ACM Foundations of Software Engineering, FSE 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

From scenario modeling to scenario programming for reactive systems with dynamic topology

Joel Greenyer, Daniel Gritzner, Florian König, Jannik Dahlke, Jianwei Shi, Eric Wete

From scenario modeling to scenario programming for reactive systems with dynamic topology

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cooperative kernels: GPU multitasking for blocking algorithms

Tyler Sorensen, Hugues Evrard, Alastair F. Donaldson

Cooperative kernels: GPU multitasking for blocking algorithms

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Serverless computing: economic and architectural impact

Gojko Adzic, Robert Chatley

Serverless computing: economic and architectural impact

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically diagnosing and repairing error handling bugs in C

Yuchi Tian, Baishakhi Ray

Automatically diagnosing and repairing error handling bugs in C

Details
Discussion Comments: 0
Verification: Authors have not verified information

CLTSA: labelled transition system analyser with counting fluent support

Germán Regis, Renzo Degiovanni, Nicolás D'Ippolito, Nazareno Aguirre

CLTSA: labelled transition system analyser with counting fluent support

Details
Discussion Comments: 0
Verification: Authors have not verified information

Steelix: program-state based binary fuzzing

Yuekang Li, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin, Yang Liu, Alwen Tiu

Steelix: program-state based binary fuzzing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Toward full elasticity in distributed static analysis: the case of callgraph analysis

Diego Garbervetsky, Edgardo Zoppi, Benjamin Livshits

Toward full elasticity in distributed static analysis: the case of callgraph analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Finding near-optimal configurations in product lines by random sampling

Jeho Oh, Don S. Batory, Margaret Myers, Norbert Siegmund

Finding near-optimal configurations in product lines by random sampling

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automatically analyzing groups of crashes for finding correlations

Marco Castelluccio, Carlo Sansone, Luisa Verdoliva, Giovanni Poggi

Automatically analyzing groups of crashes for finding correlations

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

AtexRace: across thread and execution sampling for in-house race detection

Yu Guo, Yan Cai, Zijiang Yang

AtexRace: across thread and execution sampling for in-house race detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Model-level, platform-independent debugging in the context of the model-driven development of real-time systems

Mojtaba Bagherzadeh, Nicolas Hili, Juergen Dingel

Model-level, platform-independent debugging in the context of the model-driven development of real-time systems

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Screening heuristics for project gating systems

Zahy Volf, Edi Shmueli

Screening heuristics for project gating systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

QTEP: quality-aware test case prioritization

Song Wang, Jaechang Nam, Lin Tan

QTEP: quality-aware test case prioritization

Details
Discussion Comments: 0
Verification: Authors have not verified information

RunDroid: recovering execution call graphs for Android applications

Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podgurski, Huibiao Zhu

RunDroid: recovering execution call graphs for Android applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical symbolic verification of regular properties

Hengbiao Yu

Practical symbolic verification of regular properties

Details
Discussion Comments: 0
Verification: Author has not verified information

Why modern open source projects fail

Jailton Coelho, Marco Tulio Valente

Why modern open source projects fail

Details
Discussion Comments: 0
Verification: Authors have not verified information

Fairness testing: testing software for discrimination

Sainyam Galhotra, Yuriy Brun, Alexandra Meliou

Fairness testing: testing software for discrimination

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Symbolic execution of programmable logic controller code

Shengjian Guo, Meng Wu, Chao Wang

Symbolic execution of programmable logic controller code

Details
Discussion Comments: 0
Verification: Authors have not verified information

Model-based dynamic software project scheduling

Natasha Nigar

Model-based dynamic software project scheduling

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Author has verified information

Reflections on the REST architectural style and "principled design of the modern web architecture" (impact paper award)

Roy T. Fielding, Richard N. Taylor, Justin R. Erenkrantz, Michael M. Gorlick, Jim Whitehead, Rohit Khare, Peyman Oreizy

Reflections on the REST architectural style and "principled design of the modern web architecture" (impact paper award)

Details
Discussion Comments: 0
Verification: Authors have not verified information

BDCI: behavioral driven conflict identification

Fabrizio Pastore, Leonardo Mariani, Daniela Micucci

BDCI: behavioral driven conflict identification

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Why do developers use trivial packages? an empirical case study on npm

Rabe Abdalkareem, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid, Emad Shihab

