ACM Foundations of Software Engineering, FSE 2015


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Quantifying developers' adoption of security tools

Jim Witschey, Olga A. Zielinska, Allaire K. Welk, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Thomas Zimmermann

Quantifying developers' adoption of security tools

Details
Discussion Comments: 0
Verification: Authors have not verified information

The making of cloud applications: an empirical study on software development for the cloud

Jürgen Cito, Philipp Leitner, Thomas Fritz, Harald C. Gall

The making of cloud applications: an empirical study on software development for the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

MemInsight: platform-independent memory debugging for JavaScript

Simon Holm Jensen, Manu Sridharan, Koushik Sen, Satish Chandra

MemInsight: platform-independent memory debugging for JavaScript

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Measure it? Manage it? Ignore it? software practitioners and technical debt

Neil A. Ernst, Stephany Bellomo, Ipek Ozkaya, Robert L. Nord, Ian Gorton

Measure it? Manage it? Ignore it? software practitioners and technical debt

Details
Discussion Comments: 0
Verification: Authors have not verified information

UEDashboard: awareness of unusual events in commit histories

Larissa Leite, Christoph Treude, Fernando Marques Figueira Filho

UEDashboard: awareness of unusual events in commit histories

Details
Discussion Comments: 0
Verification: Authors have not verified information

JITProf: pinpointing JIT-unfriendly JavaScript code

Liang Gong, Michael Pradel, Koushik Sen

JITProf: pinpointing JIT-unfriendly JavaScript code

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Optimizing energy consumption of GUIs in Android apps: a multi-objective approach

Mario Linares Vásquez, Gabriele Bavota, Carlos Eduardo Bernal-Cárdenas, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk

Optimizing energy consumption of GUIs in Android apps: a multi-objective approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

REMI: defect prediction for efficient API testing

Mijung Kim, Jaechang Nam, Jaehyuk Yeon, Soonhwang Choi, Sunghun Kim

REMI: defect prediction for efficient API testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

How practitioners perceive the relevance of software engineering research

David Lo, Nachiappan Nagappan, Thomas Zimmermann

How practitioners perceive the relevance of software engineering research

Details
Discussion Comments: 0
Verification: Authors have not verified information

I heart hacker news: expanding qualitative research findings by analyzing social news websites

Titus Barik, Brittany Johnson, Emerson R. Murphy-Hill

I heart hacker news: expanding qualitative research findings by analyzing social news websites

Details
Discussion Comments: 0
Verification: Authors have not verified information

GitSonifier: using sound to portray developer conflict history

Kevin J. North, Shane Bolan, Anita Sarma, Myra B. Cohen

GitSonifier: using sound to portray developer conflict history

Details
Discussion Comments: 0
Verification: Authors have not verified information

Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing

Ulf Kargén, Nahid Shahmehri

Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Barriers and enablers for shortening software development lead-time in mechatronics organizations: a case study

Mahshad M. Mahally, Miroslaw Staron, Jan Bosch

Barriers and enablers for shortening software development lead-time in mechatronics organizations: a case study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learning

Xiao-Yuan Jing, Fei Wu, Xiwei Dong, Fumin Qi, Baowen Xu

Heterogeneous cross-company defect prediction by unified metric representation and CCA-based transfer learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Enhancing Android application bug reporting

Kevin Moran

Enhancing Android application bug reporting

Details
Discussion Comments: 0
Verification: Author has not verified information

Questions developers ask while diagnosing potential security vulnerabilities with static analysis

Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford

Questions developers ask while diagnosing potential security vulnerabilities with static analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards automating the security compliance value chain

Smita Ghaisas, Manish Motwani, Balaji Balasubramaniam, Anjali Gajendragadkar, Rahul Kelkar, Harrick M. Vin

Towards automating the security compliance value chain

Details
Discussion Comments: 0
Verification: Authors have not verified information

