ACM Foundations of Software Engineering, FSE 2014


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Software maintenance like maintenance in other engineering disciplines

Gustavo Villavicencio

Software maintenance like maintenance in other engineering disciplines

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Author has verified information

Selection and presentation practices for code example summarization

Annie T. T. Ying, Martin P. Robillard

Selection and presentation practices for code example summarization

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Mining preconditions of APIs in large-scale code corpus

Hoan Anh Nguyen, Robert Dyer, Tien N. Nguyen, Hridesh Rajan

Mining preconditions of APIs in large-scale code corpus

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting, isolating, and enforcing dependencies among and within test cases

Jonathan Bell

Detecting, isolating, and enforcing dependencies among and within test cases

Details
Discussion Comments: 0
Verification: Author has not verified information

BumbleBee: a refactoring environment for spreadsheet formulas

Felienne Hermans, Danny Dig

BumbleBee: a refactoring environment for spreadsheet formulas

Details
Discussion Comments: 0
Verification: Authors have not verified information

Estimating the effectiveness of spectrum-based fault localization

Shuo Song

Estimating the effectiveness of spectrum-based fault localization

Details
Discussion Comments: 0
Verification: Author has not verified information

The plastic surgery hypothesis

Earl T. Barr, Yuriy Brun, Premkumar T. Devanbu, Mark Harman, Federica Sarro

The plastic surgery hypothesis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are you getting traction? tales from the tech transfer trenches (invited talk)

Satish Chandra

Are you getting traction? tales from the tech transfer trenches (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Automatic mining of specifications from invocation traces and method invariants

Ivo Krka, Yuriy Brun, Nenad Medvidovic

Automatic mining of specifications from invocation traces and method invariants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Balancing trade-offs in test-suite reduction

August Shi, Alex Gyori, Milos Gligoric, Andrey Zaytsev, Darko Marinov

Balancing trade-offs in test-suite reduction

Details
Discussion Comments: 0
Verification: Authors have not verified information

BugLocalizer: integrated tool support for bug localization

Ferdian Thung, Tien-Duy B. Le, Pavneet Singh Kochhar, David Lo

BugLocalizer: integrated tool support for bug localization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems

Yu Jiang, Hehua Zhang, Huafeng Zhang, Xinyan Zhao, Han Liu, Chengnian Sun, Xiaoyu Song, Ming Gu, Jia-Guang Sun

Tsmart-GalsBlock: a toolkit for modeling, validation, and synthesis of multi-clocked embedded systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Grail: context-aware fixing of concurrency bugs

Peng Liu, Omer Tripp, Charles Zhang

Grail: context-aware fixing of concurrency bugs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient runtime-enforcement techniques for policy weaving

Richard Joiner, Thomas W. Reps, Somesh Jha, Mohan Dhawan, Vinod Ganapathy

Efficient runtime-enforcement techniques for policy weaving

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

JSAI: a static analysis platform for JavaScript

Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf

JSAI: a static analysis platform for JavaScript

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Automatic generation of release notes

Laura Moreno, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrian Marcus, Gerardo Canfora

Automatic generation of release notes

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Improving the software testing skills of novices during onboarding through social transparency

Raphael Pham

Improving the software testing skills of novices during onboarding through social transparency

Details
Discussion Comments: 0
Verification: Author has not verified information

From software engineering to software systems (invited talk)

Alexander L. Wolf

From software engineering to software systems (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Automatically generated patches as debugging aids: a human study

Yida Tao, Jindae Kim, Sunghun Kim, Chang Xu

Automatically generated patches as debugging aids: a human study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Learning natural coding conventions

Miltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton

Learning natural coding conventions

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Counterexample guided abstraction refinement of product-line behavioural models

Maxime Cordy, Patrick Heymans, Axel Legay, Pierre-Yves Schobbens, Bruno Dawagne, Martin Leucker

Counterexample guided abstraction refinement of product-line behavioural models

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the efficiency of automated testing