Why do developers use trivial packages? an empirical case study on npm

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

CodeMatch: obfuscation won't conceal your repackaged app

Leonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann, Johannes Lerch, Mira Mezini

CodeMatch: obfuscation won't conceal your repackaged app

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Understanding misunderstandings in source code

Dan Gopstein, Jake Iannacone, Yu Yan, Lois DeLong, Yanyan Zhuang, Martin K.-C. Yeh, Justin Cappos

Understanding misunderstandings in source code

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automated control of multiple software goals using multiple actuators

Martina Maggio, Alessandro Vittorio Papadopoulos, Antonio Filieri, Henry Hoffmann

Automated control of multiple software goals using multiple actuators

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated identification of security issues from commit messages and bug reports

Yaqin Zhou, Asankhaya Sharma

Automated identification of security issues from commit messages and bug reports

Details
Author Comments: While we are unable to share the actual dataset used to train the ML models built in the paper, we have shared a tool commit watcher that can be used to generate such a dataset. The commit watcher tool is open source and available under a permissive Apache 2.0 license.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

File-level vs. module-level regression test selection for .NET

Marko Vasic, Zuhair Parvez, Aleksandar Milicevic, Milos Gligoric

File-level vs. module-level regression test selection for .NET

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Is there a mismatch between real-world feature models and product-line research?

Alexander Knüppel, Thomas Thüm, Stephan Mennicke, Jens Meinicke, Ina Schaefer

Is there a mismatch between real-world feature models and product-line research?

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Recovering clear, natural identifiers from obfuscated JS names

Bogdan Vasilescu, Casey Casalnuovo, Premkumar T. Devanbu

Recovering clear, natural identifiers from obfuscated JS names

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Enabling mutation testing for Android apps

Mario Linares Vásquez, Gabriele Bavota, Michele Tufano, Kevin Moran, Massimiliano Di Penta, Christopher Vendome, Carlos Bernal-Cárdenas, Denys Poshyvanyk

Enabling mutation testing for Android apps

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Kmax: finding all configurations of Kbuild makefiles statically

Paul Gazzillo

Kmax: finding all configurations of Kbuild makefiles statically

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Author has verified information

Reasons and drawbacks of using trivial npm packages: the developers' perspective

Rabe Abdalkareem

Reasons and drawbacks of using trivial npm packages: the developers' perspective

Details
Discussion Comments: 0
Verification: Author has not verified information

Regression test selection across JVM boundaries

Ahmet Çelik, Marko Vasic, Aleksandar Milicevic, Milos Gligoric

Regression test selection across JVM boundaries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Easy over hard: a case study on deep learning

Wei Fu, Tim Menzies

Easy over hard: a case study on deep learning

Details
Discussion Comments: 0
Verification: Authors have not verified information

Attributed variability models: outside the comfort zone

Norbert Siegmund, Stefan Sobernig, Sven Apel

Attributed variability models: outside the comfort zone

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Strong agile metrics: mining log data to determine predictive power of software metrics for continuous delivery teams

Hennie Huijgens, Robert Lamping, Dick Stevens, Hartger Rothengatter, Georgios Gousios, Daniele Romano

Strong agile metrics: mining log data to determine predictive power of software metrics for continuous delivery teams

Details
Discussion Comments: 0
Verification: Authors have not verified information

A feasibility study of using automated program repair for introductory programming assignments

Jooyong Yi, Umair Z. Ahmed, Amey Karkare, Shin Hwei Tan, Abhik Roychoudhury

A feasibility study of using automated program repair for introductory programming assignments

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Synergistic debug-repair of heap manipulations

Sahil Verma, Subhajit Roy

Synergistic debug-repair of heap manipulations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Continuous variable-specific resolutions of feature interactions

Mohammad Hadi Zibaeenejad, Chi Zhang, Joanne M. Atlee

Continuous variable-specific resolutions of feature interactions

Details
Discussion Comments: 0
Verification: Authors have not verified information

What do software engineers care about? gaps between research and practice

Vladimir Ivanov, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin

What do software engineers care about? gaps between research and practice

Details
Discussion Comments: 0
Verification: Authors have not verified information

Modeling and verification of evolving cyber-physical spaces

Christos Tsigkanos, Timo Kehrer, Carlo Ghezzi

Modeling and verification of evolving cyber-physical spaces

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reproducing concurrency failures from crash stacks

