Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Redefining prioritization: continuous prioritization for continuous integration Jingjing Liang, Sebastian G. Elbaum, Gregg Rothermel |
Redefining prioritization: continuous prioritization for continuous integration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ganesha Upadhyaya, Hridesh Rajan |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ENTRUST: engineering trustworthy self-adaptive software with dynamic assurance cases Radu Calinescu, Danny Weyns, Simos Gerasimou, M. Usman Iftikhar, Ibrahim Habli, Tim Kelly |
ENTRUST: engineering trustworthy self-adaptive software with dynamic assurance cases Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Effect sizes and their variance for AB/BA crossover design studies Lech Madeyski, Barbara A. Kitchenham |
Effect sizes and their variance for AB/BA crossover design studies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Context-aware patch generation for better automated program repair Ming Wen, Junjie Chen, Rongxin Wu, Dan Hao, Shing-Chi Cheung |
Context-aware patch generation for better automated program repair Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A posteriori typing for model-driven engineering: concepts, analysis, and applications Juan de Lara, Esther Guerra |
A posteriori typing for model-driven engineering: concepts, analysis, and applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A comparison of program comprehension strategies by blind and sighted programmers Ameer Armaly, Paige Rodeghero, Collin McMillan |
A comparison of program comprehension strategies by blind and sighted programmers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lightweight, obfuscation-resilient detection and family identification of Android malware Joshua Garcia, Mahmoud Hammad, Sam Malek |
Lightweight, obfuscation-resilient detection and family identification of Android malware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Online app review analysis for identifying emerging issues Cuiyun Gao, Jichuan Zeng, Michael R. Lyu, Irwin King |
Online app review analysis for identifying emerging issues Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Narayan Ramasubbu, Chris F. Kemerer |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Leveraging program analysis to reduce user-perceived latency in mobile applications Yixue Zhao, Marcelo Schmitt Laser, Yingjun Lyu, Nenad Medvidovic |
Leveraging program analysis to reduce user-perceived latency in mobile applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
RFC-directed differential testing of certificate validation in SSL/TLS implementations Chu Chen, Cong Tian, Zhenhua Duan, Liang Zhao |
RFC-directed differential testing of certificate validation in SSL/TLS implementations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Does syntax highlighting help programming novices? Christoph Hannebauer, Marc Hesenius, Volker Gruhn |
Does syntax highlighting help programming novices? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeFlaker: automatically detecting flaky tests Jonathan Bell, Owolabi Legunsen, Michael Hilton, Lamyaa Eloussi, Tifany Yung, Darko Marinov |
DeFlaker: automatically detecting flaky tests Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, Syed Asad Naqvi |
The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yinxing Xue, Yan-Fu Li |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DroidStar: callback typestates for Android classes Arjun Radhakrishna, Nicholas V. Lewchenko, Shawn Meier, Sergio Mover, Krishna Chaitanya Sripada, Damien Zufferey, Bor-Yuh Evan Chang, Pavol Cerný |
DroidStar: callback typestates for Android classes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On the dichotomy of debugging behavior among programmers Moritz Beller, Niels Spruit, Diomidis Spinellis, Andy Zaidman |
On the dichotomy of debugging behavior among programmers Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A static verification framework for message passing in Go using behavioural types Julien Lange, Nicholas Ng, Bernardo Toninho, Nobuko Yoshida |
A static verification framework for message passing in Go using behavioural types Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Augmenting and structuring user queries to support efficient free-form code search Raphael Sirres, Tegawendé F. Bissyandé, Dongsun Kim, David Lo, Jacques Klein, Kisub Kim, Yves Le Traon |
Augmenting and structuring user queries to support efficient free-form code search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CCAligner: a token based large-gap clone detector Pengcheng Wang, Jeffrey Svajlenko, Yanzhao Wu, Yun Xu, Chanchal K. Roy |
CCAligner: a token based large-gap clone detector Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A graph solver for the automated generation of consistent domain-specific models Oszkár Semeráth, András Szabolcs Nagy, Dániel Varró |
