ACM Foundations of Software Engineering, FSE 2018


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

SketchFix: a tool for automated program repair approach using lazy candidate generation

Jinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid

SketchFix: a tool for automated program repair approach using lazy candidate generation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated scenario-based integration testing of distributed systems

Bruno Lima

Automated scenario-based integration testing of distributed systems

Details
Discussion Comments: 0
Verification: Author has not verified information

Detection of energy inefficiencies in Android wear watch faces

Hailong Zhang, Haowei Wu, Atanas Rountev

Detection of energy inefficiencies in Android wear watch faces

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

MemFix: static analysis-based repair of memory deallocation errors for C

Junhee Lee, Seongjoon Hong, Hakjoo Oh

MemFix: static analysis-based repair of memory deallocation errors for C

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are mobile banking apps secure? what can be improved?

Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, Lihua Xu

Are mobile banking apps secure? what can be improved?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Salient-class location: help developers understand code change in code review

Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng

Salient-class location: help developers understand code change in code review

Details
Discussion Comments: 0
Verification: Authors have not verified information

FACTS: automated black-box testing of FinTech systems

Qingshun Wang, Lintao Gu, Minhui Xue, Lihua Xu, Wenyu Niu, Liang Dou, Liang He, Tao Xie

FACTS: automated black-box testing of FinTech systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugs

David A. Tomassi

Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugs

Details
Discussion Comments: 0
Verification: Author has not verified information

Optimizing test prioritization via test distribution analysis

Junjie Chen, Yiling Lou, Lingming Zhang, Jianyi Zhou, Xiaoleng Wang, Dan Hao, Lu Zhang

Optimizing test prioritization via test distribution analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ecosystem-level determinants of sustained activity in open-source projects: a case study of the PyPI ecosystem

Marat Valiev, Bogdan Vasilescu, James D. Herbsleb

Ecosystem-level determinants of sustained activity in open-source projects: a case study of the PyPI ecosystem

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Towards quantifying the development value of code contributions

Jinglei Ren, Hezheng Yin, Qingda Hu, Armando Fox, Wojciech Koszek

Towards quantifying the development value of code contributions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using finite-state models for log differencing

Hen Amar, Lingfeng Bao, Nimrod Busany, David Lo, Shahar Maoz

Using finite-state models for log differencing

Details
Discussion Comments: 0
Verification: Authors have not verified information

FOT: a versatile, configurable, extensible fuzzing framework

Hongxu Chen, Yuekang Li, Bihuan Chen, Yinxing Xue, Yang Liu

FOT: a versatile, configurable, extensible fuzzing framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical AJAX race detection for JavaScript web applications

Christoffer Quist Adamsen, Anders Møller, Saba Alimadadi, Frank Tip

Practical AJAX race detection for JavaScript web applications

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

DeepSim: deep learning code functional similarity

Gang Zhao, Jeff Huang

DeepSim: deep learning code functional similarity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Predicting Node failure in cloud service systems

Qingwei Lin, Ken Hsieh, Yingnong Dang, Hongyu Zhang, Kaixin Sui, Yong Xu, Jian-Guang Lou, Chenggang Li, Youjiang Wu, Randolph Yao, Murali Chintalapati, Dongmei Zhang

Predicting Node failure in cloud service systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalability-first pointer analysis with self-tuning context-sensitivity

Yue Li, Tian Tan, Anders Møller, Yannis Smaragdakis

Scalability-first pointer analysis with self-tuning context-sensitivity

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Adversarial symbolic execution for detecting concurrency-related cache timing leaks

Shengjian Guo, Meng Wu, Chao Wang

Adversarial symbolic execution for detecting concurrency-related cache timing leaks

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Oreo: detection of clones in the twilight zone

Vaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Pierre Baldi, Cristina V. Lopes

Oreo: detection of clones in the twilight zone

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Model transformation languages under a magnifying glass: a controlled experiment with Xtend, ATL, and QVT

Regina Hebig, Christoph Seidl, Thorsten Berger, John Kook Pedersen, Andrzej Wasowski

Model transformation languages under a magnifying glass: a controlled experiment with Xtend, ATL, and QVT

Details
Discussion Comments: 0
Verification: Authors have not verified information