Quality and productivity outcomes relating to continuous integration in GitHub

Bogdan Vasilescu, Yue Yu, Huaimin Wang, Premkumar T. Devanbu, Vladimir Filkov

Quality and productivity outcomes relating to continuous integration in GitHub

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

T3i: a tool for generating and querying test suites for Java

I. S. Wishnu B. Prasetya

T3i: a tool for generating and querying test suites for Java

Details
Discussion Comments: 0
Verification: Author has not verified information

A textual domain specific language for requirement modelling

Oyindamola Olajubu

A textual domain specific language for requirement modelling

Details
Discussion Comments: 0
Verification: Author has not verified information

Effective and precise dynamic detection of hidden races for Java programs

Yan Cai, Lingwei Cao

Effective and precise dynamic detection of hidden races for Java programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting JavaScript races that matter

Erdal Mutlu, Serdar Tasiran, Benjamin Livshits

Detecting JavaScript races that matter

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Rule-based extraction of goal-use case models from text

Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy

Rule-based extraction of goal-use case models from text

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Staged program repair with condition synthesis

Fan Long, Martin Rinard

Staged program repair with condition synthesis

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Finding schedule-sensitive branches

Jeff Huang, Lawrence Rauchwerger

Finding schedule-sensitive branches

Details
Discussion Comments: 0
Verification: Authors have not verified information

UMTG: a toolset to automatically generate system test cases from use case specifications

Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal

UMTG: a toolset to automatically generate system test cases from use case specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Nyx: a display energy optimizer for mobile web apps

Ding Li, Angelica Huyen Tran, William G. J. Halfond

Nyx: a display energy optimizer for mobile web apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Requirements, architecture, and quality in a mission critical system: 12 lessons learned

Aapo Koski, Tommi Mikkonen

Requirements, architecture, and quality in a mission critical system: 12 lessons learned

Details
Discussion Comments: 0
Verification: Authors have not verified information

Commit guru: analytics and risk prediction of software commits

Christoffer Rosen, Ben Grawi, Emad Shihab

Commit guru: analytics and risk prediction of software commits

Details
Discussion Comments: 0
Verification: Authors have not verified information

JSketch: sketching for Java

Jinseong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama

JSketch: sketching for Java

Details
Discussion Comments: 0
Verification: Authors have not verified information

Summarizing and measuring development activity

Christoph Treude, Fernando Marques Figueira Filho, Uirá Kulesza

Summarizing and measuring development activity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Suggesting accurate method and class names

Miltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton

Suggesting accurate method and class names

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decentralized self-adaptation in large-scale distributed systems

Luca Florio

Decentralized self-adaptation in large-scale distributed systems

Details
Discussion Comments: 0
Verification: Author has not verified information

Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering

Joel Greenyer, Max Haase, Jörg Marhenke, Rene Bellmer

Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling readability to improve unit tests

Ermira Daka, José Campos, Gordon Fraser, Jonathan Dorn, Westley Weimer

Modeling readability to improve unit tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies

Qimu Zheng, Audris Mockus, Minghui Zhou

A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Clone-based and interactive recommendation for modifying pasted code

Yun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao

Clone-based and interactive recommendation for modifying pasted code

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the use of delta debugging to reduce recordings and facilitate debugging of web applications

Mouna Hammoudi, Brian Burg, Gigon Bae, Gregg Rothermel

On the use of delta debugging to reduce recordings and facilitate debugging of web applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Systematic testing of asynchronous reactive systems

Ankush Desai, Shaz Qadeer, Sanjit A. Seshia

Systematic testing of asynchronous reactive systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

String analysis for Java and Android applications

Ding Li, Yingjun Lyu, Mian Wan, William G. J. Halfond

String analysis for Java and Android applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

When, how, and why developers (do not) test in their IDEs

Moritz Beller, Georgios Gousios, Annibale Panichella, Andy Zaidman

When, how, and why developers (do not) test in their IDEs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

TLV: abstraction through testing, learning, and validation

Jun Sun, Hao Xiao, Yang Liu, Shang-Wei Lin, Shengchao Qin

TLV: abstraction through testing, learning, and validation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Increasing the efficiency of search-based unit test generation using parameter control

