Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
A portable interface for runtime energy monitoring Connor Imes, Lars Bergstrom, Henry Hoffmann |
A portable interface for runtime energy monitoring Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Parallel data race detection for task parallel programs with locks Adarsh Yoga, Santosh Nagarakatte, Aarti Gupta |
Parallel data race detection for task parallel programs with locks Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TIPMerge: recommending experts for integrating changes across branches Catarina Costa, Jair Figueiredo, Leonardo Murta, Anita Sarma |
TIPMerge: recommending experts for integrating changes across branches Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Foraging and navigations, fundamentally: developers' predictions of value and cost David Piorkowski, Austin Z. Henley, Tahmid Nabi, Scott D. Fleming, Christopher Scaffidi, Margaret M. Burnett |
Foraging and navigations, fundamentally: developers' predictions of value and cost Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Discovering additional violations of Java API invariants Waylon Huang |
Discovering additional violations of Java API invariants Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Cluster-based test suite functional analysis Marcel Zalmanovici, Orna Raz, Rachel Tzoref-Brill |
Cluster-based test suite functional analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Time-travel debugging for JavaScript/Node.js Earl T. Barr, Mark Marron, Ed Maurer, Dan Moseley, Gaurav Seth |
Time-travel debugging for JavaScript/Node.js Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Bing developer assistant: improving developer productivity by recommending sample code Hongyu Zhang, Anuj Jain, Gaurav Khandelwal, Chandrashekhar Kaushik, Scott Ge, Wenxiang Hu |
Bing developer assistant: improving developer productivity by recommending sample code Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Keep it SIMPLEX: satisfying multiple goals with guarantees in control-based self-adaptive systems Stepan Shevtsov, Danny Weyns |
Keep it SIMPLEX: satisfying multiple goals with guarantees in control-based self-adaptive systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Generating interactive web pages from storyboards Pavel Panchekha |
Generating interactive web pages from storyboards Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
FSX: a tool for fine-grained incremental unit test generation for C/C++ programs Hiroaki Yoshida, Susumu Tokumoto, Mukul R. Prasad, Indradeep Ghosh, Tadahiro Uehara |
FSX: a tool for fine-grained incremental unit test generation for C/C++ programs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reasoning with imprecise privacy preferences Inah Omoronyia |
Reasoning with imprecise privacy preferences Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Designing for dystopia: software engineering research for the post-apocalypse Titus Barik, Rahul Pandita, Justin Middleton, Emerson R. Murphy-Hill |
Designing for dystopia: software engineering research for the post-apocalypse Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A cross-tool communication study on program analysis tool notifications Brittany Johnson, Rahul Pandita, Justin Smith, Denae Ford, Sarah Elder, Emerson R. Murphy-Hill, Sarah Heckman, Caitlin Sadowski |
A cross-tool communication study on program analysis tool notifications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Fine-grained binary code authorship identification Xiaozhu Meng |
Fine-grained binary code authorship identification Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Atlas: an intelligent, performant framework for web-based grid computing Sachith Gullapalli |
Atlas: an intelligent, performant framework for web-based grid computing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Training the future workforce through task curation in an OSS ecosystem Anita Sarma, Marco Aurélio Gerosa, Igor Steinmacher, Rafael Leano |
Training the future workforce through task curation in an OSS ecosystem Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated test input generation for Android: are we really there yet in an industrial case? Xia Zeng, Dengfeng Li, Wujie Zheng, Fan Xia, Yuetang Deng, Wing Lam, Wei Yang, Tao Xie |
Automated test input generation for Android: are we really there yet in an industrial case? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Proteus: computing disjunctive loop summary via path dependency analysis Xiaofei Xie, Bihuan Chen, Yang Liu, Wei Le, Xiaohong Li |
Proteus: computing disjunctive loop summary via path dependency analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying participants for collaborative merge Catarina Costa |
Identifying participants for collaborative merge Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Interactive and guided architectural refactoring with search-based recommendation Yun Lin, Xin Peng, Yuanfang Cai, Danny Dig, Diwen Zheng, Wenyun Zhao |
Interactive and guided architectural refactoring with search-based recommendation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
API deprecation: a retrospective analysis and detection method for code examples on the web Jing Zhou, Robert J. Walker |
API deprecation: a retrospective analysis and detection method for code examples on the web Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What would users change in my app? summarizing app reviews for recommending software changes Andrea Di Sorbo, Sebastiano Panichella, Carol V. Alexandru, Junji Shimagaki, Corrado Aaron Visaggio, Gerardo Canfora, Harald C. Gall |
