Last update:
Thu Oct 2 07:07:01 MDT 2025
A. Jefferson Offutt Investigations of the software testing
coupling effect . . . . . . . . . . . . 5--20
Kurt M. Olender and
Leon J. Osterweil Interprocedural static analysis of
sequencing constraints . . . . . . . . . 21--52
Victor R. Basili and
Gianluigi Caldiera and
Giovanni Cantone A reference architecture for the
component factory . . . . . . . . . . . 53--80
Carmen J. Trammell and
Leon H. Binder and
Cathrine E. Snyder The automated production control
documentation system: a case study in
cleanroom software engineering . . . . . 81--94
Robert A. Ballance and
Susan L. Graham and
Michael L. Van de Vanter The Pan language-based editing system 95--127
G. Engels and
C. Lewerentz and
M. Nagl and
W. Schäfer and
A. Schürr Building integrated software development
environments. Part I tool specification 135--167
James D. Kiper Structural testing of rule-based expert
systems . . . . . . . . . . . . . . . . 168--187
G. Michael Schneider and
Johnny Martin and
W. T. Tsai An experimental study of fault detection
in user requirements documents . . . . . 188--204
Eduardo Ostertag and
James Hendler and
Rubén Prieto Díaz and
Christine Braun Computing similarity in a reuse library
system: an AI-based approach . . . . . . 205--228
Kevin J. Sullivan and
David Notkin Reconciling environment integration and
software evolution . . . . . . . . . . . 229--268
Shmuel Tyszberowicz and
Amiram Yehudai OBSERV --- a prototyping language and
environment . . . . . . . . . . . . . . 269--309
Wuu Yang and
Susan Horwitz and
Thomas Reps A program integration algorithm that
accommodates semantics-preserving
transformations . . . . . . . . . . . . 310--354
Don Batory and
Sean O'Malley The design and implementation of
hierarchical software systems with
reusable components . . . . . . . . . . 355--398
David Harel and
Chaim-arie Kahana On statecharts with overlapping . . . . 399--421
Steven J. Zeil and
Faten H. Afifi and
Lee J. White Detection of linear errors via domain
testing . . . . . . . . . . . . . . . . 422--451
Manfred Broy Functional specification of
time-sensitive communicating systems . . 1--46
Gail E. Kaiser and
Simon M. Kaplan Parallel and distributed incremental
attribute evaluation algorithms for
multiuser software development
environments . . . . . . . . . . . . . . 47--92
James A. Whittaker and
J. H. Poore Markov analysis of software
specifications . . . . . . . . . . . . . 93--106
Richard A. DeMillo and
A. Jefferson Offutt Experimental results from an automatic
test case generator . . . . . . . . . . 109--127
Yishai A. Feldman and
Haim Schneider Simulating reactive systems by deduction 128--175
P. Klint A meta-environment for generating
programming environments . . . . . . . . 176--201
Paolo Ciancarini Coordinating rule-based software
processes with ESP . . . . . . . . . . . 203--227
William G. Griswold and
David Notkin Automated assistance for program
restructuring . . . . . . . . . . . . . 228--269
M. Jean Harrold and
Rajiv Gupta and
Mary Lou Soffa A methodology for controlling the size
of a test suite . . . . . . . . . . . . 270--285
Andy Podgurski and
Lynn Pierce Retrieving reusable software by sampling
behavior . . . . . . . . . . . . . . . . 286--303
Laura K. Dillon A visual execution model for Ada tasking 311--345
Farn Wang and
Aloysius K. Mok and
E. Allen Emerson Distributed real-time system
specification and verification in APTL 346--378
Pamela Zave and
Michael Jackson Conjunction as composition . . . . . . . 379--411
Rolf Adams and
Walter Tichy and
Annette Weinert The cost of selective recompilation and
environment processing . . . . . . . . . 3--28
István Forgács Double iterative framework for
flow-sensitive interprocedural data flow
analysis . . . . . . . . . . . . . . . . 29--55
Angelo Morzenti and
Pierluigi San Pietro Object-oriented logical specification of
time-critical systems . . . . . . . . . 56--98
Roong-Ko Doong and
Phyllis G. Frankl The ASTOOT approach to testing
object-oriented programs . . . . . . . . 101--130
L. K. Dillon and
G. Kutty and
L. E. Moser and
P. M. Melliar-Smith and
Y. S. Ramakrishna A graphical interval logic for
specifying concurrent systems . . . . . 131--165
Francesco Parisi-Presicce and
Alfonso Pierantonio An algebraic theory of class
specification . . . . . . . . . . . . . 166--199
Philip J. Bernhard A reduced test suite for protocol
conformance testing . . . . . . . . . . 201--220
Yoonsik Cheon and
Gary T. Leavens The Larch/Smalltalk interface
specification language . . . . . . . . . 221--253
Bingchiang Jeng and
Elaine J. Weyuker A simplified domain-testing strategy . . 254--270
Christian Creveuil and
Gruia-Catalin Roman Formal specification and design of a
message router . . . . . . . . . . . . . 271--307
Miguel Felder and
Angelo Morzenti Validating real-time systems by
history-checking TRIO specifications . . 308--339
S. Duri and
U. Buy and
R. Devarapalli and
S. M. Shatz Application and experimental evaluation
of state space reduction methods for
deadlock analysis in Ada . . . . . . . . 340--380
David Binkley and
Susan Horwitz and
Thomas Reps Program integration for languages with
procedure calls . . . . . . . . . . . . 3--35
W. E. Howden and
Yudong Huang Software trustability analysis . . . . . 36--64
Michal Young and
Richard N. Taylor and
David L. Levine and
Kari A. Nies and
Debra Brodbeck A concurrency analysis tool suite for
Ada programs: rationale, design, and
preliminary experience . . . . . . . . . 65--106
Daniel Jackson Aspect: detecting bugs with abstract
dependences . . . . . . . . . . . . . . 109--145
Amy Moormann Zaremski and
Jeannette M. Wing Signature matching: a tool for using
software libraries . . . . . . . . . . . 146--170
Mauro Pezz\`e and
Richard N. Taylor and
Michal Young Graph models for reachability analysis
of concurrent programs . . . . . . . . . 171--213
Bevin R. Brett Comments on ``The cost of selective
recompilation and environment
processing'' . . . . . . . . . . . . . . 214--216
Walter Tichy and
Rolf Adams and
Annette Weinert Authors' response . . . . . . . . . . . 217--219
Stanley M. Sutton and
Dennis Heimbigner and
Leon J. Osterweil APPL/A: a language for software process
programming . . . . . . . . . . . . . . 221--286
H. Rebecca Callison A time-sensitive object model for
real-time systems . . . . . . . . . . . 287--317
Gregory D. Abowd and
Robert Allen and
David Garlan Formalizing style to understand
descriptions of software architecture 319--364
Daniel Jackson Structuring Z specifications with views 365--389
Mark van den Brand and
Eelco Visser Generation of formatters for
context-free languages . . . . . . . . . 1--41
Premkumar T. Devanbu and
David S. Rosenblum and
Alexander L. Wolf Generating testing and analysis tools
with Aria . . . . . . . . . . . . . . . 42--62
Roger Ferguson and
Bogdan Korel The chaining approach for software test
data generation . . . . . . . . . . . . 63--86
Elaine J. Weyuker Using failure cost information for
testing and reliability assessment . . . 87--98
A. Jefferson Offutt and
Ammei Lee and
Gregg Rothermel and
Roland H. Untch and
Christian Zapf An experimental determination of
sufficient mutant operators . . . . . . 99--118
Francesco Bergadano and
Daniele Gunetti Testing by means of inductive program
learning . . . . . . . . . . . . . . . . 119--145
Gregor Snelting Reengineering of configurations based on
mathematical concept analysis . . . . . 146--189
Gianpaolo Cugola and
Elisabetta Di Nitto and
Alfonso Fuggetta and
Carlo Ghezzi A framework for formalizing
inconsistencies and deviations in
human-centered systems . . . . . . . . . 191--230
Constance L. Heitmeyer and
Ralph D. Jeffords and
Bruce G. Labaw Automated consistency checking of
requirements specifications . . . . . . 231--261
Gail C. Murphy and
David Notkin Lightweight lexical source model
extraction . . . . . . . . . . . . . . . 262--292
David Harel and
Amnon Naamad The STATEMATE semantics of statecharts 293--333
Shing Chi Cheung and
Jeff Kramer Context constraints for compositional
reachability analysis . . . . . . . . . 334--377
Daniel J. Barrett and
Lori A. Clarke and
Peri L. Tarr and
Alexander E. Wise A framework for event-based software
integration . . . . . . . . . . . . . . 378--421
Anonymous Author Index . . . . . . . . . . . . . . 422--423
Pamela Zave and
Michael Jackson Four dark corners of requirements
engineering . . . . . . . . . . . . . . 1--30
L. E. Moser and
Y. S. Ramakrishna and
G. Kutty and
P. M. Melliar-Smith and
L. K. Dillon A graphical environment for the design
of concurrent real-time systems . . . . 31--79
Laura K. Dillon Task dependence and termination in Ada 80--110
Scott Henninger An evolutionary approach to constructing
effective software reuse repositories 111--140
Premkumar Devanbu and
Mark A. Jones The use of description logics in KBSE
systems . . . . . . . . . . . . . . . . 141--172
Gregg Rothermel and
Mary Jean Harrold A safe, efficient regression test
selection technique . . . . . . . . . . 173--210
Robert Allen and
David Garlan A formal basis for architectural
connection . . . . . . . . . . . . . . . 213--249
Gruia-Catalin Roman and
Peter J. McCann and
Jerome Y. Plun Mobile UNITY: reasoning and
specification in mobile computing . . . 250--282
Vincenzo Ambriola and
Reidar Conradi and
Alfonso Fuggetta Assessing process-centered software
engineering environments . . . . . . . . 283--328
Alexandre Petrenko Comments on ``A reduced test suite for
protocol conformance testing'' . . . . . 329--331
Amy Moormann Zaremski and
Jeannette M. Wing Specification matching of software
components . . . . . . . . . . . . . . . 333--369
Rajiv Gupta and
Mary Lou Soffa and
John Howard Hybrid slicing: integrating dynamic
information with static analysis . . . . 370--397
Andreas Zeller and
Gregor Snelting Unified versioning through feature logic 398--441
John C. Doppke and
Dennis Heimbigner and
Alexander L. Wolf Software process modeling and execution
within virtual environments . . . . . . 1--40
Adam Porter and
Harvey Siy and
Audris Mockus and
Lawrence Votta Understanding the sources of variation
in software inspections . . . . . . . . 41--79
Luciano Baresi and
Mauro Pezz\`e Toward formalizing structured analysis 80--107
Robert W. Bowdidge and
William G. Griswold Supporting the restructuring of data
abstractions through manipulation of a
program visualization . . . . . . . . . 109--157
Gail C. Murphy and
David Notkin and
William G. Griswold and
Erica S. Lan An empirical study of static call graph
extractors . . . . . . . . . . . . . . . 158--191
James J. Hunt and
Kiem-Phong Vo and
Walter F. Tichy Delta algorithms an empirical analysis 192--214
Jonathan E. Cook and
Alexander L. Wolf Discovering models of software processes
from event-based data . . . . . . . . . 215--249
Huo Yan Chen and
T. H. Tse and
F. T. Chan and
T. Y. Chen In black and white: an integrated
approach to class-level testing of
object-oriented programs . . . . . . . . 250--295
Judith Crow and
Ben Di Vito Formalizing space shuttle software
requirements: four case studies . . . . 296--332
Robert Allen and
David Garlan Errata: ``A formal basis for
architectural connection'' . . . . . . . 333--334
Anthony Hunter and
Bashar Nuseibeh Managing inconsistent specifications:
reasoning, analysis, and action . . . . 335--367
Maria Letizia Jaccheri and
Gian Pietro Picco and
Patricia Lago Eliciting software process models with
the E3 language . . . . . . . . . . . . 368--410
Alfonso Fuggetta and
Luigi Lavazza and
Sandro Morasca and
Stefano Cinti and
Giandomenico Oldano and
Elena Orazi Applying GQM in an industrial software
factory . . . . . . . . . . . . . . . . 411--448
James J. Hunt and
Walter F. Tichy Addendum to ``Delta algorithms: an
empirical analysis'' . . . . . . . . . . 449--449
Jonathan S. Ostroff Composition and refinement of discrete
real-time systems . . . . . . . . . . . 1--48
Shing Chi Cheung and
Jeff Kramer Checking safety properties using
compositional reachability analysis . . 49--78
Emanuele Ciapessoni and
Piergiorgio Mirandola and
Alberto Coen-Porisini and
Dino Mandrioli and
Angelo Morzenti From formal models to formally based
methods: an industrial experience . . . 79--113
Peter J. McCann and
Gruia-Catalin Roman Modeling mobile IP in mobile UNITY . . . 115--146
Jonathan E. Cook and
Alexander L. Wolf Software process validation:
quantitatively measuring the
correspondence of a process to a model 147--176
Premkumar T. Devanbu GENOA --- a customizable,
front-end-retargetable source code
analysis framework . . . . . . . . . . . 177--212
E. Damiani and
M. G. Fugini and
C. Bellettini A hierarchy-aware approach to faceted
classification of objected-oriented
components . . . . . . . . . . . . . . . 215--262
Andy Podgurski and
Wassim Masri and
Yolanda McCleese and
Francis G. Wolff and
Charles Yang Estimation of software reliability by
stratified sampling . . . . . . . . . . 263--283
Jean-Marc Jézéquel Reifying variants in configuration
management . . . . . . . . . . . . . . . 284--295
Steven P. Reiss The Desert environment . . . . . . . . . 297--342
Klaus Pohl and
Klaus Weidenhaupt and
Ralf Dömges and
Peter Haumer and
Matthias Jarke and
Ralf Klamma PRIME --- toward process-integrated
modeling environments: 1 . . . . . . . . 343--410
D. Richard Kuhn Fault classes and error detection
capability of specification-based
testing . . . . . . . . . . . . . . . . 411--424
E. Damiani and
M. G. Fugini and
C. Bellettini Corrigenda: a hierarchy-aware approach
to faceted classification of
object-oriented components . . . . . . . 425--472
Tevfik Bultan and
Richard Gerber and
Christopher League Composite model-checking: verification
with type-specific symbolic
representations . . . . . . . . . . . . 3--50
James C. Corbett Using shape analysis to reduce
finite-state models of concurrent Java
programs . . . . . . . . . . . . . . . . 51--93
Carl A. Gunter Abstracting dependencies between
software configuration items . . . . . . 94--131
A. Prasad Sistla and
Viktor Gyuris and
E. Allen Emerson SMC: a symmetry-based model checker for
verification of safety and liveness
properties . . . . . . . . . . . . . . . 133--166
P. Ciancarini and
F. Franzé and
C. Mascolo Using a coordination language to specify
and analyze systems containing mobile
components . . . . . . . . . . . . . . . 167--198
Panagiotis Louridas and
Pericles Loucopoulos A generic model for reflective design 199--237
Paola Inverardi and
Alexander L. Wolf and
Daniel Yankelevich Static checking of system behaviors
using derived component assumptions . . 239--272
Naftaly H. Minsky and
Victoria Ungureanu Law-governed interaction: a coordination
and control mechanism for heterogeneous
distributed systems . . . . . . . . . . 273--305
Kevin L. Mills and
Hassan Gomaa A knowledge-based method for inferring
semantic concepts from visual models of
system behavior . . . . . . . . . . . . 306--337
Dan S. Wallach and
Andrew W. Appel and
Edward W. Felten SAFKASI: a security mechanism for
language-based systems . . . . . . . . . 341--378
Philip W. L. Fong and
Robert D. Cameron Proof linking: modular verification of
mobile programs in the presence of lazy,
dynamic linking . . . . . . . . . . . . 379--409
Andrew C. Myers and
Barbara Liskov Protecting privacy using the
decentralized label model . . . . . . . 410--442
E. M. Clarke and
S. Jha and
W. Marrero Verifying security protocols with Brutus 443--487
Antonio Durante and
Riccardo Focardi and
Roberto Gorrieri A compiler for analyzing cryptographic
protocols using noninterference . . . . 488--528
F. Tip and
T. B. Dinesh A slicing-based approach for locating
type errors . . . . . . . . . . . . . . 5--55
Huo Yan Chen and
T. H. Tse and
T. Y. Chen TACCLE: a methodology for
object-oriented software testing at the
class and cluster levels . . . . . . . . 56--109
Gregg Rothermel and
Margaret Burnett and
Lixin Li and
Christopher Dupuis and
Andrei Sheretov A methodology for testing spreadsheets 110--147
John Bible and
Gregg Rothermel and
David S. Rosenblum A comparative study of coarse- and
fine-grained safe regression
test-selection techniques . . . . . . . 149--183
Todd L. Graves and
Mary Jean Harrold and
Jung-Min Kim and
Adam Porter and
Gregg Rothermel An empirical study of regression test
selection techniques . . . . . . . . . . 184--208
Saurabh Sinha and
Mary Jean Harrold and
Gregg Rothermel Interprocedural control dependence . . . 209--254
Angelo Gargantini and
Angelo Morzenti Automated deductive requirements
analysis of critical systems . . . . . . 255--307
Dewayne E. Perry and
Harvey P. Siy and
Lawrence G. Votta Parallel changes in large-scale software
development: an observational case study 308--337
Gian Pietro Picco and
Gruia-Catalin Roman and
Peter J. McCann Reasoning about code mobility with
mobile UNITY . . . . . . . . . . . . . . 338--395
J.-R. Beauvais and
E. Rutten and
T. Gautier and
R. Houdebine and
P. Le Guernic and
Y.-M. Tang Modeling statecharts and activitycharts
as signal equations . . . . . . . . . . 397--451
Angela Bonifati and
Fabiano Cattaneo and
Stefano Ceri and
Alfonso Fuggetta and
Stefano Paraboschi Designing data marts for data warehouses 452--483
Nenad Medvidovic and
David S. Rosenblum and
David F. Redmiles and
Jason E. Robbins Modeling software architectures in the
Unified Modeling Language . . . . . . . 2--57
Tatsuhiro Tsuchiya and
Tohru Kikuno On fault classes and error detection
capability of specification-based
testing . . . . . . . . . . . . . . . . 58--62
Idit Keidar and
Roger Khazan and
Nancy Lynch and
Alex Shvartsman An inheritance-based technique for
building simulation proofs incrementally 63--91
Michael Schrefl and
Markus Stumptner Behavior-consistent specialization of
object life cycles . . . . . . . . . . . 92--148
Miguel Felder and
Mauro Pezz\`e A formal design notation for real-time
systems . . . . . . . . . . . . . . . . 149--190
Don Batory and
Clay Johnson and
Bob Macdonald and
Dale Von Heeder Achieving extensibility through
product-lines and domain-specific
languages: a case study . . . . . . . . 191--214
Yannis Smaragdakis and
Don Batory Mixin layers: an object-oriented
implementation technique for refinements
and collaboration-based designs . . . . 215--255
Daniel Jackson Alloy: a lightweight object modelling
notation . . . . . . . . . . . . . . . . 256--290
Alexander P. Pons Temporal abstract classes and virtual
temporal specifications for real-time
systems . . . . . . . . . . . . . . . . 291--308
Audris Mockus and
Roy T. Fielding and
James D. Herbsleb Two case studies of open source software
development: Apache and Mozilla . . . . 309--346
Donglin Liang and
Mary Jean Harrold Equivalence analysis and its application
in improving the efficiency of program
slicing . . . . . . . . . . . . . . . . 347--383
Anonymous Obituary: Ole-Johan Dahl, 1931--2002;
Edsger Wybe Dijkstra, 1930--2002;
Kristen Nygaard, 1926--2002 . . . . . . 385--385
Marco Bernardo and
Paolo Ciancarini and
Lorenzo Donatiello Architecting families of software
systems with process algebras . . . . . 386--426
R. M. Hierons Comparing test sets and criteria in the
presence of test hypotheses and fault
domains . . . . . . . . . . . . . . . . 427--448
Alexander Egyed Automated abstraction of class diagrams 449--491
Carlo Ghezzi and
Jeffrey N. Magee and
Dieter Rombach and
Mary Lou Soffa Editorial . . . . . . . . . . . . . . . 1--2
Amy P. Felty and
Kedar S. Namjoshi Feature specification and automated
conflict detection . . . . . . . . . . . 3--27
Christian Nentwich and
Wolfgang Emmerich and
Anthony Finkelstein and
Ernst Ellmer Flexible consistency checking . . . . . 28--63
Antónia Lopes and
Michel Wermelinger and
José Luiz Fiadeiro Higher-order architectural connectors 64--104
ACM Transactions on Software Engineering and
Methodology staff Reviewers 2002 . . . . . . . . . . . . . 105--105
Alberto Coen-Porisini and
Matteo Pradella and
Matteo Rossi and
Dino Mandrioli A formal approach for designing
CORBA-based applications . . . . . . . . 107--151
Mark G. J. Van Den Brand and
Paul Klint and
Jurgen J. Vinju Term rewriting with traversal functions 152--190
Martin P. Robillard and
Gail C. Murphy Static analysis to support the evolution
of exception structure in
object-oriented systems . . . . . . . . 191--221
Luca Durante and
Riccardo Sisto and
Adriano Valenzano Automatic testing equivalence
verification of spi calculus
specifications . . . . . . . . . . . . . 222--284
Yossi Cohen and
Yishai A. Feldman Automatic high-quality reengineering of
database programs by abstraction,
transformation and reimplementation . . 285--316
Franco Zambonelli and
Nicholas R. Jennings and
Michael Wooldridge Developing multiagent systems: The Gaia
methodology . . . . . . . . . . . . . . 317--370
Marsha Chechik and
Benet Devereux and
Steve Easterbrook and
Arie Gurfinkel Multi-valued symbolic model-checking . . 371--408
Tim Miller and
Paul Strooper A framework and tool support for the
systematic testing of model-based
specifications . . . . . . . . . . . . . 409--439
Gian-Luigi Ferrari and
Stefania Gnesi and
Ugo Montanari and
Marco Pistore A model-checking verification
environment for mobile processes . . . . 440--473
Pamela Zave Address translation in telecommunication
features . . . . . . . . . . . . . . . . 1--36
Sebastian Uchitel and
Jeff Kramer and
Jeff Magee Incremental elaboration of
scenario-based specifications and
behavior models using implied scenarios 37--85
Nalini Venkatasubramanian and
Carolyn Talcott and
Gul A. Agha A formal model for reasoning about
adaptive QoS-enabled middleware . . . . 86--147
Tankut Akgul and
Vincent J. Mooney III Assembly instruction level reverse
execution for debugging . . . . . . . . 149--198
Alessandro Orso and
Saurabh Sinha and
Mary Jean Harrold Classifying data dependences in the
presence of pointers for program
comprehension, testing, and debugging 199--239
Roshanak Roshandel and
André Van Der Hoek and
Marija Mikic-Rakic and
Nenad Medvidovic Mae---a system model and environment for
managing architectural evolution . . . . 240--276
Gregg Rothermel and
Sebastian Elbaum and
Alexey G. Malishevsky and
Praveen Kallakuri and
Xuemei Qiu On test suite composition and
cost-effective regression testing . . . 277--331
Stefan Kramer and
Hermann Kaindl Coupling and cohesion metrics for
knowledge-based systems using frames and
rules . . . . . . . . . . . . . . . . . 332--358
Matthew B. Dwyer and
Lori A. Clarke and
Jamieson M. Cobleigh and
Gleb Naumovich Flow analysis for verifying properties
of concurrent software systems . . . . . 359--430
Gennaro Costagliola and
Vincenzo Deufemia and
Giuseppe Polese A framework for modeling and
implementing visual notations with
applications to software engineering . . 431--487
Ana Milanova and
Atanas Rountev and
Barbara G. Ryder Parameterized object sensitivity for
points-to analysis for Java . . . . . . 1--41
Luciano Baresi and
Mauro Pezz\`e Formal interpreters for diagram
notations . . . . . . . . . . . . . . . 42--84
Ian Sommerville and
Jane Ransom An empirical study of industrial
requirements engineering process
assessment and improvement . . . . . . . 85--117
Carlo Ghezzi Editorial . . . . . . . . . . . . . . . 119--123
Jean Berstel and
Stefano Crespi Reghizzi and
Gilles Roussel and
Pierluigi San Pietro A scalable formal method for design and
automatic checking of user interfaces 124--167
Martin Erwig and
Zhe Fu Software reuse for scientific computing
through program generation . . . . . . . 168--198
Eric M. Dashofy and
André van der Hoek and
Richard N. Taylor A comprehensive approach for the
development of modular software
architecture description languages . . . 199--245
ACM Transactions on Software Engineering and
Methodology staff Acknowledgement of referees 2004 . . . . 246--246
Man F. Lau and
Yuen T. Yu An extended fault class hierarchy for
specification-based testing . . . . . . 247--276
Vincenzo Gervasi and
Didar Zowghi Reasoning about inconsistencies in
natural language requirements . . . . . 277--330
Paul Klint and
Ralf Lämmel and
Chris Verhoef Toward an engineering discipline for
grammarware . . . . . . . . . . . . . . 331--380
Leon Osterweil and
Carlo Ghezzi and
Jeff Kramer and
Alexander Wolf Editorial . . . . . . . . . . . . . . . 381--382
Jacky Estublier and
David Leblang and
André van der Hoek and
Reidar Conradi and
Geoffrey Clemm and
Walter Tichy and
Darcy Wiborg-Weber Impact of software engineering research
on the practice of software
configuration management . . . . . . . . 383--430
Barbara G. Ryder and
Mary Lou Soffa and
Margaret Burnett The impact of software engineering
research on modern programming languages 431--477
Marcelo F. Frias and
Carlos G. López Pombo and
Gabriel A. Baum and
Nazareno M. Aguirre and
Thomas S. E. Maibaum Reasoning about static and dynamic
properties in alloy: a purely relational
approach . . . . . . . . . . . . . . . . 478--526
Rik Eshuis Symbolic model checking of UML activity
diagrams . . . . . . . . . . . . . . . . 1--38
David Basin and
Jürgen Doser and
Torsten Lodderstedt Model driven security: From UML models
to access control infrastructures . . . 39--91
Colin Snook and
Michael Butler UML-B: Formal modeling and design aided
by UML . . . . . . . . . . . . . . . . . 92--122
Steve Counsell and
Stephen Swift and
Jason Crampton The interpretation and utility of three
cohesion metrics for object-oriented
design . . . . . . . . . . . . . . . . . 123--149
Marc Fisher II and
Gregg Rothermel and
Darren Brown and
Mingming Cao and
Curtis Cook and
Margaret Burnett Integrating automated test generation
into the WYSIWYT spreadsheet testing
methodology . . . . . . . . . . . . . . 150--194
Wei Zhao and
Lu Zhang and
Yin Liu and
Jiasu Sun and
Fuqing Yang SNIAFL: Towards a static noninteractive
approach to feature location . . . . . . 195--226
R. M. Hierons Avoiding coincidental correctness in
boundary value analysis . . . . . . . . 227--241
Avik Sinha and
Carol Smidts HOTTest: a model-based test design
technique for enhanced testing of
domain-specific applications . . . . . . 242--278
Amy L. Murphy and
Gian Pietro Picco and
Gruia-Catalin Roman LIME: a coordination model and
middleware supporting mobility of hosts
and agents . . . . . . . . . . . . . . . 279--328
Philippe Thiran and
Jean-Luc Hainaut and
Geert-Jan Houben and
Djamal Benslimane Wrapper-based evolution of legacy
information systems . . . . . . . . . . 329--359
Marco Brambilla and
Stefano Ceri and
Piero Fraternali and
Ioana Manolescu Process modeling in Web applications . . 360--409
Gregor Snelting and
Torsten Robschink and
Jens Krinke Efficient path conditions in dependence
graphs for software safety analysis . . 410--457
David Notkin Editorial . . . . . . . . . . . . . . . 1:1--1:??
Carlo Ghezzi Editorial . . . . . . . . . . . . . . . 2:1--2:??
Martin P. Robillard and
Gail C. Murphy Representing concerns in source code . . 3:1--3:??
Qing Xie and
Atif M. Memon Designing and comparing automated test
oracles for GUI-based software
applications . . . . . . . . . . . . . . 4:1--4:??
Manfred Broy and
Ingolf H. Krüger and
Michael Meisinger A formal model of services . . . . . . . 5:1--5:??
David Notkin Editorial . . . . . . . . . . . . . . . 6:1--6:??
Shriram Krishnamurthi and
Kathi Fisler Foundations of incremental aspect
model-checking . . . . . . . . . . . . . 7:1--7:??
David Binkley and
Nicolas Gold and
Mark Harman An empirical study of static program
slice size . . . . . . . . . . . . . . . 8:1--8:??
Abdoulaye Gamatié and
Thierry Gautier and
Paul Le Guernic and
Jean-Pierre Talpin Polychronous design of embedded
real-time applications . . . . . . . . . 9:1--9:??
Kalpesh Kapoor and
Jonathan P. Bowen Test conditions for fault classes in
Boolean specifications . . . . . . . . . 10:1--10:??
Richard F. Paige and
Phillip J. Brooke and
Jonathan S. Ostroff Metamodel-based model conformance and
multiview consistency checking . . . . . 11:1--11:??
Samik Basu and
Scott A. Smolka Model checking the Java metalocking
algorithm . . . . . . . . . . . . . . . 12:1--12:??
Andrea De Lucia and
Fausto Fasano and
Rocco Oliveto and
Genoveffa Tortora Recovering traceability links in
software artifact management systems
using information retrieval methods . . 13:1--13:??
Gary Wassermann and
Carl Gould and
Zhendong Su and
Premkumar Devanbu Static checking of dynamically generated
queries in database applications . . . . 14:1--14:??
Luciano Baresi and
Sandro Morasca Three empirical studies on estimating
the design effort of Web applications 15:1--15:??
David Notkin Editorial . . . . . . . . . . . . . . . 1:1--1:2
Timothy M. Meyers and
David Binkley An empirical study of slice-based
cohesion and coupling metrics . . . . . 2:1--2:27
Marius Marin and
Arie Van Deursen and
Leon Moonen Identifying Crosscutting Concerns Using
Fan-In Analysis . . . . . . . . . . . . 3:1--3:37
Marcelo F. Frias and
Carlos G. Lopez Pombo and
Juan P. Galeotti and
Nazareno M. Aguirre Efficient Analysis of DynAlloy
Specifications . . . . . . . . . . . . . 4:1--4:34
David Notkin Editorial . . . . . . . . . . . . . . . 5:1--5:??
David Notkin and
Mauro Pezz\`e Introduction to the special section from
the ACM international symposium on
software testing and analysis (ISSTA
2006) . . . . . . . . . . . . . . . . . 6:1--6:??
Jamieson M. Cobleigh and
George S. Avrunin and
Lori A. Clarke Breaking up is hard to do: an evaluation
of automated assume-guarantee reasoning 7:1--7:??
Christoph Csallner and
Yannis Smaragdakis and
Tao Xie DSD-Crasher: a hybrid analysis tool for
bug finding . . . . . . . . . . . . . . 8:1--8:??
Stephen J. Fink and
Eran Yahav and
Nurit Dor and
G. Ramalingam and
Emmanuel Geay Effective typestate verification in the
presence of aliasing . . . . . . . . . . 9:1--9:??
Stephen F. Siegel and
Anastasia Mironova and
George S. Avrunin and
Lori A. Clarke Combining symbolic execution with model
checking to verify parallel numerical
programs . . . . . . . . . . . . . . . . 10:1--10:??