Marcel Böhme, Soumya Paul

On the efficiency of automated testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Static analysis driven performance and energy testing

Abhijeet Banerjee

Static analysis driven performance and energy testing

Details
Discussion Comments: 0
Verification: Author has not verified information

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

EvoDroid: segmented evolutionary testing of Android apps

Riyadh Mahmood, Nariman Mirzaei, Sam Malek

EvoDroid: segmented evolutionary testing of Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Traceability and model checking to support safety requirement verification

Shuanglong Kan

Traceability and model checking to support safety requirement verification

Details
Discussion Comments: 0
Verification: Author has not verified information

XMLMate: evolutionary XML test generation

Nikolas Havrikov, Matthias Höschele, Juan Pablo Galeotti, Andreas Zeller

XMLMate: evolutionary XML test generation

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Feedback generation for performance problems in introductory programming assignments

Sumit Gulwani, Ivan Radicek, Florian Zuleger

Feedback generation for performance problems in introductory programming assignments

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Linking sketches and diagrams to source code artifacts

Sebastian Baltes, Peter Schmitz, Stephan Diehl

Linking sketches and diagrams to source code artifacts

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A large scale study of programming languages and code quality in github

Baishakhi Ray, Daryl Posnett, Vladimir Filkov, Premkumar T. Devanbu

A large scale study of programming languages and code quality in github

Details
Discussion Comments: 0
Verification: Authors have not verified information

Aalta: an LTL satisfiability checker over Infinite/Finite traces

Jianwen Li, Yinbo Yao, Geguang Pu, Lijun Zhang, Jifeng He

Aalta: an LTL satisfiability checker over Infinite/Finite traces

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mining micro-practices from operational data

Minghui Zhou, Audris Mockus

Mining micro-practices from operational data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Diagnose crashing faults on production software

Rongxin Wu

Diagnose crashing faults on production software

Details
Discussion Comments: 0
Verification: Author has not verified information

Methodology and culture: drivers of mediocrity in software engineering?

Marian Petre, Daniela E. Damian

Methodology and culture: drivers of mediocrity in software engineering?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Achieving lightweight trustworthy traceability

Jane Cleland-Huang, Mona Rahimi, Patrick Mäder

Achieving lightweight trustworthy traceability

Details
Discussion Comments: 0
Verification: Authors have not verified information

SymJS: automatic symbolic testing of JavaScript web applications

Guodong Li, Esben Andreasen, Indradeep Ghosh

SymJS: automatic symbolic testing of JavaScript web applications

Details
Author Comments: We cannot open source the code as we are an industrial research lab.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

How we get there: a context-guided search strategy in concolic testing

Hyunmin Seo, Sunghun Kim

How we get there: a context-guided search strategy in concolic testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Solving complex path conditions through heuristic search on induced polytopes

Peter Dinges, Gul A. Agha

Solving complex path conditions through heuristic search on induced polytopes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting and preventing the architectural roots of bugs

Lu Xiao

Detecting and preventing the architectural roots of bugs

Details
Discussion Comments: 0
Verification: Author has not verified information

Managing lots of models: the FaMine approach

David Wille

Managing lots of models: the FaMine approach

Details
Discussion Comments: 0
Verification: Author has not verified information

Learning to rank relevant files for bug reports using domain knowledge

Xin Ye, Razvan C. Bunescu, Chang Liu

Learning to rank relevant files for bug reports using domain knowledge

Details
Discussion Comments: 0
Verification: Authors have not verified information

Building call graphs for embedded client-side code in dynamic web applications

Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen

Building call graphs for embedded client-side code in dynamic web applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Retrofitting concurrency for Android applications through refactoring

Yu Lin, Cosmin Radoi, Danny Dig

Retrofitting concurrency for Android applications through refactoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

RaPiD: a toolkit for reliability analysis of non-deterministic systems

Lin Gui, Jun Sun, Yang Liu, Truong Khanh Nguyen, Jin Song Dong

RaPiD: a toolkit for reliability analysis of non-deterministic systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Experiences developing tools for developers (invited talk)

