Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Quantifying developers' adoption of security tools Jim Witschey, Olga A. Zielinska, Allaire K. Welk, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Thomas Zimmermann |
Quantifying developers' adoption of security tools Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The making of cloud applications: an empirical study on software development for the cloud Jürgen Cito, Philipp Leitner, Thomas Fritz, Harald C. Gall |
The making of cloud applications: an empirical study on software development for the cloud Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
MemInsight: platform-independent memory debugging for JavaScript Simon Holm Jensen, Manu Sridharan, Koushik Sen, Satish Chandra |
MemInsight: platform-independent memory debugging for JavaScript Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measure it? Manage it? Ignore it? software practitioners and technical debt Neil A. Ernst, Stephany Bellomo, Ipek Ozkaya, Robert L. Nord, Ian Gorton |
Measure it? Manage it? Ignore it? software practitioners and technical debt Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
UEDashboard: awareness of unusual events in commit histories Larissa Leite, Christoph Treude, Fernando Marques Figueira Filho |
UEDashboard: awareness of unusual events in commit histories Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
JITProf: pinpointing JIT-unfriendly JavaScript code Liang Gong, Michael Pradel, Koushik Sen |
JITProf: pinpointing JIT-unfriendly JavaScript code Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach Mario Linares Vásquez, Gabriele Bavota, Carlos Eduardo Bernal-Cárdenas, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk |
Optimizing energy consumption of GUIs in Android apps: a multi-objective approach Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
REMI: defect prediction for efficient API testing Mijung Kim, Jaechang Nam, Jaehyuk Yeon, Soonhwang Choi, Sunghun Kim |
REMI: defect prediction for efficient API testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How practitioners perceive the relevance of software engineering research David Lo, Nachiappan Nagappan, Thomas Zimmermann |
How practitioners perceive the relevance of software engineering research Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
I heart hacker news: expanding qualitative research findings by analyzing social news websites Titus Barik, Brittany Johnson, Emerson R. Murphy-Hill |
I heart hacker news: expanding qualitative research findings by analyzing social news websites Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GitSonifier: using sound to portray developer conflict history Kevin J. North, Shane Bolan, Anita Sarma, Myra B. Cohen |
GitSonifier: using sound to portray developer conflict history Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Ulf Kargén, Nahid Shahmehri |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mahshad M. Mahally, Miroslaw Staron, Jan Bosch |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Xiao-Yuan Jing, Fei Wu, Xiwei Dong, Fumin Qi, Baowen Xu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Enhancing Android application bug reporting Kevin Moran |
Enhancing Android application bug reporting Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Questions developers ask while diagnosing potential security vulnerabilities with static analysis Justin Smith, Brittany Johnson, Emerson R. Murphy-Hill, Bill Chu, Heather Richter Lipford |
Questions developers ask while diagnosing potential security vulnerabilities with static analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Towards automating the security compliance value chain Smita Ghaisas, Manish Motwani, Balaji Balasubramaniam, Anjali Gajendragadkar, Rahul Kelkar, Harrick M. Vin |
Towards automating the security compliance value chain Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quality and productivity outcomes relating to continuous integration in GitHub Bogdan Vasilescu, Yue Yu, Huaimin Wang, Premkumar T. Devanbu, Vladimir Filkov |
Quality and productivity outcomes relating to continuous integration in GitHub Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
T3i: a tool for generating and querying test suites for Java I. S. Wishnu B. Prasetya |
T3i: a tool for generating and querying test suites for Java Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
A textual domain specific language for requirement modelling Oyindamola Olajubu |
A textual domain specific language for requirement modelling Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Effective and precise dynamic detection of hidden races for Java programs Yan Cai, Lingwei Cao |
Effective and precise dynamic detection of hidden races for Java programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting JavaScript races that matter Erdal Mutlu, Serdar Tasiran, Benjamin Livshits |
Detecting JavaScript races that matter Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Rule-based extraction of goal-use case models from text Tuong Huan Nguyen, John C. Grundy, Mohamed Almorsy |
Rule-based extraction of goal-use case models from text Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Staged program repair with condition synthesis Fan Long, Martin Rinard |
Staged program repair with condition synthesis Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Finding schedule-sensitive branches Jeff Huang, Lawrence Rauchwerger |