A graph solver for the automated generation of consistent domain-specific models Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated localization for unreproducible builds Zhilei Ren, He Jiang, Jifeng Xuan, Zijiang Yang |
Automated localization for unreproducible builds Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Understanding developers' needs on deprecation as a language feature Anand Ashok Sawant, Maurício Finavaro Aniche, Arie van Deursen, Alberto Bacchelli |
Understanding developers' needs on deprecation as a language feature Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Context-aware conversational developer assistants Nick C. Bradley, Thomas Fritz, Reid Holmes |
Context-aware conversational developer assistants Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Debugging with intelligence via probabilistic inference Zhaogui Xu, Shiqing Ma, Xiangyu Zhang, Shuofei Zhu, Baowen Xu |
Debugging with intelligence via probabilistic inference Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Semantic program repair using a reference implementation Sergey Mechtaev, Manh-Dung Nguyen, Yannic Noller, Lars Grunske, Abhik Roychoudhury |
Semantic program repair using a reference implementation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical study on the interplay between semantic coupling and co-change of software classes Nemitari Ajienka, Andrea Capiluppi, Steve Counsell |
An empirical study on the interplay between semantic coupling and co-change of software classes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ConflictJS: finding and understanding conflicts between JavaScript libraries Jibesh Patra, Pooja N. Dixit, Michael Pradel |
ConflictJS: finding and understanding conflicts between JavaScript libraries Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
An empirical study of early access games on the steam platform Dayi Lin, Cor-Paul Bezemer, Ahmed E. Hassan |
An empirical study of early access games on the steam platform Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GUILeak: tracing privacy policy claims on user input data for Android applications Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu |
GUILeak: tracing privacy policy claims on user input data for Android applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Leen Lambers, Daniel Strüber, Gabriele Taentzer, Kristopher Born, Jevgenij Huebert |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
David Trabish, Andrea Mattavelli, Noam Rinetzky, Cristian Cadar |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards reusing hints from past fixes: an exploratory study on thousands of real samples Hao Zhong, Na Meng |
Towards reusing hints from past fixes: an exploratory study on thousands of real samples Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Global-aware recommendations for repairing violations in exception handling Eiji Adachi Barbosa, Alessandro Garcia |
Global-aware recommendations for repairing violations in exception handling Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fine-grained test minimization Arash Vahabzadeh, Andrea Stocco, Ali Mesbah |
Fine-grained test minimization Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
ChangeLocator: locate crash-inducing changes based on crash reports Rongxin Wu, Ming Wen, Shing-Chi Cheung, Hongyu Zhang |
ChangeLocator: locate crash-inducing changes based on crash reports Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Neuro-symbolic program corrector for introductory programming assignments Sahil Bhatia, Pushmeet Kohli, Rishabh Singh |
Neuro-symbolic program corrector for introductory programming assignments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure coding practices in Java: challenges and vulnerabilities Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo Arango Argoty |
Secure coding practices in Java: challenges and vulnerabilities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The road to live programming: insights from the practice Juraj Kubelka, Romain Robbes, Alexandre Bergel |
The road to live programming: insights from the practice Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
To distribute or not to distribute?: why licensing bugs matter Christopher Vendome, Daniel M. Germán, Massimiliano Di Penta, Gabriele Bavota, Mario Linares Vásquez, Denys Poshyvanyk |
To distribute or not to distribute?: why licensing bugs matter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yanxin Lu, Swarat Chaudhuri, Chris Jermaine, David Melski |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards refactoring-aware regression test selection Kaiyuan Wang, Chenguang Zhu, Ahmet Çelik, Jongwook Kim, Don S. Batory, Milos Gligoric |
Towards refactoring-aware regression test selection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Talita Vieira Ribeiro, Jobson L. Massollar, Guilherme Horta Travassos |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
UFO: predictive concurrency use-after-free detection Jeff Huang |
