Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Systematic execution of Android test suites in adverse conditions Christoffer Quist Adamsen, Gianluca Mezzetti, Anders Møller |
Systematic execution of Android test suites in adverse conditions Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Proactive detection of inadequate diagnostic messages for software configuration errors Sai Zhang, Michael D. Ernst |
Proactive detection of inadequate diagnostic messages for software configuration errors Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
ConcBugAssist: constraint solving for diagnosis and repair of concurrency bugs Sepideh Khoshnood, Markus Kusano, Chao Wang |
ConcBugAssist: constraint solving for diagnosis and repair of concurrency bugs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reliability assessment for distributed systems via communication abstraction and refinement Lin Gui, Jun Sun, Yang Liu, Jin Song Dong |
Reliability assessment for distributed systems via communication abstraction and refinement Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Optimizing selection of competing features via feedback-directed evolutionary algorithms Tian Huat Tan, Yinxing Xue, Manman Chen, Jun Sun, Yang Liu, Jin Song Dong |
Optimizing selection of competing features via feedback-directed evolutionary algorithms Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automating performance bottleneck detection using search-based application profiling Du Shen, Qi Luo, Denys Poshyvanyk, Mark Grechanik |
Automating performance bottleneck detection using search-based application profiling Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
When truth is efficient: analysing concurrency Ganesh Narayanaswamy |
When truth is efficient: analysing concurrency Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Making your crashes work for you (doctoral symposium) Peter Ohmann |
Making your crashes work for you (doctoral symposium) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Scalable and precise taint analysis for Android Wei Huang, Yao Dong, Ana Milanova, Julian Dolby |
Scalable and precise taint analysis for Android Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Cost-aware combinatorial interaction testing (doctoral symposium) Gülsen Demiröz |
Cost-aware combinatorial interaction testing (doctoral symposium) Details |
Author Comments:
Related publications as future work of this paper:
- https://ieeexplore.ieee.org/document/7528945/
- https://www.sciencedirect.com/science/article/pii/S1568494616304161
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Author has
verified
information
|
|
Collaborative testing across shared software components (doctoral symposium) Teng Long |
Collaborative testing across shared software components (doctoral symposium) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Calculation coverage testing in scientific applications Yoshiki Sato, Shumpei Hozumi, Shigeru Chiba |
Calculation coverage testing in scientific applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reusing constraint proofs in program analysis Andrea Aquino, Francesco A. Bianchi, Meixian Chen, Giovanni Denaro, Mauro Pezzè |
Reusing constraint proofs in program analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dynamic detection of inter-application communication vulnerabilities in Android Roee Hay, Omer Tripp, Marco Pistoia |
Dynamic detection of inter-application communication vulnerabilities in Android Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalable program analysis through proof caching (doctoral symposium) Andrea Aquino |
Scalable program analysis through proof caching (doctoral symposium) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
TSTL: a language and tool for testing (demo) Alex Groce, Jervis Pinto, Pooria Azimi, Pranjal Mittal |
TSTL: a language and tool for testing (demo) Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
RTCM: a natural language based, automated, and practical test case generation framework Tao Yue, Shaukat Ali, Man Zhang |
RTCM: a natural language based, automated, and practical test case generation framework Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic generation of system test cases from use case specifications Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal |
Automatic generation of system test cases from use case specifications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CanaryAdvisor: a statistical-based tool for canary testing (demo) Alexander Tarvo, Peter F. Sweeney, Nick Mitchell, V. T. Rajan, Matthew Arnold, Ioana Baldini |
CanaryAdvisor: a statistical-based tool for canary testing (demo) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical regression test selection with dynamic file dependencies Milos Gligoric, Lamyaa Eloussi, Darko Marinov |
Practical regression test selection with dynamic file dependencies Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Randomized stress-testing of link-time optimizers Vu Le, Chengnian Sun, Zhendong Su |
