Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
From scenario modeling to scenario programming for reactive systems with dynamic topology Joel Greenyer, Daniel Gritzner, Florian König, Jannik Dahlke, Jianwei Shi, Eric Wete |
From scenario modeling to scenario programming for reactive systems with dynamic topology Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Cooperative kernels: GPU multitasking for blocking algorithms Tyler Sorensen, Hugues Evrard, Alastair F. Donaldson |
Cooperative kernels: GPU multitasking for blocking algorithms Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Serverless computing: economic and architectural impact Gojko Adzic, Robert Chatley |
Serverless computing: economic and architectural impact Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatically diagnosing and repairing error handling bugs in C Yuchi Tian, Baishakhi Ray |
Automatically diagnosing and repairing error handling bugs in C Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CLTSA: labelled transition system analyser with counting fluent support Germán Regis, Renzo Degiovanni, Nicolás D'Ippolito, Nazareno Aguirre |
CLTSA: labelled transition system analyser with counting fluent support Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Steelix: program-state based binary fuzzing Yuekang Li, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin, Yang Liu, Alwen Tiu |
Steelix: program-state based binary fuzzing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Toward full elasticity in distributed static analysis: the case of callgraph analysis Diego Garbervetsky, Edgardo Zoppi, Benjamin Livshits |
Toward full elasticity in distributed static analysis: the case of callgraph analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Finding near-optimal configurations in product lines by random sampling Jeho Oh, Don S. Batory, Margaret Myers, Norbert Siegmund |
Finding near-optimal configurations in product lines by random sampling Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automatically analyzing groups of crashes for finding correlations Marco Castelluccio, Carlo Sansone, Luisa Verdoliva, Giovanni Poggi |
Automatically analyzing groups of crashes for finding correlations Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
AtexRace: across thread and execution sampling for in-house race detection Yu Guo, Yan Cai, Zijiang Yang |
AtexRace: across thread and execution sampling for in-house race detection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mojtaba Bagherzadeh, Nicolas Hili, Juergen Dingel |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Screening heuristics for project gating systems Zahy Volf, Edi Shmueli |
Screening heuristics for project gating systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
QTEP: quality-aware test case prioritization Song Wang, Jaechang Nam, Lin Tan |
QTEP: quality-aware test case prioritization Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
RunDroid: recovering execution call graphs for Android applications Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podgurski, Huibiao Zhu |
RunDroid: recovering execution call graphs for Android applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Practical symbolic verification of regular properties Hengbiao Yu |
Practical symbolic verification of regular properties Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Why modern open source projects fail Jailton Coelho, Marco Tulio Valente |
Why modern open source projects fail Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Fairness testing: testing software for discrimination Sainyam Galhotra, Yuriy Brun, Alexandra Meliou |
Fairness testing: testing software for discrimination Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Symbolic execution of programmable logic controller code Shengjian Guo, Meng Wu, Chao Wang |
Symbolic execution of programmable logic controller code Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Model-based dynamic software project scheduling Natasha Nigar |
Model-based dynamic software project scheduling Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Author has
verified
information
|
Roy T. Fielding, Richard N. Taylor, Justin R. Erenkrantz, Michael M. Gorlick, Jim Whitehead, Rohit Khare, Peyman Oreizy |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
BDCI: behavioral driven conflict identification Fabrizio Pastore, Leonardo Mariani, Daniela Micucci |
BDCI: behavioral driven conflict identification Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Why do developers use trivial packages? an empirical case study on npm Rabe Abdalkareem, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid, Emad Shihab |
Why do developers use trivial packages? an empirical case study on npm Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
CodeMatch: obfuscation won't conceal your repackaged app Leonid Glanz, Sven Amann, Michael Eichberg, Michael Reif, Ben Hermann, Johannes Lerch, Mira Mezini |
CodeMatch: obfuscation won't conceal your repackaged app Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Understanding misunderstandings in source code Dan Gopstein, Jake Iannacone, Yu Yan, Lois DeLong, Yanyan Zhuang, Martin K.-C. Yeh, Justin Cappos |
Understanding misunderstandings in source code Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automated control of multiple software goals using multiple actuators Martina Maggio, Alessandro Vittorio Papadopoulos, Antonio Filieri, Henry Hoffmann |
Automated control of multiple software goals using multiple actuators Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated identification of security issues from commit messages and bug reports Yaqin Zhou, Asankhaya Sharma |
Automated identification of security issues from commit messages and bug reports Details |
Author Comments:
While we are unable to share the actual dataset used to train the ML models built in the paper, we have shared a tool commit watcher that can be used to generate such a dataset. The commit watcher tool is open source and available under a permissive Apache 2.0 license.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
File-level vs. module-level regression test selection for .NET Marko Vasic, Zuhair Parvez, Aleksandar Milicevic, Milos Gligoric |
File-level vs. module-level regression test selection for .NET Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Is there a mismatch between real-world feature models and product-line research? Alexander Knüppel, Thomas Thüm, Stephan Mennicke, Jens Meinicke, Ina Schaefer |
Is there a mismatch between real-world feature models and product-line research? Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Recovering clear, natural identifiers from obfuscated JS names Bogdan Vasilescu, Casey Casalnuovo, Premkumar T. Devanbu |
Recovering clear, natural identifiers from obfuscated JS names Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Enabling mutation testing for Android apps Mario Linares Vásquez, Gabriele Bavota, Michele Tufano, Kevin Moran, Massimiliano Di Penta, Christopher Vendome, Carlos Bernal-Cárdenas, Denys Poshyvanyk |
Enabling mutation testing for Android apps Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Kmax: finding all configurations of Kbuild makefiles statically Paul Gazzillo |
Kmax: finding all configurations of Kbuild makefiles statically Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Author has
verified
information
|
|
Reasons and drawbacks of using trivial npm packages: the developers' perspective Rabe Abdalkareem |
Reasons and drawbacks of using trivial npm packages: the developers' perspective Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Regression test selection across JVM boundaries Ahmet Çelik, Marko Vasic, Aleksandar Milicevic, Milos Gligoric |
Regression test selection across JVM boundaries Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Easy over hard: a case study on deep learning Wei Fu, Tim Menzies |
Easy over hard: a case study on deep learning Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Attributed variability models: outside the comfort zone Norbert Siegmund, Stefan Sobernig, Sven Apel |
Attributed variability models: outside the comfort zone Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Hennie Huijgens, Robert Lamping, Dick Stevens, Hartger Rothengatter, Georgios Gousios, Daniele Romano |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A feasibility study of using automated program repair for introductory programming assignments Jooyong Yi, Umair Z. Ahmed, Amey Karkare, Shin Hwei Tan, Abhik Roychoudhury |
A feasibility study of using automated program repair for introductory programming assignments Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Synergistic debug-repair of heap manipulations Sahil Verma, Subhajit Roy |
Synergistic debug-repair of heap manipulations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Continuous variable-specific resolutions of feature interactions Mohammad Hadi Zibaeenejad, Chi Zhang, Joanne M. Atlee |
Continuous variable-specific resolutions of feature interactions Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
What do software engineers care about? gaps between research and practice Vladimir Ivanov, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin |
What do software engineers care about? gaps between research and practice Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Modeling and verification of evolving cyber-physical spaces Christos Tsigkanos, Timo Kehrer, Carlo Ghezzi |
Modeling and verification of evolving cyber-physical spaces Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reproducing concurrency failures from crash stacks Francesco A. Bianchi, Mauro Pezzè, Valerio Terragni |
Reproducing concurrency failures from crash stacks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
JoanAudit: a tool for auditing common injection vulnerabilities Julian Thomé, Lwin Khin Shar, Domenico Bianculli, Lionel C. Briand |
JoanAudit: a tool for auditing common injection vulnerabilities Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Failure-directed program trimming Kostas Ferles, Valentin Wüstholz, Maria Christakis, Isil Dillig |
Failure-directed program trimming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Recommender system for model driven software development Stefan Kögel |
Recommender system for model driven software development Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A fast causal profiler for task parallel programs Adarsh Yoga, Santosh Nagarakatte |
A fast causal profiler for task parallel programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
LAMP: data provenance for graph based machine learning algorithms through derivative computation Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu, Xiangyu Zhang |
LAMP: data provenance for graph based machine learning algorithms through derivative computation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Suggesting meaningful variable names for decompiled code: a machine translation approach Alan Jaffe |
Suggesting meaningful variable names for decompiled code: a machine translation approach Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Software engineering research results in industrial practice: a tale of two projects (invited talk) Wolfgang Emmerich |
Software engineering research results in industrial practice: a tale of two projects (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
ARTINALI: dynamic invariant detection for cyber-physical system security Maryam Raiyat Aliabadi, Amita Ajith Kamath, Julien Gascon-Samson, Karthik Pattabiraman |
ARTINALI: dynamic invariant detection for cyber-physical system security Details |
Author Comments:
We have not provided scripts to reproduce the traces used for the invariants in the Github repository as these are specific to our embedded systems - we have provided the traces generated and automated scripts to generate the invariants from the traces. If you're interested in how to reproduce the traces, please contact us via email.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The power of "why" and "why not": enriching scenario exploration with provenance Tim Nelson, Natasha Danas, Daniel J. Dougherty, Shriram Krishnamurthi |
The power of "why" and "why not": enriching scenario exploration with provenance Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The rising tide lifts all boats: the advancement of science in cyber security (invited talk) Laurie Williams |
The rising tide lifts all boats: the advancement of science in cyber security (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Automatic generation of inter-component communication exploits for Android applications Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek |
Automatic generation of inter-component communication exploits for Android applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Record and replay for Android: are we there yet in industrial cases? Wing Lam, Zhengkai Wu, Dengfeng Li, Wenyu Wang, Haibing Zheng, Hui Luo, Peng Yan, Yuetang Deng, Tao Xie |
Record and replay for Android: are we there yet in industrial cases? Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
System performance optimization via design and configuration space exploration Chong Tang |
System performance optimization via design and configuration space exploration Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
User- and analysis-driven context aware software development in mobile computing Mai Abusair |
User- and analysis-driven context aware software development in mobile computing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour Germán Regis, César Cornejo, Simón Gutiérrez Brida, Mariano Politano, Fernando Raverta, Pablo Ponzio, Nazareno Aguirre, Juan Pablo Galeotti, Marcelo F. Frias |
DynAlloy analyzer: a tool for the specification and analysis of alloy models with dynamic behaviour Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Bayesian specification learning for finding API usage errors Vijayaraghavan Murali, Swarat Chaudhuri, Chris Jermaine |
Bayesian specification learning for finding API usage errors Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Are deep neural networks the best choice for modeling source code? Vincent J. Hellendoorn, Premkumar T. Devanbu |
Are deep neural networks the best choice for modeling source code? Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Verifying the forecast: how climate models are developed and tested (invited talk) Steve Easterbrook |
Verifying the forecast: how climate models are developed and tested (invited talk) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Guided, stochastic model-based GUI testing of Android apps Ting Su, Guozhu Meng, Yuting Chen, Ke Wu, Weiming Yang, Yao Yao, Geguang Pu, Yang Liu, Zhendong Su |
Guided, stochastic model-based GUI testing of Android apps Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Thread-modular static analysis for relaxed memory models Markus Kusano, Chao Wang |
Thread-modular static analysis for relaxed memory models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lu Wang |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
DecisionDroid: a supervised learning-based system to identify cloned Android applications Ayush Kohli |
DecisionDroid: a supervised learning-based system to identify cloned Android applications Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Improving performance of automatic program repair using learned heuristics Liam Schramm |
Improving performance of automatic program repair using learned heuristics Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
S3: syntax- and semantic-guided repair synthesis via programming by examples Xuan-Bach D. Le, Duc-Hiep Chu, David Lo, Claire Le Goues, Willem Visser |
S3: syntax- and semantic-guided repair synthesis via programming by examples Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Constraint normalization and parameterized caching for quantitative program analysis Tegan Brennan, Nestan Tsiskaridze, Nicolás Rosner, Abdulbaki Aydin, Tevfik Bultan |
Constraint normalization and parameterized caching for quantitative program analysis Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
QEMU-based framework for non-intrusive virtual machine instrumentation and introspection Pavel Dovgalyuk, Natalia Fursova, Ivan Vasiliev, Vladimir Makarov |
QEMU-based framework for non-intrusive virtual machine instrumentation and introspection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects Diego Cedrim, Alessandro Garcia, Melina Mongiovi, Rohit Gheyi, Leonardo da Silva Sousa, Rafael Maiani de Mello, Baldoino Fonseca, Márcio Ribeiro, Alexander Chávez |
Understanding the impact of refactoring on smells: a longitudinal study of 23 software projects Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Andreas Schuler |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Loopster: static loop termination analysis Xiaofei Xie, Bihuan Chen, Liang Zou, Shang-Wei Lin, Yang Liu, Xiaohong Li |
Loopster: static loop termination analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PATDroid: permission-aware GUI testing of Android Alireza Sadeghi, Reyhaneh Jabbarvand, Sam Malek |
PATDroid: permission-aware GUI testing of Android Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adriaan Labuschagne, Laura Inozemtseva, Reid Holmes |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting missing information in bug descriptions Oscar Chaparro, Jing Lu, Fiorella Zampetti, Laura Moreno, Massimiliano Di Penta, Andrian Marcus, Gabriele Bavota, Vincent Ng |
