ACM Foundations of Software Engineering, FSE 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

A portable interface for runtime energy monitoring

Connor Imes, Lars Bergstrom, Henry Hoffmann

A portable interface for runtime energy monitoring

Details
Discussion Comments: 0
Verification: Authors have not verified information

Parallel data race detection for task parallel programs with locks

Adarsh Yoga, Santosh Nagarakatte, Aarti Gupta

Parallel data race detection for task parallel programs with locks

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

TIPMerge: recommending experts for integrating changes across branches

Catarina Costa, Jair Figueiredo, Leonardo Murta, Anita Sarma

TIPMerge: recommending experts for integrating changes across branches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Foraging and navigations, fundamentally: developers' predictions of value and cost

David Piorkowski, Austin Z. Henley, Tahmid Nabi, Scott D. Fleming, Christopher Scaffidi, Margaret M. Burnett

Foraging and navigations, fundamentally: developers' predictions of value and cost

Details
Discussion Comments: 0
Verification: Authors have not verified information

Discovering additional violations of Java API invariants

Waylon Huang

Discovering additional violations of Java API invariants

Details
Discussion Comments: 0
Verification: Author has not verified information

Cluster-based test suite functional analysis

Marcel Zalmanovici, Orna Raz, Rachel Tzoref-Brill

Cluster-based test suite functional analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Time-travel debugging for JavaScript/Node.js

Earl T. Barr, Mark Marron, Ed Maurer, Dan Moseley, Gaurav Seth

Time-travel debugging for JavaScript/Node.js

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bing developer assistant: improving developer productivity by recommending sample code

Hongyu Zhang, Anuj Jain, Gaurav Khandelwal, Chandrashekhar Kaushik, Scott Ge, Wenxiang Hu

Bing developer assistant: improving developer productivity by recommending sample code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Keep it SIMPLEX: satisfying multiple goals with guarantees in control-based self-adaptive systems

Stepan Shevtsov, Danny Weyns

Keep it SIMPLEX: satisfying multiple goals with guarantees in control-based self-adaptive systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Generating interactive web pages from storyboards

Pavel Panchekha

Generating interactive web pages from storyboards

Details
Discussion Comments: 0
Verification: Author has not verified information

FSX: a tool for fine-grained incremental unit test generation for C/C++ programs

Hiroaki Yoshida, Susumu Tokumoto, Mukul R. Prasad, Indradeep Ghosh, Tadahiro Uehara

FSX: a tool for fine-grained incremental unit test generation for C/C++ programs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reasoning with imprecise privacy preferences

Inah Omoronyia

Reasoning with imprecise privacy preferences

Details
Discussion Comments: 0
Verification: Author has not verified information

Designing for dystopia: software engineering research for the post-apocalypse

Titus Barik, Rahul Pandita, Justin Middleton, Emerson R. Murphy-Hill

Designing for dystopia: software engineering research for the post-apocalypse

Details
Discussion Comments: 0
Verification: Authors have not verified information

A cross-tool communication study on program analysis tool notifications

Brittany Johnson, Rahul Pandita, Justin Smith, Denae Ford, Sarah Elder, Emerson R. Murphy-Hill, Sarah Heckman, Caitlin Sadowski

A cross-tool communication study on program analysis tool notifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fine-grained binary code authorship identification

Xiaozhu Meng

Fine-grained binary code authorship identification

Details
Discussion Comments: 0
Verification: Author has not verified information

Atlas: an intelligent, performant framework for web-based grid computing

Sachith Gullapalli

Atlas: an intelligent, performant framework for web-based grid computing

Details
Discussion Comments: 0
Verification: Author has not verified information

Training the future workforce through task curation in an OSS ecosystem

Anita Sarma, Marco Aurélio Gerosa, Igor Steinmacher, Rafael Leano

Training the future workforce through task curation in an OSS ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated test input generation for Android: are we really there yet in an industrial case?

