


default search action
38th ICSE 2016: Austin, TX, USA
- Laura K. Dillon, Willem Visser, Laurie A. Williams:

Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016. ACM 2016, ISBN 978-1-4503-3900-1
Android
- Xuan Lu

, Xuanzhe Liu
, Huoran Li, Tao Xie, Qiaozhu Mei, Dan Hao
, Gang Huang, Feng Feng:
PRADA: prioritizing android devices for apps by mining large-scale usage data. 3-13 - Lorenzo Villarroel, Gabriele Bavota

, Barbara Russo
, Rocco Oliveto, Massimiliano Di Penta
:
Release planning of mobile apps based on user reviews. 14-24 - Rocky Slavin

, Xiaoyin Wang
, Mitra Bokaei Hosseini, James Hester, Ram Krishnan
, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
Toward a framework for detecting privacy policy violations in android application code. 25-36 - Konrad Jamrozik, Philipp von Styp-Rekowsky, Andreas Zeller

:
Mining sandboxes. 37-48
Performance
- Bihuan Chen, Yang Liu

, Wei Le:
Generating performance distributions via probabilistic symbolic execution. 49-60 - Marija Selakovic, Michael Pradel:

Performance issues and optimizations in JavaScript: an empirical study. 61-72 - Guoxin Su

, David S. Rosenblum, Giordano Tamburrelli:
Reliability of Run-Time Quality-of-Service evaluation using parametric model checking. 73-84 - Tian Huat Tan, Manman Chen, Jun Sun, Yang Liu

, Étienne André
, Yinxing Xue, Jin Song Dong:
Optimizing selection of competing services with probabilistic hierarchical refinement. 85-95
Empirical
- Miryung Kim, Thomas Zimmermann, Robert DeLine, Andrew Begel:

The emerging role of data scientists on software development teams. 96-107 - Premkumar T. Devanbu

, Thomas Zimmermann, Christian Bird:
Belief & evidence in empirical software engineering. 108-119 - Klaas-Jan Stol

, Paul Ralph
, Brian Fitzgerald
:
Grounded theory in software engineering research: a critical review and guidelines. 120-131
Symbolic execution
- Eric F. Rizzi

, Sebastian G. Elbaum, Matthew B. Dwyer
:
On the techniques we create, the tools we build, and their misalignments: a study of KLEE. 132-143 - Maria Christakis, Peter Müller, Valentin Wüstholz:

Guiding dynamic symbolic execution toward unverified program executions. 144-155 - Jinseong Jeon, Xiaokang Qiu

, Jonathan Fetter-Degges, Jeffrey S. Foster, Armando Solar-Lezama
:
Synthesizing framework models for symbolic execution. 156-167 - Monika Dhok, Murali Krishna Ramanathan, Nishant Sinha:

Type-aware concolic testing of JavaScript programs. 168-179
Compilers and emerging trends
- Junjie Chen, Wenxiang Hu, Dan Hao

, Yingfei Xiong
, Hongyu Zhang
, Lu Zhang, Bing Xie:
An empirical comparison of compiler testing techniques. 180-190 - David Menendez, Santosh Nagarakatte

:
Termination-checking for LLVM peephole optimizations. 191-202 - Chengnian Sun, Vu Le, Zhendong Su

:
Finding and analyzing compiler warning defects. 203-213 - Qingwei Lin, Jian-Guang Lou, Hongyu Zhang

, Dongmei Zhang:
iDice: problem identification for emerging issues. 214-224
Energy and videos
- Samir Hasan, Zachary King, Munawar Hafiz, Mohammed Sayagh, Bram Adams

, Abram Hindle:
Energy profiles of Java collections classes. 225-236 - Irene Manotas, Christian Bird, Rui Zhang, David C. Shepherd

, Ciera Jaspan, Caitlin Sadowski, Lori L. Pollock, James Clause:
An empirical study of practitioners' perspectives on green software engineering. 237-248 - Ding Li, Yingjun Lyu, Jiaping Gui, William G. J. Halfond:

Automated energy optimization of HTTP requests for mobile applications. 249-260 - Luca Ponzanelli

, Gabriele Bavota
, Andrea Mocci
, Massimiliano Di Penta
, Rocco Oliveto, Mir Hasan
, Barbara Russo
, Sonia Haiduc, Michele Lanza
:
Too long; didn't watch!: extracting relevant fragments from software development video tutorials. 261-272
Open source
- Igor Steinmacher, Tayana Uchôa Conte

, Christoph Treude
, Marco Aurélio Gerosa:
Overcoming open source project entry barriers with a portal for newcomers. 273-284 - Georgios Gousios

