Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
SketchFix: a tool for automated program repair approach using lazy candidate generation Jinru Hua, Mengshi Zhang, Kaiyuan Wang, Sarfraz Khurshid |
SketchFix: a tool for automated program repair approach using lazy candidate generation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated scenario-based integration testing of distributed systems Bruno Lima |
Automated scenario-based integration testing of distributed systems Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Detection of energy inefficiencies in Android wear watch faces Hailong Zhang, Haowei Wu, Atanas Rountev |
Detection of energy inefficiencies in Android wear watch faces Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MemFix: static analysis-based repair of memory deallocation errors for C Junhee Lee, Seongjoon Hong, Hakjoo Oh |
MemFix: static analysis-based repair of memory deallocation errors for C Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Are mobile banking apps secure? what can be improved? Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, Lihua Xu |
Are mobile banking apps secure? what can be improved? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Salient-class location: help developers understand code change in code review Yuan Huang, Nan Jia, Xiangping Chen, Kai Hong, Zibin Zheng |
Salient-class location: help developers understand code change in code review Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FACTS: automated black-box testing of FinTech systems Qingshun Wang, Lintao Gu, Minhui Xue, Lihua Xu, Wenyu Niu, Liang Dou, Liang He, Tao Xie |
FACTS: automated black-box testing of FinTech systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugs David A. Tomassi |
Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugs Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Optimizing test prioritization via test distribution analysis Junjie Chen, Yiling Lou, Lingming Zhang, Jianyi Zhou, Xiaoleng Wang, Dan Hao, Lu Zhang |
Optimizing test prioritization via test distribution analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Marat Valiev, Bogdan Vasilescu, James D. Herbsleb |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards quantifying the development value of code contributions Jinglei Ren, Hezheng Yin, Qingda Hu, Armando Fox, Wojciech Koszek |
Towards quantifying the development value of code contributions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Using finite-state models for log differencing Hen Amar, Lingfeng Bao, Nimrod Busany, David Lo, Shahar Maoz |
Using finite-state models for log differencing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
FOT: a versatile, configurable, extensible fuzzing framework Hongxu Chen, Yuekang Li, Bihuan Chen, Yinxing Xue, Yang Liu |
FOT: a versatile, configurable, extensible fuzzing framework Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical AJAX race detection for JavaScript web applications Christoffer Quist Adamsen, Anders Møller, Saba Alimadadi, Frank Tip |
Practical AJAX race detection for JavaScript web applications Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DeepSim: deep learning code functional similarity Gang Zhao, Jeff Huang |
DeepSim: deep learning code functional similarity Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Predicting Node failure in cloud service systems Qingwei Lin, Ken Hsieh, Yingnong Dang, Hongyu Zhang, Kaixin Sui, Yong Xu, Jian-Guang Lou, Chenggang Li, Youjiang Wu, Randolph Yao, Murali Chintalapati, Dongmei Zhang |
Predicting Node failure in cloud service systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalability-first pointer analysis with self-tuning context-sensitivity Yue Li, Tian Tan, Anders Møller, Yannis Smaragdakis |
Scalability-first pointer analysis with self-tuning context-sensitivity Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Adversarial symbolic execution for detecting concurrency-related cache timing leaks Shengjian Guo, Meng Wu, Chao Wang |
Adversarial symbolic execution for detecting concurrency-related cache timing leaks Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Oreo: detection of clones in the twilight zone Vaibhav Saini, Farima Farmahinifarahani, Yadong Lu, Pierre Baldi, Cristina V. Lopes |
Oreo: detection of clones in the twilight zone Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Regina Hebig, Christoph Seidl, Thorsten Berger, John Kook Pedersen, Andrzej Wasowski |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Semantic inference from natural language privacy policies and Android code Mitra Bokaei Hosseini |
Semantic inference from natural language privacy policies and Android code Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
EClone: detect semantic clones in Ethereum via symbolic transaction sketch Han Liu, Zhiqiang Yang, Chao Liu, Yu Jiang, Wenqi Zhao, Jiaguang Sun |
EClone: detect semantic clones in Ethereum via symbolic transaction sketch Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Augmenting stack overflow with API usage patterns mined from GitHub Anastasia Reinhardt, Tianyi Zhang, Mihir Mathur, Miryung Kim |
Augmenting stack overflow with API usage patterns mined from GitHub Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
An empirical study on crash recovery bugs in large-scale distributed systems Yu Gao, Wensheng Dou, Feng Qin, Chushu Gao, Dong Wang, Jun Wei, Ruirui Huang, Li Zhou, Yongming Wu |