Xia Zeng, Dengfeng Li, Wujie Zheng, Fan Xia, Yuetang Deng, Wing Lam, Wei Yang, Tao Xie

Automated test input generation for Android: are we really there yet in an industrial case?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Proteus: computing disjunctive loop summary via path dependency analysis

Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li

Proteus: computing disjunctive loop summary via path dependency analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying participants for collaborative merge

Catarina Costa

Identifying participants for collaborative merge

Details
Discussion Comments: 0
Verification: Author has not verified information

Interactive and guided architectural refactoring with search-based recommendation

Yun Lin, Xin Peng, Yuanfang Cai, Danny Dig, Diwen Zheng, Wenyun Zhao

Interactive and guided architectural refactoring with search-based recommendation

Details
Discussion Comments: 0
Verification: Authors have not verified information

API deprecation: a retrospective analysis and detection method for code examples on the web

Jing Zhou, Robert J. Walker

API deprecation: a retrospective analysis and detection method for code examples on the web

Details
Discussion Comments: 0
Verification: Authors have not verified information

What would users change in my app? summarizing app reviews for recommending software changes

Andrea Di Sorbo, Sebastiano Panichella, Carol V. Alexandru, Junji Shimagaki, Corrado Aaron Visaggio, Gerardo Canfora, Harald C. Gall

What would users change in my app? summarizing app reviews for recommending software changes

Details
Author Comments: The Replication Package of the paper is available at the links http://www.ifi.uzh.ch/en/seal/people/panichella/tools/SURF.html and https://zenodo.org/record/47323 The tool that implements the approach defined in this paper is available to other research and mobile developers at the following link: http://www.ifi.uzh.ch/en/seal/people/panichella/tools/SURFTool.html
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

BigDebug: interactive debugger for big data analytics in Apache Spark

Muhammad Ali Gulzar, Matteo Interlandi, Tyson Condie, Miryung Kim

BigDebug: interactive debugger for big data analytics in Apache Spark

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding behavioural patterns in JavaScript

Saba Alimadadi

Understanding behavioural patterns in JavaScript

Details
Discussion Comments: 0
Verification: Author has not verified information

Studying developer gaze to empower software engineering research and practice

Bonita Sharif, Benjamin Clark, Jonathan I. Maletic

Studying developer gaze to empower software engineering research and practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

Gray links in the use of requirements traceability

Nan Niu, Wentao Wang, Arushi Gupta

Gray links in the use of requirements traceability

Details
Discussion Comments: 0
Verification: Authors have not verified information

POLLUX: safely upgrading dependent application libraries

Sukrit Kalra, Ayush Goel, Dhriti Khanna, Mohan Dhawan, Subodh Sharma, Rahul Purandare

POLLUX: safely upgrading dependent application libraries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Disrupting developer productivity one bot at a time

Margaret-Anne D. Storey, Alexey Zagalsky

Disrupting developer productivity one bot at a time

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Detecting table clones and smells in spreadsheets

Wensheng Dou, Shing-Chi Cheung, Chushu Gao, Chang Xu, Liang Xu, Jun Wei

Detecting table clones and smells in spreadsheets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Guided code synthesis using deep neural networks

Carol V. Alexandru

Guided code synthesis using deep neural networks

Details
Discussion Comments: 0
Verification: Author has not verified information

Correct or usable? the limits of traditional verification (impact paper award)

Daniel Jackson, Mandana Vaziri

Correct or usable? the limits of traditional verification (impact paper award)

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

A discrete-time feedback controller for containerized cloud applications

Luciano Baresi, Sam Guinea, Alberto Leva, Giovanni Quattrocchi

A discrete-time feedback controller for containerized cloud applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic trigger generation for end user written rules for home automation

Chandrakana Nandi

Automatic trigger generation for end user written rules for home automation

Details
Discussion Comments: 0
Verification: Author has not verified information

Online shared memory dependence reduction via bisectional coordination

Yanyan Jiang, Chang Xu, Du Li, Xiaoxing Ma, Jian Lu

Online shared memory dependence reduction via bisectional coordination

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automating repetitive code changes using examples

Reudismam Rolim

Automating repetitive code changes using examples

Details
Discussion Comments: 0
Verification: Author has not verified information

Static DOM event dependency analysis for testing web applications

Chungha Sung, Markus Kusano, Nishant Sinha, Chao Wang

Static DOM event dependency analysis for testing web applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Lightweight specification and analysis of dynamic systems with rich configurations

Nuno Macedo, Julien Brunel, David Chemouil, Alcino Cunha, Denis Kuperberg

Lightweight specification and analysis of dynamic systems with rich configurations

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DiagDroid: Android performance diagnosis via anatomizing asynchronous executions

