Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis Mukund Raghothaman, Yi Wei, Youssef Hamadi |
SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-objective software effort estimation Federica Sarro, Alessio Petrozziello, Mark Harman |
Multi-objective software effort estimation Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Xiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
iDice: problem identification for emerging issues Qingwei Lin, Jian-Guang Lou, Hongyu Zhang, Dongmei Zhang |
iDice: problem identification for emerging issues Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Termination-checking for LLVM peephole optimizations David Menendez, Santosh Nagarakatte |
Termination-checking for LLVM peephole optimizations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Debugging for reactive programming Guido Salvaneschi, Mira Mezini |
Debugging for reactive programming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synthesizing framework models for symbolic execution Jinseong Jeon, Xiaokang Qiu, Jonathan Fetter-Degges, Jeffrey S. Foster, Armando Solar-Lezama |
Synthesizing framework models for symbolic execution Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Efficient large-scale trace checking using mapreduce Marcello M. Bersani, Domenico Bianculli, Carlo Ghezzi, Srdan Krstic, Pierluigi San Pietro |
Efficient large-scale trace checking using mapreduce Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VDTest: an automated framework to support testing for virtual devices Tingting Yu, Xiao Qu, Myra B. Cohen |
VDTest: an automated framework to support testing for virtual devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Augmenting API documentation with insights from stack overflow Christoph Treude, Martin P. Robillard |
Augmenting API documentation with insights from stack overflow Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Konrad Jamrozik, Philipp von Styp-Rekowsky, Andreas Zeller |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Feature-model interfaces: the highway to compositional analyses of highly-configurable systems Reimar Schröter, Sebastian Krieter, Thomas Thüm, Fabian Benduhn, Gunter Saake |
Feature-model interfaces: the highway to compositional analyses of highly-configurable systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Exploring language support for immutability Michael J. Coblenz, Joshua Sunshine, Jonathan Aldrich, Brad A. Myers, Sam Weber, Forrest Shull |
Exploring language support for immutability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Martin P. Robillard, Nenad Medvidovic |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Generating performance distributions via probabilistic symbolic execution Bihuan Chen, Yang Liu, Wei Le |
Generating performance distributions via probabilistic symbolic execution Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Shadow of a doubt: testing for divergences between software versions Hristina Palikareva, Tomasz Kuchta, Cristian Cadar |
Shadow of a doubt: testing for divergences between software versions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features Shing-Chi Cheung, Wanjun Chen, Yepang Liu, Chang Xu |
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Crowdsourcing program preconditions via a classification game Daniel Fava, Dan Shapiro, Joseph C. Osborn, Martin Schäf, E. James Whitehead Jr. |
Crowdsourcing program preconditions via a classification game Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Performance issues and optimizations in JavaScript: an empirical study Marija Selakovic, Michael Pradel |
Performance issues and optimizations in JavaScript: an empirical study Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Xin Ye, Hui Shen, Xiao Ma, Razvan C. Bunescu, Chang Liu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated parameter optimization of classification techniques for defect prediction models Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto |
Automated parameter optimization of classification techniques for defect prediction models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical study of practitioners' perspectives on green software engineering Irene Manotas, Christian Bird, Rui Zhang, David C. Shepherd, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause |
An empirical study of practitioners' perspectives on green software engineering Details |
|
Author Comments:
We are not able to disclose the data sets produced during the research presented in this paper due to Non Disclosure Agreements signed with the involved parties.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Patanamon Thongtanunam, Shane McIntosh, Ahmed E. Hassan, Hajimu Iida |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Building a theory of job rotation in software engineering from an instrumental case study Ronnie E. S. Santos, Fabio Q. B. da Silva, Cleyton V. C. de Magalhães, Cleviton V. F. Monteiro |
Building a theory of job rotation in software engineering from an instrumental case study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Shuai Wang, Shaukat Ali, Tao Yue, Yan Li, Marius Liaaen |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Program synthesis using natural language Aditya Desai, Sumit Gulwani, Vineet Hingorani, Nidhi Jain, Amey Karkare, Mark Marron, Sailesh R, Subhajit Roy |
Program synthesis using natural language Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated energy optimization of HTTP requests for mobile applications Ding Li, Yingjun Lyu, Jiaping Gui, William G. J. Halfond |
Automated energy optimization of HTTP requests for mobile applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Optimizing selection of competing services with probabilistic hierarchical refinement Tian Huat Tan, Manman Chen, Jun Sun, Yang Liu, Étienne André, Yinxing Xue, Jin Song Dong |
Optimizing selection of competing services with probabilistic hierarchical refinement Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalable thread sharing analysis Jeff Huang |