UFO: predictive concurrency use-after-free detection Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
When not to comment: questions and tradeoffs with API documentation for C++ projects Andrew Head, Caitlin Sadowski, Emerson R. Murphy-Hill, Andrea Knight |
When not to comment: questions and tradeoffs with API documentation for C++ projects Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Older adults and hackathons: a qualitative study Wieslaw Kopec, Bartlomiej Balcerzak, Radoslaw Nielek, Grzegorz Kowalik, Adam Wierzbicki, Fabio Casati |
Older adults and hackathons: a qualitative study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How modern news aggregators help development communities shape and share knowledge Maurício Finavaro Aniche, Christoph Treude, Igor Steinmacher, Igor Wiese, Gustavo Pinto, Margaret-Anne D. Storey, Marco Aurélio Gerosa |
How modern news aggregators help development communities shape and share knowledge Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inheritance usage patterns in open-source systems Jamie Stevenson, Murray I. Wood |
Inheritance usage patterns in open-source systems Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
When testing meets code review: why and how developers review tests Davide Spadini, Maurício Finavaro Aniche, Margaret-Anne D. Storey, Magiel Bruntink, Alberto Bacchelli |
When testing meets code review: why and how developers review tests Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Predicting future developer behavior in the IDE using topic models Kostadin Damevski, Hui Chen, David C. Shepherd, Nicholas A. Kraft, Lori L. Pollock |
Predicting future developer behavior in the IDE using topic models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DetReduce: minimizing Android GUI test suites for regression testing Wontae Choi, Koushik Sen, George C. Necula, Wenyu Wang |
DetReduce: minimizing Android GUI test suites for regression testing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Xiangyu Li, Shaowei Zhu, Marcelo d'Amorim, Alessandro Orso |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The evolution of requirements practices in software startups Catarina Gralha, Daniela E. Damian, Anthony I. Wasserman, Miguel Goulão, João Araújo |
The evolution of requirements practices in software startups Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Inferring hierarchical motifs from execution traces Saba Alimadadi, Ali Mesbah, Karthik Pattabiraman |
Inferring hierarchical motifs from execution traces Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
MSeer: an advanced technique for locating multiple bugs in parallel Ruizhi Gao, W. Eric Wong |
MSeer: an advanced technique for locating multiple bugs in parallel Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Debugging data flows in reactive programs Herman Banken, Erik Meijer, Georgios Gousios |
Debugging data flows in reactive programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Traceability in the wild: automatically augmenting incomplete trace links Michael Rath, Jacob Rendall, Jin L. C. Guo, Jane Cleland-Huang, Patrick Mäder |
Traceability in the wild: automatically augmenting incomplete trace links Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FAST approaches to scalable similarity-based test case prioritization Breno Miranda, Emilio Cruciani, Roberto Verdecchia, Antonia Bertolino |
FAST approaches to scalable similarity-based test case prioritization Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow Tianyi Zhang, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, Miryung Kim |
Are code examples on an online Q&A forum reliable?: a study of API misuse on stack overflow Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Testing vision-based control systems using learnable evolutionary algorithms Raja Ben Abdessalem, Shiva Nejati, Lionel C. Briand, Thomas Stifter |
Testing vision-based control systems using learnable evolutionary algorithms Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Programming not only by example Hila Peleg, Sharon Shoham, Eran Yahav |
Programming not only by example Details |
Author Comments:
The gim-ui project contains the user study tool which uses the program space generated by scala-enumerating-synthesizer, as well as the raw data from recorded sessions.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Goal-conflict likelihood assessment based on model counting Renzo Degiovanni, Pablo F. Castro, Marcelo Arroyo, Marcelo Ruiz, Nazareno Aguirre, Marcelo F. Frias |
Goal-conflict likelihood assessment based on model counting Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Katsiaryna Labunets, Fabio Massacci, Federica Paci, Sabrina Marczak, Flávio Moreira de Oliveira |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Shane McIntosh, Yasutaka Kamei |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Repairing crashes in Android apps Shin Hwei Tan, Zhen Dong, Xiang Gao, Abhik Roychoudhury |
