Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Legend: an agile DSL toolset for web acceptance testing Tariq M. King, Gabriel Nunez, Dionny Santiago, Adam Cando, Cody Mack |
Legend: an agile DSL toolset for web acceptance testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FLOWER: optimal test suite reduction as a network maximum flow Arnaud Gotlieb, Dusica Marijan |
FLOWER: optimal test suite reduction as a network maximum flow Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reusing constraint proofs for scalable program analysis Meixian Chen |
Reusing constraint proofs for scalable program analysis Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
CoREBench: studying complexity of regression errors Marcel Böhme, Abhik Roychoudhury |
CoREBench: studying complexity of regression errors Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CrashLocator: locating crashing faults based on crash stacks Rongxin Wu, Hongyu Zhang, Shing-Chi Cheung, Sunghun Kim |
CrashLocator: locating crashing faults based on crash stacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cross-platform feature matching for web applications Shauvik Roy Choudhary, Mukul R. Prasad, Alessandro Orso |
Cross-platform feature matching for web applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Covrig: a framework for the analysis of code, test, and coverage evolution in real software Paul Dan Marinescu, Petr Hosek, Cristian Cadar |
Covrig: a framework for the analysis of code, test, and coverage evolution in real software Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Canalyze: a static bug-finding tool for C programs Zhenbo Xu, Jian Zhang, Zhongxing Xu, Jiteng Wang |
Canalyze: a static bug-finding tool for C programs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Integrated energy-directed test suite optimization Ding Li, Yuchen Jin, Cagri Sahin, James Clause, William G. J. Halfond |
Integrated energy-directed test suite optimization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Semantic differential repair for input validation and sanitization Muath Alkhalaf, Abdulbaki Aydin, Tevfik Bultan |
Semantic differential repair for input validation and sanitization Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Extending a search-based test generator with adaptive dynamic symbolic execution Juan Pablo Galeotti, Gordon Fraser, Andrea Arcuri |
Extending a search-based test generator with adaptive dynamic symbolic execution Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Efficient mutation analysis by propagating and partitioning infected execution states René Just, Michael D. Ernst, Gordon Fraser |
Efficient mutation analysis by propagating and partitioning infected execution states Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Link: exploiting the web of data to generate test inputs Leonardo Mariani, Mauro Pezzè, Oliviero Riganelli, Mauro Santoro |
Link: exploiting the web of data to generate test inputs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SunCat: helping developers understand and predict performance problems in smartphone applications Adrian Nistor, Lenin Ravindranath |
SunCat: helping developers understand and predict performance problems in smartphone applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Verifying atomicity via data independence Ohad Shacham, Eran Yahav, Guy Golan-Gueta, Alex Aiken, Nathan Grasso Bronson, Mooly Sagiv, Martin T. Vechev |
Verifying atomicity via data independence Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reducing GUI test suites via program slicing Stephan Arlt, Andreas Podelski, Martin Wehrle |
Reducing GUI test suites via program slicing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Robust test automation using contextual clues Rahulkrishna Yandrapally, Suresh Thummalapenta, Saurabh Sinha, Satish Chandra |
Robust test automation using contextual clues Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Performance regression testing of concurrent classes Michael Pradel, Markus Huggler, Thomas R. Gross |
Performance regression testing of concurrent classes Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Constructing coding duels in Pex4Fun and code hunt Nikolai Tillmann, Jonathan de Halleux, Tao Xie, Judith Bishop |
Constructing coding duels in Pex4Fun and code hunt Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Verification-aided regression testing Fabrizio Pastore, Leonardo Mariani, Antti Eero Johannes Hyvärinen, Grigory Fedyukovich, Natasha Sharygina, Stephan Sehestedt, Ali Muhammad |
Verification-aided regression testing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Efficient statistical debugging via hierarchical instrumentation Zhiqiang Zuo |
Efficient statistical debugging via hierarchical instrumentation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Using test case reduction and prioritization to improve symbolic execution Chaoqiang Zhang, Alex Groce, Mohammad Amin Alipour |
Using test case reduction and prioritization to improve symbolic execution Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
A type system for format strings Konstantin Weitz, Gene Kim, Siwakorn Srisakaokul, Michael D. Ernst |
A type system for format strings Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Virtual DOM coverage for effective testing of dynamic web applications Yunxiao Zou, Zhenyu Chen, Yunhui Zheng, Xiangyu Zhang, Zebao Gao |
Virtual DOM coverage for effective testing of dynamic web applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A variability-based testing approach for synthesizing video sequences José A. Galindo, Mauricio Alférez, Mathieu Acher, Benoit Baudry, David Benavides |