Yu Kang, Yangfan Zhou, Hui Xu, Michael R. Lyu

DiagDroid: Android performance diagnosis via anatomizing asynchronous executions

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Field-exhaustive testing

Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias, Willem Visser

Field-exhaustive testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

TIPMerge: recommending developers for merging branches

Catarina Costa, Jair Figueiredo, Anita Sarma, Leonardo Murta

TIPMerge: recommending developers for merging branches

Details
Discussion Comments: 0
Verification: Authors have not verified information

T2API: synthesizing API code usage templates from English texts with statistical translation

Thanh Van Nguyen, Peter C. Rigby, Anh Tuan Nguyen, Mark Karanfil, Tien N. Nguyen

T2API: synthesizing API code usage templates from English texts with statistical translation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatic performance testing using input-sensitive profiling

Qi Luo

Automatic performance testing using input-sensitive profiling

Details
Discussion Comments: 0
Verification: Author has not verified information

How to break an API: cost negotiation and community values in three software ecosystems

Christopher Bogart, Christian Kästner, James D. Herbsleb, Ferdian Thung

How to break an API: cost negotiation and community values in three software ecosystems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Why we refactor? confessions of GitHub contributors

Danilo Silva, Nikolaos Tsantalis, Marco Tulio Valente

Why we refactor? confessions of GitHub contributors

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Finding and breaking test dependencies to speed up test execution

Sebastian Kappler

Finding and breaking test dependencies to speed up test execution

Details
Discussion Comments: 0
Verification: Author has not verified information

Hunter: next-generation code reuse for Java

Yuepeng Wang, Yu Feng, Ruben Martins, Arati Kaushik, Isil Dillig, Steven P. Reiss

Hunter: next-generation code reuse for Java

Details
Discussion Comments: 0
Verification: Authors have not verified information

Combinatorial generation of structurally complex test inputs for commercial software applications

Hua Zhong, Lingming Zhang, Sarfraz Khurshid

Combinatorial generation of structurally complex test inputs for commercial software applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

SmartDebug: an interactive debug assistant for Java

Xinrui Guo

SmartDebug: an interactive debug assistant for Java

Details
Discussion Comments: 0
Verification: Author has not verified information

Constraint-based event trace reduction

Jie Wang

Constraint-based event trace reduction

Details
Discussion Comments: 0
Verification: Author has not verified information

Combining bug detection and test case generation

Martin Kellogg

Combining bug detection and test case generation

Details
Discussion Comments: 0
Verification: Author has not verified information

Visualizing code and coverage changes for code review

Sebastiaan Oosterwaal, Arie van Deursen, Roberta Coelho, Anand Ashok Sawant, Alberto Bacchelli

Visualizing code and coverage changes for code review

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Developer workflow at google (showcase)

Caitlin Sadowski

Developer workflow at google (showcase)

Details
Discussion Comments: 0
Verification: Author has not verified information

Refactoring and migration of cascading style sheets: towards optimization and improved maintainability

Davood Mazinanian

Refactoring and migration of cascading style sheets: towards optimization and improved maintainability

Details
Discussion Comments: 0
Verification: Author has not verified information

WATERFALL: an incremental approach for repairing record-replay tests of web applications

Mouna Hammoudi, Gregg Rothermel, Andrea Stocco

WATERFALL: an incremental approach for repairing record-replay tests of web applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

Effective assignment and assistance to software developers and reviewers

Motahareh Bahrami Zanjani

Effective assignment and assistance to software developers and reviewers

Details
Discussion Comments: 0
Verification: Author has not verified information

Anti-patterns in search-based program repair

Shin Hwei Tan, Hiroaki Yoshida, Mukul R. Prasad, Abhik Roychoudhury

Anti-patterns in search-based program repair

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Detecting and fixing precision-specific operations for measuring floating-point errors

Ran Wang, Daming Zou, Xinrui He, Yingfei Xiong, Lu Zhang, Gang Huang

Detecting and fixing precision-specific operations for measuring floating-point errors

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

ECHO: instantaneous in situ race detection in the IDE

Sheng Zhan, Jeff Huang

ECHO: instantaneous in situ race detection in the IDE

Details
Discussion Comments: 0
Verification: Authors have not verified information

Titanium: efficient analysis of evolving alloy specifications

Hamid Bagheri, Sam Malek

Titanium: efficient analysis of evolving alloy specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

How should static analysis tools explain anomalies to developers?