John Penix

Experiences developing tools for developers (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Mining idioms from source code

Miltiadis Allamanis, Charles A. Sutton

Mining idioms from source code

Details
Discussion Comments: 0
Verification: Authors have not verified information

A tool suite for the model-driven software engineering of cyber-physical systems

Stefan Dziwok, Christopher Gerking, Steffen Becker, Sebastian Thiele, Christian Heinzemann, Uwe Pohlmann

A tool suite for the model-driven software engineering of cyber-physical systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Apposcopy: semantics-based detection of Android malware through static analysis

Yu Feng, Saswat Anand, Isil Dillig, Alex Aiken

Apposcopy: semantics-based detection of Android malware through static analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Powering the static driver verifier using corral

Akash Lal, Shaz Qadeer

Powering the static driver verifier using corral

Details
Discussion Comments: 0
Verification: Authors have not verified information

Dealing with uncertainty in verification of nondeterministic systems

Yamilet R. Serrano Llerena

Dealing with uncertainty in verification of nondeterministic systems

Details
Discussion Comments: 0
Verification: Author has not verified information

Panning requirement nuggets in stream of software maintenance tickets

Senthil Mani, Karthik Sankaranarayanan, Vibha Singhal Sinha, Premkumar T. Devanbu

Panning requirement nuggets in stream of software maintenance tickets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are mutants a valid substitute for real faults in software testing?

René Just, Darioush Jalali, Laura Inozemtseva, Michael D. Ernst, Reid Holmes, Gordon Fraser

Are mutants a valid substitute for real faults in software testing?

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

An empirical analysis of flaky tests

Qingzhou Luo, Farah Hariri, Lamyaa Eloussi, Darko Marinov

An empirical analysis of flaky tests

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

SAFEWAPI: web API misuse detector for web applications

SungGyeong Bae, Hyunghun Cho, Inho Lim, Sukyoung Ryu

SAFEWAPI: web API misuse detector for web applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Querying sequential software engineering data

Chengnian Sun, Haidong Zhang, Jian-Guang Lou, Hongyu Zhang, Qiang Wang, Dongmei Zhang, Siau-Cheng Khoo

Querying sequential software engineering data

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Sherlock: scalable deadlock detection for concurrent programs

Mahdi Eslamimehr, Jens Palsberg

Sherlock: scalable deadlock detection for concurrent programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Statistical symbolic execution with informed sampling

Antonio Filieri, Corina S. Pasareanu, Willem Visser, Jaco Geldenhuys

Statistical symbolic execution with informed sampling

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Archie: a tool for detecting, monitoring, and preserving architecturally significant code

Mehdi Mirakhorli, Ahmed Fakhry, Artem Grechko, Mateusz Wieloch, Jane Cleland-Huang

Archie: a tool for detecting, monitoring, and preserving architecturally significant code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verifying CTL-live properties of infinite state models using an SMT solver

Amirhossein Vakili, Nancy A. Day

Verifying CTL-live properties of infinite state models using an SMT solver

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software developers' perceptions of productivity

André N. Meyer, Thomas Fritz, Gail C. Murphy, Thomas Zimmermann

Software developers' perceptions of productivity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Titan: a toolset that connects software architecture with quality analysis

Lu Xiao, Yuanfang Cai, Rick Kazman

Titan: a toolset that connects software architecture with quality analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

CHOReOSynt: enforcing choreography realizability in the future internet

Marco Autili, Davide Di Ruscio, Amleto Di Salle, Alexander Perucci

CHOReOSynt: enforcing choreography realizability in the future internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

Test case purification for improving fault localization

Jifeng Xuan, Martin Monperrus

Test case purification for improving fault localization

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

ConceptCloud: a tagcloud browser for software archives

Gillian J. Greene, Bernd Fischer

ConceptCloud: a tagcloud browser for software archives

Details
Discussion Comments: 0
Verification: Authors have not verified information

