Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Software maintenance like maintenance in other engineering disciplines Gustavo Villavicencio |
Software maintenance like maintenance in other engineering disciplines Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Author has
verified
information
|
Selection and presentation practices for code example summarization Annie T. T. Ying, Martin P. Robillard |
Selection and presentation practices for code example summarization Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Mining preconditions of APIs in large-scale code corpus Hoan Anh Nguyen, Robert Dyer, Tien N. Nguyen, Hridesh Rajan |
Mining preconditions of APIs in large-scale code corpus Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting, isolating, and enforcing dependencies among and within test cases Jonathan Bell |
Detecting, isolating, and enforcing dependencies among and within test cases Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
BumbleBee: a refactoring environment for spreadsheet formulas Felienne Hermans, Danny Dig |
BumbleBee: a refactoring environment for spreadsheet formulas Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Estimating the effectiveness of spectrum-based fault localization Shuo Song |
Estimating the effectiveness of spectrum-based fault localization Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
The plastic surgery hypothesis Earl T. Barr, Yuriy Brun, Premkumar T. Devanbu, Mark Harman, Federica Sarro |
The plastic surgery hypothesis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Are you getting traction? tales from the tech transfer trenches (invited talk) Satish Chandra |
Are you getting traction? tales from the tech transfer trenches (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Automatic mining of specifications from invocation traces and method invariants Ivo Krka, Yuriy Brun, Nenad Medvidovic |
Automatic mining of specifications from invocation traces and method invariants Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Balancing trade-offs in test-suite reduction August Shi, Alex Gyori, Milos Gligoric, Andrey Zaytsev, Darko Marinov |
Balancing trade-offs in test-suite reduction Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
BugLocalizer: integrated tool support for bug localization Ferdian Thung, Tien-Duy B. Le, Pavneet Singh Kochhar, David Lo |
BugLocalizer: integrated tool support for bug localization Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Yu Jiang, Hehua Zhang, Huafeng Zhang, Xinyan Zhao, Han Liu, Chengnian Sun, Xiaoyu Song, Ming Gu, Jia-Guang Sun |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Grail: context-aware fixing of concurrency bugs Peng Liu, Omer Tripp, Charles Zhang |
Grail: context-aware fixing of concurrency bugs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Efficient runtime-enforcement techniques for policy weaving Richard Joiner, Thomas W. Reps, Somesh Jha, Mohan Dhawan, Vinod Ganapathy |
Efficient runtime-enforcement techniques for policy weaving Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
JSAI: a static analysis platform for JavaScript Vineeth Kashyap, Kyle Dewey, Ethan A. Kuefner, John Wagner, Kevin Gibbons, John Sarracino, Ben Wiedermann, Ben Hardekopf |
JSAI: a static analysis platform for JavaScript Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatic generation of release notes Laura Moreno, Gabriele Bavota, Massimiliano Di Penta, Rocco Oliveto, Andrian Marcus, Gerardo Canfora |
Automatic generation of release notes Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improving the software testing skills of novices during onboarding through social transparency Raphael Pham |
Improving the software testing skills of novices during onboarding through social transparency Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
From software engineering to software systems (invited talk) Alexander L. Wolf |
From software engineering to software systems (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Automatically generated patches as debugging aids: a human study Yida Tao, Jindae Kim, Sunghun Kim, Chang Xu |
Automatically generated patches as debugging aids: a human study Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Learning natural coding conventions Miltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton |
Learning natural coding conventions Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Counterexample guided abstraction refinement of product-line behavioural models Maxime Cordy, Patrick Heymans, Axel Legay, Pierre-Yves Schobbens, Bruno Dawagne, Martin Leucker |
Counterexample guided abstraction refinement of product-line behavioural models Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On the efficiency of automated testing Marcel Böhme, Soumya Paul |
On the efficiency of automated testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Static analysis driven performance and energy testing Abhijeet Banerjee |
Static analysis driven performance and energy testing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Lannan Luo, Jiang Ming, Dinghao Wu, Peng Liu, Sencun Zhu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
EvoDroid: segmented evolutionary testing of Android apps Riyadh Mahmood, Nariman Mirzaei, Sam Malek |
EvoDroid: segmented evolutionary testing of Android apps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Traceability and model checking to support safety requirement verification Shuanglong Kan |
Traceability and model checking to support safety requirement verification Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
XMLMate: evolutionary XML test generation Nikolas Havrikov, Matthias Höschele, Juan Pablo Galeotti, Andreas Zeller |
