Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2015
How can I use this method?
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 880–890Code examples are small source code fragments whose purpose is to illustrate how a programming language construct, an API, or a specific function/method works. Since code examples are not always available in the software documentation, researchers have ...
- research-articleMay 2015
Graph-based statistical language model for code
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 858–868n-gram statistical language model has been successfully applied to capture programming patterns to support code completion and suggestion. However, the approaches using n-gram face challenges in capturing the patterns at higher levels of abstraction due ...
- research-articleMay 2015
Dynamic generation of likely invariants for multithreaded programs
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 835–846We propose a new method for dynamically generating likely invariants from multithreaded programs. While existing invariant generation tools work well on sequential programs, they are ineffective at reasoning about multithreaded programs both in terms of ...
- research-articleMay 2015
The impact of mislabelling on the performance and interpretation of defect prediction models
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 812–823The reliability of a prediction model depends on the quality of the data from which it was trained. Therefore, defect prediction models may be unreliable if they are trained using noisy data. Recent research suggests that randomly-injected noise that ...
- research-articleMay 2015
Coexecutability for efficient verification of data model updates
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 744–754Modern applications use back-end data stores for persistent data. Automated verification of the code that updates the data store would prevent bugs that can cause loss or corruption of data. In this paper, we focus on the most challenging part of this ...
-
- research-articleMay 2015
Empirical study towards a leading indicator for cost of formal software verification
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 722–732Formal verification can provide the highest degree of software assurance. Demand for it is growing, but there are still few projects that have successfully applied it to sizeable, real-world systems. This lack of experience makes it hard to predict the ...
- research-articleMay 2015
Efficient scalable verification of LTL specifications
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 711–721Linear Temporal Logic (LTL) has been used in computer science for decades to formally specify programs, systems, desired properties, and relevant behaviors. This paper presents a novel, efficient technique for verifying LTL specifications in a fully ...
- research-articleMay 2015
Why good developers write bad code: an observational case study of the impacts of organizational factors on software quality
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 677–687How can organizational factors such as structure and culture have an impact on the working conditions of developers? This study is based on ten months of observation of an in-house software development project within a large telecommunications company. ...
- research-articleMay 2015
Are students representatives of professionals in software engineering experiments?
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 666–676Background: Most of the experiments in software engineering (SE) employ students as subjects. This raises concerns about the realism of the results acquired through students and adaptability of the results to software industry. Aim: We compare students ...
- research-articleMay 2015
Alloy*: a general-purpose higher-order relational constraint solver
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 609–619The last decade has seen a dramatic growth in the use of constraint solvers as a computational mechanism, not only for analysis of software, but also at runtime. Solvers are available for a variety of logics but are generally restricted to first-order ...
- research-articleMay 2015
Database-backed program analysis for scalable error propagation
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 586–597Software is rapidly increasing in size and complexity. Static analyses must be designed to scale well if they are to be usable with realistic applications, but prior efforts have often been limited by available memory. We propose a database-backed ...
- research-articleMay 2015
Open source-style collaborative development practices in commercial projects using GitHub
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 574–585Researchers are currently drawn to study projects hosted on GitHub due to its popularity, ease of obtaining data, and its distinctive built-in social features. GitHub has been found to create a transparent development environment, which together with a ...
- research-articleMay 2015
From developer networks to verified communities: a fine-grained approach
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 563–573Effective software engineering demands a coordinated effort. Unfortunately, a comprehensive view on developer coordination is rarely available to support software-engineering decisions, despite the significant implications on software quality, software ...
- research-articleMay 2015
Borrowing from the crowd: a study of recombination in software design competitions
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 551–562One form of crowdsourcing is the competition, which poses an open call for competing solutions. Commercial systems such as TopCoder have begun to explore the application of competitions to software development, but have important limitations diminishing ...
- research-articleMay 2015
A flexible and non-intrusive approach for computing complex structural coverage metrics
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 506–516Software analysis tools and techniques often leverage structural code coverage information to reason about the dynamic behavior of software. Existing techniques instrument the code with the required structural obligations and then monitor the execution ...
- research-articleMay 2015
Safe memory-leak fixing for C programs
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 459–470Automatic bug fixing has become a promising direction for reducing manual effort in debugging. However, general approaches to automatic bug fixing may face some fundamental difficulties. In this paper, we argue that automatic fixing of specific types of ...
- research-articleMay 2015
Tracking static analysis violations over time to capture developer characteristics
- Pavel Avgustinov,
- Arthur I. Baars,
- Anders S. Henriksen,
- Greg Lavender,
- Galen Menzel,
- Oege de Moor,
- Max Schäfer,
- Julian Tibble
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 437–447Many interesting questions about the software quality of a code base can only be answered adequately if fine-grained information about the evolution of quality metrics over time and the contributions of individual developers is known. We present an ...
- research-articleMay 2015
Learning to log: helping developers make informed logging decisions
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 415–425Logging is a common programming practice of practical importance to collect system runtime information for postmortem analysis. Strategic logging placement is desired to cover necessary runtime information without incurring unintended consequences (e.g.,...
- research-articleMay 2015
Build it yourself!: homegrown tools in a large software company
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 369–379Developers sometimes take the initiative to build tools to solve problems they face. What motivates developers to build these tools? What is the value for a company? Are the tools built useful for anyone besides their creator? We conducted a qualitative ...
- research-articleMay 2015
A synergistic analysis method for explaining failed regression tests
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 1Pages 257–267We propose a new automated debugging method for regression testing based on a synergistic application of both dynamic and semantic analysis. Our method takes a failure-inducing test input, a buggy program, and an earlier correct version of the same ...