Finding schedule-sensitive branches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
UMTG: a toolset to automatically generate system test cases from use case specifications Chunhui Wang, Fabrizio Pastore, Arda Goknil, Lionel C. Briand, Muhammad Zohaib Z. Iqbal |
UMTG: a toolset to automatically generate system test cases from use case specifications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Nyx: a display energy optimizer for mobile web apps Ding Li, Angelica Huyen Tran, William G. J. Halfond |
Nyx: a display energy optimizer for mobile web apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Requirements, architecture, and quality in a mission critical system: 12 lessons learned Aapo Koski, Tommi Mikkonen |
Requirements, architecture, and quality in a mission critical system: 12 lessons learned Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Commit guru: analytics and risk prediction of software commits Christoffer Rosen, Ben Grawi, Emad Shihab |
Commit guru: analytics and risk prediction of software commits Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Jinseong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Summarizing and measuring development activity Christoph Treude, Fernando Marques Figueira Filho, Uirá Kulesza |
Summarizing and measuring development activity Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Suggesting accurate method and class names Miltiadis Allamanis, Earl T. Barr, Christian Bird, Charles A. Sutton |
Suggesting accurate method and class names Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Decentralized self-adaptation in large-scale distributed systems Luca Florio |
Decentralized self-adaptation in large-scale distributed systems Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Joel Greenyer, Max Haase, Jörg Marhenke, Rene Bellmer |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Modeling readability to improve unit tests Ermira Daka, José Campos, Gordon Fraser, Jonathan Dorn, Westley Weimer |
Modeling readability to improve unit tests Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Qimu Zheng, Audris Mockus, Minghui Zhou |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Clone-based and interactive recommendation for modifying pasted code Yun Lin, Xin Peng, Zhenchang Xing, Diwen Zheng, Wenyun Zhao |
Clone-based and interactive recommendation for modifying pasted code Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the use of delta debugging to reduce recordings and facilitate debugging of web applications Mouna Hammoudi, Brian Burg, Gigon Bae, Gregg Rothermel |
On the use of delta debugging to reduce recordings and facilitate debugging of web applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Systematic testing of asynchronous reactive systems Ankush Desai, Shaz Qadeer, Sanjit A. Seshia |
Systematic testing of asynchronous reactive systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
String analysis for Java and Android applications Ding Li, Yingjun Lyu, Mian Wan, William G. J. Halfond |
String analysis for Java and Android applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When, how, and why developers (do not) test in their IDEs Moritz Beller, Georgios Gousios, Annibale Panichella, Andy Zaidman |
When, how, and why developers (do not) test in their IDEs Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
TLV: abstraction through testing, learning, and validation Jun Sun, Hao Xiao, Yang Liu, Shang-Wei Lin, Shengchao Qin |
TLV: abstraction through testing, learning, and validation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Increasing the efficiency of search-based unit test generation using parameter control Thomas White |
Increasing the efficiency of search-based unit test generation using parameter control Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Crash reproduction via test case mutation: let existing test cases help Jifeng Xuan, Xiaoyuan Xie, Martin Monperrus |
Crash reproduction via test case mutation: let existing test cases help Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MatrixMiner: a red pill to architect informal product descriptions in the matrix Sana Ben Nasr, Guillaume Bécan, Mathieu Acher, João Bosco Ferreira Filho, Benoit Baudry, Nicolas Sannier, Jean-Marc Davril |
MatrixMiner: a red pill to architect informal product descriptions in the matrix Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Pete Rotella, Sunita Chulani, Devesh Goyal |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NARCIA: an automated tool for change impact analysis in natural language requirements Chetan Arora, Mehrdad Sabetzadeh, Arda Goknil, Lionel C. Briand, Frank Zimmer |
NARCIA: an automated tool for change impact analysis in natural language requirements Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DexterJS: robust testing platform for DOM-based XSS vulnerabilities Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena |
DexterJS: robust testing platform for DOM-based XSS vulnerabilities Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
MultiSE: multi-path symbolic execution using value summaries Koushik Sen, George C. Necula, Liang Gong, Wontae Choi |
MultiSE: multi-path symbolic execution using value summaries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Symbolic execution of programs with heap inputs Pietro Braione, Giovanni Denaro, Mauro Pezzè |
