default search action
34th ASE 2019: San Diego, CA, USA
- 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, San Diego, CA, USA, November 11-15, 2019. IEEE 2019, ISBN 978-1-7281-2508-4
Main Track
- Hong Jin Kang, Tegawendé F. Bissyandé, David Lo:
Assessing the Generalizability of Code2vec Token Embeddings. 1-12 - Yao Wan, Jingdong Shu, Yulei Sui, Guandong Xu, Zhou Zhao, Jian Wu, Philip S. Yu:
Multi-modal Attention Network Learning for Semantic Source Code Retrieval. 13-25 - Christoph Gladisch, Thomas Heinz, Christian Heinzemann, Jens Oehlerking, Anne von Vietinghoff, Tim Pfitzer:
Experience Paper: Search-Based Testing in Automated Driving Control Applications. 26-37 - Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
AutoFocus: Interpreting Attention-Based Neural Networks by Code Perturbation. 38-41 - Jun-Wei Lin, Reyhaneh Jabbarvand, Sam Malek:
Test Transfer Across Mobile Apps Through Semantic Mapping. 42-53 - Farnaz Behrang, Alessandro Orso:
Test Migration Between Mobile Apps with Similar Functionality. 54-65 - Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, Guoai Xu:
DaPanda: Detecting Aggressive Push Notifications in Android Apps. 66-78 - Yibiao Yang, Yanyan Jiang, Zhiqiang Zuo, Yang Wang, Hao Sun, Hongmin Lu, Yuming Zhou, Baowen Xu:
Automatic Self-Validation for Code Coverage Profilers. 79-90 - Ariel Godio, Valeria S. Bengolea, Pablo Ponzio, Nazareno Aguirre, Marcelo Fabian Frias:
Efficient Test Generation Guided by Field Coverage Criteria. 91-101 - Linghui Luo, Eric Bodden, Johannes Späth:
A Qualitative Analysis of Android Taint-Analysis Results. 102-114 - Duling Lai, Julia Rubin:
Goal-Driven Exploration for Android Applications. 115-127 - Onur Sahin, Assel Aliyeva, Hariharan Mathavan, Ayse K. Coskun, Manuel Egele:
RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation. 128-138 - Yueming Wu, Xiaodi Li, Deqing Zou, Wei Yang, Xin Zhang, Hai Jin:
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis. 139-150 - Xiaoxue Ren, Zhenchang Xing, Xin Xia, Guoqiang Li, Jianling Sun:
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites. 151-162 - Cuiyun Gao, Jichuan Zeng, Xin Xia, David Lo, Michael R. Lyu, Irwin King:
Automating App Review Response Generation. 163-175 - Zhongxin Liu, Xin Xia, Christoph Treude, David Lo, Shanping Li:
Automatic Generation of Pull Request Descriptions. 176-188 - Nikolas Havrikov, Andreas Zeller:
Systematically Covering Input Structure. 189-199 - Devika Sondhi, Rahul Purandare:
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs. 200-212 - Zhouyang Jia, Shanshan Li, Tingting Yu, Xiangke Liao, Ji Wang, Xiaodong Liu, Yunhuai Liu:
Detecting Error-Handling Bugs without Error Specification Input. 213-225 - Jonathan Osei-Owusu, Angello Astorga, Liia Butler, Tao Xie, Geoffrey Challen:
Grading-Based Test Suite Augmentation. 226-229 - Yi Wang:
Emotions Extracted from Text vs. True Emotions-An Empirical Evaluation in SE Context. 230-242 - C. M. Khaled Saifullah, Muhammad Asaduzzaman, Chanchal K. Roy:
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets. 243-254 - Jiajun Jiang, Luyao Ren, Yingfei Xiong, Lingming Zhang:
Inferring Program Transformations From Singular Examples via Big Code. 255-266 - Dongjie He, Haofeng Li, Lei Wang, Haining Meng, Hengjie Zheng, Jie Liu, Shuangwei Hu, Lian Li, Jingling Xue:
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint Analysis. 267-279 - Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, Yao Guo:
Characterizing Android App Signing Issues. 280-292 - Tamjid Al Rahat, Yu Feng, Yuan Tian:
OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications. 293-304 - Junjie Chen, Guancheng Wang, Dan Hao, Yingfei Xiong, Hongyu Zhang, Lu Zhang:
History-Guided Configuration Diversification for Compiler Test-Program Generation. 305-316 - Daniil Stepanov, Marat Akhin, Mikhail A. Belyaev:
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler. 317-326 - Umair Z. Ahmed, Renuka Sindhgatta, Nisheeth Srivastava, Amey Karkare:
Targeted Example Generation for Compilation Errors. 327-338 - Haicheng Chen, Wensheng Dou, Yanyan Jiang, Feng Qin:
Understanding Exception-Related Bugs in Large-Scale Cloud Systems. 339-351 - Wujie Zheng, Haochuan Lu, Yangfan Zhou, Jianming Liang, Haibing Zheng, Yuetang Deng:
iFeedback: Exploiting User Feedback for Real-Time Issue Detection in Large-Scale Online Service Systems. 352-363 - Junjie Chen, Xiaoting He, Qingwei Lin, Hongyu Zhang, Dan Hao, Feng Gao, Zhangwei Xu, Yingnong Dang, Dongmei Zhang:
Continuous Incident Triage for Large-Scale Online Service Systems. 364-375 - Hao Zhang, W. K. Chan:
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models. 376-387 - Yang Hu, Umair Z. Ahmed, Sergey Mechtaev, Ben Leong, Abhik Roychoudhury:
Re-Factoring Based Program Repair Applied to Programming Assignments. 388-398 - Madeline Endres, Georgios Sakkas, Benjamin Cosman, Ranjit Jhala, Westley Weimer:
InFix: Automatically Repairing Novice Program Inputs. 399-410 - Padraic Cashin, Carianne Martinez, Westley Weimer, Stephanie Forrest:
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences. 411-414 - Louis G. Michael IV, James Donohue, James C. Davis, Dongyoon Lee, Francisco Servant:
Regexes are Hard: Decision-Making, Difficulties, and Risks in Programming Regular Expressions. 415-426 - James C. Davis, Daniel Moyer, Ayaan M. Kazerouni, Dongyoon Lee:
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study. 427-439 - Elena Sherman, Andrew Harris:
Accurate String Constraints Solution Counting with Weighted Automata. 440-452 - William Eiers, Seemanta Saha, Tegan Brennan, Tevfik Bultan:
Subformula Caching for Model Counting and Quantitative Program Analysis. 453-464 - Liang Bao, Xin Liu, Fangzheng Wang, Baoyin Fang:
ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks. 465-476 - Eric Horton, Chris Parnin:
V2: Fast Detection of Configuration Drift in Python. 477-488 - Son Nguyen, Hoan Nguyen, Ngoc M. Tran, Hieu Tran, Tien N. Nguyen:
Feature-Interaction Aware Configuration Prioritization for Configurable Code. 489-501 - Jiajun Jiang, Ran Wang, Yingfei Xiong, Xiangping Chen, Lu Zhang:
Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study. 502-514 - Tarannum Shaila Zaman, Xue Han, Tingting Yu:
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces. 515-526 - Zhilei Ren, Changlin Liu, Xusheng Xiao, He Jiang, Tao Xie:
Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing. 527-538 - Ahmet Çelik, Karl Palmskog, Marinela Parovic, Emilio Jesús Gallego Arias, Milos Gligoric:
Mutation Analysis for Coq. 539-551 - Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verifying Arithmetic in Cryptographic C Programs. 552-564 - Dongwoo Kim, Yunja Choi:
Model Checking Embedded Control Software using OS-in-the-Loop CEGAR. 565-576 - Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Laurent Mounier, Marie-Laure Potet:
Get Rid of Inline Assembly through Verification-Oriented Lifting. 577-589 - Xiaodong Gu, Hongyu Zhang, Sunghun Kim:
CodeKernel: A Graph Kernel Based Approach to the Selection of API Usage Examples. 590-601 - Lin Jiang, Hui Liu, He Jiang:
Machine Learning Based Recommendation of Method Names: How Far are We. 602-614 - Daye Nam, Amber Horvath, Andrew Macvean, Brad A. Myers, Bogdan Vasilescu:
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems. 615-627 - Jeremy Lacomis, Pengcheng Yin, Edward J. Schwartz, Miltiadis Allamanis, Claire Le Goues, Graham Neubig, Bogdan Vasilescu:
DIRE: A Neural Approach to Decompiled Identifier Naming. 628-639 - Stefan Mühlbauer, Sven Apel, Norbert Siegmund:
Accurate Modeling of Performance Histories for Evolving Software Systems. 640-652 - Boyuan Chen, Zhen Ming Jiang, Paul Matos, Michael Lacaria:
An Industrial Experience Report on Performance-Aware Refactoring on a Database-Centric Web Application. 653-664 - Yida Tao, Shan Tang, Yepang Liu, Zhiwu Xu, Shengchao Qin:
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks? 665-668 - Jinfu Chen, Weiyi Shang, Ahmed E. Hassan, Yong Wang, Jiangbin Lin:
An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour. 669-681 - Yutian Tang, Xian Zhan, Hao Zhou, Xiapu Luo, Zhou Xu, Yajin Zhou, Qiben Yan:
Demystifying Application Performance Management Libraries for Android. 682-685 - Xiaoyu Liu, LiGuo Huang, Jidong Ge, Vincent Ng:
Predicting Licenses for Changed Source Code. 686-697 - Lina Gong, Shujuan Jiang, Rongcun Wang, Li Jiang:
Empirical Evaluation of the Impact of Class Overlap on Software Defect Prediction. 698-709 - Son Van Nguyen, Tien N. Nguyen, Yi Li, Shaohua Wang:
Combining Program Analysis and Statistical Language Model for Code Statement Completion. 710-721 - Zan Wang, Yingquan Zhao, Shuang Liu, Jun Sun, Xiang Chen, Huarui Lin:
MAP-Coverage: A Novel Coverage Criterion for Testing Thread-Safe Classes. 722-734 - Jiange Zhang, Qing Yi, Damian Dechev:
Automating Non-Blocking Synchronization In Concurrent Data Abstractions. 735-747 - Mingyuan Wu, Lingming Zhang, Cong Liu, Shin Hwei Tan, Yuqun Zhang:
Automating CUDA Synchronization via Program Transformation. 748-759 - Ernest Bota Pobee, Xiupei Mei, Wing Kwong Chan:
Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs. 760-771 - Yan Zheng, Changjie Fan, Xiaofei Xie, Ting Su, Lei Ma, Jianye Hao, Zhaopeng Meng, Yang Liu, Ruimin Shen, Yingfeng Chen:
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning. 772-784 - Mahdi Nejadgholi, Jinqiu Yang:
A Study of Oracle Approximations in Testing Deep Learning Libraries. 785-796 - Divya Gopinath, Hayes Converse, Corina S. Pasareanu, Ankur Taly:
Property Inference for Deep Neural Networks. 797-809 - Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. 810-822 - Vahid Alizadeh, Mohamed Amine Ouali, Marouane Kessentini, Meriem Chater:
RefBot: Intelligent Software Refactoring Bot. 823-834 - Mirko Köhler, Guido Salvaneschi:
Automated Refactoring to Reactive Programming. 835-846 - Benoît Verhaeghe, Christopher P. Fuhrman, Latifa Guerrouj, Nicolas Anquetil, Stéphane Ducasse:
Empirical Study of Programming to an Interface. 847-850 - Lingfeng Bao, Nimrod Busany, David Lo, Shahar Maoz:
Statistical Log Differencing. 851-862 - Jinyang Liu, Jieming Zhu, Shilin He, Pinjia He, Zibin Zheng, Michael R. Lyu:
Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression. 863-873 - Artur Boronat:
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling. 874-886 - Nimrod Busany, Shahar Maoz, Yehonatan Yulazari:
Size and Accuracy in Model Inference. 887-898 - Brandon Paulsen, Chungha Sung, Peter A. H. Peterson, Chao Wang:
Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation. 899-911 - Martin Nowack:
Fine-Grain Memory Object Representation in Symbolic Execution. 912-923 - Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song:
RENN: Efficient Reverse Execution with Neural-Network-Assisted Alias Analysis. 924-935 - Jyothi Vedurada, V. Krishna Nandivada:
Batch Alias Analysis. 936-948 - Jeffrey Palmerino, Qi Yu, Travis Desell, Daniel E. Krutz:
Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility. 949-961 - Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang:
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences. 962-973 - Paulo Henrique M. Maia, Lucas Vieira, Matheus Lima Chagas, Yijun Yu, Andrea Zisman, Bashar Nuseibeh:
Cautious Adaptation of Defiant Components. 974-985 - Qiong Feng, Yuanfang Cai, Rick Kazman, Di Cui, Ting Liu, Hongzhou Fang:
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation. 986-997 - Ilias Gerostathopoulos, Stefan Kugele, Christoph Segler, Tomás Bures, Alois C. Knoll:
Automated Trainability Evaluation for Smart Software Functions. 998-1001 - Guilherme Cavalcanti, Paulo Borba, Georg Seibt, Sven Apel:
The Impact of Structure on Software Merging: Semistructured Versus Structured Merge. 1002-1013 - Alberto Trindade Tavares, Paulo Borba, Guilherme Cavalcanti, Sérgio Soares:
Semistructured Merge in JavaScript Systems. 1014-1025 - Kawser Wazed Nafi, Tonny Shekha Kar, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation. 1026-1037 - Muyue Feng, Zimu Yuan, Feng Li, Gu Ban, Shiyang Wang, Qian Tang, He Su, Chendong Yu, Jiahuan Xu, Aihua Piao, Jingling Xue, Wei Huo:
B2SFinder: Detecting Open-Source Software Reuse in COTS Software. 1038-1049 - Min Wang, Zeqi Lin, Yanzhen Zou, Bing Xie:
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer. 1050-1061
Tool Demonstrations
- Xiaoning Du, Xiaofei Xie, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
A Quantitative Analysis Framework for Recurrent Neural Network. 1062-1065 - Shengcheng Yu, Chunrong Fang, Yang Feng, Wenyuan Zhao, Zhenyu Chen:
LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform. 1066-1069 - Yuanchun Li, Ziyue Yang, Yao Guo, Xiangqun Chen:
Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing. 1070-1073 - Dirk Beyer, Thomas Lemberger:
TestCov: Robust Test-Suite Execution and Coverage Measurement. 1074-1077 - Chijin Zhou, Mingzhe Wang, Jie Liang, Zhe Liu, Chengnian Sun, Yu Jiang:
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization. 1078-1081 - Sadika Amreen, Andrey Karnauch, Audris Mockus:
Developer Reputation Estimator (DRE). 1082-1085 - Tianjiao Du, Junming Cao, Qinyue Wu, Wei Li, Beijun Shen, Yuting Chen:
CocoQa: Question Answering for Coding Conventions Over Knowledge Graphs. 1086-1089 - Camilo Escobar-Velasquez, Michael Osorio-Riaño, Mario Linares-Vásquez:
MutAPK: Source-Codeless Mutant Generation for Android Apps. 1090-1093 - Goran Piskachev, Lisa Nguyen Quang Do, Oshando Johnson, Eric Bodden:
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods. 1094-1097 - Ayesha Sadiq, Li Li, Yuan-Fang Li, Ijaz Ahmed, Sea Ling:
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs. 1098-1101 - Cyrille Artho, Monali Pande, Qiyi Tang:
Visual Analytics for Concurrent Java Executions. 1102-1105 - Xufan Zhang, Ziyue Yin, Yang Feng, Qingkai Shi, Jia Liu, Zhenyu Chen:
NeuralVis: Visualizing and Interpreting Deep Learning Models. 1106-1109 - Vladislav Tankov, Yaroslav Golubev, Timofey Bryksin:
Kotless: A Serverless Framework for Kotlin. 1110-1113 - Xiao Liu, Lingmin Fan, Jia Xu, Xuejun Li, Lina Gong, John C. Grundy, Yun Yang:
FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing. 1114-1117 - Ali Ghanbari, Lingming Zhang:
PraPR: Practical Program Repair via Bytecode Mutation. 1118-1121 - Xutong Ma, Jiwei Yan, Yaqi Li, Jun Yan, Jian Zhang:
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs. 1122-1125 - Ignacio Laguna:
FPChecker: Detecting Floating-Point Exceptions in GPU Applications. 1126-1129 - Bruno Castro, Alexandre Perez, Rui Abreu:
Pangolin: An SFL-Based Toolset for Feature Localization. 1130-1133 - Dennis Reuling, Udo Kelter, Sebastian Ruland, Malte Lochau:
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-Based Analysis of Variant-Rich Software. 1134-1137 - Mohammad Afzal, Asia A, Avriti Chauhan, Bharti Chimdyalwar, Priyanka Darke, Advaita Datar, Shrawan Kumar, R. Venkatesh:
VeriAbs : Verification by Abstraction and Test Generation. 1138-1141 - Da Li, Huiyan Wang, Chang Xu, Ruiqing Zhang, Shing-Chi Cheung, Xiaoxing Ma:
SGUARD: A Feature-Based Clustering Tool for Effective Spreadsheet Defect Detection. 1142-1145 - David Georg Reichelt, Stefan Kühne, Wilhelm Hasselbring:
PeASS: A Tool for Identifying Performance Changes at Code Level. 1146-1149 - Bernd Fischer, Salvatore La Torre, Gennaro Parlato:
VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-threaded Programs with Lazy-CSeq. 1150-1153 - Ruijie Meng, Biyun Zhu, Hao Yun, Haicheng Li, Yan Cai, Zijiang Yang:
CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities. 1154-1157 - Qiang Hu, Lei Ma, Xiaofei Xie, Bing Yu, Yang Liu, Jianjun Zhao:
DeepMutation++: A Mutation Testing Framework for Deep Learning Systems. 1158-1161 - Xiaofei Xie, Hongxu Chen, Yi Li, Lei Ma, Yang Liu, Jianjun Zhao:
Coverage-Guided Fuzzing for Feedforward Neural Networks. 1162-1165 - Yihao Huang, Jincao Feng, Hanyue Zheng, Jiayi Zhu, Shang Wang, Siyuan Jiang, Weikai Miao, Geguang Pu:
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis. 1166-1169 - Yuexing Wang, Guang Chen, Min Zhou, Ming Gu, Jiaguang Sun:
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis. 1170-1173 - Chi Li, Min Zhou, Zuxing Gu, Ming Gu, Hongyu Zhang:
Ares: Inferring Error Specifications through Static Analysis. 1174-1177 - Mojtaba Bagherzadeh, Karim Jahed, Nafiseh Kahani, Juergen Dingel:
PMExec: An Execution Engine of Partial UML-RT Models. 1178-1181 - Reza Ahmadi, Karim Jahed, Juergen Dingel:
mCUTE: A Model-Level Concolic Unit Testing Engine for UML State Machines. 1182-1185 - Mark Mossberg, Felipe Manzano, Eric Hennenfent, Alex Groce, Gustavo Grieco, Josselin Feist, Trent Brunson, Artem Dinaburg:
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts. 1186-1189 - Pavan Kumar Chittimalli, Kritika Anand, Shrishti Pradhan, Sayandeep Mitra, Chandan Prakash, Rohit Shere, Ravindra Naik:
BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules. 1190-1193 - Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder:
XRaSE: Towards Virtually Tangible Software using Augmented Reality. 1194-1197 - Zixin Li, Haoran Wu, Jiehui Xu, Xingya Wang, Lingming Zhang, Zhenyu Chen:
MuSC: A Tool for Mutation Testing of Ethereum Smart Contract. 1198-1201 - Shufan Zhou, Beijun Shen, Hao Zhong:
Lancer: Your Code Tell Me What You Need. 1202-1205
Industry Showcase
- Susumu Tokumoto, Kuniharu Takayama:
PHANTA: Diversified Test Code Quality Measurement for Modern Software Development. 1206-1207 - Ahyoung Sung, Sangjun Kim, Yangsu Kim, Younggun Jang, Jongin Kim:
Test Automation and Its Limitations: A Case Study. 1208-1209 - Yang Wen, Jicheng Cao, Shengyu Cheng:
PTracer: A Linux Kernel Patch Trace Bot. 1210-1211 - Kapil Singi, R. P. Jagadeesh Chandra Bose, Sanjay Podder, Adam P. Burden:
Trusted Software Supply Chain. 1212-1213 - Vibhu Saujanya Sharma, Rohit Mehra, Sanjay Podder, Adam P. Burden:
A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software Delivery. 1214-1215 - ZhiWei Wu, Jing Liu, Xiang Chen:
Better Development of Safety Critical Systems: Chinese High Speed Railway System Development Experience Report. 1216-1217
Doctoral Symposium
- Shurui Zhou:
Improving Collaboration Efficiency in Fork-Based Development. 1218-1221 - Marina Reich:
Inference of Properties from Requirements and Automation of Their Formal Verification. 1222-1225 - Stephan Lukasczyk:
Generating Tests to Analyse Dynamically-Typed Programs. 1226-1229 - Mauricio Soto:
Improving Patch Quality by Enhancing Key Components of Automatic Program Repair. 1230-1233 - Kristian Kolthoff:
Automatic Generation of Graphical User Interface Prototypes from Unrestricted Natural Language Requirements. 1234-1237 - Vaibhav Sharma:
Automatically Repairing Binary Programs Using Adapter Synthesis. 1238-1241 - Foyzul Hassan:
Tackling Build Failures in Continuous Integration. 1242-1245 - Carmine Vassallo:
Enabling Continuous Improvement of a Continuous Integration Process. 1246-1249
ACM Student Research Competition
- Bolin Wei:
Retrieve and Refine: Exemplar-Based Neural Comment Generation. 1250-1252 - Daye Nam:
API Design Implications of Boilerplate Client Code. 1253-1255 - Martin Kellogg:
Compile-Time Detection of Machine Image Sniping. 1256-1258 - Xusheng Xiao:
An Image-Inspired and CNN-Based Android Malware Detection Approach. 1259-1261 - Ali Ghanbari:
Toward Practical Automatic Program Repair. 1262-1264 - Krishna Murthy Kattiyan Ramamoorthy:
User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications. 1265-1267 - Krishna Neupane:
An Approach for Investigating Emotion Dynamics in Software Development. 1268-1270 - Rashmi Mudduluru:
Verifying Determinism in Sequential Programs. 1271-1273 - Li Yu:
Empirical Study of Python Call Graph. 1274-1276 - Shengcheng Yu:
Crowdsourced Report Generation via Bug Screenshot Understanding. 1277-1279 - Shuyao Jiang:
Boosting Neural Commit Message Generation with Code Semantic Analysis. 1280-1282 - Gargi Balasubramaniam:
Towards Comprehensible Representation of Controllers using Machine Learning. 1283-1285 - Kevin Zhang:
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities. 1286-1288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.