Francesco A. Bianchi, Mauro Pezzè, Valerio Terragni

Reproducing concurrency failures from crash stacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

JoanAudit: a tool for auditing common injection vulnerabilities

Julian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand

JoanAudit: a tool for auditing common injection vulnerabilities

Details
Discussion Comments: 0
Verification: Authors have not verified information

Failure-directed program trimming

Kostas Ferles, Valentin Wüstholz, Maria Christakis, Isil Dillig

Failure-directed program trimming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Recommender system for model driven software development

Stefan Kögel

Recommender system for model driven software development

Details
Discussion Comments: 0
Verification: Author has not verified information

A fast causal profiler for task parallel programs

Adarsh Yoga, Santosh Nagarakatte

A fast causal profiler for task parallel programs

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

LAMP: data provenance for graph based machine learning algorithms through derivative computation

Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang

LAMP: data provenance for graph based machine learning algorithms through derivative computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Suggesting meaningful variable names for decompiled code: a machine translation approach

Alan Jaffe

Suggesting meaningful variable names for decompiled code: a machine translation approach

Details
Discussion Comments: 0
Verification: Author has not verified information

Software engineering research results in industrial practice: a tale of two projects (invited talk)

Wolfgang Emmerich

Software engineering research results in industrial practice: a tale of two projects (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

ARTINALI: dynamic invariant detection for cyber-physical system security

Maryam Raiyat Aliabadi, Amita Ajith Kamath, Julien Gascon-Samson, Karthik Pattabiraman

ARTINALI: dynamic invariant detection for cyber-physical system security

Details
Author Comments: We have not provided scripts to reproduce the traces used for the invariants in the Github repository as these are specific to our embedded systems - we have provided the traces generated and automated scripts to generate the invariants from the traces. If you're interested in how to reproduce the traces, please contact us via email.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The power of "why" and "why not": enriching scenario exploration with provenance

Tim Nelson, Natasha Danas, Daniel J. Dougherty, Shriram Krishnamurthi

The power of "why" and "why not": enriching scenario exploration with provenance

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

The rising tide lifts all boats: the advancement of science in cyber security (invited talk)

Laurie Williams

The rising tide lifts all boats: the advancement of science in cyber security (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Automatic generation of inter-component communication exploits for Android applications

Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek

Automatic generation of inter-component communication exploits for Android applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Record and replay for Android: are we there yet in industrial cases?

Wing Lam, Zhengkai Wu, Dengfeng Li, Wenyu Wang, Haibing Zheng, Hui Luo, Peng Yan, Yuetang Deng, Tao Xie

Record and replay for Android: are we there yet in industrial cases?

Details
Discussion Comments: 0
Verification: Authors have not verified information

System performance optimization via design and configuration space exploration

Chong Tang

System performance optimization via design and configuration space exploration

Details
Discussion Comments: 0
Verification: Author has not verified information

User- and analysis-driven context aware software development in mobile computing

Mai Abusair

User- and analysis-driven context aware software development in mobile computing

Details
Discussion Comments: 0
Verification: Author has not verified information

DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour

Germán Regis, César Cornejo, Simón Gutiérrez Brida, Mariano Politano, Fernando Raverta, Pablo Ponzio, Nazareno Aguirre, Juan Pablo Galeotti, Marcelo F. Frias

DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour

Details
Discussion Comments: 0
Verification: Authors have not verified information

Bayesian specification learning for finding API usage errors

Vijayaraghavan Murali, Swarat Chaudhuri, Chris Jermaine

Bayesian specification learning for finding API usage errors

Details
Discussion Comments: 0
Verification: Authors have not verified information

Are deep neural networks the best choice for modeling source code?

Vincent J. Hellendoorn, Premkumar T. Devanbu

Are deep neural networks the best choice for modeling source code?

