default search action
38th ICSE 2016: Austin, TX, USA
- Laura K. Dillon, Willem Visser, Laurie A. Williams:
Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016. ACM 2016, ISBN 978-1-4503-3900-1
Android
- Xuan Lu, Xuanzhe Liu, Huoran Li, Tao Xie, Qiaozhu Mei, Dan Hao, Gang Huang, Feng Feng:
PRADA: prioritizing android devices for apps by mining large-scale usage data. 3-13 - Lorenzo Villarroel, Gabriele Bavota, Barbara Russo, Rocco Oliveto, Massimiliano Di Penta:
Release planning of mobile apps based on user reviews. 14-24 - Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
Toward a framework for detecting privacy policy violations in android application code. 25-36 - Konrad Jamrozik, Philipp von Styp-Rekowsky, Andreas Zeller:
Mining sandboxes. 37-48
Performance
- Bihuan Chen, Yang Liu, Wei Le:
Generating performance distributions via probabilistic symbolic execution. 49-60 - Marija Selakovic, Michael Pradel:
Performance issues and optimizations in JavaScript: an empirical study. 61-72 - Guoxin Su, David S. Rosenblum, Giordano Tamburrelli:
Reliability of Run-Time Quality-of-Service evaluation using parametric model checking. 73-84 - Tian Huat Tan, Manman Chen, Jun Sun, Yang Liu, Étienne André, Yinxing Xue, Jin Song Dong:
Optimizing selection of competing services with probabilistic hierarchical refinement. 85-95
Empirical
- Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel:
The emerging role of data scientists on software development teams. 96-107 - Premkumar T. Devanbu, Thomas Zimmermann, Christian Bird:
Belief & evidence in empirical software engineering. 108-119 - Klaas-Jan Stol, Paul Ralph, Brian Fitzgerald:
Grounded theory in software engineering research: a critical review and guidelines. 120-131
Symbolic execution
- Eric F. Rizzi, Sebastian G. Elbaum, Matthew B. Dwyer:
On the techniques we create, the tools we build, and their misalignments: a study of KLEE. 132-143 - Maria Christakis, Peter Müller, Valentin Wüstholz:
Guiding dynamic symbolic execution toward unverified program executions. 144-155 - Jinseong Jeon, Xiaokang Qiu, Jonathan Fetter-Degges, Jeffrey S. Foster, Armando Solar-Lezama:
Synthesizing framework models for symbolic execution. 156-167 - Monika Dhok, Murali Krishna Ramanathan, Nishant Sinha:
Type-aware concolic testing of JavaScript programs. 168-179
Compilers and emerging trends
- Junjie Chen, Wenxiang Hu, Dan Hao, Yingfei Xiong, Hongyu Zhang, Lu Zhang, Bing Xie:
An empirical comparison of compiler testing techniques. 180-190 - David Menendez, Santosh Nagarakatte:
Termination-checking for LLVM peephole optimizations. 191-202 - Chengnian Sun, Vu Le, Zhendong Su:
Finding and analyzing compiler warning defects. 203-213 - Qingwei Lin, Jian-Guang Lou, Hongyu Zhang, Dongmei Zhang:
iDice: problem identification for emerging issues. 214-224
Energy and videos
- Samir Hasan, Zachary King, Munawar Hafiz, Mohammed Sayagh, Bram Adams, Abram Hindle:
Energy profiles of Java collections classes. 225-236 - Irene Manotas, Christian Bird, Rui Zhang, David C. Shepherd, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause:
An empirical study of practitioners' perspectives on green software engineering. 237-248 - Ding Li, Yingjun Lyu, Jiaping Gui, William G. J. Halfond:
Automated energy optimization of HTTP requests for mobile applications. 249-260 - Luca Ponzanelli, Gabriele Bavota, Andrea Mocci, Massimiliano Di Penta, Rocco Oliveto, Mir Hasan, Barbara Russo, Sonia Haiduc, Michele Lanza:
Too long; didn't watch!: extracting relevant fragments from software development video tutorials. 261-272
Open source
- Igor Steinmacher, Tayana Uchôa Conte, Christoph Treude, Marco Aurélio Gerosa:
Overcoming open source project entry barriers with a portal for newcomers. 273-284 - Georgios Gousios, Margaret-Anne D. Storey, Alberto Bacchelli:
Work practices and challenges in pull-based development: the contributor's perspective. 285-296
Defect prediction
- Song Wang, Taiyue Liu, Lin Tan:
Automatically learning semantic features for defect prediction. 297-308 - Feng Zhang, Quan Zheng, Ying Zou, Ahmed E. Hassan:
Cross-project defect prediction using a connectivity-based unsupervised classifier. 309-320 - Chakkrit Tantithamthavorn, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto:
Automated parameter optimization of classification techniques for defect prediction models. 321-332 - Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai:
AntMiner: mining more bugs by reducing noise interference. 333-344
Synthesis
- Aditya Desai, Sumit Gulwani, Vineet Hingorani, Nidhi Jain, Amey Karkare, Mark Marron, Sailesh R, Subhajit Roy:
Program synthesis using natural language. 345-356 - Mukund Raghothaman, Yi Wei, Youssef Hamadi:
SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis. 357-367 - Adi Omari, Sharon Shoham, Eran Yahav:
Cross-supervised synthesis of web-crawlers. 368-379 - Juan Zhai, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. 380-391
API
- Christoph Treude, Martin P. Robillard:
Augmenting API documentation with insights from stack overflow. 392-403 - Xin Ye, Hui Shen, Xiao Ma, Razvan C. Bunescu, Chang Liu:
From word embeddings to document similarities for improved information retrieval in software engineering. 404-415 - Tam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen:
Learning API usages from bytecode: a statistical approach. 416-427
Code smells
- Baishakhi Ray, Vincent J. Hellendoorn, Saheel Godhane, Zhaopeng Tu, Alberto Bacchelli, Premkumar T. Devanbu:
On the "naturalness" of buggy code. 428-439 - Willian Nalepa Oizumi, Alessandro F. Garcia, Leonardo da Silva Sousa, Bruno Barbieri Pontes Cafeo, Yixue Zhao:
Code anomalies flock together: exploring code anomaly agglomerations for locating design problems. 440-451 - Sebastian C. Müller, Thomas Fritz:
Using (bio)metrics to predict code quality online. 452-463 - Shing-Chi Cheung, Wanjun Chen, Yepang Liu, Chang Xu:
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features. 464-475
Architecture
- Martin P. Robillard, Nenad Medvidovic:
Disseminating architectural knowledge on open-source projects: a case study of the book "architecture of open-source applications". 476-487 - Lu Xiao, Yuanfang Cai, Rick Kazman, Ran Mo, Qiong Feng:
Identifying and quantifying architectural debt. 488-498 - Ran Mo, Yuanfang Cai, Rick Kazman, Lu Xiao, Qiong Feng:
Decoupling level: a new metric for architectural maintenance complexity. 499-510
Testing 1
- Rahul Gopinath, Mohammad Amin Alipour, Iftekhar Ahmed, Carlos Jensen, Alex Groce:
On the limits of mutation reduction strategies. 511-522 - Christopher Henard, Mike Papadakis, Mark Harman, Yue Jia, Yves Le Traon:
Comparing white-box and black-box test prioritization. 523-534 - Yafeng Lu, Yiling Lou, Shiyang Cheng, Lingming Zhang, Dan Hao, Yangfan Zhou, Lu Zhang:
How does regression test prioritization perform in real-world software evolution? 535-546 - Sebastiano Panichella, Annibale Panichella, Moritz Beller, Andy Zaidman, Harald C. Gall:
The impact of test case summaries on bug fixing performance: an empirical investigation. 547-558
Testing 2
- Nariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek:
Reducing combinatorics in GUI testing of android applications. 559-570 - Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li:
MobiPlay: a remote execution based record-and-replay tool for mobile applications. 571-582 - Tingting Yu, Xiao Qu, Myra B. Cohen:
VDTest: an automated framework to support testing for virtual devices. 583-594 - Reza Matinnejad, Shiva Nejati, Lionel C. Briand, Thomas Bruckmann:
Automated test suite generation for time-continuous simulink models. 595-606