Scalable thread sharing analysis Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Understanding asynchronous interactions in full-stack JavaScript Saba Alimadadi, Ali Mesbah, Karthik Pattabiraman |
Understanding asynchronous interactions in full-stack JavaScript Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Belief & evidence in empirical software engineering Premkumar T. Devanbu, Thomas Zimmermann, Christian Bird |
Belief & evidence in empirical software engineering Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Risk-driven revision of requirements models Dalal Alrajeh, Axel van Lamsweerde, Jeff Kramer, Alessandra Russo, Sebastián Uchitel |
Risk-driven revision of requirements models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding and fixing multiple language interoperability issues: the C/Fortran case Nawrin Sultana, Justin Middleton, Jeffrey Overbey, Munawar Hafiz |
Understanding and fixing multiple language interoperability issues: the C/Fortran case Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reliability of Run-Time Quality-of-Service evaluation using parametric model checking Guoxin Su, David S. Rosenblum, Giordano Tamburrelli |
Reliability of Run-Time Quality-of-Service evaluation using parametric model checking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BigDebug: debugging primitives for interactive big data processing in spark Muhammad Ali Gulzar, Matteo Interlandi, Seunghyun Yoo, Sai Deep Tetali, Tyson Condie, Todd D. Millstein, Miryung Kim |
BigDebug: debugging primitives for interactive big data processing in spark Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Overcoming open source project entry barriers with a portal for newcomers Igor Steinmacher, Tayana Uchôa Conte, Christoph Treude, Marco Aurélio Gerosa |
Overcoming open source project entry barriers with a portal for newcomers Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
On the limits of mutation reduction strategies Rahul Gopinath, Mohammad Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce |
On the limits of mutation reduction strategies Details |
Author Comments:
The paper is built using Knitr and uses Nix packaging manager. If you have a
Nix installation, use ./bin/nix.sh to get a compilation environment where the Knitr sources can be compiled using `make`
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Nomen est omen: exploring and exploiting similarities between argument and parameter names Hui Liu, Qiurong Liu, Cristian-Alexandru Staicu, Michael Pradel, Yue Luo |
Nomen est omen: exploring and exploiting similarities between argument and parameter names Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Behavioral log analysis with statistical guarantees Nimrod Busany, Shahar Maoz |
Behavioral log analysis with statistical guarantees Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DoubleTake: fast and precise error detection via evidence-based dynamic analysis Tongping Liu, Charlie Curtsinger, Emery D. Berger |
DoubleTake: fast and precise error detection via evidence-based dynamic analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A comparison of 10 sampling algorithms for configurable systems Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Rohit Gheyi, Sven Apel |
A comparison of 10 sampling algorithms for configurable systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Probing for requirements knowledge to stimulate architectural thinking Preethu Rose Anish, Balaji Balasubramaniam, Abhishek Sainani, Jane Cleland-Huang, Maya Daneva, Roel J. Wieringa, Smita Ghaisas |
Probing for requirements knowledge to stimulate architectural thinking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The impact of test case summaries on bug fixing performance: an empirical investigation Sebastiano Panichella, Annibale Panichella, Moritz Beller, Andy Zaidman, Harald C. Gall |
The impact of test case summaries on bug fixing performance: an empirical investigation Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automatic model generation from documentation for Java API functions Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin |
Automatic model generation from documentation for Java API functions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng |
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Angelix: scalable multiline program patch synthesis via symbolic analysis Sergey Mechtaev, Jooyong Yi, Abhik Roychoudhury |
Angelix: scalable multiline program patch synthesis via symbolic analysis Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automatically learning semantic features for defect prediction Song Wang, Taiyue Liu, Lin Tan |
Automatically learning semantic features for defect prediction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An analysis of the search spaces for generate and validate patch generation systems Fan Long, Martin C. Rinard |
An analysis of the search spaces for generate and validate patch generation systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Energy profiles of Java collections classes Samir Hasan, Zachary King, Munawar Hafiz, Mohammed Sayagh, Bram Adams, Abram Hindle |
Energy profiles of Java collections classes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang |
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Quality experience: a grounded theory of successful agile projects without dedicated testers Lutz Prechelt, Holger Schmeisky, Franz Zieris |
Quality experience: a grounded theory of successful agile projects without dedicated testers Details |
|
Author Comments:
The detailed qualitative data (case study database) is slightly confidential: we have cleared with the partner companies only the quotes appearing in the article.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Automated partitioning of android applications for trusted execution environments Konstantin Rubinov, Lucia Rosculete, Tulika Mitra, Abhik Roychoudhury |
