default search action
38th ICSME 2022: Limassol, Cyprus
- IEEE International Conference on Software Maintenance and Evolution, ICSME 2022, Limassol, Cyprus, October 3-7, 2022. IEEE 2022, ISBN 978-1-6654-7956-1
- Issam Sedki, Abdelwahab Hamou-Lhadj, Otmane Aït Mohamed, Mohammed A. Shehab:
An Effective Approach for Parsing Large Log Files. 1-12 - Moses Openja, Amin Nikanjam, Ahmed Haj Yahmed, Foutse Khomh, Zhen Ming Jack Jiang:
An Empirical Study of Challenges in Converting Deep Learning Models. 13-23 - Negar Hashemi, Amjed Tahir, Shawn Rasheed:
An Empirical Study of Flaky Tests in JavaScript. 24-34 - Tarek Makkouk, Dong Jae Kim, Tse-Hsun Peter Chen:
An Empirical Study on Performance Bugs in Deep Learning Frameworks. 35-46 - Fiorella Zampetti, François Belias, Cyrine Zid, Giuliano Antoniol, Massimiliano Di Penta:
An Empirical Study on the Fault-Inducing Effect of Functional Constructs in Python. 47-58 - Forough Majidi, Moses Openja, Foutse Khomh, Heng Li:
An Empirical Study on the Usage of Automated Machine Learning Tools. 59-70 - Ting Zhang, Ivana Clairine Irsan, Ferdian Thung, DongGyun Han, David Lo, Lingxiao Jiang:
Automatic Pull Request Title Generation. 71-81 - Chi Yu, Guang Yang, Xiang Chen, Ke Liu, Yanlin Zhou:
BashExplainer: Retrieval-Augmented Bash Code Comment Generation based on Fine-tuned CodeBERT. 82-93 - Zejian Shi, Yun Xiong, Xiaolong Zhang, Yao Zhang, Shanshan Li, Yangyong Zhu:
Cross-Modal Contrastive Learning for Code Search. 94-105 - Wendell Mendes, Oton Pinheiro, Emanuele Santos, Lincoln S. Rocha, Windson Viana:
Dazed and Confused: Studying the Prevalence of Atoms of Confusion in Long-Lived Java Libraries. 106-116 - Wai Kin Wong, Huaijin Wang, Pingchuan Ma, Shuai Wang, Mingyue Jiang, Tsong Yueh Chen, Qiyi Tang, Sen Nie, Shi Wu:
Deceiving Deep Neural Networks-Based Binary Code Matching with Adversarial Programs. 117-128 - Mohammed Alhamed, Tim Storer:
Evaluation of Context-Aware Language Models and Experts for Effort Estimation of Software Maintenance Issues. 129-138 - Farshad Kazemi, Maxime Lamothe, Shane McIntosh:
Exploring the Notion of Risk in Code Reviewer Recommendation. 139-150 - Thanh-Dat Nguyen, Thanh Le-Cong, Duc-Minh Luong, Van-Hai Duong, Xuan-Bach Dinh Le, David Lo, Quyet-Thang Huynh:
FFL: Fine-grained Fault Localization for Student Programs via Syntactic and Semantic Reasoning. 151-162 - Mitchell Olsthoorn, Arie van Deursen, Annibale Panichella:
Guiding Automated Test Case Generation for Transaction-Reverting Statements in Smart Contracts. 163-174 - Jiamou Sun, Zhenchang Xing, Xiwei Xu, Liming Zhu, Qinghua Lu:
Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching. 175-186 - Lingyu Zhang, Huiyan Wang, Chang Xu, Ping Yu:
INFuse: Towards Efficient Context Consistency by Incremental-Concurrent Check Fusion. 187-198 - Zhuo Zhang, Yan Lei, Xiaoguang Mao, Meng Yan, Xin Xia:
Improving Fault Localization Using Model-domain Synthesized Failing Test Generation. 199-210 - Gunnar Kudrjavets, Jeff Thomas, Nachiappan Nagappan, Ayushi Rastogi:
Is Kernel Code Different From Non-Kernel Code? A Case Study of BSD Family Operating Systems. 211-222 - Xinrong Lin, Baojian Hua, Qiliang Fan:
On the Security of Python Virtual Machines: An Empirical Study. 223-234 - Alexandre Decan, Tom Mens, Pooya Rostami Mazrae, Mehdi Golzadeh:
On the Use of GitHub Actions in Software Development Repositories. 235-245 - Dylan Lee, Austin Z. Henley, Bill Hinshaw, Rahul Pandita:
OpenCBS: An Open-Source COBOL Defects Benchmark Suite. 246-256 - Yihao Qin, Shangwen Wang, Kui Liu, Bo Lin, Hongjun Wu, Li Li, Xiaoguang Mao, Tegawendé F. Bissyandé:
Peeler: Learning to Effectively Predict Flakiness without Running Tests. 257-268 - Alexander Schultheiß, Paul Maximilian Bittner, Thomas Thüm, Timo Kehrer:
Quantifying the Potential to Automate the Synchronization of Variants in Clone-and-Own. 269-280 - Di Cui, Siqi Wang, Yong Luo, Xingyu Li, Jie Dai, Lu Wang, Qingshan Li:
RMove: Recommending Move Method Refactoring Opportunities using Structural and Semantic Representations of Code. 281-292 - Benedikt Severin, Marc Hesenius, Florian Blum, Michael Hettmer, Volker Gruhn:
Smart Money Wasting: Analyzing Gas Cost Drivers of Ethereum Smart Contracts. 293-304 - Evelien Boerstra, John Ahn, Julia Rubin:
Stronger Together: On Combining Relationships in Architectural Recovery Approaches. 305-316 - Déaglán Connolly Bree, Mel Ó Cinnéide:
The Energy Cost of the Visitor Pattern. 317-328 - Qing Sun, Lili Xu, Yang Xiao, Feng Li, He Su, Yiming Liu, Hongyun Huang, Wei Huo:
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis. 329-339 - Diego Marcilio, Carlo A. Furia:
What Is Thrown? Lightweight Precise Automatic Extraction of Exception Preconditions in Java Methods. 340-351 - Sarra Habchi, Guillaume Haben, Jeongju Sohn, Adriano Franci, Mike Papadakis, Maxime Cordy, Yves Le Traon:
What Made This Test Flake? Pinpointing Classes Responsible for Test Flakiness. 352-363 - Hind Bangui, Bruno Rossi, Barbora Buhnova:
A Conceptual Antifragile Microservice Framework for Reshaping Critical Infrastructures. 364-368 - Shahla Shaan Ahmed, Shaowei Wang, Haoxiang Zhang, Tse-Hsun Chen, Yuan Tian:
A First Look at Information Highlighting in Stack Overflow Answers. 369-373 - Fuwei Tian, Christoph Treude:
Adding Context to Source Code Representations for Deep Learning. 374-378 - Tim Puhlfürß, Lloyd Montgomery, Walid Maalej:
An Exploratory Study of Documentation Strategies for Product Features in Popular GitHub Projects. 379-383 - A. Eashaan Rao, Sridhar Chimalakonda:
Apples, Oranges & Fruits - Understanding Similarity of Software Repositories Through The Lens of Dissimilar Artifacts. 384-388 - Pascal Marc André, Quentin Stiévenart, Mohammad Ghafari:
Developers Struggle with Authentication in Blazor WebAssembly. 389-393 - Rosalia Tufano, Emad Aghajani, Gabriele Bavota:
Don't Reinvent the Wheel: Towards Automatic Replacement of Custom Implementations with APIs. 394-398 - Yuan Jiang, Christian Kästner, Shurui Zhou:
Elevating Jupyter Notebook Maintenance Tooling by Identifying and Extracting Notebook Structures. 399-403 - Victoria Bogachenkova, Linh Nguyen, Felipe Ebert, Alexander Serebrenik, Fernando Castor:
Evaluating Atoms of Confusion in the Context of Code Reviews. 404-408 - Hrishikesh Karmarkar, Raveendra Kumar Medicherla, Ravindra Metta, Prasanth Yeduru:
FuzzNT : Checking for Program Non-termination. 409-413 - Jesse Nyyssölä, Mika Mäntylä, Martín Varela:
How to Configure Masked Event Anomaly Detection on Software Logs? 414-418 - Misoo Kim, Youngkyoung Kim, Jinseok Heo, Hohyeon Jeong, Sungoh Kim, Eunseok Lee:
Impact of Defect Instances for Successful Deep Learning-based Automatic Program Repair. 419-423 - Jeewoong Kim, Shin Hong:
Inferring Fine-grained Traceability Links between Javadoc Comment and JUnit Test Code. 424-428 - Naveen Ganesh Muralidharan, Vera Pantelic, Victor Bandur, Richard F. Paige:
Integrating Software Issue Tracking and Traceability Models. 429-433 - Eric Ribeiro, Ronan Nascimento, Igor Steinmacher, Laerte Xavier, Marco Aurélio Gerosa, Hugo de Paula, Mairieli Wessel:
Together or Apart? Investigating a mediator bot to aggregate bot's comments on pull requests. 434-438 - Giuseppe Cascavilla, Gemma Catolino, Felipe Ebert, Damien A. Tamburri, Willem-Jan van den Heuvel:
"When the Code becomes a Crime Scene" Towards Dark Web Threat Intelligence with Software Quality Metrics. 439-443 - Saumendu Roy, Gabriel Laberge, Banani Roy, Foutse Khomh, Amin Nikanjam, Saikat Mondal:
Why Don't XAI Techniques Agree? Characterizing the Disagreements Between Post-hoc Explanations of Defect Predictions. 444-448 - Olivier Nourry, Yutaro Kashiwa, Bin Lin, Gabriele Bavota, Michele Lanza, Yasutaka Kamei:
AIP: Scalable and Reproducible Execution Traces in Energy Studies on Mobile Devices. 449-453 - Ivana Clairine Irsan, Ting Zhang, Ferdian Thung, David Lo, Lingxiao Jiang:
AutoPRTitle: A Tool for Automatic Pull Request Title Generation. 454-458 - Dario Amoroso d'Aragona, Fabiano Pecorelli, Simone Romano, Giuseppe Scanniello, Maria Teresa Baldassarre, Andrea Janes, Valentina Lenarduzzi:
CATTO: Just-in-time Test Case Selection and Execution. 459-463 - Mir Sameed Ali, Nikhil Manjunath, Sridhar Chimalakonda:
COBREX: A Tool for Extracting Business Rules from COBOL. 464-468 - Gianmario Voria, Viviana Pentangelo, Antonio Della Porta, Stefano Lambiase, Gemma Catolino, Fabio Palomba, Filomena Ferrucci:
Community Smell Detection and Refactoring in SLACK: The CADOCS Project. 469-473 - Marco Raglianti, Csaba Nagy, Roberto Minelli, Michele Lanza:
DiscOrDance: Visualizing Software Developers Communities on Discord. 474-478 - Stefano Dalla Palma, Dario Di Nucci, Damian A. Tamburri:
Defuse: A Data Annotator and Model Builder for Software Defect Prediction. 479-483 - Shriram Shanbhag, Sridhar Chimalakonda, Vibhu Saujanya Sharma, Vikrant Kaulgud:
eTagger - An Energy Pattern Tagging Tool for GitHub Issues in Android Projects. 484-488 - Camilo Velázquez-Rodríguez, Eleni Constantinou, Coen De Roover:
LiFUSO: A Tool for Library Feature Unveiling based on Stack Overflow Posts. 489-493 - Tim Kräuter, Harald König, Adrian Rutle, Yngve Lamo:
The Visual Debugger Tool. 494-498 - Tomás Fiedor, Jirí Pavela, Adam Rogalewicz, Tomás Vojnar:
Perun: Performance Version System. 499-503 - Davide Corradini, Amedeo Zampieri, Michele Pasqua, Mariano Ceccato:
RestTestGen: An Extensible Framework for Automated Black-box Testing of RESTful APIs. 504-508 - Kowndinya Boyalakuntla, Meiyappan Nagappan, Sridhar Chimalakonda, Nuthan Munaiah:
RepoQuester: A Tool Towards Evaluating GitHub Projects. 509-513 - Tim Vahlbrock, Martin Guddat, Tom Vierjahn:
VSCode Migrate: Semi-Automatic Migrations for Low Coverage Projects. 514-518 - Chao Peng, Yujun Gao, Ping Yang:
Automated Server Testing: an Industrial Experience Report. 519-522 - Céline Deknop, Johan Fabry, Kim Mens, Vadim Zaytsev:
Generating Customised Control Flow Graphs for Legacy Languages with Semi-Parsing. 523-532 - Neela Sawant, Srinivasan H. Sengamedu:
Learning-based Identification of Coding Best Practices from Software Documentation. 533-542 - Chao Peng, Zhao Zhang, Zhengwei Lv, Ping Yang:
MUBot: Learning to Test Large-Scale Commercial Android Apps like a Human. 543-552 - Batyr Nuryyev, Ajay Kumar Jha, Sarah Nadi, Yee-Kang Chang, Emily Jiang, Vijay Sundaresan:
Mining Annotation Usage Rules: A Case Study with MicroProfile. 553-562 - Gunnar Kudrjavets, Ayushi Rastogi, Jeff Thomas, Nachiappan Nagappan:
On Quantifying the Benefits of Dead Code Removal. 563 - Kazumasa Shimari, Masahiro Tanaka, Takashi Ishio, Makoto Matsushita, Katsuro Inoue, Satoru Takanezawa:
Selecting Test Cases based on Similarity of Runtime Information: A Case Study of an Industrial Simulator. 564-567 - Noah Lee, Rui Abreu, Mehmet Yatbaz, Hang Qu, Nachiappan Nagappan:
The Engineering Implications of Code Maintenance in Practice. 568-577 - Gunnar Kudrjavets, Jeff Thomas, Aditya Kumar, Nachiappan Nagappan, Ayushi Rastogi:
There Ain't No Such Thing as a Free Custom Memory Allocator. 578-581 - Muslim Chochlov, Gul Aftab Ahmed, James Vincent Patten, Guoxian Lu, Wei Hou, David Gregg, Jim Buckley:
Using a Nearest-Neighbour, BERT-Based Approach for Scalable Clone Detection. 582-591 - Giovanni Rosa, Simone Scalabrino, Rocco Oliveto:
Assessing and Improving the Quality of Docker Artifacts. 592-596 - Valentina Piantadosi:
On the Evolution of Code Readability. 597-601 - Kristiina Rahkema, Dietmar Pfahl:
Quality Analysis of iOS Applications with Focus on Maintainability and Security. 602-606 - Seham Alharbi, Dimitris S. Kolovos, Nicholas Matragkas:
Synthesising Linear API Usage Examples for API Documentation. 607-611 - Emanuele Iannone, Fabio Palomba:
The Phantom Menace: Unmasking Security Issues in Evolving Software. 612-616
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.