What would users change in my app? summarizing app reviews for recommending software changes Details |
Author Comments:
The Replication Package of the paper is available at the links http://www.ifi.uzh.ch/en/seal/people/panichella/tools/SURF.html and https://zenodo.org/record/47323
The tool that implements the approach defined in this paper is available to other research and mobile developers at the following link:
http://www.ifi.uzh.ch/en/seal/people/panichella/tools/SURFTool.html
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
BigDebug: interactive debugger for big data analytics in Apache Spark Muhammad Ali Gulzar, Matteo Interlandi, Tyson Condie, Miryung Kim |
BigDebug: interactive debugger for big data analytics in Apache Spark Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding behavioural patterns in JavaScript Saba Alimadadi |
Understanding behavioural patterns in JavaScript Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Studying developer gaze to empower software engineering research and practice Bonita Sharif, Benjamin Clark, Jonathan I. Maletic |
Studying developer gaze to empower software engineering research and practice Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Gray links in the use of requirements traceability Nan Niu, Wentao Wang, Arushi Gupta |
Gray links in the use of requirements traceability Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POLLUX: safely upgrading dependent application libraries Sukrit Kalra, Ayush Goel, Dhriti Khanna, Mohan Dhawan, Subodh Sharma, Rahul Purandare |
POLLUX: safely upgrading dependent application libraries Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Disrupting developer productivity one bot at a time Margaret-Anne D. Storey, Alexey Zagalsky |
Disrupting developer productivity one bot at a time Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Detecting table clones and smells in spreadsheets Wensheng Dou, Shing-Chi Cheung, Chushu Gao, Chang Xu, Liang Xu, Jun Wei |
Detecting table clones and smells in spreadsheets Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Guided code synthesis using deep neural networks Carol V. Alexandru |
Guided code synthesis using deep neural networks Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Correct or usable? the limits of traditional verification (impact paper award) Daniel Jackson, Mandana Vaziri |
Correct or usable? the limits of traditional verification (impact paper award) Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
A discrete-time feedback controller for containerized cloud applications Luciano Baresi, Sam Guinea, Alberto Leva, Giovanni Quattrocchi |
A discrete-time feedback controller for containerized cloud applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automatic trigger generation for end user written rules for home automation Chandrakana Nandi |
Automatic trigger generation for end user written rules for home automation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Online shared memory dependence reduction via bisectional coordination Yanyan Jiang, Chang Xu, Du Li, Xiaoxing Ma, Jian Lu |
Online shared memory dependence reduction via bisectional coordination Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automating repetitive code changes using examples Reudismam Rolim |
Automating repetitive code changes using examples Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Static DOM event dependency analysis for testing web applications Chungha Sung, Markus Kusano, Nishant Sinha, Chao Wang |
Static DOM event dependency analysis for testing web applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lightweight specification and analysis of dynamic systems with rich configurations Nuno Macedo, Julien Brunel, David Chemouil, Alcino Cunha, Denis Kuperberg |
Lightweight specification and analysis of dynamic systems with rich configurations Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DiagDroid: Android performance diagnosis via anatomizing asynchronous executions Yu Kang, Yangfan Zhou, Hui Xu, Michael R. Lyu |
DiagDroid: Android performance diagnosis via anatomizing asynchronous executions Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias, Willem Visser |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TIPMerge: recommending developers for merging branches Catarina Costa, Jair Figueiredo, Anita Sarma, Leonardo Murta |
TIPMerge: recommending developers for merging branches Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
T2API: synthesizing API code usage templates from English texts with statistical translation Thanh Van Nguyen, Peter C. Rigby, Anh Tuan Nguyen, Mark Karanfil, Tien N. Nguyen |
T2API: synthesizing API code usage templates from English texts with statistical translation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automatic performance testing using input-sensitive profiling Qi Luo |
Automatic performance testing using input-sensitive profiling Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
How to break an API: cost negotiation and community values in three software ecosystems Christopher Bogart, Christian Kästner, James D. Herbsleb, Ferdian Thung |
How to break an API: cost negotiation and community values in three software ecosystems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Why we refactor? confessions of GitHub contributors Danilo Silva, Nikolaos Tsantalis, Marco Tulio Valente |