, Margaret-Anne D. Storey, Alberto Bacchelli:
Work practices and challenges in pull-based development: the contributor's perspective. 285-296
Defect prediction
- Song Wang, Taiyue Liu, Lin Tan:

Automatically learning semantic features for defect prediction. 297-308 - Feng Zhang, Quan Zheng, Ying Zou, Ahmed E. Hassan:

Cross-project defect prediction using a connectivity-based unsupervised classifier. 309-320 - Chakkrit Tantithamthavorn

, Shane McIntosh, Ahmed E. Hassan, Kenichi Matsumoto:
Automated parameter optimization of classification techniques for defect prediction models. 321-332 - Bin Liang, Pan Bian, Yan Zhang, Wenchang Shi, Wei You, Yan Cai

:
AntMiner: mining more bugs by reducing noise interference. 333-344
Synthesis
- Aditya Desai, Sumit Gulwani, Vineet Hingorani, Nidhi Jain, Amey Karkare

, Mark Marron, Sailesh R, Subhajit Roy:
Program synthesis using natural language. 345-356 - Mukund Raghothaman

, Yi Wei, Youssef Hamadi:
SWIM: synthesizing what i mean: code search and idiomatic snippet synthesis. 357-367 - Adi Omari, Sharon Shoham

, Eran Yahav:
Cross-supervised synthesis of web-crawlers. 368-379 - Juan Zhai

, Jianjun Huang, Shiqing Ma, Xiangyu Zhang, Lin Tan, Jianhua Zhao, Feng Qin:
Automatic model generation from documentation for Java API functions. 380-391
API
- Christoph Treude

, Martin P. Robillard:
Augmenting API documentation with insights from stack overflow. 392-403 - Xin Ye

, Hui Shen, Xiao Ma, Razvan C. Bunescu, Chang Liu:
From word embeddings to document similarities for improved information retrieval in software engineering. 404-415 - Tam The Nguyen, Hung Viet Pham, Phong Minh Vu, Tung Thanh Nguyen

:
Learning API usages from bytecode: a statistical approach. 416-427
Code smells
- Baishakhi Ray, Vincent J. Hellendoorn, Saheel Godhane, Zhaopeng Tu, Alberto Bacchelli, Premkumar T. Devanbu

:
On the "naturalness" of buggy code. 428-439 - Willian Nalepa Oizumi

, Alessandro F. Garcia, Leonardo da Silva Sousa, Bruno Barbieri Pontes Cafeo, Yixue Zhao
:
Code anomalies flock together: exploring code anomaly agglomerations for locating design problems. 440-451 - Sebastian C. Müller, Thomas Fritz

:
Using (bio)metrics to predict code quality online. 452-463 - Shing-Chi Cheung

, Wanjun Chen, Yepang Liu
, Chang Xu:
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features. 464-475
Architecture
- Martin P. Robillard, Nenad Medvidovic:

Disseminating architectural knowledge on open-source projects: a case study of the book "architecture of open-source applications". 476-487 - Lu Xiao, Yuanfang Cai, Rick Kazman, Ran Mo, Qiong Feng:

Identifying and quantifying architectural debt. 488-498 - Ran Mo, Yuanfang Cai, Rick Kazman, Lu Xiao, Qiong Feng:

Decoupling level: a new metric for architectural maintenance complexity. 499-510
Testing 1
- Rahul Gopinath, Mohammad Amin Alipour

, Iftekhar Ahmed, Carlos Jensen, Alex Groce:
On the limits of mutation reduction strategies. 511-522 - Christopher Henard, Mike Papadakis

, Mark Harman, Yue Jia, Yves Le Traon
:
Comparing white-box and black-box test prioritization. 523-534 - Yafeng Lu, Yiling Lou, Shiyang Cheng, Lingming Zhang, Dan Hao

, Yangfan Zhou, Lu Zhang:
How does regression test prioritization perform in real-world software evolution? 535-546 - Sebastiano Panichella

, Annibale Panichella, Moritz Beller
, Andy Zaidman
, Harald C. Gall
:
The impact of test case summaries on bug fixing performance: an empirical investigation. 547-558
Testing 2
- Nariman Mirzaei, Joshua Garcia, Hamid Bagheri, Alireza Sadeghi, Sam Malek:

Reducing combinatorics in GUI testing of android applications. 559-570 - Zhengrui Qin, Yutao Tang, Edmund Novak, Qun Li

:
MobiPlay: a remote execution based record-and-replay tool for mobile applications. 571-582 - Tingting Yu, Xiao Qu, Myra B. Cohen:

VDTest: an automated framework to support testing for virtual devices. 583-594 - Reza Matinnejad, Shiva Nejati