Thomas White

Increasing the efficiency of search-based unit test generation using parameter control

Details
Discussion Comments: 0
Verification: Author has not verified information

Crash reproduction via test case mutation: let existing test cases help

Jifeng Xuan, Xiaoyuan Xie, Martin Monperrus

Crash reproduction via test case mutation: let existing test cases help

Details
Discussion Comments: 0
Verification: Authors have not verified information

MatrixMiner: a red pill to architect informal product descriptions in the matrix

Sana Ben Nasr, Guillaume Bécan, Mathieu Acher, João Bosco Ferreira Filho, Benoit Baudry, Nicolas Sannier, Jean-Marc Davril

MatrixMiner: a red pill to architect informal product descriptions in the matrix

Details
Discussion Comments: 0
Verification: Authors have not verified information

Predicting field reliability

Pete Rotella, Sunita Chulani, Devesh Goyal

Predicting field reliability

Details
Discussion Comments: 0
Verification: Authors have not verified information

NARCIA: an automated tool for change impact analysis in natural language requirements

Chetan Arora, Mehrdad Sabetzadeh, Arda Goknil, Lionel C. Briand, Frank Zimmer

NARCIA: an automated tool for change impact analysis in natural language requirements

Details
Discussion Comments: 0
Verification: Authors have not verified information

DexterJS: robust testing platform for DOM-based XSS vulnerabilities

Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena

DexterJS: robust testing platform for DOM-based XSS vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

MultiSE: multi-path symbolic execution using value summaries

Koushik Sen, George C. Necula, Liang Gong, Wontae Choi

MultiSE: multi-path symbolic execution using value summaries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Symbolic execution of programs with heap inputs

Pietro Braione, Giovanni Denaro, Mauro Pezzè

Symbolic execution of programs with heap inputs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically recommending test code examples to inexperienced developers

Raphael Pham, Yauheni Stoliar, Kurt Schneider

Automatically recommending test code examples to inexperienced developers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Guided differential testing of certificate validation in SSL/TLS implementations

Yuting Chen, Zhendong Su

Guided differential testing of certificate validation in SSL/TLS implementations

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Quantifying architectural debts

Lu Xiao

Quantifying architectural debts

Details
Discussion Comments: 0
Verification: Author has not verified information

Assertion guided symbolic execution of multithreaded programs

Shengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, Aarti Gupta

Assertion guided symbolic execution of multithreaded programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting semantic merge conflicts with variability-aware execution

Hung Viet Nguyen, My Huu Nguyen, Son Cuu Dang, Christian Kästner, Tien N. Nguyen

Detecting semantic merge conflicts with variability-aware execution

Details
Discussion Comments: 0
Verification: Authors have not verified information

Vehicle level continuous integration in the automotive industry

Sebastian Vöst

Vehicle level continuous integration in the automotive industry

Details
Discussion Comments: 0
Verification: Author has not verified information

Automatically deriving pointer reference expressions from binary code for memory dump analysis

Yangchun Fu, Zhiqiang Lin, David Brumley

Automatically deriving pointer reference expressions from binary code for memory dump analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Products, developers, and milestones: how should I build my N-Gram language model

Juliana Saraiva, Christian Bird, Thomas Zimmermann

Products, developers, and milestones: how should I build my N-Gram language model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Crowd debugging

Fuxiang Chen, Sunghun Kim

Crowd debugging

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated generation of programming language quizzes

Shuktika Jain

Automated generation of programming language quizzes

Details
Discussion Comments: 0
Verification: Author has not verified information

Cross-language program slicing for dynamic web applications

Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen

Cross-language program slicing for dynamic web applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Getting to know you: towards a capability model for Java

Ben Hermann, Michael Reif, Michael Eichberg, Mira Mezini

Getting to know you: towards a capability model for Java

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Automated unit test generation for evolving software