Details
Discussion Comments: 0
Verification: Authors have not verified information

Verifying the forecast: how climate models are developed and tested (invited talk)

Steve Easterbrook

Verifying the forecast: how climate models are developed and tested (invited talk)

Details
Discussion Comments: 0
Verification: Author has not verified information

Guided, stochastic model-based GUI testing of Android apps

Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, Zhendong Su

Guided, stochastic model-based GUI testing of Android apps

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Thread-modular static analysis for relaxed memory models

Markus Kusano, Chao Wang

Thread-modular static analysis for relaxed memory models

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems

Lu Wang

Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems

Details
Discussion Comments: 0
Verification: Author has not verified information

DecisionDroid: a supervised learning-based system to identify cloned Android applications

Ayush Kohli

DecisionDroid: a supervised learning-based system to identify cloned Android applications

Details
Discussion Comments: 0
Verification: Author has not verified information

Improving performance of automatic program repair using learned heuristics

Liam Schramm

Improving performance of automatic program repair using learned heuristics

Details
Discussion Comments: 0
Verification: Author has not verified information

S3: syntax- and semantic-guided repair synthesis via programming by examples

Xuan-Bach D. Le, Duc-Hiep Chu, David Lo, Claire Le Goues, Willem Visser

S3: syntax- and semantic-guided repair synthesis via programming by examples

Details
Discussion Comments: 0
Verification: Authors have not verified information

Constraint normalization and parameterized caching for quantitative program analysis

Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan

Constraint normalization and parameterized caching for quantitative program analysis

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

QEMU-based framework for non-intrusive virtual machine instrumentation and introspection

Pavel Dovgalyuk, Natalia Fursova, Ivan Vasiliev, Vladimir Makarov

QEMU-based framework for non-intrusive virtual machine instrumentation and introspection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects

Diego Cedrim, Alessandro Garcia, Melina Mongiovi, Rohit Gheyi, Leonardo da Silva Sousa, Rafael Maiani de Mello, Baldoino Fonseca, Márcio Ribeiro, Alexander Chávez

Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects

Details
Discussion Comments: 0
Verification: Authors have not verified information

Application of search-based software engineering methodologies for test suite optimization and evolution in mission critical mobile application development

Andreas Schuler

Application of search-based software engineering methodologies for test suite optimization and evolution in mission critical mobile application development

Details
Discussion Comments: 0
Verification: Author has not verified information

Loopster: static loop termination analysis

Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li

Loopster: static loop termination analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

PATDroid: permission-aware GUI testing of Android

Alireza Sadeghi, Reyhaneh Jabbarvand, Sam Malek

PATDroid: permission-aware GUI testing of Android

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Measuring the cost of regression testing in practice: a study of Java projects using continuous integration

Adriaan Labuschagne, Laura Inozemtseva, Reid Holmes

Measuring the cost of regression testing in practice: a study of Java projects using continuous integration

Details
Discussion Comments: 0
Verification: Authors have not verified information

Detecting missing information in bug descriptions

Oscar Chaparro, Jing Lu, Fiorella Zampetti, Laura Moreno, Massimiliano Di Penta, Andrian Marcus, Gabriele Bavota, Vincent Ng

Detecting missing information in bug descriptions

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

When program analysis meets mobile security: an industrial study of misusing Android internet sockets

Wenqi Bu, Minhui Xue, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie

When program analysis meets mobile security: an industrial study of misusing Android internet sockets

Details
Discussion Comments: 0
Verification: Authors have not verified information

Discovering relational specifications

Calvin Smith, Gabriel Ferns, Aws Albarghouthi

Discovering relational specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

VART: a tool for the automatic detection of regression faults

Fabrizio Pastore, Leonardo Mariani

VART: a tool for the automatic detection of regression faults

Details
Discussion Comments: 0
Verification: Authors have not verified information

The MONDO collaboration framework: secure collaborative modeling over existing version control systems

Csaba Debreceni, Gábor Bergmann, Márton Búr, István Ráth, Dániel Varró

The MONDO collaboration framework: secure collaborative modeling over existing version control systems

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

NoFAQ: synthesizing command repairs from examples

Loris D'Antoni, Rishabh Singh, Michael Vaughn

NoFAQ: synthesizing command repairs from examples

Details
Discussion Comments: 0
Verification: Authors have not verified information

Counterexample-guided approach to finding numerical invariants

ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks

Counterexample-guided approach to finding numerical invariants

Details
Discussion Comments: 0
Verification: Authors have not verified information

Probabilistic model checking of perturbed MDPs with applications to cloud computing

Yamilet R. Serrano Llerena, Guoxin Su, David S. Rosenblum

Probabilistic model checking of perturbed MDPs with applications to cloud computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

µDroid: an energy-aware mutation testing framework for Android

Reyhaneh Jabbarvand, Sam Malek

µDroid: an energy-aware mutation testing framework for Android

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptively generating high quality fixes for atomicity violations

