Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025JUST ACCEPTED
Identifying Affected Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and Libraries
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3717060To address security vulnerabilities arising from third-party libraries, security researchers maintain databases monitoring and curating vulnerability reports. Application developers can identify libraries affected by vulnerability reports (in short, ...
- research-articleOctober 2024
On the Evaluation of Large Language Models in Unit Test Generation
- Lin Yang,
- Chen Yang,
- Shutao Gao,
- Weijing Wang,
- Bo Wang,
- Qihao Zhu,
- Xiao Chu,
- Jianyi Zhou,
- Guangtai Liang,
- Qianxiang Wang,
- Junjie Chen
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1607–1619https://doi.org/10.1145/3691620.3695529Unit testing is an essential activity in software development for verifying the correctness of software components. However, manually writing unit tests is challenging and time-consuming. The emergence of Large Language Models (LLMs) offers a new ...
Detect Hidden Dependency to Untangle Commits
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 179–190https://doi.org/10.1145/3691620.3694996In collaborative software development, developers generally make code changes and commit the changes to the repositories. Among others, "making small, single-purpose commits" is considered the best practice for making commits, allowing the team to ...
- research-articleApril 2024
Efficiently Trimming the Fat: Streamlining Software Dependencies with Java Reflection and Dependency Analysis
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 103, Pages 1–12https://doi.org/10.1145/3597503.3639123Numerous third-party libraries introduced into client projects are not actually required, resulting in modern software being gradually bloated. Software developers may spend much unnecessary effort to manage the bloated dependencies: keeping the library ...
CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained Models
- Hao Yu,
- Bo Shen,
- Dezhi Ran,
- Jiaxin Zhang,
- Qi Zhang,
- Yuchi Ma,
- Guangtai Liang,
- Ying Li,
- Qianxiang Wang,
- Tao Xie
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 37, Pages 1–12https://doi.org/10.1145/3597503.3623316Code generation models based on the pre-training and fine-tuning paradigm have been increasingly attempted by both academia and industry, resulting in well-known industrial models such as Codex, CodeGen, and PanGu-Coder. To evaluate the effectiveness of ...
-
- research-articleJuly 2023
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries
- Ningyu He,
- Zhehao Zhao,
- Jikai Wang,
- Yubin Hu,
- Shengjian Guo,
- Haoyu Wang,
- Guangtai Liang,
- Ding Li,
- Xiangqun Chen,
- Yao Guo
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 385–397https://doi.org/10.1145/3597926.3598064Although existing techniques have proposed automated approaches to alleviate the path explosion problem of symbolic execution, users still need to optimize symbolic execution by applying various searching strategies carefully. As existing approaches ...
- research-articleAugust 2021
SmartCommit: a graph-based interactive assistant for activity-oriented commits
ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 379–390https://doi.org/10.1145/3468264.3468551In collaborative software development, it is considered to be a best practice to submit code changes as a sequence of cohesive commits, each of which records the work result of a specific development activity, such as adding a new feature, bug fixing, ...
- research-articleNovember 2021
MigrationAdvisor: recommending library migrations from large-scale open-source data
ICSE '21: Proceedings of the 43rd International Conference on Software Engineering: Companion ProceedingsPages 9–12https://doi.org/10.1109/ICSE-Companion52605.2021.00023During software maintenance, developers may need to migrate an already in-use library to another library with similar functionalities. However, it is difficult to make the optimal migration decision with limited information, knowledge, or expertise. In ...
- research-articleOctober 2019
IntelliMerge: a refactoring-aware software merging technique
Proceedings of the ACM on Programming Languages (PACMPL), Volume 3, Issue OOPSLAArticle No.: 170, Pages 1–28https://doi.org/10.1145/3360596In modern software development, developers rely on version control systems like Git to collaborate in the branch-based development workflow. One downside of this workflow is the conflicts occurred when merging contributions from different developers: ...
- short-paperOctober 2015
An energy-saving framework for mobile devices based on crowdsourcing intelligences
MobileDeLi 2015: Proceedings of the 3rd International Workshop on Mobile Development LifecyclePages 5–6https://doi.org/10.1145/2846661.2846665Rich mobile apps make mobile devices increasingly pervasive in our daily life. However, energy consumptions of mobile devices brings lots of users’ frustrations. To guarantee good experiences of mobile users, we propose an energy-saving framework for ...
