ACM/IEEE International Conference on Software Engineering, ICSE 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Do developers read compiler error messages?

Titus Barik, Justin Smith, Kevin Lubick, Elisabeth Holmes, Jing Feng, Emerson R. Murphy-Hill, Chris Parnin

Do developers read compiler error messages?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Precise condition synthesis for program repair

Yingfei Xiong, Jie Wang, Runfa Yan, Jiachen Zhang, Shi Han, Gang Huang, Lu Zhang

Precise condition synthesis for program repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analysis and testing of notifications in Android wear applications

Hailong Zhang, Atanas Rountev

Analysis and testing of notifications in Android wear applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Repairing event race errors by controlling nondeterminism

Christoffer Quist Adamsen, Anders Møller, Rezwana Karim, Manu Sridharan, Frank Tip, Koushik Sen

Repairing event race errors by controlling nondeterminism

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stochastic optimization of program obfuscation

Han Liu, Chengnian Sun, Zhendong Su, Yu Jiang, Ming Gu, Jiaguang Sun

Stochastic optimization of program obfuscation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Performance diagnosis for inefficient loops

Linhai Song, Shan Lu

Performance diagnosis for inefficient loops

Details
Discussion Comments: 0
Verification: Authors have not verified information

An unsupervised approach for discovering relevant tutorial fragments for APIs

He Jiang, Jingxuan Zhang, Zhilei Ren, Tao Zhang

An unsupervised approach for discovering relevant tutorial fragments for APIs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Exploring API embedding for API usages and applications

Trong Duc Nguyen, Anh Tuan Nguyen, Hung Dang Phan, Tien N. Nguyen

Exploring API embedding for API usages and applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Search-driven string constraint solving for vulnerability detection

Julian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand

Search-driven string constraint solving for vulnerability detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

RClassify: classifying race conditions in web applications via deterministic replay

Lu Zhang, Chao Wang

RClassify: classifying race conditions in web applications via deterministic replay

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic text input generation for mobile testing

Peng Liu, Xiangyu Zhang, Marco Pistoia, Yunhui Zheng, Manoel Marques, Lingfei Zeng

Automatic text input generation for mobile testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutions

Andrea Aquino, Giovanni Denaro, Mauro Pezzè

Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Balancing soundness and efficiency for practical testing of configurable systems

Sabrina Souto, Marcelo d'Amorim, Rohit Gheyi

Balancing soundness and efficiency for practical testing of configurable systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Glacier: transitive class immutability for Java

Michael J. Coblenz, Whitney Nelson, Jonathan Aldrich, Brad A. Myers, Joshua Sunshine

Glacier: transitive class immutability for Java

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Evaluating and improving fault localization

Spencer Pearson, José Campos, René Just, Gordon Fraser, Rui Abreu, Michael D. Ernst, Deric Pang, Benjamin Keller

Evaluating and improving fault localization

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SPAIN: security patch analysis for binaries towards understanding the pain and pills

Zhengzi Xu, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Fu Song

SPAIN: security patch analysis for binaries towards understanding the pain and pills

Details
Discussion Comments: 0
Verification: Authors have not verified information

How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem

Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yuming Zhou, Baowen Xu

How do developers fix cross-project correlated bugs?: a case study on the GitHub scientific python ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making malory behave maliciously: targeted fuzzing of android execution environments

Siegfried Rasthofer, Steven Arzt, Stefan Triller, Michael Pradel

Making malory behave maliciously: targeted fuzzing of android execution environments

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Can latent topics in source code predict missing architectural tactics?

Raghuram Gopalakrishnan, Palak Sharma, Mehdi Mirakhorli, Matthias Galster

Can latent topics in source code predict missing architectural tactics?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software development waste

Todd Sedano, Paul Ralph, Cécile Péraire

Software development waste

Details
Discussion Comments: 0
Verification: Authors have not verified information

The evolution of continuous experimentation in software product development: from data to a data-driven organization at scale

Aleksander Fabijan, Pavel Dmitriev, Helena Holmström Olsson, Jan Bosch

The evolution of continuous experimentation in software product development: from data to a data-driven organization at scale

Details
Discussion Comments: 0
Verification: Authors have not verified information

Symbolic model extraction for web application verification

Ivan Bocic, Tevfik Bultan

Symbolic model extraction for web application verification

Details
Discussion Comments: 0
Verification: Authors have not verified information

PEoPL: projectional editing of product lines

Benjamin Behringer, Jochen Palz, Thorsten Berger

PEoPL: projectional editing of product lines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding the impressions, motivations, and barriers of one time code contributors to FLOSS projects: a survey

Amanda Lee, Jeffrey C. Carver, Amiangshu Bosu

Understanding the impressions, motivations, and barriers of one time code contributors to FLOSS projects: a survey