Semantic inference from natural language privacy policies and Android code

Mitra Bokaei Hosseini

Semantic inference from natural language privacy policies and Android code

Details
Discussion Comments: 0
Verification: Author has not verified information

EClone: detect semantic clones in Ethereum via symbolic transaction sketch

Han Liu, Zhiqiang Yang, Chao Liu, Yu Jiang, Wenqi Zhao, Jiaguang Sun

EClone: detect semantic clones in Ethereum via symbolic transaction sketch

Details
Discussion Comments: 0
Verification: Authors have not verified information

Augmenting stack overflow with API usage patterns mined from GitHub

Anastasia Reinhardt, Tianyi Zhang, Mihir Mathur, Miryung Kim

Augmenting stack overflow with API usage patterns mined from GitHub

Details
Discussion Comments: 0
Verification: Authors have not verified information

An empirical study on crash recovery bugs in large-scale distributed systems

Yu Gao, Wensheng Dou, Feng Qin, Chushu Gao, Dong Wang, Jun Wei, Ruirui Huang, Li Zhou, Yongming Wu

An empirical study on crash recovery bugs in large-scale distributed systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reshaping distributed agile and adaptive development environment

Francesco Nocera

Reshaping distributed agile and adaptive development environment

Details
Discussion Comments: 0
Verification: Author has not verified information

A formal verification tool for Ethereum VM bytecode

Daejun Park, Yi Zhang, Manasvi Saxena, Philip Daian, Grigore Rosu

A formal verification tool for Ethereum VM bytecode

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Efficient static checking of library updates

Darius Foo, Hendy Chua, Jason Yeo, Ming Yi Ang, Asankhaya Sharma

Efficient static checking of library updates

Details
Discussion Comments: 0
Verification: Authors have not verified information

Intelligent bug fixing with software bug knowledge graph

Cheng Zhou

Intelligent bug fixing with software bug knowledge graph

Details
Discussion Comments: 0
Verification: Author has not verified information

Bug synthesis: challenging bug-finding tools with deep faults

Subhajit Roy, Awanish Pandey, Brendan Dolan-Gavitt, Yu Hu

Bug synthesis: challenging bug-finding tools with deep faults

Details
Discussion Comments: 0
Verification: Authors have not verified information

Ten years of hunting for similar code for fun and profit (keynote)

Stéphane Glondu, Lingxiao Jiang, Zhendong Su

Ten years of hunting for similar code for fun and profit (keynote)

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated support for mobile application testing and maintenance

Mattia Fazzini

Automated support for mobile application testing and maintenance

Details
Discussion Comments: 0
Verification: Author has not verified information

Learning to sample: exploiting similarities across environments to learn performance models for configurable systems

Pooyan Jamshidi, Miguel Velez, Christian Kästner, Norbert Siegmund

Learning to sample: exploiting similarities across environments to learn performance models for configurable systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Does ACM's code of ethics change ethical decision making in software development?

Andrew McNamara, Justin Smith, Emerson R. Murphy-Hill

Does ACM's code of ethics change ethical decision making in software development?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards learning-augmented languages

Xinyuan Sun

Towards learning-augmented languages

Details
Discussion Comments: 0
Verification: Author has not verified information

Testing multithreaded programs via thread speed control

Dongjie Chen, Yanyan Jiang, Chang Xu, Xiaoxing Ma, Jian Lu

Testing multithreaded programs via thread speed control

Details
Discussion Comments: 0
Verification: Authors have not verified information

Vista: web test repair using computer vision

Andrea Stocco, Rahulkrishna Yandrapally, Ali Mesbah

Vista: web test repair using computer vision

Details
Discussion Comments: 0
Verification: Authors have not verified information

Beyond testing configurable systems: applying variational execution to automatic program repair and higher order mutation testing

Chu-Pan Wong, Jens Meinicke, Christian Kästner

Beyond testing configurable systems: applying variational execution to automatic program repair and higher order mutation testing

Details
Discussion Comments: 0
Verification: Authors have not verified information

How well are regular expressions tested in the wild?

