ACM/IEEE International Conference on Software Engineering, ICSE 2018


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Redefining prioritization: continuous prioritization for continuous integration

Jingjing Liang, Sebastian G. Elbaum, Gregg Rothermel

Redefining prioritization: continuous prioritization for continuous integration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Collective program analysis

Ganesha Upadhyaya, Hridesh Rajan

Collective program analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

ENTRUST: engineering trustworthy self-adaptive software with dynamic assurance cases

Radu Calinescu, Danny Weyns, Simos Gerasimou, M. Usman Iftikhar, Ibrahim Habli, Tim Kelly

ENTRUST: engineering trustworthy self-adaptive software with dynamic assurance cases

Details
Discussion Comments: 0
Verification: Authors have not verified information

Effect sizes and their variance for AB/BA crossover design studies

Lech Madeyski, Barbara A. Kitchenham

Effect sizes and their variance for AB/BA crossover design studies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Context-aware patch generation for better automated program repair

Ming Wen, Junjie Chen, Rongxin Wu, Dan Hao, Shing-Chi Cheung

Context-aware patch generation for better automated program repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

A posteriori typing for model-driven engineering: concepts, analysis, and applications

Juan de Lara, Esther Guerra

A posteriori typing for model-driven engineering: concepts, analysis, and applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

A comparison of program comprehension strategies by blind and sighted programmers

Ameer Armaly, Paige Rodeghero, Collin McMillan

A comparison of program comprehension strategies by blind and sighted programmers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lightweight, obfuscation-resilient detection and family identification of Android malware

Joshua Garcia, Mahmoud Hammad, Sam Malek

Lightweight, obfuscation-resilient detection and family identification of Android malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Online app review analysis for identifying emerging issues

Cuiyun Gao, Jichuan Zeng, Michael R. Lyu, Irwin King

Online app review analysis for identifying emerging issues

Details
Discussion Comments: 0
Verification: Authors have not verified information

Integrating technical debt management and software quality management processes: a framework and field tests

Narayan Ramasubbu, Chris F. Kemerer

Integrating technical debt management and software quality management processes: a framework and field tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

Leveraging program analysis to reduce user-perceived latency in mobile applications

Yixue Zhao, Marcelo Schmitt Laser, Yingjun Lyu, Nenad Medvidovic

Leveraging program analysis to reduce user-perceived latency in mobile applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

RFC-directed differential testing of certificate validation in SSL/TLS implementations

Chu Chen, Cong Tian, Zhenhua Duan, Liang Zhao

RFC-directed differential testing of certificate validation in SSL/TLS implementations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Does syntax highlighting help programming novices?

Christoph Hannebauer, Marc Hesenius, Volker Gruhn

Does syntax highlighting help programming novices?

Details
Discussion Comments: 0
Verification: Authors have not verified information

DeFlaker: automatically detecting flaky tests

Jonathan Bell, Owolabi Legunsen, Michael Hilton, Lamyaa Eloussi, Tifany Yung, Darko Marinov

DeFlaker: automatically detecting flaky tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game

Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi

The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-objective integer programming approaches for solving optimal feature selection problem: a new perspective on multi-objective optimization problems in SBSE

Yinxing Xue, Yan-Fu Li

Multi-objective integer programming approaches for solving optimal feature selection problem: a new perspective on multi-objective optimization problems in SBSE

Details
Discussion Comments: 0
Verification: Authors have not verified information

DroidStar: callback typestates for Android classes

Arjun Radhakrishna, Nicholas V. Lewchenko, Shawn Meier, Sergio Mover, Krishna Chaitanya Sripada, Damien Zufferey, Bor-Yuh Evan Chang, Pavol Cerný

DroidStar: callback typestates for Android classes

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the dichotomy of debugging behavior among programmers

Moritz Beller, Niels Spruit, Diomidis Spinellis, Andy Zaidman

On the dichotomy of debugging behavior among programmers

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A static verification framework for message passing in Go using behavioural types

Julien Lange, Nicholas Ng, Bernardo Toninho, Nobuko Yoshida

A static verification framework for message passing in Go using behavioural types

