default search action
27th SANER 2020: London, ON, Canada
- Kostas Kontogiannis, Foutse Khomh, Alexander Chatzigeorgiou, Marios-Eleftherios Fokaefs, Minghui Zhou:
27th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2020, London, ON, Canada, February 18-21, 2020. IEEE 2020, ISBN 978-1-7281-5143-4 - Fang Lv, Hao Li, Lei Wang, Ying Liu, Huimin Cui, Jingling Xue, Xiaobing Feng:
Referee: A Pattern-Guided Approach for Auto Design in Compiler-Based Analyzers. 1-12 - Pascal Gadient, Mohammad Ghafari, Marc-Andrea Tarnutzer, Oscar Nierstrasz:
Web APIs in Android through the Lens of Security. 13-22 - Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. 23-34 - Zachary Eberhart, Alexander LeClair, Collin McMillan:
Automatically Extracting Subroutine Summary Descriptions from Unstructured Comments. 35-46 - Yan Cai, Yutian Tang, Haicheng Li, Le Yu, Hao Zhou, Xiapu Luo, Liang He, Purui Su:
Resource Race Attacks on Android. 47-58 - Scott Brisson, Ehsan Noei, Kelly A. Lyons:
We Are Family: Analyzing Communication in GitHub Software Repositories and Their Forks. 59-69 - C. M. Khaled Saifullah, Muhammad Asaduzzaman, Chanchal K. Roy:
Exploring Type Inference Techniques of Dynamically Typed Languages. 70-80 - Zhaoxu Zhang, Hengcheng Zhu, Ming Wen, Yida Tao, Yepang Liu, Yingfei Xiong:
How Do Python Framework APIs Evolve? An Exploratory Study. 81-92 - Manishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:
Associating Code Clones with Association Rules for Change Impact Analysis. 93-103 - Wei Tang, Ping Luo, Jialiang Fu, Dan Zhang:
LibDX: A Cross-Platform and Accurate System to Detect Third-Party Libraries in Binary Code. 104-115 - Qingzhao Zhang, Yizhuo Wang, Juanru Li, Siqi Ma:
EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts. 116-126 - Hongliang Liang, Lin Jiang, Lu Ai, Jinyi Wei:
Sequence Directed Hybrid Fuzzing. 127-137 - Ariel Afonso, Altigran S. da Silva, Tayana Conte, Paulo Martins, João M. B. Cavalcanti, Alessandro Garcia:
LESSQL: Dealing with Database Schema Changes in Continuous Deployment. 138-148 - Alvi Mahadi, Karan Tongay, Neil A. Ernst:
Cross-Dataset Design Discussion Mining. 149-160 - Antonio Carvalho, Welder Pinheiro Luz, Diego Marcilio, Rodrigo Bonifácio, Gustavo Pinto, Edna Dias Canedo:
C-3PR: A Bot for Fixing Static Analysis Violations via Pull Requests. 161-171 - Bo Chen, Zhenkun Yang, Li Lei, Kai Cong, Fei Xie:
Automated Bug Detection and Replay for COTS Linux Kernel Modules with Concolic Execution. 172-183 - Paolo Boldi, Antoine Pietri, Sebastiano Vigna, Stefano Zacchiroli:
Ultra-Large-Scale Repository Analysis via Graph Compression. 184-194 - Jonathan A. Saddler, Cole S. Peterson, Sanjana Sama, Shruthi Nagaraj, Olga Baysal, Latifa Guerrouj, Bonita Sharif:
Studying Developer Reading Behavior on Stack Overflow during API Summarization Tasks. 195-205 - Victor Oliveira, Leopoldo Teixeira, Felipe Ebert:
On the Adoption of Kotlin on Android Development: A Triangulation Study. 206-216 - Marco Couto, João Saraiva, João Paulo Fernandes:
Energy Refactorings for Android in the Large and in the Wild. 217-228 - Sarah Nadi, Christoph Treude:
Essential Sentences for Navigating Stack Overflow Answers. 229-239 - Manishankar Mondal, Banani Roy, Chanchal K. Roy, Kevin A. Schneider:
HistoRank: History-Based Ranking of Co-change Candidates. 240-250 - Kijin An, Eli Tilevich:
D-Goldilocks: Automatic Redistribution of Remote Functionalities for Performance and Efficiency. 251-260 - Wenhan Wang, Ge Li, Bo Ma, Xin Xia, Zhi Jin:
Detecting Code Clones with Graph Neural Network and Flow-Augmented Abstract Syntax Tree. 261-271 - Guanhua Li, Yijian Wu, Chanchal K. Roy, Jun Sun, Xin Peng, Nanjie Zhan, Bin Hu, Jingyi Ma:
SAGA: Efficient and Large-Scale Detection of Near-Miss Clones with GPU Acceleration. 272-283 - Jing Kai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu:
CORE: Automating Review Recommendation for Code Changes. 284-295 - Renhao Xiong, David Lo, Bixin Li:
Distinguishing Similar Design Pattern Instances through Temporal Behavior Analysis. 296-307 - Béla Vancsics, Attila Szatmári, Árpád Beszédes:
Relationship between the Effectiveness of Spectrum-Based Fault Localization and Bug-Fix Types in JavaScript Programs. 308-319 - Johannes Härtel, Ralf Lämmel:
Incremental Map-Reduce on Repository History. 320-331 - Marcel Steinbeck, Rainer Koschke, Marc O. Rüdel:
How EvoStreets Are Observed in Three-Dimensional and Virtual Reality Environments. 332-343 - Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen, Lingxiao Jiang:
Are the Code Snippets What We Are Searching for? A Benchmark and an Empirical Study on Code Search with Natural-Language Queries. 344-354 - Fiorella Zampetti, Alexander Serebrenik, Massimiliano Di Penta:
Automatically Learning Patterns for Self-Admitted Technical Debt Removal. 355-366 - Aline Brito, André C. Hora, Marco Túlio Valente:
Refactoring Graphs: Assessing Refactoring over Time. 367-377 - Filipe Falcão, Caio Barbosa, Baldoino Fonseca, Alessandro Garcia, Márcio Ribeiro, Rohit Gheyi:
On Relating Technical, Social Factors, and the Introduction of Bugs. 378-388 - Daniel San Martín, Bento R. Siqueira, Valter Vieira de Camargo, Fabiano Cutigi Ferrari:
Characterizing Architectural Drifts of Adaptive Systems. 389-399 - Samridhi Choudhary, Christopher Bogart, Carolyn P. Rosé, Jim Herbsleb:
Using Productive Collaboration Bursts to Analyze Open Source Collaboration Effectiveness. 400-410 - Basma S. Alqadi, Jonathan I. Maletic:
Slice-Based Cognitive Complexity Metrics for Defect Prediction. 411-422 - Nathan Cassee, Bogdan Vasilescu, Alexander Serebrenik:
The Silent Helper: The Impact of Continuous Integration on Code Reviews. 423-434 - Lannan Luo:
Heap Memory Snapshot Assisted Program Analysis for Android Permission Specification. 435-446 - Qing Huang, An Qiu, Maosheng Zhong, Yuan Wang:
A Code-Description Representation Learning Model Based on Attention. 447-455 - Adelina Ciurumelea, Sebastian Proksch, Harald C. Gall:
Suggesting Comment Completions for Python using Neural Language Models. 456-467 - Árpád Beszédes, Ferenc Horváth, Massimiliano Di Penta, Tibor Gyimóthy:
Leveraging Contextual Information from Function Call Chains to Improve Fault Localization. 468-479 - Guangjie Li, Hui Liu, Jiahao Jin, Qasim Umer:
Deep Learning Based Identification of Suspicious Return Statements. 480-491 - Brent van Bladel, Serge Demeyer:
Clone Detection in Test Code: An Empirical Evaluation. 492-500 - Valentina Lenarduzzi, Francesco Lomio, Heikki Huttunen, Davide Taibi:
Are SonarQube Rules Inducing Bugs? 501-511 - Rrezarta Krasniqi, Jane Cleland-Huang:
Enhancing Source Code Refactoring Detection with Explanations from Commit Messages. 512-516 - Leonel Merino, Mircea Lungu, Christoph Seidl:
Unleashing the Potentials of Immersive Augmented Reality for Software Engineering. 517-521 - Dae-Kyoo Kim, Ming Hua, Lunjin Lu:
Reflection on Building Hybrid Access Control by Configuring RBAC and MAC Features. 522-526 - Syed Fatiul Huq, Ali Zafar Sadiq, Kazi Sakib:
Is Developer Sentiment Related to Software Bugs: An Exploratory Study on GitHub Commits. 527-531 - Mingzhe Hu, Yu Zhang:
The Python/C API: Evolution, Usage Statistics, and Bug Patterns. 532-536 - Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan, Qinghua Zheng, Ting Liu:
Revisiting the Challenges and Opportunities in Software Plagiarism Detection. 537-541 - Zhensu Sun, Yan Liu, Ziming Cheng, Chen Yang, Pengyu Che:
Req2Lib: A Semantic Neural Model for Software Library Recommendation. 542-546 - Pietro Abate, Roberto Di Cosmo, Georgios Gousios, Stefano Zacchiroli:
Dependency Solving Is Still Hard, but We Are Getting Better at It. 547-551 - Felipe Ebert, Fernando Castor, Alexander Serebrenik:
A Reflection on "An Exploratory Study on Exception Handling Bugs in Java Programs". 552-556 - Yu Nong, Haipeng Cai:
A Preliminary Study on Open-Source Memory Vulnerability Detectors. 557-561 - Haipeng Cai:
A Reflection on the Predictive Accuracy of Dynamic Impact Analysis. 562-566 - Romulo Nascimento, Aline Brito, André C. Hora, Eduardo Figueiredo:
JavaScript API Deprecation in the Wild: A First Assessment. 567-571 - Aman Yadav, Rishab Sharma, Fatemeh Hendijani Fard:
A Semantic-Based Framework for Analyzing App Users' Feedback. 572-576 - Rui Zhou, Mohammad Hamdaqa, Haipeng Cai, Abdelwahab Hamou-Lhadj:
MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices. 577-581 - Hajra Naeem, Manar H. Alalfi:
Identifying Vulnerable IoT Applications using Deep Learning. 582-586 - Sajeda Parveen, Manar H. Alalfi:
A Mutation Framework for Evaluating Security Analysis Tools in IoT Applications. 587-591 - Marcus Vinicius Bertoncello, Gustavo Pinto, Igor Scaliante Wiese, Igor Steinmacher:
Pull Requests or Commits? Which Method Should We Use to Study Contributors' Behavior? 592-601 - Ferdian Thung, Stefanus A. Haryono, Lucas Serrano, Gilles Muller, Julia Lawall, David Lo, Lingxiao Jiang:
Automated Deprecated-API Usage Update for Android Apps: How Far are We? 602-611 - Kunihiro Noda, Yusuke Nemoto, Keisuke Hotta, Hideo Tanida, Shinji Kikuchi:
Experience Report: How Effective is Automated Program Repair for Industrial Software? 612-616 - Arjan J. Mooij, Jeroen Ketema, Steven Klusener, Mathijs Schuts:
Reducing Code Complexity through Code Refactoring and Model-Based Rejuvenation. 617-621 - Verena Geist, Michael Moser, Josef Pichler, Stefanie Beyer, Martin Pinzger:
Leveraging Machine Learning for Software Redocumentation. 622-626 - Stefan Strobl, Christina Zoffi, Christoph Haselmann, Mario Bernhart, Thomas Grechenig:
Automated Code Transformations: Dealing with the Aftermath. 627-631 - Mohammadreza Hazhirpasand, Mohammad Ghafari, Oscar Nierstrasz:
CryptoExplorer: An Interactive Web Platform Supporting Secure Use of Cryptography APIs. 632-636 - Muhammad Hilmi Asyrofi, Ferdian Thung, David Lo, Lingxiao Jiang:
AUSearch: Accurate API Usage Search in GitHub Repositories with Type Resolution. 637-641 - Shogo Tokui, Norihiro Yoshida, Eunjong Choi, Katsuro Inoue:
Clone Notifier: Developing and Improving the System to Notify Changes of Code Clones. 642-646 - Marcel Steinbeck:
Mining Version Control Systems and Issue Trackers with LibVCS4j. 647-651 - Michael Rath, Mihaela Todorova Tomova, Patrick Mäder:
SpojitR: Intelligently Link Development Artifacts. 652-656 - Satoshi Yamashita, Shinpei Hayashi, Motoshi Saeki:
ChangeBeadsThreader: An Interactive Environment for Tailoring Automatically Untangled Changes. 657-661 - Jie Wu, Chengyu Zhang, Geguang Pu:
Reinforcement Learning Guided Symbolic Execution. 662-663 - Rudolf Ramler, Marko Gattringer, Josef Pichler:
Live Replay of Screen Videos: Automatically Executing Real Applications as Shown in Recordings. 664-665 - Yalda Hashemi, Maleknaz Nayebi, Giuliano Antoniol:
Documentation of Machine Learning Software. 666-667 - Cynthia Dookie:
Building an Inclusive Distributed Ledger System. 668-669
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.