Symbolic execution of programs with heap inputs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automatically recommending test code examples to inexperienced developers Raphael Pham, Yauheni Stoliar, Kurt Schneider |
Automatically recommending test code examples to inexperienced developers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Guided differential testing of certificate validation in SSL/TLS implementations Yuting Chen, Zhendong Su |
Guided differential testing of certificate validation in SSL/TLS implementations Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quantifying architectural debts Lu Xiao |
Quantifying architectural debts Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Assertion guided symbolic execution of multithreaded programs Shengjian Guo, Markus Kusano, Chao Wang, Zijiang Yang, Aarti Gupta |
Assertion guided symbolic execution of multithreaded programs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting semantic merge conflicts with variability-aware execution Hung Viet Nguyen, My Huu Nguyen, Son Cuu Dang, Christian Kästner, Tien N. Nguyen |
Detecting semantic merge conflicts with variability-aware execution Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Vehicle level continuous integration in the automotive industry Sebastian Vöst |
Vehicle level continuous integration in the automotive industry Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Automatically deriving pointer reference expressions from binary code for memory dump analysis Yangchun Fu, Zhiqiang Lin, David Brumley |
Automatically deriving pointer reference expressions from binary code for memory dump analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Products, developers, and milestones: how should I build my N-Gram language model Juliana Saraiva, Christian Bird, Thomas Zimmermann |
Products, developers, and milestones: how should I build my N-Gram language model Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fuxiang Chen, Sunghun Kim |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated generation of programming language quizzes Shuktika Jain |
Automated generation of programming language quizzes Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Cross-language program slicing for dynamic web applications Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen |
Cross-language program slicing for dynamic web applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Getting to know you: towards a capability model for Java Ben Hermann, Michael Reif, Michael Eichberg, Mira Mezini |
Getting to know you: towards a capability model for Java Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated unit test generation for evolving software Sina Shamshiri |
Automated unit test generation for evolving software Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Assertions are strongly correlated with test suite effectiveness Yucheng Zhang, Ali Mesbah |
Assertions are strongly correlated with test suite effectiveness Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Improving model-based test generation by model decomposition Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene |
Improving model-based test generation by model decomposition Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hidden truths in dead software paths Michael Eichberg, Ben Hermann, Mira Mezini, Leonid Glanz |
Hidden truths in dead software paths Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
RDIT: race detection from incomplete traces Arun K. Rajagopalan, Jeff Huang |
RDIT: race detection from incomplete traces Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improving energy consumption in Android apps Carlos Bernal-Cárdenas |
Improving energy consumption in Android apps Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
P3: partitioned path profiling Mohammed Afraz, Diptikalyan Saha, Aditya Kanade |
P3: partitioned path profiling Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient and reasonable object-oriented concurrency Scott West, Sebastian Nanz, Bertrand Meyer |
Efficient and reasonable object-oriented concurrency Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tracing software developers' eyes and interactions for change tasks Katja Kevic, Braden M. Walters, Timothy R. Shaffer, Bonita Sharif, David C. Shepherd, Thomas Fritz |
Tracing software developers' eyes and interactions for change tasks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Nishant Sinha, Rezwana Karim |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Inner oracles: input-specific assertions on internal states Yingfei Xiong, Dan Hao, Lu Zhang, Tao Zhu, Muyao Zhu, Tian Lan |
Inner oracles: input-specific assertions on internal states Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Product lines can jeopardize their trade secrets Mathieu Acher, Guillaume Bécan, Benoît Combemale, Benoit Baudry, Jean-Marc Jézéquel |
Product lines can jeopardize their trade secrets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated multi-objective control for self-adaptive software design Antonio Filieri, Henry Hoffmann, Martina Maggio |
Automated multi-objective control for self-adaptive software design Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Query-based configuration of text retrieval solutions for software engineering tasks Laura Moreno, Gabriele Bavota, Sonia Haiduc, Massimiliano Di Penta, Rocco Oliveto, Barbara Russo, Andrian Marcus |