Details
Discussion Comments: 0
Verification: Authors have not verified information

Augmenting and structuring user queries to support efficient free-form code search

Raphael Sirres, Tegawendé F. Bissyandé, Dongsun Kim, David Lo, Jacques Klein, Kisub Kim, Yves Le Traon

Augmenting and structuring user queries to support efficient free-form code search

Details
Discussion Comments: 0
Verification: Authors have not verified information

CCAligner: a token based large-gap clone detector

Pengcheng Wang, Jeffrey Svajlenko, Yanzhao Wu, Yun Xu, Chanchal K. Roy

CCAligner: a token based large-gap clone detector

Details
Discussion Comments: 0
Verification: Authors have not verified information

A graph solver for the automated generation of consistent domain-specific models

Oszkár Semeráth, András Szabolcs Nagy, Dániel Varró

A graph solver for the automated generation of consistent domain-specific models

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated localization for unreproducible builds

Zhilei Ren, He Jiang, Jifeng Xuan, Zijiang Yang

Automated localization for unreproducible builds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding developers' needs on deprecation as a language feature

Anand Ashok Sawant, Maurício Finavaro Aniche, Arie van Deursen, Alberto Bacchelli

Understanding developers' needs on deprecation as a language feature

Details
Discussion Comments: 0
Verification: Authors have not verified information

Context-aware conversational developer assistants

Nick C. Bradley, Thomas Fritz, Reid Holmes

Context-aware conversational developer assistants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Debugging with intelligence via probabilistic inference

Zhaogui Xu, Shiqing Ma, Xiangyu Zhang, Shuofei Zhu, Baowen Xu

Debugging with intelligence via probabilistic inference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Semantic program repair using a reference implementation

Sergey Mechtaev, Manh-Dung Nguyen, Yannic Noller, Lars Grunske, Abhik Roychoudhury

Semantic program repair using a reference implementation

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study on the interplay between semantic coupling and co-change of software classes

Nemitari Ajienka, Andrea Capiluppi, Steve Counsell

An empirical study on the interplay between semantic coupling and co-change of software classes

Details
Discussion Comments: 0
Verification: Authors have not verified information

ConflictJS: finding and understanding conflicts between JavaScript libraries

Jibesh Patra, Pooja N. Dixit, Michael Pradel

ConflictJS: finding and understanding conflicts between JavaScript libraries

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

An empirical study of early access games on the steam platform

Dayi Lin, Cor-Paul Bezemer, Ahmed E. Hassan

An empirical study of early access games on the steam platform

Details
Discussion Comments: 0
Verification: Authors have not verified information

GUILeak: tracing privacy policy claims on user input data for Android applications

Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu

GUILeak: tracing privacy policy claims on user input data for Android applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-granular conflict and dependency analysis in software engineering based on graph transformation

Leen Lambers, Daniel Strüber, Gabriele Taentzer, Kristopher Born, Jevgenij Huebert

Multi-granular conflict and dependency analysis in software engineering based on graph transformation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Chopped symbolic execution

David Trabish, Andrea Mattavelli, Noam Rinetzky, Cristian Cadar

Chopped symbolic execution

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities

Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue

Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards reusing hints from past fixes: an exploratory study on thousands of real samples

Hao Zhong, Na Meng

Towards reusing hints from past fixes: an exploratory study on thousands of real samples

Details
Discussion Comments: 0
Verification: Authors have not verified information

Global-aware recommendations for repairing violations in exception handling

Eiji Adachi Barbosa, Alessandro Garcia

Global-aware recommendations for repairing violations in exception handling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fine-grained test minimization

Arash Vahabzadeh, Andrea Stocco, Ali Mesbah

Fine-grained test minimization

Details
Discussion Comments: 0
Verification: Authors have not verified information

ChangeLocator: locate crash-inducing changes based on crash reports

Rongxin Wu, Ming Wen, Shing-Chi Cheung, Hongyu Zhang

ChangeLocator: locate crash-inducing changes based on crash reports

Details
Discussion Comments: 0
Verification: Authors have not verified information

