ACM/IEEE International Conference on Software Engineering, ICSE 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis

Mukund Raghothaman, Yi Wei, Youssef Hamadi

SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-objective software effort estimation

Federica Sarro, Alessio Petrozziello, Mark Harman

Multi-objective software effort estimation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Missing data imputation based on low-rank recovery and semi-supervised regression for software effort estimation

Xiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu

Missing data imputation based on low-rank recovery and semi-supervised regression for software effort estimation

Details
Discussion Comments: 0
Verification: Authors have not verified information

iDice: problem identification for emerging issues

Qingwei Lin, Jian-Guang Lou, Hongyu Zhang, Dongmei Zhang

iDice: problem identification for emerging issues

Details
Discussion Comments: 0
Verification: Authors have not verified information

Termination-checking for LLVM peephole optimizations

David Menendez, Santosh Nagarakatte

Termination-checking for LLVM peephole optimizations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Debugging for reactive programming

Guido Salvaneschi, Mira Mezini

Debugging for reactive programming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Synthesizing framework models for symbolic execution

Jinseong Jeon, Xiaokang Qiu, Jonathan Fetter-Degges, Jeffrey S. Foster, Armando Solar-Lezama

Synthesizing framework models for symbolic execution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient large-scale trace checking using mapreduce

Marcello M. Bersani, Domenico Bianculli, Carlo Ghezzi, Srdan Krstic, Pierluigi San Pietro

Efficient large-scale trace checking using mapreduce

Details
Discussion Comments: 0
Verification: Authors have not verified information

VDTest: an automated framework to support testing for virtual devices

Tingting Yu, Xiao Qu, Myra B. Cohen

VDTest: an automated framework to support testing for virtual devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Augmenting API documentation with insights from stack overflow

Christoph Treude, Martin P. Robillard

Augmenting API documentation with insights from stack overflow

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mining sandboxes

Konrad Jamrozik, Philipp von Styp-Rekowsky, Andreas Zeller

Mining sandboxes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Feature-model interfaces: the highway to compositional analyses of highly-configurable systems

Reimar Schröter, Sebastian Krieter, Thomas Thüm, Fabian Benduhn, Gunter Saake

Feature-model interfaces: the highway to compositional analyses of highly-configurable systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring language support for immutability

Michael J. Coblenz, Joshua Sunshine, Jonathan Aldrich, Brad A. Myers, Sam Weber, Forrest Shull

Exploring language support for immutability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Disseminating architectural knowledge on open-source projects: a case study of the book "architecture of open-source applications"

Martin P. Robillard, Nenad Medvidovic

Disseminating architectural knowledge on open-source projects: a case study of the book "architecture of open-source applications"

Details
Discussion Comments: 0
Verification: Authors have not verified information

Generating performance distributions via probabilistic symbolic execution

Bihuan Chen, Yang Liu, Wei Le

Generating performance distributions via probabilistic symbolic execution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Shadow of a doubt: testing for divergences between software versions

Hristina Palikareva, Tomasz Kuchta, Cristian Cadar

Shadow of a doubt: testing for divergences between software versions

Details
Discussion Comments: 0
Verification: Authors have not verified information

CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features

Shing-Chi Cheung, Wanjun Chen, Yepang Liu, Chang Xu

CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crowdsourcing program preconditions via a classification game

Daniel Fava, Dan Shapiro, Joseph C. Osborn, Martin Schäf, E. James Whitehead Jr.

Crowdsourcing program preconditions via a classification game

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance issues and optimizations in JavaScript: an empirical study

Marija Selakovic, Michael Pradel

Performance issues and optimizations in JavaScript: an empirical study

Details
Discussion Comments: 0
Verification: Authors have not verified information

From word embeddings to document similarities for improved information retrieval in software engineering

Xin Ye, Hui Shen, Xiao Ma, Razvan C. Bunescu, Chang Liu

From word embeddings to document similarities for improved information retrieval in software engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated parameter optimization of classification techniques for defect prediction models

Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto

Automated parameter optimization of classification techniques for defect prediction models

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study of practitioners' perspectives on green software engineering

Irene Manotas, Christian Bird, Rui Zhang, David C. Shepherd, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause

An empirical study of practitioners' perspectives on green software engineering

Details
Author Comments: We are not able to disclose the data sets produced during the research presented in this paper due to Non Disclosure Agreements signed with the involved parties.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Revisiting code ownership and its relationship with software quality in the scope of modern code review

Patanamon Thongtanunam, Shane McIntosh, Ahmed E. Hassan, Hajimu Iida

Revisiting code ownership and its relationship with software quality in the scope of modern code review

Details
Discussion Comments: 0
Verification: Authors have not verified information

Building a theory of job rotation in software engineering from an instrumental case study

Ronnie E. S. Santos, Fabio Q. B. da Silva, Cleyton V. C. de Magalhães, Cleviton V. F. Monteiro

Building a theory of job rotation in software engineering from an instrumental case study

Details
Discussion Comments: 0
Verification: Authors have not verified information

A practical guide to select quality indicators for assessing pareto-based search algorithms in search-based software engineering

Shuai Wang, Shaukat Ali, Tao Yue, Yan Li, Marius Liaaen

A practical guide to select quality indicators for assessing pareto-based search algorithms in search-based software engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Program synthesis using natural language

Aditya Desai, Sumit Gulwani, Vineet Hingorani, Nidhi Jain, Amey Karkare, Mark Marron, Sailesh R, Subhajit Roy

Program synthesis using natural language

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated energy optimization of HTTP requests for mobile applications

Ding Li, Yingjun Lyu, Jiaping Gui, William G. J. Halfond

Automated energy optimization of HTTP requests for mobile applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Optimizing selection of competing services with probabilistic hierarchical refinement

Tian Huat Tan, Manman Chen, Jun Sun, Yang Liu, Étienne André, Yinxing Xue, Jin Song Dong

Optimizing selection of competing services with probabilistic hierarchical refinement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable thread sharing analysis

Jeff Huang

Scalable thread sharing analysis

Details
Discussion Comments: 0
Verification: Author has not verified information

Understanding asynchronous interactions in full-stack JavaScript

Saba Alimadadi, Ali Mesbah, Karthik Pattabiraman

Understanding asynchronous interactions in full-stack JavaScript

Details
Discussion Comments: 0
Verification: Authors have not verified information

Belief & evidence in empirical software engineering

Premkumar T. Devanbu, Thomas Zimmermann, Christian Bird

Belief & evidence in empirical software engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Risk-driven revision of requirements models

Dalal Alrajeh, Axel van Lamsweerde, Jeff Kramer, Alessandra Russo, Sebastián Uchitel

Risk-driven revision of requirements models

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding and fixing multiple language interoperability issues: the C/Fortran case

Nawrin Sultana, Justin Middleton, Jeffrey Overbey, Munawar Hafiz

Understanding and fixing multiple language interoperability issues: the C/Fortran case

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliability of Run-Time Quality-of-Service evaluation using parametric model checking

Guoxin Su, David S. Rosenblum, Giordano Tamburrelli

Reliability of Run-Time Quality-of-Service evaluation using parametric model checking

Details
Discussion Comments: 0
Verification: Authors have not verified information

BigDebug: debugging primitives for interactive big data processing in spark

Muhammad Ali Gulzar, Matteo Interlandi, Seunghyun Yoo, Sai Deep Tetali, Tyson Condie, Todd D. Millstein, Miryung Kim

BigDebug: debugging primitives for interactive big data processing in spark

Details
Discussion Comments: 0
Verification: Authors have not verified information

Overcoming open source project entry barriers with a portal for newcomers

Igor Steinmacher, Tayana Uchôa Conte, Christoph Treude, Marco Aurélio Gerosa

Overcoming open source project entry barriers with a portal for newcomers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

On the limits of mutation reduction strategies

Rahul Gopinath, Mohammad Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce

On the limits of mutation reduction strategies

Details
Author Comments: The paper is built using Knitr and uses Nix packaging manager. If you have a Nix installation, use ./bin/nix.sh to get a compilation environment where the Knitr sources can be compiled using `make`
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Nomen est omen: exploring and exploiting similarities between argument and parameter names

Hui Liu, Qiurong Liu, Cristian-Alexandru Staicu, Michael Pradel, Yue Luo

Nomen est omen: exploring and exploiting similarities between argument and parameter names