Peipei Wang, Kathryn T. Stolee

How well are regular expressions tested in the wild?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards data-driven vulnerability prediction for requirements

Sayem Mohammad Imtiaz, Tanmay Bhowmik

Towards data-driven vulnerability prediction for requirements

Details
Discussion Comments: 0
Verification: Authors have not verified information

WarningsGuru: integrating statistical bug models with static analysis to provide timely and specific bug warnings

Louis-Philippe Querel, Peter C. Rigby

WarningsGuru: integrating statistical bug models with static analysis to provide timely and specific bug warnings

Details
Discussion Comments: 0
Verification: Authors have not verified information

AppFlow: using machine learning to synthesize robust, reusable UI tests

Gang Hu, Linjie Zhu, Junfeng Yang

AppFlow: using machine learning to synthesize robust, reusable UI tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

How Dance(Sport) can help to produce better software

Irina Erofeeva

How Dance(Sport) can help to produce better software

Details
Discussion Comments: 0
Verification: Author has not verified information

On the adoption of neural networks in modeling software reliability

Kamill Gusmanov

On the adoption of neural networks in modeling software reliability

Details
Discussion Comments: 0
Verification: Author has not verified information

Singularity: pattern fuzzing for worst case complexity

Jiayi Wei, Jia Chen, Yu Feng, Kostas Ferles, Isil Dillig

Singularity: pattern fuzzing for worst case complexity

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

NAR-miner: discovering negative association rules from code for bug detection

Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai

NAR-miner: discovering negative association rules from code for bug detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Moving towards objective measures of program comprehension

Sarah Fakhoury

Moving towards objective measures of program comprehension

Details
Discussion Comments: 0
Verification: Author has not verified information

Putback-based bidirectional model transformations

Xiao He, Zhenjiang Hu

Putback-based bidirectional model transformations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes

Masatomo Hashimoto, Akira Mori, Tomonori Izumida

Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes

Details
Discussion Comments: 0
Verification: Authors have not verified information

Building lean continuous integration and delivery pipelines by applying DevOps principles: a case study at Varidesk

Vidroha Debroy, Senecca Miller, Lance Brimble

Building lean continuous integration and delivery pipelines by applying DevOps principles: a case study at Varidesk

Details
Discussion Comments: 0
Verification: Authors have not verified information

Winning the app production rally

Ehsan Noei, Daniel Alencar da Costa, Ying Zou

Winning the app production rally

Details
Discussion Comments: 0
Verification: Authors have not verified information

One size does not fit all: an empirical study of containerized continuous deployment workflows

Yang Zhang, Bogdan Vasilescu, Huaimin Wang, Vladimir Filkov

One size does not fit all: an empirical study of containerized continuous deployment workflows

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code vectors: understanding programs through embedded abstracted symbolic traces

Jordan Henkel, Shuvendu K. Lahiri, Ben Liblit, Thomas W. Reps

Code vectors: understanding programs through embedded abstracted symbolic traces

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Practices and tools for better software testing

Davide Spadini

Practices and tools for better software testing

Details
Discussion Comments: 0
Verification: Author has not verified information

Modeling and testing a family of surgical robots: an experience report

Niloofar Mansoor, Jonathan A. Saddler, Bruno Silva, Hamid Bagheri, Myra B. Cohen, Shane Farritor

Modeling and testing a family of surgical robots: an experience report

Details
Discussion Comments: 0
Verification: Authors have not verified information

Gamifying static analysis

Lisa Nguyen Quang Do, Eric Bodden

Gamifying static analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Complementing global and local contexts in representing API descriptions to improve API retrieval tasks

Thanh Van Nguyen, Ngoc M. Tran, Hung Phan, Trong Duc Nguyen, Linh H. Truong, Anh Tuan Nguyen, Hoan Anh Nguyen, Tien N. Nguyen

Complementing global and local contexts in representing API descriptions to improve API retrieval tasks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Software engineering collaboratories (SEClabs) and collaboratories as a service (CaaS)

Elena Sherman, Robert Dyer

Software engineering collaboratories (SEClabs) and collaboratories as a service (CaaS)

Details
Discussion Comments: 0
Verification: Authors have not verified information

FraudDroid: automated ad fraud detection for Android apps

Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein

FraudDroid: automated ad fraud detection for Android apps

Details
Discussion Comments: 0
Verification: Authors have not verified information

Visual web test repair

Andrea Stocco, Rahulkrishna Yandrapally, Ali Mesbah

Visual web test repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

INFAR: insight extraction from app reviews

Cuiyun Gao, Jichuan Zeng, David Lo, Chin-Yew Lin, Michael R. Lyu, Irwin King

INFAR: insight extraction from app reviews

Details
Discussion Comments: 0
Verification: Authors have not verified information