Sina Shamshiri

Automated unit test generation for evolving software

Details
Discussion Comments: 0
Verification: Author has not verified information

Assertions are strongly correlated with test suite effectiveness

Yucheng Zhang, Ali Mesbah

Assertions are strongly correlated with test suite effectiveness

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving model-based test generation by model decomposition

Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene

Improving model-based test generation by model decomposition

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hidden truths in dead software paths

Michael Eichberg, Ben Hermann, Mira Mezini, Leonid Glanz

Hidden truths in dead software paths

Details
Discussion Comments: 0
Verification: Authors have not verified information

RDIT: race detection from incomplete traces

Arun K. Rajagopalan, Jeff Huang

RDIT: race detection from incomplete traces

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving energy consumption in Android apps

Carlos Bernal-Cárdenas

Improving energy consumption in Android apps

Details
Discussion Comments: 0
Verification: Author has not verified information

P3: partitioned path profiling

Mohammed Afraz, Diptikalyan Saha, Aditya Kanade

P3: partitioned path profiling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient and reasonable object-oriented concurrency

Scott West, Sebastian Nanz, Bertrand Meyer

Efficient and reasonable object-oriented concurrency

Details
Discussion Comments: 0
Verification: Authors have not verified information

Tracing software developers' eyes and interactions for change tasks

Katja Kevic, Braden M. Walters, Timothy R. Shaffer, Bonita Sharif, David C. Shepherd, Thomas Fritz

Tracing software developers' eyes and interactions for change tasks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Responsive designs in a snap

Nishant Sinha, Rezwana Karim

Responsive designs in a snap

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inner oracles: input-specific assertions on internal states

Yingfei Xiong, Dan Hao, Lu Zhang, Tao Zhu, Muyao Zhu, Tian Lan

Inner oracles: input-specific assertions on internal states

Details
Discussion Comments: 0
Verification: Authors have not verified information

Product lines can jeopardize their trade secrets

Mathieu Acher, Guillaume Bécan, Benoît Combemale, Benoit Baudry, Jean-Marc Jézéquel

Product lines can jeopardize their trade secrets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated multi-objective control for self-adaptive software design

Antonio Filieri, Henry Hoffmann, Martina Maggio

Automated multi-objective control for self-adaptive software design

Details
Discussion Comments: 0
Verification: Authors have not verified information

Query-based configuration of text retrieval solutions for software engineering tasks

Laura Moreno, Gabriele Bavota, Sonia Haiduc, Massimiliano Di Penta, Rocco Oliveto, Barbara Russo, Andrian Marcus

Query-based configuration of text retrieval solutions for software engineering tasks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Effective test suites for mixed discrete-continuous stateflow controllers

Reza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann

Effective test suites for mixed discrete-continuous stateflow controllers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Gamification for enforcing coding conventions

Christian R. Prause, Matthias Jarke

Gamification for enforcing coding conventions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spotting familiar code snippet structures for program comprehension

Venkatesh Vinayakarao

Spotting familiar code snippet structures for program comprehension

Details
Discussion Comments: 0
Verification: Author has not verified information

OSSMETER: a software measurement platform for automatically analysing open source software projects

Davide Di Ruscio, Dimitris S. Kolovos, Ioannis Korkontzelos, Nicholas Drivalos Matragkas, Jurgen J. Vinju

OSSMETER: a software measurement platform for automatically analysing open source software projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Is the cure worse than the disease? overfitting in automated program repair

Edward K. Smith, Earl T. Barr, Claire Le Goues, Yuriy Brun

Is the cure worse than the disease? overfitting in automated program repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proactive self-adaptation under uncertainty: a probabilistic model checking approach

Gabriel A. Moreno, Javier Cámara, David Garlan, Bradley R. Schmerl

Proactive self-adaptation under uncertainty: a probabilistic model checking approach

Details
Discussion Comments: 0
Verification: Authors have not verified information

Don't panic: reverse debugging of kernel drivers

Pavel Dovgalyuk, Denis Dmitriev, Vladimir Makarov

Don't panic: reverse debugging of kernel drivers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bespoke tools: adapted to the concepts developers know