Titus Barik

How should static analysis tools explain anomalies to developers?

Details
Discussion Comments: 0
Verification: Author has not verified information

RABIEF: range analysis based integer error fixing

Xi Cheng

RABIEF: range analysis based integer error fixing

Details
Discussion Comments: 0
Verification: Author has not verified information

Continuous deployment of mobile software at facebook (showcase)

Chuck Rossi, Elisa Shibley, Shi Su, Kent Beck, Tony Savor, Michael Stumm

Continuous deployment of mobile software at facebook (showcase)

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Call graph construction for Java libraries

Michael Reif, Michael Eichberg, Ben Hermann, Johannes Lerch, Mira Mezini

Call graph construction for Java libraries

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments: We made our evaluation reproducible and, therefore, provide a Docker container along with the paper. The code on the Docker container corresponds to the state of source code at the time of submission. Later optimizations and changes are not included. It also contains the complete evaluation corpus. A description how to use the container is contained in the paper.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

PerfGuard: binary-centric application performance monitoring in production environments

Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu

PerfGuard: binary-centric application performance monitoring in production environments

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

iGen: dynamic interaction inference for configurable software

ThanhVu Nguyen, Ugur Koc, Javran Cheng, Jeffrey S. Foster, Adam A. Porter

iGen: dynamic interaction inference for configurable software

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multi-representational security analysis

Eunsuk Kang, Aleksandar Milicevic, Daniel Jackson

Multi-representational security analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Extracting instruction semantics via symbolic execution of code generators

Niranjan Hasabnis, R. Sekar

Extracting instruction semantics via symbolic execution of code generators

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Correctness witnesses: exchanging verification results between verifiers

Dirk Beyer, Matthias Dangl, Daniel Dietsch, Matthias Heizmann

Correctness witnesses: exchanging verification results between verifiers

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Reaching the masses: a new subdiscipline of app programmer education

Charles Weir, Awais Rashid, James Noble

Reaching the masses: a new subdiscipline of app programmer education

Details
Discussion Comments: 0
Verification: Authors have not verified information

CacheOptimizer: helping developers configure caching frameworks for hibernate-based database-centric web applications

Tse-Hsun Chen, Weiyi Shang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora

CacheOptimizer: helping developers configure caching frameworks for hibernate-based database-centric web applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

When should internal interfaces be promoted to public?

André C. Hora, Marco Tulio Valente, Romain Robbes, Nicolas Anquetil

When should internal interfaces be promoted to public?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Static loop analysis and its applications

Xie Xiaofei

Static loop analysis and its applications

Details
Discussion Comments: 0
Verification: Author has not verified information

Bounded model checking of state-space digital systems: the impact of finite word-length effects on the implementation of fixed-point digital controllers based on state-space modeling

Felipe R. Monteiro

Bounded model checking of state-space digital systems: the impact of finite word-length effects on the implementation of fixed-point digital controllers based on state-space modeling

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Author has verified information

BinGo: cross-architecture cross-OS binary search

Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, Hee Beng Kuan Tan

BinGo: cross-architecture cross-OS binary search

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding and detecting wake lock misuses for Android applications

Yepang Liu, Chang Xu, Shing-Chi Cheung, Valerio Terragni

Understanding and detecting wake lock misuses for Android applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Crash consistency validation made easy

Yanyan Jiang, Haicheng Chen, Feng Qin, Chang Xu, Xiaoxing Ma, Jian Lu

Crash consistency validation made easy

Details
Discussion Comments: 0
Verification: Authors have not verified information

API code recommendation using statistical learning from fine-grained changes

Anh Tuan Nguyen, Michael Hilton, Mihai Codoban, Hoan Anh Nguyen, Lily Mast, Eli Rademacher, Tien N. Nguyen, Danny Dig

API code recommendation using statistical learning from fine-grained changes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Model, execute, and deploy: answering the hard questions in end-user programming (showcase)

Shan Shan Huang

Model, execute, and deploy: answering the hard questions in end-user programming (showcase)