Why we refactor? confessions of GitHub contributors Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Finding and breaking test dependencies to speed up test execution Sebastian Kappler |
Finding and breaking test dependencies to speed up test execution Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Hunter: next-generation code reuse for Java Yuepeng Wang, Yu Feng, Ruben Martins, Arati Kaushik, Isil Dillig, Steven P. Reiss |
Hunter: next-generation code reuse for Java Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Combinatorial generation of structurally complex test inputs for commercial software applications Hua Zhong, Lingming Zhang, Sarfraz Khurshid |
Combinatorial generation of structurally complex test inputs for commercial software applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SmartDebug: an interactive debug assistant for Java Xinrui Guo |
SmartDebug: an interactive debug assistant for Java Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Constraint-based event trace reduction Jie Wang |
Constraint-based event trace reduction Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Combining bug detection and test case generation Martin Kellogg |
Combining bug detection and test case generation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Visualizing code and coverage changes for code review Sebastiaan Oosterwaal, Arie van Deursen, Roberta Coelho, Anand Ashok Sawant, Alberto Bacchelli |
Visualizing code and coverage changes for code review Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Developer workflow at google (showcase) Caitlin Sadowski |
Developer workflow at google (showcase) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Davood Mazinanian |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
WATERFALL: an incremental approach for repairing record-replay tests of web applications Mouna Hammoudi, Gregg Rothermel, Andrea Stocco |
WATERFALL: an incremental approach for repairing record-replay tests of web applications Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
Effective assignment and assistance to software developers and reviewers Motahareh Bahrami Zanjani |
Effective assignment and assistance to software developers and reviewers Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Anti-patterns in search-based program repair Shin Hwei Tan, Hiroaki Yoshida, Mukul R. Prasad, Abhik Roychoudhury |
Anti-patterns in search-based program repair Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Detecting and fixing precision-specific operations for measuring floating-point errors Ran Wang, Daming Zou, Xinrui He, Yingfei Xiong, Lu Zhang, Gang Huang |
Detecting and fixing precision-specific operations for measuring floating-point errors Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ECHO: instantaneous in situ race detection in the IDE Sheng Zhan, Jeff Huang |
ECHO: instantaneous in situ race detection in the IDE Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Titanium: efficient analysis of evolving alloy specifications Hamid Bagheri, Sam Malek |
Titanium: efficient analysis of evolving alloy specifications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
How should static analysis tools explain anomalies to developers? Titus Barik |
How should static analysis tools explain anomalies to developers? Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
RABIEF: range analysis based integer error fixing Xi Cheng |
RABIEF: range analysis based integer error fixing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Continuous deployment of mobile software at facebook (showcase) Chuck Rossi, Elisa Shibley, Shi Su, Kent L. Beck, Tony Savor, Michael Stumm |
Continuous deployment of mobile software at facebook (showcase) Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Call graph construction for Java libraries Michael Reif, Michael Eichberg, Ben Hermann, Johannes Lerch, Mira Mezini |
Call graph construction for Java libraries Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
We made our evaluation reproducible and, therefore, provide a Docker container along with the paper. The code on the Docker container corresponds to the state of source code at the time of submission. Later optimizations and changes are not included. It also contains the complete evaluation corpus. A description how to use the container is contained in the paper.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
PerfGuard: binary-centric application performance monitoring in production environments Chung Hwan Kim, Junghwan Rhee, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu |
PerfGuard: binary-centric application performance monitoring in production environments Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
iGen: dynamic interaction inference for configurable software ThanhVu Nguyen, Ugur Koc, Javran Cheng, Jeffrey S. Foster, Adam A. Porter |
iGen: dynamic interaction inference for configurable software Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Multi-representational security analysis Eunsuk Kang, Aleksandar Milicevic, Daniel Jackson |
Multi-representational security analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Extracting instruction semantics via symbolic execution of code generators Niranjan Hasabnis, R. Sekar |
Extracting instruction semantics via symbolic execution of code generators Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Correctness witnesses: exchanging verification results between verifiers Dirk Beyer, Matthias Dangl, Daniel Dietsch, Matthias Heizmann |