Neuro-symbolic program corrector for introductory programming assignments

Sahil Bhatia, Pushmeet Kohli, Rishabh Singh

Neuro-symbolic program corrector for introductory programming assignments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure coding practices in Java: challenges and vulnerabilities

Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo Arango Argoty

Secure coding practices in Java: challenges and vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

The road to live programming: insights from the practice

Juraj Kubelka, Romain Robbes, Alexandre Bergel

The road to live programming: insights from the practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

To distribute or not to distribute?: why licensing bugs matter

Christopher Vendome, Daniel M. Germán, Massimiliano Di Penta, Gabriele Bavota, Mario Linares Vásquez, Denys Poshyvanyk

To distribute or not to distribute?: why licensing bugs matter

Details
Discussion Comments: 0
Verification: Authors have not verified information

Program splicing

Yanxin Lu, Swarat Chaudhuri, Chris Jermaine, David Melski

Program splicing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards refactoring-aware regression test selection

Kaiyuan Wang, Chenguang Zhu, Ahmet Çelik, Jongwook Kim, Don S. Batory, Milos Gligoric

Towards refactoring-aware regression test selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Challenges and pitfalls on surveying evidence in the software engineering technical literature: an exploratory study with novices

Talita Vieira Ribeiro, Jobson L. Massollar, Guilherme Horta Travassos

Challenges and pitfalls on surveying evidence in the software engineering technical literature: an exploratory study with novices

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

UFO: predictive concurrency use-after-free detection

Jeff Huang

UFO: predictive concurrency use-after-free detection

Details
Discussion Comments: 0
Verification: Author has not verified information

When not to comment: questions and tradeoffs with API documentation for C++ projects

Andrew Head, Caitlin Sadowski, Emerson R. Murphy-Hill, Andrea Knight

When not to comment: questions and tradeoffs with API documentation for C++ projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Older adults and hackathons: a qualitative study

Wieslaw Kopec, Bartlomiej Balcerzak, Radoslaw Nielek, Grzegorz Kowalik, Adam Wierzbicki, Fabio Casati

Older adults and hackathons: a qualitative study

Details
Discussion Comments: 0
Verification: Authors have not verified information

How modern news aggregators help development communities shape and share knowledge

Maurício Finavaro Aniche, Christoph Treude, Igor Steinmacher, Igor Wiese, Gustavo Pinto, Margaret-Anne D. Storey, Marco Aurélio Gerosa

How modern news aggregators help development communities shape and share knowledge

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inheritance usage patterns in open-source systems

Jamie Stevenson, Murray I. Wood

Inheritance usage patterns in open-source systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

When testing meets code review: why and how developers review tests

Davide Spadini, Maurício Finavaro Aniche, Margaret-Anne D. Storey, Magiel Bruntink, Alberto Bacchelli

When testing meets code review: why and how developers review tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

Predicting future developer behavior in the IDE using topic models

Kostadin Damevski, Hui Chen, David C. Shepherd, Nicholas A. Kraft, Lori L. Pollock

Predicting future developer behavior in the IDE using topic models

Details
Discussion Comments: 0
Verification: Authors have not verified information

DetReduce: minimizing Android GUI test suites for regression testing

Wontae Choi, Koushik Sen, George C. Necula, Wenyu Wang

DetReduce: minimizing Android GUI test suites for regression testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enlightened debugging

Xiangyu Li, Shaowei Zhu, Marcelo d'Amorim, Alessandro Orso

Enlightened debugging

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The evolution of requirements practices in software startups

Catarina Gralha, Daniela Damian, Anthony I. Wasserman, Miguel Goulão, João Araújo

The evolution of requirements practices in software startups

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Inferring hierarchical motifs from execution traces

Saba Alimadadi, Ali Mesbah, Karthik Pattabiraman

Inferring hierarchical motifs from execution traces

Details
Discussion Comments: 0
Verification: Authors have not verified information