Repairing crashes in Android apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What makes a great manager of software engineers? Eirini Kalliamvakou, Christian Bird, Thomas Zimmermann, Andrew Begel, Robert DeLine, Daniel M. Germán |
What makes a great manager of software engineers? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A comparative study to benchmark cross-project defect prediction approaches Steffen Herbold, Alexander Trautsch, Jens Grabowski |
A comparative study to benchmark cross-project defect prediction approaches Details |
|
Author Comments:
Nice work. You should try to filter Journal First papers though. :)
Discussion Comments:
0
Sharing:
Publication does not represent original research
Verification:
Authors have
verified
information
|
The scent of a smell: an extensive comparison between textual and structural smells Fabio Palomba, Annibale Panichella, Andy Zaidman, Rocco Oliveto, Andrea De Lucia |
The scent of a smell: an extensive comparison between textual and structural smells Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Statistical learning of API fully qualified names in code snippets of online forums Hung Phan, Hoan Anh Nguyen, Ngoc M. Tran, Linh H. Truong, Anh Tuan Nguyen, Tien N. Nguyen |
Statistical learning of API fully qualified names in code snippets of online forums Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Are vulnerabilities discovered and resolved like other defects? Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie Williams |
Are vulnerabilities discovered and resolved like other defects? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Symbolic verification of regular properties Hengbiao Yu, Zhenbang Chen, Ji Wang, Zhendong Su, Wei Dong |
Symbolic verification of regular properties Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Software protection on the go: a large-scale empirical study on mobile app obfuscation Pei Wang, Qinkun Bao, Li Wang, Shuai Wang, Zhaofeng Chen, Tao Wei, Dinghao Wu |
Software protection on the go: a large-scale empirical study on mobile app obfuscation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Assessing the threat of untracked changes in software evolution André C. Hora, Danilo Silva, Marco Tulio Valente, Romain Robbes |
Assessing the threat of untracked changes in software evolution Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Privacy by designers: software developers' privacy mindset Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, Arod Balissa |
Privacy by designers: software developers' privacy mindset Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EARMO: an energy-aware refactoring approach for mobile apps Rodrigo Morales, Rubén Saborido, Foutse Khomh, Francisco Chicano, Giuliano Antoniol |
EARMO: an energy-aware refactoring approach for mobile apps Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Jianmei Guo, Kai Shi |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Identifying design problems in the source code: a grounded theory Leonardo da Silva Sousa, Anderson Oliveira, Willian Nalepa Oizumi, Simone D. J. Barbosa, Alessandro Garcia, Jaejoon Lee, Marcos Kalinowski, Rafael Maiani de Mello, Baldoino Fonseca, Roberto Felicio Oliveira, Carlos Lucena, Rodrigo B. de Paes |
Identifying design problems in the source code: a grounded theory Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Accurate and efficient refactoring detection in commit history Nikolaos Tsantalis, Matin Mansouri, Laleh Mousavi Eshkevari, Davood Mazinanian, Danny Dig |
Accurate and efficient refactoring detection in commit history Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Deuce: a lightweight user interface for structured editing Brian Hempel, Justin Lubin, Grace Lu, Ravi Chugh |
Deuce: a lightweight user interface for structured editing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Overfitting in semantics-based automated program repair Xuan-Bach D. Le, Ferdian Thung, David Lo, Claire Le Goues |
Overfitting in semantics-based automated program repair Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem Asher Trockman, Shurui Zhou, Christian Kästner, Bogdan Vasilescu |
Adding sparkle to social coding: an empirical study of repository badges in the npm ecosystem Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Xiaodong Gu, Hongyu Zhang, Sunghun Kim |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Experiences and challenges in building a data intensive system for data migration Marco Scavuzzo, Elisabetta Di Nitto, Danilo Ardagna |
Experiences and challenges in building a data intensive system for data migration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fabio Palomba, Gabriele Bavota, Massimiliano Di Penta, Fausto Fasano, Rocco Oliveto, Andrea De Lucia |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeepTest: automated testing of deep-neural-network-driven autonomous cars Yuchi Tian, Kexin Pei, Suman Jana, Baishakhi Ray |