Details
Discussion Comments: 0
Verification: Authors have not verified information

Behavioral log analysis with statistical guarantees

Nimrod Busany, Shahar Maoz

Behavioral log analysis with statistical guarantees

Details
Discussion Comments: 0
Verification: Authors have not verified information

DoubleTake: fast and precise error detection via evidence-based dynamic analysis

Tongping Liu, Charlie Curtsinger, Emery D. Berger

DoubleTake: fast and precise error detection via evidence-based dynamic analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

A comparison of 10 sampling algorithms for configurable systems

Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Rohit Gheyi, Sven Apel

A comparison of 10 sampling algorithms for configurable systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Probing for requirements knowledge to stimulate architectural thinking

Preethu Rose Anish, Balaji Balasubramaniam, Abhishek Sainani, Jane Cleland-Huang, Maya Daneva, Roel J. Wieringa, Smita Ghaisas

Probing for requirements knowledge to stimulate architectural thinking

Details
Discussion Comments: 0
Verification: Authors have not verified information

The impact of test case summaries on bug fixing performance: an empirical investigation

Sebastiano Panichella, Annibale Panichella, Moritz Beller, Andy Zaidman, Harald C. Gall

The impact of test case summaries on bug fixing performance: an empirical investigation

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automatic model generation from documentation for Java API functions

Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin

Automatic model generation from documentation for Java API functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions

Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng

IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Angelix: scalable multiline program patch synthesis via symbolic analysis

Sergey Mechtaev, Jooyong Yi, Abhik Roychoudhury

Angelix: scalable multiline program patch synthesis via symbolic analysis

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automatically learning semantic features for defect prediction

Song Wang, Taiyue Liu, Lin Tan

Automatically learning semantic features for defect prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information

An analysis of the search spaces for generate and validate patch generation systems

Fan Long, Martin C. Rinard

An analysis of the search spaces for generate and validate patch generation systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Energy profiles of Java collections classes

Samir Hasan, Zachary King, Munawar Hafiz, Mohammed Sayagh, Bram Adams, Abram Hindle

Energy profiles of Java collections classes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices

Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quality experience: a grounded theory of successful agile projects without dedicated testers

Lutz Prechelt, Holger Schmeisky, Franz Zieris

Quality experience: a grounded theory of successful agile projects without dedicated testers

Details
Author Comments: The detailed qualitative data (case study database) is slightly confidential: we have cleared with the partner companies only the quotes appearing in the article.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Automated partitioning of android applications for trusted execution environments

Konstantin Rubinov, Lucia Rosculete, Tulika Mitra, Abhik Roychoudhury

Automated partitioning of android applications for trusted execution environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

SourcererCC: scaling code clone detection to big-code

Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes

SourcererCC: scaling code clone detection to big-code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decoupling level: a new metric for architectural maintenance complexity

Ran Mo, Yuanfang Cai, Rick Kazman, Lu Xiao, Qiong Feng

Decoupling level: a new metric for architectural maintenance complexity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Discovering "unknown known" security requirements

Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew John Edwards, Ruzanna Chitchyan, Muhammad Ali Babar

Discovering "unknown known" security requirements

Details
Discussion Comments: 0
Verification: Authors have not verified information

StubDroid: automatic inference of precise data-flow summaries for the android framework

Steven Arzt, Eric Bodden

StubDroid: automatic inference of precise data-flow summaries for the android framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the techniques we create, the tools we build, and their misalignments: a study of KLEE

Eric F. Rizzi, Sebastian G. Elbaum, Matthew B. Dwyer

On the techniques we create, the tools we build, and their misalignments: a study of KLEE

Details
Discussion Comments: 0
Verification: Authors have not verified information

MobiPlay: a remote execution based record-and-replay tool for mobile applications

Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li

MobiPlay: a remote execution based record-and-replay tool for mobile applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward a framework for detecting privacy policy violations in android application code

Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu

Toward a framework for detecting privacy policy violations in android application code

Details
Discussion Comments: 0
Verification: Authors have not verified information

RETracer: triaging crashes by reverse execution from partial memory dumps

Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis

RETracer: triaging crashes by reverse execution from partial memory dumps

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Fixing deadlocks via lock pre-acquisitions