Brittany Johnson, Rahul Pandita, Emerson R. Murphy-Hill, Sarah Heckman

Bespoke tools: adapted to the concepts developers know

Details
Discussion Comments: 0
Verification: Authors have not verified information

User-centric security: optimization of the security-usability trade-off

Denis Feth

User-centric security: optimization of the security-usability trade-off

Details
Discussion Comments: 0
Verification: Author has not verified information

Behavioral log analysis with statistical guarantees

Nimrod Busany, Shahar Maoz

Behavioral log analysis with statistical guarantees

Details
Discussion Comments: 0
Verification: Authors have not verified information

Impact of developer turnover on quality in open-source software

Matthieu Foucault, Marc Palyart, Xavier Blanc, Gail C. Murphy, Jean-Rémy Falleri

Impact of developer turnover on quality in open-source software

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

OnSpot system: test impact visibility during code edits in real software

Muhammad Umar Janjua

OnSpot system: test impact visibility during code edits in real software

Details
Discussion Comments: 0
Verification: Author has not verified information

Generating TCP/UDP network data for automated unit test generation

Andrea Arcuri, Gordon Fraser, Juan Pablo Galeotti

Generating TCP/UDP network data for automated unit test generation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Users beware: preference inconsistencies ahead

Farnaz Behrang, Myra B. Cohen, Alessandro Orso

Users beware: preference inconsistencies ahead

Details
Discussion Comments: 0
Verification: Authors have not verified information

Iterative distribution-aware sampling for probabilistic symbolic execution

Mateus Borges, Antonio Filieri, Marcelo d'Amorim, Corina S. Pasareanu

Iterative distribution-aware sampling for probabilistic symbolic execution

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Comprehensive service matching with MatchBox

Paul Börding, Melanie Bruns, Marie Christin Platenius

Comprehensive service matching with MatchBox

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically computing path complexity of programs

Lucas Bang, Abdulbaki Aydin, Tevfik Bultan

Automatically computing path complexity of programs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software

Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker

Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Auto-patching DOM-based XSS at scale

Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena

Auto-patching DOM-based XSS at scale

Details
Discussion Comments: 0
Verification: Authors have not verified information

CLAPP: characterizing loops in Android applications

Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna

CLAPP: characterizing loops in Android applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Witness validation and stepwise testification across software verifiers

Dirk Beyer, Matthias Dangl, Daniel Dietsch, Matthias Heizmann, Andreas Stahlbauer

Witness validation and stepwise testification across software verifiers

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Semantic degrees for Industrie 4.0 engineering: deciding on the degree of semantic formalization to select appropriate technologies

Chih-Hong Cheng, Tuncay Guelfirat, Christian Messinger, Johannes O. Schmitt, Matthias Schnelte, Peter Weber

Semantic degrees for Industrie 4.0 engineering: deciding on the degree of semantic formalization to select appropriate technologies

Details
Discussion Comments: 0
Verification: Authors have not verified information

FlexJava: language support for safe and modular approximate programming

Jongse Park, Hadi Esmaeilzadeh, Xin Zhang, Mayur Naik, William Harris

FlexJava: language support for safe and modular approximate programming

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

A user-guided approach to program analysis

Ravi Mangal, Xin Zhang, Aditya V. Nori, Mayur Naik

A user-guided approach to program analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Information retrieval and spectrum based bug localization: better together

Tien-Duy B. Le, Richard Jayadi Oentaryo, David Lo

Information retrieval and spectrum based bug localization: better together

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study of goto in C code from GitHub repositories

Meiyappan Nagappan, Romain Robbes, Yasutaka Kamei, Éric Tanter, Shane McIntosh, Audris Mockus, Ahmed E. Hassan

An empirical study of goto in C code from GitHub repositories

Details
Discussion Comments: 0
Verification: Authors have not verified information

Targeted program transformations for symbolic execution

Cristian Cadar

Targeted program transformations for symbolic execution

Details
Discussion Comments: 0
Verification: Author has not verified information

How developers search for code: a case study

Caitlin Sadowski, Kathryn T. Stolee, Sebastian G. Elbaum

How developers search for code: a case study

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Comparing and combining test-suite reduction and regression test selection