Detecting missing information in bug descriptions Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Wenqi Bu, Minhui Xue, Lihua Xu, Yajin Zhou, Zhushou Tang, Tao Xie |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Discovering relational specifications Calvin Smith, Gabriel Ferns, Aws Albarghouthi |
Discovering relational specifications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VART: a tool for the automatic detection of regression faults Fabrizio Pastore, Leonardo Mariani |
VART: a tool for the automatic detection of regression faults Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Csaba Debreceni, Gábor Bergmann, Márton Búr, István Ráth, Dániel Varró |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
NoFAQ: synthesizing command repairs from examples Loris D'Antoni, Rishabh Singh, Michael Vaughn |
NoFAQ: synthesizing command repairs from examples Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Counterexample-guided approach to finding numerical invariants ThanhVu Nguyen, Timos Antonopoulos, Andrew Ruef, Michael Hicks |
Counterexample-guided approach to finding numerical invariants Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Probabilistic model checking of perturbed MDPs with applications to cloud computing Yamilet R. Serrano Llerena, Guoxin Su, David S. Rosenblum |
Probabilistic model checking of perturbed MDPs with applications to cloud computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
µDroid: an energy-aware mutation testing framework for Android Reyhaneh Jabbarvand, Sam Malek |
µDroid: an energy-aware mutation testing framework for Android Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Adaptively generating high quality fixes for atomicity violations Yan Cai, Lingwei Cao, Jing Zhao |
Adaptively generating high quality fixes for atomicity violations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The care and feeding of wild-caught mutants David Bingham Brown, Michael Vaughn, Ben Liblit, Thomas W. Reps |
The care and feeding of wild-caught mutants Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
More accurate recommendations for method-level changes Georg Dotzler, Marius Kamp, Patrick Kreutzer, Michael Philippsen |
More accurate recommendations for method-level changes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
XSearch: a domain-specific cross-language relevant question retrieval tool Bowen Xu, Zhenchang Xing, Xin Xia, David Lo, Xuan-Bach D. Le |
XSearch: a domain-specific cross-language relevant question retrieval tool Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
On the similarity of software development documentation Mathias Ellmann |
On the similarity of software development documentation Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Trade-offs in continuous integration: assurance, security, and flexibility Michael Hilton, Nicholas Nelson, Timothy Tunnell, Darko Marinov, Danny Dig |
Trade-offs in continuous integration: assurance, security, and flexibility Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automating traceability link recovery through classification Chris Mills |
Automating traceability link recovery through classification Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
FOSS version differentiation as a benchmark for static analysis security testing tools Ivan Pashchenko |
FOSS version differentiation as a benchmark for static analysis security testing tools Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Publication does not represent original research
Verification:
Author has
verified
information
|
Cimplifier: automatically debloating containers Vaibhav Rastogi, Drew Davidson, Lorenzo De Carli, Somesh Jha, Patrick D. McDaniel |
Cimplifier: automatically debloating containers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies Reza Matinnejad, Shiva Nejati, Lionel C. Briand |
Automated testing of hybrid Simulink/Stateflow controllers: industrial case studies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Static analysis for optimizing big data queries Diego Garbervetsky, Zvonimir Pavlinovic, Michael Barnett, Madanlal Musuvathi, Todd Mytkowicz, Edgardo Zoppi |
Static analysis for optimizing big data queries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Generalized observational slicing for tree-represented modelling languages Nicolas E. Gold, David W. Binkley, Mark Harman, Syed S. Islam, Jens Krinke, Shin Yoo |
Generalized observational slicing for tree-represented modelling languages Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Understanding the impact of support for iteration on code search Lee Martie, André van der Hoek, Thomas Kwak |
Understanding the impact of support for iteration on code search Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Guidelines for adopting frontend architectures and patterns in microservices-based systems Holger Harms, Collin Rogowski, Luigi Lo Iacono |
Guidelines for adopting frontend architectures and patterns in microservices-based systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A symbolic justice violations transition system for unrealizable GR(1) specifications Aviv Kuvent, Shahar Maoz, Jan Oliver Ringert |
A symbolic justice violations transition system for unrealizable GR(1) specifications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improving understanding of dynamically typed software developed by agile practitioners Jair García, Kelly Garcés |
Improving understanding of dynamically typed software developed by agile practitioners Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DESCRY: reproducing system-level concurrency failures Tingting Yu, Tarannum S. Zaman, Chao Wang |
DESCRY: reproducing system-level concurrency failures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using bad learners to find good configurations Vivek Nair, Tim Menzies, Norbert Siegmund, Sven Apel |
Using bad learners to find good configurations Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Where is the bug and how is it fixed? an experiment with practitioners Marcel Böhme, Ezekiel O. Soremekun, Sudipta Chattopadhyay, Emamurho Ugherughe, Andreas Zeller |