An empirical study on crash recovery bugs in large-scale distributed systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reshaping distributed agile and adaptive development environment Francesco Nocera |
Reshaping distributed agile and adaptive development environment Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
A formal verification tool for Ethereum VM bytecode Daejun Park, Yi Zhang, Manasvi Saxena, Philip Daian, Grigore Rosu |
A formal verification tool for Ethereum VM bytecode Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Efficient static checking of library updates Darius Foo, Hendy Chua, Jason Yeo, Ming Yi Ang, Asankhaya Sharma |
Efficient static checking of library updates Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Intelligent bug fixing with software bug knowledge graph Cheng Zhou |
Intelligent bug fixing with software bug knowledge graph Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Bug synthesis: challenging bug-finding tools with deep faults Subhajit Roy, Awanish Pandey, Brendan Dolan-Gavitt, Yu Hu |
Bug synthesis: challenging bug-finding tools with deep faults Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ten years of hunting for similar code for fun and profit (keynote) Stéphane Glondu, Lingxiao Jiang, Zhendong Su |
Ten years of hunting for similar code for fun and profit (keynote) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Automated support for mobile application testing and maintenance Mattia Fazzini |
Automated support for mobile application testing and maintenance Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Pooyan Jamshidi, Miguel Velez, Christian Kästner, Norbert Siegmund |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Does ACM's code of ethics change ethical decision making in software development? Andrew McNamara, Justin Smith, Emerson R. Murphy-Hill |
Does ACM's code of ethics change ethical decision making in software development? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards learning-augmented languages Xinyuan Sun |
Towards learning-augmented languages Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Testing multithreaded programs via thread speed control Dongjie Chen, Yanyan Jiang, Chang Xu, Xiaoxing Ma, Jian Lu |
Testing multithreaded programs via thread speed control Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Vista: web test repair using computer vision Andrea Stocco, Rahulkrishna Yandrapally, Ali Mesbah |
Vista: web test repair using computer vision Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Chu-Pan Wong, Jens Meinicke, Christian Kästner |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How well are regular expressions tested in the wild? Peipei Wang, Kathryn T. Stolee |
How well are regular expressions tested in the wild? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Towards data-driven vulnerability prediction for requirements Sayem Mohammad Imtiaz, Tanmay Bhowmik |
Towards data-driven vulnerability prediction for requirements Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Louis-Philippe Querel, Peter C. Rigby |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
AppFlow: using machine learning to synthesize robust, reusable UI tests Gang Hu, Linjie Zhu, Junfeng Yang |
AppFlow: using machine learning to synthesize robust, reusable UI tests Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
How Dance(Sport) can help to produce better software Irina Erofeeva |
How Dance(Sport) can help to produce better software Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
On the adoption of neural networks in modeling software reliability Kamill Gusmanov |
On the adoption of neural networks in modeling software reliability Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Singularity: pattern fuzzing for worst case complexity Jiayi Wei, Jia Chen, Yu Feng, Kostas Ferles, Isil Dillig |
Singularity: pattern fuzzing for worst case complexity Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
NAR-miner: discovering negative association rules from code for bug detection Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai |
NAR-miner: discovering negative association rules from code for bug detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Moving towards objective measures of program comprehension Sarah Fakhoury |
Moving towards objective measures of program comprehension Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Putback-based bidirectional model transformations Xiao He, Zhenjiang Hu |
Putback-based bidirectional model transformations Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes Masatomo Hashimoto, Akira Mori, Tomonori Izumida |
Automated patch extraction via syntax- and semantics-aware Delta debugging on source code changes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Vidroha Debroy, Senecca Miller, Lance Brimble |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Winning the app production rally Ehsan Noei, Daniel Alencar da Costa, Ying Zou |
Winning the app production rally Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
One size does not fit all: an empirical study of containerized continuous deployment workflows Yang Zhang, Bogdan Vasilescu, Huaimin Wang, Vladimir Filkov |