Known unknowns: testing in the presence of uncertainty

Sebastian G. Elbaum, David S. Rosenblum

Known unknowns: testing in the presence of uncertainty

Details
Discussion Comments: 0
Verification: Authors have not verified information

Architecture challenges for internal software ecosystems: a large-scale industry case study

Klaus-Benedikt Schultis, Christoph Elsner, Daniel Lohmann

Architecture challenges for internal software ecosystems: a large-scale industry case study

Details
Discussion Comments: 0
Verification: Authors have not verified information

No issue left behind: reducing information overload in issue tracking

Olga Baysal, Reid Holmes, Michael W. Godfrey

No issue left behind: reducing information overload in issue tracking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Focus-shifting patterns of OSS developers and their congruence with call graphs

Qi Xuan, Aaron Okano, Premkumar T. Devanbu, Vladimir Filkov

Focus-shifting patterns of OSS developers and their congruence with call graphs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Autonomous compliance monitoring of non-functional properties

Marc Brünink

Autonomous compliance monitoring of non-functional properties

Details
Discussion Comments: 0
Verification: Author has not verified information

Beyond the rainbow: self-adaptive failure avoidance in configurable systems

Jacob Swanson, Myra B. Cohen, Matthew B. Dwyer, Brady J. Garvin, Justin Firestone

Beyond the rainbow: self-adaptive failure avoidance in configurable systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Discovering refactoring opportunities in cascading style sheets

Davood Mazinanian, Nikolaos Tsantalis, Ali Mesbah

Discovering refactoring opportunities in cascading style sheets

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Towards a theory of architectural styles

Diego Marmsoler

Towards a theory of architectural styles

Details
Discussion Comments: 0
Verification: Author has not verified information

Omlet: a revolution against big-brother social networks (invited talk)

Monica S. Lam

Omlet: a revolution against big-brother social networks (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Speculative reprogramming

Marc Palyart, Gail C. Murphy, Emerson R. Murphy-Hill, Xavier Blanc

Speculative reprogramming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sketches and diagrams in practice

Sebastian Baltes, Stephan Diehl

Sketches and diagrams in practice

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Techniques for improving regression testing in continuous integration development environments

Sebastian G. Elbaum, Gregg Rothermel, John Penix

Techniques for improving regression testing in continuous integration development environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Minimizing software conflicts through proactive detection of conflicts and task scheduling

Bakhtiar Khan Kasi

Minimizing software conflicts through proactive detection of conflicts and task scheduling

Details
Discussion Comments: 0
Verification: Author has not verified information

On the localness of software

Zhaopeng Tu, Zhendong Su, Premkumar T. Devanbu

On the localness of software

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study on program comprehension with reactive programming

Guido Salvaneschi, Sven Amann, Sebastian Proksch, Mira Mezini

An empirical study on program comprehension with reactive programming

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Critics: an interactive code review tool for searching and inspecting systematic changes

Tianyi Zhang, Myoungkyu Song, Miryung Kim

Critics: an interactive code review tool for searching and inspecting systematic changes

Details
Discussion Comments: 0
Verification: Authors have not verified information

A path-sensitively sliced control flow graph

Joxan Jaffar, Vijayaraghavan Murali

A path-sensitively sliced control flow graph

Details
Discussion Comments: 0
Verification: Authors have not verified information

Numerical program analysis and testing

Zheng Gao

Numerical program analysis and testing

Details
Discussion Comments: 0
Verification: Author has not verified information

AI: a lightweight system for tolerating concurrency bugs

Mingxing Zhang, Yongwei Wu, Shan Lu, Shanxiang Qi, Jinglei Ren, Weimin Zheng

AI: a lightweight system for tolerating concurrency bugs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting energy bugs and hotspots in mobile apps

Abhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay, Abhik Roychoudhury

Detecting energy bugs and hotspots in mobile apps

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

ORBS: language-independent program slicing

David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo

ORBS: language-independent program slicing

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Let's talk about it: evaluating contributions through discussion in GitHub