Details
Discussion Comments: 0
Verification: Author has not verified information

Preventing signedness errors in numerical computations in Java

Christopher A. Mackie

Preventing signedness errors in numerical computations in Java

Details
Discussion Comments: 0
Verification: Author has not verified information

Minimizing GUI event traces

Lazaro Clapp, Osbert Bastani, Saswat Anand, Alex Aiken

Minimizing GUI event traces

Details
Discussion Comments: 0
Verification: Authors have not verified information

Developing a reusable control-based approach to build self-adaptive software systems with formal guarantees

Stepan Shevtsov

Developing a reusable control-based approach to build self-adaptive software systems with formal guarantees

Details
Discussion Comments: 0
Verification: Author has not verified information

Code relatives: detecting similarly behaving software

Fang-Hsiang Su, Jonathan Bell, Kenneth Harvey, Simha Sethumadhavan, Gail E. Kaiser, Tony Jebara

Code relatives: detecting similarly behaving software

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Regression testing of web applications using Record/Replay tools

Mouna Hammoudi

Regression testing of web applications using Record/Replay tools

Details
Discussion Comments: 0
Verification: Author has not verified information

Parameter-free probabilistic API mining across GitHub

Jaroslav M. Fowkes, Charles A. Sutton

Parameter-free probabilistic API mining across GitHub

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Analyzing the validity of selective mutation with dominator mutants

Bob Kurtz, Paul Ammann, Jeff Offutt, Márcio Eduardo Delamaro, Mariet Kurtz, Nida Gökçe

Analyzing the validity of selective mutation with dominator mutants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Python predictive analysis for bug detection

Zhaogui Xu, Peng Liu, Xiangyu Zhang, Baowen Xu

Python predictive analysis for bug detection

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

On-demand strong update analysis via value-flow refinement

Yulei Sui, Jingling Xue

On-demand strong update analysis via value-flow refinement

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

JBSE: a symbolic executor for Java programs with complex heap inputs

Pietro Braione, Giovanni Denaro, Mauro Pezzè

JBSE: a symbolic executor for Java programs with complex heap inputs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Input-sensitive performance testing

Qi Luo

Input-sensitive performance testing

Details
Discussion Comments: 0
Verification: Author has not verified information

A deployable sampling strategy for data race detection

Yan Cai, Jian Zhang, Lingwei Cao, Jian Liu

A deployable sampling strategy for data race detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Directed test generation to detect loop inefficiencies

Monika Dhok, Murali Krishna Ramanathan

Directed test generation to detect loop inefficiencies

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Social health cues developers use when choosing open source packages

Andrew Head

Social health cues developers use when choosing open source packages

Details
Discussion Comments: 0
Verification: Author has not verified information

Python probabilistic type inference with natural language support

Zhaogui Xu, Xiangyu Zhang, Lin Chen, Kexin Pei, Baowen Xu

Python probabilistic type inference with natural language support

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Deep API learning

Xiaodong Gu, Hongyu Zhang, Dongmei Zhang, Sunghun Kim

Deep API learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revamping JavaScript static analysis via localization and remediation of root causes of imprecision

Shiyi Wei, Omer Tripp, Barbara G. Ryder, Julian Dolby

Revamping JavaScript static analysis via localization and remediation of root causes of imprecision

Details
Discussion Comments: 0
Verification: Authors have not verified information

WebRanz: web page randomization for better advertisement delivery and web-bot prevention

Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Th. Eugster

WebRanz: web page randomization for better advertisement delivery and web-bot prevention

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

On-the-fly decomposition of specifications in software model checking

Sven Apel, Dirk Beyer, Vitaly O. Mordan, Vadim S. Mutilin, Andreas Stahlbauer

On-the-fly decomposition of specifications in software model checking

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

"Womenomics" and gender-inclusive software: what software engineers need to know (invited talk)

Margaret M. Burnett

"Womenomics" and gender-inclusive software: what software engineers need to know (invited talk)

Details
Author Comments: This was an abstract+references for my FSE keynote address. The full journal paper defining the method described (GenderMag), available at the links provided here, is: "GenderMag: A Method for Evaluating Software's Gender Inclusiveness", Margaret Burnett, Simone Stumpf, Jamie Macbeth, Stephann Makri, Laura Beckwith, Irwin Kwan, Anicia Peters, William Jernigan, Interacting with Computers, 2016.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Author has verified information

