default search action
43rd ICSE 2021: Madrid, Spain
- 43rd IEEE/ACM International Conference on Software Engineering, ICSE 2021, Madrid, Spain, 22-30 May 2021. IEEE 2021, ISBN 978-1-6654-4831-4
- Mohammed Alhamed, Tim Storer:
Playing Planning Poker in Crowds: Human Computation of Software Effort Estimates. 1-12 - Jihyeok Park, Seungmin An, Dongjun Youn, Gyeongwon Kim, Sukyoung Ryu:
JEST: N+1 -version Differential Testing of Both JavaScript Engines and Specification. 13-24 - Shahar Maoz, Rafi Shalom:
Unrealizable Cores for Reactive Systems Specifications. 25-36 - Rashmi Mudduluru, Jason Waataja, Suzanne Millstein, Michael D. Ernst:
Verifying Determinism in Sequential Programs. 37-49 - Peilun Zhang, Yanjie Jiang, Anjiang Wei, Victoria Stodden, Darko Marinov, August Shi:
Domain-Specific Fixes for Flaky Tests with Wrong Assumptions on Underdetermined Specifications. 50-61 - Dong Jae Kim, Nikolaos Tsantalis, Tse-Hsun Peter Chen, Jinqiu Yang:
Studying Test Annotation Maintenance in the Wild. 62-73 - Benjamin Barslev Nielsen, Martin Toldam Torp, Anders Møller:
Semantic Patches for Adaptation of JavaScript Programs to Evolving Libraries. 74-85 - Zhouyang Jia, Shanshan Li, Tingting Yu, Chen Zeng, Erci Xu, Xiaodong Liu, Ji Wang, Xiangke Liao:
DepOwl: Detecting Dependency Bugs to Prevent Compatibility Failures. 86-98 - Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
HERO: On the Chaos When PATH Meets Modules. 99-111 - Ansong Ni, Daniel Ramos, Aidan Z. H. Yang, Inês Lynce, Vasco Manquinho, Ruben Martins, Claire Le Goues:
SOAR: A Synthesis Approach for Data Science API Refactoring. 112-124 - Chengcheng Wan, Shicheng Liu, Henry Hoffmann, Michael Maire, Shan Lu:
Are Machine Learning Cloud APIs Used Correctly? 125-137 - Fengcai Wen, Emad Aghajani, Csaba Nagy, Michele Lanza, Gabriele Bavota:
Siri, Write the Next Method. 138-149 - Seohyun Kim, Jinman Zhao, Yuchi Tian, Satish Chandra:
Code Prediction by Feeding Trees to Transformers. 150-162 - Rosalia Tufano, Luca Pascarella, Michele Tufano, Denys Poshyvanyk, Gabriele Bavota:
Towards Automating Code Review Activities. 163-174 - Yanjie Gao, Yonghao Zhu, Hongyu Zhang, Haoxiang Lin, Mao Yang:
Resource-Guided Configuration Space Reduction for Deep Learning Models. 175-187 - Yuanliang Zhang, Haochen He, Owolabi Legunsen, Shanshan Li, Wei Dong, Tianyin Xu:
An Evolutionary Study of Configuration Design and Implementation in Cloud Systems. 188-200 - Chuan Luo, Jinkun Lin, Shaowei Cai, Xin Chen, Bing He, Bo Qiao, Pu Zhao, Qingwei Lin, Hongyu Zhang, Wei Wu, Saravanakumar Rajmohan, Dongmei Zhang:
AutoCCAG: An Automated Approach to Constrained Covering Array Generation. 201-212 - Xianhao Jin, Francisco Servant:
What helped, and what did not? An Evaluation of the Strategies to Improve Continuous Integration. 213-225 - Swaroopa Dola, Matthew B. Dwyer, Mary Lou Soffa:
Distribution-Aware Testing of Neural Networks Using Generative Models. 226-237 - Yiming Tang, Raffi Khatchadourian, Mehdi Bagherzadeh, Rhia Singh, Ajani Stewart, Anita Raja:
An Empirical Study of Refactorings and Technical Debt in Machine Learning Systems. 238-250 - Mohammad Wardat, Wei Le, Hridesh Rajan:
DeepLocalize: Fault Localization for Deep Neural Networks. 251-262 - Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. 263-274 - David Shriver, Sebastian G. Elbaum, Matthew B. Dwyer:
Reducing DNN Properties to Enable Falsification with Adversarial Attacks. 275-287 - Weisi Luo, Dong Chai, Xiaoyue Run, Jiang Wang, Chunrong Fang, Zhenyu Chen:
Graph-based Fuzz Testing for Deep Learning Inference Engines. 288-299 - Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng:
RobOT: Robustness-Oriented Testing for Deep Learning Systems. 300-311 - Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena:
Scalable Quantitative Verification For Deep Neural Networks. 312-323 - Jinfeng Lin, Yalin Liu, Qingkai Zeng, Meng Jiang, Jane Cleland-Huang:
Traceability Transformed: Generating more Accurate Links with Pre-Trained BERT Models. 324-335 - Antonio Mastropaolo, Simone Scalabrino, Nathan Cooper, David Nader-Palacio, Denys Poshyvanyk, Rocco Oliveto, Gabriele Bavota:
Studying the Usage of Text-To-Text Transfer Transformer to Support Code-Related Tasks. 336-347 - Antonio Guerriero, Roberto Pietrantuono, Stefano Russo:
Operation is the hardest teacher: estimating DNN accuracy looking for mispredictions. 348-358 - Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen:
AUTOTRAINER: An Automatic DNN Training Problem Detection and Repair System. 359-371 - Yan Xiao, Ivan Beschastnikh, David S. Rosenblum, Changsheng Sun, Sebastian G. Elbaum, Yun Lin, Jin Song Dong:
Self-Checking Deep Neural Networks in Deployment. 372-384 - Linghan Meng, Yanhui Li, Lin Chen, Zhi Wang, Di Wu, Yuming Zhou, Baowen Xu:
Measuring Discrimination to Boost Comparative Testing for Multiple Deep Learning Models. 385-396 - Zan Wang, Hanmo You, Junjie Chen, Yingyi Zhang, Xuyuan Dong, Wenbin Zhang:
Prioritizing Test Inputs for Deep Neural Networks via Mutation Analysis. 397-409 - Pinjia He, Clara Meister, Zhendong Su:
Testing Machine Translation via Referential Transparency. 410-422 - Yan Zheng, Yi Liu, Xiaofei Xie, Yepang Liu, Lei Ma, Jianye Hao, Yang Liu:
Automatic Web Testing Using Curiosity-Driven Reinforcement Learning. 423-435 - Giovanni Rosa, Luca Pascarella, Simone Scalabrino, Rosalia Tufano, Gabriele Bavota, Michele Lanza, Rocco Oliveto:
Evaluating SZZ Implementations Through a Developer-informed Oracle. 436-447 - N. C. Shrikanth, Suvodeep Majumder, Tim Menzies:
Early Life Cycle Software Defect Prediction. Why? How? 448-459 - Amir Makhshari, Ali Mesbah:
IoT Bugs and Development Challenges. 460-472 - Fariha Nusrat, Foyzul Hassan, Hao Zhong, Xiaoyin Wang:
How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity Projects. 473-485 - Joseph Hallett, Nikhil Patnaik, Benjamin Shreeve, Awais Rashid:
"Do this! Do that!, And nothing will happen" Do specifications lead to securely stored passwords? 486-498 - Larissa Braz, Enrico Fregnan, Gül Çalikli, Alberto Bacchelli:
Why Don't Developers Detect Improper Input Validation? '; DROP TABLE Papers; -. 499-511 - Marvin Wyrich, Andreas Preikschat, Daniel Graziotin, Stefan Wagner:
The Mind Is a Powerful Place: How Showing Code Comprehensibility Metrics Influences Code Understanding. 512-523 - Norman Peitek, Sven Apel, Chris Parnin, André Brechmann, Janet Siegmund:
Program Comprehension and Code Complexity Metrics: An fMRI Study. 524-536 - Anastasia Danilova, Alena Naiakshina, Stefan Horstmann, Matthew Smith:
Do you really code? Designing and Evaluating Screening Questions for Online Surveys with Programmers. 537-548 - Lukas Moldon, Markus Strohmaier, Johannes Wachs:
How Gamification Affects Software Developers: Cautionary Evidence from a Natural Experiment on GitHub. 549-561 - Yaza Wainakh, Moiz Rauf, Michael Pradel:
IdBench: Evaluating Semantic Representations of Identifier Names in Source Code. 562-573 - Yi Li, Shaohua Wang, Tien N. Nguyen:
A Context-based Automated Approach for Method Name Consistency Checking and Suggestion. 574-586 - Reem S. Alsuhaibani, Christian D. Newman, Michael John Decker, Michael L. Collard, Jonathan I. Maletic:
On the Naming of Methods: A Survey of Professional Developers. 587-599 - Madeline Endres, Zachary Karas, Xiaosu Hu, Ioulia Kovelman, Westley Weimer:
Relating Reading, Visualization, and Coding for New Programmers: A Neuroimaging Study. 600-612 - An Ju, Hitesh Sajnani, Scot Kelly, Kim Herzig:
A Case Study of Onboarding in Software Teams: Tasks and Strategies. 613-623 - Courtney Miller, Paige Rodeghero, Margaret-Anne D. Storey, Denae Ford, Thomas Zimmermann:
"How Was Your Weekend?" Software Development Teams Working From Home During COVID-19. 624-636 - Guolong Zheng, ThanhVu Nguyen, Simón Gutiérrez Brida, Germán Regis, Marcelo F. Frias, Nazareno Aguirre, Hamid Bagheri:
FLACK: Counterexample-Guided Fault Localization for Alloy Models. 637-648 - Yigit Küçük, Tim A. D. Henderson, Andy Podgurski:
Improving Fault Localization by Integrating Value and Predicate Based Causal Inference Techniques. 649-660 - Yi Li, Shaohua Wang, Tien N. Nguyen:
Fault Localization with Code Coverage Representation Learning. 661-673 - Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. 674-685 - Yanjie Jiang, Hui Liu, Nan Niu, Lu Zhang, Yamin Hu:
Extracting Concise Bug-Fixing Patches from Human-Written Patches in Version Control Systems. 686-698 - Rahul Gopinath, Hamed Nemati, Andreas Zeller:
Input Algebras. 699-710 - Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
Fuzzing Symbolic Expressions. 711-722 - Vasudev Vikram, Rohan Padhye, Koushik Sen:
Growing A Test Corpus with Bonsai Fuzzing. 723-735 - Andrew Truelove, Eduardo Santana de Almeida, Iftekhar Ahmed:
We'll Fix It in Post: What Do Bug Fixes in Video Game Update Notes Tell Us? 736-747 - Tianming Zhao, Chunyang Chen, Yuanning Liu, Xiaodong Zhu:
GUIGAN: Learning to Generate GUI Designs Using Generative Adversarial Networks. 748-760 - Bo Yang, Zhenchang Xing, Xin Xia, Chunyang Chen, Deheng Ye, Shanping Li:
Don't Do That! Hunting Down Visual Design Smells in Complex UIs against Design Guidelines. 761-772 - Hideaki Hata, Raula Gaikovina Kula, Takashi Ishio, Christoph Treude:
Same File, Different Changes: The Potential of Meta-Maintenance on GitHub. 773-784 - Rangeet Pan, Vu Le, Nachiappan Nagappan, Sumit Gulwani, Shuvendu K. Lahiri, Mike Kaufman:
Can Program Synthesis be Used to Learn Merge Conflict Resolutions? An Empirical Analysis. 785-796 - Qinkun Bao, Zihao Wang, Xiaoting Li, James R. Larus, Dinghao Wu:
Abacus: Precise Side-Channel Analysis. 797-809 - Jingbo Wang, Chungha Sung, Mukund Raghothaman, Chao Wang:
Data-Driven Synthesis of Provably Sound Side Channel Analyses. 810-822 - Wei Song, Mengqi Han, Jeff Huang:
IMGDroid: Detecting Image Loading Defects in Android Applications. 823-834 - Xinwei Fang, Radu Calinescu, Simos Gerasimou, Faisal Alhwikem:
Fast Parametric Model Checking through Model Fragmentation. 835-846 - Claudio Menghi, Enrico Viganò, Domenico Bianculli, Lionel C. Briand:
Trace-Checking CPS Properties: Bridging the Cyber-Physical Gap. 847-859 - Seunghoon Woo, Sunghan Park, Seulbae Kim, Heejo Lee, Hakjoo Oh:
Centris: A Precise and Scalable Approach for Identifying Modified Open-Source Software Reuse. 860-872 - Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. 873-884 - Yaohui Wang, Guozheng Li, Zijian Wang, Yu Kang, Yangfan Zhou, Hongyu Zhang, Feng Gao, Jeffrey Sun, Li Yang, Pochian Lee, Zhangwei Xu, Pu Zhao, Bo Qiao, Liqun Li, Xu Zhang, Qingwei Lin:
Fast Outage Analysis of Large-scale Production Clouds with Service Correlation Mining. 885-896 - Wei Ma, Thierry Titcheu Chekam, Mike Papadakis, Mark Harman:
MuDelta: Delta-Oriented Mutation Testing at Commit Time. 897-909 - Goran Petrovic, Marko Ivankovic, Gordon Fraser, René Just:
Does mutation testing improve testing practices? 910-921 - Huayao Wu, Wenjun Deng, Xintao Niu, Changhai Nie:
Identifying Key Features from App User Reviews. 922-932 - Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. 933-945 - Shengcheng Yu, Chunrong Fang, Zhenfei Cao, Xu Wang, Tongyu Li, Zhenyu Chen:
Prioritize Crowdsourced Test Reports via Deep Screenshot Understanding. 946-956 - Nathan Cooper, Carlos Bernal-Cárdenas, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk:
It Takes Two to TANGO: Combining Visual and Textual Information for Detecting Duplicate Video-Based Bug Reports. 957-969 - Marlo Haering, Christoph Stanik, Walid Maalej:
Automatically Matching Bug Reports With Related App Reviews. 970-981 - Edson Dias, Paulo Meirelles, Fernando Castor, Igor Steinmacher, Igor Wiese, Gustavo Pinto:
What Makes a Great Maintainer of Open Source Projects? 982-994 - Tapajit Dey, Andrey Karnauch, Audris Mockus:
Representation of Developer Expertise in Open Source Software. 995-1007 - Pankajeshwara Nand Sharma, Bastin Tony Roy Savarimuthu, Nigel Stanger:
Extracting Rationale for Open Source Software Development Decisions - A Study of Python Email Archives. 1008-1019 - Yu Huang, Denae Ford, Thomas Zimmermann:
Leaving My Fingerprints: Motivations and Challenges of Contributing to OSS for Social Good. 1020-1032 - Armstrong Foundjem, Ellis E. Eghan, Bram Adams:
Onboarding vs. Diversity, Productivity, and Quality - Empirical Study of the OpenStack Ecosystem. 1033-1045 - Marco Aurélio Gerosa, Igor Wiese, Bianca Trinkenreich, Georg Link, Gregorio Robles, Christoph Treude, Igor Steinmacher, Anita Sarma:
The Shifting Sands of Motivation: Revisiting What Drives Contributors in Open Source. 1046-1058 - Max Weber, Sven Apel, Norbert Siegmund:
White-Box Performance-Influence Models: A Profiling and Learning Approach. 1059-1071 - Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, Christian Kästner:
White-Box Analysis over Machine Learning: Modeling Performance of Configurable Systems. 1072-1084 - Ruoxi Sun, Wei Wang, Minhui Xue, Gareth Tyson, Seyit Camtepe, Damith C. Ranasinghe:
An Empirical Assessment of Global COVID-19 Contact Tracing Applications. 1085-1097 - Steven Arzt:
Sustainable Solving: Reducing The Memory Footprint of IFDS-Based Data Flow Analyses Using Intelligent Garbage Collection. 1098-1110 - Zelin Zhao, Yanyan Jiang, Chang Xu, Tianxiao Gu, Xiaoxing Ma:
Synthesizing Object State Transformers for Dynamic Software Updates. 1111-1122 - Lingchao Chen, Yicheng Ouyang, Lingming Zhang:
Fast and Precise On-the-fly Patch Validation for All. 1123-1134 - Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
Bounded Exhaustive Search of Alloy Specification Repairs. 1135-1147 - Jordan Henkel, Denini Silva, Leopoldo Teixeira, Marcelo d'Amorim, Thomas W. Reps:
Shipwright: A Human-in-the-Loop System for Dockerfile Repair. 1148-1160 - Nan Jiang, Thibaud Lutellier, Lin Tan:
CURE: Code-Aware Neural Machine Translation for Automatic Program Repair. 1161-1173 - Yuanrui Fan, Xin Xia, David Lo, Ahmed E. Hassan, Yuan Wang, Shanping Li:
A Differential Testing Approach for Evaluating Abstract Syntax Tree Mapping Algorithms. 1174-1185 - Nghi D. Q. Bui, Yijun Yu, Lingxiao Jiang:
InferCode: Self-Supervised Learning of Code Representations by Predicting Subtrees. 1186-1197 - Junjie Chen, Ningxin Xu, Peiqi Chen, Hongyu Zhang:
Efficient Compiler Autotuning via Bayesian Optimization. 1198-1209 - Yeting Li, Shuaimin Li, Zhiwu Xu, Jialun Cao, Zixuan Chen, Yun Hu, Haiming Chen, Shing-Chi Cheung:
TRANSREGEX: Multi-modal Regular Expression Synthesis by Generate-and-Repair. 1210-1222 - Facundo Molina, Pablo Ponzio, Nazareno Aguirre, Marcelo F. Frias:
EvoSpex: An Evolutionary Algorithm for Learning Postconditions. 1223-1235 - Frédéric Recoules, Sébastien Bardin, Richard Bonichon, Matthieu Lemerre, Laurent Mounier, Marie-Laure Potet:
Interface Compliance of Inline Assembly: Automatically Check, Patch and Refine. 1236-1247 - Lishan Yang, Bin Nie, Adwait Jog, Evgenia Smirni:
Enabling Software Resilience in GPGPU Applications via Partial Thread Protection. 1248-1259 - Preetha Chatterjee, Kostadin Damevski, Lori L. Pollock:
Automatic Extraction of Opinion-based Q&A from Online Developer Chats. 1260-1272 - Kaibo Cao, Chunyang Chen, Sebastian Baltes, Christoph Treude, Xiang Chen:
Automated Query Reformulation for Efficient Search based on Query Logs From Stack Overflow. 1273-1285 - Haoye Wang, Xin Xia, David Lo, John C. Grundy, Xinyu Wang:
Automatic Solution Summarization for Crash Bugs. 1286-1297 - Christoph Mayr-Dorn, Michael Vierhauser, Stefan Bichler, Felix Keplinger, Jane Cleland-Huang, Alexander Egyed, Thomas Mehofer:
Supporting Quality Assurance with Automated Process-Centric Quality Constraints Checking. 1298-1310 - Xiaozhou Liang, John Henry Burns, Joseph Sanchez, Karthik Dantu, Lukasz Ziarek, Yu David Liu:
Understanding Bounding Functions in Safety-Critical UAV Software. 1311-1322 - Giovani Guizzo, Justyna Petke, Federica Sarro, Mark Harman:
Enhancing Genetic Improvement of Software with Regression Test Selection. 1323-1333 - Gabriel Ferreira, Limin Jia, Joshua Sunshine, Christian Kästner:
Containing Malicious Package Updates in npm with a Lightweight Permission System. 1334-1346 - Sumaya Almanee, Arda Ünal, Mathias Payer, Joshua Garcia:
Too Quiet in the Library: An Empirical Study of Security Updates in Android Apps' Native Code. 1347-1359 - Pei Wang, Julian Bangert, Christoph Kern:
If It's Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening. 1360-1372 - Rajshakhar Paul, Asif Kamal Turzo, Amiangshu Bosu:
Why Security Defects Go Unnoticed during Code Reviews? A Case-Control Study of the Chromium OS Project. 1373-1385 - Fabio Massacci, Ivan Pashchenko:
Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks. 1386-1397 - Jordan Samhi, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein:
RAICC: Revealing Atypical Inter-Component Communication in Android Apps. 1398-1409 - Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: a Practitioners' Perspective. 1410-1422 - Amreeta Chatterjee, Mariam Guizani, Catherine Stevens, Jillian Emard, Mary Evelyn May, Margaret Burnett, Iftekhar Ahmed, Anita Sarma:
AID: An automated detector for gender-inclusivity bugs in OSS project pages. 1423-1435 - Jie M. Zhang, Mark Harman:
"Ignorance and Prejudice" in Software Fairness. 1436-1447 - Lin Yang, Junjie Chen, Zan Wang, Weijing Wang, Jiajun Jiang, Xuyuan Dong, Wenbin Zhang:
Semi-supervised Log-based Anomaly Detection via Probabilistic Label Estimation. 1448-1460 - Zhenhao Li, Heng Li, Tse-Hsun Peter Chen, Weiyi Shang:
DeepLV: Suggesting Log Levels Using Ordinal Based Neural Networks. 1461-1472 - Weilin Luo, Hai Wan, Xiaotong Song, Binhao Yang, Hongzhen Zhong, Yin Chen:
How to Identify Boundary Conditions with Contrasty Metric? 1473-1484 - Saad Ezzini, Sallam Abualhaija, Chetan Arora, Mehrdad Sabetzadeh, Lionel C. Briand:
Using Domain-specific Corpora for Improved Handling of Ambiguity in Requirements. 1485-1497 - Devika Sondhi, Avyakt Gupta, Salil Purandare, Ankit Rana, Deepanshu Kaushal, Rahul Purandare:
On Indirectly Dependent Documentation in the Context of Code Evolution: A Study. 1498-1509 - Felix Grund, Shaiful Alam Chowdhury, Nick C. Bradley, Braxton Hall, Reid Holmes:
CodeShovel: Constructing Method-Level Source Code Histories. 1510-1522 - Melina C. Vidoni:
Evaluating Unit Testing Practices in R Packages. 1523-1534 - Thodoris Sotiropoulos, Stefanos Chaliasos, Vaggelis Atlidakis, Dimitris Mitropoulos, Diomidis Spinellis:
Data-Oriented Differential Testing of Object-Relational Mapping Systems. 1535-1547 - Song Wang, Nishtha Shrestha, Abarna Kucheri Subburaman, Junjie Wang, Moshi Wei, Nachiappan Nagappan:
Automatic Unit Test Generation for Machine Learning Libraries: How Far Are We? 1548-1560 - Shengcheng Yu, Chunrong Fang, Yexiao Yun, Yang Feng:
Layout and Image Recognition Driving Cross-Platform Automated Mobile Testing. 1561-1571 - Abdulrahman Alshammari, Christopher Morris, Michael Hilton, Jonathan Bell:
FlakeFlagger: Predicting Flakiness Without Rerunning Tests. 1572-1584 - Alan Romano, Zihe Song, Sampath Grandhi, Wei Yang, Weihang Wang:
An Empirical Analysis of UI-based Flaky Tests. 1585-1597 - KimHao Nguyen, ThanhVu Nguyen:
GenTree: Using Decision Trees to Learn Interactions for Configurable Software. 1598-1609 - Mohammad Bajammal, Ali Mesbah:
Semantic Web Accessibility Testing via Hierarchical Visual Analysis. 1610-1621 - Jiawei Wang, Li Li, Andreas Zeller:
Restoring Execution Environments of Jupyter Notebooks. 1622-1633 - Xincheng He, Lei Xu, Xiangyu Zhang, Rui Hao, Yang Feng, Baowen Xu:
PyART: Python API Recommendation in Real-Time. 1634-1645 - Vitalis Salis, Thodoris Sotiropoulos, Panos Louridas, Diomidis Spinellis, Dimitris Mitropoulos:
PyCG: Practical Call Graph Generation in Python. 1646-1657 - Wardah Mahmood, Daniel Strüber, Thorsten Berger, Ralf Lämmel, Mukelabai Mukelabai:
Seamless Variability Management With the Virtual Platform. 1658-1670 - Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. 1671-1682 - Wenna Song, Jiang Ming, Lin Jiang, Han Yan, Yi Xiang, Yuan Chen, Jianming Fu, Guojun Peng:
App's Auto-Login Function Security Testing via Android OS-Level Virtualization. 1683-1694 - Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu:
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications. 1695-1707 - Sungjae Hwang, Sungho Lee, Jihoon Kim, Sukyoung Ryu:
JUSTGen: Effective Test Generation for Unspecified JNI Behaviors on JVMs. 1708-1718
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.