MSeer: an advanced technique for locating multiple bugs in parallel

Ruizhi Gao, W. Eric Wong

MSeer: an advanced technique for locating multiple bugs in parallel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Debugging data flows in reactive programs

Herman Banken, Erik Meijer, Georgios Gousios

Debugging data flows in reactive programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Traceability in the wild: automatically augmenting incomplete trace links

Michael Rath, Jacob Rendall, Jin L. C. Guo, Jane Cleland-Huang, Patrick Mäder

Traceability in the wild: automatically augmenting incomplete trace links

Details
Discussion Comments: 0
Verification: Authors have not verified information

FAST approaches to scalable similarity-based test case prioritization

Breno Miranda, Emilio Cruciani, Roberto Verdecchia, Antonia Bertolino

FAST approaches to scalable similarity-based test case prioritization

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow

Tianyi Zhang, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim

Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow

Details
Discussion Comments: 0
Verification: Authors have not verified information

Testing vision-based control systems using learnable evolutionary algorithms

Raja Ben Abdessalem, Shiva Nejati, Lionel C. Briand, Thomas Stifter

Testing vision-based control systems using learnable evolutionary algorithms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Programming not only by example

Hila Peleg, Sharon Shoham, Eran Yahav

Programming not only by example

Details
Author Comments: The gim-ui project contains the user study tool which uses the program space generated by scala-enumerating-synthesizer, as well as the raw data from recorded sessions.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Goal-conflict likelihood assessment based on model counting

Renzo Degiovanni, Pablo F. Castro, Marcelo Arroyo, Marcelo Ruiz, Nazareno Aguirre, Marcelo F. Frias

Goal-conflict likelihood assessment based on model counting

Details
Discussion Comments: 0
Verification: Authors have not verified information

Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations

Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira

Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are fix-inducing changes a moving target?: a longitudinal case study of just-in-time defect prediction

Shane McIntosh, Yasutaka Kamei

Are fix-inducing changes a moving target?: a longitudinal case study of just-in-time defect prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Repairing crashes in Android apps

Shin Hwei Tan, Zhen Dong, Xiang Gao, Abhik Roychoudhury

Repairing crashes in Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

What makes a great manager of software engineers?

Eirini Kalliamvakou, Christian Bird, Thomas Zimmermann, Andrew Begel, Robert DeLine, Daniel M. Germán

What makes a great manager of software engineers?

Details
Discussion Comments: 0
Verification: Authors have not verified information

A comparative study to benchmark cross-project defect prediction approaches

Steffen Herbold, Alexander Trautsch, Jens Grabowski

A comparative study to benchmark cross-project defect prediction approaches

Details
Author Comments: Nice work. You should try to filter Journal First papers though. :)
Discussion Comments: 0
Sharing: Publication does not represent original research
Verification: Authors have verified information

The scent of a smell: an extensive comparison between textual and structural smells

Fabio Palomba, Annibale Panichella, Andy Zaidman, Rocco Oliveto, Andrea De Lucia

The scent of a smell: an extensive comparison between textual and structural smells

Details
Discussion Comments: 0
Verification: Authors have not verified information

Statistical learning of API fully qualified names in code snippets of online forums

Hung Phan, Hoan Anh Nguyen, Ngoc M. Tran, Linh H. Truong, Anh Tuan Nguyen, Tien N. Nguyen

Statistical learning of API fully qualified names in code snippets of online forums

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are vulnerabilities discovered and resolved like other defects?

Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams

Are vulnerabilities discovered and resolved like other defects?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Symbolic verification of regular properties

Hengbiao Yu, Zhenbang Chen, Ji Wang, Zhendong Su, Wei Dong

Symbolic verification of regular properties

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software protection on the go: a large-scale empirical study on mobile app obfuscation

Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, Dinghao Wu

Software protection on the go: a large-scale empirical study on mobile app obfuscation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Assessing the threat of untracked changes in software evolution

André C. Hora, Danilo Silva, Marco Tulio Valente, Romain Robbes

Assessing the threat of untracked changes in software evolution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy by designers: software developers' privacy mindset

Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, Arod Balissa

Privacy by designers: software developers' privacy mindset

Details
Discussion Comments: 0
Verification: Authors have not verified information

EARMO: an energy-aware refactoring approach for mobile apps

Rodrigo Morales, Rubén Saborido, Foutse Khomh, Francisco Chicano, Giuliano Antoniol

EARMO: an energy-aware refactoring approach for mobile apps

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

To preserve or not to preserve invalid solutions in search-based software engineering: a case study in software product lines

Jianmei Guo, Kai Shi

To preserve or not to preserve invalid solutions in search-based software engineering: a case study in software product lines

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying design problems in the source code: a grounded theory

Leonardo da Silva Sousa, Anderson Oliveira, Willian Nalepa Oizumi, Simone D. J. Barbosa, Alessandro Garcia, Jaejoon Lee, Marcos Kalinowski, Rafael Maiani de Mello, Baldoino Fonseca, Roberto Felicio Oliveira, Carlos Lucena, Rodrigo B. de Paes

Identifying design problems in the source code: a grounded theory

Details
Discussion Comments: 0
Verification: Authors have not verified information

Accurate and efficient refactoring detection in commit history

Nikolaos Tsantalis, Matin Mansouri, Laleh Mousavi Eshkevari, Davood Mazinanian, Danny Dig

Accurate and efficient refactoring detection in commit history

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Deuce: a lightweight user interface for structured editing

Brian Hempel, Justin Lubin, Grace Lu, Ravi Chugh

Deuce: a lightweight user interface for structured editing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Overfitting in semantics-based automated program repair

Xuan-Bach D. Le, Ferdian Thung, David Lo, Claire Le Goues

Overfitting in semantics-based automated program repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem

Asher Trockman, Shurui Zhou, Christian Kästner, Bogdan Vasilescu

Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deep code search

Xiaodong Gu, Hongyu Zhang, Sunghun Kim

Deep code search

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Experiences and challenges in building a data intensive system for data migration

Marco Scavuzzo, Elisabetta Di Nitto, Danilo Ardagna

Experiences and challenges in building a data intensive system for data migration

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation

Fabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Fausto Fasano, Rocco Oliveto, Andrea De Lucia

On the diffuseness and the impact on maintainability of code smells: a large scale empirical investigation

Details
Discussion Comments: 0
Verification: Authors have not verified information

DeepTest: automated testing of deep-neural-network-driven autonomous cars

Yuchi Tian, Kexin Pei, Suman Jana, Baishakhi Ray

DeepTest: automated testing of deep-neural-network-driven autonomous cars

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the use of hidden Markov model to predict the time to fix bugs

Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener

On the use of hidden Markov model to predict the time to fix bugs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Precise concolic unit testing of C programs using extended units and symbolic alarm filtering

Yunho Kim, Yunja Choi, Moonzoo Kim

Precise concolic unit testing of C programs using extended units and symbolic alarm filtering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Speedoo: prioritizing performance optimization opportunities

Zhifei Chen, Bihuan Chen, Lu Xiao, Xiao Wang, Lin Chen, Yang Liu, Baowen Xu

Speedoo: prioritizing performance optimization opportunities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sentiment analysis for software engineering: how far can we go?

Bin Lin, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta, Michele Lanza, Rocco Oliveto

Sentiment analysis for software engineering: how far can we go?

Details
Discussion Comments: 0
Verification: Authors have not verified information

"Was my contribution fairly reviewed?": a framework to study the perception of fairness in modern code reviews

Daniel M. Germán, Gregorio Robles, Germán Poo-Caamaño, Xin Yang, Hajimu Iida, Katsuro Inoue

"Was my contribution fairly reviewed?": a framework to study the perception of fairness in modern code reviews

Details
Discussion Comments: 0
Verification: Authors have not verified information

A combinatorial approach for exposing off-nominal behaviors

Kaushik Madala, Hyunsook Do, Daniel Aceituna

A combinatorial approach for exposing off-nominal behaviors

Details
Discussion Comments: 0
Verification: Authors have not verified information

A temporal permission analysis and enforcement framework for Android

Alireza Sadeghi, Reyhaneh Jabbarvand, Negar Ghorbani, Hamid Bagheri, Sam Malek

A temporal permission analysis and enforcement framework for Android

Details
Discussion Comments: 0
Verification: Authors have not verified information

Generalized data structure synthesis

Calvin Loncaric, Michael D. Ernst, Emina Torlak

Generalized data structure synthesis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do you remember this source code?