Amrit Tiwana Impact of classes of development
coordination tools on software
development performance: a multinational
empirical study . . . . . . . . . . . . 11:1--11:??
David Notkin Editorial . . . . . . . . . . . . . . . 12:1--12:??
Parastoo Mohagheghi and
Reidar Conradi An empirical investigation of software
reuse benefits in a large telecom
product . . . . . . . . . . . . . . . . 13:1--13:??
Johannes Henkel and
Christoph Reichenbach and
Amer Diwan Developing and debugging algebraic
specifications for Java classes . . . . 14:1--14:??
Cigdem Gencel and
Onur Demirors Functional size measurement revisited 15:1--15:??
Tsong Yueh Chen and
Robert Merkel An upper bound on software testing
effectiveness . . . . . . . . . . . . . 16:1--16:??
Pankaj Jalote and
Brendan Murphy and
Vibhu Saujanya Sharma Post-release reliability growth in
software products . . . . . . . . . . . 17:1--17:??
Martin P. Robillard Topology analysis of software
dependencies . . . . . . . . . . . . . . 18:1--18:??
Wolfgang Emmerich and
Mikio Aoyama and
Joe Sventek The impact of research on the
development of middleware technology . . 19:1--19:??
Tanja M. Gruschke and
Magne Jòrgensen The role of outcome feedback in
improving the uncertainty assessment of
software development effort estimates 20:1--20:??
Marcel R. Karam and
Trevor J. Smedley and
Sergiu M. Dascalu Unit-level test adequacy criteria for
visual dataflow languages and a testing
methodology . . . . . . . . . . . . . . 1:1--1:??
Panagiotis Louridas and
Diomidis Spinellis and
Vasileios Vlachos Power laws in software . . . . . . . . . 2:1--2:??
Ond\vrej Lhoták and
Laurie Hendren Evaluating the benefits of
context-sensitive points-to analysis
using a BDD-based implementation . . . . 3:1--3:??
Atif M. Memon Automatically repairing event
sequence-based GUI test suites for
regression testing . . . . . . . . . . . 4:1--4:??
Travis D. Breaux and
Annie I. Antón and
Jon Doyle Semantic parameterization: a process for
modeling domain descriptions . . . . . . 5:1--5:??
Shan Shan Huang and
David Zook and
Yannis Smaragdakis Domain-specific languages and program
generation with meta-AspectJ . . . . . . 6:1--6:??
Qing Xie and
Atif M. Memon Using a pilot study to derive a GUI
model for automated testing . . . . . . 7:1--7:??
David Notkin Editorial . . . . . . . . . . . . . . . 8:1--8:??
Lujo Bauer and
Jay Ligatti and
David Walker Composing expressive runtime security
policies . . . . . . . . . . . . . . . . 9:1--9:??
Tracy Hall and
Nathan Baddoo and
Sarah Beecham and
Hugh Robinson and
Helen Sharp A systematic review of theory use in
studies investigating the motivations of
software engineers . . . . . . . . . . . 10:1--10:??
Phil McMinn and
David Binkley and
Mark Harman Empirical evaluation of a nesting
testability transformation for
evolutionary testing . . . . . . . . . . 11:1--11:??
Dick Hamlet Tools and experiments supporting a
testing-based theory of component
composition . . . . . . . . . . . . . . 12:1--12:??
Ankit Goel and
Abhik Roychoudhury and
P. S. Thiagarajan Interacting process classes . . . . . . 13:1--13:??
Robert M. Hierons Verdict functions in testing with a
fault domain or test hypotheses . . . . 14:1--14:??
Marco Mamei and
Franco Zambonelli Programming pervasive and mobile
computing applications: The TOTA
approach . . . . . . . . . . . . . . . . 15:1--15:??
Eli Tilevich and
Yannis Smaragdakis J-Orchestra: Enhancing Java programs
with distribution capabilities . . . . . 1:1--1:??
Chun Ouyang and
Marlon Dumas and
Wil M. P. Van Der Aalst and
Arthur H. M. Ter Hofstede and
Jan Mendling From business process models to
process-oriented software systems . . . 2:1--2:??
Hridesh Rajan and
Kevin J. Sullivan Unifying aspect- and object-oriented
design . . . . . . . . . . . . . . . . . 3:1--3:??
Hee Beng Kuan Tan and
Yuan Zhao and
Hongyu Zhang Conceptual data model-based software
size estimation for information systems 4:1--4:??
Wes Masri and
Andy Podgurski Measuring the strength of information
flows in programs . . . . . . . . . . . 5:1--5:??
Nirmit Desai and
Amit K. Chopra and
Munindar P. Singh Amoeba: a methodology for modeling and
evolving cross-organizational business
processes . . . . . . . . . . . . . . . 6:1--6:??
David Notkin Editorial . . . . . . . . . . . . . . . 7:1--7:??
Jon Whittle and
Praveen K. Jayaraman Synthesizing hierarchical state machines
from expressive scenario descriptions 8:1--8:??
Chang Xu and
S. C. Cheung and
W. K. Chan and
Chunyang Ye Partial constraint checking for context
consistency in pervasive computing . . . 9:1--9:??
Antonio Brogi and
Razvan Popescu and
Matteo Tanca Design and implementation of Sator: a
Web service aggregator . . . . . . . . . 10:1--10:??
Julien Ponge and
Boualem Benatallah and
Fabio Casati and
Farouk Toumani Analysis and applications of timed
service protocols . . . . . . . . . . . 11:1--11:??
Jamie Payton and
Christine Julien and
Gruia-Catalin Roman and
Vasanth Rajamani Semantic self-assessment of query
results in dynamic environments . . . . 12:1--12:??
Chunqing Chen and
Jin Song Dong and
Jun Sun and
Andrew Martin A verification system for interval-based
specification languages . . . . . . . . 13:1--13:??
Friedrich Steimann and
Thomas Pawlitzki and
Sven Apel and
Christian Kästner Types and modularity for implicit
invocation with implicit announcement 1:1--1:??
Kieran Conboy and
Brian Fitzgerald Method and developer characteristics for
effective agile method tailoring: a
study of XP expert opinion . . . . . . . 2:1--2:??
Ekwa Duala-Ekoko and
Martin P. Robillard Clone region descriptors: Representing
and tracking duplication in source code 3:1--3:??
Andrew J. Ko and
Brad A. Myers Extracting and answering why and why not
questions about Java program output . . 4:1--4:??
Kevin Sullivan and
William G. Griswold and
Hridesh Rajan and
Yuanyuan Song and
Yuanfang Cai and
Macneil Shonle and
Nishit Tewari Modular aspect-oriented design with XPIs 5:1--5:??
Param Vir Singh The small-world effect: The influence of
macro-level properties of developer
collaboration networks on open-source
project success . . . . . . . . . . . . 6:1--6:??
Robert Dyer and
Hridesh Rajan Supporting dynamic aspect-oriented
features . . . . . . . . . . . . . . . . 7:1--7:??
Simon Miles and
Paul Groth and
Steve Munroe and
Luc Moreau PrIMe: a methodology for developing
provenance-aware applications . . . . . 8:1--8:??
Jinjun Chen and
Yun Yang Temporal dependency-based checkpoint
selection for dynamic verification of
temporal constraints in scientific
workflow systems . . . . . . . . . . . . 9:1--9:??
John Anvik and
Gail C. Murphy Reducing the effort of bug report
triage: Recommenders for
development-oriented decisions . . . . . 10:1--10:??
Lee Naish and
Hua Jie Lee and
Kotagiri Ramamohanarao A model for spectra-based software
diagnosis . . . . . . . . . . . . . . . 11:1--11:??
David W. Binkley and
Mark Harman and
Kiran Lakhotia FlagRemover: a testability
transformation for transforming
loop-assigned flags . . . . . . . . . . 12:1--12:??
Zhenyu Chen and
Tsong Yueh Chen and
Baowen Xu A revisit of fault class hierarchies in
general Boolean specifications . . . . . 13:1--13:??
Andreas Bauer and
Martin Leucker and
Christian Schallhart Runtime Verification for LTL and TLTL 14:1--14:??
Changhai Nie and
Hareton Leung The Minimal Failure-Causing Schema of
Combinatorial Testing . . . . . . . . . 15:1--15:??
R. A. Gandhi and
S. W. Lee Discovering Multidimensional
Correlations among Regulatory
Requirements to Understand Risk . . . . 16:1--16:??
Josh Dehlinger and
Robyn R. Lutz Gaia-PL: a Product Line Engineering
Approach for Efficiently Designing
Multiagent Systems . . . . . . . . . . . 17:1--17:??
Shahar Maoz and
David Harel and
Asaf Kleinbort A Compiler for Multimodal Scenarios:
Transforming LSCs into AspectJ . . . . . 18:1--18:??
Barthélémy Dagenais and
Martin P. Robillard Recommending Adaptive Changes for
Framework Evolution . . . . . . . . . . 19:1--19:??
Ali Ebnenasir and
Sandeep S. Kulkarni Feasibility of Stepwise Design of
Multitolerant Programs . . . . . . . . . 1:1--1:??
Matthew Arnold and
Martin Vechev and
Eran Yahav QVM: An Efficient Runtime for Detecting
Defects in Deployed Systems . . . . . . 2:1--2:??
Eli Tilevich and
Sriram Gopal Expressive and Extensible Parameter
Passing for Distributed Object Systems 3:1--3:??
Susan Elliott Sim and
Medha Umarji and
Sukanya Ratanotayanon and
Cristina V. Lopes How Well Do Search Engines Support Code
Retrieval on the Web? . . . . . . . . . 4:1--4:??
Madeline M. Diep and
Matthew B. Dwyer and
Sebastian Elbaum Lattice-Based Sampling for Path Property
Monitoring . . . . . . . . . . . . . . . 5:1--5:??
Martin Erwig and
Eric Walkingshaw The Choice Calculus: a Representation
for Software Variation . . . . . . . . . 6:1--6:??
David Notkin Editorial . . . . . . . . . . . . . . . 7:1--7:??
Jehad Al Dallal and
Lionel C. Briand A Precise Method-Method
Interaction-Based Cohesion Metric for
Object-Oriented Classes . . . . . . . . 8:1--8:??
Dario Fischbein and
Nicolas D'Ippolito and
Greg Brunet and
Marsha Chechik and
Sebastian Uchitel Weak Alphabet Merging of Partial
Behavior Models . . . . . . . . . . . . 9:1--9:??
Anders Mattsson and
Brian Fitzgerald and
Björn Lundell and
Brian Lings An Approach for Modeling Architectural
Design Rules in UML and its Application
to Embedded Software . . . . . . . . . . 10:1--10:??
Devdatta Kulkarni and
Tanvir Ahmed and
Anand Tripathi A Generative Programming Framework for
Context-Aware CSCW Applications . . . . 11:1--11:??
Abhik Roychoudhury and
Ankit Goel and
Bikram Sengupta Symbolic Message Sequence Charts . . . . 12:1--12:??
Anna Queralt and
Ernest Teniente Verification and Validation of UML
Conceptual Schemas with OCL Constraints 13:1--13:??
Christian Kästner and
Sven Apel and
Thomas Thüm and
Gunter Saake Type checking annotation-based product
lines . . . . . . . . . . . . . . . . . 14:1--14:??
Macneil Shonle and
William G. Griswold and
Sorin Lerner A framework for the checking and
refactoring of crosscutting concepts . . 15:1--15:??
Alessandro Fantechi and
Stefania Gnesi and
Alessandro Lapadula and
Franco Mazzanti and
Rosario Pugliese and
Francesco Tiezzi A logical verification methodology for
service-oriented computing . . . . . . . 16:1--16:??
Jaymie Strecker and
Atif M. Memon Accounting for defect characteristics in
evaluations of testing techniques . . . 17:1--17:??
Paul Jennings and
Arka P. Ghosh and
Samik Basu A two-phase approximation for model
checking probabilistic unbounded until
properties of probabilistic systems . . 18:1--18:??
Dawei Qi and
Abhik Roychoudhury and
Zhenkai Liang and
Kapil Vaswani DARWIN: an approach to debugging
evolving programs . . . . . . . . . . . 19:1--19:??
Reid Holmes and
Robert J. Walker Systematizing pragmatic software reuse 20:1--20:??
Yuanfang Cai and
Kevin Sullivan A formal model for automated software
modularity and evolvability analysis . . 21:1--21:??
Alessandro Cimatti and
Marco Roveri and
Angelo Susi and
Stefano Tonetta Validation of requirements for hybrid
systems: a formal approach . . . . . . . 22:1--22:??
Denys Poshyvanyk and
Malcom Gethers and
Andrian Marcus Concept location using formal concept
analysis and information retrieval . . . 23:1--23:??
Andrew Meneely and
Ben Smith and
Laurie Williams Validating software metrics: a spectrum
of philosophies . . . . . . . . . . . . 24:1--24:??
Adam Kiezun and
Vijay Ganesh and
Shay Artzi and
Philip J. Guo and
Pieter Hooimeijer and
Michael D. Ernst HAMPI: a solver for word equations over
strings, regular expressions, and
context-free grammars . . . . . . . . . 25:1--25:??
David Notkin Editorial --- looking back . . . . . . . 1:1--1:??
David S. Rosenblum Editorial --- looking forward . . . . . 2:1--2:??
Jun Sun and
Yang Liu and
Jin Song Dong and
Yan Liu and
Ling Shi and
Étienne André Modeling and verifying hierarchical
real-time systems using stateful timed
CSP . . . . . . . . . . . . . . . . . . 3:1--3:??
Brian Demsky and
Patrick Lam Views: Synthesizing fine-grained
concurrency control . . . . . . . . . . 4:1--4:??
Tao Yue and
Lionel C. Briand and
Yvan Labiche Facilitating the transition from use
case models to analysis models: Approach
and experiments . . . . . . . . . . . . 5:1--5:??
Hadi Hemmati and
Andrea Arcuri and
Lionel Briand Achieving scalable model-based testing
through test case diversity . . . . . . 6:1--6:??
Martin Monperrus and
Mira Mezini Detecting missing method calls as
violations of the majority rule . . . . 7:1--7:??
Jeff Huang and
Jinguo Zhou and
Charles Zhang Scaling predictive analysis of
concurrent programs by removing trace
redundancy . . . . . . . . . . . . . . . 8:1--8:??
Nicolás D'ippolito and
Victor Braberman and
Nir Piterman and
Sebastián Uchitel Synthesizing nonanomalous event-based
controllers for liveness goals . . . . . 9:1--9:??
Wei Zhang and
Chong Sun and
Junghee Lim and
Shan Lu and
Thomas Reps ConMem: Detecting Crash-Triggering
Concurrency Bugs through an
Effect-Oriented Approach . . . . . . . . 10:1--10:??
Marcello La Rosa and
Marlon Dumas and
Reina Uba and
Remco Dijkman Business Process Model Merging: An
Approach to Business Process
Consolidation . . . . . . . . . . . . . 11:1--11:??
Zibin Zheng and
Michael R. Lyu Personalized Reliability Prediction of
Web Services . . . . . . . . . . . . . . 12:1--12:??
Neil Walkinshaw and
Kirill Bogdanov Automated Comparison of State-Based
Software Models in Terms of Their
Language and Structure . . . . . . . . . 13:1--13:??
Scott D. Fleming and
Chris Scaffidi and
David Piorkowski and
Margaret Burnett and
Rachel Bellamy and
Joseph Lawrance and
Irwin Kwan An Information Foraging Theory
Perspective on Tools for Debugging,
Refactoring, and Reuse Tasks . . . . . . 14:1--14:??
Sagar Chaki and
Christian Schallhart and
Helmut Veith Verification across Intellectual
Property Boundaries . . . . . . . . . . 15:1--15:??
David S. Rosenblum In memoriam: David Notkin (1955--2013) 16:1--16:??
Guoqing Xu and
Atanas Rountev Precise memory leak detection for Java
software using container profiling . . . 17:1--17:??
Wei Le and
Mary Lou Soffa Marple: Detecting faults in path
segments using automatically generated
analyses . . . . . . . . . . . . . . . . 18:1--18:??
Shin Yoo and
Mark Harman and
David Clark Fault localization prioritization:
Comparing information-theoretic and
coverage-based approaches . . . . . . . 19:1--19:??
Matteo Pradella and
Angelo Morzenti and
Pierluigi San Pietro Bounded satisfiability checking of
metric temporal logic specifications . . 20:1--20:??
Davide Falessi and
Lionel C. Briand and
Giovanni Cantone and
Rafael Capilla and
Philippe Kruchten The value of design rationale
information . . . . . . . . . . . . . . 21:1--21:??
Kevin Hoffman and
Patrick Eugster Trading obliviousness for modularity
with cooperative aspect-oriented
programming . . . . . . . . . . . . . . 22:1--22:??
Hong Zhu and
Ian Bayley An algebra of design patterns . . . . . 23:1--23:??
Mira Balaban and
Azzam Maraee Finite satisfiability of UML class
diagrams with constrained class
hierarchy . . . . . . . . . . . . . . . 24:1--24:??
Guido De Caso and
Victor Braberman and
Diego Garbervetsky and
Sebastian Uchitel Enabledness-based program abstractions
for behavior validation . . . . . . . . 25:1--25:??
Beatriz Marín and
Giovanni Giachetti and
Oscar Pastor and
Tanja E. J. Vos and
Alain Abran Using a functional size measurement
procedure to evaluate the quality of
models in MDD environments . . . . . . . 26:1--26:??
Daniel Sinnig and
Patrice Chalin and
Ferhat Khendek Use case and task models: an integrated
development methodology and its formal
foundation . . . . . . . . . . . . . . . 27:1--27:??
Giovanni Denaro and
Mauro Pezz\`e and
Davide Tosi Test-and-adapt: an approach for
improving service interchangeability . . 28:1--28:??
Lorenzo Martignoni and
Roberto Paleari and
Alessandro Reina and
Giampaolo Fresi Roglia and
Danilo Bruschi A methodology for testing CPU emulators 29:1--29:??
Hervé Chang and
Leonardo Mariani and
Mauro Pezz\`e Exception handlers for healing
component-based systems . . . . . . . . 30:1--30:??
Xiaoyuan Xie and
Tsong Yueh Chen and
Fei-Ching Kuo and
Baowen Xu A theoretical analysis of the risk
evaluation formulas for spectrum-based
fault localization . . . . . . . . . . . 31:1--31:??
Dawei Qi and
Hoang D. T. Nguyen and
Abhik Roychoudhury Path exploration based on symbolic
output . . . . . . . . . . . . . . . . . 32:1--32:??
Takaaki Tateishi and
Marco Pistoia and
Omer Tripp Path- and index-sensitive string
analysis based on monadic second-order
logic . . . . . . . . . . . . . . . . . 33:1--33:??
Jérôme Vouillon and
Roberto Di Cosmo On software component co-installability 34:1--34:??
Leandro L. Minku and
Xin Yao Software effort estimation as a
multiobjective learning problem . . . . 35:1--35:??
David Lizcano and
Fernando Alonso and
Javier Soriano and
Genoveva Lopez A web-centred approach to end-user
software engineering . . . . . . . . . . 36:1--36:??
Collin Mcmillan and
Denys Poshyvanyk and
Mark Grechanik and
Qing Xie and
Chen Fu Portfolio: Searching for relevant
functions and their usages in millions
of lines of code . . . . . . . . . . . . 37:1--37:??
Michael Würsch and
Emanuel Giger and
Harald C. Gall Evaluating a query framework for
software evolution data . . . . . . . . 38:1--38:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 1:1--1:??
Robrecht Haesevoets and
Danny Weyns and
Tom Holvoet Architecture-centric support for
adaptive service collaborations . . . . 2:1--2:??
Andrew F. Tappenden and
James Miller Automated cookie collection testing . . 3:1--3:??
Gabriele Bavota and
Malcom Gethers and
Rocco Oliveto and
Denys Poshyvanyk and
Andrea de Lucia Improving software modularization via
automated analysis of latent topics and
dependencies . . . . . . . . . . . . . . 4:1--4:??
Xiao Liu and
Yun Yang and
Dong Yuan and
Jinjun Chen Do we need to handle every temporal
violation in scientific workflow
systems? . . . . . . . . . . . . . . . . 5:1--5:??
Federico Mari and
Igor Melatti and
Ivano Salvo and
Enrico Tronci Model-based synthesis of control
software from system-level formal
specifications . . . . . . . . . . . . . 6:1--6:??
Eric Bodden and
Éric Tanter and
Milton Inostroza Join point interfaces for safe and
flexible decoupling of aspects . . . . . 7:1--7:??
Wes Masri and
Rawad Abou Assi Prevalence of coincidental correctness
and mitigation of its impact on fault
localization . . . . . . . . . . . . . . 8:1--8:??
Lionel Briand and
Davide Falessi and
Shiva Nejati and
Mehrdad Sabetzadeh and
Tao Yue Traceability and SysML design slices to
support safety inspections: a controlled
experiment . . . . . . . . . . . . . . . 9:1--9:??
Yuming Zhou and
Baowen Xu and
Hareton Leung and
Lin Chen An in-depth study of the potentially
confounding effect of class size in
fault prediction . . . . . . . . . . . . 10:1--10:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 11:1--11:??
Kai Pan and
Xintao Wu and
Tao Xie Guided test generation for database
applications via synthesized database
interactions . . . . . . . . . . . . . . 12:1--12:??
Giuseppe Scanniello and
Carmine Gravino and
Marcela Genero and
Jose' A. Cruz-Lemus and
Genoveffa Tortora On the impact of UML analysis models on
source-code comprehensibility and
modifiability . . . . . . . . . . . . . 13:1--13:??
Thomas Fritz and
Gail C. Murphy and
Emerson Murphy-Hill and
Jingwen Ou and
Emily Hill Degree-of-knowledge: Modeling a
developer's knowledge of code . . . . . 14:1--14:??
Lunjin Lu and
Dae-Kyoo Kim Required behavior of sequence diagrams:
Semantics and conformance . . . . . . . 15:1--15:??
M. Unterkalmsteiner and
R. Feldt and
T. Gorschek A taxonomy for requirements engineering
and software test alignment . . . . . . 16:1--16:??
Dharmalingam Ganesan and
Mikael Lindvall ADAM: External dependency-driven
architecture discovery and analysis of
quality attributes . . . . . . . . . . . 17:1--17:??
Klaas-Jan Stol and
Paris Avgeriou and
Muhammad Ali Babar and
Yan Lucas and
Brian Fitzgerald Key factors for adopting inner source 18:1--18:??
Mark Harman and
Jens Krinke and
Inmaculada Medina-Bulo and
Francisco Palomo-Lozano and
Jian Ren and
Shin Yoo Exact scalable sensitivity analysis for
the next release problem . . . . . . . . 19:1--19:??
Mariano M. Moscato and
Carlos G. Lopez Pombo and
Marcelo F. Frias Dynamite: a tool for the verification of
alloy models based on PVS . . . . . . . 20:1--20:??
Mainul Islam and
Christoph Csallner Generating Test Cases for Programs that
Are Coded against Interfaces and
Annotations . . . . . . . . . . . . . . 21:1--21:??
Lucas Layman and
Victor R. Basili and
Marvin V. Zelkowitz A Methodology for Exposing Risk in
Achieving Emergent System Properties . . 22:1--22:??
Guoqing Xu and
Nick Mitchell and
Matthew Arnold and
Atanas Rountev and
Edith Schonberg and
Gary Sevitsky Scalable Runtime Bloat Detection Using
Abstract Dynamic Slicing . . . . . . . . 23:1--23:??
Nicoletta de Francesco and
Giuseppe Lettieri and
Antonella Santone and
Gigliola Vaglini GreASE: a Tool for Efficient
``Nonequivalence'' Checking . . . . . . 24:1--24:??
Razieh Behjati and
Shiva Nejati and
Lionel C. Briand Architecture-Level Configuration of
Large-Scale Embedded Software Systems 25:1--25:??
Kathryn T. Stolee and
Sebastian Elbaum and
Daniel Dobos Solving the Search for Source Code . . . 26:1--26:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 27:1--27:??
Gail C. Murphy and
Mauro Pezzé Introduction to the Special Issue
International Conference on Software
Engineering (ICSE 2012) . . . . . . . . 28:1--28:??
Anders Mòller and
Mathias Schwarz Automated Detection of Client-State
Manipulation Vulnerabilities . . . . . . 29:1--29:??
Thanhvu Nguyen and
Deepak Kapur and
Westley Weimer and
Stephanie Forrest DIG: a Dynamic Invariant Generator for
Polynomial and Array Invariants . . . . 30:1--30:??
Walid Maalej and
Rebecca Tiarks and
Tobias Roehm and
Rainer Koschke On the Comprehension of Program
Comprehension . . . . . . . . . . . . . 31:1--31:??
Pingyu Zhang and
Sebastian Elbaum Amplifying Tests to Validate Exception
Handling Code: an Extended Study in the
Mobile Application Domain . . . . . . . 32:1--32:??
Tracy Hall and
Min Zhang and
David Bowes and
Yi Sun Some Code Smells Have a Significant but
Small Effect on Faults . . . . . . . . . 33:1--33:??
Yueqi Li and
S. C. Cheung and
Xiangyu Zhang and
Yepang Liu Scaling Up Symbolic Analysis by Removing
$z$-Equivalent States . . . . . . . . . 34:1--34:??
Peter C. Rigby and
Daniel M. German and
Laura Cowen and
Margaret-Anne Storey Peer Review on Open-Source Software
Projects: Parameters, Statistical
Models, and Theory . . . . . . . . . . . 35:1--35:??
Filippo Ricca and
Giuseppe Scanniello and
Marco Torchiano and
Gianna Reggio and
Egidio Astesiano Assessing the Effect of Screen Mockups
on the Comprehension of Functional
Requirements . . . . . . . . . . . . . . 1:1--1:??
Richard Banach and
Huibiao Zhu and
Wen Su and
Xiaofeng Wu A Continuous ASM Modelling Approach to
Pacemaker Sensing . . . . . . . . . . . 2:1--2:??
Guowei Yang and
Suzette Person and
Neha Rungta and
Sarfraz Khurshid Directed Incremental Symbolic Execution 3:1--3:??
Anirudh Santhiar and
Omesh Pandita and
Aditya Kanade Mining Unit Tests for Discovery and
Migration of Math APIs . . . . . . . . . 4:1--4:??
Robert M. Hierons Combining Centralised and Distributed
Testing . . . . . . . . . . . . . . . . 5:1--5:??
Dilan Sahin and
Marouane Kessentini and
Slim Bechikh and
Kalyanmoy Deb Code-Smell Detection as a Bilevel
Problem . . . . . . . . . . . . . . . . 6:1--6:??
Kaituo Li and
Christoph Reichenbach and
Christoph Csallner and
Yannis Smaragdakis Residual Investigation: Predictive and
Precise Bug Detection . . . . . . . . . 7:1--7:??
Gordon Fraser and
Andrea Arcuri A Large-Scale Evaluation of Automated
Unit Test Generation Using EvoSuite . . 8:1--8:??
Warda El Kholy and
Jamal Bentahar and
Mohamed El Menshawy and
Hongyang Qu and
Rachida Dssouli Conditional Commitments: Reasoning and
Model Checking . . . . . . . . . . . . . 9:1--9:??
Dan Hao and
Lingming Zhang and
Lu Zhang and
Gregg Rothermel and
Hong Mei A Unified Test Case Prioritization
Approach . . . . . . . . . . . . . . . . 10:1--10:??
Hassan Eldib and
Chao Wang and
Patrick Schaumont Formal Verification of Software
Countermeasures against Side-Channel
Attacks . . . . . . . . . . . . . . . . 11:1--11:??
Juan De Lara and
Esther Guerra and
Jesús Sánchez Cuadrado When and How to Use Multilevel Modelling 12:1--12:??
Tao Yue and
Lionel C. Briand and
Yvan Labiche aToucan: an Automated Framework to
Derive UML Analysis Models from Use Case
Models . . . . . . . . . . . . . . . . . 13:1--13:??
Giuseppe Scanniello and
Carmine Gravino and
Michele Risi and
Genoveffa Tortora and
Gabriella Dodero Documenting Design-Pattern Instances: a
Family of Experiments on Source-Code
Comprehensibility . . . . . . . . . . . 14:1--14:??
Elena Sherman and
Brady J. Garvin and
Matthew B. Dwyer Deciding Type-Based Partial-Order
Constraints for Path-Sensitive Analysis 15:1--15:??
Antonio Carzaniga and
Alessandra Gorla and
Nicol\`o Perino and
Mauro Pezz\`e Automatic Workarounds: Exploiting the
Intrinsic Redundancy of Web Applications 16:1--16:??
Wiem Mkaouer and
Marouane Kessentini and
Adnan Shaout and
Patrice Koligheu and
Slim Bechikh and
Kalyanmoy Deb and
Ali Ouni Many-Objective Software Remodularization
Using NSGA-III . . . . . . . . . . . . . 17:1--17:??
Jooyong Yi and
Dawei Qi and
Shin Hwei Tan and
Abhik Roychoudhury Software Change Contracts . . . . . . . 18:1--18:??
Pradeep K. Murukannaiah and
Munindar P. Singh Platys: an Active Learning Framework for
Place-Aware Application Development and
Its Evaluation . . . . . . . . . . . . . 19:1--19:??
Peter A. Whigham and
Caitlin A. Owen and
Stephen G. Macdonell A Baseline Model for Software Effort
Estimation . . . . . . . . . . . . . . . 20:1--20:??
Mark Harman and
Mauro Pezzé Introduction to the Special Issue on
ISSTA 2013 . . . . . . . . . . . . . . . 21:1--21:??
Milos Gligoric and
Alex Groce and
Chaoqiang Zhang and
Rohan Sharma and
Mohammad Amin Alipour and
Darko Marinov Guidelines for Coverage-Based
Comparisons of Non-Adequate Test Suites 22:1--22:??
Gordon Fraser and
Matt Staats and
Phil McMinn and
Andrea Arcuri and
Frank Padberg Does Automated Unit Test Generation
Really Help Software Testers? A
Controlled Empirical Study . . . . . . . 23:1--23:??
Cosmin Radoi and
Danny Dig Effective Techniques for Static Race
Detection in Java Parallel Loops . . . . 24:1--24:??
Jaideep Nijjar and
Ivan Boci\'c and
Tevfik Bultan Data Model Property Inference,
Verification, and Repair for Web
Applications . . . . . . . . . . . . . . 25:1--25:??
Wei Jin and
Alessandro Orso Automated Support for Reproducing and
Debugging Field Failures . . . . . . . . 26:1--26:??
Matthew B. Dwyer and
David S. Rosenblum Editorial: Journal-First Publication for
the Software Engineering Community . . . 1:1--1:??
Will Dietz and
Peng Li and
John Regehr and
Vikram Adve Understanding Integer Overflow in C/C++ 2:1--2:29
Sebastian Proksch and
Johannes Lerch and
Mira Mezini Intelligent Code Completion with
Bayesian Networks . . . . . . . . . . . 3:1--3:??
Stefano Di Alesio and
Lionel C. Briand and
Shiva Nejati and
Arnaud Gotlieb Combining Genetic Algorithms and
Constraint Programming to Support Stress
Testing of Task Deadlines . . . . . . . 4:1--4:??
Mariano Ceccato and
Alessandro Marchetto and
Leonardo Mariani and
Cu D. Nguyen and
Paolo Tonella Do Automatically Generated Test Cases
Make Debugging Easier? An Experimental
Assessment of Debugging Effectiveness
and Efficiency . . . . . . . . . . . . . 5:1--5:??