Query-based configuration of text retrieval solutions for software engineering tasks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Effective test suites for mixed discrete-continuous stateflow controllers Reza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann |
Effective test suites for mixed discrete-continuous stateflow controllers Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Gamification for enforcing coding conventions Christian R. Prause, Matthias Jarke |
Gamification for enforcing coding conventions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Spotting familiar code snippet structures for program comprehension Venkatesh Vinayakarao |
Spotting familiar code snippet structures for program comprehension Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
OSSMETER: a software measurement platform for automatically analysing open source software projects Davide Di Ruscio, Dimitris S. Kolovos, Ioannis Korkontzelos, Nicholas Drivalos Matragkas, Jurgen J. Vinju |
OSSMETER: a software measurement platform for automatically analysing open source software projects Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Is the cure worse than the disease? overfitting in automated program repair Edward K. Smith, Earl T. Barr, Claire Le Goues, Yuriy Brun |
Is the cure worse than the disease? overfitting in automated program repair Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Proactive self-adaptation under uncertainty: a probabilistic model checking approach Gabriel A. Moreno, Javier Cámara, David Garlan, Bradley R. Schmerl |
Proactive self-adaptation under uncertainty: a probabilistic model checking approach Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Don't panic: reverse debugging of kernel drivers Pavel Dovgalyuk, Denis Dmitriev, Vladimir Makarov |
Don't panic: reverse debugging of kernel drivers Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Bespoke tools: adapted to the concepts developers know Brittany Johnson, Rahul Pandita, Emerson R. Murphy-Hill, Sarah Heckman |
Bespoke tools: adapted to the concepts developers know Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
User-centric security: optimization of the security-usability trade-off Denis Feth |
User-centric security: optimization of the security-usability trade-off Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Behavioral log analysis with statistical guarantees Nimrod Busany, Shahar Maoz |
Behavioral log analysis with statistical guarantees Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Impact of developer turnover on quality in open-source software Matthieu Foucault, Marc Palyart, Xavier Blanc, Gail C. Murphy, Jean-Rémy Falleri |
Impact of developer turnover on quality in open-source software Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OnSpot system: test impact visibility during code edits in real software Muhammad Umar Janjua |
OnSpot system: test impact visibility during code edits in real software Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Generating TCP/UDP network data for automated unit test generation Andrea Arcuri, Gordon Fraser, Juan Pablo Galeotti |
Generating TCP/UDP network data for automated unit test generation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Users beware: preference inconsistencies ahead Farnaz Behrang, Myra B. Cohen, Alessandro Orso |
Users beware: preference inconsistencies ahead Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Iterative distribution-aware sampling for probabilistic symbolic execution Mateus Borges, Antonio Filieri, Marcelo d'Amorim, Corina S. Pasareanu |
Iterative distribution-aware sampling for probabilistic symbolic execution Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Comprehensive service matching with MatchBox Paul Börding, Melanie Bruns, Marie Christin Platenius |
Comprehensive service matching with MatchBox Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatically computing path complexity of programs Lucas Bang, Abdulbaki Aydin, Tevfik Bultan |
Automatically computing path complexity of programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Auto-patching DOM-based XSS at scale Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena |
Auto-patching DOM-based XSS at scale Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CLAPP: characterizing loops in Android applications Yanick Fratantonio, Aravind Machiry, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna |
CLAPP: characterizing loops in Android applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Witness validation and stepwise testification across software verifiers Dirk Beyer, Matthias Dangl, Daniel Dietsch, Matthias Heizmann, Andreas Stahlbauer |
Witness validation and stepwise testification across software verifiers Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Chih-Hong Cheng, Tuncay Guelfirat, Christian Messinger, Johannes O. Schmitt, Matthias Schnelte, Peter Weber |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
FlexJava: language support for safe and modular approximate programming Jongse Park, Hadi Esmaeilzadeh, Xin Zhang, Mayur Naik, William Harris |
FlexJava: language support for safe and modular approximate programming Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
A user-guided approach to program analysis Ravi Mangal, Xin Zhang, Aditya V. Nori, Mayur Naik |
