. 503-505 - Shafiul Azam Chowdhury:
Automatically finding bugs in commercial cyber-physical system development tool chains. 506-508 - Muhammad Ali Gulzar:
Interactive and automated debugging for big data analytics. 509-511 - Eman Aldakheel:
Deadlock detector and solver (DDS). 512-514 - Nafiseh Kahani:
AutoModel: a domain-specific language for automatic modeling of real-time embedded systems. 515-517 - Jacob Krüger:
When to extract features: towards a recommender system. 518-520 - Vanya Yaneva:
Compiler-assisted test acceleration using GPUs. 521-523 - Asher Trockman:
Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem. 524-526 - Hengbiao Yu:
Combining symbolic execution and model checking to verify MPI programs. 527-530
Technical briefings: session I
- Laura Moreno, Andrian Marcus:
Automatic software summarization: the state of the art. 530-531 - Peter Zimmerer:
Strategy for continuous testing in iDevOps. 532-533 - Sira Vegas:
Analyzing software engineering experiments: everything you always wanted to know but were afraid to ask. 534-535
Technical briefings: session II
- Alessio Ferrari:
Natural language requirements processing: from research to practice. 536-537 - Sergio Segura, Zhi Quan Zhou:
Metamorphic testing 20 years later: a hands-on introduction. 538-539 - Diomidis Spinellis, Georgios Gousios:
How to analyze git repositories with command line tools: we're not in kansas anymore. 540-541
Technical briefings: session III
- Georgios Gousios:
Big data software analytics with Apache Spark. 542-543 - Suraj C. Kothari:
Demystifying cyber-physical malware. 544-545 - Tushar Sharma:
Detecting and managing code smells: research and practice. 546-547
Technical briefings: session IV
- Karl Meinke, Amel Bennaceur:
Machine learning for software engineering: models, methods, and applications. 548-549 - Eric Bodden:
State of the systems security. 550-551 - Thomas Ball, Judith Bishop, Joe Finney:
Multi-platform computing for physical devices via MakeCode and CODAL. 552-553
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.