One size does not fit all: an empirical study of containerized continuous deployment workflows Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Code vectors: understanding programs through embedded abstracted symbolic traces Jordan Henkel, Shuvendu K. Lahiri, Ben Liblit, Thomas W. Reps |
Code vectors: understanding programs through embedded abstracted symbolic traces Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Practices and tools for better software testing Davide Spadini |
Practices and tools for better software testing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Modeling and testing a family of surgical robots: an experience report Niloofar Mansoor, Jonathan A. Saddler, Bruno Silva, Hamid Bagheri, Myra B. Cohen, Shane Farritor |
Modeling and testing a family of surgical robots: an experience report Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lisa Nguyen Quang Do, Eric Bodden |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Thanh Van Nguyen, Ngoc M. Tran, Hung Phan, Trong Duc Nguyen, Linh H. Truong, Anh Tuan Nguyen, Hoan Anh Nguyen, Tien N. Nguyen |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Software engineering collaboratories (SEClabs) and collaboratories as a service (CaaS) Elena Sherman, Robert Dyer |
Software engineering collaboratories (SEClabs) and collaboratories as a service (CaaS) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FraudDroid: automated ad fraud detection for Android apps Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein |
FraudDroid: automated ad fraud detection for Android apps Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Andrea Stocco, Rahulkrishna Yandrapally, Ali Mesbah |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
INFAR: insight extraction from app reviews Cuiyun Gao, Jichuan Zeng, David Lo, Chin-Yew Lin, Michael R. Lyu, Irwin King |
INFAR: insight extraction from app reviews Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Testing probabilistic programming systems Saikat Dutta, Owolabi Legunsen, Zixin Huang, Sasa Misailovic |
Testing probabilistic programming systems Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Diversity and decorum in open source communities Neill Robson |
Diversity and decorum in open source communities Details |
|
Author Comments:
All source code and artifacts related to this paper have been saved in a private repository on GitHub. Any individuals desiring to view such artifacts can reach out to the individuals listed as contacts in the paper or on this webpage.
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Author has
verified
information
|
Vincent J. Hellendoorn, Premkumar T. Devanbu, Mohammad Amin Alipour |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What makes a code change easier to review: an empirical investigation on code change reviewability Achyudh Ram, Anand Ashok Sawant, Marco Castelluccio, Alberto Bacchelli |
What makes a code change easier to review: an empirical investigation on code change reviewability Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Be careful of when: an empirical study on time-related misuse of issue tracking data Feifei Tu, Jiaxin Zhu, Qimu Zheng, Minghui Zhou |
Be careful of when: an empirical study on time-related misuse of issue tracking data Details |
Author Comments:
Happy reproducing the work!
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Ferhat Erata, Arda Goknil, Ivan Kurtev, Bedir Tekinerdogan |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Do the dependency conflicts in my project matter? Ying Wang, Ming Wen, Zhenwei Liu, Rongxin Wu, Rui Wang, Bo Yang, Hai Yu, Zhiliang Zhu, Shing-Chi Cheung |
Do the dependency conflicts in my project matter? Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Do Android taint analysis tools keep their promises? Felix Pauck, Eric Bodden, Heike Wehrheim |
Do Android taint analysis tools keep their promises? Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Parameterized model counting for string and numeric constraints Abdulbaki Aydin, William Eiers, Lucas Bang, Tegan Brennan, Miroslav Gavrilov, Tevfik Bultan, Fang Yu |
Parameterized model counting for string and numeric constraints Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Applications of psychological science for actionable analytics Di Chen, Wei Fu, Rahul Krishna, Tim Menzies |
Applications of psychological science for actionable analytics Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Testing and validating end user programmed calculated fields Víctor A. Braberman, Diego Garbervetsky, Javier Godoy, Sebastián Uchitel, Guido de Caso, Ignacio Perez, Santiago Perez |
Testing and validating end user programmed calculated fields Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CloudRaid: hunting concurrency bugs in the cloud via log-mining Jie Lu, Feng Li, Lian Li, Xiaobing Feng |
CloudRaid: hunting concurrency bugs in the cloud via log-mining Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Design and validation of precooked developer dashboards Vladimir Ivanov, Vladislav Pischulin, Alan Rogers, Giancarlo Succi, Jooyong Yi, Vasilii Zorin |
Design and validation of precooked developer dashboards Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MODE: automated neural network model debugging via state differential analysis and input selection Shiqing Ma, Yingqi Liu, Wen-Chuan Lee, Xiangyu Zhang, Ananth Grama |