Seyedeh Sepideh Emam and
James Miller Test Case Prioritization Using Extended
Digraphs . . . . . . . . . . . . . . . . 6:1--6:??
Robert Dyer and
Hoan Anh Nguyen and
Hridesh Rajan and
Tien N. Nguyen Boa: Ultra-Large-Scale Software
Repository and Source-Code Mining . . . 7:1--7:??
Phil Mcminn and
Chris J. Wright and
Gregory M. Kapfhammer The Effectiveness of Test Coverage
Criteria for Relational Database Schema
Integrity Constraints . . . . . . . . . 8:1--8:??
Karim Ali and
Marianna Rapoport and
Ondrej Lhoták and
Julian Dolby and
Frank Tip Type-Based Call Graph Construction
Algorithms for Scala . . . . . . . . . . 9:1--9:??
Anas Mahmoud and
Gary Bradshaw Estimating Semantic Relatedness in
Source Code . . . . . . . . . . . . . . 10:1--10:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 11:1--11:??
Saba Alimadadi and
Sheldon Sequeira and
Ali Mesbah and
Karthik Pattabiraman Understanding JavaScript Event-Based
Interactions with Clematis . . . . . . . 12:1--12:??
Minghui Zhou and
Audris Mockus and
Xiujuan Ma and
Lu Zhang and
Hong Mei Inflow and Retention in OSS Communities
with Commercial Involvement: a Case
Study of Three Hybrid Projects . . . . . 13:1--13:??
Nuno Machado and
Daniel Quinta and
Brandon Lucia and
Luís Rodrigues Concurrency Debugging with Differential
Schedule Projections . . . . . . . . . . 14:1--14:??
Petr Bauch and
Vojtech Havel and
Jirí Barnat Control Explicit-Data Symbolic Model
Checking . . . . . . . . . . . . . . . . 15:1--15:??
Esteban Pavese and
Víctor Braberman and
Sebastian Uchitel Less is More: Estimating Probabilistic
Rewards over Partial System Explorations 16:1--16:??
Robert M. Hierons and
Miqing Li and
Xiaohui Liu and
Sergio Segura and
Wei Zheng SIP: Optimal Product Selection from
Feature Models Using Many-Objective
Evolutionary Optimization . . . . . . . 17:1--17:??
Haipeng Cai and
Raul Santelices and
Douglas Thain DiaPro: Unifying Dynamic Impact Analyses
for Improved and Variable
Cost-Effectiveness . . . . . . . . . . . 18:1--18:??
Kapil Anand and
Khaled Elwazeer and
Aparna Kotha and
Matthew Smithson and
Rajeev Barua and
Angelos Keromytis A Stack Memory Abstraction and Symbolic
Analysis Framework for Executables . . . 19:1--19:??
Islem Baki and
Houari Sahraoui Multi-Step Learning and Adaptive Search
for Learning Complex Model
Transformations from Examples . . . . . 20:1--20:??
Fei He and
Xiaowei Gao and
Miaofei Wang and
Bow-Yaw Wang and
Lijun Zhang Learning Weighted Assumptions for
Compositional Verification of Markov
Decision Processes . . . . . . . . . . . 21:1--21:??
Jaspreet Bhatia and
Travis D. Breaux and
Florian Schaub Mining Privacy Goals from Privacy
Policies Using Hybridized Task
Recomposition . . . . . . . . . . . . . 22:1--22:??
Ali Ouni and
Marouane Kessentini and
Houari Sahraoui and
Katsuro Inoue and
Kalyanmoy Deb Multi-Criteria Code Refactoring Using
Search-Based Software Engineering: an
Industrial Case Study . . . . . . . . . 23:1--23:??
Ivan Candela and
Gabriele Bavota and
Barbara Russo and
Rocco Oliveto Using Cohesion and Coupling for Software
Remodularization: Is It Enough? . . . . 24:1--24:??
Gregory Gay and
Ajitha Rajan and
Matt Staats and
Michael Whalen and
Mats P. E. Heimdahl The Effect of Program and Model
Structure on the Effectiveness of MC/DC
Test Adequacy Coverage . . . . . . . . . 25:1--25:??
Ricardo M. Czekster and
Paulo Fernandes and
Lucelene Lopes and
Afonso Sales and
Alan R. Santos and
Thais Webber Stochastic Performance Analysis of
Global Software Development Teams . . . 26:1--26:??
Chunbai Yang and
Shangru Wu and
W. K. Chan Hierarchical Program Paths . . . . . . . 27:1--27:??
Artem Polyvyanyy and
Wil M. P. Van Der Aalst and
Arthur H. M. Ter Hofstede and
Moe T. Wynn Impact-Driven Process Model Repair . . . 28:1--28:??
Shams Azad and
Peter C. Rigby and
Latifa Guerrouj Generating API Call Rules from Version
History and Stack Overflow Posts . . . . 29:1--29:??
Vijay Krishna Palepu and
Guoqing Xu and
James A. Jones Dynamic Dependence Summaries . . . . . . 30:1--30:??
Juan De Lara and
Esther Guerra A Posteriori Typing for Model-Driven
Engineering: Concepts, Analysis, and
Applications . . . . . . . . . . . . . . 31:1--31:??
Daniel Di Nardo and
Fabrizio Pastore and
Lionel Briand Augmenting Field Data for Testing
Systems Subject to Incremental
Requirements Changes . . . . . . . . . . 1:1--1:??
Alireza Sadeghi and
Naeem Esfahani and
Sam Malek Ensuring the Consistency of Adaptation
through Inter- and Intra-Component
Dependency Analysis . . . . . . . . . . 2:1--2:??
Chris Mills and
Gabriele Bavota and
Sonia Haiduc and
Rocco Oliveto and
Andrian Marcus and
Andrea De Lucia Predicting Query Quality for
Applications of Text Retrieval to
Software Engineering Tasks . . . . . . . 3:1--3:??
Shin Yoo and
Xiaoyuan Xie and
Fei-Ching Kuo and
Tsong Yueh Chen and
Mark Harman Human Competitiveness of Genetic
Programming in Spectrum-Based Fault
Localisation: Theoretical and Empirical
Analysis . . . . . . . . . . . . . . . . 4:1--4:??
Robert M. Hierons and
Uraz Cengiz Türker Parallel Algorithms for Generating
Distinguishing Sequences for Observable
Non-deterministic FSMs . . . . . . . . . 5:1--5:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 6:1--6:??
Giuseppe Scanniello and
Michele Risi and
Porfirio Tramontana and
Simone Romano Fixing Faults in C and Java Source Code:
Abbreviated vs. Full-Word Identifier
Names . . . . . . . . . . . . . . . . . 6:1--6:??
Luciano Baresi and
Angelo Morzenti and
Alfredo Motta and
Mohammad Mehdi Pourhashem K. and
Matteo Rossi A Logic-Based Approach for the
Verification of UML Timed Models . . . . 7:1--7:??
Chris Karanikolas and
Grigoris Dimitroulakos and
Konstantinos Masselos Early Evaluation of Implementation
Alternatives of Composite Data
Structures Toward Maintainability . . . 8:1--8:??
Paul C. Attie and
Saddek Bensalem and
Marius Bozga and
Mohamad Jaber and
Joseph Sifakis and
Fadi A. Zaraket Global and Local Deadlock Freedom in BIP 9:1--9:??
Iago Abal and
Jean Melo and
Stefan Stanciulescu and
Claus Brabrand and
Márcio Ribeiro and
Andrzej Wasowski Variability Bugs in Highly Configurable
Systems: a Qualitative Analysis . . . . 10:1--10:??
Joshua Garcia and
Mahmoud Hammad and
Sam Malek Lightweight, Obfuscation-Resilient
Detection and Family Identification of
Android Malware . . . . . . . . . . . . 11:1--11:??
Khanh Nguyen and
Kai Wang and
Yingyi Bu and
Lu Fang and
Guoqing Xu Understanding and Combating Memory Bloat
in Managed Data-Intensive Systems . . . 12:1--12:41
Andrea De Lucia and
Vincenzo Deufemia and
Carmine Gravino and
Michele Risi Detecting the Behavior of Design
Patterns through Model Checking and
Dynamic Analysis . . . . . . . . . . . . 13:1--13:??
Yi Xiang and
Yuren Zhou and
Zibin Zheng and
Miqing Li Configuring Software Product Lines by
Combining Many-Objective Optimization
and SAT Solvers . . . . . . . . . . . . 14:1--14:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 1:1--1:??
Yuming Zhou and
Yibiao Yang and
Hongmin Lu and
Lin Chen and
Yanhui Li and
Yangyang Zhao and
Junyan Qian and
Baowen Xu How Far We Have Progressed in the
Journey? An Examination of Cross-Project
Defect Prediction . . . . . . . . . . . 1:1--1:??
Santiago Vidal and
Iñaki Berra and
Santiago Zulliani and
Claudia Marcos and
J. Andrés Díaz Pace Assessing the Refactoring of Brain
Methods . . . . . . . . . . . . . . . . 2:1--2:??
Yuanyuan Zhang and
Mark Harman and
Gabriela Ochoa and
Guenther Ruhe and
Sjaak Brinkkemper An Empirical Study of Meta- and
Hyper-Heuristic Search for
Multi-Objective Release Planning . . . . 3:1--3:??
S. S. Emam and
J. Miller Inferring Extended Probabilistic
Finite-State Automaton Models from
Software Executions . . . . . . . . . . 4:1--4:??
Tao Chen and
Ke Li and
Rami Bahsoon and
Xin Yao FEMOSAA: Feature-Guided and Knee-Driven
Multi-Objective Optimization for
Self-Adaptive Software . . . . . . . . . 5:1--5:??
Adrián Riesco and
Kazuhiro Ogata Prove it! Inferring Formal Proof Scripts
from CafeOBJ Proof Scores . . . . . . . 6:1--6:??
Marcel Böhme STADS: Software Testing as Species
Discovery . . . . . . . . . . . . . . . 7:1--7:??
Yongjie Zheng and
Cuong Cu and
Richard N. Taylor Maintaining Architecture-Implementation
Conformance to Support Architecture
Centrality: From Single System to
Product Line Development . . . . . . . . 8:1--8:??
David S. Rosenblum Editorial . . . . . . . . . . . . . . . 9:1--9:??
Tomasz Kuchta and
Hristina Palikareva and
Cristian Cadar Shadow Symbolic Execution for Testing
Software Patches . . . . . . . . . . . . 10:1--10:??
Klaas-Jan Stol and
Brian Fitzgerald The ABC of Software Engineering Research 11:1--11:??
Federica Sarro and
Alessio Petrozziello Linear Programming as a Baseline for
Software Effort Estimation . . . . . . . 12:1--12:??
Javier Troya and
Sergio Segura and
Jose Antonio Parejo and
Antonio Ruiz-Cortés Spectrum-Based Fault Localization in
Model Transformations . . . . . . . . . 13:1--13:??
Mario Linares-Vásquez and
Gabriele Bavota and
Carlos Bernal-Cárdenas and
Massimiliano Di Penta and
Rocco Oliveto and
Denys Poshyvanyk Multi-Objective Optimization of Energy
Consumption of GUIs in Android Apps . . 14:1--14:??
Sergey Mechtaev and
Xiang Gao and
Shin Hwei Tan and
Abhik Roychoudhury Test-Equivalence Analysis for Automatic
Patch Generation . . . . . . . . . . . . 15:1--15:??
Abhishek Sharma and
Yuan Tian and
Agus Sulistya and
Dinusha Wijedasa and
David Lo Recommending Who to Follow in the
Software Engineering Twitter Space . . . 16:1--16:??
Juan De Lara and
Esther Guerra Refactoring Multi-Level Models . . . . . 17:1--17:??
Alexander Von Rhein and
Jörg Liebig and
Andreas Janker and
Christian Kästner and
Sven Apel Variability-Aware Static Analysis at
Scale: an Empirical Study . . . . . . . 18:1--18:??
Mauro Pezz\`e Editorial from the Incoming
Editor-in-Chief . . . . . . . . . . . . 1:1--1:??
David S. Rosenblum Farewell Editorial from the Outgoing
Editor-in-Chief . . . . . . . . . . . . 1:1--1:??
Chunhui Wang and
Fabrizio Pastore and
Lionel Briand Oracles for Testing Software Timeliness
with Uncertainty . . . . . . . . . . . . 1:1--1:??
Abdul Razzaq and
Asanka Wasala and
Chris Exton and
Jim Buckley The State of Empirical Evaluation in
Static Feature Location . . . . . . . . 2:1--2:??
Andrea Arcuri RESTful API Automated Test Case
Generation with EvoMaster . . . . . . . 3:1--3:??
Chetan Arora and
Mehrdad Sabetzadeh and
Shiva Nejati and
Lionel Briand An Active Learning Approach for
Improving the Accuracy of Automated
Domain Model Extraction . . . . . . . . 4:1--4:??
Liyan Song and
Leandro L. Minku and
Xin Yao Software Effort Interval Prediction via
Bayesian Inference and Synthetic
Bootstrap Resampling . . . . . . . . . . 5:1--5:??
Samuel J. Ellis and
Titus H. Klinge and
James I. Lathrop and
Jack H. Lutz and
Robyn R. Lutz and
Andrew S. Miner and
Hugh D. Potter Runtime Fault Detection in Programmed
Molecular Systems . . . . . . . . . . . 6:1--6:??
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 6:1--6:??
Yue Li and
Tian Tan and
Jingling Xue Understanding and Analyzing Java
Reflection . . . . . . . . . . . . . . . 7:1--7:??
Dines Bjòrner Domain Analysis and Description
Principles, Techniques, and Modelling
Languages . . . . . . . . . . . . . . . 8:1--8:??
Stefan Wagner and
Daniel Méndez Fernández and
Michael Felderer and
Antonio Vetr\`o and
Marcos Kalinowski and
Roel Wieringa and
Dietmar Pfahl and
Tayana Conte and
Marie-Therese Christiansson and
Desmond Greer and
Casper Lassenius and
Tomi Männistö and
Maleknaz Nayebi and
Markku Oivo and
Birgit Penzenstadler and
Rafael Prikladnicki and
Guenther Ruhe and
André Schekelmann and
Sagar Sen and
Rodrigo Spínola and
Ahmed Tuzcu and
Jose Luis De La Vara and
Dietmar Winkler Status Quo in Requirements Engineering:
a Theory and a Global Family of Surveys 9:1--9:??
Jian-Min Jiang and
Huibiao Zhu and
Qin Li and
Yongxin Zhao and
Zhong Hong and
Shi Zhang and
Ping Gong Isolation Modeling and Analysis Based on
Mobility . . . . . . . . . . . . . . . . 10:1--10:??
Christoph Czepa and
Uwe Zdun How Understandable Are Pattern-based
Behavioral Constraints for Novice
Software Designers? . . . . . . . . . . 11:1--11:??
Mauro Pezzé Editorial . . . . . . . . . . . . . . . 12:1--12:??
Dennis Reuling and
Udo Kelter and
Johannes Bürdek and
Malte Lochau Automated $N$-way Program Merging for
Facilitating Family-based Analyses of
Variant-rich Software . . . . . . . . . 13:1--13:??
Feng Sheng and
Huibiao Zhu and
Jifeng He and
Zongyuan Yang and
Jonathan P. Bowen Theoretical and Practical Aspects of
Linking Operational and Algebraic
Semantics for MDESL . . . . . . . . . . 14:1--14:??
Xiaoxue Ren and
Zhenchang Xing and
Xin Xia and
David Lo and
Xinyu Wang and
John Grundy Neural Network-based Detection of
Self-Admitted Technical Debt: From
Performance to Explainability . . . . . 15:1--15:??
Pengfei Gao and
Jun Zhang and
Fu Song and
Chao Wang Verifying and Quantifying Side-channel
Resistance of Masked Software
Implementations . . . . . . . . . . . . 16:1--16:??
Porfirio Tramontana and
Domenico Amalfitano and
Nicola Amatucci and
Atif Memon and
Anna Rita Fasolino Developing and Evaluating Objective
Termination Criteria for Random Testing 17:1--17:??
Pedro Antonino and
Thomas Gibson-Robinson and
A. W. Roscoe Efficient Verification of Concurrent
Systems Using Synchronisation Analysis
and SAT/SMT Solving . . . . . . . . . . 18:1--18:??
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 19:1--19:??
Michele Tufano and
Cody Watson and
Gabriele Bavota and
Massimiliano Di Penta and
Martin White and
Denys Poshyvanyk An Empirical Study on Learning
Bug-Fixing Patches in the Wild via
Neural Machine Translation . . . . . . . 19:1--19:??
Carlo Bernaschina and
Emanuele Falzone and
Piero Fraternali and
Sergio Luis Herrera Gonzalez The Virtual Developer: Integrating Code
Generation and Manual Development with
Conflict Resolution . . . . . . . . . . 20:1--20:??
Juan De Lara and
Esther Guerra and
Davide Di Ruscio and
Juri Di Rocco and
Jesús S'nchez Cuadrado and
Ludovico Iovino and
Alfonso Pierantonio Automated Reuse of Model Transformations
through Typing Requirements Models . . . 21:1--21:??
He Jiang and
Jingxuan Zhang and
Xiaochen Li and
Zhilei Ren and
David Lo and
Xindong Wu and
Zhongxuan Luo Recommending New Features from Mobile
App Descriptions . . . . . . . . . . . . 22:1--22:??
Yunho Kim and
Seokhyeon Mun and
Shin Yoo and
Moonzoo Kim Precise Learn-to-Rank Fault Localization
Using Dynamic and Static Features of
Target Programs . . . . . . . . . . . . 23:1--23:??
Cong Tian and
Chu Chen and
Zhenhua Duan and
Liang Zhao Differential Testing of Certificate
Validation in SSL/TLS Implementations:
an RFC-guided Approach . . . . . . . . . 24:1--24:??
Antoine El-Hokayem and
Yli\`es Falcone On the Monitoring of Decentralized
Specifications: Semantics, Properties,
Analysis, and Simulation . . . . . . . . 1:1--1:57
Robert M. Hierons and
Miqing Li and
Xiaohui Liu and
Jose Antonio Parejo and
Sergio Segura and
Xin Yao Many-Objective Test Suite Generation for
Software Product Lines . . . . . . . . . 2:1--2:46
Lin Chen and
Di Wu and
Wanwangying Ma and
Yuming Zhou and
Baowen Xu and
Hareton Leung How C++ Templates Are Used for Generic
Programming: an Empirical Study on 50
Open Source Systems . . . . . . . . . . 3:1--3:49
Gaogao Yan and
Li Jiao and
Shuling Wang and
Lingtai Wang and
Naijun Zhan Automatically Generating SystemC Code
from HCSP Formal Models . . . . . . . . 4:1--4:39
Yuan Yuan and
Wolfgang Banzhaf Toward Better Evolutionary Program
Repair: an Integrated Approach . . . . . 5:1--5:53
Roman Haas and
Rainer Niedermayr and
Tobias Roehm and
Sven Apel Is Static Analysis Able to Identify
Unnecessary Source Code? . . . . . . . . 6:1--6:23
Özgür Kafali and
Nirav Ajmeri and
Munindar P. Singh DESEN: Specification of Sociotechnical
Systems via Patterns of Regulation and
Control . . . . . . . . . . . . . . . . 7:1--7:50
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 8e:1--8e:1
Haipeng Cai Assessing and Improving Malware
Detection Sustainability through App
Evolution Studies . . . . . . . . . . . 8:1--8:28
Ivan Beschastnikh and
Perry Liu and
Albert Xing and
Patty Wang and
Yuriy Brun and
Michael D. Ernst Visualizing Distributed System
Executions . . . . . . . . . . . . . . . 9:1--9:38
Shaukat Ali and
Paolo Arcaini and
Dipesh Pradhan and
Safdar Aqeel Safdar and
Tao Yue Quality Indicators in Search-based
Software Engineering: an Empirical
Evaluation . . . . . . . . . . . . . . . 10:1--10:29
Ghanem Soltana and
Mehrdad Sabetzadeh and
Lionel C. Briand Practical Constraint Solving for
Generating System Test Data . . . . . . 11:1--11:48
Ritu Kapur and
Balwinder Sodhi A Defect Estimator for Source Code:
Linking Defect Reports with Programming
Constructs Usage Metrics . . . . . . . . 12:1--12:35
Yangguang Li and
Zhen Ming (Jack) Jiang and
Heng Li and
Ahmed E. Hassan and
Cheng He and
Ruirui Huang and
Zhengda Zeng and
Mian Wang and
Pinan Chen Predicting Node Failures in an
Ultra-Large-Scale Cloud Computing
Platform: an AIOps Solution . . . . . . 13:1--13:24
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 14e:1--14e:1
Guanhua Wang and
Sudipta Chattopadhyay and
Arnab Kumar Biswas and
Tulika Mitra and
Abhik Roychoudhury KLEESpectre: Detecting Information
Leakage through Speculative Cache
Attacks via Symbolic Execution . . . . . 14:1--14:31
Farbod Taymouri and
Josep Carmona Computing Alignments of Well-Formed
Process Models using Local Search . . . 15:1--15:41
Zhendong Wang and
Yang Feng and
Yi Wang and
James A. Jones and
David Redmiles Unveiling Elite Developers' Activities
in Open Source Projects . . . . . . . . 16:1--16:35
Artem Polyvyanyy and
Andreas Solti and
Matthias Weidlich and
Claudio Di Ciccio and
Jan Mendling Monotone Precision and Recall Measures
for Comparing Executions and
Specifications of Dynamic Systems . . . 17:1--17:41
Breno Miranda and
Antonia Bertolino Testing Relative to Usage Scope:
Revisiting Software Coverage Criteria 18:1--18:24
Jieshan Chen and
Chunyang Chen and
Zhenchang Xing and
Xin Xia and
Liming Zhu and
John Grundy and
Jinshui Wang Wireframe-based UI Design Search through
Image Autoencoder . . . . . . . . . . . 19:1--19:31
Yinxing Xue and
Yan-Fu Li Multi-objective Integer Programming
Approaches for Solving the
Multi-criteria Test-suite Minimization
Problem: Towards Sound and Complete
Solutions of a Particular Search-based
Software-engineering Problem . . . . . . 20:1--20:50
Lingfeng Bao and
Zhenchang Xing and
Xin Xia and
David Lo and
Minghui Wu and
Xiaohu Yang psc2code: Denoising Code Extraction from
Programming Screencasts . . . . . . . . 21:1--21:38
Andrea Arcuri and
Juan P. Galeotti Handling SQL Databases in Automated
System Test Generation . . . . . . . . . 22:1--22:31
Aleksandr Pilgun and
Olga Gadyatskaya and
Yury Zhauniarovich and
Stanislav Dashevskyi and
Artsiom Kushniarou and
Sjouke Mauw Fine-grained Code Coverage Measurement
in Automated Black-box Android Testing 23:1--23:35
Junjie Wang and
Ye Yang and
Tim Menzies and
Qing Wang iSENSE2.0: Improving Completion-aware
Crowdtesting Management with Duplicate
Tagger and Sanity Checker . . . . . . . 24:1--24:27
Xihui Zhang and
Thomas F. Stafford and
Tao Hu and
Hua Dai Measuring Task Conflict and Person
Conflict in Software Testing . . . . . . 25:1--25:19
Zhipeng Gao and
Xin Xia and
John Grundy and
David Lo and
Yuan-Fang Li Generating Question Titles for Stack
Overflow from Mined Code Snippets . . . 26:1--26:37
Xiao Liang Yu and
Omar Al-Bataineh and
David Lo and
Abhik Roychoudhury Smart Contract Repair . . . . . . . . . 27:1--27:32
Josie Holmes and
Iftekhar Ahmed and
Caius Brindescu and
Rahul Gopinath and
He Zhang and
Alex Groce Using Relative Lines of Code to Guide
Automated Test Generation for Python . . 28:1--28:38
Jevgenija Pantiuchina and
Fiorella Zampetti and
Simone Scalabrino and
Valentina Piantadosi and
Rocco Oliveto and
Gabriele Bavota and
Massimiliano Di Penta Why Developers Refactor Source Code: a
Mining-based Study . . . . . . . . . . . 29:1--29:30
Junjie Chen and
Zhuo Wu and
Zan Wang and
Hanmo You and
Lingming Zhang and
Ming Yan Practical Accuracy Estimation for
Efficient Deep Neural Network Testing 30:1--30:35
Wenhan Wang and
Ge Li and
Sijie Shen and
Xin Xia and
Zhi Jin Modular Tree Network for Source Code
Representation Learning . . . . . . . . 31:1--31:23
Michele Guerriero and
Damian Andrew Tamburri and
Elisabetta Di Nitto StreamGen: Model-driven Development of
Distributed Streaming Applications . . . 1:1--1:30
Janet Siegmund and
Norman Peitek and
Sven Apel and
Norbert Siegmund Mastering Variation in Human Studies:
The Role of Aggregation . . . . . . . . 2:1--2:40
Akond Rahman and
Md Rayhanur Rahman and
Chris Parnin and
Laurie Williams Security Smells in Ansible and Chef
Scripts: a Replication Study . . . . . . 3:1--3:31
Huihui Zhang and
Man Zhang and
Tao Yue and
Shaukat Ali and
Yan Li Uncertainty-wise Requirements
Prioritization with Search . . . . . . . 4:1--4:54
Ahmad Salim Al-Sibahi and
Thomas P. Jensen and
Aleksandar S. Dimovski and
Andrzej Wasowski Verification of Program Transformations
with Inductive Refinement Types . . . . 5:1--5:33
Ridwan Salihin Shariffdeen and
Shin Hwei Tan and
Mingyuan Gao and
Abhik Roychoudhury Automated Patch Transplantation . . . . 6:1--6:36
Xiaoxue Ma and
Shangru Wu and
Ernest Pobee and
Xiupei Mei and
Hao Zhang and
Bo Jiang and
Wing-Kwong Chan RegionTrack: a Trace-Based Sound and
Complete Checker to Debug Transactional
Atomicity Violations and
Non-Serializable Traces . . . . . . . . 7:1--7:49
Osama Ehsan and
Safwat Hassan and
Mariam El Mezouar and
Ying Zou An Empirical Study of Developer
Discussions in the Gitter Platform . . . 8:1--8:39
Roberto Bagnara and
Michele Chiari and
Roberta Gori and
Abramo Bagnara A Practical Approach to Verification of
Floating-Point C/C++ Programs with \tt
math.h/\tt cmath Functions . . . . . . . 9:1--9:53
Xiaoqin Fu and
Haipeng Cai and
Wen Li and
Li Li SEADS: Scalable and Cost-effective
Dynamic Dependence Analysis of
Distributed Systems via Reinforcement
Learning . . . . . . . . . . . . . . . . 10:1--10:45
Zhipeng Gao and
Xin Xia and
David Lo and
John Grundy Technical Q8A Site Answer Recommendation
via Question Boosting . . . . . . . . . 11:1--11:34
Javier Godoy and
Juan Pablo Galeotti and
Diego Garbervetsky and
Sebastián Uchitel Enabledness-based Testing of Object
Protocols . . . . . . . . . . . . . . . 12:1--12:36
Wei Ma and
Mike Papadakis and
Anestis Tsakmalis and
Maxime Cordy and
Yves Le Traon Test Selection for Deep Learning Systems 13:1--13:22
Xiang Gao and
Bo Wang and
Gregory J. Duck and
Ruyi Ji and
Yingfei Xiong and
Abhik Roychoudhury Beyond Tests: Program Vulnerability
Repair via Crash Constraint Extraction 14:1--14:27
Manuel Ohrndorf and
Christopher Pietsch and
Udo Kelter and
Lars Grunske and
Timo Kehrer History-based Model Repair
Recommendations . . . . . . . . . . . . 15:1--15:46
Hong Jin Kang and
David Lo Adversarial Specification Mining . . . . 16:1--16:40
Dunwei Gong and
Baicai Sun and
Xiangjuan Yao and
Tian Tian Test Data Generation for Path Coverage
of MPI Programs Using SAEO . . . . . . . 17:1--17:37
Zhenpeng Chen and
Yanbin Cao and
Huihan Yao and
Xuan Lu and
Xin Peng and
Hong Mei and
Xuanzhe Liu Emoji-powered Sentiment and Emotion
Detection from Software Developers'
Communication Data . . . . . . . . . . . 18:1--18:48
Thierry Titcheu Chekam and
Mike Papadakis and
Maxime Cordy and
Yves Le Traon Killing Stubborn Mutants with Symbolic
Execution . . . . . . . . . . . . . . . 19:1--19:23
John-Paul Ore and
Carrick Detweiler and
Sebastian Elbaum An Empirical Study on Type Annotations:
Accuracy, Speed, and Suggestion
Effectiveness . . . . . . . . . . . . . 20:1--20:29
Bozhi Wu and
Sen Chen and
Cuiyun Gao and
Lingling Fan and
Yang Liu and
Weiping Wen and
Michael R. Lyu Why an Android App Is Classified as
Malware: Toward Malware Classification
Interpretation . . . . . . . . . . . . . 21:1--21:29
Haoxiang Zhang and
Shaowei Wang and
Tse-Hsun (Peter) Chen and
Ahmed E. Hassan Are Comments on Stack Overflow Well
Organized for Easy Retrieval by
Developers? . . . . . . . . . . . . . . 22:1--22:31
Deqing Zou and
Yawei Zhu and
Shouhuai Xu and
Zhen Li and
Hai Jin and
Hengkai Ye Interpreting Deep Learning-based
Vulnerability Detector Predictions Based
on Heuristic Searching . . . . . . . . . 23:1--23:31
Bailey Vandehei and
Daniel Alencar Da Costa and
Davide Falessi Leveraging the Defects Life Cycle to
Label Affected Versions and Defective
Classes . . . . . . . . . . . . . . . . 24:1--24:35
Qiuyuan Chen and
Xin Xia and
Han Hu and
David Lo and
Shanping Li Why My Code Summarization Model Does Not
Work: Code Comment Improvement with
Category Prediction . . . . . . . . . . 25:1--25:29
Mauro Pezz\`e Editorial . . . . . . . . . . . . . . . 26e:1--26e:1
Pengfei Gao and
Hongyi Xie and
Fu Song and
Taolue Chen A Hybrid Approach to Formal Verification
of Higher-Order Masked Arithmetic
Programs . . . . . . . . . . . . . . . . 26:1--26:42
Juan De Lara and
Esther Guerra and
Jörg Kienzle Facet-oriented Modelling . . . . . . . . 27:1--27:59
Abdullah A. Zarir and
Gustavo A. Oliva and
Zhen M. (Jack) Jiang and
Ahmed E. Hassan Developing Cost-Effective
Blockchain-Powered Applications: a Case
Study of the Gas Usage of Smart Contract
Transactions in the Ethereum Blockchain
Platform . . . . . . . . . . . . . . . . 28:1--28:38
Mouna Abidi and
Md Saidur Rahman and
Moses Openja and
Foutse Khomh Are Multi-Language Design Smells
Fault-Prone? An Empirical Study . . . . 29:1--29:56
Zohreh Sharafi and
Yu Huang and
Kevin Leach and
Westley Weimer Toward an Objective Measure of
Developers' Cognitive Activities . . . . 30:1--30:40
Gias Uddin and
Foutse Khomh and