Cozy: synthesizing collection data structures

Calvin Loncaric

Cozy: synthesizing collection data structures

Details
Discussion Comments: 0
Verification: Author has not verified information

Evaluation of fault localization techniques

Spencer Pearson

Evaluation of fault localization techniques

Details
Discussion Comments: 0
Verification: Author has not verified information

Efficient generation of inductive validity cores for safety properties

Elaheh Ghassabani, Andrew Gacek, Michael W. Whalen

Efficient generation of inductive validity cores for safety properties

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Semi-supervised verified feedback generation

Shalini Kaleeswaran, Anirudh Santhiar, Aditya Kanade, Sumit Gulwani

Semi-supervised verified feedback generation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Relationship-aware code search for JavaScript frameworks

Xuan Li, Zerui Wang, Qianxiang Wang, Shoumeng Yan, Tao Xie, Hong Mei

Relationship-aware code search for JavaScript frameworks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Repairing test dependence

Wing Lam

Repairing test dependence

Details
Discussion Comments: 0
Verification: Author has not verified information

Can testedness be effectively measured?

Iftekhar Ahmed, Rahul Gopinath, Caius Brindescu, Alex Groce, Carlos Jensen

Can testedness be effectively measured?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Enforcing correct array indexes with a type system

Joseph Santino

Enforcing correct array indexes with a type system

Details
Discussion Comments: 0
Verification: Author has not verified information

Understanding and generating high quality patches for concurrency bugs

Haopeng Liu, Yuxi Chen, Shan Lu

Understanding and generating high quality patches for concurrency bugs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting sensitive data disclosure via bi-directional text correlation analysis

Jianjun Huang, Xiangyu Zhang, Lin Tan

Detecting sensitive data disclosure via bi-directional text correlation analysis

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Sustainable software design

Martin P. Robillard

Sustainable software design

Details
Discussion Comments: 0
Verification: Author has not verified information

Causal impact analysis for app releases in google play

William Martin, Federica Sarro, Mark Harman

Causal impact analysis for app releases in google play

Details
Discussion Comments: 0
Verification: Authors have not verified information

ARdoc: app reviews development oriented classifier

Sebastiano Panichella, Andrea Di Sorbo, Emitza Guzman, Corrado Aaron Visaggio, Gerardo Canfora, Harald C. Gall

ARdoc: app reviews development oriented classifier

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DeepSoft: a vision for a deep model of software

Hoa Khanh Dam, Truyen Tran, John C. Grundy, Aditya K. Ghose

DeepSoft: a vision for a deep model of software

Details
Discussion Comments: 0
Verification: Authors have not verified information

Supporting change in product lines within the context of use case-driven development and testing

Ines Hajri

Supporting change in product lines within the context of use case-driven development and testing

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Author has verified information

Budgeted testing through an algorithmic lens

Myra B. Cohen, Aduri Pavan, N. V. Vinodchandran

Budgeted testing through an algorithmic lens

Details
Discussion Comments: 0
Verification: Authors have not verified information

Paradise unplugged: identifying barriers for female participation on stack overflow

Denae Ford, Justin Smith, Philip J. Guo, Chris Parnin

Paradise unplugged: identifying barriers for female participation on stack overflow

Details
Discussion Comments: 0
Verification: Authors have not verified information

String analysis for side channels with segmented oracles

Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu, Tevfik Bultan

String analysis for side channels with segmented oracles

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the utility of dominator mutants for mutation testing

Bob Kurtz

On the utility of dominator mutants for mutation testing

Details
Discussion Comments: 0
Verification: Author has not verified information

Understanding and improving continuous integration

Michael Hilton

Understanding and improving continuous integration

Details
Discussion Comments: 0
Verification: Author has not verified information

Designing minimal effective normative systems with the help of lightweight formal methods

Jianye Hao, Eunsuk Kang, Jun Sun, Daniel Jackson

Designing minimal effective normative systems with the help of lightweight formal methods

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making invisible things visible: tracking down known vulnerabilities at 3000 companies (showcase)

Gazi Mahmud

Making invisible things visible: tracking down known vulnerabilities at 3000 companies (showcase)

Details
Discussion Comments: 0
Verification: Author has not verified information

Learning for test prioritization: an industrial case study

Benjamin Busjaeger, Tao Xie

Learning for test prioritization: an industrial case study

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mining performance specifications