Correctness witnesses: exchanging verification results between verifiers Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reaching the masses: a new subdiscipline of app programmer education Charles Weir, Awais Rashid, James Noble |
Reaching the masses: a new subdiscipline of app programmer education Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tse-Hsun Chen, Weiyi Shang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When should internal interfaces be promoted to public? André C. Hora, Marco Tulio Valente, Romain Robbes, Nicolas Anquetil |
When should internal interfaces be promoted to public? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Static loop analysis and its applications Xiaofei Xie |
Static loop analysis and its applications Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Felipe R. Monteiro |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Author has
verified
information
|
|
BinGo: cross-architecture cross-OS binary search Mahinthan Chandramohan, Yinxing Xue, Zhengzi Xu, Yang Liu, Chia Yuan Cho, Hee Beng Kuan Tan |
BinGo: cross-architecture cross-OS binary search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding and detecting wake lock misuses for Android applications Yepang Liu, Chang Xu, Shing-Chi Cheung, Valerio Terragni |
Understanding and detecting wake lock misuses for Android applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Crash consistency validation made easy Yanyan Jiang, Haicheng Chen, Feng Qin, Chang Xu, Xiaoxing Ma, Jian Lu |
Crash consistency validation made easy Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
API code recommendation using statistical learning from fine-grained changes Anh Tuan Nguyen, Michael Hilton, Mihai Codoban, Hoan Anh Nguyen, Lily Mast, Eli Rademacher, Tien N. Nguyen, Danny Dig |
API code recommendation using statistical learning from fine-grained changes Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Model, execute, and deploy: answering the hard questions in end-user programming (showcase) Shan Shan Huang |
Model, execute, and deploy: answering the hard questions in end-user programming (showcase) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Preventing signedness errors in numerical computations in Java Christopher A. Mackie |
Preventing signedness errors in numerical computations in Java Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Lazaro Clapp, Osbert Bastani, Saswat Anand, Alex Aiken |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stepan Shevtsov |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Code relatives: detecting similarly behaving software Fang-Hsiang Su, Jonathan Bell, Kenneth Harvey, Simha Sethumadhavan, Gail E. Kaiser, Tony Jebara |
Code relatives: detecting similarly behaving software Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Regression testing of web applications using Record/Replay tools Mouna Hammoudi |
Regression testing of web applications using Record/Replay tools Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Parameter-free probabilistic API mining across GitHub Jaroslav M. Fowkes, Charles A. Sutton |
Parameter-free probabilistic API mining across GitHub Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Analyzing the validity of selective mutation with dominator mutants Bob Kurtz, Paul Ammann, Jeff Offutt, Márcio Eduardo Delamaro, Mariet Kurtz, Nida Gökçe |
Analyzing the validity of selective mutation with dominator mutants Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Python predictive analysis for bug detection Zhaogui Xu, Peng Liu, Xiangyu Zhang, Baowen Xu |
Python predictive analysis for bug detection Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On-demand strong update analysis via value-flow refinement Yulei Sui, Jingling Xue |
On-demand strong update analysis via value-flow refinement Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
JBSE: a symbolic executor for Java programs with complex heap inputs Pietro Braione, Giovanni Denaro, Mauro Pezzè |
JBSE: a symbolic executor for Java programs with complex heap inputs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Input-sensitive performance testing Qi Luo |
Input-sensitive performance testing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A deployable sampling strategy for data race detection Yan Cai, Jian Zhang, Lingwei Cao, Jian Liu |
A deployable sampling strategy for data race detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Directed test generation to detect loop inefficiencies Monika Dhok, Murali Krishna Ramanathan |
Directed test generation to detect loop inefficiencies Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Social health cues developers use when choosing open source packages Andrew Head |
Social health cues developers use when choosing open source packages Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Python probabilistic type inference with natural language support Zhaogui Xu, Xiangyu Zhang, Lin Chen, Kexin Pei, Baowen Xu |
Python probabilistic type inference with natural language support Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Xiaodong Gu, Hongyu Zhang, Dongmei Zhang, Sunghun Kim |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Revamping JavaScript static analysis via localization and remediation of root causes of imprecision Shiyi Wei, Omer Tripp, Barbara G. Ryder, Julian Dolby |