Jacob Krüger, Jens Wiemann, Wolfram Fenske, Gunter Saake, Thomas Leich

Do you remember this source code?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Reducer-based construction of conditional verifiers

Dirk Beyer, Marie-Christine Jakobs, Thomas Lemberger, Heike Wehrheim

Reducer-based construction of conditional verifiers

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Journal first presentation of an experience report on applying software testing academic results in industry: we need usable automated test generation

Andre Arcuri

Journal first presentation of an experience report on applying software testing academic results in industry: we need usable automated test generation

Details
Discussion Comments: 0
Verification: Author has not verified information

HireBuild: an automatic approach to history-driven repair of build scripts

Foyzul Hassan, Xiaoyin Wang

HireBuild: an automatic approach to history-driven repair of build scripts

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated refactoring of OCL constraints with search

Hong Lu, Shuai Wang, Tao Yue, Shaukat Ali, Jan F. Nygård

Automated refactoring of OCL constraints with search

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analyzing a decade of Linux system calls

Mojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer, Ahmed E. Hassan, Juergen Dingel, James R. Cordy

Analyzing a decade of Linux system calls

Details
Discussion Comments: 0
Verification: Authors have not verified information

A correlation study between automated program repair and test-suite metrics

Jooyong Yi, Shin Hwei Tan, Sergey Mechtaev, Marcel Böhme, Abhik Roychoudhury

A correlation study between automated program repair and test-suite metrics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faults

Mike Papadakis, Donghwan Shin, Shin Yoo, Doo-Hwan Bae

Are mutation scores correlated with real fault detection?: a large scale empirical study on the relationship between mutants and real faults

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Statistical errors in software engineering experiments: a preliminary literature review

Rolando P. Reyes, Oscar Dieste, Efraín R. Fonseca C., Natalia Juristo

Statistical errors in software engineering experiments: a preliminary literature review

Details
Discussion Comments: 0
Verification: Authors have not verified information

Static automated program repair for heap properties

Rijnard van Tonder, Claire Le Goues

Static automated program repair for heap properties

Details
Discussion Comments: 0
Verification: Authors have not verified information

Is "better data" better than "better data miners"?: on the benefits of tuning SMOTE for defect prediction

Amritanshu Agrawal, Tim Menzies

Is "better data" better than "better data miners"?: on the benefits of tuning SMOTE for defect prediction

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Perses: syntax-guided program reduction

Chengnian Sun, Yuanbo Li, Qirun Zhang, Tianxiao Gu, Zhendong Su

Perses: syntax-guided program reduction

Details
Discussion Comments: 0
Verification: Authors have not verified information

MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction

Kwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah

MAHAKIL: diversity based oversampling approach to alleviate the class imbalance issue in software defect prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information

EnMobile: entity-based characterization and analysis of mobile malware

Wei Yang, Mukul R. Prasad, Tao Xie

EnMobile: entity-based characterization and analysis of mobile malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inferring and asserting distributed system invariants

Stewart Grant, Hendrik Cech, Ivan Beschastnikh

Inferring and asserting distributed system invariants

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Collaborative model-driven software engineering: a classification framework and a research map

Davide Di Ruscio, Mirco Franzago, Henry Muccini, Ivano Malavolta

Collaborative model-driven software engineering: a classification framework and a research map

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Towards practical program repair with on-demand candidate generation

Jinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid

Towards practical program repair with on-demand candidate generation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Correctness attraction: a study of stability of software behavior under runtime perturbation

Benjamin Danglot, Philippe Preux, Benoit Baudry, Martin Monperrus

Correctness attraction: a study of stability of software behavior under runtime perturbation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nemo: multi-criteria test-suite minimization with integer nonlinear programming

Jun-Wei Lin, Reyhaneh Jabbarvand, Joshua Garcia, Sam Malek

Nemo: multi-criteria test-suite minimization with integer nonlinear programming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do programmers work at night or during the weekend?