- ArticleJuly 2015
Transforming Code with Compositional Mappings for API-Library Switching
COMPSAC '15: Proceedings of the 2015 IEEE 39th Annual Computer Software and Applications Conference - Volume 02Pages 316–325https://doi.org/10.1109/COMPSAC.2015.29API-library switching is to change an underlying API library to another one for a given program. API-library switching is frequent in software-development process, with typical examples as migrating programs across platforms or across incompatible ...
- ArticleJune 2015
Exploiting Unique Characteristics of Mobile Backend Services to Recommend Right Ones
MS '15: Proceedings of the 2015 IEEE International Conference on Mobile ServicesPages 464–467https://doi.org/10.1109/MobServ.2015.70To accelerate the development of mobile apps, more and more third-party services that can be consumed as mobile backend services are available for the consumption of mobile developers. However, with the growth of mobile backend services, it turns to be ...
- ArticleJune 2015
A Service-Based Framework for Mobile Social Messaging in PaaS Systems
ICWS '15: Proceedings of the 2015 IEEE International Conference on Web ServicesPages 751–754https://doi.org/10.1109/ICWS.2015.108With the rapid growth of cloud computing, developing business applications on Platform-as-a-Service (PaaS) systems is increasingly popular among industry companies. Various services are developed to support different business requirements on PaaS ...
- ArticleJune 2014
PatBugs: A Pattern-Based Bug Detector for Cross-platform Mobile Applications
MS '14: Proceedings of the 2014 IEEE International Conference on Mobile ServicesPages 84–91https://doi.org/10.1109/MobServ.2014.21Mobile app developers suffer a lot from the fragmentation of mobile platforms (e.g., needs to rewrite an app for a new platform). To alleviate this problem, cross-platform development techniques provide a cost-effective way (i.e., write-once-deploymany) ...
- research-articleAugust 2013
Inferring project-specific bug patterns for detecting sibling bugs
ESEC/FSE 2013: Proceedings of the 2013 9th Joint Meeting on Foundations of Software EngineeringPages 565–575https://doi.org/10.1145/2491411.2491422Lightweight static bug-detection tools such as FindBugs, PMD, Jlint, and Lint4j detect bugs with the knowledge of generic bug patterns (e.g., objects of java.io.InputStream are not closed in time after used). Besides generic bug patterns, different ...
- research-articleMay 2013
Inferring dependency constraints on parameters for web services
WWW '13: Proceedings of the 22nd international conference on World Wide WebPages 1421–1432https://doi.org/10.1145/2488388.2488512Recently many popular websites such as Twitter and Flickr expose their data through web service APIs, enabling third-party organizations to develop client applications that provide function-alities beyond what the original websites offer. These client ...
- ArticleJuly 2012
Program Behavior Analysis and Control for Online IDE
COMPSACW '12: Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications Conference WorkshopsPages 182–187https://doi.org/10.1109/COMPSACW.2012.42Compared with the traditional local IDE, online IDE provides a no-install programming environment. The proceeding in this area is attracting more and more researchers' focuses. Although online IDE can bring developers a lot of convenience for developing ...
- ArticleJuly 2012
An Effective Defect Detection and Warning Prioritization Approach for Resource Leaks
COMPSAC '12: Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications ConferencePages 119–128https://doi.org/10.1109/COMPSAC.2012.22Failing to release unneeded system resources such as I/O streams can result in resource leaks, which can lead to performance degradation and system crashes. Existing resource-leak detectors are usually based on predefined defect patterns to detect ...
- ArticleNovember 2011
Iterative mining of resource-releasing specifications
ASE '11: Proceedings of the 26th IEEE/ACM International Conference on Automated Software EngineeringPages 233–242https://doi.org/10.1109/ASE.2011.6100058Software systems commonly use resources such as network connections or external file handles. Once finish using the resources, the software systems must release these resources by explicitly calling specific resource-releasing API methods. Failing to ...
- articleNovember 2011
Mining effective temporal specifications from heterogeneous API data
Journal of Computer Science and Technology (JCST), Volume 26, Issue 6Pages 1061–1075https://doi.org/10.1007/s11390-011-1201-0Temporal specifications for Application Programming Interfaces (APIs) serve as an important basis for many defect detection tools. As these specifications are often not well documented, various approaches have been proposed to automatically mine ...