DeepTest: automated testing of deep-neural-network-driven autonomous cars Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On the use of hidden Markov model to predict the time to fix bugs Mayy Habayeb, Syed Shariyar Murtaza, Andriy V. Miranskyy, Ayse Basar Bener |
On the use of hidden Markov model to predict the time to fix bugs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Precise concolic unit testing of C programs using extended units and symbolic alarm filtering Yunho Kim, Yunja Choi, Moonzoo Kim |
Precise concolic unit testing of C programs using extended units and symbolic alarm filtering Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Speedoo: prioritizing performance optimization opportunities Zhifei Chen, Bihuan Chen, Lu Xiao, Xiao Wang, Lin Chen, Yang Liu, Baowen Xu |
Speedoo: prioritizing performance optimization opportunities Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sentiment analysis for software engineering: how far can we go? Bin Lin, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta, Michele Lanza, Rocco Oliveto |
Sentiment analysis for software engineering: how far can we go? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Daniel M. Germán, Gregorio Robles, Germán Poo-Caamaño, Xin Yang, Hajimu Iida, Katsuro Inoue |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A combinatorial approach for exposing off-nominal behaviors Kaushik Madala, Hyunsook Do, Daniel Aceituna |
A combinatorial approach for exposing off-nominal behaviors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A temporal permission analysis and enforcement framework for Android Alireza Sadeghi, Reyhaneh Jabbarvand, Negar Ghorbani, Hamid Bagheri, Sam Malek |
A temporal permission analysis and enforcement framework for Android Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Generalized data structure synthesis Calvin Loncaric, Michael D. Ernst, Emina Torlak |
Generalized data structure synthesis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Do you remember this source code? Jacob Krüger, Jens Wiemann, Wolfram Fenske, Gunter Saake, Thomas Leich |
Do you remember this source code? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Reducer-based construction of conditional verifiers Dirk Beyer, Marie-Christine Jakobs, Thomas Lemberger, Heike Wehrheim |
Reducer-based construction of conditional verifiers Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Andre Arcuri |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
HireBuild: an automatic approach to history-driven repair of build scripts Foyzul Hassan, Xiaoyin Wang |
HireBuild: an automatic approach to history-driven repair of build scripts Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated refactoring of OCL constraints with search Hong Lu, Shuai Wang, Tao Yue, Shaukat Ali, Jan F. Nygård |
Automated refactoring of OCL constraints with search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Analyzing a decade of Linux system calls Mojtaba Bagherzadeh, Nafiseh Kahani, Cor-Paul Bezemer, Ahmed E. Hassan, Juergen Dingel, James R. Cordy |
Analyzing a decade of Linux system calls Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A correlation study between automated program repair and test-suite metrics Jooyong Yi, Shin Hwei Tan, Sergey Mechtaev, Marcel Böhme, Abhik Roychoudhury |
A correlation study between automated program repair and test-suite metrics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mike Papadakis, Donghwan Shin, Shin Yoo, Doo-Hwan Bae |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Statistical errors in software engineering experiments: a preliminary literature review Rolando P. Reyes, Oscar Dieste, Efraín R. Fonseca C., Natalia Juristo |
Statistical errors in software engineering experiments: a preliminary literature review Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Static automated program repair for heap properties Rijnard van Tonder, Claire Le Goues |
Static automated program repair for heap properties Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Amritanshu Agrawal, Tim Menzies |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Perses: syntax-guided program reduction Chengnian Sun, Yuanbo Li, Qirun Zhang, Tianxiao Gu, Zhendong Su |
Perses: syntax-guided program reduction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Kwabena Ebo Bennin, Jacky Keung, Passakorn Phannachitta, Akito Monden, Solomon Mensah |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EnMobile: entity-based characterization and analysis of mobile malware Wei Yang, Mukul R. Prasad, Tao Xie |
EnMobile: entity-based characterization and analysis of mobile malware Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inferring and asserting distributed system invariants Stewart Grant, Hendrik Cech, Ivan Beschastnikh |
Inferring and asserting distributed system invariants Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Collaborative model-driven software engineering: a classification framework and a research map Davide Di Ruscio, Mirco Franzago, Henry Muccini, Ivano Malavolta |
