default search action
36th ICSE 2014: Hyderabad, India
- Pankaj Jalote, Lionel C. Briand, André van der Hoek:
36th International Conference on Software Engineering, ICSE '14, Hyderabad, India - May 31 - June 07, 2014. ACM 2014, ISBN 978-1-4503-2756-5
Perspectives on Software Engineering
- Emerson R. Murphy-Hill, Thomas Zimmermann, Nachiappan Nagappan:
Cowboys, ankle sprains, and keepers of quality: how is video game development different from software development? 1-11 - Andrew Begel, Thomas Zimmermann:
Analyze this! 145 questions for data scientists in software engineering. 12-23 - Paul Ralph, Paul Kelly:
The dimensions of software engineering success. 24-35 - Ravi Khadka, Belfrit V. Batlajery, Amir Saeidi, Slinger Jansen, Jurriaan Hage:
How do professionals perceive legacy systems and software modernization? 36-47
Testing 1
- Tingting Yu, Witawas Srisa-an, Gregg Rothermel:
SimRT: an automated framework to support regression testing for data races. 48-59 - Peng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou:
Performance regression testing target prioritization via performance risk analysis. 60-71 - Rahul Gopinath, Carlos Jensen, Alex Groce:
Code coverage for suite evaluation by developers. 72-82 - Mika Mäntylä, Kai Petersen, Timo O. A. Lehtinen, Casper Lassenius:
Time pressure: a controlled experiment of test case development and requirements review. 83-94
Modeling
- Shahar Maoz, Jan Oliver Ringert, Bernhard Rumpe:
Verifying component and connector models against crosscutting structural views. 95-105 - Hamid Bagheri, Chong Tang, Kevin J. Sullivan:
TradeMaker: automated dynamic analysis of synthesized tradespaces. 106-116 - Rick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro, Marsha Chechik:
Lifting model transformations to product lines. 117-128 - Renzo Degiovanni, Dalal Alrajeh, Nazareno Aguirre, Sebastián Uchitel:
Automated goal operationalisation based on interpolation and SAT solving. 129-139
Configuration, Variability, and Clones
- Sarah Nadi, Thorsten Berger, Christian Kästner, Krzysztof Czarnecki:
Mining configuration constraints: static analyses and empirical results. 140-151 - Sai Zhang, Michael D. Ernst:
Which configuration option should I change? 152-163 - Yun Lin, Zhenchang Xing, Yinxing Xue, Yang Liu, Xin Peng, Jun Sun, Wenyun Zhao:
Detecting differences across multiple instances of code clones. 164-174 - Kai Chen, Peng Liu, Yingjun Zhang:
Achieving accuracy and scalability simultaneously in detecting application clones on Android markets. 175-186
Social Aspects of Software Engineering
- Klaas-Jan Stol, Brian Fitzgerald:
Two's company, three's a crowd: a case study of crowdsourcing software development. 187-198 - Patrick Wagstrom, Subhajit Datta:
Does latitude hurt while longitude kills? geographical and temporal separation in a large scale software development project. 199-210 - Leif Singer, Fernando Marques Figueira Filho, Margaret-Anne D. Storey:
Software engineering at the speed of light: how developers stay current using twitter. 211-221 - Qi Xuan, Vladimir Filkov:
Building it together: synchronous development in OSS. 222-233
Repair
- Martin Monperrus:
A critical review of "automatic patch generation learned from human-written patches": essay on the problem statement and the evaluation of automatic software repair. 234-242 - Divya Gopinath, Sarfraz Khurshid, Diptikalyan Saha, Satish Chandra:
Data-guided repair of selection statements. 243-253 - Yuhua Qi, Xiaoguang Mao, Yan Lei, Ziying Dai, Chengsong Wang:
The strength of random search on automated program repair. 254-265 - Shalini Kaleeswaran, Varun Tulsian, Aditya Kanade, Alessandro Orso:
MintHint: automated synthesis of repair hints. 266-276
Formal Analysis
- Carlo Ghezzi, Mauro Pezzè, Michele Sama, Giordano Tamburrelli:
Mining behavior models from user-intensive web applications. 277-287 - Steven Arzt, Eric Bodden:
Reviser: efficiently updating IDE-/IFDS-based data-flow analyses in response to incremental program changes. 288-298 - Antonio Filieri, Henry Hoffmann, Martina Maggio:
Automated design of self-adaptive software with control-theoretical formal guarantees. 299-310 - Guoxin Su, David S. Rosenblum:
Perturbation analysis of stochastic systems with empirical distribution parameters. 311-321
Configuration Management
- Caius Brindescu, Mihai Codoban, Sergii Shmarkatiuk, Danny Dig:
How do centralized and distributed version control systems impact software changes? 322-333 - Kivanç Muslu, Christian Bird, Nachiappan Nagappan, Jacek Czerwonka:
Transition from centralized to decentralized version control systems: a case study on reasons, barriers, and outcomes. 334-344 - Georgios Gousios, Martin Pinzger, Arie van Deursen:
An exploratory study of the pull-based software development model. 345-355 - Jason Tsay, Laura Dabbish, James D. Herbsleb:
Influence of social and technical factors for evaluating contribution in GitHub. 356-366
Software Understanding
- Saba Alimadadi, Sheldon Sequeira, Ali Mesbah, Karthik Pattabiraman:
Understanding JavaScript event-based interactions. 367-377 - Janet Siegmund, Christian Kästner, Sven Apel, Chris Parnin, Anja Bethmann, Thomas Leich, Gunter Saake, André Brechmann:
Understanding understanding source code with functional magnetic resonance imaging. 378-389 - Paige Rodeghero, Collin McMillan, Paul W. McBurney, Nigel Bosch, Sidney K. D'Mello:
Improving automated source code summarization via an eye-tracking study of programmers. 390-401 - Thomas Fritz, Andrew Begel, Sebastian C. Müller, Serap Yigit-Elliott, Manuela Züger:
Using psycho-physiological measures to assess task difficulty in software development. 402-413
Prediction
- Xiao-Yuan Jing, Shi Ying, Zhi-Wu Zhang, Shanshan Wu, Jin Liu:
Dictionary learning based software defect prediction. 414-423 - Foyzur Rahman, Sameer Khatri, Earl T. Barr, Premkumar T. Devanbu:
Comparing static bug finders and statistical prediction. 424-434 - Laura Inozemtseva, Reid Holmes:
Coverage is not strongly correlated with test suite effectiveness. 435-445 - Leandro L. Minku, Xin Yao:
How to make best use of cross-company data in software effort estimation? 446-456
Concurrency
- Yanyan Jiang, Tianxiao Gu, Chang Xu, Xiaoxing Ma, Jian Lu:
CARE: cache guided deterministic replay for concurrent Java programs. 457-467 - Ivan Beschastnikh, Yuriy Brun, Michael D. Ernst, Arvind Krishnamurthy:
Inferring models of concurrent systems from logs of their behavior with CSight. 468-479 - Peng Liu, Charles Zhang:
Unleashing concurrency for irregular data structures. 480-490 - Yan Cai, Shangru Wu, W. K. Chan:
ConLock: a constraint-based approach to dynamic checking on deadlocks in multithreaded programs. 491-502
Apps and Energy
- Irene Lizeth Manotas Gutiérrez, Lori L. Pollock, James Clause:
SEEDS: a software engineer's energy-optimization decision support framework. 503-514 - Nima Nikzad, Octav Chipara, William G. Griswold:
APE: an annotation language and middleware for energy-efficient mobile application development. 515-526 - Ding Li, Angelica Huyen Tran, William G. J. Halfond:
Making web applications more energy efficient for OLED smartphones. 527-538
Testing 2
- Patrice Godefroid:
Micro execution. 539-549 - Jonathan Bell, Gail E. Kaiser:
Unit test virtualization with VMVM. 550-561 - Paolo Tonella, Roberto Tiella, Duy Cu Nguyen:
Interpolated n-grams for model based testing. 562-572 - Kelly Androutsopoulos, David Clark, Haitao Dan, Robert M. Hierons, Mark Harman:
An analysis of the relationship between conditional entropy and failed error propagation in software testing. 573-583
Code Contracts, Invariants, and Robustness
- Nélio Cacho, Thiago César, Thomas Filipe, Eliezio Soares, Arthur Cassio, Rafael Souza, Israel García, Eiji Adachi Barbosa, Alessandro Garcia:
Trading robustness for maintainability: an empirical study of evolving c# programs. 584-595 - Todd W. Schiller, Kellen Donohue, Forrest Coward, Michael D. Ernst:
Case studies and tools for contract specifications. 596-607 - ThanhVu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest:
Using dynamic analysis to generate disjunctive invariants. 608-619 - Ivan Bocic, Tevfik Bultan:
Inductive verification of data model invariants for web applications. 620-631
Search and APIs
- Stefan Endrikat, Stefan Hanenberg, Romain Robbes, Andreas Stefik:
How do API documentation and static typing affect API usability? 632-642 - Siddharth Subramanian, Laura Inozemtseva, Reid Holmes:
Live API documentation. 643-652 - Joel Galenson, Philip Reames, Rastislav Bodík, Björn Hartmann, Koushik Sen:
CodeHint: dynamic and interactive synthesis of code snippets. 653-663 - Iman Keivanloo, Juergen Rilling, Ying Zou:
Spotting working code examples. 664-675
Adaptive Systems
- Bihuan Chen, Xin Peng, Yijun Yu, Bashar Nuseibeh, Wenyun Zhao:
Self-adaptation through incremental generative model transformations at runtime. 676-687 - Nicolás D'Ippolito, Víctor A. Braberman, Jeff Kramer, Jeff Magee, Daniel Sykes, Sebastián Uchitel:
Hope for the best, prepare for the worst: multi-tier control for adaptive systems. 688-699 - Cristian Klein, Martina Maggio, Karl-Erik Årzén, Francisco Hernández-Rodriguez:
Brownout: building more robust cloud applications. 700-711 - Pierre A. Akiki, Arosha K. Bandara, Yijun Yu:
Integrating adaptive user interface capabilities in enterprise applications. 712-723
Build and Package Management
- Hyunmin Seo, Caitlin Sadowski, Sebastian G. Elbaum, Edward Aftandilian, Robert W. Bowdidge:
Programmers' build errors: a case study (at google). 724-734 - Shaun Phillips, Thomas Zimmermann, Christian Bird:
Understanding and improving software build teams. 735-744 - Alexey Ignatiev, Mikolás Janota, João Marques-Silva:
Towards efficient optimization in package management systems. 745-755 - Jérôme Vouillon, Mehdi Dogguy, Roberto Di Cosmo:
Easing software component repository evolution. 756-766
Mining
- Ning Chen, Jialiu Lin, Steven C. H. Hoi, Xiaokui Xiao, Boshen Zhang:
AR-miner: mining informative reviews for developers from mobile app marketplace. 767-778 - Robert Dyer, Hridesh Rajan, Hoan Anh Nguyen, Tien N. Nguyen:
Mining billions of AST nodes to study actual and potential usage of Java language features. 779-790 - Hung Viet Nguyen, Hoan Anh Nguyen, Anh Tuan Nguyen, Tien N. Nguyen:
Mining interprocedural, data-oriented usage patterns in JavaScript web applications. 791-802 - Stas Negara, Mihai Codoban, Danny Dig, Ralph E. Johnson:
Mining fine-grained code changes to detect unknown change patterns. 803-813
Automated Bug Detection and Repair
- Sangho Lee, Changhee Jung, Santosh Pande:
Detecting memory leaks through introspective dynamic behavior modelling using machine learning. 814-824 - Changhee Jung, Sangho Lee, Easwaran Raman, Santosh Pande:
Automated memory leak detection for production use. 825-836 - Frolin S. Ocariza Jr., Karthik Pattabiraman, Ali Mesbah:
Vejovis: suggesting fixes for JavaScript faults. 837-847 - Wensheng Dou, Shing-Chi Cheung, Jun Wei:
Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation. 848-858
Requirements
- Swapneel Sheth, Gail E. Kaiser, Walid Maalej:
Us and them: a study of privacy requirements across north america, asia, and europe. 859-870 - Keerthi Thomas, Arosha K. Bandara, Blaine A. Price, Bashar Nuseibeh:
Distilling privacy requirements for mobile applications. 871-882 - Emmanuel Letier, David Stefan, Earl T. Barr:
Uncertainty, risk, and information value in software requirements and architecture. 883-894 - Rahul Mohanani, Paul Ralph, Ben Shreeve:
Requirements fixation. 895-906
Testing and Conformance Verification
- Hung Viet Nguyen, Christian Kästner, Tien N. Nguyen:
Exploring variability-aware execution for testing plugin-based web applications. 907-918 - Xiangjuan Yao, Mark Harman, Yue Jia:
A study of equivalent and stubborn mutation operators using human analysis of equivalence. 919-930 - Antonio Carzaniga, Alberto Goffi, Alessandra Gorla, Andrea Mattavelli, Mauro Pezzè:
Cross-checking oracles from intrinsic software redundancy. 931-942 - Patrick Rempel, Patrick Mäder, Tobias Kuschke, Jane Cleland-Huang:
Mind the gap: assessing the conformance of software traceability to relevant guidelines. 943-954
Modeling and Interfaces
- Dina Zayan, Michal Antkiewicz, Krzysztof Czarnecki:
Effects of using examples on structural model comprehension: a controlled experiment. 955-966 - Lu Xiao, Yuanfang Cai, Rick Kazman:
Design rule spaces: a new form of architecture insight. 967-977 - Hisashi Miyashita, Hideki Tai, Shunichi Amano:
Controlled modeling environment using flexibly-formatted spreadsheets. 978-988 - Márcio Ribeiro, Paulo Borba, Christian Kästner:
Feature maintenance with emergent interfaces. 989-1000
Apps and Verification
- Tse-Hsun Chen, Weiyi Shang, Zhen Ming Jiang, Ahmed E. Hassan, Mohamed N. Nasser, Parminder Flora:
Detecting performance anti-patterns for applications developed using object-relational mapping. 1001-1012 - Yepang Liu, Chang Xu, Shing-Chi Cheung:
Characterizing and detecting performance bugs for smartphone applications. 1013-1024 - Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller:
Checking app behavior against app descriptions. 1025-1035 - Jianjun Huang, Xiangyu Zhang, Lin Tan, Peng Wang, Bin Liang:
AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. 1036-1046
Symbolic Execution
- Wei Le, Shannon D. Pattison:
Patch verification via multiversion interprocedural control flow graphs. 1047-1058 - Guowei Yang, Sarfraz Khurshid, Suzette Person, Neha Rungta:
Property differencing for incremental checking. 1059-1070 - Fei He, Bow-Yaw Wang, Liangze Yin, Lei Zhu:
Symbolic assume-guarantee reasoning through BDD learning. 1071-1082 - Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley:
Enhancing symbolic execution with veritesting. 1083-1094
Refactoring and Reverse Engineering
- Xi Ge, Emerson R. Murphy-Hill:
Manual refactoring changes with automated refactoring validation. 1095-1105 - Mohsen Vakilian, Ralph E. Johnson:
Alternate refactoring paths reveal usability problems. 1106-1116 - Semih Okur, David L. Hartveld, Danny Dig, Arie van Deursen:
A study and toolkit for asynchronous programming in c#. 1117-1127 - Dohyeong Kim, William N. Sumner, Xiangyu Zhang, Dongyan Xu, Hira Agrawal:
Reuse-oriented reverse engineering of functional components from x86 binaries. 1128-1139
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.