Where is the bug and how is it fixed? an experiment with practitioners Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
291 (in)correct patches from real software professionals for 27 real bugs in C for the qualitative evaluation of automated debugging and repair techniques
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
LaChouTi: kernel vulnerability responding framework for the fragmented Android devices JingZheng Wu, Mutian Yang |
LaChouTi: kernel vulnerability responding framework for the fragmented Android devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Model-based privacy and security analysis with CARiSMA Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, Jan Jürjens |
Model-based privacy and security analysis with CARiSMA Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
ARCC: assistant for repetitive code comprehension Wilberto Z. Nunez, Victor J. Marin, Carlos R. Rivero |
ARCC: assistant for repetitive code comprehension Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Automatic inference of code transforms for patch generation Fan Long, Peter Amidon, Martin Rinard |
Automatic inference of code transforms for patch generation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Detecting wearable app permission mismatches: a case study on Android wear Suhaib Mujahid |
Detecting wearable app permission mismatches: a case study on Android wear Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Stelios Sidiroglou-Douskos, Eric Lahtinen, Anthony Eden, Fan Long, Martin Rinard |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies Marcos César de Oliveira |
DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Revisiting unsupervised learning for defect prediction Wei Fu, Tim Menzies |
Revisiting unsupervised learning for defect prediction Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Natural language querying in SAP-ERP platform Diptikalyan Saha, Neelamadhav Gantayat, Senthil Mani, Barry Mitchell |
Natural language querying in SAP-ERP platform Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Applying deep learning based automatic bug triager to industrial projects Sun-Ro Lee, Min-Jae Heo, Chan-Gun Lee, Milhan Kim, Gaeul Jeong |
Applying deep learning based automatic bug triager to industrial projects Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
A compiler and verifier for page access oblivious computation Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia |
A compiler and verifier for page access oblivious computation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RGSE: a regular property guided symbolic executor for Java Hengbiao Yu, Zhenbang Chen, Yufeng Zhang, Ji Wang, Wei Dong |
RGSE: a regular property guided symbolic executor for Java Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
On evidence preservation requirements for forensic-ready systems Dalal Alrajeh, Liliana Pasquale, Bashar Nuseibeh |
On evidence preservation requirements for forensic-ready systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Craig vs. Newton in software model checking Daniel Dietsch, Matthias Heizmann, Betim Musa, Alexander Nutz, Andreas Podelski |
Craig vs. Newton in software model checking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
OASIS: prioritizing static analysis warnings for Android apps based on app user reviews Lili Wei, Yepang Liu, Shing-Chi Cheung |
OASIS: prioritizing static analysis warnings for Android apps based on app user reviews Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Better test cases for better automated program repair Jinqiu Yang, Alexey Zhikhartsev, Yuefei Liu, Lin Tan |
Better test cases for better automated program repair Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Summarizing software engineering communication artifacts from different sources Verena Käfer |
Summarizing software engineering communication artifacts from different sources Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Publication does not represent original research
Verification:
Author has
verified
information
|
Cherry-picking of code commits in long-running, multi-release software Panuchart Bunyakiati, Chadarat Phipathananunth |
Cherry-picking of code commits in long-running, multi-release software Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A tool for automated reasoning about traces based on configurable formal semantics Ferhat Erata, Arda Goknil, Bedir Tekinerdogan, Geylani Kardas |
A tool for automated reasoning about traces based on configurable formal semantics Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Reference architectures and Scrum: friends or foes? Matthias Galster, Samuil Angelov, Silverio Martínez-Fernández, Dan Tofan |
Reference architectures and Scrum: friends or foes? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the scalability of Linux kernel maintainers' work Minghui Zhou, Qingying Chen, Audris Mockus, Fengguang Wu |
On the scalability of Linux kernel maintainers' work Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Measuring neural efficiency of program comprehension Janet Siegmund, Norman Peitek, Chris Parnin, Sven Apel, Johannes Hofmeister, Christian Kästner, Andrew Begel, Anja Bethmann, André Brechmann |
Measuring neural efficiency of program comprehension Details |
Author Comments:
Due to the GDPR, we cannot put the fMRI data of the participants on the Web site. They can be provided upon request.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Model-driven software engineering in practice: privacy-enhanced filtering of network traffic Roel van Dijk, Christophe Creeten, Jeroen van der Ham, Jeroen van den Bos |
Model-driven software engineering in practice: privacy-enhanced filtering of network traffic Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|