Collaborative model-driven software engineering: a classification framework and a research map Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Towards practical program repair with on-demand candidate generation Jinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid |
Towards practical program repair with on-demand candidate generation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Correctness attraction: a study of stability of software behavior under runtime perturbation Benjamin Danglot, Philippe Preux, Benoit Baudry, Martin Monperrus |
Correctness attraction: a study of stability of software behavior under runtime perturbation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Nemo: multi-criteria test-suite minimization with integer nonlinear programming Jun-Wei Lin, Reyhaneh Jabbarvand, Joshua Garcia, Sam Malek |
Nemo: multi-criteria test-suite minimization with integer nonlinear programming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Do programmers work at night or during the weekend? Maëlick Claes, Mika V. Mäntylä, Miikka Kuutila, Bram Adams |
Do programmers work at night or during the weekend? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measuring program comprehension: a large-scale field study with professionals Xin Xia, Lingfeng Bao, David Lo, Zhenchang Xing, Ahmed E. Hassan, Shanping Li |
Measuring program comprehension: a large-scale field study with professionals Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Shaowei Wang, Tse-Hsun Chen, Ahmed E. Hassan |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Data scientists in software teams: state of the art and challenges Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel |
Data scientists in software teams: state of the art and challenges Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Chunyang Chen, Ting Su, Guozhu Meng, Zhenchang Xing, Yang Liu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inference of development activities from interaction with uninstrumented applications Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Ahmed E. Hassan |
Inference of development activities from interaction with uninstrumented applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sentiment polarity detection for software development Fabio Calefato, Filippo Lanubile, Federico Maiorano, Nicole Novielli |
Sentiment polarity detection for software development Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synthesizing qualitative research in software engineering: a critical review Xin Huang, He Zhang, Xin Zhou, Muhammad Ali Babar, Song Yang |
Synthesizing qualitative research in software engineering: a critical review Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How not to structure your database-backed web applications: a study of performance bugs in the wild Junwen Yang, Pranav Subramaniam, Shan Lu, Cong Yan, Alvin Cheung |
How not to structure your database-backed web applications: a study of performance bugs in the wild Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hybrid regression test selection Lingming Zhang |
Hybrid regression test selection Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Roles and impacts of hands-on software architects in five industrial case studies Inayat Rehman, Mehdi Mirakhorli, Meiyappan Nagappan, Azat Aralbay Uulu, Matthew Thornton |
Roles and impacts of hands-on software architects in five industrial case studies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FaCoY: a code-to-code search engine Kisub Kim, Dongsun Kim, Tegawendé F. Bissyandé, Eunjong Choi, Li Li, Jacques Klein, Yves Le Traon |
FaCoY: a code-to-code search engine Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Augusto: exploiting popular functionalities for the generation of semantic GUI tests with Oracles Leonardo Mariani, Mauro Pezzè, Daniele Zuddas |
Augusto: exploiting popular functionalities for the generation of semantic GUI tests with Oracles Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Analyzing the effects of test driven development in GitHub Neil C. Borle, Meysam Feghhi, Eleni Stroulia, Russell Greiner, Abram Hindle |
Analyzing the effects of test driven development in GitHub Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Prioritizing browser environments for web application test execution Jung-Hyun Kwon, In-Young Ko, Gregg Rothermel |
Prioritizing browser environments for web application test execution Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Does the propagation of artifact changes across tasks reflect work dependencies? Christoph Mayr-Dorn, Alexander Egyed |
Does the propagation of artifact changes across tasks reflect work dependencies? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Open source barriers to entry, revisited: a sociotechnical perspective Christopher J. Mendez, Hema Susmita Padala, Zoe Steine-Hanson, Claudia Hilderbrand, Amber Horvath, Charles Hill, Logan Simpson, Nupoor Patil, Anita Sarma, Margaret M. Burnett |