, Lionel C. Briand, Thomas Bruckmann:
Automated test suite generation for time-continuous simulink models. 595-606
Effort estimation and search
- Xiao-Yuan Jing, Fumin Qi, Fei Wu, Baowen Xu

:
Missing data imputation based on low-rank recovery and semi-supervised regression for software effort estimation. 607-618 - Federica Sarro

, Alessio Petrozziello, Mark Harman:
Multi-objective software effort estimation. 619-630 - Shuai Wang, Shaukat Ali, Tao Yue, Yan Li, Marius Liaaen:

A practical guide to select quality indicators for assessing pareto-based search algorithms in search-based software engineering. 631-642
Product lines
- Flávio Medeiros, Christian Kästner

, Márcio Ribeiro
, Rohit Gheyi
, Sven Apel
:
A comparison of 10 sampling algorithms for configurable systems. 643-654 - Xavier Devroey

, Gilles Perrouin
, Mike Papadakis
, Axel Legay, Pierre-Yves Schobbens
, Patrick Heymans:
Featured model-based mutation analysis. 655-666 - Reimar Schröter, Sebastian Krieter, Thomas Thüm, Fabian Benduhn, Gunter Saake:

Feature-model interfaces: the highway to compositional analyses of highly-configurable systems. 667-678 - Jean Melo, Claus Brabrand, Andrzej Wasowski

:
How does the degree of variability affect bug finding? 679-690
Repair and model synthesis
- Sergey Mechtaev

, Jooyong Yi
, Abhik Roychoudhury
:
Angelix: scalable multiline program patch synthesis via symbolic analysis. 691-701 - Fan Long, Martin C. Rinard:

An analysis of the search spaces for generate and validate patch generation systems. 702-713 - Yu-Fang Chen

, Chiao Hsieh
, Ondrej Lengál
, Tsung-Ju Lii, Ming-Hsien Tsai, Bow-Yaw Wang, Farn Wang:
PAC learning-based verification and model synthesis. 714-724 - Steven Arzt

, Eric Bodden
:
StubDroid: automatic inference of precise data-flow summaries for the android framework. 725-735
Languages
- Michael J. Coblenz

, Joshua Sunshine
, Jonathan Aldrich
, Brad A. Myers, Sam Weber, Forrest Shull:
Exploring language support for immutability. 736-747 - Diomidis Spinellis

, Panos Louridas, Maria Kechagia
:
The evolution of C programming practices: a study of the Unix operating system 1973-2015. 748-759 - Phillip Merlin Uesbeck, Andreas Stefik, Stefan Hanenberg, Jan Pedersen

, Patrick Daleiden
:
An empirical study on the impact of C++ lambdas and programmer experience. 760-771 - Nawrin Sultana, Justin Middleton, Jeffrey Overbey, Munawar Hafiz:

Understanding and fixing multiple language interoperability issues: the C/Fortran case. 772-783
Debugging
- Muhammad Ali Gulzar, Matteo Interlandi, Seunghyun Yoo, Sai Deep Tetali, Tyson Condie, Todd D. Millstein, Miryung Kim:

BigDebug: debugging primitives for interactive big data processing in spark. 784-795 - Guido Salvaneschi

, Mira Mezini:
Debugging for reactive programming. 796-807 - Xiaoyuan Xie, Zicong Liu, Shuo Song, Zhenyu Chen, Jifeng Xuan

, Baowen Xu
:
Revisit of automatic debugging via human focus-tracking analysis. 808-819 - Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis

:
RETracer: triaging crashes by reverse execution from partial memory dumps. 820-831
Requirements
- Jonas Eckhardt, Andreas Vogelsang

, Daniel Méndez Fernández
:
Are "non-functional" requirements really non-functional?: an investigation of non-functional requirements in practice. 832-842 - Preethu Rose Anish, Balaji Balasubramaniam

, Abhishek Sainani, Jane Cleland-Huang, Maya Daneva
, Roel J. Wieringa, Smita Ghaisas:
Probing for requirements knowledge to stimulate architectural thinking. 843-854 - Dalal Alrajeh, Axel van Lamsweerde, Jeff Kramer, Alessandra Russo

, Sebastián Uchitel
:
Risk-driven revision of requirements models. 855-865 - Awais Rashid

, Syed Asad Ali Naqvi, Rajiv Ramdhany, Matthew Edwards
, Ruzanna Chitchyan
, Muhammad Ali Babar:
Discovering "unknown known" security requirements. 866-876
Dynamic analysis
- Nimrod Busany, Shahar Maoz