Marc Brünink, David S. Rosenblum

Mining performance specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

End-to-end memory behavior profiling with DINAMITE

Svetozar Miucin, Conor Brady, Alexandra Fedorova

End-to-end memory behavior profiling with DINAMITE

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data structure synthesis

Calvin Loncaric

Data structure synthesis

Details
Discussion Comments: 0
Verification: Author has not verified information

A large-scale empirical comparison of static and dynamic test case prioritization techniques

Qi Luo, Kevin Moran, Denys Poshyvanyk

A large-scale empirical comparison of static and dynamic test case prioritization techniques

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Efficiency of projectional editing: a controlled experiment

Thorsten Berger, Markus Völter, Hans Peter Jensen, Taweesap Dangprasert, Janet Siegmund

Efficiency of projectional editing: a controlled experiment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Building a socio-technical theory of coordination: why and how (outstanding research award)

James D. Herbsleb

Building a socio-technical theory of coordination: why and how (outstanding research award)

Details
Discussion Comments: 0
Verification: Author has not verified information

NonDex: a tool for detecting and debugging wrong assumptions on Java API specifications

Alex Gyori, Ben Lambeth, August Shi, Owolabi Legunsen, Darko Marinov

NonDex: a tool for detecting and debugging wrong assumptions on Java API specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Factors influencing code review processes in industry

Tobias Baum, Olga Liskin, Kai Niklas, Kurt Schneider

Factors influencing code review processes in industry

Details
Author Comments: Extracts of the interview transcripts can be made available upon request, subject to certain limitations to ensure participant's anonymity
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Build system with lazy retrieval for Java projects

Ahmet Çelik, Alex Knaust, Aleksandar Milicevic, Milos Gligoric

Build system with lazy retrieval for Java projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated change impact analysis between SysML models of requirements and design

Shiva Nejati, Mehrdad Sabetzadeh, Chetan Arora, Lionel C. Briand, Felix Mandoux

Automated change impact analysis between SysML models of requirements and design

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hotspot symbolic execution of floating-point programs

Minghui Quan

Hotspot symbolic execution of floating-point programs

Details
Discussion Comments: 0
Verification: Author has not verified information

Validate your SPDX files for open source license violations

Demetris Paschalides, Georgia M. Kapitsaki

Validate your SPDX files for open source license violations

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

PUMConf: a tool to configure product specific use case and domain models in a product line

Ines Hajri, Arda Goknil, Lionel C. Briand, Thierry Stephany

PUMConf: a tool to configure product specific use case and domain models in a product line

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

On well-separation of GR(1) specifications

Shahar Maoz, Jan Oliver Ringert

On well-separation of GR(1) specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Discovering bug patterns in JavaScript

Quinn Hanam, Fernando Santos De Mattos Brito, Ali Mesbah

Discovering bug patterns in JavaScript

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Effort-aware just-in-time defect prediction: simple unsupervised models could be better than supervised models

Yibiao Yang, Yuming Zhou, Jinping Liu, Yangyang Zhao, Hongmin Lu, Lei Xu, Baowen Xu, Hareton Leung

Effort-aware just-in-time defect prediction: simple unsupervised models could be better than supervised models

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Effectiveness of code contribution: from patch-based to pull-request-based tools

Jiaxin Zhu, Minghui Zhou, Audris Mockus

Effectiveness of code contribution: from patch-based to pull-request-based tools

Details
Discussion Comments: 0
Verification: Authors have not verified information

Isomorphic regression testing: executing uncovered branches without test augmentation

Jie Zhang, Yiling Lou, Lingming Zhang, Dan Hao, Lu Zhang, Hong Mei

Isomorphic regression testing: executing uncovered branches without test augmentation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Flow-sensitive composition of thread-modular abstract interpretation

Markus Kusano, Chao Wang

Flow-sensitive composition of thread-modular abstract interpretation

Details
Discussion Comments: 0
Verification: Authors have not verified information

An extensive study of static regression test selection in modern software evolution

Owolabi Legunsen, Farah Hariri, August Shi, Yafeng Lu, Lingming Zhang, Darko Marinov

An extensive study of static regression test selection in modern software evolution

Details
Discussion Comments: 0
Verification: Authors have not verified information

SMT-based verification of parameterized systems

Arie Gurfinkel, Sharon Shoham, Yuri Meshman

SMT-based verification of parameterized systems

Details
Discussion Comments: 0
Verification: Authors have not verified information