Chanchal K. Roy Automatic API Usage Scenario
Documentation from Technical Q&A Sites 31:1--31:45
Xiaoyu Sun and
Li Li and
Tegawendé F. Bissyandé and
Jacques Klein and
Damien Octeau and
John Grundy Taming Reflection: an Essential Step
Toward Whole-program Analysis of Android
Apps . . . . . . . . . . . . . . . . . . 32:1--32:36
Guoliang Zhao and
Safwat Hassan and
Ying Zou and
Derek Truong and
Toby Corbin Predicting Performance Anomalies in
Software Systems at Run-time . . . . . . 33:1--33:33
Thiago Castro and
Leopoldo Teixeira and
Vander Alves and
Sven Apel and
Maxime Cordy and
Rohit Gheyi A Formal Framework of Software Product
Line Analyses . . . . . . . . . . . . . 34:1--34:37
Wendy Yánez and
Rami Bahsoon and
Yuqun Zhang and
Rick Kazman Architecting Internet of Things Systems
with Blockchain: a Catalog of Tactics 35:1--35:46
Simone Scalabrino and
Antonio Mastropaolo and
Gabriele Bavota and
Rocco Oliveto An Adaptive Search Budget Allocation
Approach for Search-Based Test Case
Generation . . . . . . . . . . . . . . . 36:1--36:26
Qiuyuan Chen and
Chunyang Chen and
Safwat Hassan and
Zhengchang Xing and
Xin Xia and
Ahmed E. Hassan How Should I Improve the UI of My App?:
a Study of User Reviews of Popular Apps
in the Google Play . . . . . . . . . . . 37:1--37:38
Xiao Cheng and
Haoyu Wang and
Jiayi Hua and
Guoai Xu and
Yulei Sui DeepWukong: Statically Detecting
Software Vulnerabilities Using Deep
Graph Neural Network . . . . . . . . . . 38:1--38:33
Deqing Zou and
Yueming Wu and
Siru Yang and
Anki Chauhan and
Wei Yang and
Jiangying Zhong and
Shihan Dou and
Hai Jin IntDroid: Android Malware Detection
Based on API Intimacy Analysis . . . . . 39:1--39:32
Yanjie Zhao and
Li Li and
Haoyu Wang and
Haipeng Cai and
Tegawendé F. Bissyandé and
Jacques Klein and
John Grundy On the Impact of Sample Duplication in
Machine-Learning-Based Android Malware
Detection . . . . . . . . . . . . . . . 40:1--40:38
Jianhui Chen and
Fei He Leveraging Control Flow Knowledge in SMT
Solving of Program Verification . . . . 41:1--41:26
Chris Bogart and
Christian Kästner and
James Herbsleb and
Ferdian Thung When and How to Make Breaking Changes:
Policies and Practices in 18 Open Source
Software Ecosystems . . . . . . . . . . 42:1--42:56
Angelo Ferrando and
Louise A. Dennis and
Rafael C. Cardoso and
Michael Fisher and
Davide Ancona and
Viviana Mascardi Toward a Holistic Approach to
Verification and Validation of
Autonomous Cognitive Systems . . . . . . 43:1--43:43
Héctor D. Menéndez and
Gunel Jahangirova and
Federica Sarro and
Paolo Tonella and
David Clark Diversifying Focused Testing for Unit
Testing . . . . . . . . . . . . . . . . 44:1--44:24
Zhaoqiang Guo and
Shiran Liu and
Jinping Liu and
Yanhui Li and
Lin Chen and
Hongmin Lu and
Yuming Zhou How Far Have We Progressed in
Identifying Self-admitted Technical
Debts? A Comprehensive Empirical Study 45:1--45:56
Jingbo Lu and
Dongjie He and
Jingling Xue Eagle: CFL-Reachability-Based
Precision-Preserving Acceleration of
Object-Sensitive Pointer Analysis with
Partial Context Sensitivity . . . . . . 46:1--46:46
Philipp Paulweber and
Georg Simhandl and
Uwe Zdun Specifying with Interface and Trait
Abstractions in Abstract State Machines:
a Controlled Experiment . . . . . . . . 47:1--47:29
Preetha Chatterjee and
Kostadin Damevski and
Nicholas A. Kraft and
Lori Pollock Automatically Identifying the Quality of
Developer Chats for Post Hoc Use . . . . 48:1--48:28
Yida Tao and
Shan Tang and
Yepang Liu and
Zhiwu Xu and
Shengchao Qin Speeding Up Data Manipulation Tasks with
Alternative Implementations: an
Exploratory Study . . . . . . . . . . . 49:1--49:28
Nacha Chondamrongkul and
Jing Sun and
Ian Warren Software Architectural Migration: an
Automated Planning Approach . . . . . . 50:1--50:35
Dalia Sobhy and
Rami Bahsoon and
Leandro Minku and
Rick Kazman Evaluation of Software Architectures
under Uncertainty: a Systematic
Literature Review . . . . . . . . . . . 51:1--51:50
Daniel Russo The Agile Success Model: a Mixed-methods
Study of a Large-scale Agile
Transformation . . . . . . . . . . . . . 52:1--52:46
Safdar Aqeel Safdar and
Tao Yue and
Shaukat Ali Recommending Faulty Configurations for
Interacting Systems Under Test Using
Multi-objective Search . . . . . . . . . 53:1--53:36
Yingzhe Lyu and
Heng Li and
Mohammed Sayagh and
Zhen Ming (Jack) Jiang and
Ahmed E. Hassan An Empirical Study of the Impact of Data
Splitting Decisions on the Performance
of AIOps Solutions . . . . . . . . . . . 54:1--54:38
Malinda Dilhara and
Ameya Ketkar and
Danny Dig Understanding Software-2.0: a Study of
Machine Learning Library Usage and
Evolution . . . . . . . . . . . . . . . 55:1--55:42
Haoye Wang and
Xin Xia and
David Lo and
Qiang He and
Xinyu Wang and
John Grundy Context-aware Retrieval-based Deep
Commit Message Generation . . . . . . . 56:1--56:30
Andrea Arcuri and
Juan P. Galeotti Enhancing Search-based Testing with
Testability Transformations for Existing
APIs . . . . . . . . . . . . . . . . . . 1:1--1:34
Man Zhang and
Andrea Arcuri Adaptive Hypermutation for Search-Based
System Test Generation: a Study on REST
APIs with EvoMaster . . . . . . . . . . 2:1--2:52
Hui Xu and
Zhuangbin Chen and
Mingshen Sun and
Yangfan Zhou and
Michael R. Lyu Memory-Safety Challenge Considered
Solved? An In-Depth Study with All Rust
CVEs . . . . . . . . . . . . . . . . . . 3:1--3:25
Davide Falessi and
Aalok Ahluwalia and
Massimiliano DI Penta The Impact of Dormant Defects on Defect
Prediction: a Study of 19 Apache
Projects . . . . . . . . . . . . . . . . 4:1--4:26
Birgit Vogel-Heuser and
Eva-Maria Neumann and
Juliane Fischer MICOSE4aPS: Industrially Applicable
Maturity Metric to Improve Systematic
Reuse of Control Software . . . . . . . 5:1--5:24
Anders Sundelin and
Javier Gonzalez-huerta and
Krzysztof Wnuk and
Tony Gorschek Towards an Anatomy of Software
Craftsmanship . . . . . . . . . . . . . 6:1--6:49
Daniel Graziotin and
Per Lenberg and
Robert Feldt and
Stefan Wagner Psychometrics in Behavioral Software
Engineering: a Methodological
Introduction with Guidelines . . . . . . 7:1--7:36
Jianyi Zhou and
Junjie Chen and
Dan Hao Parallel Test Prioritization . . . . . . 8:1--8:50
Irum Rauf and
Marian Petre and
Thein Tun and
Tamara Lopez and
Paul Lunn and
Dirk Van Der Linden and
John Towse and
Helen Sharp and
Mark Levine and
Awais Rashid and
Bashar Nuseibeh The Case for Adaptive Security
Interventions . . . . . . . . . . . . . 9:1--9:52
Lorena Arcega and
Jaime Font and
Òystein Haugen and
Carlos Cetina Bug Localization in Model-Based Systems
in the Wild . . . . . . . . . . . . . . 10:1--10:32
Cuiyun Gao and
Wenjie Zhou and
Xin Xia and
David Lo and
Qi Xie and
Michael R. Lyu Automating App Review Response
Generation Based on Contextual Knowledge 11:1--11:36
Chao Liu and
Xin Xia and
David Lo and
Zhiwe Liu and
Ahmed E. Hassan and
Shanping Li CodeMatcher: Searching Code Based on
Sequential Semantics of Important Query
Words . . . . . . . . . . . . . . . . . 12:1--12:37
Yaqin Zhou and
Jing Kai Siow and
Chenyu Wang and
Shangqing Liu and
Yang Liu SPI: Automated Identification of
Security Patches via Commits . . . . . . 13:1--13:27
Amin Nikanjam and
Houssem Ben Braiek and
Mohammad Mehdi Morovati and
Foutse Khomh Automatic Fault Detection for Deep
Learning Programs Using Graph
Transformations . . . . . . . . . . . . 14:1--14:27
Chao Liu and
Cuiyun Gao and
Xin Xia and
David Lo and
John Grundy and
Xiaohu Yang On the Reproducibility and Replicability
of Deep Learning in Software Engineering 15:1--15:46
Yingzhe Lyu and
Gopi Krishnan Rajbahadur and
Dayi Lin and
Boyuan Chen and
Zhen Ming (Jack) Jiang Towards a Consistent Interpretation of
AIOps Models . . . . . . . . . . . . . . 16:1--16:38
Owain Parry and
Gregory M. Kapfhammer and
Michael Hilton and
Phil McMinn A Survey of Flaky Tests . . . . . . . . 17:1--17:74
Mauro Pezz\`e Editorial: a Retrospective and
Prospective Reflection . . . . . . . . . 18e:1--18e:2
K. Lano and
S. Kolahdouz-Rahimi and
S. Fang Model Transformation Development Using
Automated Requirements Analysis,
Metamodel Matching, and Transformation
by Example . . . . . . . . . . . . . . . 18:1--18:71
Thomas Bock and
Angelika Schmid and
Sven Apel Measuring and Modeling Group Dynamics in
Open-Source Software Development: a
Tensor Decomposition Approach . . . . . 19:1--19:50
Fahimeh Ebrahimi and
Miroslav Tushev and
Anas Mahmoud Classifying Mobile Applications Using
Word Embeddings . . . . . . . . . . . . 20:1--20:30
Luca Ardito and
Andrea Bottino and
Riccardo Coppola and
Fabrizio Lamberti and
Francesco Manigrasso and
Lia Morra and
Marco Torchiano Feature Matching-based Approaches to
Improve the Robustness of Android Visual
GUI Testing . . . . . . . . . . . . . . 21:1--21:32
Chandra Maddila and
Nachiappan Nagappan and
Christian Bird and
Georgios Gousios and
Arie van Deursen ConE: a Concurrent Edit Detection Tool
for Large-scale Software Development . . 22:1--22:26
Jevgenija Pantiuchina and
Bin Lin and
Fiorella Zampetti and
Massimiliano Di Penta and
Michele Lanza and
Gabriele Bavota Why Do Developers Reject Refactorings in
Open-Source Projects? . . . . . . . . . 23:1--23:23
Olawole Oni and
Emmanuel Letier Analyzing Uncertainty in Release
Planning: a Method and Experiment for
Fixed-Date Release Cycles . . . . . . . 24:1--24:39
Luca Traini and
Daniele Di Pompeo and
Michele Tucci and
Bin Lin and
Simone Scalabrino and
Gabriele Bavota and
Michele Lanza and
Rocco Oliveto and
Vittorio Cortellessa How Software Refactoring Impacts
Execution Time . . . . . . . . . . . . . 25:1--25:23
Katherine Hough and
Jonathan Bell A Practical Approach for Dynamic Taint
Tracking with Control-flow Relationships 26:1--26:43
Denae Ford and
Margaret-Anne Storey and
Thomas Zimmermann and
Christian Bird and
Sonia Jaffe and
Chandra Maddila and
Jenna L. Butler and
Brian Houck and
Nachiappan Nagappan A Tale of Two Cities: Software
Developers Working from Home during the
COVID-19 Pandemic . . . . . . . . . . . 27:1--27:37
Ryan Williams and
Tongwei Ren and
Lorenzo De Carli and
Long Lu and
Gillian Smith Guided Feature Identification and
Removal for Resource-constrained
Firmware . . . . . . . . . . . . . . . . 28:1--28:25
Frank F. Xu and
Bogdan Vasilescu and
Graham Neubig In-IDE Code Generation from Natural
Language: Promise and Challenges . . . . 29:1--29:47
Jiachi Chen and
Xin Xia and
David Lo and
John Grundy Why Do Smart Contracts Self-Destruct?
Investigating the Selfdestruct Function
on Ethereum . . . . . . . . . . . . . . 30:1--30:37
Patrick Keller and
Abdoul Kader Kaboré and
Laura Plein and
Jacques Klein and
Yves Le Traon and
Tegawendé F. Bissyandé What You See is What it Means! Semantic
Representation Learning of Code based on
Visualization and Transfer Learning . . 31:1--31:34
Cody Watson and
Nathan Cooper and
David Nader Palacio and
Kevin Moran and
Denys Poshyvanyk A Systematic Literature Review on the
Use of Deep Learning in Software
Engineering Research . . . . . . . . . . 32:1--32:58
Ritu Kapur and
Balwinder Sodhi OSS Effort Estimation Using Software
Features Similarity and Developer
Activity-Based Metrics . . . . . . . . . 33:1--33:35
Jialun Cao and
Meiziniu Li and
Yeting Li and
Ming Wen and
Shing-Chi Cheung and
Haiming Chen SemMT: a Semantic-Based Testing Approach
for Machine Translation Systems . . . . 34e:1--34e:36
Changwei Zou and
Xudong Wang and
Yaoqing Gao and
Jingling Xue Buddy Stacks: Protecting Return
Addresses with Efficient Thread-Local
Storage and Runtime Re-Randomization . . 35e:1--35e:37
Sabreen Ahmadjee and
Carlos Mera-Gómez and
Rami Bahsoon and
Rick Kazman A Study on Blockchain Architecture
Design Decisions and Their Security
Attacks and Threats . . . . . . . . . . 36e:1--36e:45
Silverio Martínez-Fernández and
Justus Bogner and
Xavier Franch and
Marc Oriol and
Julien Siebert and
Adam Trendowicz and
Anna Maria Vollmer and
Stefan Wagner Software Engineering for AI-Based
Systems: a Survey . . . . . . . . . . . 37e:1--37e:59
Yingfei Xiong and
Bo Wang L2S: a Framework for Synthesizing the
Most Probable Program under a
Specification . . . . . . . . . . . . . 34:1--34:45
Junjie Wang and
Ye Yang and
Song Wang and
Jun Hu and
Qing Wang Context- and Fairness-Aware In-Process
Crowdworker Recommendation . . . . . . . 35:1--35:31
Yu Zhao and
Ting Su and
Yang Liu and
Wei Zheng and
Xiaoxue Wu and
Ramakanth Kavuluru and
William G. J. Halfond and
Tingting Yu ReCDroid+: Automated End-to-End Crash
Reproduction from Bug Reports for
Android Apps . . . . . . . . . . . . . . 36:1--36:33
Luca Di Stefano and
Rocco De Nicola and
Omar Inverso Verification of Distributed Systems via
Sequential Emulation . . . . . . . . . . 37:1--37:41
Bin Lin and
Nathan Cassee and
Alexander Serebrenik and
Gabriele Bavota and
Nicole Novielli and
Michele Lanza Opinion Mining for Software Development:
a Systematic Literature Review . . . . . 38:1--38:41
Daniel Barcelona-Pons and
Pierre Sutra and
Marc Sánchez-Artigas and
Gerard París and
Pedro García-López Stateful Serverless Computing with
Crucial . . . . . . . . . . . . . . . . 39:1--39:38
Carlo A. Furia and
Richard Torkar and
Robert Feldt Applying Bayesian Analysis Guidelines to
Empirical Software Engineering Data: The
Case of Programming Languages and Code
Quality . . . . . . . . . . . . . . . . 40:1--40:38
Bogdan Marculescu and
Man Zhang and
Andrea Arcuri On the Faults Found in REST APIs by
Automated Test Generation . . . . . . . 41:1--41:43
Fabio Calefato and
Filippo Lanubile Using Personality Detection Tools for
Software Engineering Research: How Far
Can We Go? . . . . . . . . . . . . . . . 42:1--42:48
Si Liu All in One: Design, Verification, and
Implementation of SNOW-optimal Read
Atomic Transactions . . . . . . . . . . 43:1--43:44
Wenhua Yang and
Chong Zhang and
Minxue Pan and
Chang Xu and
Yu Zhou and
Zhiqiu Huang Do Developers Really Know How to Use Git
Commands? A Large-scale Study Using
Stack Overflow . . . . . . . . . . . . . 44:1--44:29
Dusica Marijan and
Sagar Sen Industry-Academia Research Collaboration
and Knowledge Co-creation: Patterns and
Anti-patterns . . . . . . . . . . . . . 45:1--45:52
Dalia Sobhy and
Leandro Minku and
Rami Bahsoon and
Rick Kazman Continuous and Proactive Software
Architecture Evaluation: an IoT Case . . 46:1--46:54
Xiaofei Xie and
Tianlin Li and
Jian Wang and
Lei Ma and
Qing Guo and
Felix Juefei-Xu and
Yang Liu NPC: Neuron Path Coverage via
Characterizing Decision Logic of Deep
Neural Networks . . . . . . . . . . . . 47:1--47:27
Gias Uddin and
Yann-Gaël Guéhénuc and
Foutse Khomh and
Chanchal K. Roy An Empirical Study of the Effectiveness
of an Ensemble of Stand-alone Sentiment
Detection Tools for Software Engineering
Datasets . . . . . . . . . . . . . . . . 48:1--48:38
Hao Guo and
Sen Chen and
Zhenchang Xing and
Xiaohong Li and
Yude Bai and
Jiamou Sun Detecting and Augmenting Missing Key
Aspects in Vulnerability Descriptions 49:1--49:27
Huangzhao Zhang and
Zhiyi Fu and
Ge Li and
Lei Ma and
Zhehao Zhao and
Hua'an Yang and
Yizhe Sun and
Yang Liu and
Zhi Jin Towards Robustness of Deep Program
Processing Models-Detection, Estimation,
and Enhancement . . . . . . . . . . . . 50:1--50:40
Bo Lin and
Shangwen Wang and
Ming Wen and
Xiaoguang Mao Context-Aware Code Change Embedding for
Better Patch Correctness Assessment . . 51:1--51:29
Zehao Lin and
Guodun Li and
Jingfeng Zhang and
Yue Deng and
Xiangji Zeng and
Yin Zhang and
Yao Wan XCode: Towards Cross-Language Code
Representation with Large-Scale
Pre-Training . . . . . . . . . . . . . . 52:1--52:44
Lizhi Liao and
Heng Li and
Weiyi Shang and
Lei Ma An Empirical Study of the Impact of
Hyperparameter Tuning and Model
Optimization on the Performance
Properties of Deep Neural Networks . . . 53:1--53:40
Siwei Wu and
Lei Wu and
Yajin Zhou and
Runhuai Li and
Zhi Wang and
Xiapu Luo and
Cong Wang and
Kui Ren Time-travel Investigation: Toward
Building a Scalable Attack Detection
Framework on Ethereum . . . . . . . . . 54:1--54:33
Benjamin S. Meyers and
Sultan Fahad Almassari and
Brandon N. Keller and
Andrew Meneely Examining Penetration Tester Behavior in
the Collegiate Penetration Testing
Competition . . . . . . . . . . . . . . 55:1--55:25
Yanming Yang and
Xin Xia and
David Lo and
Tingting Bi and
John Grundy and
Xiaohu Yang Predictive Models in Software
Engineering: Challenges and
Opportunities . . . . . . . . . . . . . 56:1--56:72
Dirk Beyer and
Matthias Dangl and
Daniel Dietsch and
Matthias Heizmann and
Thomas Lemberger and
Michael Tautschnig Verification Witnesses . . . . . . . . . 57:1--57:??
Ridhi Jain and
Rahul Purandare and
Subodh Sharma BiRD: Race Detection in Software
Binaries under Relaxed Memory Models . . 58:1--58:??
Jhon Masso and
Félix García and
César Pardo and
Francisco J. Pino and
Mario Piattini A Common Terminology for Software Risk
Management . . . . . . . . . . . . . . . 59:1--59:??
Yu Zhou and
Xiaoqing Zhang and
Juanjuan Shen and
Tingting Han and
Taolue Chen and
Harald Gall Adversarial Robustness of Deep Code
Comment Generation . . . . . . . . . . . 60:1--60:??
Chanh Duc Ngo and
Fabrizio Pastore and
Lionel Briand Automated, Cost-effective, and
Update-driven App Testing . . . . . . . 61:1--61:??
Hao Yu and
Xing Hu and
Ge Li and
Ying Li and
Qianxiang Wang and
Tao Xie Assessing and Improving an Evaluation
Dataset for Detecting Semantic Code
Clones via Deep Learning . . . . . . . . 62:1--62:??
Xing Hu and
Qiuyuan Chen and
Haoye Wang and
Xin Xia and
David Lo and
Thomas Zimmermann Correlating Automated and Human
Evaluation of Code Documentation
Generation Quality . . . . . . . . . . . 63:1--63:??
Étienne André and
Didier Lime and
Dylan Marinho and
Jun Sun Guaranteeing Timed Opacity using
Parametric Timed Model Checking . . . . 64:1--64:??
Andrea Romdhana and
Alessio Merlo and
Mariano Ceccato and
Paolo Tonella Deep Reinforcement Learning for
Black-box Testing of Android Apps . . . 65:1--65:??
Tingting Bi and
Xin Xia and
David Lo and
John Grundy and
Thomas Zimmermann and
Denae Ford Accessibility in Software Practice: a
Practitioner's Perspective . . . . . . . 66:1--66:??
Mitchell Joblin and
Sven Apel How Do Successful and Failed Projects
Differ? A Socio-Technical Analysis . . . 67:1--67:??
Giuseppe De Giacomo and
Riccardo De Masellis and
Fabrizio Maria Maggi and
Marco Montali Monitoring Constraints and
Metaconstraints with Temporal Logics on
Finite Traces . . . . . . . . . . . . . 68:1--68:??
Peng Zhang and
Yang Wang and
Xutong Liu and
Yanhui Li and
Yibiao Yang and
Ziyuan Wang and
Xiaoyu Zhou and
Lin Chen and
Yuming Zhou Mutant Reduction Evaluation: What is
There and What is Missing? . . . . . . . 69:1--69:??
Elvira Albert and
Pablo Gordillo and
Alejandro Hernández-Cerezo and
Albert Rubio and
Maria A. Schett Super-optimization of Smart Contracts 70:1--70:??
Henrich Lauko and
Lukás Korencik and
Petr Rockai Verification of Programs Sensitive to
Heap Layout . . . . . . . . . . . . . . 71:1--71:??
Junjie Chen and
Chenyao Suo Boosting Compiler Testing via Compiler
Optimization Exploration . . . . . . . . 72:1--72:??
Jinhan Kim and
Juyoung Jeon and
Shin Hong and
Shin Yoo Predictive Mutation Analysis via the
Natural Language Channel in Source Code 73:1--73:??
Umair Z. Ahmed and
Zhiyu Fan and
Jooyong Yi and
Omar I. Al-Bataineh and
Abhik Roychoudhury Verifix: Verified Repair of Programming
Assignments . . . . . . . . . . . . . . 74:1--74:??
Yuxia Zhang and
Hui Liu and
Xin Tan and
Minghui Zhou and
Zhi Jin and
Jiaxin Zhu Turnover of Companies in OpenStack:
Prevalence and Rationale . . . . . . . . 75:1--75:??
Chao Ni and
Xin Xia and
David Lo and
Xiaohu Yang and
Ahmed E. Hassan Just-In-Time Defect Prediction on
JavaScript Projects: a Replication Study 76:1--76:??
Haoye Tian and
Yinghua Li and
Weiguo Pian and
Abdoul Kader Kaboré and
Kui Liu and
Andrew Habib and
Jacques Klein and
Tegawendé F. Bissyandé Predicting Patch Correctness Based on
the Similarity of Failing Test Cases . . 77:1--77:??
Qiang Hu and
Yuejun Guo and
Maxime Cordy and
Xiaofei Xie and
Lei Ma and
Mike Papadakis and
Yves Le Traon An Empirical Study on Data
Distribution-Aware Test Selection for
Deep Learning Enhancement . . . . . . . 78:1--78:??
Ferhat Ozgur Catak and
Tao Yue and
Shaukat Ali Uncertainty-aware Prediction Validator
in Deep Learning Models for
Cyber-physical System Data . . . . . . . 79:1--79:??
Matteo Biagiola and
Paolo Tonella Testing the Plasticity of Reinforcement
Learning-based Systems . . . . . . . . . 80:1--80:??
Bianca Trinkenreich and
Igor Wiese and
Anita Sarma and
Marco Gerosa and
Igor Steinmacher Women's Participation in Open Source
Software: a Survey of the Literature . . 81:1--81:??
Mauro Pezz\`e Editorial: Announcing Six TOSEM Issues
Per Year . . . . . . . . . . . . . . . . 1:1--1:??
Marco Robol and
Travis D. Breaux and
Elda Paja and
Paolo Giorgini Consent Verification Monitoring . . . . 2:1--2:??
Pengbo Nie and
Chengcheng Wan and
Jiayu Zhu and
Ziyi Lin and
Yuting Chen and
Zhendong Su Coverage-directed Differential Testing
of X.509 Certificate Validation in
SSL/TLS Implementations . . . . . . . . 3:1--3:??
Minxue Pan and
Yifei Lu and
Yu Pei and
Tian Zhang and
Xuandong Li Preference-wise Testing of Android Apps
via Test Amplification . . . . . . . . . 4:1--4:??
Tao Chen and
Miqing Li The Weights Can Be Harmful: Pareto
Search versus Weighted Search in
Multi-objective Search-based Software
Engineering . . . . . . . . . . . . . . 5:1--5:??
Francesco Bertolotti and
Walter Cazzola Fold2Vec: Towards a Statement-Based
Representation of Code for Code
Comprehension . . . . . . . . . . . . . 6:1--6:??
Zijing Yin and
Yiwen Xu and
Fuchen Ma and
Haohao Gao and
Lei Qiao and
Yu Jiang Scanner++: Enhanced Vulnerability
Detection of Web Applications with
Attack Intent Synchronization . . . . . 7:1--7:??
Yiwen Dong and
Zheyang Li and
Yongqiang Tian and
Chengnian Sun and
Michael W. Godfrey and
Meiyappan Nagappan Bash in the Wild: Language Usage, Code
Smells, and Bugs . . . . . . . . . . . . 8:1--8:22
Xiong Xu and
Jean-Pierre Talpin and
Shuling Wang and
Bohua Zhan and
Naijun Zhan Semantics Foundation for Cyber-physical
Systems Using Higher-order UTP . . . . . 9:1--9:??
Masaki Waga and
Étienne André and
Ichiro Hasuo Parametric Timed Pattern Matching . . . 10:1--10:??
Benjamin Rombaut and
Filipe R. Cogo and
Bram Adams and
Ahmed E. Hassan There's no Such Thing as a Free Lunch:
Lessons Learned from Exploring the
Overhead Introduced by the Greenkeeper
Dependency Bot in Npm . . . . . . . . . 11:1--11:??
Danny Weyns and
Usman M. Iftikhar ActivFORMS: a Formally Founded
Model-based Approach to Engineer
Self-adaptive Systems . . . . . . . . . 12:1--12:??
Xueliang Li and
Junyang Chen and
Yepang Liu and
Kaishun Wu and
John P. Gallagher Combatting Energy Issues for Mobile
Applications . . . . . . . . . . . . . . 13:1--13:??
Milos Ojdanic and
Ezekiel Soremekun and
Renzo Degiovanni and
Mike Papadakis and
Yves Le Traon Mutation Testing in Evolving Systems:
Studying the Relevance of Mutants to
Code Evolution . . . . . . . . . . . . . 14:1--14:??
Sayedhassan Khatoonabadi and
Diego Elias Costa and
Rabe Abdalkareem and
Emad Shihab On Wasted Contributions: Understanding
the Dynamics of Contributor-Abandoned
Pull Requests --- a Mixed-Methods Study
of 10 Large Open-Source Projects . . . . 15:1--15:??
Uwe Zdun and
Pierre-Jean Queval and
Georg Simhandl and
Riccardo Scandariato and
Somik Chakravarty and
Marjan Jelic and
Aleksandar Jovanovic Microservice Security Metrics for Secure
Communication, Identity Management, and
Observability . . . . . . . . . . . . . 16:1--16:??
Aitor Arrieta and
Pablo Valle and
Joseba A. Agirre and
Goiuria Sagardui Some Seeds Are Strong: Seeding
Strategies for Search-based Test Case
Selection . . . . . . . . . . . . . . . 17:1--17:??
Jianwei Wu and
James Clause Automated Identification of Uniqueness
in JUnit Tests . . . . . . . . . . . . . 18:1--18:??
Jiahuei Lin and
Mohammed Sayagh and
Ahmed E. Hassan The Co-evolution of the WordPress
Platform and Its Plugins . . . . . . . . 19:1--19:??
Chang-Ai Sun and
Hepeng Dai and
Huai Liu and
Tsong Yueh Chen Feedback-Directed Metamorphic Testing 20:1--20:??
Aurora Ramírez and
Robert Feldt and
José Raúl Romero A Taxonomy of Information Attributes for
Test Case Prioritisation: Applicability,
Machine Learning . . . . . . . . . . . . 21:1--21:??
Sihan Xu and
Ya Gao and
Lingling Fan and
Zheli Liu and
Yang Liu and
Hua Ji LiDetector: License Incompatibility
Detection for Open Source Software . . . 22:1--22:??
Shuzheng Gao and
Cuiyun Gao and
Yulan He and
Jichuan Zeng and
Lunyiu Nie and
Xin Xia and
Michael Lyu Code Structure-Guided Transformer for
Source Code Summarization . . . . . . . 23:1--23:??
Zarrin Tasnim Sworna and
Chadni Islam and
Muhammad Ali Babar APIRO: a Framework for Automated
Security Tools API Recommendation . . . 24:1--24:??
Imen Sayar and
Alexandre Bartel and
Eric Bodden and
Yves Le Traon An In-depth Study of Java
Deserialization Remote-Code Execution
Exploits and Vulnerabilities . . . . . . 25:1--25:??
Zheyuan He and
Shuwei Song and
Yang Bai and
Xiapu Luo and
Ting Chen and
Wensheng Zhang and
Peng He and
Hongwei Li and
Xiaodong Lin and
Xiaosong Zhang TokenAware: Accurate and Efficient
Bookkeeping Recognition for Token Smart
Contracts . . . . . . . . . . . . . . . 26:1--26:??
Gyte Tamasauskaite and
Paul Groth Defining a Knowledge Graph Development
Process Through a Systematic Review . . 27:1--27:??
Christian Birchler and
Sajad Khatiri and
Pouria Derakhshanfar and
Sebastiano Panichella and
Annibale Panichella Single and Multi-objective Test Cases
Prioritization for Self-driving Cars in
Virtual Environments . . . . . . . . . . 28:1--28:??
Richard Banach Graded Refinement, Retrenchment, and
Simulation . . . . . . . . . . . . . . . 29:1--29:??