A variability-based testing approach for synthesizing video sequences Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Runtime prevention of concurrency related type-state violations in multithreaded applications Lu Zhang, Chao Wang |
Runtime prevention of concurrency related type-state violations in multithreaded applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MuCheck: an extensible tool for mutation testing of haskell programs Duc Le, Mohammad Amin Alipour, Rahul Gopinath, Alex Groce |
MuCheck: an extensible tool for mutation testing of haskell programs Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Tailored source code transformations to synthesize computationally diverse program variants Benoit Baudry, Simon Allier, Martin Monperrus |
Tailored source code transformations to synthesize computationally diverse program variants Details |
Author Comments:
A tool and experimental results about diversification of Java code at the statement level
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
An empirical study of injected versus actual interface errors Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo, Neeraj Suri |
An empirical study of injected versus actual interface errors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated testing for SQL injection vulnerabilities: an input mutation approach Dennis Appelt, Cu Duy Nguyen, Lionel C. Briand, Nadia Alshahwan |
Automated testing for SQL injection vulnerabilities: an input mutation approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DOM-based test adequacy criteria for web applications Mehdi MirzaAghaei, Ali Mesbah |
DOM-based test adequacy criteria for web applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability Yiyan Lin, Sandeep S. Kulkarni |
Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ARC++: effective typestate and lifetime dependency analysis Xusheng Xiao, Gogul Balakrishnan, Franjo Ivancic, Naoto Maeda, Aarti Gupta, Deepak Chhetri |
ARC++: effective typestate and lifetime dependency analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A format string checker for Java Konstantin Weitz, Siwakorn Srisakaokul, Gene Kim, Michael D. Ernst |
A format string checker for Java Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Feedback-driven dynamic invariant discovery Lingming Zhang, Guowei Yang, Neha Rungta, Suzette Person, Sarfraz Khurshid |
Feedback-driven dynamic invariant discovery Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ProCrawl: mining test models from multi-user web applications Matthias Schur, Andreas Roth, Andreas Zeller |
ProCrawl: mining test models from multi-user web applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying optimal trade-offs between CPU time usage and temporal constraints using search Shiva Nejati, Lionel C. Briand |
Identifying optimal trade-offs between CPU time usage and temporal constraints using search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Empirically revisiting the test independence assumption Sai Zhang, Darioush Jalali, Jochen Wuttke, Kivanç Muslu, Wing Lam, Michael D. Ernst, David Notkin |
Empirically revisiting the test independence assumption Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Effective test generation and adequacy assessment for JavaScript-based web applications Shabnam Mirshokraie |
Effective test generation and adequacy assessment for JavaScript-based web applications Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Defects4J: a database of existing faults to enable controlled testing studies for Java programs René Just, Darioush Jalali, Michael D. Ernst |
Defects4J: a database of existing faults to enable controlled testing studies for Java programs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The major mutation framework: efficient and scalable mutation analysis for Java René Just |
The major mutation framework: efficient and scalable mutation analysis for Java Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Scalable detection of missed cross-function refactorings Narcisa Andreea Milea, Lingxiao Jiang, Siau-Cheng Khoo |
Scalable detection of missed cross-function refactorings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dodona: automated oracle data set selection Pablo Loyola, Matt Staats, In-Young Ko, Gregg Rothermel |
Dodona: automated oracle data set selection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient predicated bug signature mining via hierarchical instrumentation Zhiqiang Zuo, Siau-Cheng Khoo, Chengnian Sun |
Efficient predicated bug signature mining via hierarchical instrumentation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hybrid security analysis of web JavaScript code via dynamic partial evaluation Omer Tripp, Pietro Ferrara, Marco Pistoia |
Hybrid security analysis of web JavaScript code via dynamic partial evaluation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coverage and fault detection of the output-uniqueness test selection criteria Nadia Alshahwan, Mark Harman |
Coverage and fault detection of the output-uniqueness test selection criteria Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
X-PERT: a web application testing tool for cross-browser inconsistency detection Shauvik Roy Choudhary, Mukul R. Prasad, Alessandro Orso |
X-PERT: a web application testing tool for cross-browser inconsistency detection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Lightweight automated detection of unsafe information leakage via exceptions Benwen Zhang, James Clause |
Lightweight automated detection of unsafe information leakage via exceptions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Andrew Henderson, Aravind Prakash, Lok-Kwong Yan, Xunchao Hu, Xujiewen Wang, Rundong Zhou, Heng Yin |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|