Details
Discussion Comments: 0
Verification: Authors have not verified information

Machine learning-based detection of open source license exceptions

Christopher Vendome, Mario Linares Vásquez, Gabriele Bavota, Massimiliano Di Penta, Daniel M. Germán, Denys Poshyvanyk

Machine learning-based detection of open source license exceptions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supporting software developers with a holistic recommender system

Luca Ponzanelli, Simone Scalabrino, Gabriele Bavota, Andrea Mocci, Rocco Oliveto, Massimiliano Di Penta, Michele Lanza

Supporting software developers with a holistic recommender system

Details
Discussion Comments: 0
Verification: Authors have not verified information

Classifying developers into core and peripheral: an empirical study on count and network metrics

Mitchell Joblin, Sven Apel, Claus Hunsen, Wolfgang Mauerer

Classifying developers into core and peripheral: an empirical study on count and network metrics

Details
Discussion Comments: 0
Verification: Authors have not verified information

UML diagram refinement (focusing on class- and use case diagrams)

David Faitelson, Shmuel S. Tyszberowicz

UML diagram refinement (focusing on class- and use case diagrams)

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Fuzzy fine-grained code-history analysis

Francisco Servant, James A. Jones

Fuzzy fine-grained code-history analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

On cross-stack configuration errors

Mohammed Sayagh, Noureddine Kerzazi, Bram Adams

On cross-stack configuration errors

Details
Discussion Comments: 0
Verification: Authors have not verified information

ProEva: runtime proactive performance evaluation based on continuous-time markov chains

Guoxin Su, Taolue Chen, Yuan Feng, David S. Rosenblum

ProEva: runtime proactive performance evaluation based on continuous-time markov chains

Details
Discussion Comments: 0
Verification: Authors have not verified information

Semantically enhanced software traceability using deep learning techniques

Jin Guo, Jinghui Cheng, Jane Cleland-Huang

Semantically enhanced software traceability using deep learning techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

LibD: scalable and precise third-party library detection in android markets

Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo

LibD: scalable and precise third-party library detection in android markets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Travioli: a dynamic analysis for detecting data-structure traversals

Rohan Padhye, Koushik Sen

Travioli: a dynamic analysis for detecting data-structure traversals

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

An efficient, robust, and scalable approach for analyzing interacting android apps

Yutaka Tsutano, Shakthi Bachala, Witawas Srisa-an, Gregg Rothermel, Jackson Dinh

An efficient, robust, and scalable approach for analyzing interacting android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Machine-learning-guided selectively unsound static analysis

Kihong Heo, Hakjoo Oh, Kwangkeun Yi

Machine-learning-guided selectively unsound static analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Unsupervised software-specific morphological forms inference from informal discussions

Chunyang Chen, Zhenchang Xing, Ximing Wang

Unsupervised software-specific morphological forms inference from informal discussions

Details
Discussion Comments: 0
Verification: Authors have not verified information

RADAR: a lightweight tool for requirements and architecture decision analysis

Saheed A. Busari, Emmanuel Letier

RADAR: a lightweight tool for requirements and architecture decision analysis

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption

Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon, Mark Harman

An empirical study on mutation, statement and branch coverage fault revelation that avoids the unreliable clean program assumption

Details
Discussion Comments: 0
Verification: Authors have not verified information

A SEALANT for inter-app security holes in android

Youn Kyu Lee, Jae Young Bang, Gholamreza Safi, Arman Shahbazian, Yixue Zhao, Nenad Medvidovic

A SEALANT for inter-app security holes in android

Details
Discussion Comments: 0
Verification: Authors have not verified information

A general framework for dynamic stub injection

Maria Christakis, Patrick Emmisberger, Patrice Godefroid, Peter Müller

A general framework for dynamic stub injection

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Learning to prioritize test programs for compiler testing

Junjie Chen, Yanwei Bai, Dan Hao, Yingfei Xiong, Hongyu Zhang, Bing Xie

Learning to prioritize test programs for compiler testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

How good is a security policy against real breaches?: a HIPAA case study

Özgür Kafali, Jasmine Jones, Megan Petruso, Laurie Williams, Munindar P. Singh

How good is a security policy against real breaches?: a HIPAA case study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Statically checking web API requests in JavaScript

Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo

Statically checking web API requests in JavaScript

Details
Discussion Comments: 0
Verification: Authors have not verified information

From diversity by numbers to diversity as process: supporting inclusiveness in software development teams with brainstorming

Anna Filippova, Erik H. Trainer, James D. Herbsleb

From diversity by numbers to diversity as process: supporting inclusiveness in software development teams with brainstorming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive unpacking of Android apps

Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu

Adaptive unpacking of Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Becoming agile: a grounded theory of agile transitions in practice