Revamping JavaScript static analysis via localization and remediation of root causes of imprecision Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WebRanz: web page randomization for better advertisement delivery and web-bot prevention Weihang Wang, Yunhui Zheng, Xinyu Xing, Yonghwi Kwon, Xiangyu Zhang, Patrick Th. Eugster |
WebRanz: web page randomization for better advertisement delivery and web-bot prevention Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On-the-fly decomposition of specifications in software model checking Sven Apel, Dirk Beyer, Vitaly O. Mordan, Vadim S. Mutilin, Andreas Stahlbauer |
On-the-fly decomposition of specifications in software model checking Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
"Womenomics" and gender-inclusive software: what software engineers need to know (invited talk) Margaret M. Burnett |
"Womenomics" and gender-inclusive software: what software engineers need to know (invited talk) Details |
Author Comments:
This was an abstract+references for my FSE keynote address. The full journal paper defining the method described (GenderMag), available at the links provided here, is:
"GenderMag: A Method for Evaluating Software's Gender Inclusiveness", Margaret Burnett, Simone Stumpf, Jamie Macbeth, Stephann Makri, Laura Beckwith, Irwin Kwan, Anicia Peters, William Jernigan, Interacting with Computers, 2016.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Author has
verified
information
|
|
Cozy: synthesizing collection data structures Calvin Loncaric |
Cozy: synthesizing collection data structures Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Evaluation of fault localization techniques Spencer Pearson |
Evaluation of fault localization techniques Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Efficient generation of inductive validity cores for safety properties Elaheh Ghassabani, Andrew Gacek, Michael W. Whalen |
Efficient generation of inductive validity cores for safety properties Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Semi-supervised verified feedback generation Shalini Kaleeswaran, Anirudh Santhiar, Aditya Kanade, Sumit Gulwani |
Semi-supervised verified feedback generation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Relationship-aware code search for JavaScript frameworks Xuan Li, Zerui Wang, Qianxiang Wang, Shoumeng Yan, Tao Xie, Hong Mei |
Relationship-aware code search for JavaScript frameworks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Wing Lam |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Can testedness be effectively measured? Iftekhar Ahmed, Rahul Gopinath, Caius Brindescu, Alex Groce, Carlos Jensen |
Can testedness be effectively measured? Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Enforcing correct array indexes with a type system Joseph Santino |
Enforcing correct array indexes with a type system Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Understanding and generating high quality patches for concurrency bugs Haopeng Liu, Yuxi Chen, Shan Lu |
Understanding and generating high quality patches for concurrency bugs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting sensitive data disclosure via bi-directional text correlation analysis Jianjun Huang, Xiangyu Zhang, Lin Tan |
Detecting sensitive data disclosure via bi-directional text correlation analysis Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Martin P. Robillard |
Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Causal impact analysis for app releases in google play William J. Martin, Federica Sarro, Mark Harman |
Causal impact analysis for app releases in google play Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
ARdoc: app reviews development oriented classifier Sebastiano Panichella, Andrea Di Sorbo, Emitza Guzman, Corrado Aaron Visaggio, Gerardo Canfora, Harald C. Gall |
ARdoc: app reviews development oriented classifier Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DeepSoft: a vision for a deep model of software Hoa Khanh Dam, Truyen Tran, John C. Grundy, Aditya K. Ghose |
DeepSoft: a vision for a deep model of software Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Supporting change in product lines within the context of use case-driven development and testing Ines Hajri |
Supporting change in product lines within the context of use case-driven development and testing Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Author has
verified
information
|
|
Budgeted testing through an algorithmic lens Myra B. Cohen, Aduri Pavan, N. V. Vinodchandran |
Budgeted testing through an algorithmic lens Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Paradise unplugged: identifying barriers for female participation on stack overflow Denae Ford, Justin Smith, Philip J. Guo, Chris Parnin |
Paradise unplugged: identifying barriers for female participation on stack overflow Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
String analysis for side channels with segmented oracles Lucas Bang, Abdulbaki Aydin, Quoc-Sang Phan, Corina S. Pasareanu, Tevfik Bultan |
String analysis for side channels with segmented oracles Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the utility of dominator mutants for mutation testing Bob Kurtz |
On the utility of dominator mutants for mutation testing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Understanding and improving continuous integration Michael Hilton |
Understanding and improving continuous integration Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Designing minimal effective normative systems with the help of lightweight formal methods Jianye Hao, Eunsuk Kang, Jun Sun, Daniel Jackson |