Automated partitioning of android applications for trusted execution environments Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
SourcererCC: scaling code clone detection to big-code Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes |
SourcererCC: scaling code clone detection to big-code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decoupling level: a new metric for architectural maintenance complexity Ran Mo, Yuanfang Cai, Rick Kazman, Lu Xiao, Qiong Feng |
Decoupling level: a new metric for architectural maintenance complexity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Discovering "unknown known" security requirements Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew John Edwards, Ruzanna Chitchyan, Muhammad Ali Babar |
Discovering "unknown known" security requirements Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
StubDroid: automatic inference of precise data-flow summaries for the android framework Steven Arzt, Eric Bodden |
StubDroid: automatic inference of precise data-flow summaries for the android framework Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the techniques we create, the tools we build, and their misalignments: a study of KLEE Eric F. Rizzi, Sebastian G. Elbaum, Matthew B. Dwyer |
On the techniques we create, the tools we build, and their misalignments: a study of KLEE Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
MobiPlay: a remote execution based record-and-replay tool for mobile applications Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li |
MobiPlay: a remote execution based record-and-replay tool for mobile applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Toward a framework for detecting privacy policy violations in android application code Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu |
Toward a framework for detecting privacy policy violations in android application code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RETracer: triaging crashes by reverse execution from partial memory dumps Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis |
RETracer: triaging crashes by reverse execution from partial memory dumps Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Fixing deadlocks via lock pre-acquisitions Yan Cai, Lingwei Cao |
Fixing deadlocks via lock pre-acquisitions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PRADA: prioritizing android devices for apps by mining large-scale usage data Xuan Lu, Xuanzhe Liu, Huoran Li, Tao Xie, Qiaozhu Mei, Dan Hao, Gang Huang, Feng Feng |
PRADA: prioritizing android devices for apps by mining large-scale usage data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coverage-driven test code generation for concurrent classes Valerio Terragni, Shing-Chi Cheung |
Coverage-driven test code generation for concurrent classes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Jumping through hoops: why do Java developers struggle with cryptography APIs? Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden |
Jumping through hoops: why do Java developers struggle with cryptography APIs? Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Code review quality: how developers see it Oleksii Kononenko, Olga Baysal, Michael W. Godfrey |
Code review quality: how developers see it Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Featured model-based mutation analysis Xavier Devroey, Gilles Perrouin, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens, Patrick Heymans |
Featured model-based mutation analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Guiding dynamic symbolic execution toward unverified program executions Maria Christakis, Peter Müller, Valentin Wüstholz |
Guiding dynamic symbolic execution toward unverified program executions Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Learning API usages from bytecode: a statistical approach Tam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen |
Learning API usages from bytecode: a statistical approach Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Improving refactoring speed by 10X Jongwook Kim, Don S. Batory, Danny Dig, Maider Azanza |
Improving refactoring speed by 10X Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Revisit of automatic debugging via human focus-tracking analysis Xiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan, Baowen Xu |
Revisit of automatic debugging via human focus-tracking analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Code anomalies flock together: exploring code anomaly agglomerations for locating design problems Willian Nalepa Oizumi, Alessandro F. Garcia, Leonardo da Silva Sousa, Bruno Barbieri Pontes Cafeo, Yixue Zhao |
Code anomalies flock together: exploring code anomaly agglomerations for locating design problems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Comparing white-box and black-box test prioritization Christopher Henard, Mike Papadakis, Mark Harman, Yue Jia, Yves Le Traon |
Comparing white-box and black-box test prioritization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the "naturalness" of buggy code Baishakhi Ray, Vincent Hellendoorn, Saheel Godhane, Zhaopeng Tu, Alberto Bacchelli, Premkumar T. Devanbu |
On the "naturalness" of buggy code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How does the degree of variability affect bug finding? Jean Melo, Claus Brabrand, Andrzej Wasowski |
How does the degree of variability affect bug finding? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Work practices and challenges in pull-based development: the contributor's perspective Georgios Gousios, Margaret-Anne D. Storey, Alberto Bacchelli |
Work practices and challenges in pull-based development: the contributor's perspective Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Jonas Eckhardt, Andreas Vogelsang, Daniel Méndez Fernández |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Finding and analyzing compiler warning defects Chengnian Sun, Vu Le, Zhendong Su |