Rashina Hoda, James Noble

Becoming agile: a grounded theory of agile transitions in practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing game

José Miguel Rojas, Thomas D. White, Benjamin S. Clegg, Gordon Fraser

Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing game

Details
Discussion Comments: 0
Verification: Authors have not verified information

What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing

He Jiang, Xiaochen Li, Zijiang Yang, Jifeng Xuan

What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decoding the representation of code in the brain: an fMRI study of code review and expertise

Benjamin Floyd, Tyler Santander, Westley Weimer

Decoding the representation of code in the brain: an fMRI study of code review and expertise

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient detection of thread safety violations via coverage-guided generation of concurrent tests

Ankit Choudhary, Shan Lu, Michael Pradel

Efficient detection of thread safety violations via coverage-guided generation of concurrent tests

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A guided genetic algorithm for automated crash reproduction

Mozhan Soltani, Annibale Panichella, Arie van Deursen

A guided genetic algorithm for automated crash reproduction

Details
Discussion Comments: 0
Verification: Authors have not verified information

To type or not to type: quantifying detectable bugs in JavaScript

Zheng Gao, Christian Bird, Earl T. Barr

To type or not to type: quantifying detectable bugs in JavaScript

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting user story information in developer-client conversations to generate extractive summaries

Paige Rodeghero, Siyuan Jiang, Ameer Armaly, Collin McMillan

Detecting user story information in developer-client conversations to generate extractive summaries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Characterizing and detecting anti-patterns in the logging code

Boyuan Chen, Zhen Ming (Jack) Jiang

Characterizing and detecting anti-patterns in the logging code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Clone refactoring with lambda expressions

Nikolaos Tsantalis, Davood Mazinanian, Shahriar Rostami

Clone refactoring with lambda expressions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analyzing APIs documentation and code to detect directive defects

Yu Zhou, Ruihang Gu, Taolue Chen, Zhiqiu Huang, Sebastiano Panichella, Harald C. Gall

Analyzing APIs documentation and code to detect directive defects

Details
Author Comments: In short time we will make available the scalable version of a research prototype we adopted for our research.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automated transplantation and differential testing for clones

Tianyi Zhang, Miryung Kim

Automated transplantation and differential testing for clones

Details
Discussion Comments: 0
Verification: Authors have not verified information

Learning syntactic program transformations from examples

Reudismam Rolim, Gustavo Soares, Loris D'Antoni, Oleksandr Polozov, Sumit Gulwani, Rohit Gheyi, Ryo Suzuki, Björn Hartmann

Learning syntactic program transformations from examples

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Syntactic and semantic differencing for combinatorial models of test designs

Rachel Tzoref-Brill, Shahar Maoz

Syntactic and semantic differencing for combinatorial models of test designs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Challenges for static analysis of Java reflection: literature review and empirical study

Davy Landman, Alexander Serebrenik, Jurgen J. Vinju

Challenges for static analysis of Java reflection: literature review and empirical study

Details
Author Comments: Distinguished paper award
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Optimizing test placement for module-level regression testing

August Shi, Suresh Thummalapenta, Shuvendu K. Lahiri, Nikolaj Bjorner, Jacek Czerwonka

Optimizing test placement for module-level regression testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Recommending and localizing change requests for mobile apps based on user reviews

Fabio Palomba, Pasquale Salza, Adelina Ciurumelea, Sebastiano Panichella, Harald C. Gall, Filomena Ferrucci, Andrea De Lucia

Recommending and localizing change requests for mobile apps based on user reviews

Details
Author Comments: We are going to deliver in the next months the scalable version of ChangeAdvisor research prototype.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Adaptive coverage and operational profile-based testing for reliability improvement

Antonia Bertolino, Breno Miranda, Roberto Pietrantuono, Stefano Russo

Adaptive coverage and operational profile-based testing for reliability improvement

Details
Author Comments: All the subjects investigated in our experiments are from the SIR repository.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automated refactoring of legacy Java software to default methods

Raffi Khatchadourian, Hidehiko Masuhara

Automated refactoring of legacy Java software to default methods

Details
Discussion Comments: 0
Verification: Authors have not verified information

Feedback-based debugging

Yun Lin, Jun Sun, Yinxing Xue, Yang Liu, Jin Song Dong

Feedback-based debugging

Details
Discussion Comments: 0
Verification: Authors have not verified information

ZenIDS: introspective intrusion detection for PHP applications

Byron Hawkins, Brian Demsky

ZenIDS: introspective intrusion detection for PHP applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A test-suite diagnosability metric for spectrum-based fault localization approaches

Alexandre Perez, Rui Abreu, Arie van Deursen

A test-suite diagnosability metric for spectrum-based fault localization approaches

Details
Discussion Comments: 0
Verification: Authors have not verified information