Yan Cai, Lingwei Cao

Fixing deadlocks via lock pre-acquisitions

Details
Discussion Comments: 0
Verification: Authors have not verified information

PRADA: prioritizing android devices for apps by mining large-scale usage data

Xuan Lu, Xuanzhe Liu, Huoran Li, Tao Xie, Qiaozhu Mei, Dan Hao, Gang Huang, Feng Feng

PRADA: prioritizing android devices for apps by mining large-scale usage data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coverage-driven test code generation for concurrent classes

Valerio Terragni, Shing-Chi Cheung

Coverage-driven test code generation for concurrent classes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Jumping through hoops: why do Java developers struggle with cryptography APIs?

Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden

Jumping through hoops: why do Java developers struggle with cryptography APIs?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code review quality: how developers see it

Oleksii Kononenko, Olga Baysal, Michael W. Godfrey

Code review quality: how developers see it

Details
Discussion Comments: 0
Verification: Authors have not verified information

Featured model-based mutation analysis

Xavier Devroey, Gilles Perrouin, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens, Patrick Heymans

Featured model-based mutation analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Guiding dynamic symbolic execution toward unverified program executions

Maria Christakis, Peter Müller, Valentin Wüstholz

Guiding dynamic symbolic execution toward unverified program executions

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Learning API usages from bytecode: a statistical approach

Tam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen

Learning API usages from bytecode: a statistical approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving refactoring speed by 10X

Jongwook Kim, Don S. Batory, Danny Dig, Maider Azanza

Improving refactoring speed by 10X

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revisit of automatic debugging via human focus-tracking analysis

Xiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan, Baowen Xu

Revisit of automatic debugging via human focus-tracking analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code anomalies flock together: exploring code anomaly agglomerations for locating design problems

Willian Nalepa Oizumi, Alessandro F. Garcia, Leonardo da Silva Sousa, Bruno Barbieri Pontes Cafeo, Yixue Zhao

Code anomalies flock together: exploring code anomaly agglomerations for locating design problems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Comparing white-box and black-box test prioritization

Christopher Henard, Mike Papadakis, Mark Harman, Yue Jia, Yves Le Traon

Comparing white-box and black-box test prioritization

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the "naturalness" of buggy code

Baishakhi Ray, Vincent Hellendoorn, Saheel Godhane, Zhaopeng Tu, Alberto Bacchelli, Premkumar T. Devanbu

On the "naturalness" of buggy code

Details
Discussion Comments: 0
Verification: Authors have not verified information

How does the degree of variability affect bug finding?

Jean Melo, Claus Brabrand, Andrzej Wasowski

How does the degree of variability affect bug finding?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Work practices and challenges in pull-based development: the contributor's perspective

Georgios Gousios, Margaret-Anne D. Storey, Alberto Bacchelli

Work practices and challenges in pull-based development: the contributor's perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are "non-functional" requirements really non-functional?: an investigation of non-functional requirements in practice

Jonas Eckhardt, Andreas Vogelsang, Daniel Méndez Fernández

Are "non-functional" requirements really non-functional?: an investigation of non-functional requirements in practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

Finding and analyzing compiler warning defects

Chengnian Sun, Vu Le, Zhendong Su

Finding and analyzing compiler warning defects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Too long; didn't watch!: extracting relevant fragments from software development video tutorials

Luca Ponzanelli, Gabriele Bavota, Andrea Mocci, Massimiliano Di Penta, Rocco Oliveto, Mir Anamul Hasan, Barbara Russo, Sonia Haiduc, Michele Lanza

Too long; didn't watch!: extracting relevant fragments from software development video tutorials

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quantifying and mitigating turnover-induced knowledge loss: case studies of chrome and a project at avaya

Peter C. Rigby, Yue Cai Zhu, Samuel M. Donadelli, Audris Mockus

Quantifying and mitigating turnover-induced knowledge loss: case studies of chrome and a project at avaya

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated test suite generation for time-continuous simulink models

Reza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann

Automated test suite generation for time-continuous simulink models

Details
Discussion Comments: 0
Verification: Authors have not verified information

How does regression test prioritization perform in real-world software evolution?

Yafeng Lu, Yiling Lou, Shiyang Cheng, Lingming Zhang, Dan Hao, Yangfan Zhou, Lu Zhang

How does regression test prioritization perform in real-world software evolution?