XMLMate: evolutionary XML test generation Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Feedback generation for performance problems in introductory programming assignments Sumit Gulwani, Ivan Radicek, Florian Zuleger |
Feedback generation for performance problems in introductory programming assignments Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Linking sketches and diagrams to source code artifacts Sebastian Baltes, Peter Schmitz, Stephan Diehl |
Linking sketches and diagrams to source code artifacts Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
A large scale study of programming languages and code quality in github Baishakhi Ray, Daryl Posnett, Vladimir Filkov, Premkumar T. Devanbu |
A large scale study of programming languages and code quality in github Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Aalta: an LTL satisfiability checker over Infinite/Finite traces Jianwen Li, Yinbo Yao, Geguang Pu, Lijun Zhang, Jifeng He |
Aalta: an LTL satisfiability checker over Infinite/Finite traces Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mining micro-practices from operational data Minghui Zhou, Audris Mockus |
Mining micro-practices from operational data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Diagnose crashing faults on production software Rongxin Wu |
Diagnose crashing faults on production software Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Methodology and culture: drivers of mediocrity in software engineering? Marian Petre, Daniela E. Damian |
Methodology and culture: drivers of mediocrity in software engineering? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Achieving lightweight trustworthy traceability Jane Cleland-Huang, Mona Rahimi, Patrick Mäder |
Achieving lightweight trustworthy traceability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SymJS: automatic symbolic testing of JavaScript web applications Guodong Li, Esben Andreasen, Indradeep Ghosh |
SymJS: automatic symbolic testing of JavaScript web applications Details |
|
Author Comments:
We cannot open source the code as we are an industrial research lab.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
How we get there: a context-guided search strategy in concolic testing Hyunmin Seo, Sunghun Kim |
How we get there: a context-guided search strategy in concolic testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Solving complex path conditions through heuristic search on induced polytopes Peter Dinges, Gul A. Agha |
Solving complex path conditions through heuristic search on induced polytopes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting and preventing the architectural roots of bugs Lu Xiao |
Detecting and preventing the architectural roots of bugs Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Managing lots of models: the FaMine approach David Wille |
Managing lots of models: the FaMine approach Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Learning to rank relevant files for bug reports using domain knowledge Xin Ye, Razvan C. Bunescu, Chang Liu |
Learning to rank relevant files for bug reports using domain knowledge Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Building call graphs for embedded client-side code in dynamic web applications Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen |
Building call graphs for embedded client-side code in dynamic web applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Retrofitting concurrency for Android applications through refactoring Yu Lin, Cosmin Radoi, Danny Dig |
Retrofitting concurrency for Android applications through refactoring Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
RaPiD: a toolkit for reliability analysis of non-deterministic systems Lin Gui, Jun Sun, Yang Liu, Truong Khanh Nguyen, Jin Song Dong |
RaPiD: a toolkit for reliability analysis of non-deterministic systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Experiences developing tools for developers (invited talk) John Penix |
Experiences developing tools for developers (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Mining idioms from source code Miltiadis Allamanis, Charles A. Sutton |
Mining idioms from source code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A tool suite for the model-driven software engineering of cyber-physical systems Stefan Dziwok, Christopher Gerking, Steffen Becker, Sebastian Thiele, Christian Heinzemann, Uwe Pohlmann |
A tool suite for the model-driven software engineering of cyber-physical systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Apposcopy: semantics-based detection of Android malware through static analysis Yu Feng, Saswat Anand, Isil Dillig, Alex Aiken |
Apposcopy: semantics-based detection of Android malware through static analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Powering the static driver verifier using corral Akash Lal, Shaz Qadeer |
Powering the static driver verifier using corral Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Dealing with uncertainty in verification of nondeterministic systems Yamilet R. Serrano Llerena |
Dealing with uncertainty in verification of nondeterministic systems Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Panning requirement nuggets in stream of software maintenance tickets Senthil Mani, Karthik Sankaranarayanan, Vibha Singhal Sinha, Premkumar T. Devanbu |
Panning requirement nuggets in stream of software maintenance tickets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Are mutants a valid substitute for real faults in software testing? René Just, Darioush Jalali, Laura Inozemtseva, Michael D. Ernst, Reid Holmes, Gordon Fraser |