Testing probabilistic programming systems

Saikat Dutta, Owolabi Legunsen, Zixin Huang, Sasa Misailovic

Testing probabilistic programming systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Diversity and decorum in open source communities

Neill Robson

Diversity and decorum in open source communities

Details
Author Comments: All source code and artifacts related to this paper have been saved in a private repository on GitHub. Any individuals desiring to view such artifacts can reach out to the individuals listed as contacts in the paper or on this webpage.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Author has verified information

On the naturalness of proofs

Vincent J. Hellendoorn, Premkumar T. Devanbu, Mohammad Amin Alipour

On the naturalness of proofs

Details
Discussion Comments: 0
Verification: Authors have not verified information

What makes a code change easier to review: an empirical investigation on code change reviewability

Achyudh Ram, Anand Ashok Sawant, Marco Castelluccio, Alberto Bacchelli

What makes a code change easier to review: an empirical investigation on code change reviewability

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Be careful of when: an empirical study on time-related misuse of issue tracking data

Feifei Tu, Jiaxin Zhu, Qimu Zheng, Minghui Zhou

Be careful of when: an empirical study on time-related misuse of issue tracking data

Details
Author Comments: Happy reproducing the work!
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

AlloyInEcore: embedding of first-order relational logic into meta-object facility for automated model reasoning

Ferhat Erata, Arda Goknil, Ivan Kurtev, Bedir Tekinerdogan

AlloyInEcore: embedding of first-order relational logic into meta-object facility for automated model reasoning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Do the dependency conflicts in my project matter?

Ying Wang, Ming Wen, Zhenwei Liu, Rongxin Wu, Rui Wang, Bo Yang, Hai Yu, Zhiliang Zhu, Shing-Chi Cheung

Do the dependency conflicts in my project matter?

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Do Android taint analysis tools keep their promises?

Felix Pauck, Eric Bodden, Heike Wehrheim

Do Android taint analysis tools keep their promises?

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Parameterized model counting for string and numeric constraints

Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu

Parameterized model counting for string and numeric constraints

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Applications of psychological science for actionable analytics

Di Chen, Wei Fu, Rahul Krishna, Tim Menzies

Applications of psychological science for actionable analytics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Testing and validating end user programmed calculated fields

Víctor A. Braberman, Diego Garbervetsky, Javier Godoy, Sebastián Uchitel, Guido de Caso, Ignacio Perez, Santiago Perez

Testing and validating end user programmed calculated fields

Details
Discussion Comments: 0
Verification: Authors have not verified information

CloudRaid: hunting concurrency bugs in the cloud via log-mining

Jie Lu, Feng Li, Lian Li, Xiaobing Feng

CloudRaid: hunting concurrency bugs in the cloud via log-mining

Details
Discussion Comments: 0
Verification: Authors have not verified information

Design and validation of precooked developer dashboards

Vladimir Ivanov, Vladislav Pischulin, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin

Design and validation of precooked developer dashboards

Details
Discussion Comments: 0
Verification: Authors have not verified information

MODE: automated neural network model debugging via state differential analysis and input selection

Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama

MODE: automated neural network model debugging via state differential analysis and input selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

The impact of failing, flaky, and high failure tests on the number of crash reports associated with Firefox builds

Md Tajmilur Rahman, Peter C. Rigby

The impact of failing, flaky, and high failure tests on the number of crash reports associated with Firefox builds

Details
Discussion Comments: 0
Verification: Authors have not verified information

VT-revolution: interactive programming tutorials made possible

Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li

VT-revolution: interactive programming tutorials made possible

Details
Discussion Comments: 0
Verification: Authors have not verified information

DLFuzz: differential fuzzing testing of deep learning systems

Jianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, Jiaguang Sun

DLFuzz: differential fuzzing testing of deep learning systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDE

Junwen Yang, Cong Yan, Pranav Subramaniam, Shan Lu, Alvin Cheung

PowerStation: automatically detecting and fixing inefficiencies of database-backed web applications in IDE

Details
Discussion Comments: 0
Verification: Authors have not verified information

Concurrency verification with maximal path causality

Qiuping Yi, Jeff Huang

Concurrency verification with maximal path causality

Details
Discussion Comments: 0
Verification: Authors have not verified information

Phys: probabilistic physical unit assignment and inconsistency detection

Sayali Kate, John-Paul Ore, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu

Phys: probabilistic physical unit assignment and inconsistency detection

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Large-scale study of substitutability in the presence of effects

Jackson Maddox, Yuheng Long, Hridesh Rajan

Large-scale study of substitutability in the presence of effects

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Symbolic execution with existential second-order constraints

Sergey Mechtaev, Alberto Griggio, Alessandro Cimatti, Abhik Roychoudhury

Symbolic execution with existential second-order constraints

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying impactful service system problems via log analysis

Shilin He, Qingwei Lin, Jian-Guang Lou, Hongyu Zhang, Michael R. Lyu, Dongmei Zhang

Identifying impactful service system problems via log analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Themis: automatically testing software for discrimination

Rico Angell, Brittany Johnson, Yuriy Brun, Alexandra Meliou

Themis: automatically testing software for discrimination

Details
Discussion Comments: 0
Verification: Authors have not verified information

PyDriller: Python framework for mining software repositories

Davide Spadini, Maurício Finavaro Aniche, Alberto Bacchelli

PyDriller: Python framework for mining software repositories

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards counterexample-guided k-induction for fast bug detection

Mikhail Y. R. Gadelha, Felipe R. Monteiro, Lucas C. Cordeiro, Denis A. Nicole

Towards counterexample-guided k-induction for fast bug detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mining error-handling specifications for systems software

Daniel DeFreez

Mining error-handling specifications for systems software

Details
Discussion Comments: 0
Verification: Author has not verified information

Path-based function embedding and its application to error-handling specification mining

Daniel DeFreez, Aditya V. Thakur, Cindy Rubio-González

Path-based function embedding and its application to error-handling specification mining

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DSM: a specification mining tool using recurrent neural network based language model

Tien-Duy B. Le, Lingfeng Bao, David Lo

DSM: a specification mining tool using recurrent neural network based language model

Details
Discussion Comments: 0
Verification: Authors have not verified information

Towards a theory of software development expertise

Sebastian Baltes, Stephan Diehl

Towards a theory of software development expertise

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Dara: hybrid model checking of distributed systems

Vaastav Anand

Dara: hybrid model checking of distributed systems

Details
Discussion Comments: 0
Verification: Author has not verified information

The case for experiment-oriented computing

Paulo Salem

The case for experiment-oriented computing

Details
Discussion Comments: 0
Verification: Author has not verified information

How are spreadsheet templates used in practice: a case study on Enron

Liang Xu, Wensheng Dou, Jiaxin Zhu, Chushu Gao, Jun Wei, Tao Huang

How are spreadsheet templates used in practice: a case study on Enron

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated refactoring of nested-IF formulae in spreadsheets

Jie Zhang, Shi Han, Dan Hao, Lu Zhang, Dongmei Zhang

Automated refactoring of nested-IF formulae in spreadsheets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Data race detection on compressed traces

Dileep Kini, Umang Mathur, Mahesh Viswanathan

Data race detection on compressed traces

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Behind every great deep learning framework is an even greater programming languages concept (keynote)

Erik Meijer

Behind every great deep learning framework is an even greater programming languages concept (keynote)

Details
Discussion Comments: 0
Verification: Author has not verified information

Software development challenges with air-gap isolation

Sunny Wong, Anne Woepse

Software development challenges with air-gap isolation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Feedback-directed differential testing of interactive debuggers

Daniel Lehmann, Michael Pradel

Feedback-directed differential testing of interactive debuggers

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Quality assurance automation in autonomous systems

Afsoon Afzal

Quality assurance automation in autonomous systems

Details
Discussion Comments: 0
Verification: Author has not verified information

Performance comprehension at WiredTiger

Alexandra Fedorova, Craig Mustard, Ivan Beschastnikh, Julia Rubin, Augustine Wong, Svetozar Miucin, Louis Ye

Performance comprehension at WiredTiger

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stochastic energy optimization for mobile GPS applications

Anthony Canino, Yu David Liu, Hidehiko Masuhara

Stochastic energy optimization for mobile GPS applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Darwinian data structure selection

Michail Basios, Lingbo Li, Fan Wu, Leslie Kanthan, Earl T. Barr

Darwinian data structure selection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting speech act types in developer question/answer conversations during bug repair

Andrew Wood, Paige Rodeghero, Ameer Armaly, Collin McMillan

Detecting speech act types in developer question/answer conversations during bug repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