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical comparison of compiler testing techniques

Junjie Chen, Wenxiang Hu, Dan Hao, Yingfei Xiong, Hongyu Zhang, Lu Zhang, Bing Xie

An empirical comparison of compiler testing techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

Locking discipline inference and checking

Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto, Javier Thaine

Locking discipline inference and checking

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Type-aware concolic testing of JavaScript programs

Monika Dhok, Murali Krishna Ramanathan, Nishant Sinha

Type-aware concolic testing of JavaScript programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

The emerging role of data scientists on software development teams

Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel

The emerging role of data scientists on software development teams

Details
Discussion Comments: 0
Verification: Authors have not verified information

Finding security bugs in web applications using a catalog of access control patterns

Joseph P. Near, Daniel Jackson

Finding security bugs in web applications using a catalog of access control patterns

Details
Discussion Comments: 0
Verification: Authors have not verified information

The sky is not the limit: multitasking across GitHub projects

Bogdan Vasilescu, Kelly Blincoe, Qi Xuan, Casey Casalnuovo, Daniela E. Damian, Premkumar T. Devanbu, Vladimir Filkov

The sky is not the limit: multitasking across GitHub projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying and quantifying architectural debt

Lu Xiao, Yuanfang Cai, Rick Kazman, Ran Mo, Qiong Feng

Identifying and quantifying architectural debt

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using (bio)metrics to predict code quality online

Sebastian C. Müller, Thomas Fritz

Using (bio)metrics to predict code quality online

Details
Discussion Comments: 0
Verification: Authors have not verified information

The challenges of staying together while moving fast: an exploratory study

Julia Rubin, Martin Rinard

The challenges of staying together while moving fast: an exploratory study

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Floating-point precision tuning using blame analysis

Cindy Rubio-González, Cuong Nguyen, Benjamin Mehne, Koushik Sen, James Demmel, William Kahan, Costin Iancu, Wim Lavrijsen, David H. Bailey, David Hough

Floating-point precision tuning using blame analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Release planning of mobile apps based on user reviews

Lorenzo Villarroel, Gabriele Bavota, Barbara Russo, Rocco Oliveto, Massimiliano Di Penta

Release planning of mobile apps based on user reviews

Details
Discussion Comments: 0
Verification: Authors have not verified information

The evolution of C programming practices: a study of the Unix operating system 1973-2015

Diomidis Spinellis, Panos Louridas, Maria Kechagia

The evolution of C programming practices: a study of the Unix operating system 1973-2015

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Cross-supervised synthesis of web-crawlers

Adi Omari, Sharon Shoham, Eran Yahav

Cross-supervised synthesis of web-crawlers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cross-project defect prediction using a connectivity-based unsupervised classifier

Feng Zhang, Quan Zheng, Ying Zou, Ahmed E. Hassan

Cross-project defect prediction using a connectivity-based unsupervised classifier

Details
Discussion Comments: 0
Verification: Authors have not verified information

PAC learning-based verification and model synthesis

Yu-Fang Chen, Chiao Hsieh, Ondrej Lengál, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang

PAC learning-based verification and model synthesis

Details
Discussion Comments: 0
Verification: Authors have not verified information

AntMiner: mining more bugs by reducing noise interference

Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai

AntMiner: mining more bugs by reducing noise interference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reducing combinatorics in GUI testing of android applications

Nariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek

Reducing combinatorics in GUI testing of android applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Feedback-directed instrumentation for deployed JavaScript applications

Magnus Madsen, Frank Tip, Esben Andreasen, Koushik Sen, Anders Møller

Feedback-directed instrumentation for deployed JavaScript applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Grounded theory in software engineering research: a critical review and guidelines

Klaas-Jan Stol, Paul Ralph, Brian Fitzgerald

Grounded theory in software engineering research: a critical review and guidelines

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study on the impact of C++ lambdas and programmer experience

Phillip Merlin Uesbeck, Andreas Stefik, Stefan Hanenberg, Jan Pedersen, Patrick Daleiden

An empirical study on the impact of C++ lambdas and programmer experience

Details
Discussion Comments: 0
Verification: Authors have not verified information