Maëlick Claes, Mika V. Mäntylä, Miikka Kuutila, Bram Adams

Do programmers work at night or during the weekend?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring program comprehension: a large-scale field study with professionals

Xin Xia, Lingfeng Bao, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li

Measuring program comprehension: a large-scale field study with professionals

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding the factors for fast answers in technical Q&A websites: an empirical study of four stack exchange websites

Shaowei Wang, Tse-Hsun Chen, Ahmed E. Hassan

Understanding the factors for fast answers in technical Q&A websites: an empirical study of four stack exchange websites

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data scientists in software teams: state of the art and challenges

Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel

Data scientists in software teams: state of the art and challenges

Details
Discussion Comments: 0
Verification: Authors have not verified information

From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation

Chunyang Chen, Ting Su, Guozhu Meng, Zhenchang Xing, Yang Liu

From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inference of development activities from interaction with uninstrumented applications

Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Ahmed E. Hassan

Inference of development activities from interaction with uninstrumented applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sentiment polarity detection for software development

Fabio Calefato, Filippo Lanubile, Federico Maiorano, Nicole Novielli

Sentiment polarity detection for software development

Details
Discussion Comments: 0
Verification: Authors have not verified information

Synthesizing qualitative research in software engineering: a critical review

Xin Huang, He Zhang, Xin Zhou, Muhammad Ali Babar, Song Yang

Synthesizing qualitative research in software engineering: a critical review

Details
Discussion Comments: 0
Verification: Authors have not verified information

How not to structure your database-backed web applications: a study of performance bugs in the wild

Junwen Yang, Pranav Subramaniam, Shan Lu, Cong Yan, Alvin Cheung

How not to structure your database-backed web applications: a study of performance bugs in the wild

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hybrid regression test selection

Lingming Zhang

Hybrid regression test selection

Details
Discussion Comments: 0
Verification: Author has not verified information

Roles and impacts of hands-on software architects in five industrial case studies

Inayat Rehman, Mehdi Mirakhorli, Meiyappan Nagappan, Azat Aralbay Uulu, Matthew Thornton

Roles and impacts of hands-on software architects in five industrial case studies

Details
Discussion Comments: 0
Verification: Authors have not verified information

FaCoY: a code-to-code search engine

Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, Yves Le Traon

FaCoY: a code-to-code search engine

Details
Discussion Comments: 0
Verification: Authors have not verified information

Augusto: exploiting popular functionalities for the generation of semantic GUI tests with Oracles

Leonardo Mariani, Mauro Pezzè, Daniele Zuddas

Augusto: exploiting popular functionalities for the generation of semantic GUI tests with Oracles

Details
Discussion Comments: 0
Verification: Authors have not verified information

Analyzing the effects of test driven development in GitHub

Neil C. Borle, Meysam Feghhi, Eleni Stroulia, Russell Greiner, Abram Hindle

Analyzing the effects of test driven development in GitHub

Details
Discussion Comments: 0
Verification: Authors have not verified information

Prioritizing browser environments for web application test execution

Jung-Hyun Kwon, In-Young Ko, Gregg Rothermel

Prioritizing browser environments for web application test execution

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Does the propagation of artifact changes across tasks reflect work dependencies?