Are mutants a valid substitute for real faults in software testing? Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical analysis of flaky tests Qingzhou Luo, Farah Hariri, Lamyaa Eloussi, Darko Marinov |
An empirical analysis of flaky tests Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SAFEWAPI: web API misuse detector for web applications SungGyeong Bae, Hyunghun Cho, Inho Lim, Sukyoung Ryu |
SAFEWAPI: web API misuse detector for web applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Querying sequential software engineering data Chengnian Sun, Haidong Zhang, Jian-Guang Lou, Hongyu Zhang, Qiang Wang, Dongmei Zhang, Siau-Cheng Khoo |
Querying sequential software engineering data Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sherlock: scalable deadlock detection for concurrent programs Mahdi Eslamimehr, Jens Palsberg |
Sherlock: scalable deadlock detection for concurrent programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Statistical symbolic execution with informed sampling Antonio Filieri, Corina S. Pasareanu, Willem Visser, Jaco Geldenhuys |
Statistical symbolic execution with informed sampling Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Archie: a tool for detecting, monitoring, and preserving architecturally significant code Mehdi Mirakhorli, Ahmed Fakhry, Artem Grechko, Mateusz Wieloch, Jane Cleland-Huang |
Archie: a tool for detecting, monitoring, and preserving architecturally significant code Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Verifying CTL-live properties of infinite state models using an SMT solver Amirhossein Vakili, Nancy A. Day |
Verifying CTL-live properties of infinite state models using an SMT solver Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Software developers' perceptions of productivity André N. Meyer, Thomas Fritz, Gail C. Murphy, Thomas Zimmermann |
Software developers' perceptions of productivity Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Titan: a toolset that connects software architecture with quality analysis Lu Xiao, Yuanfang Cai, Rick Kazman |
Titan: a toolset that connects software architecture with quality analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CHOReOSynt: enforcing choreography realizability in the future internet Marco Autili, Davide Di Ruscio, Amleto Di Salle, Alexander Perucci |
CHOReOSynt: enforcing choreography realizability in the future internet Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Test case purification for improving fault localization Jifeng Xuan, Martin Monperrus |
Test case purification for improving fault localization Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ConceptCloud: a tagcloud browser for software archives Gillian J. Greene, Bernd Fischer |
ConceptCloud: a tagcloud browser for software archives Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Known unknowns: testing in the presence of uncertainty Sebastian G. Elbaum, David S. Rosenblum |
Known unknowns: testing in the presence of uncertainty Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Architecture challenges for internal software ecosystems: a large-scale industry case study Klaus-Benedikt Schultis, Christoph Elsner, Daniel Lohmann |
Architecture challenges for internal software ecosystems: a large-scale industry case study Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
No issue left behind: reducing information overload in issue tracking Olga Baysal, Reid Holmes, Michael W. Godfrey |
No issue left behind: reducing information overload in issue tracking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Focus-shifting patterns of OSS developers and their congruence with call graphs Qi Xuan, Aaron Okano, Premkumar T. Devanbu, Vladimir Filkov |
Focus-shifting patterns of OSS developers and their congruence with call graphs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Autonomous compliance monitoring of non-functional properties Marc Brünink |
Autonomous compliance monitoring of non-functional properties Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Beyond the rainbow: self-adaptive failure avoidance in configurable systems Jacob Swanson, Myra B. Cohen, Matthew B. Dwyer, Brady J. Garvin, Justin Firestone |
Beyond the rainbow: self-adaptive failure avoidance in configurable systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Discovering refactoring opportunities in cascading style sheets Davood Mazinanian, Nikolaos Tsantalis, Ali Mesbah |
Discovering refactoring opportunities in cascading style sheets Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Towards a theory of architectural styles Diego Marmsoler |
Towards a theory of architectural styles Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Omlet: a revolution against big-brother social networks (invited talk) Monica S. Lam |
Omlet: a revolution against big-brother social networks (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Marc Palyart, Gail C. Murphy, Emerson R. Murphy-Hill, Xavier Blanc |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sketches and diagrams in practice Sebastian Baltes, Stephan Diehl |
Sketches and diagrams in practice Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Techniques for improving regression testing in continuous integration development environments Sebastian G. Elbaum, Gregg Rothermel, John Penix |
Techniques for improving regression testing in continuous integration development environments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Minimizing software conflicts through proactive detection of conflicts and task scheduling Bakhtiar Khan Kasi |
Minimizing software conflicts through proactive detection of conflicts and task scheduling Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Zhaopeng Tu, Zhendong Su, Premkumar T. Devanbu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An empirical study on program comprehension with reactive programming Guido Salvaneschi, Sven Amann, Sebastian Proksch, Mira Mezini |