Jason Tsay, Laura Dabbish, James D. Herbsleb

Let's talk about it: evaluating contributions through discussion in GitHub

Details
Discussion Comments: 0
Verification: Authors have not verified information

Integrating approaches for feature implementation

Benjamin Behringer

Integrating approaches for feature implementation

Details
Discussion Comments: 0
Verification: Author has not verified information

Social network analysis in open source software peer review

Xin Yang

Social network analysis in open source software peer review

Details
Discussion Comments: 0
Verification: Author has not verified information

Vector abstraction and concretization for scalable detection of refactorings

Narcisa Andreea Milea, Lingxiao Jiang, Siau-Cheng Khoo

Vector abstraction and concretization for scalable detection of refactorings

Details
Discussion Comments: 0
Verification: Authors have not verified information

FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases

Johannes Lerch, Ben Hermann, Eric Bodden, Mira Mezini

FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ten years with evidence-based software engineering. What is it? Has it had any impact? What's next?

Magne Jørgensen

Ten years with evidence-based software engineering. What is it? Has it had any impact? What's next?

Details
Discussion Comments: 0
Verification: Author has not verified information

Identifying the characteristics of vulnerable code changes: an empirical study

Amiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, Derek Janni

Identifying the characteristics of vulnerable code changes: an empirical study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Variable-specific resolutions for feature interactions

Cecylia Bocovich, Joanne M. Atlee

Variable-specific resolutions for feature interactions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Prioritizing the devices to test your app on: a case study of Android game apps

Hammad Khalid, Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan

Prioritizing the devices to test your app on: a case study of Android game apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data hard with a vengeance (invited talk)

Thomas Zimmermann

Data hard with a vengeance (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Search-based synthesis of equivalent method sequences

Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè, Paolo Tonella

Search-based synthesis of equivalent method sequences

Details
Discussion Comments: 0
Verification: Authors have not verified information

Developers' code context models for change tasks

Thomas Fritz, David C. Shepherd, Katja Kevic, Will Snipes, Christoph Bräunlich

Developers' code context models for change tasks

Details
Discussion Comments: 0
Verification: Authors have not verified information

A foundation for refactoring C with macros

Jeffrey L. Overbey, Farnaz Behrang, Munawar Hafiz

A foundation for refactoring C with macros

Details
Discussion Comments: 0
Verification: Authors have not verified information

A variability perspective of mutation analysis

Xavier Devroey, Gilles Perrouin, Maxime Cordy, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens

A variability perspective of mutation analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enablers, inhibitors, and perceptions of testing in novice software teams

Raphael Pham, Stephan Kiesling, Olga Liskin, Leif Singer, Kurt Schneider

Enablers, inhibitors, and perceptions of testing in novice software teams

Details
Discussion Comments: 0
Verification: Authors have not verified information

RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits

Everton L. G. Alves, Myoungkyu Song, Miryung Kim

RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving oracle quality by detecting brittle assertions and unused inputs in tests

Chen Huo, James Clause

Improving oracle quality by detecting brittle assertions and unused inputs in tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software programmer management: a machine learning and human computer interaction framework for optimal task assignment

Harry Raymond Joseph

Software programmer management: a machine learning and human computer interaction framework for optimal task assignment

Details
Discussion Comments: 0
Verification: Author has not verified information

Omen+: a precise dynamic deadlock detector for multithreaded Java libraries

Malavika Samak, Murali Krishna Ramanathan

Omen+: a precise dynamic deadlock detector for multithreaded Java libraries

Details
Discussion Comments: 0
Verification: Authors have not verified information

How should we measure functional sameness from program source code? an exploratory study on Java methods

Yoshiki Higo, Shinji Kusumoto

How should we measure functional sameness from program source code? an exploratory study on Java methods

Details
Discussion Comments: 0
Verification: Authors have not verified information