Open source barriers to entry, revisited: a sociotechnical perspective Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dataflow tunneling: mining inter-request data dependencies for request-based applications Xiao Yu, Guoliang Jin |
Dataflow tunneling: mining inter-request data dependencies for request-based applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated repair of mobile friendly problems in web pages Sonal Mahajan, Negarsadat Abolhassani, Phil McMinn, William G. J. Halfond |
Automated repair of mobile friendly problems in web pages Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic software repair: a survey Luca Gazzola, Daniela Micucci, Leonardo Mariani |
Automatic software repair: a survey Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards optimal concolic testing Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, Yun Lin |
Towards optimal concolic testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Search-based test data generation for SQL queries Jeroen Castelein, Maurício Finavaro Aniche, Mozhan Soltani, Annibale Panichella, Arie van Deursen |
Search-based test data generation for SQL queries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Identifying patch correctness in test-based program repair Yingfei Xiong, Xinyuan Liu, Muhan Zeng, Lu Zhang, Gang Huang |
Identifying patch correctness in test-based program repair Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Shurui Zhou, Stefan Stanciulescu, Olaf Leßenich, Yingfei Xiong, Andrzej Wasowski, Christian Kästner |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated reporting of GUI design violations for mobile apps Kevin Moran, Boyang Li, Carlos Bernal-Cárdenas, Dan Jelf, Denys Poshyvanyk |
Automated reporting of GUI design violations for mobile apps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Do automated program repair techniques repair hard and important bugs? Manish Motwani, Sandhya Sankaranarayanan, René Just, Yuriy Brun |
Do automated program repair techniques repair hard and important bugs? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Studying the dialogue between users and developers of free apps in the google play store Safwat Hassan, Chakkrit Tantithamthavorn, Cor-Paul Bezemer, Ahmed E. Hassan |
Studying the dialogue between users and developers of free apps in the google play store Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Time to clean your test objectives Michaël Marcozzi, Sébastien Bardin, Nikolai Kosmatov, Mike Papadakis, Virgile Prevosto, Loïc Correnson |
Time to clean your test objectives Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Large-scale analysis of framework-specific exceptions in Android apps Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su |
Large-scale analysis of framework-specific exceptions in Android apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Muhammad Moiz Arif, Weiyi Shang, Emad Shihab |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient sampling of SAT solutions for testing Rafael Dutra, Kevin Laeufer, Jonathan Bachrach, Koushik Sen |
Efficient sampling of SAT solutions for testing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mahmoud Hammad, Joshua Garcia, Sam Malek |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Self-hiding behavior in Android apps: detection and characterization Zhiyong Shan, Iulian Neamtiu, Raina Samuel |
Self-hiding behavior in Android apps: detection and characterization Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Metamorphic testing of RESTful web APIs Sergio Segura, José Antonio Parejo, Javier Troya, Antonio Ruiz Cortés |
Metamorphic testing of RESTful web APIs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Almost there: a study on quasi-contributors in open source software projects Igor Steinmacher, Gustavo Pinto, Igor Scaliante Wiese, Marco Aurélio Gerosa |
Almost there: a study on quasi-contributors in open source software projects Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Launch-mode-aware context-sensitive activity transition analysis Yifei Zhang, Yulei Sui, Jingling Xue |
Launch-mode-aware context-sensitive activity transition analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Propagating configuration decisions with modal implication graphs Sebastian Krieter, Thomas Thüm, Sandro Schulze, Reimar Schröter, Gunter Saake |
Propagating configuration decisions with modal implication graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatically generating search heuristics for concolic testing Sooyoung Cha, Seongjoon Hong, Junhee Lee, Hakjoo Oh |
Automatically generating search heuristics for concolic testing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforge Shafiul Azam Chowdhury, Soumik Mohian, Sidharth Mehra, Siddhant Gawsane, Taylor T. Johnson, Christoph Csallner |
Automatically finding bugs in a commercial cyber-physical system development tool chain with SLforge Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|