Zhen Yang and
Jacky Wai Keung and
Xiao Yu and
Yan Xiao and
Zhi Jin and
Jingyu Zhang On the Significance of Category
Prediction for Code-Comment
Synchronization . . . . . . . . . . . . 30:1--30:??
Lola Burgueño and
Paula Muñoz and
Robert Clarisó and
Jordi Cabot and
Sébastien Gérard and
Antonio Vallecillo Dealing with Belief Uncertainty in
Domain Models . . . . . . . . . . . . . 31:1--31:??
Profir-Petru Pârtachi and
David R. White and
Earl T. Barr Aide-mémoire: Improving a Project's
Collective Memory via Pull Request-Issue
Links . . . . . . . . . . . . . . . . . 32:1--32:??
Ahmed Khanfir and
Anil Koyuncu and
Mike Papadakis and
Maxime Cordy and
Tegawende F. Bissyandé and
Jacques Klein and
Yves Le Traon iBiR: Bug-report-driven Fault Injection 33:1--33:??
Chen Zeng and
Yue Yu and
Shanshan Li and
Xin Xia and
Zhiming Wang and
Mingyang Geng and
Linxiao Bai and
Wei Dong and
Xiangke Liao deGraphCS: Embedding Variable-based Flow
Graph for Neural Code Search . . . . . . 34:1--34:??
Chandra Maddila and
Sai Surya Upadrasta and
Chetan Bansal and
Nachiappan Nagappan and
Georgios Gousios and
Arie van Deursen Nudge: Accelerating Overdue Pull
Requests toward Completion . . . . . . . 35:1--35:??
Zhiqiang Zuo and
Xintao Niu and
Siyi Zhang and
Lu Fang and
Siau Cheng Khoo and
Shan Lu and
Chengnian Sun and
Guoqing Harry Xu Toward More Efficient Statistical
Debugging with Abstraction Refinement 36:1--36:??
Jaekwon Lee and
Seung Yeob Shin and
Shiva Nejati and
Lionel Briand and
Yago Isasi Parache Estimating Probabilistic Safe WCET
Ranges of Real-Time Systems at Design
Stages . . . . . . . . . . . . . . . . . 37:1--37:??
César Soto-Valero and
Thomas Durieux and
Nicolas Harrand and
Benoit Baudry Coverage-Based Debloating for Java
Bytecode . . . . . . . . . . . . . . . . 38:1--38:??
Luke Dramko and
Jeremy Lacomis and
Pengcheng Yin and
Ed Schwartz and
Miltiadis Allamanis and
Graham Neubig and
Bogdan Vasilescu and
Claire Le Goues DIRE and its Data: Neural Decompiled
Variable Renamings with Respect to
Software Class . . . . . . . . . . . . . 39:1--39:??
Bowen Shen and
Muhammad Ali Gulzar and
Fei He and
Na Meng A Characterization Study of Merge
Conflicts in Java Projects . . . . . . . 40:1--40:??
Andreea Costea and
Abhishek Tiwari and
Sigmund Chianasta and
Kishore R. and
Abhik Roychoudhury and
Ilya Sergey Hippodrome: Data Race Repair Using
Static Analysis Summaries . . . . . . . 41:1--41:??
Jinhan Kim and
Robert Feldt and
Shin Yoo Evaluating Surprise Adequacy for Deep
Learning System Testing . . . . . . . . 42:1--42:??
Filipe Roseiro Cogo and
Xin Xia and
Ahmed E. Hassan Assessing the Alignment between the
Information Needs of Developers and the
Documentation of Programming Languages:
a Case Study on Rust . . . . . . . . . . 43:1--43:??
Najd Altoyan and
Don Batory On Proving the Correctness of
Refactoring Class Diagrams of MDE
Metamodels . . . . . . . . . . . . . . . 44:1--44:??
Chao Wang and
Hao He and
Uma Pal and
Darko Marinov and
Minghui Zhou Suboptimal Comments in Java Projects:
From Independent Comment Changes to
Commenting Practices . . . . . . . . . . 45:1--45:??
Jiezhu Cheng and
Cuiyun Gao and
Zibin Zheng HINNPerf: Hierarchical Interaction
Neural Network for Performance
Prediction of Configurable Systems . . . 46:1--46:??
Hichem Belgacem and
Xiaochen Li and
Domenico Bianculli and
Lionel Briand A Machine Learning Approach for
Automated Filling of Categorical Fields
in Data Entry Forms . . . . . . . . . . 47:1--47:??
Zishuo Ding and
Heng Li and
Weiyi Shang and
Tse-Hsun (Peter) Chen Towards Learning Generalizable Code
Embeddings Using Task-agnostic Graph
Convolutional Networks . . . . . . . . . 48:1--48:??
Tahereh Zohdinasab and
Vincenzo Riccio and
Alessio Gambi and
Paolo Tonella Efficient and Effective Feature Space
Exploration for Testing Deep Learning
Systems . . . . . . . . . . . . . . . . 49:1--49:??
Xiaoyu Sun and
Xiao Chen and
Li Li and
Haipeng Cai and
John Grundy and
Jordan Samhi and
Tegawendé Bissyandé and
Jacques Klein Demystifying Hidden Sensitive Operations
in Android Apps . . . . . . . . . . . . 50:1--50:??
Hugo Araujo and
Mohammad Reza Mousavi and
Mahsa Varshosaz Testing, Validation, and Verification of
Robotic and Autonomous Systems: a
Systematic Review . . . . . . . . . . . 51:1--51:??
Andrea Fioraldi and
Alessandro Mantovani and
Dominik Maier and
Davide Balzarotti Dissecting American Fuzzy Lop: a
FuzzBench Evaluation . . . . . . . . . . 52:1--52:??
Zenong Zhang and
George Klees and
Eric Wang and
Michael Hicks and
Shiyi Wei Fuzzing Configurations of Program
Options . . . . . . . . . . . . . . . . 53:1--53:??
Andrea Fioraldi and
Alessandro Mantovani and
Dominik Maier and
Davide Balzarotti Dissecting American Fuzzy Lop --- a
FuzzBench Evaluation --- RCR Report . . 54:1--54:??
Zenong Zhang and
George Klees and
Eric Wang and
Michael Hicks and
Shiyi Wei Fuzzing Configurations of Program
Options --- RCR Report . . . . . . . . . 55:1--55:??
Juan Cruz-Carlon and
Mahsa Varshosaz and
Claire Le Goues and
Andrzej Wasowski Patching Locking Bugs Statically with
Crayons . . . . . . . . . . . . . . . . 56:1--56:??
Maha Ayub and
Tania Saleem and
Muhammad Janjua and
Talha Ahmad Storage State Analysis and Extraction of
Ethereum Blockchain Smart Contracts . . 57:1--57:??
Thomas Laurent and
Stefan Klikovits and
Paolo Arcaini and
Fuyuki Ishikawa and
Anthony Ventresque Parameter Coverage for Testing of
Autonomous Driving Systems under
Uncertainty . . . . . . . . . . . . . . 58:1--58:??
Michael Pacheco and
Gustavo Oliva and
Gopi Krishnan Rajbahadur and
Ahmed Hassan Is My Transaction Done Yet? An Empirical
Study of Transaction Processing Times in
the Ethereum Blockchain Platform . . . . 59:1--59:??
Nikhil Patnaik and
Andrew Dwyer and
Joseph Hallett and
Awais Rashid SLR: From Saltzer and Schroeder to 2021
\ldots 47 Years of Research on the
Development and Validation of Security
API Recommendations . . . . . . . . . . 60:1--60:??
Fuchen Ma and
Meng Ren and
Lerong Ouyang and
Yuanliang Chen and
Juan Zhu and
Ting Chen and
Yingli Zheng and
Xiao Dai and
Yu Jiang and
Jiaguang Sun Pied-Piper: Revealing the Backdoor
Threats in Ethereum ERC Token Contracts 61:1--61:??
Yedi Zhang and
Zhe Zhao and
Guangke Chen and
Fu Song and
Taolue Chen Precise Quantitative Analysis of
Binarized Neural Networks: a BDD-based
Approach . . . . . . . . . . . . . . . . 62:1--62:??
Francisca Pérez and
Raúl Lapeña and
Ana Marcén and
Carlos Cetina How the Quality of Maintenance Tasks is
Affected by Criteria for Selecting
Engineers for Collaboration . . . . . . 63:1--63:??
Tamara Lopez and
Helen Sharp and
Arosha Bandara and
Thein Tun and
Mark Levine and
Bashar Nuseibeh Security Responses in Software
Development . . . . . . . . . . . . . . 64:1--64:??
Deheng Yang and
Yan Lei and
Xiaoguang Mao and
Yuhua Qi and
Xin Yi Seeing the Whole Elephant:
Systematically Understanding and
Uncovering Evaluation Biases in
Automated Program Repair . . . . . . . . 65:1--65:??
Chengpeng Wang and
Wenyang Wang and
Peisen Yao and
Qingkai Shi and
Jinguo Zhou and
Xiao Xiao and
Charles Zhang Anchor: Fast and Precise Value-flow
Analysis for Containers via Memory
Orientation . . . . . . . . . . . . . . 66:1--66:??
Andrea Di Sorbo and
Fiorella Zampetti and
Aaron Visaggio and
Massimiliano Di Penta and
Sebastiano Panichella Automated Identification and Qualitative
Characterization of Safety Concerns
Reported in UAV Software Platforms . . . 67:1--67:??
Tao Chen and
Miqing Li Do Performance Aspirations Matter for
Guiding Software Configuration Tuning?
An Empirical Investigation under Dual
Performance Objectives . . . . . . . . . 68:1--68:??
Lina Gong and
Jingxuan Zhang and
Mingqiang Wei and
Haoxiang Zhang and
Zhiqiu Huang What Is the Intended Usage Context of
This Model? An Exploratory Study of
Pre-Trained Models on Various Model
Repositories . . . . . . . . . . . . . . 69:1--69:??
Chris Karanikolas and
Grigoris Dimitroulakos and
Konstantinos Masselos Simulating Software Evolution to
Evaluate the Reliability of Early
Decision-making among Design
Alternatives toward Maintainability . . 70:1--70:??
Jun-Wei Lin and
Navid Salehnamadi and
Sam Malek Route: Roads Not Taken in UI Testing . . 71:1--71:??
Zhichao Chen and
Junjie Chen and
Weijing Wang and
Jianyi Zhou and
Meng Wang and
Xiang Chen and
Shan Zhou and
Jianmin Wang Exploring Better Black-Box Test Case
Prioritization via Log Analysis . . . . 72:1--72:??
Fiorella Zampetti and
Damian Tamburri and
Sebastiano Panichella and
Annibale Panichella and
Gerardo Canfora and
Massimiliano Di Penta Continuous Integration and Delivery
Practices for Cyber-Physical Systems: an
Interview-Based Study . . . . . . . . . 73:1--73:??
Christiaan Verwijs and
Daniel Russo A Theory of Scrum Team Effectiveness . . 74:1--74:??
Michel Nass and
Emil Alégroth and
Robert Feldt and
Maurizio Leotta and
Filippo Ricca Similarity-based Web Element
Localization for Robust Test Automation 75:1--75:??
Yuriy Brun and
Tian Lin and
Jessie Elise Somerville and
Elisha M. Myers and
Natalie Ebner Blindspots in Python and Java APIs
Result in Vulnerable Code . . . . . . . 76:1--76:??
Eric S. Liu and
Dylan A. Lukes and
William G. Griswold Refactoring in Computational Notebooks 77:1--77:??
Zhuo Zhang and
Yan Lei and
Ting Su and
Meng Yan and
Xiaoguang Mao and
Yue Yu Influential Global and Local Contexts
Guided Trace Representation for Fault
Localization . . . . . . . . . . . . . . 78:1--78:??
Mohammed Attaoui and
Hazem Fahmy and
Fabrizio Pastore and
Lionel Briand Black-box Safety Analysis and Retraining
of DNNs based on Feature Extraction and
Clustering . . . . . . . . . . . . . . . 79:1--79:??
Zhipeng Gao and
Xin Xia and
David Lo and
John Grundy and
Xindong Zhang and
Zhenchang Xing I Know What You Are Searching for: Code
Snippet Recommendation from Stack
Overflow Posts . . . . . . . . . . . . . 80:1--80:??
Swaroopa Dola and
Matthew B. Dwyer and
Mary Lou Soffa Input Distribution Coverage: Measuring
Feature Interaction Adequacy in Neural
Network Testing . . . . . . . . . . . . 81:1--81:??
Mohan Cui and
Chengjun Chen and
Hui Xu and
Yangfan Zhou SafeDrop: Detecting Memory Deallocation
Bugs of Rust Programs via Static
Data-flow Analysis . . . . . . . . . . . 82:1--82:??
Benjamin Shreeve and
Catarina Gralha and
Awais Rashid and
João Araújo and
Miguel Goulão Making Sense of the Unknown: How
Managers Make Cyber Security Decisions 83:1--83:??
Negar Ghorbani and
Reyhaneh Jabbarvand and
Navid Salehnamadi and
Joshua Garcia and
Sam Malek DeltaDroid: Dynamic Delivery Testing in
Android . . . . . . . . . . . . . . . . 84:1--84:??
Jeongju Sohn and
Sungmin Kang and
Shin Yoo Arachne: Search-Based Repair of Deep
Neural Networks . . . . . . . . . . . . 85:1--85:??
Mitchell Joblin and
Barbara Eckl and
Thomas Bock and
Angelika Schmid and
Janet Siegmund and
Sven Apel Hierarchical and Hybrid Organizational
Structures in Open-source Software
Projects: a Longitudinal Study . . . . . 86:1--86:??
Ang Jia and
Ming Fan and
Wuxia Jin and
Xi Xu and
Zhaohui Zhou and
Qiyi Tang and
Sen Nie and
Shi Wu and
Ting Liu $1$-to-$1$ or $1$-to-$n$? Investigating
the Effect of Function Inlining on
Binary Similarity Analysis . . . . . . . 87:1--87:??
Vittoria Nardone and
Biruk Muse and
Mouna Abidi and
Foutse Khomh and
Massimiliano Di Penta Video Game Bad Smells: What They Are and
How Developers Perceive Them . . . . . . 88:1--88:??
Xueling Zhang and
John Heaps and
Rocky Slavin and
Jianwei Niu and
Travis Breaux and
Xiaoyin Wang DAISY: Dynamic-Analysis-Induced Source
Discovery for Sensitive Data . . . . . . 89:1--89:??
Huaijin Wang and
Pingchuan Ma and
Shuai Wang and
Qiyi Tang and
Sen Nie and
Shi Wu sem2vec: Semantics-aware Assembly
Tracelet Embedding . . . . . . . . . . . 90:1--90:??
Mahmoud Alfadel and
Diego Elias Costa and
Emad Shihab and
Bram Adams On the Discoverability of npm
Vulnerabilities in \tt Node.js Projects 91:1--91:??
Haoye Tian and
Kui Liu and
Yinghua Li and
Abdoul Kader Kaboré and
Anil Koyuncu and
Andrew Habib and
Li Li and
Junhao Wen and
Jacques Klein and
Tegawendé F. Bissyandé The Best of Both Worlds: Combining
Learned Embeddings with Engineered
Features for Accurate Prediction of
Correct Patches . . . . . . . . . . . . 92:1--92:??
Xianhao Jin and
Francisco Servant HybridCISave: a Combined Build and Test
Selection Approach in Continuous
Integration . . . . . . . . . . . . . . 93:1--93:??
Daniel Venturini and
Filipe Roseiro Cogo and
Ivanilton Polato and
Marco A. Gerosa and
Igor Scaliante Wiese I Depended on You and You Broke Me: an
Empirical Study of Manifesting Breaking
Changes in Client Packages . . . . . . . 94:1--94:??
Liping Han and
Shaukat Ali and
Tao Yue and
Aitor Arrieta and
Maite Arratibel Uncertainty-Aware Robustness Assessment
of Industrial Elevator Systems . . . . . 95:1--95:??
Kui Liu and
Jingtang Zhang and
Li Li and
Anil Koyuncu and
Dongsun Kim and
Chunpeng Ge and
Zhe Liu and
Jacques Klein and
Tegawendé F. Bissyandé Reliable Fix Patterns Inferred from
Static Checkers for Automated Program
Repair . . . . . . . . . . . . . . . . . 96:1--96:??
Ting Zhang and
Donggyun Han and
Venkatesh Vinayakarao and
Ivana Clairine Irsan and
Bowen Xu and
Ferdian Thung and
David Lo and
Lingxiao Jiang Duplicate Bug Report Detection: How Far
Are We? . . . . . . . . . . . . . . . . 97:1--97:??
Chenguang Zhu and
Mengshi Zhang and
Xiuheng Wu and
Xiufeng Xu and
Yi Li Client-Specific Upgrade Compatibility
Checking via Knowledge-Guided Discovery 98:1--98:??
Akond Rahman and
Shazibul Islam Shamim and
Dibyendu Brinto Bose and
Rahul Pandita Security Misconfigurations in Open
Source Kubernetes Manifests: an
Empirical Study . . . . . . . . . . . . 99:1--99:??
Mifta Sintaha and
Noor Nashid and
Ali Mesbah Katana: Dual Slicing Based Context for
Learning Bug Fixes . . . . . . . . . . . 100:1--100:??
Dongjie He and
Jingbo Lu and
Jingling Xue IFDS-based Context Debloating for
Object-Sensitive Pointer Analysis . . . 101:1--101:??
Zhaoqiang Guo and
Shiran Liu and
Xutong Liu and
Wei Lai and
Mingliang Ma and
Xu Zhang and
Chao Ni and
Yibiao Yang and
Yanhui Li and
Lin Chen and
Guoqiang Zhou and
Yuming Zhou Code-line-level Bugginess
Identification: How Far have We Come,
and How Far have We Yet to Go? . . . . . 102:1--102:??
Nengkun Yu Structured Theorem for Quantum Programs
and its Applications . . . . . . . . . . 103:1--103:??
Hazem Fahmy and
Fabrizio Pastore and
Lionel Briand and
Thomas Stifter Simulator-based Explanation and
Debugging of Hazard-triggering Events in
DNN-based Safety-critical Systems . . . 104:1--104:??
Houssem Ben Braiek and
Foutse Khomh Testing Feedforward Neural Networks
Training Programs . . . . . . . . . . . 105:1--105:??
Zhenpeng Chen and
Jie M. Zhang and
Federica Sarro and
Mark Harman A Comprehensive Empirical Study of Bias
Mitigation Methods for Machine Learning
Classifiers . . . . . . . . . . . . . . 106:1--106:??
Deepika Badampudi and
Michael Unterkalmsteiner and
Ricardo Britto Modern Code Reviews --- Survey of
Literature and Practice . . . . . . . . 107:1--107:??
Dulaji Hidellaarachchi and
John Grundy and
Rashina Hoda and
Ingo Mueller The Influence of Human Aspects on
Requirements Engineering-related
Activities: Software Practitioners'
Perspective . . . . . . . . . . . . . . 108:1--108:??
Di Wu and
Xiao-Yuan Jing and
Hongyu Zhang and
Yang Feng and
Haowen Chen and
Yuming Zhou and
Baowen Xu Retrieving API Knowledge from Tutorials
and Stack Overflow Based on Natural
Language Queries . . . . . . . . . . . . 109:1--109:??
Thomas Wolter and
Ann Barcomb and
Dirk Riehle and
Nikolay Harutyunyan Open Source License Inconsistencies on
GitHub . . . . . . . . . . . . . . . . . 110:1--110:??
Katharina Müller and
Christian Koch and
Dirk Riehle and
Michael Stops and
Nikolay Harutyunyan Challenges of Working from Home in
Software Development During Covid-19
Lockdowns . . . . . . . . . . . . . . . 111:1--111:??
Sofonias Yitagesu and
Zhenchang Xing and
Xiaowang Zhang and
Zhiyong Feng and
Xiaohong Li and
Linyi Han Extraction of Phrase-based Concepts in
Vulnerability Descriptions through
Unsupervised Labeling . . . . . . . . . 112:1--112:??
Qinghua Xu and
Shaukat Ali and
Tao Yue Digital Twin-based Anomaly Detection
with Curriculum Learning in
Cyber-physical Systems . . . . . . . . . 113:1--113:??
Luigi Lavazza and
Angela Locoro and
Geng Liu and
Roberto Meli Estimating Software Functional Size via
Machine Learning . . . . . . . . . . . . 114:1--114:??
Jia Yang and
Cai Fu and
Fengyang Deng and
Ming Wen and
Xiaowei Guo and
Chuanhao Wan Toward Interpretable Graph Tensor
Convolution Neural Network for Code
Semantics Embedding . . . . . . . . . . 115:1--115:??
Shrikanth N. C. and
Tim Menzies Assessing the Early Bird Heuristic (for
Predicting Project Quality) . . . . . . 116:1--116:??
Matteo Camilli and
Carmine Colarusso and
Barbara Russo and
Eugenio Zimeo Actor-Driven Decomposition of
Microservices through Multi-level
Scalability Assessment . . . . . . . . . 117:1--117:??
Jaydeb Sarker and
Asif Kamal Turzo and
Ming Dong and
Amiangshu Bosu Automated Identification of Toxic Code
Reviews Using ToxiCR . . . . . . . . . . 118:1--118:??
Xuanzhe Liu and
Jinfeng Wen and
Zhenpeng Chen and
Ding Li and
Junkai Chen and
Yi Liu and
Haoyu Wang and
Xin Jin FaaSLight: General Application-level
Cold-start Latency Optimization for
Function-as-a-Service in Serverless
Computing . . . . . . . . . . . . . . . 119:1--119:??
Matthew C. Davis and
Emad Aghayi and
Thomas D. Latoza and
Xiaoyin Wang and
Brad A. Myers and
Joshua Sunshine What's (Not) Working in Programmer User
Studies? . . . . . . . . . . . . . . . . 120:1--120:??
Florian Sattler and
Sebastian Böhm and
Philipp Dominik Schubert and
Norbert Siegmund and
Sven Apel SEAL: Integrating Program Analysis and
Repository Mining . . . . . . . . . . . 121:1--121:??
Man Zhang and
Andrea Arcuri and
Yonggang Li and
Yang Liu and
Kaiming Xue White-Box Fuzzing RPC-Based APIs with
EvoMaster: an Industrial Case Study . . 122:1--122:??
Hongwei Wei and
Xiaohong Su and
Cuiyun Gao and
Weining Zheng and
Wenxin Tao A Hypothesis Testing-based Framework for
Software Cross-modal Retrieval in
Heterogeneous Semantic Spaces . . . . . 123:1--123:??
Shuncheng Tang and
Zhenya Zhang and
Yi Zhang and
Jixiang Zhou and
Yan Guo and
Shuang Liu and
Shengjian Guo and
Yan-Fu Li and
Lei Ma and
Yinxing Xue and
Yang Liu A Survey on Automated Driving System
Testing: Landscapes and Trends . . . . . 124:1--124:??
Jialuo Chen and
Jingyi Wang and
Xingjun Ma and
Youcheng Sun and
Jun Sun and
Peixin Zhang and
Peng Cheng QuoTe: Quality-oriented Testing for Deep
Learning Systems . . . . . . . . . . . . 125:1--125:??
Yuan Huang and
Hanyang Guo and
Xi Ding and
Junhuai Shu and
Xiangping Chen and
Xiapu Luo and
Zibin Zheng and
Xiaocong Zhou A Comparative Study on Method Comment
and Inline Comment . . . . . . . . . . . 126:1--126:??
Meiziniu Li and
Jialun Cao and
Yongqiang Tian and
Tsz On Li and
Ming Wen and
Shing-Chi Cheung COMET: Coverage-guided Model Generation
For Deep Learning Library Testing . . . 127:1--127:??
Yongqiang Tian and
Wuqi Zhang and
Ming Wen and
Shing-Chi Cheung and
Chengnian Sun and
Shiqing Ma and
Yu Jiang Finding Deviated Behaviors of the
Compressed DNN Models for Image
Classifications . . . . . . . . . . . . 128:1--128:??
Hua Qi and
Zhijie Wang and
Qing Guo and
Jianlang Chen and
Felix Juefei-Xu and
Fuyuan Zhang and
Lei Ma and
Jianjun Zhao ArchRepair: Block-Level
Architecture-Oriented Repairing for Deep
Neural Networks . . . . . . . . . . . . 129:1--129:??
Zibin Zheng and
Weili Chen and
Zhijie Zhong and
Zhiguang Chen and
Yutong Lu Securing the Ethereum from Smart Ponzi
Schemes: Identification Using Static
Features . . . . . . . . . . . . . . . . 130:1--130:??
Jinfeng Wen and
Zhenpeng Chen and
Xin Jin and
Xuanzhe Liu Rise of the Planet of Serverless
Computing: a Systematic Review . . . . . 131:1--131:??
Adrian Herrera and
Mathias Payer and
Antony L. Hosking DatAFLow: Toward a Data-Flow-Guided
Fuzzer . . . . . . . . . . . . . . . . . 132:1--132:??
Adrian Herrera and
Mathias Payer and
Antony L. Hosking DatAFLow: Toward a Data-flow-guided
Fuzzer . . . . . . . . . . . . . . . . . 133:1--133:??
Suvodeep Majumder and
Joymallya Chakraborty and
Gina R. Bai and
Kathryn T. Stolee and
Tim Menzies Fair Enough: Searching for Sufficient
Measures of Fairness . . . . . . . . . . 134:1--134:??
Junjie Chen and
Yihua Liang and
Qingchao Shen and
Jiajun Jiang and
Shuochuan Li Toward Understanding Deep Learning
Framework Bugs . . . . . . . . . . . . . 135:1--135:??
Foyzul Hassan and
Na Meng and
Xiaoyin Wang UniLoc: Unified Fault Localization of
Continuous Integration Failures . . . . 136:1--136:??
Mengdi Zhang and
Jun Sun and
Jingyi Wang and
Bing Sun TestSGD: Interpretable Testing of Neural
Networks against Subtle Group
Discrimination . . . . . . . . . . . . . 137:1--137:??
Thomas Bock and
Nils Alznauer and
Mitchell Joblin and
Sven Apel Automatic Core-Developer Identification
on GitHub: a Validation Study . . . . . 138:1--138:??
Man Zhang and
Asma Belhadi and
Andrea Arcuri JavaScript SBST Heuristics to Enable
Effective Fuzzing of NodeJS Web APIs . . 139:1--139:??
Chong Wang and
Xin Peng and
Zhenchang Xing and
Yue Zhang and
Mingwei Liu and
Rong Luo and
Xiujie Meng XCoS: Explainable Code Search Based on
Query Scoping and Knowledge Graph . . . 140:1--140:??
Maram Assi and
Safwat Hassan and
Stefanos Georgiou and
Ying Zou Predicting the Change Impact of
Resolving Defects by Leveraging the
Topics of Issue Reports in Open Source
Software Systems . . . . . . . . . . . . 141:1--141:??
Giovanni Rosa and
Simone Scalabrino and
Gabriele Bavota and
Rocco Oliveto What Quality Aspects Influence the
Adoption of Docker Images? . . . . . . . 142:1--142:??
Jia Li and
Ge Li and
Zhuo Li and
Zhi Jin and
Xing Hu and
Kechi Zhang and
Zhiyi Fu CodeEditor: Learning to Edit Source Code
with Pre-trained Models . . . . . . . . 143:1--143:??
Man Zhang and
Andrea Arcuri Open Problems in Fuzzing RESTful APIs: a
Comparison of Tools . . . . . . . . . . 144:1--144:??
Sahil Suneja and
Yufan Zhuang and
Yunhui Zheng and
Jim Laredo and
Alessandro Morari and
Udayan Khurana Incorporating Signal Awareness in Source
Code Modeling: an Application to
Vulnerability Detection . . . . . . . . 145:1--145:??
Mohamed Amine Batoun and
Ka Lai Yung and
Yuan Tian and
Mohammed Sayagh An Empirical Study on GitHub Pull
Requests' Reactions . . . . . . . . . . 146:1--146:??
Qing Huang and
Dianshu Liao and
Zhenchang Xing and
Zhengkang Zuo and
Changjing Wang and
Xin Xia Semantic-Enriched Code Knowledge Graph
to Reveal Unknowns in Smart Contract
Code Reuse . . . . . . . . . . . . . . . 147:1--147:??
Jingxuan Zhang and
Junpeng Luo and
Jiahui Liang and
Lina Gong and
Zhiqiu Huang An Accurate Identifier Renaming
Prediction and Suggestion Approach . . . 148:1--148:??
Abbas Javan Jafari and
Diego Elias Costa and
Emad Shihab and
Rabe Abdalkareem Dependency Update Strategies and Package
Characteristics . . . . . . . . . . . . 149:1--149:??
Zhengyuan Wei and
Haipeng Wang and
Imran Ashraf and
Wing-Kwong Chan DeepPatch: Maintaining Deep Learning
Model Programs to Retain Standard
Accuracy with Substantial Robustness
Improvement . . . . . . . . . . . . . . 150:1--150:??
Canh Minh Do and
Yati Phyo and
Adrián Riesco and
Kazuhiro Ogata Optimization Techniques for Model
Checking Leads-to Properties in a
Stratified Way . . . . . . . . . . . . . 151:1--151:??
Weifeng Sun and
Meng Yan and
Zhongxin Liu and
Xin Xia and
Yan Lei and
David Lo Revisiting the Identification of the
Co-evolution of Production and Test Code 152:1--152:??
Ran Mo and
Yao Zhang and
Yushuo Wang and
Siyuan Zhang and
Pu Xiong and
Zengyang Li and
Yang Zhao Exploring the Impact of Code Clones on
Deep Learning Software . . . . . . . . . 153:1--153:??
Yuheng Huang and
Lei Ma and
Yuanchun Li PatchCensor: Patch Robustness
Certification for Transformers via
Exhaustive Testing . . . . . . . . . . . 154:1--154:??
Wiebke (Toussaint) Hutiri and
Aaron Yi Ding and
Fahim Kawsar and
Akhil Mathur Tiny, Always-on, and Fragile: Bias
Propagation through Design Choices in
On-device Machine Learning Workflows . . 155:1--155:??
Xuanzhe Liu and
Diandian Gu and
Zhenpeng Chen and
Jinfeng Wen and
Zili Zhang and
Yun Ma and
Haoyu Wang and
Xin Jin Rise of Distributed Deep Learning
Training in the Big Model Era: From a
Software Engineering Perspective . . . . 156:1--156:??
Shangwen Wang and
Ming Wen and
Bo Lin and
Yepang Liu and
Tegawendé F. Bissyandé and
Xiaoguang Mao Pre-implementation Method Name
Prediction for Object-oriented
Programming . . . . . . . . . . . . . . 157:1--157:??
Shouguo Yang and
Zhengzi Xu and
Yang Xiao and
Zhe Lang and
Wei Tang and
Yang Liu and
Zhiqiang Shi and
Hong Li and
Limin Sun Towards Practical Binary Code Similarity
Detection: Vulnerability Verification
via Patch Semantic Analysis . . . . . . 158:1--158:??
Mohammad Masudur Rahman and
Chanchal K. Roy A Systematic Review of Automated Query
Reformulations in Source Code Search . . 159:1--159:??
Shisong Qin and
Fan Hu and
Zheyu Ma and
Bodong Zhao and
Tingting Yin and
Chao Zhang NSFuzz: Towards Efficient and
State-Aware Network Service Fuzzing . . 160:1--160:??