Yan Cai, Lingwei Cao, Jing Zhao

Adaptively generating high quality fixes for atomicity violations

Details
Discussion Comments: 0
Verification: Authors have not verified information

The care and feeding of wild-caught mutants

David Bingham Brown, Michael Vaughn, Ben Liblit, Thomas W. Reps

The care and feeding of wild-caught mutants

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

More accurate recommendations for method-level changes

Georg Dotzler, Marius Kamp, Patrick Kreutzer, Michael Philippsen

More accurate recommendations for method-level changes

Details
Discussion Comments: 0
Verification: Authors have not verified information

XSearch: a domain-specific cross-language relevant question retrieval tool

Bowen Xu, Zhenchang Xing, Xin Xia, David Lo, Xuan-Bach D. Le

XSearch: a domain-specific cross-language relevant question retrieval tool

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the similarity of software development documentation

Mathias Ellmann

On the similarity of software development documentation

Details
Discussion Comments: 0
Verification: Author has not verified information

Trade-offs in continuous integration: assurance, security, and flexibility

Michael Hilton, Nicholas Nelson, Timothy Tunnell, Darko Marinov, Danny Dig

Trade-offs in continuous integration: assurance, security, and flexibility

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automating traceability link recovery through classification

Chris Mills

Automating traceability link recovery through classification

Details
Discussion Comments: 0
Verification: Author has not verified information

FOSS version differentiation as a benchmark for static analysis security testing tools

Ivan Pashchenko

FOSS version differentiation as a benchmark for static analysis security testing tools

Details
Author Comments:
Discussion Comments: 0
Sharing: Publication does not represent original research
Verification: Author has verified information

Cimplifier: automatically debloating containers

Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel

Cimplifier: automatically debloating containers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies

Reza Matinnejad, Shiva Nejati, Lionel C. Briand

Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies

Details
Discussion Comments: 0
Verification: Authors have not verified information

Static analysis for optimizing big data queries

Diego Garbervetsky, Zvonimir Pavlinovic, Michael Barnett, Madanlal Musuvathi, Todd Mytkowicz, Edgardo Zoppi

Static analysis for optimizing big data queries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Generalized observational slicing for tree-represented modelling languages

Nicolas E. Gold, David W. Binkley, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo

Generalized observational slicing for tree-represented modelling languages

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Understanding the impact of support for iteration on code search

Lee Martie, André van der Hoek, Thomas Kwak

Understanding the impact of support for iteration on code search

Details
Discussion Comments: 0
Verification: Authors have not verified information

Guidelines for adopting frontend architectures and patterns in microservices-based systems

Holger Harms, Collin Rogowski, Luigi Lo Iacono

Guidelines for adopting frontend architectures and patterns in microservices-based systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

A symbolic justice violations transition system for unrealizable GR(1) specifications

Aviv Kuvent, Shahar Maoz, Jan Oliver Ringert

A symbolic justice violations transition system for unrealizable GR(1) specifications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improving understanding of dynamically typed software developed by agile practitioners

Jair García, Kelly Garcés

Improving understanding of dynamically typed software developed by agile practitioners

Details
Discussion Comments: 0
Verification: Authors have not verified information

DESCRY: reproducing system-level concurrency failures

Tingting Yu, Tarannum S. Zaman, Chao Wang

DESCRY: reproducing system-level concurrency failures

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using bad learners to find good configurations

Vivek Nair, Tim Menzies, Norbert Siegmund, Sven Apel

Using bad learners to find good configurations

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Where is the bug and how is it fixed? an experiment with practitioners

Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller

Where is the bug and how is it fixed? an experiment with practitioners

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Author Comments: 291 (in)correct patches from real software professionals for 27 real bugs in C for the qualitative evaluation of automated debugging and repair techniques
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

LaChouTi: kernel vulnerability responding framework for the fragmented Android devices

JingZheng Wu, Mutian Yang

LaChouTi: kernel vulnerability responding framework for the fragmented Android devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Model-based privacy and security analysis with CARiSMA

Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens

Model-based privacy and security analysis with CARiSMA

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

ARCC: assistant for repetitive code comprehension

Wilberto Z. Nunez, Victor J. Marin, Carlos R. Rivero

ARCC: assistant for repetitive code comprehension

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Automatic inference of code transforms for patch generation

Fan Long, Peter Amidon, Martin Rinard

Automatic inference of code transforms for patch generation

Details
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility, or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
Discussion Comments: 0
Verification: Authors have not verified information