Finding and analyzing compiler warning defects Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Too long; didn't watch!: extracting relevant fragments from software development video tutorials Luca Ponzanelli, Gabriele Bavota, Andrea Mocci, Massimiliano Di Penta, Rocco Oliveto, Mir Anamul Hasan, Barbara Russo, Sonia Haiduc, Michele Lanza |
Too long; didn't watch!: extracting relevant fragments from software development video tutorials Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Peter C. Rigby, Yue Cai Zhu, Samuel M. Donadelli, Audris Mockus |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated test suite generation for time-continuous simulink models Reza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann |
Automated test suite generation for time-continuous simulink models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How does regression test prioritization perform in real-world software evolution? Yafeng Lu, Yiling Lou, Shiyang Cheng, Lingming Zhang, Dan Hao, Yangfan Zhou, Lu Zhang |
How does regression test prioritization perform in real-world software evolution? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical comparison of compiler testing techniques Junjie Chen, Wenxiang Hu, Dan Hao, Yingfei Xiong, Hongyu Zhang, Lu Zhang, Bing Xie |
An empirical comparison of compiler testing techniques Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Locking discipline inference and checking Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto, Javier Thaine |
Locking discipline inference and checking Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Type-aware concolic testing of JavaScript programs Monika Dhok, Murali Krishna Ramanathan, Nishant Sinha |
Type-aware concolic testing of JavaScript programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The emerging role of data scientists on software development teams Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel |
The emerging role of data scientists on software development teams Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Finding security bugs in web applications using a catalog of access control patterns Joseph P. Near, Daniel Jackson |
Finding security bugs in web applications using a catalog of access control patterns Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The sky is not the limit: multitasking across GitHub projects Bogdan Vasilescu, Kelly Blincoe, Qi Xuan, Casey Casalnuovo, Daniela E. Damian, Premkumar T. Devanbu, Vladimir Filkov |
The sky is not the limit: multitasking across GitHub projects Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Identifying and quantifying architectural debt Lu Xiao, Yuanfang Cai, Rick Kazman, Ran Mo, Qiong Feng |
Identifying and quantifying architectural debt Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using (bio)metrics to predict code quality online Sebastian C. Müller, Thomas Fritz |
Using (bio)metrics to predict code quality online Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The challenges of staying together while moving fast: an exploratory study Julia Rubin, Martin Rinard |
The challenges of staying together while moving fast: an exploratory study Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Floating-point precision tuning using blame analysis Cindy Rubio-González, Cuong Nguyen, Benjamin Mehne, Koushik Sen, James Demmel, William Kahan, Costin Iancu, Wim Lavrijsen, David H. Bailey, David Hough |
Floating-point precision tuning using blame analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Release planning of mobile apps based on user reviews Lorenzo Villarroel, Gabriele Bavota, Barbara Russo, Rocco Oliveto, Massimiliano Di Penta |
Release planning of mobile apps based on user reviews Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The evolution of C programming practices: a study of the Unix operating system 1973-2015 Diomidis Spinellis, Panos Louridas, Maria Kechagia |
The evolution of C programming practices: a study of the Unix operating system 1973-2015 Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Cross-supervised synthesis of web-crawlers Adi Omari, Sharon Shoham, Eran Yahav |
Cross-supervised synthesis of web-crawlers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cross-project defect prediction using a connectivity-based unsupervised classifier Feng Zhang, Quan Zheng, Ying Zou, Ahmed E. Hassan |
Cross-project defect prediction using a connectivity-based unsupervised classifier Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PAC learning-based verification and model synthesis Yu-Fang Chen, Chiao Hsieh, Ondrej Lengál, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang |
PAC learning-based verification and model synthesis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AntMiner: mining more bugs by reducing noise interference Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai |
AntMiner: mining more bugs by reducing noise interference Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reducing combinatorics in GUI testing of android applications Nariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek |
Reducing combinatorics in GUI testing of android applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Feedback-directed instrumentation for deployed JavaScript applications Magnus Madsen, Frank Tip, Esben Andreasen, Koushik Sen, Anders Møller |
Feedback-directed instrumentation for deployed JavaScript applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Grounded theory in software engineering research: a critical review and guidelines Klaas-Jan Stol, Paul Ralph, Brian Fitzgerald |
Grounded theory in software engineering research: a critical review and guidelines Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical study on the impact of C++ lambdas and programmer experience Phillip Merlin Uesbeck, Andreas Stefik, Stefan Hanenberg, Jan Pedersen, Patrick Daleiden |
An empirical study on the impact of C++ lambdas and programmer experience Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|