MODE: automated neural network model debugging via state differential analysis and input selection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Md Tajmilur Rahman, Peter C. Rigby |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VT-revolution: interactive programming tutorials made possible Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li |
VT-revolution: interactive programming tutorials made possible Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DLFuzz: differential fuzzing testing of deep learning systems Jianmin Guo, Yu Jiang, Yue Zhao, Quan Chen, Jiaguang Sun |
DLFuzz: differential fuzzing testing of deep learning systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Junwen Yang, Cong Yan, Pranav Subramaniam, Shan Lu, Alvin Cheung |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Concurrency verification with maximal path causality Qiuping Yi, Jeff Huang |
Concurrency verification with maximal path causality Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Phys: probabilistic physical unit assignment and inconsistency detection Sayali Kate, John-Paul Ore, Xiangyu Zhang, Sebastian G. Elbaum, Zhaogui Xu |
Phys: probabilistic physical unit assignment and inconsistency detection Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Large-scale study of substitutability in the presence of effects Jackson Maddox, Yuheng Long, Hridesh Rajan |
Large-scale study of substitutability in the presence of effects Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Symbolic execution with existential second-order constraints Sergey Mechtaev, Alberto Griggio, Alessandro Cimatti, Abhik Roychoudhury |
Symbolic execution with existential second-order constraints Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Identifying impactful service system problems via log analysis Shilin He, Qingwei Lin, Jian-Guang Lou, Hongyu Zhang, Michael R. Lyu, Dongmei Zhang |
Identifying impactful service system problems via log analysis Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Themis: automatically testing software for discrimination Rico Angell, Brittany Johnson, Yuriy Brun, Alexandra Meliou |
Themis: automatically testing software for discrimination Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PyDriller: Python framework for mining software repositories Davide Spadini, Maurício Finavaro Aniche, Alberto Bacchelli |
PyDriller: Python framework for mining software repositories Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Towards counterexample-guided k-induction for fast bug detection Mikhail Y. R. Gadelha, Felipe R. Monteiro, Lucas C. Cordeiro, Denis A. Nicole |
Towards counterexample-guided k-induction for fast bug detection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Mining error-handling specifications for systems software Daniel DeFreez |
Mining error-handling specifications for systems software Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Path-based function embedding and its application to error-handling specification mining Daniel DeFreez, Aditya V. Thakur, Cindy Rubio-González |
Path-based function embedding and its application to error-handling specification mining Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
DSM: a specification mining tool using recurrent neural network based language model Tien-Duy B. Le, Lingfeng Bao, David Lo |
DSM: a specification mining tool using recurrent neural network based language model Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Towards a theory of software development expertise Sebastian Baltes, Stephan Diehl |
Towards a theory of software development expertise Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Dara: hybrid model checking of distributed systems Vaastav Anand |
Dara: hybrid model checking of distributed systems Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
The case for experiment-oriented computing Paulo Salem |
The case for experiment-oriented computing Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
How are spreadsheet templates used in practice: a case study on Enron Liang Xu, Wensheng Dou, Jiaxin Zhu, Chushu Gao, Jun Wei, Tao Huang |
How are spreadsheet templates used in practice: a case study on Enron Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Automated refactoring of nested-IF formulae in spreadsheets Jie Zhang, Shi Han, Dan Hao, Lu Zhang, Dongmei Zhang |
Automated refactoring of nested-IF formulae in spreadsheets Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Data race detection on compressed traces Dileep Kini, Umang Mathur, Mahesh Viswanathan |
Data race detection on compressed traces Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Erik Meijer |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Software development challenges with air-gap isolation Sunny Wong, Anne Woepse |
Software development challenges with air-gap isolation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Feedback-directed differential testing of interactive debuggers Daniel Lehmann, Michael Pradel |
Feedback-directed differential testing of interactive debuggers Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Quality assurance automation in autonomous systems Afsoon Afzal |
Quality assurance automation in autonomous systems Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Performance comprehension at WiredTiger Alexandra Fedorova, Craig Mustard, Ivan Beschastnikh, Julia Rubin, Augustine Wong, Svetozar Miucin, Louis Ye |