Fan Hu and
Shisong Qin and
Zheyu Ma and
Bodong Zhao and
Tingting Yin and
Chao Zhang NSFuzz: Towards Efficient and
State-Aware Network Service Fuzzing ---
RCR Report . . . . . . . . . . . . . . . 161:1--161:??
Mauro Pezz\`e Editorial: Toward the Future with Eight
Issues Per Year . . . . . . . . . . . . 1:1--1:??
Shouguo Yang and
Chaopeng Dong and
Yang Xiao and
Yiran Cheng and
Zhiqiang Shi and
Zhi Li and
Limin Sun Asteria-Pro: Enhancing Deep
Learning-based Binary Code Similarity
Detection by Incorporating Domain
Knowledge . . . . . . . . . . . . . . . 1:1--1:??
Xuanzhe Liu and
Chengxu Yang and
Ding Li and
Yuhan Zhou and
Shaofei Li and
Jiali Chen and
Zhenpeng Chen Adonis: Practical and Efficient Control
Flow Recovery through OS-level Traces 2:1--2:??
Suyu Ma and
Chunyang Chen and
Hourieh Khalajzadeh and
John Grundy A First Look at Dark Mode in Real-world
Android Apps . . . . . . . . . . . . . . 3:1--3:??
Jiarong Wu and
Lili Wei and
Yanyan Jiang and
Shing-Chi Cheung and
Luyao Ren and
Chang Xu Programming by Example Made Easy . . . . 4:1--4:??
Narjes Bessghaier and
Mohammed Sayagh and
Ali Ouni and
Mohamed Wiem Mkaouer What Constitutes the Deployment and
Runtime Configuration System? An
Empirical Study on OpenStack Projects 5:1--5:??
Qing Huang and
Yanbang Sun and
Zhenchang Xing and
Min Yu and
Xiwei Xu and
Qinghua Lu API Entity and Relation Joint Extraction
from Text via Dynamic Prompt-tuned
Language Model . . . . . . . . . . . . . 6:1--6:??
Jeho Oh and
Don Batory and
Rubén Heradio Finding Near-optimal Configurations in
Colossal Spaces with Statistical
Guarantees . . . . . . . . . . . . . . . 7:1--7:??
Chang-Ai Sun and
Hepeng Dai and
Ning Geng and
Huai Liu and
Tsong Yueh Chen and
Peng Wu and
Yan Cai and
Jinqiu Wang An Interleaving Guided Metamorphic
Testing Approach for Concurrent Programs 8:1--8:??
Toni Taipalus and
Hilkka Grahn Framework for SQL Error Message Design:
a Data-Driven Approach . . . . . . . . . 9:1--9:??
Andrew G. Clark and
Michael Foster and
Benedikt Prifling and
Neil Walkinshaw and
Robert M. Hierons and
Volker Schmidt and
Robert D. Turner Testing Causality in Scientific
Modelling Software . . . . . . . . . . . 10:1--10:??
Jianzhong Liu and
Yuheng Shen and
Yiru Xu and
Hao Sun and
Yu Jiang Horus: Accelerating Kernel Fuzzing
through Efficient Host--VM Memory Access
Procedures . . . . . . . . . . . . . . . 11:1--11:??
Sina Entekhabi and
Wojciech Mostowski and
Mohammad Reza Mousavi Automated and Efficient Test-Generation
for Grid-Based Multiagent Systems:
Comparing Random Input Filtering versus
Constraint Solving . . . . . . . . . . . 12:1--12:??
Carlo A. Furia and
Richard Torkar and
Robert Feldt Towards Causal Analysis of Empirical
Software Engineering Data: The Impact of
Programming Languages on Coding
Competitions . . . . . . . . . . . . . . 13:1--13:??
Olivier Nourry and
Yutaro Kashiwa and
Bin Lin and
Gabriele Bavota and
Michele Lanza and
Yasutaka Kamei The Human Side of Fuzzing: Challenges
Faced by Developers during Fuzzing
Activities . . . . . . . . . . . . . . . 14:1--14:??
Pei Liu and
Yanjie Zhao and
Mattia Fazzini and
Haipeng Cai and
John Grundy and
Li Li Automatically Detecting Incompatible
Android APIs . . . . . . . . . . . . . . 15:1--15:??
Hengcheng Zhu and
Lili Wei and
Valerio Terragni and
Yepang Liu and
Shing-Chi Cheung and
Jiarong Wu and
Qin Sheng and
Bing Zhang and
Lihong Song StubCoder: Automated Generation and
Repair of Stub Code for Mock Objects . . 16:1--16:??
Yongqiang Tian and
Xueyan Zhang and
Yiwen Dong and
Zhenyang Xu and
Mengxiao Zhang and
Yu Jiang and
Shing-Chi Cheung and
Chengnian Sun On the Caching Schemes to Speed Up
Program Reduction . . . . . . . . . . . 17:1--17:??
Claudio Mandrioli and
Max Nyberg Carlsson and
Martina Maggio Testing Abstractions for Cyber-Physical
Control Systems . . . . . . . . . . . . 18:1--18:??
Wang Fang and
Mingsheng Ying and
Xiaodi Wu Differentiable Quantum Programming with
Unbounded Loops . . . . . . . . . . . . 19:1--19:??
Yuanhang Yang and
Wei He and
Cuiyun Gao and
Zenglin Xu and
Xin Xia and
Chuanyi Liu TopicAns: Topic-informed Architecture
for Answer Recommendation on Technical
Q&A Site . . . . . . . . . . . . . . . . 20:1--20:??
Tianlin Li and
Xiaofei Xie and
Jian Wang and
Qing Guo and
Aishan Liu and
Lei Ma and
Yang Liu Faire: Repairing Fairness of Neural
Networks via Neuron Condition Synthesis 21:1--21:??
Xueqi Dang and
Yinghua Li and
Mike Papadakis and
Jacques Klein and
Tegawendé F. Bissyandé and
Yves Le Traon GraphPrior: Mutation-based Test Input
Prioritization for Graph Neural Networks 22:1--22:??
Yuhan Zhi and
Xiaofei Xie and
Chao Shen and
Jun Sun and
Xiaoyu Zhang and
Xiaohong Guan Seed Selection for Testing Deep Neural
Networks . . . . . . . . . . . . . . . . 23:1--23:??
Hanyang Guo and
Xiangping Chen and
Yuan Huang and
Yanlin Wang and
Xi Ding and
Zibin Zheng and
Xiaocong Zhou and
Hong-Ning Dai Snippet Comment Generation Based on Code
Context Expansion . . . . . . . . . . . 24:1--24:??
Qiang Hu and
Yuejun Guo and
Xiaofei Xie and
Maxime Cordy and
Mike Papadakis and
Yves Le Traon LaF: Labeling-free Model Selection for
Automated Deep Neural Network Reusing 25:1--25:??
Han Hu and
Yujin Huang and
Qiuyuan Chen and
Terry Yue Zhuo and
Chunyang Chen A First Look at On-device Models in iOS
Apps . . . . . . . . . . . . . . . . . . 26:1--26:??
Amid Golmohammadi and
Man Zhang and
Andrea Arcuri Testing RESTful APIs: a Survey . . . . . 27:1--27:??
Michael Weiss and
Paolo Tonella Adopting Two Supervisors for Efficient
Use of Large-Scale Remote Deep Neural
Networks . . . . . . . . . . . . . . . . 28:1--28:??
Michael Weiss and
Paolo Tonella Adopting Two Supervisors for Efficient
Use of Large-Scale Remote Deep Neural
Networks --- RCR Report . . . . . . . . 29:1--29:??
Yu Zhou and
Weilin Zhan and
Zi Li and
Tingting Han and
Taolue Chen and
Harald Gall DRIVE: Dockerfile Rule Mining and
Violation Detection . . . . . . . . . . 30:1--30:??
Qing Huang and
Zhiqiang Yuan and
Zhenchang Xing and
Xin Peng and
Xiwei Xu and
Qinghua Lu FQN Inference in Partial Code by
Prompt-tuned Language Model of Code . . 31:1--31:??
Jaekwon Lee and
Seung Yeob Shin and
Lionel C. Briand and
Shiva Nejati Probabilistic Safe WCET Estimation for
Weakly Hard Real-time Systems at Design
Stages . . . . . . . . . . . . . . . . . 32:1--32:??
Knut H. Rolland and
Brian Fitzgerald and
Torgeir Dingsòyr and
Klaas-Jan Stol Acrobats and Safety Nets: Problematizing
Large-Scale Agile Software Development 33:1--33:??
Xiaoye Zheng and
Zhiyuan Wan and
Yun Zhang and
Rui Chang and
David Lo A Closer Look at the Security Risks in
the Rust Ecosystem . . . . . . . . . . . 34:1--34:??
Claudio Mandrioli and
Seung Yeob Shin and
Martina Maggio and
Domenico Bianculli and
Lionel Briand Stress Testing Control Loops in
Cyber-physical Systems . . . . . . . . . 35:1--35:??
Sayedhassan Khatoonabadi and
Diego Elias Costa and
Suhaib Mujahid and
Emad Shihab Understanding the Helpfulness of Stale
Bot for Pull-Based Development: an
Empirical Study of 20 Large Open-Source
Projects . . . . . . . . . . . . . . . . 36:1--36:??
Yixuan Zhang and
Shangtong Cao and
Haoyu Wang and
Zhenpeng Chen and
Xiapu Luo and
Dongliang Mu and
Yun Ma and
Gang Huang and
Xuanzhe Liu Characterizing and Detecting WebAssembly
Runtime Bugs . . . . . . . . . . . . . . 37:1--37:??
Zishuo Ding and
Yiming Tang and
Xiaoyu Cheng and
Heng Li and
Weiyi Shang LoGenText-Plus: Improving Neural Machine
Translation Based Logging Texts
Generation with Syntactic Templates . . 38:1--38:??
Weishi Shi and
Heather Moses and
Qi Yu and
Samuel Malachowsky and
Daniel E. Krutz ALL: Supporting Experiential
Accessibility Education and Inclusive
Software Development . . . . . . . . . . 39:1--39:??
Federico Formica and
Tony Fan and
Claudio Menghi Search-Based Software Testing Driven by
Automatically Generated and Manually
Defined Fitness Functions . . . . . . . 40:1--40:??
Jiajun Jiang and
Yumeng Wang and
Junjie Chen and
Delin Lv and
Mengjiao Liu Variable-based Fault Localization via
Enhanced Decision Tree . . . . . . . . . 41:1--41:??
Wei Huang and
Xingyu Zhao and
Alec Banks and
Victoria Cox and
Xiaowei Huang Hierarchical Distribution-aware Testing
of Deep Learning . . . . . . . . . . . . 42:1--42:??
Sicong Cao and
Xiaobing Sun and
Lili Bo and
Rongxin Wu and
Bin Li and
Xiaoxue Wu and
Chuanqi Tao and
Tao Zhang and
Wei Liu Learning to Detect Memory-related
Vulnerabilities . . . . . . . . . . . . 43:1--43:??
Elkhan Ismayilzada and
Md Mazba Ur Rahman and
Dongsun Kim and
Jooyong Yi Poracle: Testing Patches under
Preservation Conditions to Combat the
Overfitting Problem of Program Repair 44:1--44:??
Yuanhang Zhou and
Fuchen Ma and
Yuanliang Chen and
Meng Ren and
Yu Jiang CLFuzz: Vulnerability Detection of
Cryptographic Algorithm Implementation
via Semantic-aware Fuzzing . . . . . . . 45:1--45:??
Yi Xiang and
Han Huang and
Sizhe Li and
Miqing Li and
Chuan Luo and
Xiaowei Yang Automated Test Suite Generation for
Software Product Lines Based on
Quality-Diversity Optimization . . . . . 46:1--46:??
Han Hu and
Ruiqi Dong and
John Grundy and
Thai Minh Nguyen and
Huaxiao Liu and
Chunyang Chen Automated Mapping of Adaptive App GUIs
from Phones to TVs . . . . . . . . . . . 47:1--47:??
Yuejun Guo and
Qiang Hu and
Xiaofei Xie and
Maxime Cordy and
Mike Papadakis and
Yves Le Traon KAPE: $k$ NN-based Performance Testing
for Deep Code Search . . . . . . . . . . 48:1--48:??
Jiamou Sun and
Zhenchang Xing and
Xin Xia and
Qinghua Lu and
Xiwei Xu and
Liming Zhu Aspect-level Information Discrepancies
across Heterogeneous Vulnerability
Reports: Severity, Types and Detection
Methods . . . . . . . . . . . . . . . . 49:1--49:??
Jiawei Liu and
Yuheng Huang and
Zhijie Wang and
Lei Ma and
Chunrong Fang and
Mingzheng Gu and
Xufan Zhang and
Zhenyu Chen Generation-based Differential Fuzzing
for Deep Learning Libraries . . . . . . 50:1--50:??
Jiho Shin and
Moshi Wei and
Junjie Wang and
Lin Shi and
Song Wang The Good, the Bad, and the Missing:
Neural Code Generation for Machine
Learning Tasks . . . . . . . . . . . . . 51:1--51:??
Siyuan Li and
Yongpan Wang and
Chaopeng Dong and
Shouguo Yang and
Hong Li and
Hao Sun and
Zhe Lang and
Zuxin Chen and
Weijie Wang and
Hongsong Zhu and
Limin Sun LibAM: an Area Matching Framework for
Detecting Third-Party Libraries in
Binaries . . . . . . . . . . . . . . . . 52:1--52:??
Rafael Dutra and
Rahul Gopinath and
Andreas Zeller FormatFuzzer: Effective Fuzzing of
Binary File Formats . . . . . . . . . . 53:1--53:??
Yutao Xie and
Jiayi Lin and
Hande Dong and
Lei Zhang and
Zhonghai Wu Survey of Code Search Based on Deep
Learning . . . . . . . . . . . . . . . . 54:1--54:??
Quanjun Zhang and
Chunrong Fang and
Yuxiang Ma and
Weisong Sun and
Zhenyu Chen A Survey of Learning-based Automated
Program Repair . . . . . . . . . . . . . 55:1--55:??
Ya Xiao and
Wenjia Song and
Salman Ahmed and
Xinyang Ge and
Bimal Viswanath and
Na Meng and
Danfeng (Daphne) Yao Measurement of Embedding Choices on
Cryptographic API Completion Tasks . . . 56:1--56:??
Daniel Russo and
Paul H. P. Hanel and
Niels Van Berkel Understanding Developers Well-Being and
Productivity: a 2-year Longitudinal
Analysis during the COVID-19 Pandemic 57:1--57:??
Andre Lustosa and
Tim Menzies Learning from Very Little Data: On the
Value of Landscape Analysis for
Predicting Software Project Health . . . 58:1--58:??
Yanming Yang and
Xing Hu and
Xin Xia and
Xiaohu Yang The Lost World: Characterizing and
Detecting Undiscovered Test Smells . . . 59:1--59:??
Guang Yang and
Yu Zhou and
Wenhua Yang and
Tao Yue and
Xiang Chen and
Taolue Chen How Important Are Good Method Names in
Neural Code Generation? A Model
Robustness Perspective . . . . . . . . . 60:1--60:??
Jiajun Jiang and
Junjie Yang and
Yingyi Zhang and
Zan Wang and
Hanmo You and
Junjie Chen A Post-training Framework for Improving
the Performance of Deep Learning Models
via Model Transformation . . . . . . . . 61:1--61:??
Jia Li and
Zhuo Li and
Huangzhao Zhang and
Ge Li and
Zhi Jin and
Xing Hu and
Xin Xia Poison Attack and Poison Detection on
Deep Source Code Processing Models . . . 62:1--62:??
Wen Li and
Austin Marino and
Haoran Yang and
Na Meng and
Li Li and
Haipeng Cai How Are Multilingual Systems
Constructed: Characterizing Language Use
and Selection in Open-Source
Multilingual Software . . . . . . . . . 63:1--63:??
Sangeeth Kochanthara and
Tajinder Singh and
Alexandru Forrai and
Loek Cleophas Safety of Perception Systems for
Automated Driving: a Case Study on
Apollo . . . . . . . . . . . . . . . . . 64:1--64:??
Armin Zirak and
Hadi Hemmati Improving Automated Program Repair with
Domain Adaptation . . . . . . . . . . . 65:1--65:??
Wensheng Tang and
Dejun Dong and
Shijie Li and
Chengpeng Wang and
Peisen Yao and
Jinguo Zhou and
Charles Zhang Octopus: Scaling Value-Flow Analysis via
Parallel Collection of Realizable Path
Conditions . . . . . . . . . . . . . . . 66:1--66:??
Tingwei Zhu and
Zhong Li and
Minxue Pan and
Chaoxuan Shi and
Tian Zhang and
Yu Pei and
Xuandong Li Deep Is Better? An Empirical Comparison
of Information Retrieval and Deep
Learning Approaches to Code
Summarization . . . . . . . . . . . . . 67:1--67:??
Zhe Zhao and
Guangke Chen and
Tong Liu and
Taishan Li and
Fu Song and
Jingyi Wang and
Jun Sun Attack as Detection: Using Adversarial
Attack Methods to Detect Abnormal
Examples . . . . . . . . . . . . . . . . 68:1--68:??
Junda He and
Xin Zhou and
Bowen Xu and
Ting Zhang and
Kisub Kim and
Zhou Yang and
Ferdian Thung and
Ivana Clairine Irsan and
David Lo Representation Learning for Stack
Overflow Posts: How Far Are We? . . . . 69:1--69:??
Binhang Qi and
Hailong Sun and
Hongyu Zhang and
Xiang Gao Reusing Convolutional Neural Network
Models through Modularization and
Composition . . . . . . . . . . . . . . 70:1--70:??
Md Rakib Hossain Misu and
Rohan Achar and
Cristina V. Lopes SourcererJBF: a Java Build Framework For
Large-Scale Compilation . . . . . . . . 71:1--71:??
Zhihao Li and
Chuanyi Li and
Ze Tang and
Wanhong Huang and
Jidong Ge and
Bin Luo and
Vincent Ng and
Ting Wang and
Yucheng Hu and
Xiaopeng Zhang PTM-APIRec: Leveraging Pre-trained
Models of Source Code in API
Recommendation . . . . . . . . . . . . . 72:1--72:??
Matteo Biagiola and
Paolo Tonella Testing of Deep Reinforcement Learning
Agents with Surrogate Models . . . . . . 73:1--73:??
Luca Giamattei and
Antonio Guerriero and
Roberto Pietrantuono and
Stefano Russo Causality-driven Testing of Autonomous
Driving Systems . . . . . . . . . . . . 74:1--74:??
Weisong Sun and
Chunrong Fang and
Yuchen Chen and
Quanjun Zhang and
Guanhong Tao and
Yudu You and
Tingxu Han and
Yifei Ge and
Yuling Hu and
Bin Luo and
Zhenyu Chen An Extractive-and-Abstractive Framework
for Source Code Summarization . . . . . 75:1--75:??
Will Leeson and
Matthew B. Dwyer Algorithm Selection for Software
Verification Using Graph Neural Networks 76:1--76:??
Hichem Belgacem and
Xiaochen Li and
Domenico Bianculli and
Lionel Briand Learning-based Relaxation of
Completeness Requirements for Data Entry
Forms . . . . . . . . . . . . . . . . . 77:1--77:??
Michael Fu and
Van Nguyen and
Chakkrit Tantithamthavorn and
Dinh Phung and
Trung Le Vision Transformer Inspired Automated
Vulnerability Repair . . . . . . . . . . 78:1--78:??
Pengfei Gao and
Fu Song and
Taolue Chen Compositional Verification of
First-Order Masking Countermeasures
against Power Side-Channel Attacks . . . 79:1--79:??
Aastha Pant and
Rashina Hoda and
Simone V. Spiegler and
Chakkrit Tantithamthavorn and
Burak Turhan Ethics in the Age of AI: an Analysis of
AI Practitioners' Awareness and
Challenges . . . . . . . . . . . . . . . 80:1--80:??
Johan Cederbladh and
Antonio Cicchetti and
Jagadish Suryadevara Early Validation and Verification of
System Behaviour in Model-based Systems
Engineering: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 81:1--81:??
Daniel Russo and
Paul H. P. Hanel and
Niels van Berkel Understanding Developers Well-being and
Productivity: a 2-year Longitudinal
Analysis during the COVID-19
Pandemic-RCR Report . . . . . . . . . . 82:1--82:??
Mauro Pezz\`e Editorial: ICSE and the Incredible
Contradictions of Software Engineering 83:1--83:??
Weifeng Pan and
Marouane Kessentini and
Hua Ming and
Zijiang Yang EASE: an Effort-aware Extension of
Unsupervised Key Class Identification
Approaches . . . . . . . . . . . . . . . 84:1--84:??
Chidera Biringa and
Gökhan Kul PACE: a Program Analysis Framework for
Continuous Performance Prediction . . . 85:1--85:??
Peng Zhang and
Yang Wang and
Xutong Liu and
Zeyu Lu and
Yibiao Yang and
Yanhui Li and
Lin Chen and
Ziyuan Wang and
Chang-Ai Sun and
Xiao Yu and
Yuming Zhou Assessing Effectiveness of Test Suites:
What Do We Know and What Should We Do? 86:1--86:??
Alessio Ferrari and
Thaide Huichapa and
Paola Spoletini and
Nicole Novielli and
Davide Fucci and
Daniela Girardi Using Voice and Biofeedback to Predict
User Engagement during Product Feedback
Interviews . . . . . . . . . . . . . . . 87:1--87:??
Sai Anirudh Karre and
Y. Raghu Reddy and
Raghav Mittal RE Methods for Virtual Reality Software
Product Development: a Mapping Study . . 88:1--88:??
Zhe Chen and
Rui Yan and
Yingzi Ma and
Yulei Sui and
Jingling Xue A Smart Status Based Monitoring
Algorithm for the Dynamic Analysis of
Memory Safety . . . . . . . . . . . . . 89:1--89:??
Pablo C. Cañizares and
Jose María López-Morales and
Sara Pérez-Soler and
Esther Guerra and
Juan de Lara Measuring and Clustering Heterogeneous
Chatbot Designs . . . . . . . . . . . . 90:1--90:??
Bentley James Oakes and
Michalis Famelis and
Houari Sahraoui Building Domain-Specific Machine
Learning Workflows: a Conceptual
Framework for the State of the Practice 91:1--91:??
Changjie Shao and
Gaolei Li and
Jun Wu and
Xi Zheng Exploring Semantic Redundancy using
Backdoor Triggers: a Complementary
Insight into the Challenges Facing
DNN-based Software Vulnerability
Detection . . . . . . . . . . . . . . . 92:1--92:??
Baharin A. Jodat and
Abhishek Chandar and
Shiva Nejati and
Mehrdad Sabetzadeh Test Generation Strategies for Building
Failure Models and Explaining Spurious
Failures . . . . . . . . . . . . . . . . 93:1--93:??
Neelofar Neelofar and
Aldeida Aleti Identifying and Explaining
Safety-critical Scenarios for Autonomous
Vehicles via Key Features . . . . . . . 94:1--94:??
Donato Clun and
Donghwan Shin and
Antonio Filieri and
Domenico Bianculli Rigorous Assessment of Model Inference
Accuracy using Language Cardinality . . 95:1--95:??
Anshunkang Zhou and
Yikun Hu and
Xiangzhe Xu and
Charles Zhang ARCTURUS: Full Coverage Binary
Similarity Analysis with
Reachability-guided Emulation . . . . . 96:1--96:??
Kai Gao and
Runzhi He and
Bing Xie and
Minghui Zhou Characterizing Deep Learning Package
Supply Chains in PyPI: Domains,
Clusters, and Disengagement . . . . . . 97:1--97:??
Shaiful Chowdhury and
Gias Uddin and
Hadi Hemmati and
Reid Holmes Method-level Bug Prediction: Problems
and Promises . . . . . . . . . . . . . . 98:1--98:??
Qunying Song and
Emelie Engström and
Per Runeson Industry Practices for Challenging
Autonomous Driving Systems with Critical
Scenarios . . . . . . . . . . . . . . . 99:1--99:??
Mingxuan Zhu and
Dan Hao and
Junjie Chen Compiler Autotuning through
Multiple-phase Learning . . . . . . . . 100:1--100:??
Taijara Loiola De Santana and
Paulo Anselmo Da Mota Silveira Neto and
Eduardo Santana De Almeida and
Iftekhar Ahmed Bug Analysis in Jupyter Notebook
Projects: an Empirical Study . . . . . . 101:1--101:??
Zhenfei Huang and
Junjie Chen and
Jiajun Jiang and
Yihua Liang and
Hanmo You and
Fengjie Li Mapping APIs in Dynamic-typed Programs
by Leveraging Transfer Learning . . . . 102:1--102:??
Sungmin Kang and
Robert Feldt and
Shin Yoo Deceiving Humans and Machines Alike:
Search-based Test Input Generation for
DNNs Using Variational Autoencoders . . 103:1--103:??
Han Wang and
Sijia Yu and
Chunyang Chen and
Burak Turhan and
Xiaodong Zhu Beyond Accuracy: an Empirical Study on
Unit Testing in Open-source Deep
Learning Projects . . . . . . . . . . . 104:1--104:??
Shikai Guo and
Dongmin Li and
Lin Huang and
Sijia Lv and
Rong Chen and
Hui Li and
Xiaochen Li and
He Jiang Estimating Uncertainty in Labeled
Changes by SZZ Tools on Just-In-Time
Defect Prediction . . . . . . . . . . . 105:1--105:??
Hanyang Guo and
Yingye Chen and
Xiangping Chen and
Yuan Huang and
Zibin Zheng Smart Contract Code Repair
Recommendation based on Reinforcement
Learning and Multi-metric Optimization 106:1--106:??
Davide Pizzolotto and
Stefano Berlato and
Mariano Ceccato Mitigating Debugger-based Attacks to
Java Applications with Self-debugging 107:1--107:??
Puzhuo Liu and
Yaowen Zheng and
Chengnian Sun and
Hong Li and
Zhi Li and
Limin Sun Battling against Protocol Fuzzing:
Protecting Networked Embedded Devices
from Dynamic Fuzzers . . . . . . . . . . 108:1--108:??
Hashini Gunatilake and
John Grundy and
Rashina Hoda and
Ingo Mueller Enablers and Barriers of Empathy in
Software Developer and User
Interactions: a Mixed Methods Case Study 109:1--109:??
Xin Tan and
Xinyue Lv and
Jing Jiang and
Li Zhang Understanding Real-Time Collaborative
Programming: a Study of Visual Studio
Live Share . . . . . . . . . . . . . . . 110:1--110:??
Qiang Hu and
Yuejun Guo and
Xiaofei Xie and
Maxime Cordy and
Lei Ma and
Mike Papadakis and
Yves Le Traon Test Optimization in DNN Testing: a
Survey . . . . . . . . . . . . . . . . . 111:1--111:??
Martin P. Robillard and
Deeksha M. Arya and
Neil A. Ernst and
Jin L. C. Guo and
Maxime Lamothe and
Mathieu Nassif and
Nicole Novielli and
Alexander Serebrenik and
Igor Steinmacher and
Klaas-Jan Stol Communicating Study Design Trade-offs in
Software Engineering . . . . . . . . . . 112:1--112:??
Raphaël Ollando and
Seung Yeob Shin and
Lionel C. Briand Learning Failure-Inducing Models for
Testing Software-Defined Networks . . . 113:1--113:??
Cuifeng Gao and
Wenzhang Yang and
Jiaming Ye and
Yinxing Xue and
Jun Sun sGuard+: Machine Learning Guided
Rule-Based Automated Vulnerability
Repair on Smart Contracts . . . . . . . 114:1--114:??
Lin Yang and
Junjie Chen and
Shutao Gao and
Zhihao Gong and
Hongyu Zhang and
Yue Kang and
Huaan Li Try with Simpler --- an Evaluation of
Improved Principal Component Analysis in
Log-based Anomaly Detection . . . . . . 115:1--115:??
Yue Liu and
Thanh Le-Cong and
Ratnadira Widyasari and
Chakkrit Tantithamthavorn and
Li Li and
Xuan-Bach D. Le and
David Lo Refining ChatGPT-Generated Code:
Characterizing and Mitigating Code
Quality Issues . . . . . . . . . . . . . 116:1--116:??
Emre Sülün and
Metehan Saçakçi and
Eray Tüzün An Empirical Analysis of Issue Templates
Usage in Large-Scale Projects on GitHub 117:1--117:??
Xinmeng Xia and
Yang Feng and
Qingkai Shi and
James A. Jones and
Xiangyu Zhang and
Baowen Xu Enumerating Valid Non-Alpha-Equivalent
Programs for Interpreter Testing . . . . 118:1--118:??
Jiawei Ren and
Yulei Sui and
Xiao Cheng and
Yuan Feng and
Jianjun Zhao Dynamic Transitive Closure-based Static
Analysis through the Lens of Quantum
Search . . . . . . . . . . . . . . . . . 119:1--119:??
Fang Liu and
Zhiyi Fu and
Ge Li and
Zhi Jin and
Hui Liu and
Yiyang Hao and
Li Zhang Non-Autoregressive Line-Level Code
Completion . . . . . . . . . . . . . . . 120:1--120:??
Marc Miltenberger and
Steven Arzt Precisely Extracting Complex Variable
Values from Android Apps . . . . . . . . 121:1--121:??
Yu Zhao and
Brent Harrison and
Tingting Yu DinoDroid: Testing Android Apps Using
Deep Q-Networks . . . . . . . . . . . . 122:1--122:??
Yimeng Guo and
Zhifei Chen and
Lin Chen and
Wenjie Xu and
Yanhui Li and
Yuming Zhou and
Baowen Xu Generating Python Type Annotations from
Type Inference: How Far Are We? . . . . 123:1--123:??
Yu Cheng and
Jieshan Chen and
Qing Huang and
Zhenchang Xing and
Xiwei Xu and
Qinghua Lu Prompt Sapper: a LLM-Empowered
Production Tool for Building AI Chains 124:1--124:??
Quanjun Zhang and
Juan Zhai and
Chunrong Fang and
Jiawei Liu and
Weisong Sun and
Haichuan Hu and
Qingyu Wang Machine Translation Testing via
Syntactic Tree Pruning . . . . . . . . . 125:1--125:??
Yue Liu and
Chakkrit Tantithamthavorn and
Yonghui Liu and
Li Li On the Reliability and Explainability of
Language Models for Program Generation 126:1--126:??
Baijun Cheng and
Shengming Zhao and
Kailong Wang and
Meizhen Wang and
Guangdong Bai and
Ruitao Feng and
Yao Guo and
Lei Ma and
Haoyu Wang Beyond Fidelity: Explaining
Vulnerability Localization of
Learning-Based Detectors . . . . . . . . 127:1--127:??
Guodong Fan and
Shizhan Chen and
Cuiyun Gao and
Jianmao Xiao and
Tao Zhang and
Zhiyong Feng RAPID: Zero-Shot Domain Adaptation for
Code Search with Pre-Trained Models . . 128:1--128:??
Jiaxiang Liu and
Yunhan Xing and
Xiaomu Shi and
Fu Song and
Zhiwu Xu and
Zhong Ming Abstraction and Refinement: Towards
Scalable and Exact Verification of
Neural Networks . . . . . . . . . . . . 129:1--129:??
Mohammed Oualid Attaoui and
Hazem Fahmy and
Fabrizio Pastore and
Lionel Briand Supporting Safety Analysis of
Image-processing DNNs through
Clustering-based Approaches . . . . . . 130:1--130:??