:
Behavioral log analysis with statistical guarantees. 877-887 - Marcello M. Bersani, Domenico Bianculli

, Carlo Ghezzi, Srdan Krstic
, Pierluigi San Pietro
:
Efficient large-scale trace checking using mapreduce. 888-898 - Magnus Madsen

, Frank Tip, Esben Andreasen, Koushik Sen, Anders Møller
:
Feedback-directed instrumentation for deployed JavaScript applications. 899-910 - Tongping Liu, Charlie Curtsinger, Emery D. Berger

:
DoubleTake: fast and precise error detection via evidence-based dynamic analysis. 911-922
Security
- Konstantin Rubinov, Lucia Rosculete, Tulika Mitra

, Abhik Roychoudhury
:
Automated partitioning of android applications for trusted execution environments. 923-934 - Sarah Nadi, Stefan Krüger, Mira Mezini, Eric Bodden

:
Jumping through hoops: why do Java developers struggle with cryptography APIs? 935-946 - Joseph P. Near, Daniel Jackson:

Finding security bugs in web applications using a catalog of access control patterns. 947-958 - Wei You, Bin Liang, Wenchang Shi, Shuyang Zhu, Peng Wang, Sikefu Xie, Xiangyu Zhang:

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices. 959-970
Collaborative
- Ronnie E. S. Santos, Fabio Q. B. da Silva

, Cleyton V. C. de Magalhães
, Cleviton V. F. Monteiro:
Building a theory of job rotation in software engineering from an instrumental case study. 971-981 - Julia Rubin, Martin C. Rinard:

The challenges of staying together while moving fast: an exploratory study. 982-993 - Bogdan Vasilescu

, Kelly Blincoe
, Qi Xuan, Casey Casalnuovo, Daniela E. Damian, Premkumar T. Devanbu
, Vladimir Filkov:
The sky is not the limit: multitasking across GitHub projects. 994-1005 - Peter C. Rigby, Yue Cai Zhu, Samuel M. Donadelli, Audris Mockus

:
Quantifying and mitigating turnover-induced knowledge loss: case studies of chrome and a project at avaya. 1006-1016
Software quality
- Lutz Prechelt

, Holger Schmeisky, Franz Zieris
:
Quality experience: a grounded theory of successful agile projects without dedicated testers. 1017-1027 - Oleksii Kononenko, Olga Baysal, Michael W. Godfrey:

Code review quality: how developers see it. 1028-1038 - Patanamon Thongtanunam, Shane McIntosh, Ahmed E. Hassan, Hajimu Iida:

Revisiting code ownership and its relationship with software quality in the scope of modern code review. 1039-1050
Program analysis
- Hao Sun, Xiangyu Zhang, Yunhui Zheng, Qingkai Zeng:

IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions. 1051-1062 - Hui Liu, Qiurong Liu, Cristian-Alexandru Staicu, Michael Pradel, Yue Luo:

Nomen est omen: exploring and exploiting similarities between argument and parameter names. 1063-1073 - Cindy Rubio-González, Cuong Nguyen, Benjamin Mehne, Koushik Sen, James Demmel, William Kahan, Costin Iancu, Wim Lavrijsen, David H. Bailey, David Hough:

Floating-point precision tuning using blame analysis. 1074-1085 - Daniel Fava, Daniel G. Shapiro, Joseph C. Osborn, Martin Schäf

, E. James Whitehead Jr.:
Crowdsourcing program preconditions via a classification game. 1086-1096
Concurrency
- Jeff Huang:

Scalable thread sharing analysis. 1097-1108 - Yan Cai

, Lingwei Cao:
Fixing deadlocks via lock pre-acquisitions. 1109-1120 - Valerio Terragni

, Shing-Chi Cheung
:
Coverage-driven test code generation for concurrent classes. 1121-1132 - Michael D. Ernst, Alberto Lovato, Damiano Macedonio, Fausto Spoto

, Javier Thaine:
Locking discipline inference and checking. 1133-1144
Maintenance
- Jongwook Kim, Don S. Batory, Danny Dig

, Maider Azanza
:
Improving refactoring speed by 10X. 1145-1156 - Hitesh Sajnani, Vaibhav Saini, Jeffrey Svajlenko, Chanchal K. Roy, Cristina V. Lopes:

SourcererCC: scaling code clone detection to big-code. 1157-1168 - Saba Alimadadi, Ali Mesbah

, Karthik Pattabiraman:
Understanding asynchronous interactions in full-stack JavaScript. 1169-1180 - Hristina Palikareva, Tomasz Kuchta

, Cristian Cadar
:
Shadow of a doubt: testing for divergences between software versions. 1181-1192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