Christoph Mayr-Dorn, Alexander Egyed

Does the propagation of artifact changes across tasks reflect work dependencies?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Open source barriers to entry, revisited: a sociotechnical perspective

Christopher J. Mendez, Hema Susmita Padala, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Nupoor Patil, Anita Sarma, Margaret M. Burnett

Open source barriers to entry, revisited: a sociotechnical perspective

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dataflow tunneling: mining inter-request data dependencies for request-based applications

Xiao Yu, Guoliang Jin

Dataflow tunneling: mining inter-request data dependencies for request-based applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated repair of mobile friendly problems in web pages

Sonal Mahajan, Negarsadat Abolhassani, Phil McMinn, William G. J. Halfond

Automated repair of mobile friendly problems in web pages

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic software repair: a survey

Luca Gazzola, Daniela Micucci, Leonardo Mariani

Automatic software repair: a survey

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards optimal concolic testing

Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin

Towards optimal concolic testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Search-based test data generation for SQL queries

Jeroen Castelein, Maurício Finavaro Aniche, Mozhan Soltani, Annibale Panichella, Arie van Deursen

Search-based test data generation for SQL queries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying patch correctness in test-based program repair

Yingfei Xiong, Xinyuan Liu, Muhan Zeng, Lu Zhang, Gang Huang

Identifying patch correctness in test-based program repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying features in forks

Shurui Zhou, Stefan Stanciulescu, Olaf Leßenich, Yingfei Xiong, Andrzej Wasowski, Christian Kästner

Identifying features in forks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated reporting of GUI design violations for mobile apps

Kevin Moran, Boyang Li, Carlos Bernal-Cárdenas, Dan Jelf, Denys Poshyvanyk

Automated reporting of GUI design violations for mobile apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do automated program repair techniques repair hard and important bugs?

Manish Motwani, Sandhya Sankaranarayanan, René Just, Yuriy Brun

Do automated program repair techniques repair hard and important bugs?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Studying the dialogue between users and developers of free apps in the google play store

Safwat Hassan, Chakkrit Tantithamthavorn, Cor-Paul Bezemer, Ahmed E. Hassan

Studying the dialogue between users and developers of free apps in the google play store

Details
Discussion Comments: 0
Verification: Authors have not verified information

Time to clean your test objectives

Michaël Marcozzi, Sébastien Bardin, Nikolai Kosmatov, Mike Papadakis, Virgile Prevosto, Loïc Correnson

Time to clean your test objectives

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Large-scale analysis of framework-specific exceptions in Android apps

Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su

Large-scale analysis of framework-specific exceptions in Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Empirical study on the discrepancy between performance testing results from virtual and physical environments

Muhammad Moiz Arif, Weiyi Shang, Emad Shihab

Empirical study on the discrepancy between performance testing results from virtual and physical environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient sampling of SAT solutions for testing

Rafael Dutra, Kevin Laeufer, Jonathan Bachrach, Koushik Sen

Efficient sampling of SAT solutions for testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products

Mahmoud Hammad, Joshua Garcia, Sam Malek

A large-scale empirical study on the effects of code obfuscations on Android apps and anti-malware products

Details
Discussion Comments: 0
Verification: Authors have not verified information

Self-hiding behavior in Android apps: detection and characterization

Zhiyong Shan, Iulian Neamtiu, Raina Samuel

Self-hiding behavior in Android apps: detection and characterization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Metamorphic testing of RESTful web APIs

Sergio Segura, José Antonio Parejo, Javier Troya, Antonio Ruiz Cortés

Metamorphic testing of RESTful web APIs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Almost there: a study on quasi-contributors in open source software projects

Igor Steinmacher, Gustavo Pinto, Igor Scaliante Wiese, Marco Aurélio Gerosa

Almost there: a study on quasi-contributors in open source software projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Launch-mode-aware context-sensitive activity transition analysis

Yifei Zhang, Yulei Sui, Jingling Xue

Launch-mode-aware context-sensitive activity transition analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Propagating configuration decisions with modal implication graphs

Sebastian Krieter, Thomas Thüm, Sandro Schulze, Reimar Schröter, Gunter Saake

Propagating configuration decisions with modal implication graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically generating search heuristics for concolic testing

Sooyoung Cha, Seongjoon Hong, Junhee Lee, Hakjoo Oh

Automatically generating search heuristics for concolic testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforge

Shafiul Azam Chowdhury, Soumik Mohian, Sidharth Mehra, Siddhant Gawsane, Taylor T. Johnson, Christoph Csallner

Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforge

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information