August Shi, Tifany Yung, Alex Gyori, Darko Marinov

Comparing and combining test-suite reduction and regression test selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Test report prioritization to assist crowdsourced testing

Yang Feng, Zhenyu Chen, James A. Jones, Chunrong Fang, Baowen Xu

Test report prioritization to assist crowdsourced testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Combining eye tracking with navigation paths for identification of cross-language code dependencies

Martin Konopka

Combining eye tracking with navigation paths for identification of cross-language code dependencies

Details
Discussion Comments: 0
Verification: Author has not verified information

TACO: test suite augmentation for concurrent programs

Tingting Yu

TACO: test suite augmentation for concurrent programs

Details
Discussion Comments: 0
Verification: Author has not verified information

iTrace: enabling eye tracking on software artifacts within the IDE to support software engineering tasks

Timothy R. Shaffer, Jenna L. Wise, Braden M. Walters, Sebastian C. Müller, Michael Falcone, Bonita Sharif

iTrace: enabling eye tracking on software artifacts within the IDE to support software engineering tasks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Auto-completing bug reports for Android applications

Kevin Moran, Mario Linares Vásquez, Carlos Bernal-Cárdenas, Denys Poshyvanyk

Auto-completing bug reports for Android applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Efficient dependency detection for safe Java test acceleration

Jonathan Bell, Gail E. Kaiser, Eric Melski, Mohan Dattatreya

Efficient dependency detection for safe Java test acceleration

Details
Discussion Comments: 0
Verification: Authors have not verified information

What change history tells us about thread synchronization

Rui Gu, Guoliang Jin, Linhai Song, Linjie Zhu, Shan Lu

What change history tells us about thread synchronization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pockets: a tool to support exploratory programming for novices and educators

Erina Makihara

Pockets: a tool to support exploratory programming for novices and educators

Details
Discussion Comments: 0
Verification: Author has not verified information

Detecting event anomalies in event-based systems

Gholamreza Safi, Arman Shahbazian, William G. J. Halfond, Nenad Medvidovic

Detecting event anomalies in event-based systems

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Using software theater for the demonstration of innovative ubiquitous applications

Han Xu, Stephan Krusche, Bernd Bruegge

Using software theater for the demonstration of innovative ubiquitous applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

GR(1) synthesis for LTL specification patterns

Shahar Maoz, Jan Oliver Ringert

GR(1) synthesis for LTL specification patterns

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Performance-influence models for highly configurable systems

Norbert Siegmund, Alexander Grebhahn, Sven Apel, Christian Kästner

Performance-influence models for highly configurable systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mimic: computing models for opaque code

Stefan Heule, Manu Sridharan, Satish Chandra

Mimic: computing models for opaque code

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Synthesizing tests for detecting atomicity violations

Malavika Samak, Murali Krishna Ramanathan

Synthesizing tests for detecting atomicity violations

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Navigating through the archipelago of refactorings

Apostolos V. Zarras, Theofanis Vartziotis, Panos Vassiliadis

Navigating through the archipelago of refactorings

Details
Discussion Comments: 0
Verification: Authors have not verified information

Developer onboarding in GitHub: the role of prior social links and language experience

Casey Casalnuovo, Bogdan Vasilescu, Premkumar T. Devanbu, Vladimir Filkov

Developer onboarding in GitHub: the role of prior social links and language experience

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

CLOTHO: saving programs from malformed strings and incorrect string-handling

Aritra Dhar, Rahul Purandare, Mohan Dhawan, Suresh Rangaswamy

CLOTHO: saving programs from malformed strings and incorrect string-handling

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automated attack surface approximation

Christopher Theisen

Automated attack surface approximation

Details
Discussion Comments: 0
Verification: Author has not verified information

Heterogeneous defect prediction

Jaechang Nam, Sunghun Kim

Heterogeneous defect prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information