Detecting wearable app permission mismatches: a case study on Android wear

Suhaib Mujahid

Detecting wearable app permission mismatches: a case study on Android wear

Details
Discussion Comments: 0
Verification: Author has not verified information

CodeCarbonCopy

Stelios Sidiroglou-Douskos, Eric Lahtinen, Anthony Eden, Fan Long, Martin Rinard

CodeCarbonCopy

Details
Discussion Comments: 0
Verification: Authors have not verified information

DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies

Marcos César de Oliveira

DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies

Details
Discussion Comments: 0
Verification: Author has not verified information

Revisiting unsupervised learning for defect prediction

Wei Fu, Tim Menzies

Revisiting unsupervised learning for defect prediction

Details
Discussion Comments: 0
Verification: Authors have not verified information

Natural language querying in SAP-ERP platform

Diptikalyan Saha, Neelamadhav Gantayat, Senthil Mani, Barry Mitchell

Natural language querying in SAP-ERP platform

Details
Discussion Comments: 0
Verification: Authors have not verified information

Applying deep learning based automatic bug triager to industrial projects

Sun-Ro Lee, Min-Jae Heo, Chan-Gun Lee, Milhan Kim, Gaeul Jeong

Applying deep learning based automatic bug triager to industrial projects

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

A compiler and verifier for page access oblivious computation

Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia

A compiler and verifier for page access oblivious computation

Details
Discussion Comments: 0
Verification: Authors have not verified information

RGSE: a regular property guided symbolic executor for Java

Hengbiao Yu, Zhenbang Chen, Yufeng Zhang, Ji Wang, Wei Dong

RGSE: a regular property guided symbolic executor for Java

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

On evidence preservation requirements for forensic-ready systems

Dalal Alrajeh, Liliana Pasquale, Bashar Nuseibeh

On evidence preservation requirements for forensic-ready systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Craig vs. Newton in software model checking

Daniel Dietsch, Matthias Heizmann, Betim Musa, Alexander Nutz, Andreas Podelski

Craig vs. Newton in software model checking

Details
Discussion Comments: 0
Verification: Authors have not verified information

OASIS: prioritizing static analysis warnings for Android apps based on app user reviews

Lili Wei, Yepang Liu, Shing-Chi Cheung

OASIS: prioritizing static analysis warnings for Android apps based on app user reviews

Details
Discussion Comments: 0
Verification: Authors have not verified information

Better test cases for better automated program repair

Jinqiu Yang, Alexey Zhikhartsev, Yuefei Liu, Lin Tan

Better test cases for better automated program repair

Details
Discussion Comments: 0
Verification: Authors have not verified information

Summarizing software engineering communication artifacts from different sources

Verena Käfer

Summarizing software engineering communication artifacts from different sources

Details
Author Comments:
Discussion Comments: 0
Sharing: Publication does not represent original research
Verification: Author has verified information

Cherry-picking of code commits in long-running, multi-release software

Panuchart Bunyakiati, Chadarat Phipathananunth

Cherry-picking of code commits in long-running, multi-release software

Details
Discussion Comments: 0
Verification: Authors have not verified information

A tool for automated reasoning about traces based on configurable formal semantics

Ferhat Erata, Arda Goknil, Bedir Tekinerdogan, Geylani Kardas

A tool for automated reasoning about traces based on configurable formal semantics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reference architectures and Scrum: friends or foes?

Matthias Galster, Samuil Angelov, Silverio Martínez-Fernández, Dan Tofan

Reference architectures and Scrum: friends or foes?

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the scalability of Linux kernel maintainers' work

Minghui Zhou, Qingying Chen, Audris Mockus, Fengguang Wu

On the scalability of Linux kernel maintainers' work

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measuring neural efficiency of program comprehension

Janet Siegmund, Norman Peitek, Chris Parnin, Sven Apel, Johannes Hofmeister, Christian Kästner, Andrew Begel, Anja Bethmann, André Brechmann

Measuring neural efficiency of program comprehension

Details
Author Comments: Due to the GDPR, we cannot put the fMRI data of the participants on the Web site. They can be provided upon request.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Model-driven software engineering in practice: privacy-enhanced filtering of network traffic

Roel van Dijk, Christophe Creeten, Jeroen van der Ham, Jeroen van den Bos

Model-driven software engineering in practice: privacy-enhanced filtering of network traffic

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information