Effort estimation and search
- Xiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu:
Missing data imputation based on low-rank recovery and semi-supervised regression for software effort estimation. 607-618 - Federica Sarro, Alessio Petrozziello, Mark Harman:
Multi-objective software effort estimation. 619-630 - Shuai Wang, Shaukat Ali, Tao Yue, Yan Li, Marius Liaaen:
A practical guide to select quality indicators for assessing pareto-based search algorithms in search-based software engineering. 631-642
Product lines
- Flávio Medeiros, Christian Kästner, Márcio Ribeiro, Rohit Gheyi, Sven Apel:
A comparison of 10 sampling algorithms for configurable systems. 643-654 - Xavier Devroey, Gilles Perrouin, Mike Papadakis, Axel Legay, Pierre-Yves Schobbens, Patrick Heymans:
Featured model-based mutation analysis. 655-666 - Reimar Schröter, Sebastian Krieter, Thomas Thüm, Fabian Benduhn, Gunter Saake:
Feature-model interfaces: the highway to compositional analyses of highly-configurable systems. 667-678 - Jean Melo, Claus Brabrand, Andrzej Wasowski:
How does the degree of variability affect bug finding? 679-690
Repair and model synthesis
- Sergey Mechtaev, Jooyong Yi, Abhik Roychoudhury:
Angelix: scalable multiline program patch synthesis via symbolic analysis. 691-701 - Fan Long, Martin C. Rinard:
An analysis of the search spaces for generate and validate patch generation systems. 702-713 - Yu-Fang Chen, Chiao Hsieh, Ondrej Lengál, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
PAC learning-based verification and model synthesis. 714-724 - Steven Arzt, Eric Bodden:
StubDroid: automatic inference of precise data-flow summaries for the android framework. 725-735
Languages
- Michael J. Coblenz, Joshua Sunshine, Jonathan Aldrich, Brad A. Myers, Sam Weber, Forrest Shull:
Exploring language support for immutability. 736-747 - Diomidis Spinellis, Panos Louridas, Maria Kechagia:
The evolution of C programming practices: a study of the Unix operating system 1973-2015. 748-759 - Phillip Merlin Uesbeck, Andreas Stefik, Stefan Hanenberg, Jan Pedersen, Patrick Daleiden:
An empirical study on the impact of C++ lambdas and programmer experience. 760-771 - Nawrin Sultana, Justin Middleton, Jeffrey Overbey, Munawar Hafiz:
Understanding and fixing multiple language interoperability issues: the C/Fortran case. 772-783
Debugging
- Muhammad Ali Gulzar, Matteo Interlandi, Seunghyun Yoo, Sai Deep Tetali, Tyson Condie, Todd D. Millstein, Miryung Kim:
BigDebug: debugging primitives for interactive big data processing in spark. 784-795 - Guido Salvaneschi, Mira Mezini:
Debugging for reactive programming. 796-807 - Xiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan, Baowen Xu:
Revisit of automatic debugging via human focus-tracking analysis. 808-819 - Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis:
RETracer: triaging crashes by reverse execution from partial memory dumps. 820-831
Requirements
- Jonas Eckhardt, Andreas Vogelsang, Daniel Méndez Fernández:
Are "non-functional" requirements really non-functional?: an investigation of non-functional requirements in practice. 832-842 - Preethu Rose Anish, Balaji Balasubramaniam, Abhishek Sainani, Jane Cleland-Huang, Maya Daneva, Roel J. Wieringa, Smita Ghaisas:
Probing for requirements knowledge to stimulate architectural thinking. 843-854 - Dalal Alrajeh, Axel van Lamsweerde, Jeff Kramer, Alessandra Russo, Sebastián Uchitel:
Risk-driven revision of requirements models. 855-865 - Awais Rashid, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards, Ruzanna Chitchyan, Muhammad Ali Babar:
Discovering "unknown known" security requirements. 866-876
Dynamic analysis
- Nimrod Busany, Shahar Maoz:
Behavioral log analysis with statistical guarantees. 877-887 - Marcello M. Bersani, Domenico Bianculli, Carlo Ghezzi, Srdan Krstic, Pierluigi San Pietro:
Efficient large-scale trace checking using mapreduce. 888-898 - Magnus Madsen, Frank Tip, Esben Andreasen, Koushik Sen, Anders Møller:
Feedback-directed instrumentation for deployed JavaScript applications. 899-910 - Tongping Liu, Charlie Curtsinger, Emery D. Berger:
DoubleTake: fast and precise error detection via evidence-based dynamic analysis. 911-922
Security
- Konstantin Rubinov, Lucia Rosculete, Tulika Mitra, Abhik Roychoudhury:
Automated partitioning of android applications for trusted execution environments. 923-934 - Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden:
Jumping through hoops: why do Java developers struggle with cryptography APIs? 935-946 - Joseph P. Near, Daniel Jackson:
Finding security bugs in web applications using a catalog of access control patterns. 947-958 - Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang:
Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices. 959-970
Collaborative
- Ronnie E. S. Santos, Fabio Q. B. da Silva, Cleyton V. C. de Magalhães, Cleviton V. F. Monteiro:
Building a theory of job rotation in software engineering from an instrumental case study. 971-981 - Julia Rubin, Martin C. Rinard:
The challenges of staying together while moving fast: an exploratory study. 982-993 - Bogdan Vasilescu, Kelly Blincoe, Qi Xuan, Casey Casalnuovo, Daniela E. Damian, Premkumar T. Devanbu, Vladimir Filkov:
The sky is not the limit: multitasking across GitHub projects. 994-1005 - Peter C. Rigby, Yue Cai Zhu, Samuel M. Donadelli, Audris Mockus:
Quantifying and mitigating turnover-induced knowledge loss: case studies of chrome and a project at avaya. 1006-1016
Software quality
- Lutz Prechelt, Holger Schmeisky, Franz Zieris:
Quality experience: a grounded theory of successful agile projects without dedicated testers. 1017-1027 - Oleksii Kononenko, Olga Baysal, Michael W. Godfrey:
Code review quality: how developers see it. 1028-1038 - Patanamon Thongtanunam, Shane McIntosh, Ahmed E. Hassan, Hajimu Iida:
Revisiting code ownership and its relationship with software quality in the scope of modern code review. 1039-1050
Program analysis
- Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng:
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions. 1051-1062 - Hui Liu, Qiurong Liu, Cristian-Alexandru Staicu, Michael Pradel, Yue Luo:
Nomen est omen: exploring and exploiting similarities between argument and parameter names. 1063-1073 - Cindy Rubio-González, Cuong Nguyen, Benjamin Mehne, Koushik Sen, James Demmel, William Kahan, Costin Iancu, Wim Lavrijsen, David H. Bailey, David Hough:
Floating-point precision tuning using blame analysis. 1074-1085 - Daniel Fava, Daniel G. Shapiro, Joseph C. Osborn, Martin Schäf, E. James Whitehead Jr.:
Crowdsourcing program preconditions via a classification game. 1086-1096
Concurrency
- Jeff Huang:
Scalable thread sharing analysis. 1097-1108 - Yan Cai, Lingwei Cao:
Fixing deadlocks via lock pre-acquisitions. 1109-1120 - Valerio Terragni, Shing-Chi Cheung:
Coverage-driven test code generation for concurrent classes. 1121-1132 - Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto, Javier Thaine:
Locking discipline inference and checking. 1133-1144
Maintenance
- Jongwook Kim, Don S. Batory, Danny Dig, Maider Azanza:
Improving refactoring speed by 10X. 1145-1156 - Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes:
SourcererCC: scaling code clone detection to big-code. 1157-1168 - Saba Alimadadi, Ali Mesbah, Karthik Pattabiraman:
Understanding asynchronous interactions in full-stack JavaScript. 1169-1180 - Hristina Palikareva, Tomasz Kuchta, Cristian Cadar:
Shadow of a doubt: testing for divergences between software versions. 1181-1192
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.