Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Do developers read compiler error messages? Titus Barik, Justin Smith, Kevin Lubick, Elisabeth Holmes, Jing Feng, Emerson R. Murphy-Hill, Chris Parnin |
Do developers read compiler error messages? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Precise condition synthesis for program repair Yingfei Xiong, Jie Wang, Runfa Yan, Jiachen Zhang, Shi Han, Gang Huang, Lu Zhang |
Precise condition synthesis for program repair Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Analysis and testing of notifications in Android wear applications Hailong Zhang, Atanas Rountev |
Analysis and testing of notifications in Android wear applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Repairing event race errors by controlling nondeterminism Christoffer Quist Adamsen, Anders Møller, Rezwana Karim, Manu Sridharan, Frank Tip, Koushik Sen |
Repairing event race errors by controlling nondeterminism Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Stochastic optimization of program obfuscation Han Liu, Chengnian Sun, Zhendong Su, Yu Jiang, Ming Gu, Jiaguang Sun |
Stochastic optimization of program obfuscation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Performance diagnosis for inefficient loops Linhai Song, Shan Lu |
Performance diagnosis for inefficient loops Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An unsupervised approach for discovering relevant tutorial fragments for APIs He Jiang, Jingxuan Zhang, Zhilei Ren, Tao Zhang |
An unsupervised approach for discovering relevant tutorial fragments for APIs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Exploring API embedding for API usages and applications Trong Duc Nguyen, Anh Tuan Nguyen, Hung Dang Phan, Tien N. Nguyen |
Exploring API embedding for API usages and applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Search-driven string constraint solving for vulnerability detection Julian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand |
Search-driven string constraint solving for vulnerability detection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
RClassify: classifying race conditions in web applications via deterministic replay Lu Zhang, Chao Wang |
RClassify: classifying race conditions in web applications via deterministic replay Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic text input generation for mobile testing Peng Liu, Xiangyu Zhang, Marco Pistoia, Yunhui Zheng, Manoel Marques, Lingfei Zeng |
Automatic text input generation for mobile testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutions Andrea Aquino, Giovanni Denaro, Mauro Pezzè |
Heuristically matching solution spaces of arithmetic formulas to efficiently reuse solutions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Balancing soundness and efficiency for practical testing of configurable systems Sabrina Souto, Marcelo d'Amorim, Rohit Gheyi |
Balancing soundness and efficiency for practical testing of configurable systems Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Glacier: transitive class immutability for Java Michael J. Coblenz, Whitney Nelson, Jonathan Aldrich, Brad A. Myers, Joshua Sunshine |
Glacier: transitive class immutability for Java Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Evaluating and improving fault localization Spencer Pearson, José Campos, René Just, Gordon Fraser, Rui Abreu, Michael D. Ernst, Deric Pang, Benjamin Keller |
Evaluating and improving fault localization Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SPAIN: security patch analysis for binaries towards understanding the pain and pills Zhengzi Xu, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Fu Song |
SPAIN: security patch analysis for binaries towards understanding the pain and pills Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yuming Zhou, Baowen Xu |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Making malory behave maliciously: targeted fuzzing of android execution environments Siegfried Rasthofer, Steven Arzt, Stefan Triller, Michael Pradel |
Making malory behave maliciously: targeted fuzzing of android execution environments Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Can latent topics in source code predict missing architectural tactics? Raghuram Gopalakrishnan, Palak Sharma, Mehdi Mirakhorli, Matthias Galster |
Can latent topics in source code predict missing architectural tactics? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Todd Sedano, Paul Ralph, Cécile Péraire |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Aleksander Fabijan, Pavel A. Dmitriev, Helena Holmström Olsson, Jan Bosch |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Symbolic model extraction for web application verification Ivan Bocic, Tevfik Bultan |
Symbolic model extraction for web application verification Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PEoPL: projectional editing of product lines Benjamin Behringer, Jochen Palz, Thorsten Berger |
PEoPL: projectional editing of product lines Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Amanda Lee, Jeffrey C. Carver, Amiangshu Bosu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Machine learning-based detection of open source license exceptions Christopher Vendome, Mario Linares Vásquez, Gabriele Bavota, Massimiliano Di Penta, Daniel M. Germán, Denys Poshyvanyk |