Performance comprehension at WiredTiger Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stochastic energy optimization for mobile GPS applications Anthony Canino, Yu David Liu, Hidehiko Masuhara |
Stochastic energy optimization for mobile GPS applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Darwinian data structure selection Michail Basios, Lingbo Li, Fan Wu, Leslie Kanthan, Earl T. Barr |
Darwinian data structure selection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Detecting speech act types in developer question/answer conversations during bug repair Andrew Wood, Paige Rodeghero, Ameer Armaly, Collin McMillan |
Detecting speech act types in developer question/answer conversations during bug repair Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Caius Brindescu |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Mijung Kim, Shing-Chi Cheung, Sunghun Kim |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PAFL: extend fuzzing optimizations of single mode to industrial parallel mode Jie Liang, Yu Jiang, Yuanliang Chen, Mingzhe Wang, Chijin Zhou, Jiaguang Sun |
PAFL: extend fuzzing optimizations of single mode to industrial parallel mode Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
RefiNym: using names to refine types Santanu Kumar Dash, Miltiadis Allamanis, Earl T. Barr |
RefiNym: using names to refine types Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Vincent J. Hellendoorn, Christian Bird, Earl T. Barr, Miltiadis Allamanis |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Verifying the long-run behavior of probabilistic system models in the presence of uncertainty Yamilet R. Serrano Llerena, Marcel Böhme, Marc Brünink, Guoxin Su, David S. Rosenblum |
Verifying the long-run behavior of probabilistic system models in the presence of uncertainty Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Modify, enhance, select: co-evolution of combinatorial models and test plans Rachel Tzoref-Brill, Shahar Maoz |
Modify, enhance, select: co-evolution of combinatorial models and test plans Details |
Author Comments:
As part of this work we contributed to the combinatorial testing community a large repository of anonymized combinatorial models and their versions, developed by industrial practitioners. This is a first of a kind repository. We hope this repository is of use to researchers in the field of combinatorial testing for their future work.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Operationalizing human values in software: a research roadmap Davoud Mougouei, Harsha Perera, Waqar Hussain, Rifat Ara Shams, Jon Whittle |
Operationalizing human values in software: a research roadmap Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Feature-interaction aware configuration prioritization Son Nguyen |
Feature-interaction aware configuration prioritization Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
How should compilers explain problems to developers? Titus Barik, Denae Ford, Emerson R. Murphy-Hill, Chris Parnin |
How should compilers explain problems to developers? Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improving IR-based bug localization with context-aware query reformulation Mohammad Masudur Rahman, Chanchal K. Roy |
Improving IR-based bug localization with context-aware query reformulation Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
James C. Davis, Christy A. Coghlan, Francisco Servant, Dongyoon Lee |
Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
Type migration in large-scale code bases Ameya Ketkar |
Type migration in large-scale code bases Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
BigSift: automated debugging of big data analytics in data-intensive scalable computing Muhammad Ali Gulzar, Siman Wang, Miryung Kim |
BigSift: automated debugging of big data analytics in data-intensive scalable computing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
ASketch: a sketching framework for Alloy Kaiyuan Wang, Allison Sullivan, Darko Marinov, Sarfraz Khurshid |
ASketch: a sketching framework for Alloy Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation Jian Gao, Xin Yang, Ying Fu, Yu Jiang, Heyuan Shi, Jiaguang Sun |
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A novel automated approach for software effort estimation based on data augmentation Liyan Song, Leandro L. Minku, Xin Yao |
A novel automated approach for software effort estimation based on data augmentation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Neural-augmented static analysis of Android communication Jinman Zhao, Aws Albarghouthi, Vaibhav Rastogi, Somesh Jha, Damien Octeau |
Neural-augmented static analysis of Android communication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Syntax-guided synthesis of Datalog programs Xujie Si, Woosuk Lee, Richard Zhang, Aws Albarghouthi, Paraschos Koutris, Mayur Naik |
Syntax-guided synthesis of Datalog programs Details |
Artifacts for some papers are reviewed by an artifact evaluation, reproducibility,
or similarly named committee. This is one such paper that passed review.
Artifact evaluation badge awarded
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Yuriy Brun, Alexandra Meliou |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Regression test selection for TizenRT Ahmet Çelik, Young-Chul Lee, Milos Gligoric |
Regression test selection for TizenRT Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|