Designing minimal effective normative systems with the help of lightweight formal methods Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Making invisible things visible: tracking down known vulnerabilities at 3000 companies (showcase) Gazi Mahmud |
Making invisible things visible: tracking down known vulnerabilities at 3000 companies (showcase) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Learning for test prioritization: an industrial case study Benjamin Busjaeger, Tao Xie |
Learning for test prioritization: an industrial case study Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mining performance specifications Marc Brünink, David S. Rosenblum |
Mining performance specifications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
End-to-end memory behavior profiling with DINAMITE Svetozar Miucin, Conor Brady, Alexandra Fedorova |
End-to-end memory behavior profiling with DINAMITE Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Calvin Loncaric |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A large-scale empirical comparison of static and dynamic test case prioritization techniques Qi Luo, Kevin Moran, Denys Poshyvanyk |
A large-scale empirical comparison of static and dynamic test case prioritization techniques Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Efficiency of projectional editing: a controlled experiment Thorsten Berger, Markus Völter, Hans Peter Jensen, Taweesap Dangprasert, Janet Siegmund |
Efficiency of projectional editing: a controlled experiment Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Building a socio-technical theory of coordination: why and how (outstanding research award) James D. Herbsleb |
Building a socio-technical theory of coordination: why and how (outstanding research award) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
NonDex: a tool for detecting and debugging wrong assumptions on Java API specifications Alex Gyori, Ben Lambeth, August Shi, Owolabi Legunsen, Darko Marinov |
NonDex: a tool for detecting and debugging wrong assumptions on Java API specifications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Factors influencing code review processes in industry Tobias Baum, Olga Liskin, Kai Niklas, Kurt Schneider |
Factors influencing code review processes in industry Details |
Author Comments:
Extracts of the interview transcripts can be made available upon request, subject to certain limitations to ensure participant's anonymity
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Build system with lazy retrieval for Java projects Ahmet Çelik, Alex Knaust, Aleksandar Milicevic, Milos Gligoric |
Build system with lazy retrieval for Java projects Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated change impact analysis between SysML models of requirements and design Shiva Nejati, Mehrdad Sabetzadeh, Chetan Arora, Lionel C. Briand, Felix Mandoux |
Automated change impact analysis between SysML models of requirements and design Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Hotspot symbolic execution of floating-point programs Minghui Quan |
Hotspot symbolic execution of floating-point programs Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Validate your SPDX files for open source license violations Demetris Paschalides, Georgia M. Kapitsaki |
Validate your SPDX files for open source license violations Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
PUMConf: a tool to configure product specific use case and domain models in a product line Ines Hajri, Arda Goknil, Lionel C. Briand, Thierry Stephany |
PUMConf: a tool to configure product specific use case and domain models in a product line Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
On well-separation of GR(1) specifications Shahar Maoz, Jan Oliver Ringert |
On well-separation of GR(1) specifications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Discovering bug patterns in JavaScript Quinn Hanam, Fernando Santos De Mattos Brito, Ali Mesbah |
Discovering bug patterns in JavaScript Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yibiao Yang, Yuming Zhou, Jinping Liu, Yangyang Zhao, Hongmin Lu, Lei Xu, Baowen Xu, Hareton Leung |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Effectiveness of code contribution: from patch-based to pull-request-based tools Jiaxin Zhu, Minghui Zhou, Audris Mockus |
Effectiveness of code contribution: from patch-based to pull-request-based tools Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Isomorphic regression testing: executing uncovered branches without test augmentation Jie Zhang, Yiling Lou, Lingming Zhang, Dan Hao, Lu Zhang, Hong Mei |
Isomorphic regression testing: executing uncovered branches without test augmentation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Flow-sensitive composition of thread-modular abstract interpretation Markus Kusano, Chao Wang |
Flow-sensitive composition of thread-modular abstract interpretation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An extensive study of static regression test selection in modern software evolution Owolabi Legunsen, Farah Hariri, August Shi, Yafeng Lu, Lingming Zhang, Darko Marinov |
An extensive study of static regression test selection in modern software evolution Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SMT-based verification of parameterized systems Arie Gurfinkel, Sharon Shoham, Yuri Meshman |
SMT-based verification of parameterized systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|