Machine learning-based detection of open source license exceptions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Supporting software developers with a holistic recommender system Luca Ponzanelli, Simone Scalabrino, Gabriele Bavota, Andrea Mocci, Rocco Oliveto, Massimiliano Di Penta, Michele Lanza |
Supporting software developers with a holistic recommender system Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Classifying developers into core and peripheral: an empirical study on count and network metrics Mitchell Joblin, Sven Apel, Claus Hunsen, Wolfgang Mauerer |
Classifying developers into core and peripheral: an empirical study on count and network metrics Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
UML diagram refinement (focusing on class- and use case diagrams) David Faitelson, Shmuel S. Tyszberowicz |
UML diagram refinement (focusing on class- and use case diagrams) Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Fuzzy fine-grained code-history analysis Francisco Servant, James A. Jones |
Fuzzy fine-grained code-history analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On cross-stack configuration errors Mohammed Sayagh, Noureddine Kerzazi, Bram Adams |
On cross-stack configuration errors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ProEva: runtime proactive performance evaluation based on continuous-time markov chains Guoxin Su, Taolue Chen, Yuan Feng, David S. Rosenblum |
ProEva: runtime proactive performance evaluation based on continuous-time markov chains Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Semantically enhanced software traceability using deep learning techniques Jin Guo, Jinghui Cheng, Jane Cleland-Huang |
Semantically enhanced software traceability using deep learning techniques Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
LibD: scalable and precise third-party library detection in android markets Menghao Li, Wei Wang, Pei Wang, Shuai Wang, Dinghao Wu, Jian Liu, Rui Xue, Wei Huo |
LibD: scalable and precise third-party library detection in android markets Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Travioli: a dynamic analysis for detecting data-structure traversals Rohan Padhye, Koushik Sen |
Travioli: a dynamic analysis for detecting data-structure traversals Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
An efficient, robust, and scalable approach for analyzing interacting android apps Yutaka Tsutano, Shakthi Bachala, Witawas Srisa-an, Gregg Rothermel, Jackson Dinh |
An efficient, robust, and scalable approach for analyzing interacting android apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Machine-learning-guided selectively unsound static analysis Kihong Heo, Hakjoo Oh, Kwangkeun Yi |
Machine-learning-guided selectively unsound static analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Unsupervised software-specific morphological forms inference from informal discussions Chunyang Chen, Zhenchang Xing, Ximing Wang |
Unsupervised software-specific morphological forms inference from informal discussions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RADAR: a lightweight tool for requirements and architecture decision analysis Saheed A. Busari, Emmanuel Letier |
RADAR: a lightweight tool for requirements and architecture decision analysis Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Thierry Titcheu Chekam, Mike Papadakis, Yves Le Traon, Mark Harman |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A SEALANT for inter-app security holes in android Youn Kyu Lee, Jae Young Bang, Gholamreza Safi, Arman Shahbazian, Yixue Zhao, Nenad Medvidovic |
A SEALANT for inter-app security holes in android Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A general framework for dynamic stub injection Maria Christakis, Patrick Emmisberger, Patrice Godefroid, Peter Müller |
A general framework for dynamic stub injection Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Learning to prioritize test programs for compiler testing Junjie Chen, Yanwei Bai, Dan Hao, Yingfei Xiong, Hongyu Zhang, Bing Xie |
Learning to prioritize test programs for compiler testing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
How good is a security policy against real breaches?: a HIPAA case study Özgür Kafali, Jasmine Jones, Megan Petruso, Laurie Williams, Munindar P. Singh |
How good is a security policy against real breaches?: a HIPAA case study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Statically checking web API requests in JavaScript Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim Alain Laredo |
Statically checking web API requests in JavaScript Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Anna Filippova, Erik H. Trainer, James D. Herbsleb |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adaptive unpacking of Android apps Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu |
Adaptive unpacking of Android apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Becoming agile: a grounded theory of agile transitions in practice Rashina Hoda, James Noble |
Becoming agile: a grounded theory of agile transitions in practice Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing game José Miguel Rojas, Thomas D. White, Benjamin S. Clegg, Gordon Fraser |
Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing game Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
He Jiang, Xiaochen Li, Zijiang Yang, Jifeng Xuan |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decoding the representation of code in the brain: an fMRI study of code review and expertise Benjamin Floyd, Tyler Santander, Westley Weimer |
Decoding the representation of code in the brain: an fMRI study of code review and expertise Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Efficient detection of thread safety violations via coverage-guided generation of concurrent tests Ankit Choudhary, Shan Lu, Michael Pradel |
Efficient detection of thread safety violations via coverage-guided generation of concurrent tests Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A guided genetic algorithm for automated crash reproduction Mozhan Soltani, Annibale Panichella, Arie van Deursen |
A guided genetic algorithm for automated crash reproduction Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
To type or not to type: quantifying detectable bugs in JavaScript Zheng Gao, Christian Bird, Earl T. Barr |
To type or not to type: quantifying detectable bugs in JavaScript Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting user story information in developer-client conversations to generate extractive summaries Paige Rodeghero, Siyuan Jiang, Ameer Armaly, Collin McMillan |
Detecting user story information in developer-client conversations to generate extractive summaries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Characterizing and detecting anti-patterns in the logging code Boyuan Chen, Zhen Ming (Jack) Jiang |
Characterizing and detecting anti-patterns in the logging code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Clone refactoring with lambda expressions Nikolaos Tsantalis, Davood Mazinanian, Shahriar Rostami |
Clone refactoring with lambda expressions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Analyzing APIs documentation and code to detect directive defects Yu Zhou, Ruihang Gu, Taolue Chen, Zhiqiu Huang, Sebastiano Panichella, Harald C. Gall |
Analyzing APIs documentation and code to detect directive defects Details |
|
Author Comments:
In short time we will make available the scalable version of a research prototype we adopted for our research.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Automated transplantation and differential testing for clones Tianyi Zhang, Miryung Kim |
Automated transplantation and differential testing for clones Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Learning syntactic program transformations from examples Reudismam Rolim, Gustavo Soares, Loris D'Antoni, Oleksandr Polozov, Sumit Gulwani, Rohit Gheyi, Ryo Suzuki, Björn Hartmann |
Learning syntactic program transformations from examples Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Syntactic and semantic differencing for combinatorial models of test designs Rachel Tzoref-Brill, Shahar Maoz |
Syntactic and semantic differencing for combinatorial models of test designs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Challenges for static analysis of Java reflection: literature review and empirical study Davy Landman, Alexander Serebrenik, Jurgen J. Vinju |
Challenges for static analysis of Java reflection: literature review and empirical study Details |
Author Comments:
Distinguished paper award
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Optimizing test placement for module-level regression testing August Shi, Suresh Thummalapenta, Shuvendu K. Lahiri, Nikolaj Bjørner, Jacek Czerwonka |
Optimizing test placement for module-level regression testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Recommending and localizing change requests for mobile apps based on user reviews Fabio Palomba, Pasquale Salza, Adelina Ciurumelea, Sebastiano Panichella, Harald C. Gall, Filomena Ferrucci, Andrea De Lucia |
Recommending and localizing change requests for mobile apps based on user reviews Details |
Author Comments:
We are going to deliver in the next months the scalable version of ChangeAdvisor research prototype.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Adaptive coverage and operational profile-based testing for reliability improvement Antonia Bertolino, Breno Miranda, Roberto Pietrantuono, Stefano Russo |
Adaptive coverage and operational profile-based testing for reliability improvement Details |
Author Comments:
All the subjects investigated in our experiments are from the SIR repository.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automated refactoring of legacy Java software to default methods Raffi Khatchadourian, Hidehiko Masuhara |
Automated refactoring of legacy Java software to default methods Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Yun Lin, Jun Sun, Yinxing Xue, Yang Liu, Jin Song Dong |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
ZenIDS: introspective intrusion detection for PHP applications Byron Hawkins, Brian Demsky |
ZenIDS: introspective intrusion detection for PHP applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A test-suite diagnosability metric for spectrum-based fault localization approaches Alexandre Perez, Rui Abreu, Arie van Deursen |
A test-suite diagnosability metric for spectrum-based fault localization approaches Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|