Xiuwei Shang and
Shuai Zhang and
Yitong Zhang and
Shikai Guo and
Yulong Li and
Rong Chen and
Hui Li and
Xiaochen Li and
He Jiang Analyzing and Detecting Information
Types of Developer Live Chat Threads . . 131:1--131:??
Yinghua Li and
Xueqi Dang and
Lei Ma and
Jacques Klein and
Yves Le Traon and
Tegawendé F. Bissyandé Test Input Prioritization for $3$D Point
Clouds . . . . . . . . . . . . . . . . . 132:1--132:??
Wei Tao and
Yucheng Zhou and
Yanlin Wang and
Hongyu Zhang and
Haofen Wang and
Wenqiang Zhang KADEL: Knowledge-Aware Denoising
Learning for Commit Message Generation 133:1--133:??
Daan Hommersom and
Antonino Sabetta and
Bonaventura Coppola and
Dario Di Nucci and
Damian A. Tamburri Automated Mapping of Vulnerability
Advisories onto their Fix Commits in
Open Source Repositories . . . . . . . . 134:1--134:??
Daniel Russo Navigating the Complexity of Generative
AI Adoption in Software Engineering . . 135:1--135:??
Stefanie Betz and
Birgit Penzenstadler and
Leticia Duboc and
Ruzanna Chitchyan and
Sedef Akinli Kocak and
Ian Brooks and
Shola Oyedeji and
Jari Porras and
Norbert Seyff and
Colin C. Venters Lessons Learned from Developing a
Sustainability Awareness Framework for
Software Engineering Using Design
Science . . . . . . . . . . . . . . . . 136:1--136:??
Zhenpeng Chen and
Jie M. Zhang and
Max Hort and
Mark Harman and
Federica Sarro Fairness Testing: a Comprehensive Survey
and Analysis of Trends . . . . . . . . . 137:1--137:??
Wei-Cheng Wu and
Bernard Nongpoh and
Marwan Nour and
Michaël Marcozzi and
Sébastien Bardin and
Christophe Hauser Fine-grained Coverage-based Fuzzing . . 138:1--138:??
Wei-Cheng Wu and
Bernard Nongpoh and
Marwan Nour and
Michaël Marcozzi and
Sébastien Bardin and
Christophe Hauser Fine-grained Coverage-based Fuzzing ---
RCR Report . . . . . . . . . . . . . . . 139:1--139:??
Zhifei Chen and
Lin Chen and
Yibiao Yang and
Qiong Feng and
Xuansong Li and
Wei Song Risky Dynamic Typing-related Practices
in Python: an Empirical Study . . . . . 140:1--140:??
Xiaohui Wan and
Zheng Zheng and
Fangyun Qin and
Xuhui Lu Data Complexity: a New Perspective for
Analyzing the Difficulty of Defect
Prediction Tasks . . . . . . . . . . . . 141:1--141:??
Andrea Arcuri and
Man Zhang and
Juan Galeotti Advanced White-Box Heuristics for
Search-Based Fuzzing of REST APIs . . . 142:1--142:??
Emanuela Guglielmi and
Giovanni Rosa and
Simone Scalabrino and
Gabriele Bavota and
Rocco Oliveto Help Them Understand: Testing and
Improving Voice User Interfaces . . . . 143:1--143:??
Anjana Perera and
Burak Turhan and
Aldeida Aleti and
Marcel Böhme On the Impact of Lower Recall and
Precision in Defect Prediction for
Guiding Search-based Software Testing 144:1--144:??
Guofu Zhang and
Lei Li and
Zhaopin Su and
Feng Yue and
Yang Chen and
Miqing Li and
Xin Yao On Estimating the Feasible Solution
Space of Multi-objective Testing
Resource Allocation . . . . . . . . . . 145:1--145:??
Emanuele Iannone and
Giulia Sellitto and
Emanuele Iaccarino and
Filomena Ferrucci and
Andrea De Lucia and
Fabio Palomba Early and Realistic Exploitability
Prediction of Just-Disclosed Software
Vulnerabilities: How Reliable Can It Be? 146:1--146:??
Peixun Long and
Jianjun Zhao Testing Multi-Subroutine Quantum
Programs: From Unit Testing to
Integration Testing . . . . . . . . . . 147:1--147:??
Xu Wang and
Hongwei Yu and
Xiangxin Meng and
Hongliang Cao and
Hongyu Zhang and
Hailong Sun and
Xudong Liu and
Chunming Hu MTL-TRANSFER: Leveraging Multi-task
Learning and Transferred Knowledge for
Improving Fault Localization and Program
Repair . . . . . . . . . . . . . . . . . 148:1--148:??
Tingting Bi and
Boming Xia and
Zhenchang Xing and
Qinghua Lu and
Liming Zhu On the Way to SBOMs: Investigating
Design Issues and Solutions in Practice 149:1--149:??
Congying Xu and
Valerio Terragni and
Hengcheng Zhu and
Jiarong Wu and
Shing-Chi Cheung MR-Scout: Automated Synthesis of
Metamorphic Relations from Existing Test
Cases . . . . . . . . . . . . . . . . . 150:1--150:??
Sallam Abualhaija and
F. Basak Aydemir and
Fabiano Dalpiaz and
Davide Dell'Anna and
Alessio Ferrari and
Xavier Franch and
Davide Fucci Replication in Requirements Engineering:
The NLP for RE Case . . . . . . . . . . 151:1--151:??
Tahereh Zohdinasab and
Vincenzo Riccio and
Paolo Tonella Focused Test Generation for Autonomous
Driving Systems . . . . . . . . . . . . 152:1--152:??
Kashumi Madampe and
Rashina Hoda and
John Grundy Supporting Emotional Intelligence,
Productivity and Team Goals while
Handling Software Requirements Changes 153:1--153:??
Yuechen Li and
Hanyu Pei and
Linzhi Huang and
Beibei Yin and
Kai-Yuan Cai Automatic Repair of Quantum Programs via
Unitary Operation . . . . . . . . . . . 154:1--154:??
Chanh Duc Ngo and
Fabrizio Pastore and
Lionel Briand Testing Updated Apps by Adapting Learned
Models . . . . . . . . . . . . . . . . . 155:1--155:??
Zeyu Sun and
Zhenpeng Chen and
Jie Zhang and
Dan Hao Fairness Testing of Machine Translation
Systems . . . . . . . . . . . . . . . . 156:1--156:??
Siyu Jiang and
Zhenhang He and
Yuwen Chen and
Mingrong Zhang and
Le Ma Mobile Application Online Cross-Project
Just-in-Time Software Defect Prediction
Framework . . . . . . . . . . . . . . . 157:1--157:??
Zohreh Aghababaeyan and
Manel Abdellatif and
Mahboubeh Dadkhah and
Lionel Briand DeepGD: a Multi-Objective Black-Box Test
Selection Approach for Deep Neural
Networks . . . . . . . . . . . . . . . . 158:1--158:??
Zhen Li and
Shasha Zhao and
Chen Chen and
Qian Chen Reducing the Impact of Time Evolution on
Source Code Authorship Attribution via
Domain Adaptation . . . . . . . . . . . 159:1--159:??
Xi Ding and
Rui Peng and
Xiangping Chen and
Yuan Huang and
Jing Bian and
Zibin Zheng Do Code Summarization Models Process Too
Much Information? Function Signature May
Be All That Is Needed . . . . . . . . . 160:1--160:??
Daniel Ramos and
Inês Lynce and
Vasco Manquinho and
Ruben Martins and
Claire Le Goues BatFix: Repairing language model-based
transpilation . . . . . . . . . . . . . 161:1--161:??
Van Nguyen and
Trung Le and
Chakkrit Tantithamthavorn and
John Grundy and
Dinh Phung Deep Domain Adaptation With Max-Margin
Principle for Cross-Project Imbalanced
Software Vulnerability Detection . . . . 162:1--162:??
Han Hu and
Han Wang and
Ruiqi Dong and
Xiao Chen and
Chunyang Chen Enhancing GUI Exploration Coverage of
Android Apps with Deep Link-Integrated
Monkey . . . . . . . . . . . . . . . . . 163:1--163:??
Carlos Gavidia-Calderon and
Anastasia Kordoni and
Amel Bennaceur and
Mark Levine and
Bashar Nuseibeh The IDEA of Us: an Identity-Aware
Architecture for Autonomous Systems . . 164:1--164:??
Haoye Wang and
Zhipeng Gao and
Tingting Bi and
John Grundy and
Xinyu Wang and
Minghui Wu and
Xiaohu Yang What Makes a Good TODO Comment? . . . . 165:1--165:??
Weisong Sun and
Chunrong Fang and
Yifei Ge and
Yuling Hu and
Yuchen Chen and
Quanjun Zhang and
Xiuting Ge and
Yang Liu and
Zhenyu Chen A Survey of Source Code Search: a
$3$-Dimensional Perspective . . . . . . 166:1--166:??
Chengcheng Wan and
Shicheng Liu and
Sophie Xie and
Yuhan Liu and
Henry Hoffmann and
Michael Maire and
Shan Lu Keeper: Automated Testing and Fixing of
Machine Learning Software . . . . . . . 167:1--167:??
Suwichak Fungprasertkul and
Rami Bahsoon and
Rick Kazman Technical Debt Monitoring Decision
Making with Skin in the Game . . . . . . 168:1--168:??
Wei Ma and
Shangqing Liu and
Mengjie Zhao and
Xiaofei Xie and
Wenhang Wang and
Qiang Hu and
Jie Zhang and
Yang Liu Unveiling Code Pre-Trained Models:
Investigating Syntax and Semantics
Capacities . . . . . . . . . . . . . . . 169:1--169:??
Muhui Jiang and
Jinan Jiang and
Tao Wu and
Zuchao Ma and
Xiapu Luo and
Yajin Zhou Understanding Vulnerability Inducing
Commits of the Linux Kernel . . . . . . 170:1--170:??
Nicolas Dejon and
Chrystel Gaber and
Gilles Grimaud and
Narjes Jomaa Code to Qed, the Project Manager's Guide
to Proof Engineering . . . . . . . . . . 171:1--171:??
Rezvan Mahdavi-Hezaveh and
Sameeha Fatima and
Laurie Williams Paving a Path for a Combined Family of
Feature Toggle and Configuration Option
Research . . . . . . . . . . . . . . . . 172:1--172:??
Rong Gu and
Eduard Baranov and
Afshin Ameri and
Cristina Seceleanu and
Eduard Paul Enoiu and
Baran Cürüklü and
Axel Legay and
Kristina Lundqvist Synthesis and Verification of Mission
Plans for Multiple Autonomous Agents
under Complex Road Conditions . . . . . 173:1--173:??
Yao Li and
Dawei Yuan and
Tao Zhang and
Haipeng Cai and
David Lo and
Cuiyun Gao and
Xiapu Luo and
He Jiang Meta-Learning for Multi-Family Android
Malware Classification . . . . . . . . . 174:1--174:??
Shengcheng Yu and
Chunrong Fang and
Xin Li and
Yuchen Ling and
Zhenyu Chen and
Zhendong Su Effective, Platform-Independent GUI
Testing via Image Embedding and
Reinforcement Learning . . . . . . . . . 175:1--175:??
Jaeseong Lee and
Simin Chen and
Austin Mordahl and
Cong Liu and
Wei Yang and
Shiyi Wei Automated Testing Linguistic
Capabilities of NLP Models . . . . . . . 176:1--176:??
Judith Perera and
Ewan Tempero and
Yu-Cheng Tu and
Kelly Blincoe A Systematic Mapping Study Exploring
Quantification Approaches to Code,
Design, and Architecture Technical Debt 177:1--177:??
Sávio Freire and
Alexia Pacheco and
Nicolli Rios and
Boris Pérez and
Camilo Castellanos and
Darío Correal and
Robert Ramac and
Vladimir Mandi\'c and
Nebojsa Tausan and
Gustavo López and
Manoel Mendonça and
Davide Falessi and
Clemente Izurieta and
Carolyn Seaman and
Rodrigo Spínola A Comprehensive View on TD Prevention
Practices and Reasons for Not Preventing
It . . . . . . . . . . . . . . . . . . . 178:1--178:??
Elijah Zolduoarrati and
Sherlock A. Licorish and
Nigel Stanger Harmonising Contributions: Exploring
Diversity in Software Engineering
through CQA Mining on Stack Overflow . . 179:1--179:??
Yiling Lou and
Jun Yang and
Samuel Benton and
Dan Hao and
Lin Tan and
Zhenpeng Chen and
Lu Zhang and
Lingming Zhang When Automated Program Repair Meets
Regression Testing --- An Extensive
Study on Two Million Patches . . . . . . 180:1--180:??
Wei Liu and
Shouvick Mondal and
Tse-Hsun (Peter) Chen An Empirical Study on the
Characteristics of Database Access Bugs
in Java Applications . . . . . . . . . . 181:1--181:??
Xue Jiang and
Yihong Dong and
Lecheng Wang and
Zheng Fang and
Qiwei Shang and
Ge Li and
Zhi Jin and
Wenpin Jiao Self-Planning Code Generation with Large
Language Models . . . . . . . . . . . . 182:1--182:??
Qing Huang and
Zhiwen Luo and
Zhenchang Xing and
Jinshan Zeng and
Jieshan Chen and
Xiwei Xu and
Yong Chen Revealing the Unseen: AI Chain on LLMs
for Predicting Implicit Dataflows to
Generate Dataflow Graphs in Dynamically
Typed Code . . . . . . . . . . . . . . . 183:1--183:??
Yingzhe Lyu and
Heng Li and
Zhen Ming (Jack) Jiang and
Ahmed E. Hassan On the Model Update Strategies for
Supervised Learning in AIOps Solutions 184:1--184:??
Hang Xu and
Liheng Chen and
Shuitao Gan and
Chao Zhang and
Zheming Li and
Jiangan Ji and
Baojian Chen and
Fan Hu Graphuzz: Data-driven Seed Scheduling
for Coverage-guided Greybox Fuzzing . . 185:1--185:??
Xiaoning Feng and
Xiaohong Han and
Simin Chen and
Wei Yang LLMEffiChecker: Understanding and
Testing Efficiency Degradation of Large
Language Models . . . . . . . . . . . . 186:1--186:??
Jinqiang Yu and
Michael Fu and
Alexey Ignatiev and
Chakkrit Tantithamthavorn and
Peter Stuckey A Formal Explainer for Just-In-Time
Defect Predictions . . . . . . . . . . . 187:1--187:??
Dong Huang and
Qingwen Bu and
Yichao Fu and
Yuhao Qing and
Xiaofei Xie and
Junjie Chen and
Heming Cui Neuron Sensitivity-Guided Test Case
Selection . . . . . . . . . . . . . . . 188:1--188:??
Yihong Dong and
Xue Jiang and
Zhi Jin and
Ge Li Self-Collaboration Code Generation via
ChatGPT . . . . . . . . . . . . . . . . 189:1--189:??
Zhiyu Wang and
Sihan Xu and
Lingling Fan and
Xiangrui Cai and
Linyu Li and
Zheli Liu Can Coverage Criteria Guide Failure
Discovery for Image Classifiers? An
Empirical Study . . . . . . . . . . . . 190:1--190:??
Mingxi Ye and
Yuhong Nan and
Hong-Ning Dai and
Shuo Yang and
Xiapu Luo and
Zibin Zheng FunFuzz: a Function-Oriented Fuzzer for
Smart Contract Vulnerability Detection
with High Effectiveness and Efficiency 191:1--191:??
Anni Peng and
Dongliang Fang and
Le Guan and
Erik van der Kouwe and
Yin Li and
Wenwen Wang and
Limin Sun and
Yuqing Zhang Bitmap-Based Security Monitoring for
Deeply Embedded Systems . . . . . . . . 192:1--192:??
Zachary Karas and
Aakash Bansal and
Yifan Zhang and
Toby Li and
Collin McMillan and
Yu Huang A Tale of Two Comprehensions? Analyzing
Student Programmer Attention during Code
Summarization . . . . . . . . . . . . . 193:1--193:??
Carlos Parra-Calderón and
Julián Alberto García-García and
Juan Manuel Ramos-Cueli and
Celia Alvarez-Romero and
Esther Román-Villarán and
Alicia Martínez-García and
María José Escalona IDE 4 ICDS: a Human-Centric and
Model-Driven Proposal to Improve the
Digitization of Clinical Practice
Guideline . . . . . . . . . . . . . . . 194:1--194:??
Margaret-Anne Storey and
Daniel Russo and
Nicole Novielli and
Takashi Kobayashi and
Dong Wang A Disruptive Research Playbook for
Studying Disruptive Innovations . . . . 195:1--195:??
Giovani Guizzo and
David Williams and
Mark Harman and
Justyna Petke and
Federica Sarro Speeding Up Genetic Improvement via
Regression Test Selection . . . . . . . 196:1--196:??
Anwar Ghammam and
Rania Khalsi and
Marouane Kessentini and
Foyzul Hassan Efficient Management of Containers for
Software Defined Vehicles . . . . . . . 197:1--197:??
Xiao-Yi Zhang and
Yang Liu and
Paolo Arcaini and
Mingyue Jiang and
Zheng Zheng MET-MAPF: a Metamorphic Testing Approach
for Multi-Agent Path Finding Algorithms 198:1--198:??
Lorenz Graf-Vlachy and
Stefan Wagner Cleaning Up Confounding: Accounting for
Endogeneity Using Instrumental Variables
and Two-Stage Models . . . . . . . . . . 199:1--199:??
Zhouruixing Zhu and
Cheryl Lee and
Xiaoying Tang and
Pinjia He HeMiRCA: Fine-Grained Root Cause
Analysis for Microservices with
Heterogeneous Data Sources . . . . . . . 200:1--200:??
Shangqing Liu and
Yanzhou Li and
Xiaofei Xie and
Wei Ma and
Guozhu Meng and
Yang Liu Automated Commit Intelligence by
Pre-training . . . . . . . . . . . . . . 201:1--201:??
Tiehua Zhang and
Rui Xu and
Jianping Zhang and
Yuze Liu and
Xin Chen and
Jun Yin and
Xi Zheng DSHGT: Dual-Supervisors Heterogeneous
Graph Transformer-A Pioneer Study of
Using Heterogeneous Graph Learning for
Detecting Software Vulnerabilities . . . 202:1--202:??
Xiaoyuan Xie and
Shuo Jin and
Songqiang Chen and
Shing-Chi Cheung Word Closure-Based Metamorphic Testing
for Machine Translation . . . . . . . . 203:1--203:??
Jia Li and
Yunfei Zhao and
Yongmin Li and
Ge Li and
Zhi Jin AceCoder: an Effective Prompting
Technique Specialized in Code Generation 204:1--204:??
Yanjie Jiang and
Hui Liu and
Shing Chi Cheung and
Lu Zhang Shortening Overlong Method Names with
Abbreviations . . . . . . . . . . . . . 205:1--205:??
Haifeng Ruan and
Yannic Noller and
Saeid Tizpaz-Niari and
Sudipta Chattopadhyay and
Abhik Roychoudhury Timing Side-Channel Mitigation via
Automated Program Repair . . . . . . . . 206:1--206:??
Fanyi Meng and
Ying Wang and
Chun Yong Chong and
Hai Yu and
Zhiliang Zhu Evolution-Aware Constraint Derivation
Approach for Software Remodularization 207:1--207:??
Chico Sundermann and
Heiko Raab and
Tobias Heß and
Thomas Thüm and
Ina Schaefer Reusing d-DNNFs for Efficient
Feature-Model Counting . . . . . . . . . 208:1--208:??
Yasaman Abedini and
Abbas Heydarnoori Can GitHub Issues Help in App Review
Classifications? . . . . . . . . . . . . 209:1--209:??
Yi Song and
Xihao Zhang and
Xiaoyuan Xie and
Songqiang Chen and
Quanming Liu and
Ruizhi Gao SURE: a Visualized Failure Indexing
Approach Using Program Memory Spectrum 210:1--210:??
Saurabhsingh Rajput and
Tim Widmayer and
Ziyuan Shang and
Maria Kechagia and
Federica Sarro and
Tushar Sharma Enhancing Energy-Awareness in Deep
Learning through Fine-Grained Energy
Measurement . . . . . . . . . . . . . . 211:1--211:??
Qing Huang and
Yanbang Sun and
Zhenchang Xing and
Yuanlong Cao and
Jieshan Chen and
Xiwei Xu and
Huan Jin and
Jiaxing Lu Let's Discover More API Relations: a
Large Language Model-Based AI Chain for
Unsupervised API Relation Inference . . 212:1--212:??
Moataz Chouchen and
Ali Ouni and
Mohamed Wiem Mkaouer MULTICR: Predicting Merged and Abandoned
Code Changes in Modern Code Review Using
Multi-Objective Search . . . . . . . . . 213:1--213:??
Florian Tambon and
Foutse Khomh and
Giuliano Antoniol GIST: Generated Inputs Sets
Transferability in Deep Learning . . . . 214:1--214:??
Shiwen Yu and
Zengyu Liu and
Ting Wang and
Ji Wang Neural Solving Uninterpreted Predicates
with Abstract Gradient Descent . . . . . 215:1--215:??
Dmytro Humeniuk and
Foutse Khomh and
Giuliano Antoniol Reinforcement Learning Informed
Evolutionary Search for Autonomous
Systems Testing . . . . . . . . . . . . 216:1--216:??
Yue Liu and
Chakkrit Tantithamthavorn and
Yonghui Liu and
Patanamon Thongtanunam and
Li Li Automatically Recommend Code Updates:
Are We There Yet? . . . . . . . . . . . 217:1--217:??
Bianca Trinkenreich and
Fabio Santos and
Klaas-Jan Stol Predicting Attrition among Software
Professionals: Antecedents and
Consequences of Burnout and Engagement 218:1--218:??
Ming Xu and
Jianling Fu and
Hui Jiang and
Yuxin Deng and
Zhi-Bin Li Termination and Universal Termination
Problems for Nondeterministic Quantum
Programs . . . . . . . . . . . . . . . . 219:1--219:??
Xinyi Hou and
Yanjie Zhao and
Yue Liu and
Zhou Yang and
Kailong Wang and
Li Li and
Xiapu Luo and
David Lo and
John Grundy and
Haoyu Wang Large Language Models for Software
Engineering: a Systematic Literature
Review . . . . . . . . . . . . . . . . . 220:1--220:??
Daniel Russo Navigating the Complexity of Generative
AI Adoption in Software Engineering ---
RCR Report . . . . . . . . . . . . . . . 221:1--221:??
Mauro Pezz\`e Editorial: The End of the Journey . . . 222:1--222:??
Abhik Roychoudhury Editorial: TOSEM Journal in 2025 and
Beyond . . . . . . . . . . . . . . . . . 1:1--1:??
Zhipeng Gao and
Yanqi Su and
Xing Hu and
Xin Xia Automating TODO-missed Methods Detection
and Patching . . . . . . . . . . . . . . 2:1--2:??
Jana-Rebecca Rehse and
Sander J. J. Leemans and
Peter Fettke and
Jan Martijn E. M. van der Werf On Process Discovery Experimentation:
Addressing the Need for Research
Methodology in Process Discovery . . . . 3:1--3:??
Martin P. Robillard and
Mathieu Nassif and
Muhammad Sohail Understanding Test Convention
Consistency as a Dimension of Test
Quality . . . . . . . . . . . . . . . . 4:1--4:??
Xinyi Wang and
Asmar Muqeet and
Tao Yue and
Shaukat Ali and
Paolo Arcaini Test Case Minimization with Quantum
Annealers . . . . . . . . . . . . . . . 5:1--5:??
Evangelos Ntentos and
Nicole Elisabeth Lueger and
Georg Simhandl and
Uwe Zdun and
Simon Schneider and
Riccardo Scandariato and
Nicolás E. Díaz Ferreyra On the Understandability of Design-Level
Security Practices in
Infrastructure-as-Code Scripts and
Deployment Architectures . . . . . . . . 6:1--6:??
Moses Openja and
Foutse Khomh and
Armstrong Foundjem and
Zhen Ming (Jack) Jiang and
Mouna Abidi and
Ahmed E. Hassan An Empirical Study of Testing Machine
Learning in the Wild . . . . . . . . . . 7:1--7:??
Haipeng Wang and
Zhengyuan Wei and
Qilin Zhou and
Wing-Kwong Chan Context-Aware Fuzzing for Robustness
Enhancement of Deep Learning Models . . 8:1--8:??
Haojun Zhao and
Yueming Wu and
Deqing Zou and
Yang Liu and
Hai Jin MalSensor: Fast and Robust Windows
Malware Classification . . . . . . . . . 9:1--9:??
Iren Mazloomzadeh and
Gias Uddin and
Foutse Khomh and
Ashkan Sami Reputation Gaming in Crowd Technical
Knowledge Sharing . . . . . . . . . . . 10:1--10:??
Wenkang Zhong and
Chuanyi Li and
Kui Liu and
Jidong Ge and
Bin Luo and
Tegawendé F. Bissyandé and
Vincent Ng Benchmarking and Categorizing the
Performance of Neural Program Repair
Systems for Java . . . . . . . . . . . . 11:1--11:??
Jierui Zhang and
Liang Wang and
Ying Li and
Jing Jiang and
Tao Wang and
Xianping Tao Measuring and Mining Community Evolution
in Developer Social Networks with
Entropy-Based Indices . . . . . . . . . 12:1--12:??
Chuan Luo and
Jianping Song and
Qiyuan Zhao and
Binqi Sun and
Junjie Chen and
Hongyu Zhang and
Jinkun Lin and
Chunming Hu Solving the $t$-Wise Coverage Maximum
Problem via Effective and Efficient
Local Search-Based Sampling . . . . . . 13:1--13:??
Yongda Yu and
Guoping Rong and
Haifeng Shen and
He Zhang and
Dong Shao and
Min Wang and
Zhao Wei and
Yong Xu and
Juhong Wang Fine-Tuning Large Language Models to
Improve Accuracy and Comprehensibility
of Automated Code Review . . . . . . . . 14:1--14:??
Li Huang and
Weifeng Sun and
Meng Yan and
Zhongxin Liu and
Yan Lei and
David Lo Neuron Semantic-Guided Test Generation
for Deep Neural Networks Fuzzing . . . . 15:1--15:??
Jasmine Latendresse and
Samuel Abedu and
Ahmad Abdellatif and
Emad Shihab An Exploratory Study on Machine Learning
Model Management . . . . . . . . . . . . 16:1--16:??
Xu Yang and
Gopi Krishnan Rajbahadur and
Dayi Lin and
Shaowei Wang and
Zhen Ming (Jack) Jiang SimClone: Detecting Tabular Data Clones
Using Value Similarity . . . . . . . . . 17:1--17:??
Jon Ayerdi and
Asier Iriarte and
Pablo Valle and
Ibai Roman and
Miren Illarramendi and
Aitor Arrieta MarMot: Metamorphic Runtime Monitoring
of Autonomous Driving Systems . . . . . 18:1--18:??
Nima Shiri Harzevili and
Mohammad Mahdi Mohajer and
Moshi Wei and
Hung Viet Pham and
Song Wang History-Driven Fuzzing for Deep Learning
Libraries . . . . . . . . . . . . . . . 19:1--19:??
Hao Li and
Gopi Krishnan Rajbahadur and
Cor-Paul Bezemer Studying the Impact of TensorFlow and
PyTorch Bindings on Machine Learning
Software Quality . . . . . . . . . . . . 20:1--20:??
Zhensu Sun and
Xiaoning Du and
Fu Song and
Shangwen Wang and
Mingze Ni and
Li Li and
David Lo Don't Complete It! Preventing Unhelpful
Code Completion for Productive and
Sustainable Neural Code Completion
Systems . . . . . . . . . . . . . . . . 21:1--21:??
Kaichun Yao and
Hao Wang and
Chuan Qin and
Hengshu Zhu and
Yanjun Wu and
Libo Zhang CARL: Unsupervised Code-Based
Adversarial Attacks for Programming
Language Models via Reinforcement
Learning . . . . . . . . . . . . . . . . 22:1--22:??
Sabreen Ahmadjee and
Carlos Mera-Gómez and
Siamak Farshidi and
Rami Bahsoon and
Rick Kazman Decision Support Model for Selecting the
Optimal Blockchain Oracle Platform: an
Evaluation of Key Factors . . . . . . . 23:1--23:??
Shandler A. Mason and
Sandeep Kaur Kuttal Diversity's Double-Edged Sword:
Analyzing Race's Effect on Remote Pair
Programming Interactions . . . . . . . . 24:1--24:??
Jingzhi Gong and
Tao Chen Deep Configuration Performance Learning:
a Systematic Survey and Taxonomy . . . . 25:1--25:??
Ruixiang Qian and
Quanjun Zhang and
Chunrong Fang and
Ding Yang and
Shun Li and
Binyu Li and
Zhenyu Chen DiPri: Distance-Based Seed
Prioritization for Greybox Fuzzing . . . 26:1--26:??
Ruixiang Qian and
Quanjun Zhang and
Chunrong Fang and
Ding Yang and
Shun Li and
Binyu Li and
Zhenyu Chen DiPri: Distance-Based Seed
Prioritization for Greybox Fuzzing ---
RCR Report . . . . . . . . . . . . . . . 27:1--27:??
Fernando Uyaguari and
Silvia T. Acuña and
John W. Castro and
Davide Fucci and
Oscar Dieste and
Sira Vegas Relevant Information in TDD Experiment
Reporting . . . . . . . . . . . . . . . 28:1--28:??
Olivier Nourry and
Yutaro Kashiwa and
Weiyi Shang and
Honglin Shu and
Yasutaka Kamei My Fuzzers Won't Build: an Empirical
Study of Fuzzing Build Failures . . . . 29:1--29:??
Weifeng Pan and
Wei Wu and
Hua Ming and
Dae-Kyoo Kim and
Zijiang Yang and
Yutao Ma Toward the Fractal Dimension of Classes 30:1--30:??
Leandro Oliveria de Souza and
Eduardo Santana de Almeida and
Paulo Anselmo da Mota Silveira Neto and
Earl T. Barr and
Justyna Petke Software Product Line Engineering via
Software Transplantation . . . . . . . . 31:1--31:??
Madhu Selvaraj and
Gias Uddin A Large-Scale Study of IoT Security
Weaknesses and Vulnerabilities in the
Wild . . . . . . . . . . . . . . . . . . 32:1--32:??
Xuetao Li and
Yuxia Zhang and
Cailean Osborne and
Minghui Zhou and
Zhi Jin and
Hui Liu Systematic Literature Review of
Commercial Participation in Open Source
Software . . . . . . . . . . . . . . . . 33:1--33:??
Zhenyang Xu and
Yongqiang Tian and
Mengxiao Zhang and
Jiarui Zhang and
Puzhuo Liu and
Yu Jiang and
Chengnian Sun T-Rec: Fine-Grained Language-Agnostic
Program Reduction Guided by Lexical
Syntax . . . . . . . . . . . . . . . . . 34:1--34:??
Jongchan Park and
Tae Eun Kim and
Dongsun Kim and
Kihong Heo Improving Fault Localization with
External Oracle by Using Counterfactual
Execution . . . . . . . . . . . . . . . 35:1--35:??
Guoqing Wang and
Zeyu Sun and
Jinhao Dong and
Yuxia Zhang and
Mingxuan Zhu and
Qingyuan Liang and
Dan Hao Is It Hard to Generate Holistic Commit
Message? . . . . . . . . . . . . . . . . 36:1--36:??
Jia Li and
Ge Li and
Yongmin Li and
Zhi Jin Structured Chain-of-Thought Prompting
for Code Generation . . . . . . . . . . 37:1--37:??