How do developers resolve merge conflicts? an investigation into the processes, tools, and improvements

Caius Brindescu

How do developers resolve merge conflicts? an investigation into the processes, tools, and improvements

Details
Discussion Comments: 0
Verification: Author has not verified information

Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF

Mijung Kim, Shing-Chi Cheung, Sunghun Kim

Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF

Details
Discussion Comments: 0
Verification: Authors have not verified information

PAFL: extend fuzzing optimizations of single mode to industrial parallel mode

Jie Liang, Yu Jiang, Yuanliang Chen, Mingzhe Wang, Chijin Zhou, Jiaguang Sun

PAFL: extend fuzzing optimizations of single mode to industrial parallel mode

Details
Discussion Comments: 0
Verification: Authors have not verified information

RefiNym: using names to refine types

Santanu Kumar Dash, Miltiadis Allamanis, Earl T. Barr

RefiNym: using names to refine types

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deep learning type inference

Vincent J. Hellendoorn, Christian Bird, Earl T. Barr, Miltiadis Allamanis

Deep learning type inference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verifying the long-run behavior of probabilistic system models in the presence of uncertainty

Yamilet R. Serrano Llerena, Marcel Böhme, Marc Brünink, Guoxin Su, David S. Rosenblum

Verifying the long-run behavior of probabilistic system models in the presence of uncertainty

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modify, enhance, select: co-evolution of combinatorial models and test plans

Rachel Tzoref-Brill, Shahar Maoz

Modify, enhance, select: co-evolution of combinatorial models and test plans

Details
Author Comments: As part of this work we contributed to the combinatorial testing community a large repository of anonymized combinatorial models and their versions, developed by industrial practitioners. This is a first of a kind repository. We hope this repository is of use to researchers in the field of combinatorial testing for their future work.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Operationalizing human values in software: a research roadmap

Davoud Mougouei, Harsha Perera, Waqar Hussain, Rifat Ara Shams, Jon Whittle

Operationalizing human values in software: a research roadmap

Details
Discussion Comments: 0
Verification: Authors have not verified information

Feature-interaction aware configuration prioritization

Son Nguyen

Feature-interaction aware configuration prioritization

Details
Discussion Comments: 0
Verification: Author has not verified information

How should compilers explain problems to developers?

Titus Barik, Denae Ford, Emerson R. Murphy-Hill, Chris Parnin

How should compilers explain problems to developers?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving IR-based bug localization with context-aware query reformulation

Mohammad Masudur Rahman, Chanchal K. Roy

Improving IR-based bug localization with context-aware query reformulation

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale

James C. Davis, Christy A. Coghlan, Francisco Servant, Dongyoon Lee

The impact of regular expression denial of service (ReDoS) in practice: an empirical study at the ecosystem scale

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Type migration in large-scale code bases

Ameya Ketkar

Type migration in large-scale code bases

Details
Discussion Comments: 0
Verification: Author has not verified information

BigSift: automated debugging of big data analytics in data-intensive scalable computing

Muhammad Ali Gulzar, Siman Wang, Miryung Kim

BigSift: automated debugging of big data analytics in data-intensive scalable computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

ASketch: a sketching framework for Alloy

Kaiyuan Wang, Allison Sullivan, Darko Marinov, Sarfraz Khurshid

ASketch: a sketching framework for Alloy

Details
Discussion Comments: 0
Verification: Authors have not verified information

VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation

Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Heyuan Shi, Jiaguang Sun

VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation

Details
Discussion Comments: 0
Verification: Authors have not verified information

A novel automated approach for software effort estimation based on data augmentation

Liyan Song, Leandro L. Minku, Xin Yao

A novel automated approach for software effort estimation based on data augmentation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Neural-augmented static analysis of Android communication

Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau

Neural-augmented static analysis of Android communication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Syntax-guided synthesis of Datalog programs

Xujie Si, Woosuk Lee, Richard Zhang, Aws Albarghouthi, Paraschos Koutris, Mayur Naik

Syntax-guided synthesis of Datalog programs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Software fairness

Yuriy Brun, Alexandra Meliou

Software fairness

Details
Discussion Comments: 0
Verification: Authors have not verified information

Regression test selection for TizenRT

Ahmet Çelik, Young-Chul Lee, Milos Gligoric

Regression test selection for TizenRT

Details
Discussion Comments: 0
Verification: Authors have not verified information