Randomized stress-testing of link-time optimizers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Feedback-controlled random test generation Kohsuke Yatoh, Kazunori Sakamoto, Fuyuki Ishikawa, Shinichi Honiden |
Feedback-controlled random test generation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enhancing reuse of constraint solutions to improve symbolic execution Xiangyang Jia, Carlo Ghezzi, Shi Ying |
Enhancing reuse of constraint solutions to improve symbolic execution Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Marko Dimjasevic, Dimitra Giannakopoulou |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Preventing data errors with continuous testing Kivanç Muslu, Yuriy Brun, Alexandra Meliou |
Preventing data errors with continuous testing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
José Miguel Rojas, Gordon Fraser, Andrea Arcuri |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Empirical evaluation of pareto efficient multi-objective regression test case prioritisation Michael G. Epitropakis, Shin Yoo, Mark Harman, Edmund K. Burke |
Empirical evaluation of pareto efficient multi-objective regression test case prioritisation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Experience report: an empirical study of PHP security mechanism usage Johannes Dahse, Thorsten Holz |
Experience report: an empirical study of PHP security mechanism usage Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SAMC: a fast model checker for finding heisenbugs in distributed systems (demo) Tanakorn Leesatapornwongsa, Haryadi S. Gunawi |
SAMC: a fast model checker for finding heisenbugs in distributed systems (demo) Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reliable testing: detecting state-polluting tests to prevent test dependency Alex Gyori, August Shi, Farah Hariri, Darko Marinov |
Reliable testing: detecting state-polluting tests to prevent test dependency Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detection and classification of malicious JavaScript via attack behavior modelling Yinxing Xue, Junjie Wang, Yang Liu, Hao Xiao, Jun Sun, Mahinthan Chandramohan |
Detection and classification of malicious JavaScript via attack behavior modelling Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic fault injection for driver robustness testing Kai Cong, Li Lei, Zhenkun Yang, Fei Xie |
Automatic fault injection for driver robustness testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated software transplantation Earl T. Barr, Mark Harman, Yue Jia, Alexandru Marginean, Justyna Petke |
Automated software transplantation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An analysis of patch plausibility and correctness for generate-and-validate patch generation systems Zichao Qi, Fan Long, Sara Achour, Martin C. Rinard |
An analysis of patch plausibility and correctness for generate-and-validate patch generation systems Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WuKong: a scalable and accurate two-phase approach to Android app clone detection Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen |
WuKong: a scalable and accurate two-phase approach to Android app clone detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Evaluating the usefulness of IR-based fault localization techniques Qianqian Wang, Chris Parnin, Alessandro Orso |
Evaluating the usefulness of IR-based fault localization techniques Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pegasus: automatic barrier inference for stable multithreaded systems Monika Dhok, Rashmi Mudduluru, Murali Krishna Ramanathan |
Pegasus: automatic barrier inference for stable multithreaded systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dynamic taint tracking for Java with phosphor (demo) Jonathan Bell, Gail E. Kaiser |
Dynamic taint tracking for Java with phosphor (demo) Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
S-looper: automatic summarization for multipath string loops Xiaofei Xie, Yang Liu, Wei Le, Xiaohong Li, Hongxu Chen |
S-looper: automatic summarization for multipath string loops Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DLint: dynamically checking bad coding practices in JavaScript Liang Gong, Michael Pradel, Manu Sridharan, Koushik Sen |
DLint: dynamically checking bad coding practices in JavaScript Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE Xiaoyin Wang, Lingming Zhang, Philip Tanofsky |
Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mining change history for test-plan generation (doctoral symposium) Thomas Rolfsnes |
Mining change history for test-plan generation (doctoral symposium) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Modelgen: mining explicit information flow specifications from concrete executions Lazaro Clapp, Saswat Anand, Alex Aiken |
Modelgen: mining explicit information flow specifications from concrete executions Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BrowserAudit: automated testing of browser security features Charlie Hothersall-Thomas, Sergio Maffeis, Chris Novakovic |
BrowserAudit: automated testing of browser security features Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|