Emanuela Guglielmi and
Gabriele Bavota and
Rocco Oliveto and
Simone Scalabrino Automatic Identification of Game
Stuttering via Gameplay Videos Analysis 38:1--38:??
Ahcheong Lee and
Youngseok Choi and
Shin Hong and
Yunho Kim and
Kyutae Cho and
Moonzoo Kim ZigZagFuzz: Interleaved Fuzzing of
Program Options and Files . . . . . . . 39:1--39:??
Pouria Alikhanifard and
Nikolaos Tsantalis A Novel Refactoring and Semantic Aware
Abstract Syntax Tree Differencing Tool
and a Benchmark for Evaluating the
Accuracy of Diff Tools . . . . . . . . . 40:1--40:??
Zheng Zheng and
Daixu Ren and
Huai Liu and
Tsong Yueh Chen and
Tiancheng Li Identifying the Failure-Revealing Test
Cases in Metamorphic Testing: a
Statistical Approach . . . . . . . . . . 41:1--41:??
Shuyin Ouyang and
Jie M. Zhang and
Mark Harman and
Meng Wang An Empirical Study of the
Non-Determinism of ChatGPT in Code
Generation . . . . . . . . . . . . . . . 42:1--42:??
Jianhong Zhao and
Yongwang Zhao and
Peisen Yao and
Fanlang Zeng and
Bohua Zhan and
Kui Ren KBX: Verified Model Synchronization via
Formal Bidirectional Transformation . . 43:1--43:??
Yuekai Huang and
Junjie Wang and
Song Wang and
Moshi Wei and
Lin Shi and
Zhe Liu and
Qing Wang Deep API Sequence Generation via Golden
Solution Samples and API Seeds . . . . . 44:1--44:??
Yu Pei and
Jeongju Sohn and
Sarra Habchi and
Mike Papadakis Non-Flaky and Nearly Optimal Time-Based
Treatment of Asynchronous Wait Web Tests 45:1--45:??
Jianming Chen and
Yawen Wang and
Junjie Wang and
Xiaofei Xie and
Dandan Wang and
Qing Wang and
Fanjiang Xu Demo2Test: Transfer Testing of Agent in
Competitive Environment with Failure
Demonstrations . . . . . . . . . . . . . 46:1--46:??
Qipeng Wang and
Shiqi Jiang and
Zhenpeng Chen and
Xu Cao and
Yuanchun Li and
Aoyu Li and
Yun Ma and
Ting Cao and
Xuanzhe Liu Anatomizing Deep Learning Inference in
Web Browsers . . . . . . . . . . . . . . 47:1--47:??
Jinjing Shi and
Zimeng Xiao and
Heyuan Shi and
Yu Jiang and
Xuelong Li QuanTest: Entanglement-Guided Testing of
Quantum Neural Network Systems . . . . . 48:1--48:??
Pin Ji and
Yang Feng and
Ruohao Zhang and
Ruichen Xue and
Yichi Zhang and
Weitao Huang and
Jia Liu and
Zhihong Zhao NLPLego: Assembling Test Generation for
Natural Language Processing Applications 49:1--49:??
Xinyu Sun and
Wanwei Liu and
Shangwen Wang and
Tingyu Chen and
Ye Tao and
Xiaoguang Mao AutoRIC: Automated Neural Network
Repairing Based on Constrained
Optimization . . . . . . . . . . . . . . 50:1--50:??
Ali Rezaei Nasab and
Maedeh Dashti and
Mojtaba Shahin and
Mansooreh Zahedi and
Hourieh Khalajzadeh and
Chetan Arora and
Peng Liang Fairness Concerns in App Reviews: a
Study on AI-Based Mobile Apps . . . . . 51:1--51:??
Yongqian Sun and
Zihan Lin and
Binpeng Shi and
Shenglin Zhang and
Shiyu Ma and
Pengxiang Jin and
Zhenyu Zhong and
Lemeng Pan and
Yicheng Guo and
Dan Pei Interpretable Failure Localization for
Microservice Systems Based on Graph
Autoencoder . . . . . . . . . . . . . . 52:1--52:??
Damiano Torre and
Anitha Chennamaneni and
JaeYun Jo and
Gitika Vyas and
Brandon Sabrsula Toward Enhancing Privacy Preservation of
a Federated Learning CNN Intrusion
Detection System in IoT: Method and
Empirical Study . . . . . . . . . . . . 53:1--53:??
Mathieu Nassif and
Martin P. Robillard Non-Linear Software Documentation with
Interactive Code Examples . . . . . . . 54:1--54:??
Zhiwei Fei and
Jidong Ge and
Chuanyi Li and
Tianqi Wang and
Yuning Li and
Haodong Zhang and
LiGuo Huang and
Bin Luo Patch Correctness Assessment: a Survey 55:1--55:??
Hichem Belgacem and
Xiaochen Li and
Domenico Bianculli and
Lionel Briand A Machine Learning Approach for
Automated Filling of Categorical Fields
in Data Entry Forms --- RCR Report . . . 56:1--56:??
Luciano Zemín and
Ariel Godio and
César Cornejo and
Renzo Degiovanni and
Simón Gutiérrez Brida and
Germán Regis and
Nazareno Aguirre and
Marcelo Fabián Frias An Empirical Study on the Suitability of
Test-based Patch Acceptance Criteria . . 57:1--57:??
Shangwen Wang and
Bo Lin and
Liqian Chen and
Xiaoguang Mao Divide-and-Conquer: Automating Code
Revisions via Localization-and-Revision 58:1--58:??
Beatriz Pérez and
Ángel Luis Rubio Garcia and
María A. Zapata PROV-IDEA: Supporting Interoperable
Schema and Data Provenance within
Database Evolution . . . . . . . . . . . 59:1--59:??
Ting Zhang and
Ivana Clairine Irsan and
Ferdian Thung and
David Lo Revisiting Sentiment Analysis for
Software Engineering in the Era of Large
Language Models . . . . . . . . . . . . 60:1--60:??
Victor Crespo-Rodriguez and
Neelofar and
Aldeida Aleti and
Burak Turhan Instance Space Analysis of Testing of
Autonomous Vehicles in Critical
Scenarios . . . . . . . . . . . . . . . 61:1--61:??
Xiao Yu and
Guancheng Lin and
Xing Hu and
Jacky Wai Keung and
Xin Xia Less Is More: Unlocking Semi-Supervised
Deep Learning for Vulnerability
Detection . . . . . . . . . . . . . . . 62:1--62:??
Jakob Svennevik Notland and
Mariusz Nowostawski and
Jingyue Li An Empirical Study on Governance in
Bitcoin's Consensus Evolution . . . . . 63:1--63:??
Wenwei Gu and
Jinyang Liu and
Zhuangbin Chen and
Jianping Zhang and
Yuxin Su and
Jiazhen Gu and
Cong Feng and
Zengyin Yang and
Yongqiang Yang and
Michael R. Lyu Identifying Performance Issues in Cloud
Service Systems Based on
Relational--Temporal Features . . . . . 64:1--64:??
Luyao Ren and
Xing Zhang and
Ziyue Hua and
Yanyan Jiang and
Xiao He and
Yingfei Xiong and
Tao Xie Validity-Preserving Delta Debugging via
Generator Trace Reduction . . . . . . . 65:1--65:??
Juan de Lara and
Esther Guerra Adaptive Modelling Languages: Abstract
Syntax and Model Migration . . . . . . . 66:1--66:??
Elvira Albert and
Reiner Hähnle and
Alicia Merayo and
Dominic Steinhöfel Certified Cost Bounds for Abstract
Programs . . . . . . . . . . . . . . . . 67:1--67:??
Shayan Noei and
Heng Li and
Ying Zou Detecting Refactoring Commits in Machine
Learning Python Projects: a Machine
Learning-Based Approach . . . . . . . . 68:1--68:??
Yuntong Zhang and
Andreea Costea and
Ridwan Shariffdeen and
Davin McCall and
Abhik Roychoudhury EffFix: Efficient and Effective Repair
of Pointer Manipulating Programs . . . . 69:1--69:??
Yunqi Chen and
Zhiyuan Wan and
Yifei Zhuang and
Ning Liu and
David Lo and
Xiaohu Yang Understanding the OSS Communities of
Deep Learning Frameworks: a Comparative
Case Study of PyTorch and TensorFlow . . 70:1--70:??
Yuan Zhang and
Lei Qu and
Yifei Wu and
Leihuan Wu and
Tingting Yu and
Rui Chen and
Weiqiang Kong Bounded Verification of Atomicity
Violations for Interrupt-Driven Programs
via Lazy Sequentialization . . . . . . . 71:1--71:??
Mikhail Evtikhiev and
Ekaterina Koshchenko and
Vladimir Kovalenko What Could Possibly Go Wrong:
Undesirable Patterns in Collective
Development . . . . . . . . . . . . . . 72:1--72:??
Yufei Zhou and
Haihua Tang and
Longtao Zhu and
Hao Ding and
Junyan Qian Refining Code-Line-Level Bugginess
Identification: Getting the Best of Both
Worlds by Fusing Syntactic and Semantic
Features . . . . . . . . . . . . . . . . 73:1--73:??
Xiaoqin Fu and
Asif Zaman and
Haipeng Cai DistMeasure: a Framework for Runtime
Characterization and Quality Assessment
of Distributed Software via Interprocess
Communications . . . . . . . . . . . . . 74:1--74:??
Yinan Chen and
Yuan Huang and
Xiangping Chen and
Zibin Zheng TG-CUP: a Transformer and GNN-Based
Multi-Modal Comment Updating Method . . 75:1--75:??
Ye Fan and
Chuanyi Li and
Jidong Ge and
LiGuo Huang and
Bin Luo Effective Hard Negative Mining for
Contrastive Learning-Based Code Search 76:1--76:??
Yihong Dong and
Jiazheng Ding and
Xue Jiang and
Ge Li and
Zhuo Li and
Zhi Jin CodeScore: Evaluating Code Generation by
Learning Code Execution . . . . . . . . 77:1--77:??
Xiaodong Gu and
Meng Chen and
Yalan Lin and
Yuhan Hu and
Hongyu Zhang and
Chengcheng Wan and
Zhao Wei and
Yong Xu and
Juhong Wang On the Effectiveness of Large Language
Models in Domain-Specific Code
Generation . . . . . . . . . . . . . . . 78:1--78:??
Jianhang Xiang and
Zhipeng Gao and
Lingfeng Bao and
Xing Hu and
Jiayuan Chen and
Xin Xia Automating Comment Generation for Smart
Contract from Bytecode . . . . . . . . . 79:1--79:??
Wentao Zou and
Qi Li and
Chuanyi Li and
Jidong Ge and
Xiang Chen and
LiGuo Huang and
Bin Luo Improving Source Code Pre-Training via
Type-Specific Masking . . . . . . . . . 80:1--80:??
Quanjun Zhang and
Weifeng Sun and
Chunrong Fang and
Bowen Yu and
Hongyan Li and
Meng Yan and
Jianyi Zhou and
Zhenyu Chen Exploring Automated Assertion Generation
via Large Language Models . . . . . . . 81:1--81:??
Xinyue Li and
Zhenpeng Chen and
Jie M. Zhang and
Federica Sarro and
Ying Zhang and
Xuanzhe Liu Bias behind the Wheel: Fairness Testing
of Autonomous Driving Systems . . . . . 82:1--82:??
Puzhuo Liu and
Chengnian Sun and
Yaowen Zheng and
Xuan Feng and
Chuan Qin and
Yuncheng Wang and
Zhenyang Xu and
Zhi Li and
Peng Di and
Yu Jiang and
Limin Sun LLM-Powered Static Binary Taint Analysis 83:1--83:??
Yicheng Zeng and
Zhanwei Song and
Guo Lv and
Yu Zhou and
Hongsong Zhu and
Limin Sun Backsolver: Adapting Preceding Execution
Paths to Solve Constraints for Concolic
Execution . . . . . . . . . . . . . . . 84:1--84:??
Nico Schiller and
Xinyi Xu and
Lukas Bernhard and
Nils Bars and
Moritz Schloegel and
Thorsten Holz Novelty Not Found: Exploring Input
Shadowing in Fuzzing through Adaptive
Fuzzer Restarts . . . . . . . . . . . . 85:1--85:??
Nico Schiller and
Xinyi Xu and
Lukas Bernhard and
Nils Bars and
Moritz Schloegel and
Thorsten Holz Novelty Not Found: Exploring Input
Shadowing in Fuzzing through Adaptive
Fuzzer Restarts --- RCR Report . . . . . 86:1--86:??
Vahid Majdinasab and
Amin Nikanjam and
Foutse Khomh Trained without My Consent: Detecting
Code Inclusion in Language Models
Trained on Code . . . . . . . . . . . . 87:1--87:??
Jialiang Wei and
Anne-Lise Courbis and
Thomas Lambolais and
Binbin Xu and
Pierre Louis Bernard and
Gérard Dray and
Walid Maalej GUing: a Mobile GUI Search Engine using
a Vision-Language Model . . . . . . . . 88:1--88:??
Yongqian Sun and
Minghan Liang and
Shenglin Zhang and
Zeyu Che and
Zhiyao Luo and
Dongwen Li and
Yuzhi Zhang and
Dan Pei and
Lemeng Pan and
Liping Hou Efficient Multivariate Time Series
Anomaly Detection through Transfer
Learning for Large-Scale Software
Systems . . . . . . . . . . . . . . . . 89:1--89:??
Azmain Kabir and
Shaowei Wang and
Yuan Tian and
Chen, Tse-Hsun (Peter) and
Muhammad Asaduzzaman and
Wenbin Zhang ZS4C: Zero-Shot Synthesis of Compilable
Code for Incomplete Code Snippets Using
LLMs . . . . . . . . . . . . . . . . . . 90:1--90:??
Xiaodan Xu and
Chao Ni and
Xinrong Guo and
Shaoxuan Liu and
Xiaoya Wang and
Kui Liu and
Xiaohu Yang Distinguishing LLM-Generated from
Human-Written Code by Contrastive
Learning . . . . . . . . . . . . . . . . 91:1--91:??
Ruidong Han and
Shangzhi Xu and
Juanru Li and
Elisa Bertino and
David Lo and
JianFeng Ma and
Siqi Ma Real-time Rectifying Flight Control
Misconfiguration Using Intelligent Agent 92:1--92:??
Zihan Sha and
Hao Wang and
Zeyu Gao and
Hui Shu and
Bolun Zhang and
Ziqing Wang and
Chao Zhang llasm: Naming Functions in Binaries by
Fusing Encoder-only and Decoder-only
LLMs . . . . . . . . . . . . . . . . . . 93:1--93:??
Yuta Ishimoto and
Masanari Kondo and
Lei Ma and
Naoyasu Ubayashi and
Yasutaka Kamei Repairs and Breaks Prediction for Deep
Neural Networks . . . . . . . . . . . . 94:1--94:??
Xiaoyu Zhang and
Juan Zhai and
Shiqing Ma and
Xiaohong Guan and
Chao Shen DREAM: Debugging and Repairing AutoML
Pipelines . . . . . . . . . . . . . . . 95:1--95:??
Lehuan Zhang and
Shikai Guo and
Yi Guo and
Hui Li and
Yu Chai and
Rong Chen and
Xiaochen Li and
He Jiang Context-based Transfer Learning for
Structuring Fault Localization and
Program Repair Automation . . . . . . . 96:1--96:??
Ruilin Xie and
Xiang Chen and
Qifan He and
Bixin Li and
Zhanqi Cui IATT: Interpretation Analysis-based
Transferable Test Generation for
Convolutional Neural Networks . . . . . 97:1--97:??
Mauro Pezz\`e and
Silvia Abrahão and
Birgit Penzenstadler and
Denys Poshyvanyk and
Abhik Roychoudhury and
Tao Yue A 2030 Roadmap for Software Engineering 118:1--118:??
Sai Zhang and
Zhenchang Xing and
Ronghui Guo and
Fangzhou Xu and
Lei Chen and
Zhaoyuan Zhang and
Xiaowang Zhang and
Zhiyong Feng and
Zhiqiang Zhuang Empowering Agile-Based Generative
Software Development through Human--AI
Teamwork . . . . . . . . . . . . . . . . 156:1--156:??
Ruchira Manke and
Mohammad Wardat and
Foutse Khomh and
Hridesh Rajan Leveraging Data Characteristics for Bug
Localization in Deep Learning Programs 157:1--157:??
Hassan Sartaj and
Shaukat Ali and
Julie Marie Gjòby MeDeT: Medical Device Digital Twins
Creation with Few-shot Meta-learning . . 158:1--158:??
Lishui Fan and
Jiakun Liu and
Zhongxin Liu and
David Lo and
Xin Xia and
Shanping Li Exploring the Capabilities of LLMs for
Code-Change-Related Tasks . . . . . . . 159:1--159:??
Leo Song and
Steven H. H. Ding and
Yuan Tian and
Li Tao Li and
Weihan Ou and
Philippe Charland and
Andrew Walenstein Obfuscated Clone Search in JavaScript
based on Reinforcement Subsequence
Learning . . . . . . . . . . . . . . . . 160:1--160:??
Zilong He and
Pengfei Chen and
Zibin Zheng On the Practicability of Deep Learning
Based Anomaly Detection for Modern
Online Software Systems: a
Pre-Train-and-Align Framework . . . . . 161:1--161:??
Siyu Nan and
Jian Wang and
Neng Zhang and
Duantengchuan Li and
Bing Li DDASR: Deep Diverse API Sequence
Recommendation . . . . . . . . . . . . . 162:1--162:??
Sepehr Sharifi and
Andrea Stocco and
Lionel C. Briand System Safety Monitoring of Learned
Components Using Temporal Metric
Forecasting . . . . . . . . . . . . . . 163:1--163:??
Weiguo Pian and
Yinghua Li and
Haoye Tian and
Tiezhu Sun and
Yewei Song and
Xunzhu Tang and
Andrew Habib and
Jacques Klein and
Tegawendé F. Bissyandé You Don't Have to Say Where to Edit!
jLED-Joint Learning to Localize and Edit
Source Code . . . . . . . . . . . . . . 164:1--164:??
Ke Xv and
Shikai Guo and
Hui Li and
Chenchen Li and
Rong Chen and
Xiaochen Li and
He Jiang Making Fault Localization in Online
Service Systems More Actionable and
Interpretable . . . . . . . . . . . . . 165:1--165:??
Ding Li and
Ziqi Zhang and
Mengyu Yao and
Yifeng Cai and
Yao Guo and
Xiangqun Chen TEESlice: Protecting Sensitive Neural
Network Models in Trusted Execution
Environments when Attackers Have
Pre-Trained Models . . . . . . . . . . . 166:1--166:??
Shenao Wang and
Yuekang Li and
Kailong Wang and
Yi Liu and
Hui Li and
Yang Liu and
Haoyu Wang MiniScope: Automated UI Exploration and
Privacy Inconsistency Detection of
MiniApps via Two-phase Iterative Hybrid
Analysis . . . . . . . . . . . . . . . . 167:1--167:??
Hongliang Liang and
Luming Yin and
Wenying Hu and
Yuxiang Li and
Wuwei Shen Unified and Split Symbolic Execution for
Exposing Semantic Differences . . . . . 168:1--168:??
Yehong Zhang and
Jun Wu and
Hui Xu RuMono: Fuzz Driver Synthesis for Rust
Generic APIs . . . . . . . . . . . . . . 169:1--169:??
Yifan Zhao and
Zeyu Sun and
Guoqing Wang and
Qingyuan Liang and
Yakun Zhang and
Yiling Lou and
Dan Hao and
Lu Zhang Automatically Learning a Precise
Measurement for Fault Diagnosis
Capability of Test Cases . . . . . . . . 170:1--170:??
Hanmo You and
Zan Wang and
Xuyang Chen and
Junjie Chen and
Jun Sun and
Shuang Liu and
Zishuo Dong Mitigating Regression Faults Induced by
Feature Evolution in Deep Learning
Systems . . . . . . . . . . . . . . . . 171:1--171:??
Sijia Gu and
Ali Mesbah Scalable Similarity-Aware Test Suite
Minimization with Reinforcement Learning 172:1--172:??
Babak Pourasghar and
Habib Izadkhah and
Maryam Akhtari Beyond Cohesion and Coupling:
Integrating Control Flow in Software
Modularization Process for Better Code
Comprehensibility . . . . . . . . . . . 173:1--173:??
Mugeng Liu and
Haiyang Shen and
Yixuan Zhang and
Hong Mei and
Yun Ma WebAssembly for Container Runtime: Are
We There Yet? . . . . . . . . . . . . . 174:1--174:??
Dominik M. Krupke and
Ahmad Moradi and
Michael Perk and
Phillip Keldenich and
Gabriel Gehrke and
Sebastian Krieter and
Thomas Thüm and
Sándor P. Fekete How Low Can We Go? Minimizing
Interaction Samples for Configurable
Systems . . . . . . . . . . . . . . . . 175:1--175:??
Giusy Annunziata and
Stefano Lambiase and
Damian A. Tamburri and
Willem-Jan van den Heuvel and
Fabio Palomba and
Gemma Catolino and
Filomena Ferrucci and
Andrea De Lucia Uncovering Community Smells in Machine
Learning-Enabled Systems: Causes,
Effects, and Mitigation Strategies . . . 176:1--176:??
Ratnadira Widyasari and
Ting Zhang and
Abir Bouraffa and
Walid Maalej and
David Lo Explaining Explanations: an Empirical
Study of Explanations in Code Reviews 177:1--177:??
Kisub Kim and
Xin Zhou and
Dongsun Kim and
Julia Lawall and
Kui Liu and
Tegawende F. Bissyande and
Jacques Klein and
Jaekwon Lee and
David Lo How Are We Detecting Inconsistent Method
Names? An Empirical Study from Code
Review Perspective . . . . . . . . . . . 178:1--178:??
Fu Fan and
Yanjie Jiang and
Tianyi Chen and
Hengshun Zhang and
Yuxia Zhang and
Nan Niu and
Hui Liu An Empirical Study on Common
Sense-Violating Bugs in Mobile Apps . . 179:1--179:??
Taiming Wang and
Hui Liu and
Yuxia Zhang and
Yanjie Jiang Recommending Variable Names for Extract
Local Variable Refactorings . . . . . . 180:1--180:??
Vittorio Cortellessa and
Jorge Andrés Diaz-Pace and
Daniele Di Pompeo and
Sebastian Frank and
Pooyan Jamshidi and
Michele Tucci and
André van Hoorn Introducing Interactions in
Multi-Objective Optimization of Software
Architectures . . . . . . . . . . . . . 181:1--181:??
Canh Minh Do and
Tsubasa Takagi and
Kazuhiro Ogata Automated Quantum Protocol Verification
Based on Concurrent Dynamic Quantum
Logic . . . . . . . . . . . . . . . . . 182:1--182:??
Joonas Hämäläinen and
Teerath Das and
Tommi Mikkonen A Systematic Literature Review of
Multi-Label Learning in Software
Engineering . . . . . . . . . . . . . . 183:1--183:??
Bernd Gruner and
Clemens-Alexander Brust and
Andreas Zeller Finding Information Leaks with
Information Flow Fuzzing . . . . . . . . 184:1--184:??
Bernd Gruner and
Clemens-Alexander Brust and
Andreas Zeller Finding Information Leaks with
Information Flow Fuzzing --- RCR Report 185:1--185:??
Wentao Zou and
Zongwen Shen and
Qi Li and
Jidong Ge and
Chuanyi Li and
Xiang Chen and
Xiaoyu Shen and
Liguo Huang and
Bin Luo Experimental Evaluation of
Parameter-Efficient Fine-Tuning for
Software Engineering Tasks . . . . . . . 186:1--186:34
Hao Yu and
Bo Shen and
Jiaxin Zhang and
Shaoxin Lin and
Lin Li and
Guangtai Liang and
Ying Li and
Qianxiang Wang and
Tao Xie Wenwang: Toward Effectively Generating
Code Beyond Standalone Functions via
Generative Pre-trained Models . . . . . 187:1--187:27
Zezhou Yang and
Sirong Chen and
Cuiyun Gao and
Zhenhao Li and
Xing Hu and
Kui Liu and
Xin Xia An Empirical Study of
Retrieval-Augmented Code Generation:
Challenges and Opportunities . . . . . . 188:1--188:28
Jie JW Wu and
Fatemeh H. Fard HumanEvalComm: Benchmarking the
Communication Competence of Code
Generation for LLMs and LLM Agents . . . 189:1--189:42
Jia Li and
Chongyang Tao and
Jia Li and
Ge Li and
Zhi Jin and
Huangzhao Zhang and
Zheng Fang and
Fang Liu Large Language Model-Aware In-Context
Learning for Code Generation . . . . . . 190:1--190:33
Chong Wang and
Jian Zhang and
Yebo Feng and
Tianlin Li and
Weisong Sun and
Yang Liu and
Xin Peng Teaching Code LLMs to Use Autocompletion
Tools in Repository-Level Code
Generation . . . . . . . . . . . . . . . 191:1--191:27
Wenjie Xu and
Yanhui Li and
Mingliang Ma and
Lin Chen and
Yuming Zhou Weighted Suspiciousness and Balanced
Aggregation to Boost Spectrum-based
Fault Localization of Deep Learning
Models . . . . . . . . . . . . . . . . . 192:1--192:28
Daniel Blasco and
Antonio Iglesias and
Jorge Echeverría and
Francisca Pérez and
Carlos Cetina Introducing Phylogenetics in
Search-based Software Engineering:
Phylogenetics-aware SBSE . . . . . . . . 193:1--193:38
Ran Mo and
Dongyu Wang and
Wenjing Zhan and
Yingjie Jiang and
Yepeng Wang and
Yuqi Zhao and
Zengyang Li and
Yutao Ma Assessing and Analyzing the Correctness
of GitHub Copilot's Code Suggestions . . 194:1--194:32
Qiang Hu and
Yuejun Guo and
Xiaofei Xie and
Maxime Cordy and
Wei Ma and
Mike Papadakis and
Lei Ma and
Yves Le Traon Assessing the Robustness of Test
Selection Methods for Deep Neural
Networks . . . . . . . . . . . . . . . . 195:1--195:26
Chunlian Wu and
Sen Chen and
Jiaming Li and
Renchao Chai and
Lingling Fan and
Xiaofei Xie and
Ruitao Feng Beyond Decision: Android Malware
Description Generation through Profiling
Malicious Behavior Trajectory . . . . . 196:1--196:39
Tianyu Chen and
Ding Li and
Ying Zhang and
Tao Xie JSimpo: Structural Deobfuscation of
JavaScript Programs . . . . . . . . . . 197:1--197:28
Noah H. Oldfield and
Christoph Laaber and
Tao Yue and
Shaukat Ali Faster and Better Quantum Software
Testing through Specification Reduction
and Projective Measurements . . . . . . 198:1--198:39
Ezio Bartocci and
Leonardo Mariani and
Dejan Nickovic and
Drishti Yadav Signal Feature Coverage and Testing for
CPS Dataflow Models . . . . . . . . . . 199:1--199:37
Shunhui Ji and
Changrong Huang and
Bin Ren and
Hai Dong and
Lars Grunske and
Yan Xiao and
Pengcheng Zhang TAEFuzz: Automatic Fuzzing for
Image-based Deep Learning Systems via
Transferable Adversarial Examples . . . 200:1--200:31
Xinyu Ji and
Lei Xue and
Zhijian He and
Xiapu Luo Autonomous Driving System Testing via
Diversity-Oriented Driving Scenario
Exploration . . . . . . . . . . . . . . 201:1--201:28
Fengjie Li and
Jiajun Jiang and
Jiajun Sun and
Hongyu Zhang Hybrid Automated Program Repair by
Combining Large Language Models and
Program Analysis . . . . . . . . . . . . 202:1--202:28
Jiawei Liu and
Xufan Zhang and
Lurong Xu and
Chunrong Fang and
Mingzheng Gu and
Weisi Luo and
Dong Chai and
Jiang Wang and
Zhihong Zhao and
Zhenyu Chen Automated Detection and Repair of
Floating-point Precision Problems in
Convolutional Neural Network Operators 203:1--203:32
Martin Weyssow and
Xin Zhou and
Kisub Kim and
David Lo and
Houari Sahraoui Exploring Parameter-Efficient
Fine-Tuning Techniques for Code
Generation with Large Language Models 204:1--204:25
Xiang Chen and
Chaoyang Gao and
Chunyang Chen and
Guangbei Zhang and
Yong Liu An Empirical Study on Challenges for LLM
Application Developers . . . . . . . . . 205:1--205:37
Jieke Shi and
Zhou Yang and
Junda He and
Bowen Xu and
Dongsun Kim and
DongGyun Han and
David Lo Finding Safety Violations of AI-Enabled
Control Systems through the Lens of
Synthesized Proxy Programs . . . . . . . 206:1--206:35
Yi Zhang and
He Jiang and
Shikai Guo and
Xiaochen Li and
Hui Liu and
Chongyang Shi Toward Understanding FPGA Synthesis Tool
Bugs . . . . . . . . . . . . . . . . . . 207:1--207:37
Wei Ma and
Chenguang Zhu and
Ye Liu and
Xiaofei Xie and
Yi Li A Comprehensive Study of Governance
Issues in Decentralized Finance
Applications . . . . . . . . . . . . . . 208:1--208:31
Quanjun Zhang and
Chunrong Fang and
Yi Zheng and
Yaxin Zhang and
Yuan Zhao and
Rubing Huang and
Jianyi Zhou and
Yun Yang and
Tao Zheng and
Zhenyu Chen Improving Deep Assertion Generation via
Fine-Tuning Retrieval-Augmented
Pre-Trained Language Models . . . . . . 209:1--209:23
Xiangping Chen and
Ziang Qian and
Peiyong Liao and
Yuan Huang and
Changlin Yang and
Zibin Zheng Characterizing Smart Contract Evolution 210:1--210:22
Audris Mockus and
Rui Abreu and
Peter C Rigby and
David Amsallem and
Parveen Bansal and
Kaavya Chinniah and
Brian Ellis and
Peng Fan and
Jun Ge and
Bingjie He and
Kelly Hirano and
Sahil Kumar and
Ajay Lingapuram and
Andrew Loe and
Megh Mehta and
Venus Montes and
Maher Saba and
Gursharan Singh and
Matt Steiner and
Weiyan Sun and
Siri Uppalapati and
Nachiappan Nagappan Leveraging Risk Models to Improve
Productivity for Effective Code
Un-Freeze at Scale . . . . . . . . . . . 211:1--211:24
Shaiful Chowdhury The Good, the Bad, and the Monstrous:
Predicting Highly Change-Prone Source
Code Methods at Their Inception . . . . 212:1--212:29
Thanh Le-Cong and
Dat Nguyen and
Bach Le and
Toby Murray Towards Reliable Evaluation of Neural
Program Repair with Natural Robustness
Testing . . . . . . . . . . . . . . . . 213:1--213:44
Shuhan Liu and
Jiayuan Zhou and
Xing Hu and
Filipe Roseiro Cogo and
Xin Xia and
Xiaohu Yang An Empirical Study on Vulnerability
Disclosure Management of Open Source
Software Systems . . . . . . . . . . . . 214:1--214:31
Geovana Ramos Sousa Silva and
Edna Dias Canedo Privacy in Chatbot Conversation-Driven
Development: a Comprehensive Review and
Requirements Proposal . . . . . . . . . 215:1--215:44