A user-guided approach to program analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Information retrieval and spectrum based bug localization: better together Tien-Duy B. Le, Richard Jayadi Oentaryo, David Lo |
Information retrieval and spectrum based bug localization: better together Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
An empirical study of goto in C code from GitHub repositories Meiyappan Nagappan, Romain Robbes, Yasutaka Kamei, Éric Tanter, Shane McIntosh, Audris Mockus, Ahmed E. Hassan |
An empirical study of goto in C code from GitHub repositories Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Targeted program transformations for symbolic execution Cristian Cadar |
Targeted program transformations for symbolic execution Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
How developers search for code: a case study Caitlin Sadowski, Kathryn T. Stolee, Sebastian G. Elbaum |
How developers search for code: a case study Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Comparing and combining test-suite reduction and regression test selection August Shi, Tifany Yung, Alex Gyori, Darko Marinov |
Comparing and combining test-suite reduction and regression test selection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Test report prioritization to assist crowdsourced testing Yang Feng, Zhenyu Chen, James A. Jones, Chunrong Fang, Baowen Xu |
Test report prioritization to assist crowdsourced testing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Combining eye tracking with navigation paths for identification of cross-language code dependencies Martin Konopka |
Combining eye tracking with navigation paths for identification of cross-language code dependencies Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
TACO: test suite augmentation for concurrent programs Tingting Yu |
TACO: test suite augmentation for concurrent programs Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Timothy R. Shaffer, Jenna L. Wise, Braden M. Walters, Sebastian C. Müller, Michael Falcone, Bonita Sharif |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Auto-completing bug reports for Android applications Kevin Moran, Mario Linares Vásquez, Carlos Bernal-Cárdenas, Denys Poshyvanyk |
Auto-completing bug reports for Android applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient dependency detection for safe Java test acceleration Jonathan Bell, Gail E. Kaiser, Eric Melski, Mohan Dattatreya |
Efficient dependency detection for safe Java test acceleration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What change history tells us about thread synchronization Rui Gu, Guoliang Jin, Linhai Song, Linjie Zhu, Shan Lu |
What change history tells us about thread synchronization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pockets: a tool to support exploratory programming for novices and educators Erina Makihara |
Pockets: a tool to support exploratory programming for novices and educators Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Detecting event anomalies in event-based systems Gholamreza Safi, Arman Shahbazian, William G. J. Halfond, Nenad Medvidovic |
Detecting event anomalies in event-based systems Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Using software theater for the demonstration of innovative ubiquitous applications Han Xu, Stephan Krusche, Bernd Bruegge |
Using software theater for the demonstration of innovative ubiquitous applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
GR(1) synthesis for LTL specification patterns Shahar Maoz, Jan Oliver Ringert |
GR(1) synthesis for LTL specification patterns Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Performance-influence models for highly configurable systems Norbert Siegmund, Alexander Grebhahn, Sven Apel, Christian Kästner |
Performance-influence models for highly configurable systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mimic: computing models for opaque code Stefan Heule, Manu Sridharan, Satish Chandra |
Mimic: computing models for opaque code Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synthesizing tests for detecting atomicity violations Malavika Samak, Murali Krishna Ramanathan |
Synthesizing tests for detecting atomicity violations Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Navigating through the archipelago of refactorings Apostolos V. Zarras, Theofanis Vartziotis, Panos Vassiliadis |
Navigating through the archipelago of refactorings Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Developer onboarding in GitHub: the role of prior social links and language experience Casey Casalnuovo, Bogdan Vasilescu, Premkumar T. Devanbu, Vladimir Filkov |
Developer onboarding in GitHub: the role of prior social links and language experience Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
CLOTHO: saving programs from malformed strings and incorrect string-handling Aritra Dhar, Rahul Purandare, Mohan Dhawan, Suresh Rangaswamy |
CLOTHO: saving programs from malformed strings and incorrect string-handling Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automated attack surface approximation Christopher Theisen |
Automated attack surface approximation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Heterogeneous defect prediction Jaechang Nam, Sunghun Kim |
Heterogeneous defect prediction Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|