An empirical study on program comprehension with reactive programming Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Critics: an interactive code review tool for searching and inspecting systematic changes Tianyi Zhang, Myoungkyu Song, Miryung Kim |
Critics: an interactive code review tool for searching and inspecting systematic changes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A path-sensitively sliced control flow graph Joxan Jaffar, Vijayaraghavan Murali |
A path-sensitively sliced control flow graph Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Numerical program analysis and testing Zheng Gao |
Numerical program analysis and testing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
AI: a lightweight system for tolerating concurrency bugs Mingxing Zhang, Yongwei Wu, Shan Lu, Shanxiang Qi, Jinglei Ren, Weimin Zheng |
AI: a lightweight system for tolerating concurrency bugs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting energy bugs and hotspots in mobile apps Abhijeet Banerjee, Lee Kee Chong, Sudipta Chattopadhyay, Abhik Roychoudhury |
Detecting energy bugs and hotspots in mobile apps Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ORBS: language-independent program slicing David W. Binkley, Nicolas Gold, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo |
ORBS: language-independent program slicing Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Let's talk about it: evaluating contributions through discussion in GitHub Jason Tsay, Laura Dabbish, James D. Herbsleb |
Let's talk about it: evaluating contributions through discussion in GitHub Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Integrating approaches for feature implementation Benjamin Behringer |
Integrating approaches for feature implementation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Social network analysis in open source software peer review Xin Yang |
Social network analysis in open source software peer review Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Vector abstraction and concretization for scalable detection of refactorings Narcisa Andreea Milea, Lingxiao Jiang, Siau-Cheng Khoo |
Vector abstraction and concretization for scalable detection of refactorings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases Johannes Lerch, Ben Hermann, Eric Bodden, Mira Mezini |
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Ten years with evidence-based software engineering. What is it? Has it had any impact? What's next? Magne Jørgensen |
Ten years with evidence-based software engineering. What is it? Has it had any impact? What's next? Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Identifying the characteristics of vulnerable code changes: an empirical study Amiangshu Bosu, Jeffrey C. Carver, Munawar Hafiz, Patrick Hilley, Derek Janni |
Identifying the characteristics of vulnerable code changes: an empirical study Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Variable-specific resolutions for feature interactions Cecylia Bocovich, Joanne M. Atlee |
Variable-specific resolutions for feature interactions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Prioritizing the devices to test your app on: a case study of Android game apps Hammad Khalid, Meiyappan Nagappan, Emad Shihab, Ahmed E. Hassan |
Prioritizing the devices to test your app on: a case study of Android game apps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Data hard with a vengeance (invited talk) Thomas Zimmermann |
Data hard with a vengeance (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Search-based synthesis of equivalent method sequences Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè, Paolo Tonella |
Search-based synthesis of equivalent method sequences Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Developers' code context models for change tasks Thomas Fritz, David C. Shepherd, Katja Kevic, Will Snipes, Christoph Bräunlich |
Developers' code context models for change tasks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A foundation for refactoring C with macros Jeffrey L. Overbey, Farnaz Behrang, Munawar Hafiz |
A foundation for refactoring C with macros Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A variability perspective of mutation analysis Xavier Devroey, Gilles Perrouin, Maxime Cordy, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens |
A variability perspective of mutation analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Enablers, inhibitors, and perceptions of testing in novice software teams Raphael Pham, Stephan Kiesling, Olga Liskin, Leif Singer, Kurt Schneider |
Enablers, inhibitors, and perceptions of testing in novice software teams Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits Everton L. G. Alves, Myoungkyu Song, Miryung Kim |
RefDistiller: a refactoring aware code review tool for inspecting manual refactoring edits Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Improving oracle quality by detecting brittle assertions and unused inputs in tests Chen Huo, James Clause |
Improving oracle quality by detecting brittle assertions and unused inputs in tests Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Harry Raymond Joseph |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Omen+: a precise dynamic deadlock detector for multithreaded Java libraries Malavika Samak, Murali Krishna Ramanathan |
Omen+: a precise dynamic deadlock detector for multithreaded Java libraries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Yoshiki Higo, Shinji Kusumoto |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|